InterviewUSENIX

 

interview with
Dr. Clair W. Goldsmith

goldsmith Rob Kolstad interviewed Dr. Clair W. Goldsmith via email over the last three months. Goldsmith has held many positions in the academic and medical computing communities in the last couple of decades. Clair was also president of DECUS for several years.




Rob You are a high-level guy at the University of Texas, Austin, computing center, right? Please tell us a bit about your position.

Clair I have a typically academic title: Deputy Director, Academic Computing and Instructional Technology Services at the University of Texas, Austin. UT Austin has separate computing centers for academic and administrative computing. The differences are more apparent than real. For example, we are working to combine our Help Desk functions ­ academic computing has a much larger effort for this than administrative computing. We also use the same communications network infrastructure. I often deal with the infractions that occur on the administrative computer system as well.

Rob And UT serves a large user community? Lots of hardware?

Clair There are lots of measures of that. There are 75,000+ users who publish their email address in our X.500 directory. Probably the most interesting statistic is that there are over 34,000 computers on the campus network. Or we get about 13,000,000 hits per month to our Web site, which is 250,000+ pages on 300 servers.

Rob What sorts of interesting issues do you confront?

Clair All of the complaints about the use of technology can be sent to me via <[email protected]>. Although issues involve spam, commercial use, forged email, and harassment, the most difficult and interesting cases have to do with freedom of speech, academic freedom, copyright, and occasionally privacy.

Rob So you have to deal with all the random acts that students might commit when they can use the net to communicate via email, Web, or other standard techniques?

Clair Yes, and also faculty staff and their dependents (if the resources are being shared ­ which is always inappropriate and illegal under Texas law). In one case, a particularly colorful stream of profanity was sent to someone outside the university, who complained. When the staff member got a letter with the complaint attached, he called me to apologize. He seemed very surprised that his 14-year-old son knew those words.

I also had a case where the son of a staff member advertised video gaming equipment for sale, cashed the check, and refused to deliver the equipment, saying that he was only 16 and could not be held responsible. As it turns out, his parents can. The father got the email about this on the first day of a month-long family vacation in Hawaii.

Most recently, we have had problems with students setting up sites that distribute the intellectual property of others: games, recorded music, animation, and software. Most cases are handled by putting the student on disciplinary probation. However, in two cases we have suspended students: one for selling access to pirated software and one for repeated distribution of recorded music.

I also have had the police get a search warrant for a dorm room because a student had constructed a trojan horse to obtain the logon identifiers and passwords that he published in an alt. newsgroup.

Rob What happens when a student, faculty member, or staff member puts up a "hate" page (anti-Semitic, homophobic, etc.)?

Clair I usually get a phone call or email complaint, to which I reply that we will review the information supplied and determine if any rules or laws have been broken. However, the examples you gave do not break any rule or law. In fact, because we are state assisted, we must not abridge the First Amendment right of free speech and therefore cannot prohibit such. Private institutions might have different rules ­ but as a state institution we must follow the laws carefully.

Rob What about dirty pictures? What about really dirty pictures?

Clair Then the Web page has really dirty pictures on it. Seriously, the First Amendment requirement is very strong. And there is no definition of "really dirty pictures." As long as it's pornography, it is protected speech. There is a definition, of sorts, of obscene: offends local sensibilities. Thus, although I have seen some things that make me nauseous, there has never been anything that we have taken down because of content.

Rob What happens when a student sends out 100,000 spam emails promoting some random product or thought?

Clair Well, if it's a product, they get a mail message reminding them they cannot use state property for commercial purposes and there is a prohibition against spamming. If it is only a thought, then they just get the spamming reminder.

Rob That's it? No special "appropriate usage guidelines" or anything? Doesn't that cost you a lot of resources?

Clair We have what we call "responsible use guidelines." They can be found in "Looking for Trouble?" at <http://www.utexas.edu/cc/policies/trouble.html>. However, we do define a portion of the resources for each use ­ that would simply be unmanageable. However, we do have a rule against spam, and when it is broken, we do contact the individual. Most are surprised that we noticed and then are subsequently embarrassed. We do not often have repeat offenders; and when we do, it is likely to indicate a more serious problem for which stronger remedies are available. In any case, I do not have to worry about discipline for students, faculty, or staff. I only produce the evidence chain.

