Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: Question for Robert Campbell
ewe

Date:
RE: RE: RE: Question for Robert Campbell
Permalink Closed


quote:

Originally posted by: Idiot Patrol

"This post is not only irresponsible but an outright lie.  There are a lot of great people that work in iTech and you are dishonoring them with this junk.  No one from iTech has ever broken into an office to get "dirt" on a professor or anyone else.  Why spread those lies?"


 


Idiot,


Arnold Schwartzgnome presented that only as a "tale" (his word), which I take to mean "rumor." Perhaps it is not true, but I heard it also. Whether true or false, it does help demonstrate how events this past year have contributed to making USM a very unhealthy and suspicious environment in which to work. I agree with LVN - hope it's not true.



__________________
Arnold Schwarzgnome

Date:
Permalink Closed

Well, I'm only repeating what a DEAN told me. At the time I found it as hard to believe as you do. But go back and read the poem, everybody.
After what the administration did to Stringer and Glamser, do you really think that they wouldn't stoop to anything? They certainly lie in public enough. My apologies to any iTech employees I have offended, but I don't think I'm posting irresponsibly. I'm trying to warn everyone to be careful and watch your back. Do you honestly think the e-mail monitoring is over? I don't.

__________________
Arnold Schwarzgnome

Date:
Permalink Closed

Also, whether or not you believe the story, the larger point is more important: that Thames does not believe in tenure and the IHL board (Roy Klumb at least), is trying to weaken it, if not bring it down. All higher education employees in the state of Mississippi should be worried.

__________________
Logical Thinker

Date:
Permalink Closed

quote:

Originally posted by: Idiot Patrol

  No one from iTech has ever broken into an office to get "dirt" on a professor or anyone else. 


In view of your statement, Idiot Patrol, I have a question for you: If the server does not store email as far back as a year, how do you think the university obtained Gary Stringer's 2003 emails which were in the evidence packet?


Logical Thinker



__________________
asdf

Date:
Permalink Closed

quote:

Originally posted by: Logical Thinker

" In view of your statement, Idiot Patrol, I have a question for you: If the server does not store email as far back as a year, how do you think the university obtained Gary Stringer's 2003 emails which were in the evidence packet? Logical Thinker"


Thought I am sure IP has a theory, I would think those emails were removed off of the individual computers after the locks were changed and their computers were confiscated.  Another theory would look at when SFT started monitoring the email.  I just can't remember the exact details but say if he started do this in Dec/Jan, then all of 2003 would still be on the servers.  (I'm sure those details were in the hearing, so that theory should be easy to check.)


Remember, iTech is university staff.  I know most of the posters don't mean to offend, but can you imagine some of the outrage from members of this online community if someone suggested that secretaries were reporting straight to the dome on professors activity or members of the Commons staff were eavesdropping on conversations and running to the back to transcribe them in a email directly to SFT?  I know you say the climate of fear make you think anything is possible, but when do you go too far?



__________________
Arnold Schwarzgnome

Date:
Permalink Closed

quote:
Originally posted by: asdf

"
Thought I am sure IP has a theory, I would think those emails were removed off of the individual computers after the locks were changed and their computers were confiscated.  Another theory would look at when SFT started monitoring the email.  I just can't remember the exact details but say if he started do this in Dec/Jan, then all of 2003 would still be on the servers.  (I'm sure those details were in the hearing, so that theory should be easy to check.)
Remember, iTech is university staff.  I know most of the posters don't mean to offend, but can you imagine some of the outrage from members of this online community if someone suggested that secretaries were reporting straight to the dome on professors activity or members of the Commons staff were eavesdropping on conversations and running to the back to transcribe them in a email directly to SFT?  I know you say the climate of fear make you think anything is possible, but when do you go too far?
"


When do _we_ go too far? Isn't Thames the guy who went too far?
The administrative staff, underpaid and without the securities that faculty have (or used to have) are the people who are MOST at risk of being abused under the current administration. Many of them have told me they would say something about the current situation but they can't because they fear for their jobs. Many have stopped using university phones and only use their cell phones. Let's make this clear--if I think iTech is breaking into offices, I do NOT blame them. I blame whoever made them do it.

