One Thing Leads to Another
Bits and Pieces 2012-11-14
Summary:
Some time in the 1980s when I was teaching a big introductory computer programming course, one of my TFs brought to my attention two programs that seemed to be copies. They were submissions by two students in his section. I asked the two students if they could explain the similarities and they claimed they could not. They had not communicated or discussed their papers. In fact, they had never met each other and neither even recognized the other's name.
Students confronted with their sins often initially deny wrongdoing (and for that reason I no longer surprise students with such accusations -- I email them and ask them to come see me, so they can get past the denial stage while sleeping on it). But I thought for these two students to deny that they even knew each other was pretty bold. It gave me pause. As I am wont to do when puzzled, I brought it up in TF meeting, showed my assistants the two papers and asked them how they thought we should handle the situation.
A couple of other TFs recognized the submissions as matching ones they had received. It turned out there was a chain -- everyone had been careful not to cheat with someone in their own section, as they knew their TF would spot the similarities immediately. They had not calculated that as the chain grew it might reconnect. The two original students may well have been telling the truth about not copying from each other.
Today such assignments are cross-compared automatically and not only are cheaters revealed, but the full structure of any web of influence is disclosed in an instant.
I thought of this story while reading the New York Times news analysis this morning, Online Privacy is Also In Play in Petraeus Scandal. As the report states,
The F.B.I. investigation that toppled the director of the C.I.A. andhas now entangled the top American commander in Afghanistan underscores a danger that civil libertarians have long warned about: that in policing the Web for crime, espionage and sabotage, government investigators will unavoidably invade the private lives of Americans.Most of us are now used to (even if, apparently, not fully conscious of) some of the unusual properties of bits: that they stick around indefinitely, that they can be moved and stored at almost no cost, that they can be searched easily. And I am glad that the public is now suddenly aware of the low level of legal protection for your email, if you use a cloud service like Gmail. But this case makes a somewhat different point. Social connections tend to be numerous and many of them weak. Gumshoe investigations used to require a lot of effort to track down who knew whom who knew whom. Some human judgment was required to discriminate between potentially strong or suspicious connections; a chain of three or four weak connections would get you so far from the origin and into a circumference of such huge size that it just wasn't worth following all the leads. No more. The full social web of any of us is a scary thing. Even people without infidelity issues have second-cousins-by-marriage involved in sketchy activities. Do we all need to ask ourselves, for example, whether we should have been more careful about refusing small favors from distant relatives? Must every molehill be viewed as a potential mountain? So I am glad to see that people are asking how it was that half a dozen mildly annoying emails from one woman to another led to the resignation of the CIA director, and what that says about our expectations for government officials and others. Let's get real: we can't keep losing good people this way, foolish men though they be. But I also think Harvard is going to have to ask itself how much it really wants to know before it launches another "cheating" investigation like the one involving Gov 1310. According to the Crimson, this started when the professor reported 10-20 students to the College, which subsequently decided to compare all the hundreds of take-home exam papers to each other. It seems this was done by hand over the summer, not electronically, but the fact that the papers were easily retrievable was likely a digital phenomenon. I am told by relatives of students in the course that un