793 lines
36 KiB
Plaintext
793 lines
36 KiB
Plaintext
|
|
Computer underground Digest Wed Jul 5, 1995 Volume 7 : Issue 56
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
la Triviata: Which wine goes best with Unix?
|
|
|
|
CONTENTS, #7.56 (Wed, Jul 5, 1995)
|
|
|
|
File 1--NEWS FLASH: TIME finds "porn" on the Net
|
|
File 2--Brock Meeks' Tracing of "CMU study"
|
|
File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 5 May 1995 21:21:45 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 1--NEWS FLASH: TIME finds "porn" on the Net
|
|
|
|
The July 3, 1995 cover story of Time Magazine (pp 38-43) is over top.
|
|
"On a Screen Near You: CYBERPORN," screams the title. Graphics,
|
|
including a a full-page fuzzy graphic of a man fornicating with his
|
|
computer, makes it clear for even the reading-challenged: There's
|
|
PORN on the NET!
|
|
|
|
The story, written by Philip Elmer-Dewitt, a well-respected and
|
|
generally highly credible Time technology writer, could otherwise be
|
|
dismissed as just another typical bit of media hysteria if not for
|
|
two minor elements: 1) The cover story is about an astonishingly
|
|
flawed Carnegie Mellon study of large adult-oriented BBSes
|
|
specializing in erotica, and 2) The story implies that erotica,
|
|
including pictures that most of us would agree are grossly offensive,
|
|
permeate the Net. Consider this snippet:
|
|
|
|
THERE'S AN AWFUL LOT OF PORN ONLINE. In an 18-month study, the
|
|
((Carnegie Mellon research team--jt)) surveyed 917,410 sexually
|
|
explicit pictures, descriptions, short stories and film clips.
|
|
On those Usenet newsgroups whee digitized images are stored,
|
|
83.5% of the pictures were pornographic (p. 38).
|
|
|
|
Now, there are several problems with this single paragraph that
|
|
reflect both poor reporting and some of the study's problems:
|
|
|
|
1) The "study" didn't analyze 917,410 pictures, stories, and clips.
|
|
It analyzed DESCRIPTIVE LISTINGS, even though the deceptive title and
|
|
prose in the study itself would indicate otherwise. It is not until
|
|
one reads the "methods" section of the study that the deception
|
|
becomes evident.
|
|
|
|
2) The study did not examine 917,410 descriptive listings. After
|
|
nearly three-quarters of the descriptions were eliminated for various
|
|
reasons, only 292,114 remained.
|
|
|
|
3) The implication of the paragraph seems explicit: After examining
|
|
nearly a million images, it was found that 83.5 percent of the
|
|
pictures in binary Newsgroups are pornographic. The problem here is
|
|
that those nearly one million images were from a select number of
|
|
large ADULT BBSes, NOT Usenet, as implied by the wording.
|
|
|
|
4) Although the study itself uses that figure, it is not supported by
|
|
the study's data, because the figure includes text messages as well
|
|
as binary files.
|
|
|
|
5) The study examines only alt.binary or other groups, NOT
|
|
comp.binary or other groups, and thus cannot make any general claim
|
|
about "Usenet newsgroups."
|
|
|
|
There are other problems with the study and with the Time article.
|
|
These have been summarized in detail by a growing number of scholars
|
|
and others (including some members of the Carnegie Mellon research
|
|
team or "consultants" who are highly critical of the study).
|
|
|
|
A set of critiques can be found at:
|
|
http://www2000.ogsm.vanderbilt.edu
|
|
|
|
CuD will provide further criticism of the story over the next few
|
|
weeks. The study's author, Martin Rimm (a 30-year old undergraduate
|
|
during the period when most of the study was written), has set up a
|
|
homepage at: http://trfn.pgh.pa.us/guest/mrstudy.html, where he has
|
|
indicated for the past few weeks that portions of the study, and more
|
|
recently the study itself, would be posted. As of this date, it is
|
|
not there.