We believe that attempts to control use will be ineffective in this environment. It is better to set standards of behavior and use and measure the complaints against those standards.

Rob How do you go about searching students' rooms to get evidence to help the authorities?

Clair Only on invitation. Normally, we do all investigating via the Net or through other records and logs. Actually, we would never go into a student's room. The police do that ­ and only with permission or a warrant.

Rob So, being 18, the students have the complete set of rights we might all expect as citizens, and you have to make the call each and every day as to whether they have crossed the thin line that divides "protected" activities from illegal ones?

Clair Yes, the serious issue for students is that they be protected appropriately. They sometimes think that because they are students, rules and laws don't really apply. They are dumbfounded to learn that they do. A case in point is the student who created the trojan horse. He didn't think anyone would notice his posting of accounts and passwords. This is against the rules and state law. When the police woke him and his roommate at 7:00 am, the first thing he said was, "I bet you're here about the accounts I posted." He learned this statement is admissible, even though he had not yet been Miranda-ized, because he was not then a suspect.

Often, finding the evidence is an interesting problem. I recently had a complaint by a computer science undergraduate student that his account in CS had been hacked. CS had blocked his account and although they found him believable, told him it was his problem to find the culprit. By the time he got to me, he had been to the source of one of the attacks, microbiology, and had the account number of the person who was logged on at the time of the attack. Under federal law, if the account owner is a student, I cannot release the name of that student. Therefore, I investigate the incident, identify the facts, and turn the information over to Student Judicial Services. In this case, a second breakin had occurred from a chemistry research area, where no account is necessary to use the computers. The attack occurred on a holiday, so it was clear whoever did it had a building key. The faculty member responsible for the area provided a list of students and staff with access. There was no match to the person who had attacked from the microbiology computer. After thinking about it for a day, I queried the X.500 directory on the telephone number of the microbiology suspect. A name on the Chemistry list did show up ­ his wife, it turns out.

Rob Do you get a lot of flak from people outside the university who do not understand the rules?

Clair Yes. Actually, once explained, there is not much push-back. Typically, it will be from other institutions who know better and try to see if they can get us to give up information. We do not give out information on students to police authorities without a subpoena or, in the case of clear and obvious need, such as a disaster or other life or death matter.

I once had a person at a premier Ivy League institution, who should have known better, tell me that there could be no such law that required the permission of students to release information about the student to him. After several email exchanges, where he repeatedly told me I was wrong, I sent him the appendix from our General Information catalog that contains the text of the federal law.

Rob How much time could it take to deal with all these sorts of problems?

Clair This is almost a full-time job. I also have a quarter-time law student who deals with routine cases. A trivial case, such as one the law student deals with, takes about 30 minutes to respond to the complainant and ask for the account number used. This may require additional effort, such as requesting the complete email headers from the complainant or searching a newsgroup archive for the complete headers. It takes an additional 45 minutes to complete the information necessary for either a referral or informational referral to Student Judicial Services.

Rob Do you have to deal with incoming spam and hate mail? What happens?

Clair I wrote about this in our November newsletter, see <http://www.utexas.edu/cc/newsletter/nov97/spam.html>. We do try to minimize spam by not accepting email whose domain names are not resolvable ­ upwards of 40,000 daily ­ and we exchange lists with others about known spam producers.

As for the hate email, this does come under the heading of protected speech. There may be cases where it is harassment, but that is a judgment made by the recipient and Student Judicial Services.

For Web pages maintained by terrorist groups, the only effective deterrent I have seen was creditable death threats to family members of the Web page owner. Unfortunately, this may be considered "terroristic threats" that are against state law, but it was not reported as such.

Rob What's the most rewarding part of your job?

Clair There are a couple of aspects that are truly rewarding.

First, when someone has received (death) threats and is genuinely upset, I can explain what is likely going on, what the person's options are, and that they are not totally in the control of someone else.

Second is dealing with those outside the university to explain what our rules are, how they are enforced, and why we have the rules. Most people really do appreciate the explanation and come to understand our position, even if they do not completely agree with it.

I very much enjoy this role of being a point of human contact for those who believe themselves injured. And, strange as it may sound, balancing that with ensuring that the accused has all the evidence so that whatever discipline incurred is justified.

 

?Need help? Use our Contacts page.
First posted: 13th April 1998 efc
Last changed: 13th April 1998 efc
Issue index
;login: index
USENIX home