Also the records from the hearings show that the administration had e-mail which predates Gary Stringer completely replacing his hard drive, some from as far back as the August before--which means they were monitoring him long before the issues surrounding Dvorak's resume came up. They were also monitoring Myron Henry and the advisor to the Printz--there is written proof of this--and who knows who else.

And the "story" about iTech breaking into an office is related to a professor who is NOT Stringer or Glamser.

__________________
Invictus

Date:
Permalink Closed

Is this some sort of game of semantics?

iTech is university staff. If a custodian uses a pass key to access an office to sweep it & take out the trash, is that "breaking in" to the office? (Please note that I do not know whether USM faculty are expected to sweep their own offices or carry out their own trash but rather I'm just using this as an hypothetical example.) Similarly, if an iTech worker is told to go to a specified office, use a pass key & "replace" a hard drive, is that technician "breaking in" to the office?

What would happen to the technician if s/he refused to comply with the work order?

I work at an institution with a far lower paranoia level than USM. But I've come to my office on more than one occaision to find an IT worker sitting at my desk installing software. My response? I go get the guy a cup of coffee.

It's all about trust levels.

If I were as concerned about "snooping" as some of the USM faculty on this board profess to be, I'd for sure be encrypting anything "sensitive" on my hard drive. How many USM employees take even the basic step of setting a BIOS password on their computers?

__________________
Logical Thinker

Date:
Permalink Closed


quote:






Originally posted by: asdf
" I would think those emails were removed off of the individual computers after the locks were changed and their computers were confiscated."


Although it is not common knowledge, Gary Stringer's computer was not confiscated when his lock was changed, because it was not in his office at that time. The administration never got that hard drive.


"Another theory would look at when SFT started monitoring the email.  I just can't remember the exact details but if he started do this in Dec/Jan, then all of 2003 would still be on the servers." 


Did not the president testified under oath that he began the email surveillance of Stringer and Glamser in mid-January, 2004? The evidence packet included emails as far back as January, 2003. The nature of those emails suggests it is highly likely that they came off a hard drive.


Houston, do we have a problem? Draw your own conclusions.


Logical Thinker



__________________
Invictus

Date:
RE: RE: RE: RE: RE: RE: Question for Robert Campbe
Permalink Closed


quote:
Originally posted by: Logical Thinker

"Did not the president testified under oath that he began the email surveillance of Stringer and Glamser in mid-January, 2004? The evidence packet included emails as far back as January, 2003. The nature of those emails suggests it is highly likely that they came off a hard drive."


I have wondered many times since the hearing last spring if this was why Judge Anderson called time-out when he did. Perhaps SFT meant that he ordered the surveillance in January 2004, but it sounded as if he was, um, dissembling under oath.

My bet is that Robbie McDuff was fully prepared to sink his talons into that inconsistency & I suspect that "dissemble" isn't exactly the word McDuff would have used. More likely, the word "perjury" is what he would have used. Anderson "protected" SFT from a cross-examination by a pro.

What is amazing to me is that SFT would really want to do away with or weaken tenure. After all, tenure was his own "golden parachute" once upon a time...



__________________
asdf

Date:
RE: RE: Question for Robert Campbell
Permalink Closed


LT,


"Although it is not common knowledge, Gary Stringer's computer was not confiscated when his lock was changed, because it was not in his office at that time. The administration never got that hard drive."


Ok, I didn't know that, but then it was evidently not common knowledge.



"Did not the president testified under oath that he began the email surveillance of Stringer and Glamser in mid-January, 2004? The evidence packet included emails as far back as January, 2003. The nature of those emails suggests it is highly likely that they came off a hard drive."


As I said before, I do not remember what SFT said.  How long does info stay on the server?  Any admins out there that could let us know, or what that said at the hearing also?  Is there a transcript of the hearing out on the web somewhere?


Also, as Invictus said, you might find out that iTech has been in your office, but that does not mean they are a spy.  My friends often tell me that it is near impossible to find some profs in their offices, so in order to complete a work order, they simply get someone to let them in so they can install, fix, or whatever is on the work order.  Sometimes there are situations where you would not even put in a work order.  I have an example where I walked into my lab to see an iTech person sitting at my computer, it had a virus that was attacking a computer at UAB and he was there installing a patch to fix it.