|
|
|
|
Why is the Time article and the "study" significant? Most of us
|
|
recognize that Cyberage has introduced new problems related to adult
|
|
material and access by children. Most of us would likely also agree
|
|
that some mechanisms ought exist to prevent juveniles from accessing
|
|
certain types of material. This is a complex issue. Sadly, Congress
|
|
seems in a mood to impose restrictions that potentially subvert First
|
|
Amendment protections on freedom of expression, and the national
|
|
debate, such as it is, is fueled by media hysteria (such as the Time
|
|
piece) and the demagoguery of some politicians. That Time would lend
|
|
its credibility and the credibility of a respected writer to a study
|
|
that is methodologically flawed, conceptually impoverished, and
|
|
empirically inaccurate, is reckless. Already, the "findings" of the
|
|
study have been distorted and introduced in Congress and used by some
|
|
anti-pornography crusaders as proof that something must be done. An
|
|
issue of such national social and legal importance ought not be
|
|
shaped by a deceptive and flawed study.
|
|
|
|
In coming issues, CuD will provide commentary on the study
|
|
and related issues. The next post summarizes a chronology of
|
|
the study.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 5 Jul 1995 23:58:59 -0500
|
|
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 2--Brock Meeks' Tracing of "CMU study"
|
|
|
|
CyberWire Dispatch // Copyright (c) 1995 //
|
|
|
|
Jacking in from the "Point-Five Percent Solution" Port:
|
|
|
|
Washington, DC -- Time magazine's credibility is hemorrhaging.
|
|
|
|
The magazine's recent "Cyberporn" cover story has ignited a fire storm of
|
|
criticism owing to its overblown coverage of a statistically
|
|
inconsequential study, written by a university undergraduate.
|
|
|
|
Time's story is being assailed as "reckless," "shoddy work" and an outright
|
|
"fraud" by academics and civil liberties groups.
|
|
|
|
Martin Rimm, who as an electrical engineering major at Carnegie Mellon
|
|
University took 18 months to complete the study, says 90% of the criticism
|
|
"is junk."
|
|
|
|
The writer of the Time story, Philip Elmer-DeWitt, characterized the
|
|
attacks as "a lot of rhetoric from a professional lobbyist and a professor
|
|
who called it reckless and criminal before she had read" the study.
|
|
|
|
Besides the pejoratives used to question how academically rigorous the Rimm
|
|
study is, Time's critics also are chaffing at the veil of secrecy that has
|
|
surrounded the study.
|
|
|
|
Time, the Georgetown Law Review (where the study was formally published,
|
|
despite the fact that it only deals with points of law inside footnotes)
|
|
and ABC's Nightline, in a kind of media collusion, refused to let anyone
|
|
outside those organizations do an independent review of the study before
|
|
publication. Each cited secrecy and a prior arrangement with Rimm as the
|
|
reason.
|
|
|
|
At least a week before publication, Time magazine was alerted to several
|
|
potential problems in the study's methodology. "I raised what I thought
|
|
were several red flags," said Donna Hoffman, an associate professor of
|
|
management at the Owen School at Vanderbilt, and one of the most respected
|
|
researchers on Net access issues. "Those concerns were apparently
|
|
ignored," she said.
|
|
|
|
Further, at least two legal experts, Mike Godwin of the Electronic
|
|
Frontier Foundation and Danny Weitzner of the Center for Democracy and
|
|
Technology, were refused access to the study, despite being asked by Rimm
|
|
to review the report's legal footnotes. Both declined to provide any legal
|
|
analysis, issuing warnings that such analysis was impossible without seeing
|
|
the footnotes in context.
|
|
|
|
Time magazine, aware of all this, ran its story without noting any of the
|
|
criticism.
|
|
|
|
|
|
The .5 Percent Solution
|
|
===================
|
|
|
|
One of the most egregious spin elements that Time used on the story was
|
|
hyping Rimm's claim that 83.5% of all images on Use net are "pornographic."
|
|
|
|
That 83.5% figure has already been sized on in by some members of Congress
|
|
looking to bludgeon the First Amendment by placing unconstitutional
|
|
constraints on Internet content. This figure is likely to become a
|
|
rallying cry of the First Amendment impaired; it has been trumpeted in at
|
|
least one Senate floor speech.
|
|
|
|
Small problem: That figure -- and the study which ejaculated its results
|
|
to a select media group under the cloak of secrecy -- is severely flawed,
|
|
acording to several academics and civil liberties groups that have since
|
|
obtained and analyzed a copy.
|
|
|
|
By Rimm's own admission, the 83.5% figure is derived from a seven day time
|
|
slice of the postings to only 17 of some 32 Usenet groups which typically
|
|
carry image files. Usenet is comprised of thousands of newsgroups, the
|
|
vast majority of which are text based.
|
|
|
|
Further, Rimm's own figures show that his so-called "pornographic" images
|
|
comprise merely ONE-HALF OF ONE PERCENT (.5) of all Internet traffic.
|
|
|
|
Time reporter, Philip Elmer-DeWitt did report this fact. Sort of. But
|
|
readers of the Tie story have to wade nearly 1,000 words into the story
|
|
before stumbling across this passage: "As the Carnegie Mellon study is
|
|
careful to point out, pornographic image files... represent only about 3
|
|
percent of all the messages on the Usenet newsgroups, while the Usenet
|
|
itself represents only 11.5 percent of the traffic on the Internet."
|
|
|
|
DeWitt would later claim during an online discussion on the WELL that he
|
|
didn't finish the math, citing the .5% figure, because readers tend to get
|
|
lost when more than two figures are cranked into a paragraph. (See, Time
|
|
takes care of you!)
|
|
|
|
Cooking the Books
|
|
================
|
|
|
|
To juice the coverage, Time also cited that the study had "surveyed 917,410
|
|
sexually explicit pictures, descriptions, short stories and film clips."
|
|
These files, however, were dredged up from adult BBS systems, not Internet
|
|
newsgroups, a point that is not entirely clear when reading the article.
|
|
|
|
The 917k figure is further msleading because even Rimm admits in his paper
|
|
that he winnowed out so many files that his analysis is based on
|
|
merely 294,114 files. And that STILL doesn't tell the whole story.
|
|
|
|
To analyze such a huge number of files, by visually verifying that
|
|
something called "Naked Bitch with Mardi Gras Beads" is actually a woman
|
|
and not a hoaxed picture of a female dog (which actually happened), would
|
|
have taken years. Instead, Rimm's analysis is based overwhelmingly on file
|
|
*descriptions* only, not actual viewing, using an artificial intelligence
|
|
program.
|
|
|
|
Yet a reader of Time's cover story gets none of this analysis.
|
|
|
|
Walking Back the Cat
|
|
===================
|
|
|
|
How did a major magazine like Time get roped into reporting as "exhaustive"
|
|
such an apparently flawed document? It was likely a combination of several
|
|
factors, including errors in judgment, fatigue and the need to scoop the
|
|
competition on a hot button issue of the day.
|
|
|
|
The intelligence community often debriefs its operations through an
|
|
exercise called "walking back the cat." During this exercise, the major
|
|
players are gathered and the mission is examined in detail.
|
|
|
|
While not all the information surrounding the events that led up to the
|
|
Time cover story are known, let's walk back the cat on what we do know:
|
|
|
|
Early 1994:
|
|
|
|
Rimm assembles his "research team" to begin trolling some 68 adult BBSs.
|
|
His team is instructed to try and obtain as much as possible data on the
|
|
BBS customers through a kind of "social engineering."
|
|
|
|
Dispatch interviewed 15 major adult BBS operators to ask about their
|
|
participation with Rimm. None of them remember ever having spoken to Rimm
|
|
or a member of his research team about the study.
|
|
|
|
Dispatch asked Rimm: "Did your team go uncover, as it were, when getting
|
|
permission from these [BBS operators] to use their information?" He
|
|
replied only: "Discrete, ain't we?"
|
|
|
|
When asked how he was able to obtain detailed customer profiles from
|
|
usually skeptical operators of adult BBSs he says: "If you were a
|
|
pornographer, and you don't have fancy computers or Ph.D. statisticians to
|
|
assist you, wouldn't you be just a wee bit curious to see how you could
|
|
adjust your inventories to better serve your clientele? Wouldn't you want
|
|
to know that maybe you should decrease the number of oral sex images and
|
|
increase the number of bondage images? Wouldn't you want someone to analyze
|
|
your logfiles to better serve the tastes of each of your customers?
|
|
|
|
October 1994:
|
|
|
|
Eight months before the "exclusive first look" that Tie touts about its
|
|
story on Rimm's findings, "people involved in the study were pitching it to
|
|
the media," reports Michael C. Berch, editor of INFOBAHN magazine, in a
|
|
posting to the alt.internet.media-coverage newsgroup.
|
|
|
|
Berch said he took a flyer on the story because he had "other coverage of
|
|
Internet erotica" in the works.
|
|
|
|
Rimm says he has no knowledge of the exclusive offered to Infobahn or any
|
|
other publication before shopping it to Time.
|
|
|
|
During this time, Rimm also shops a draft of his study to the CMU
|
|
administration, according to a Time magazine report last year. Shocked at
|
|
the findings, the school scurries to implement a full scale censorship of
|
|
alt.sex groups from the school's Usenet feed.
|
|
|
|
November 1994:
|
|
|
|
All hell breaks loose. Word gets out that Carnegie Mellon University has
|
|
decided to make public its policy to censor all Alt.Sex newsgroups from
|
|
flowing into its computers.
|
|
|
|
The ensuing turmoil surrounding the CMU decision draws media attention and
|
|
Time is there.
|
|
|
|
Time reporter DeWitt hooks up with Rimm and using sparse stats drawn from
|
|
the Rimm paper, he writes in the November 21, 1994 a story headlined
|
|
"Censoring Cyberspace."
|
|
|
|
In the story he refers to Rimm as only a "research associate." DeWitt's
|
|
story says the CMU administration acted on a draft of Rimm's study "about
|
|
to be released." In actually, the study doesn't see the light of day until
|
|
some seven months later and only then under a secrecy agreement between
|
|
Time and Georgetown Law Review.
|
|
|
|
DeWitt writes in that November article that Rimm has "put together a
|
|
picture collection that rivaled Bob Guccione's (917,410 in all)."
|
|
|
|
In reality, Rimm had few, if any, actual images. The 917k figure then, as
|
|
now, refers only to descriptions of images. And when the data was finally
|
|
washed, only some 214k of those image *descriptions* were valid.
|
|
|
|
Fast Forward to March 1995:
|
|
|
|
Rimm finally finds a place to publish: The Georgetown Law Review. But he
|
|
cuts a deal first: No one -- absolutely no one -- outside of the law
|
|
review's immediate staff is allowed to read the full study.
|
|
|
|
David G. Post, a visiting associate professor of law at the Georgetown
|
|
University Law Center is approached "to help several of the student editors
|
|
with questions that they had arising out of the study," he writes in a
|
|
"Preliminary Discussion of Methodological Peculiarities in the Rimm Study
|
|
of Pornography on the 'Information Superhighway,'" distributed after the
|
|
Time article runs.
|
|
|
|
But when Post, who says he has "research interests in this area," asks to
|
|
be shown a copy of the study before advising the students, he too is
|
|
rebuffed. "[T]hey were unable to do so because of a secrecy arrangement
|
|
they had made with Mr. Rimm," he writes in his preliminary discussion.
|
|
|
|
Post also writes: "One would have, perhaps, more confidence in the results
|
|
of the Rimm study had it been subjected to more vigorous peer review."
|
|
|
|
Law review journals, however, unlike rigorous scientific journals, are not
|
|
routinely peer reviewed.
|
|
|
|
But this study and it purported results were anything but "routine." The
|
|
potential magnitude of the study, which was not lost on Rimm -- he'd
|
|
already seen the white bread Administration at CMU rush to trample the
|
|
First Amendment after reading an early draft -- should have been enough for
|
|
the Georgetown Law Review, not to mention the editors at Time, to *demand*
|
|
outside review and Rimm be damned.
|
|
|
|
Hoffman readily acknowledges that law reviews aren't subject to peer
|
|
reviews. (Note: Maybe this is why the majority of lawyers can't write
|
|
their way past a moderately bright 14-year-old.) However, she says quite
|
|
bluntly and correctly: "A study like this belongs in a peer reviewed
|
|
journal if it's going to be used to impact public policies and stimulate
|
|
public debate on an important societal issue."
|
|
|
|
June 1995:
|
|
|
|
Mike Godwin, online council for the Electronic Frontier Foundation and
|
|
Daniel Weitzner, deputy director of the Center for Democracy and
|
|
Technology, have, at separate times, been asked by Rimm to review the legal
|
|
footnotes for accuracy.
|
|
|
|
Godwin and Weitzner say the task is impossible without seeing the full
|
|
report. They are denied that request.
|
|
|
|
Weitzner fires off several critical concerns he has about the footnotes
|
|
anyway, noting that any kind of real analysis is impossible.
|
|
|
|
Rimm later "thanks" Weitzner for his "participation," even though Weitzner
|
|
clearly had denied the review request.
|
|
|
|
June 8-18, 1995:
|
|
|
|
A copy of the study arrives at Time magazine where it sits idle. DeWit is
|
|
up to his journalistic elbows trying to edit a major Time cover story on
|
|
Estrogen. The story is complex and riding herd on it stresses DeWitt.
|
|
|
|
The good news: word filters down to him that his promotion, which has
|
|
"been in the works for some time," he says, will be official in a couple
|
|
of weeks, about the time of his vacation and right after he puts another
|
|
major cover story bed: the flash point "Cyberporn" story."
|
|
|
|
Four Time correspondents are assigned to the story to help with the
|
|
research.
|
|
|
|
Time passes quickly. Rimm's story, like a forest fire, begins to create
|
|
its own atmosphere, that rarefied air of "The "Exclusive." In the
|
|
unrelenting, brutalizing competition of the newsweeklies, the scoop is
|
|
the ace in the hole.
|
|
|
|
The Time editors were convinced the Rimm study was their Ace. Somebody
|
|
should have told them it was dealt from the bottom of the deck.
|
|
|
|
So now DeWitt begins pushing for his story, citing its exclusive nature.
|
|
But DeWitt is negotiating the story's placement based on character flaw:
|
|
He was already sold on the story, having used it back in November during
|
|
the CMU censorship dust up. The story held up then, it should hold up on
|
|
the cover. Besides, if it were good enough for the Georgetown
|
|
Law Review, it was good enough for Time.
|
|
|
|
And DeWitt plays the law review card readily, admitting: "If [Georgetown]
|
|
hadn't accepted [Rimm's study] for publication, we wouldn't have done our
|
|
story."
|
|
|
|
At this point, DeWitt has too much invested in the story. Somehow he
|
|
ignores the lingering doubts and presses forward with the writing. Later,
|
|
on the WELL he will admit to personally be "pulling for" the validity of
|
|
Rimm's study.
|
|
|
|
Meanwhile, one of his reporters, Hannah Bloch, is picking up some bad vibes
|
|
from professor Hoffman.
|
|
|
|
Hoffman and her husband/research partner, Tom Novak, have tagged-teamed
|
|
some of the Net's trickiest usage based problems, developing some of the
|
|
first quantitative models for accurate WEB "traffic accounting." And even
|
|
from reading the abstract of Rimm's study, Hoffman smells sloppy research.
|
|
"This is a nice example of bad research," she says.
|
|
|
|
After the Bloch-Hoffman telephone tag review finally ends, Hoffman says she
|
|
still feels like Bloch "didn't get it." Hoffman E-mails DeWitt directly
|
|
with her concerns
|
|
|
|
When Hoffman asks DeWitt to see a copy of the study, he balks, citing the
|
|
secrecy arrangement with Rimm. Hoffman lays out her concerns about Rimm's
|
|
methodology and E-mails them to DeWitt. Among those concerns, Hoffman
|
|
notes that a study of such reported significance should have been subject
|
|
to some kind of peer review.
|
|
|
|
But DeWitt blows off Hoffman's concerns, not because of flawed logic or
|
|
some perceived hidden agenda. Nope, DeWitt decides to dismiss Hoffman out
|
|
of hand when he discovers -- quite suddenly -- that law review journals are
|
|
rarely peer reviewed. This somehow significantly lowers the credibility
|
|
factor of Hoffman's concerns in DeWitt's mind and for whatever reason, he
|
|
ignores them.
|
|
|
|
The concerns are never raised. Not in editorial meetings, not in the text
|
|
of the story. Nowhere. A Time reader is lead to believe that the study
|
|
was rigorous and without fault.
|
|
|
|
In truth, the story had been criticized on several levels and by several
|
|
different people. The connection? None, save for their concern about
|
|
sloppy research.
|
|
|
|
So DeWitt presses on. Don't let facts stand in the way... he has a story
|
|
to write, a vacation to get ready for. This is his baby and he's under the
|
|
gun to deliver.
|
|
|
|
June 19-23
|
|
|
|
With barely a chance to breathe after the work on Time's Estrogen cover
|
|
story, as well as several other stories, DeWitt wades into the reports from
|
|
his other correspondents.
|
|
|
|
He fields editorial questions from higher up. There are still gapping,
|
|
mawing holes in the story. By end of the day Monday, the 19th, he knows he
|
|
has to start writing come Tuesday morning. This is crunch time. There is
|
|
no more slack in the schedule. Artwork has been commissioned. The cover
|
|
slot secured. His vacation is looking better all the time....
|
|
|
|
Meanwhile, Time's public relations arm is cranking into high gear. They
|
|
know they have a hot cover coming up. They want to get the most mileage
|
|
out it they can. Where do they turn? Television.
|
|
|
|
They consult with Rimm. He's pitched the idea of giving the story to
|
|
20/20's Barbara Walters. Rejected. Too light weight. Larry King Live is
|
|
suggested. Good talk hype, high visibility, but not a serious enough
|
|
venue. Rejected. Conan and the Late Show were never considered.
|
|
|
|
Finally, the Time spin doctors decid on Ted Koppel and Nightline. "We
|
|
thought Koppel would do a more balanced job," DeWitt said.
|
|
|
|
Time calls ABC. "It's an exclusive and it's yours if you want it." Nobody
|
|
mentions the fact that ABC was the third choice...
|
|
|
|
Another secrecy deal is cut. Nightline can't give the study to anyone else
|
|
either The article hits the stands on the 26th, but by that time DeWitt
|
|
will be vacationing. The ABC producers decide to tape him Friday, the
|
|
23rd.
|
|
|
|
Thursday hits and DeWitt mets the 6 p.m. deadline. Researchers comb the
|
|
story. Top editors read it, too. "Needs some work," they say and DeWitt
|
|
cranks up the computer to satisfy his bosses. The issue is put to bed.
|
|
|
|
Friday, June 23rd -- It's Darkest Before the Dawn
|
|
|
|
At 22 hundred hours, 43 minutes, Jim Thomas uploads to the WELL, under a
|
|
new topic residing inside the "media" conference, an urgent message being
|
|
sent through Cyberspace by Voters Telecom Watch.
|
|
|
|
The VTW alert puts the Net on notice: Time is ready to publish on Monday a
|
|
study of porn on the Net. The VTW alert acts like an early warning flare:
|
|
"The catch is that no one even knows if the study's methods are valid,
|
|
because no one is being allowed to read it due to an exclusive deal between
|
|
Time and the institution that funded the study."
|
|
|
|
Saturday, June 24th -- Bad Moon Rising
|
|
|
|
Early in the morning Hoffman logs on to the WELL and jolts the media
|
|
conference, calling the Rimm study "reckless research" and noting how
|
|
difficult it is to discuss porn on the Net without throwing fuel on the
|
|
fire.
|
|
|
|
DeWitt follows some five hours later with his own assessment of Hoffman's
|
|
opening salvo. He says that Hoffman is right about fueling the fire. But
|
|
he drops a bomb of his own: He wonders aloud how Hoffman can call the
|
|
study reckless when she's never even read it.
|
|
|
|
However, he conveniently forgets to tell other WELL members that he denied
|
|
several requests -- Hoffman's among them -- from people to see the study
|
|
before they commented on the record. He also fails to mention that it was
|
|
a secret agreement with Rimm that made any independent review of the study
|
|
impossible.
|
|
|
|
This early exchange, in a topic called merely "Newsweeklies," set the stage
|
|
for what would become a romp into "way new" journalism of the first degree.
|
|
|
|
Over the course of the next eight days, this topic on the WELL would
|
|
ignite a grassroots investigative team held together with no particular
|
|
agenda other than seeing all the facts about the Time story vetted.
|
|
|
|
Steven Levy, a writer for Newsweek, weighs in. He's also written something
|
|
about Porn and the Net for his publication that will run on Monday. The
|
|
Rimm study gets a single, dubious paragraph.
|
|
|
|
Levy would have missed the Rimm reference altogether, but Georgetown law
|
|
professor David Post tips him to the fact that Time is running the story.
|
|
|
|
Levy scrambles himself to get a copy of the study. He gets shutout. The
|
|
law review won't give him a copy, citing the secrecy arrangement with Rimm.
|
|
|
|
|
|
Levy tries to find out what Rimm or the Law Review are getting in return
|
|
for all their secrecy. Each tells Levy to talk to the other. He gets no
|
|
answer.
|
|
|
|
In the WELL conference he voices his concern about such secrecy
|
|
arrangements, wondering if it was trade off for assurances that the story
|
|
would get a cover.
|
|
|
|
What Levy doesn't know is that in the coming days, the mere mention of
|
|
Rimm's study in his story causes the blood pressure to rise within the Time
|
|
top editorial staff. Gone was their "exclusive," or so they thought,
|
|
despite the fact that Levy had virtually no detailed knowledge of the Rimm
|
|
paper. DeWitt will be made to answer for "the leak" when Time does a
|
|
postmortem on the story.
|
|
|
|
DeWitt barks back at Levy, defending the secret agreement with Rimm. He
|
|
says he's "much more comfortable" with that arrangement than with some that
|
|
Newsweek has made made with top business executives. He drops Levy a
|
|
compliment, calling him "one of the best," and then backhands him: "It's
|
|
not my fault he works for the magazine that secured exclusive right to
|
|
Hitler's 'diaries.'"
|
|
|
|
He later takes back the remark about the Hitler Diaries, admitting it was
|
|
"a low blow," explaining he found it a bit ironic for Newsweek to be
|
|
claiming the high moral ground.
|
|
|
|
A critical mass begins to form; WELLites begin to limber up, taking free
|
|
shots at Time and DeWitt... and all before anyone has seen the story.
|
|
|
|
EFF's Godwin weighs in, the voice of reason: "Let's hold off criticizing
|
|
Time until we see what the story looks like." And yet, in the cming days,
|
|
it will be Godwin that rises up as judge, jury and executioner of DeWitt
|
|
and Time.
|
|
|
|
The fun has just begun and DeWitt is about to step into a virtual home only
|
|
the Menendez brothers could love.
|
|
|
|
June 25, 7:36 p.m. -- The Feeding Begins
|
|
|
|
"The Time article is available on America Online right now," is the single
|
|
line message posted to Newsweeklies on the WELL.
|
|
|
|
A feeding frenzy is about to take place and over the course of the next
|
|
several days the topic will resemble a great roiling, shark infested pool.
|
|
Time and DeWitt are the chum.
|
|
|
|
The events that shake out over the next few days, while localized on the
|
|
WELL, are significant. First, the article's principal author has his
|
|
virtual "home base" here. Second, the WELL becomes the focal point of the
|
|
most intensive and extensive critiques of the Rimm study, a factor that
|
|
proves invaluable, considering that Rimm was successful in bypassing this
|
|
traditional academic gauntlet.
|
|
|
|
The early reviews of the Time story are horrendous. Someone suggests that
|
|
the phrase "Rimm Job" will be used to identify overhyped undergraduate
|
|
studies that masquerade as major newsmagazine cover stories.
|
|
|
|
Monday June 26, O-Dark-Thirty
|
|
|
|
DeWitt logs and posts a comment at 2:38 a.m. That prompts John Seabrook
|
|
of the New Yorker magazine to query nearly 3 hours later: "You're up
|
|
early. Trouble sleeping?"
|
|
|
|
At 2:39 p.m. Godwin's life for the next eight days is defined by this
|
|
posting: "Philip's story is an utter disaster, and it will damage the
|
|
debate about this issue because we will have to spend lots of time
|
|
correcting misunderstandings that are directly attributable to the story."
|
|
|
|
Godwin proceeds to take huge, vicious chunks from the underbelly of the Time
|
|
article by attacking it's least defensible position: The infamous 83.5%
|
|
figure.
|
|
|
|
Godwin will continue to feast at table of Time for days to come, at times
|
|
posting several devastating comments in a row. He is a machine. He admits
|
|
to "obsessing" on the issue, but "I'm obsessing over what is the truth," he
|
|
tells Dispatch about midnight.
|
|
|
|
He is on the edge of a day too far gone to care about, at the brink of the
|
|
next too dark to foretell.
|
|
|
|
He has been unrelenting in his strategic dismantling of DeWitt and the Rimm
|
|
paper. Even his voice sounds tired. But all this takes its toll: DeWitt
|
|
had been a friend. "I feel like something has died," he will say later.
|
|
And to a large extent, something has.
|
|
|
|
The packaging of the story gets hammered as well. The shock artwork, which
|
|
includes a damn near pornographic image in its own right -- what can only
|
|
be described as a man fucking a computer terminal -- is outrageously
|
|
sensationalistic. DeWitt even admits at one point that he agrees with
|
|
views that the art is "over the top."
|
|
|
|
9:30 Monday Evening...
|
|
|
|
By now DeWitt and Time are bloody if not bowed. A crack in Time's story
|
|
begins to surface.
|
|
|
|
DeWitt admits it himself, acknowledging that he "should have had a graph"
|
|
in the story that referenced the advance criticism of the study that he
|
|
knew about. "That was probably a screw up," writes on the WELL. He says
|
|
he "couldn't risk" giving anyone, such as Hoffman, and advance copy of the
|
|
study for fear it would "leak."
|
|
|
|
Tuesday June 27th -- The Plot Moistens
|
|
|
|
Virtually bleeding from a thousand cuts, DeWitt acknowledges that the
|
|
pressure got to him while writing the story. In fact, he says that if he
|
|
and his team had had more time and "more presence of mind" they would have
|
|
called in an "outside expert" to review the study.
|
|
|
|
But "presence of mind" was apparently lacking. DeWitt admits that he had
|
|
to go from editing one cover story to writing the next with only the
|
|
weekend to rejuvenate. "Such is the life at a newsmagazine these days," he
|
|
writes.
|
|
|
|
Jim Thomas surfs into a WEB site that i supposed to carry the Rimm study.
|
|
What Thomas finds instead is a brief description of the study, a pointer to
|
|
the law review article and a phone number were you can buy it -- not
|
|
download it.
|
|
|
|
And then he points out a curious note contained on the page: "Current
|
|
plans for pages include the Introductory text from this article and the
|
|
conspiracies which have reached the ears of the researchers." But there's
|
|
no other explanation.
|
|
|
|
Nightline runs its exclusive by arrangement segment. DeWitt has already
|
|
been taped the previous Friday. Godwin goes head to head with Ralph Reed
|
|
of the Christian Coalition.
|
|
|
|
Godwin becomes an instant hero: He jumps into first into the discussion
|
|
and is able to play the "family values" card before Reed. But Reed is
|
|
tossing out facts and figures as if he has somehow been given an advance
|
|
copy of the so-secret study.
|
|
|
|
When Rimm is asked if Reed had some kind of advance peek at the study, Rimm
|
|
says: "Ralphy never saw the fucking study."
|
|
|
|
Wednesday, June 28th
|
|
|
|
Hoffman appears back on the WELL after a two day absence. She is shocked:
|
|
In the media topic alone there have been 250 new posts.
|
|
|
|
Hoffman announces that she and her husband/partner, having finally obtained
|
|
a copy of the study, are beginning a systematic critique of the Rimm
|
|
report.
|
|
|
|
Six days later the Hoffman/Novak report is complete, all 9,000 words of it.
|
|
It turns out to be devastating.
|
|
|
|
Professor David Post, from the Georgetown University Law Center, cruises
|
|
onto the Net with his own detailed critique of the Rimm study. Post
|
|
deconstructs Rimm's report in the same manner as the Hoffman/Novak paper.
|
|
|
|
Thursday, June 29th
|
|
|
|
Hoffman discovers that the cryptic WEB page message alluding to
|
|
"conspiracies" is aimed at her. On the WEB site, it seems Hoffman is being
|
|
singled out for being a bit too vocal.
|
|
|
|
Hoffman fires off a nasty note to Rimm's faculty advisors at CMU. They
|
|
answer quickly, apologizing for "conspiracy" language that "has no place in
|
|
academic discourse," according to Marvin Sirbu, one of Rimm's advisors.
|
|
|
|
Rimm answers Hoffman, too. He apologizes for the WEB page, saying that the
|
|
person who put it up had done so "accidentally."
|
|
|
|
The WEB page goes back to "normal."
|
|
|
|
Friday, June 30-Monday, July 3rd
|
|
|
|
There is not a minute's rest for DeWitt. He is continuously hounded
|
|
whenever he goes online. All this is very tiring for DeWitt. Finally,
|
|
after a long protracted battle on the WELL, DeWitt seems to be inching near
|
|
defeat, at least on certain points.
|
|
|
|
David Kline, a freelance writer and contributor to Wired magazine, logs in
|
|
and writes that DeWitt didn't conduct what he calls "journalistic due
|
|
diligence" by investigating the study thoroughlly and by not mentioning
|
|
that other experts raised several doubts.
|
|
|
|
Kline's message has rung the brass bell.
|
|
|
|
The next time DeWitt logs in, he cites Kline's message saying: "I think
|
|
he's put his finger on precisely where I screwed up."
|
|
|
|
And yet, the story won't die. Going into Monday night (July 3), Rimm
|
|
himself was preparing a detailed assault the Hoffman/Novak critique.
|
|
|
|
I asked for an advance copy... Rimm said it was secret until he was ready
|
|
to announce it.
|
|
|
|
Why am I not surprised
|
|
|
|
Meeks (whew... finally) out...
|
|
|
|
------------------------------
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.56
|
|
************************************
|
|
|