I guess I have a good relation with some of the people there so I tend to trust them.  I used to get heads up sometimes when they were going to look for file sharing on the network and things like that.  I realize that everyone does not feel the same way.



__________________
Interested

Date:
Permalink Closed

quote:
Originally posted by: Invictus

"
If I were as concerned about "snooping" as some of the USM faculty on this board profess to be, I'd for sure be encrypting anything "sensitive" on my hard drive. How many USM employees take even the basic step of setting a BIOS password on their computers?
"



Invictus, could you recommend a website or other resource where one could learn about BIOS passwords, as you mention above? Thanks.

__________________
Invictus

Date:
Permalink Closed

quote:
Originally posted by: Interested

"

Invictus, could you recommend a website or other resource where one could learn about BIOS passwords, as you mention above? Thanks.
"


When you boot up your computer, there will be a prompt for a specific function button to press to enter the BIOS set up. Once you get into the BIOS set up, there will be an area for setting a password. Once you've set it, do whatever your specific system requires to save the changes & exit.

After that, you will have to enter the password in order to boot the PC.

Proceed with extreme caution! If you forget the password, you will have to have someone reset the BIOS. This usually involves removing the small CMOS battery from the motherboard & sometimes requires changing a jumper on the motherboard, rebooting, then changing the jumper back. In other words, DON'T USE A PASSWORD YOU'RE LIKELY TO FORGET. At the same time, don't use a password that is easy to guess & don't keep a written copy of the password lying around.

Here are some instructions using the Phoenix BIOS screens as examples.

This is not bullet-proof. It just makes your PC a P.I.T.A. for an unauthorized person to access. For an idea about how much of a P.I.T.A. it can be, read this or this.

Also, this does not prevent someone from removing your hard drive & installing it on another machine to read the files.

Finally, I have no idea whether iTech regards BIOS passwords as a violation of the acceptable use policy...

If you really, really, don't want someone to read your files, encrypt them. The gold standard for personal encryption is PGP, currently version 8.0 for the "international" version & version 8.1 for the domestic release. Just remember, this level of encryption has been classified in the past as a not-for-export military grade system.

(As a side benefit of using PGP encryption, you can sign unencrypted documents with a digital signature that can be verified by the recipient. The cool thing is that the signature includes a checksum so the recipient can tell whether the document was modified in any way after it was signed.)



__________________
Invictus

Date:
Permalink Closed

Sorry for the flakey bold formatting. The links all work, though.

Remember, just because you're paranoid doesn't mean they aren't out to get you. Or as Bob said, "If you want somebody you can trust, TRUST YOURSELF."

__________________
educator

Date:
Permalink Closed

Invictus, thank you for this very important information. I plan to follow through with this and find your help to be quite valuable.

__________________
stephen judd

Date:
RE: RE: RE: RE: RE: RE: RE: Question for Robert Campbe
Permalink Closed


quote:

Originally posted by: Invictus

" I have wondered many times since the hearing last spring if this was why Judge Anderson called time-out when he did. Perhaps SFT meant that he ordered the surveillance in January 2004, but it sounded as if he was, um, dissembling under oath. My bet is that Robbie McDuff was fully prepared to sink his talons into that inconsistency & I suspect that "dissemble" isn't exactly the word McDuff would have used. More likely, the word "perjury" is what he would have used. Anderson "protected" SFT from a cross-examination by a pro. What is amazing to me is that SFT would really want to do away with or weaken tenure. After all, tenure was his own "golden parachute" once upon a time... "

McDuff was licking his fangs . . . .  I got the distinct feeling in the immeidate aftermath of the hearing that Anderson pulled USM's administrative ass out of the fire . . .

__________________
Emma

Date:
RE: Question for Robert Campbell
Permalink Closed


Oh, I completely believe that Anderson saved SFT, temporarily, from a world of pain. Listening to SFT's big evidence was joke.

__________________
Invictus

Date:
Permalink Closed

quote:
Originally posted by: educator

"Invictus, thank you for this very important information. I plan to follow through with this and find your help to be quite valuable."


Just remember, you're on your own if something goes amiss.

Also, it will preclude trustworthy helpers installing software or cleaning up viruses without your immediate presence.

__________________
«First  <  1 2 3 | Page of 3  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard