home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Jul 5, 1995 Volume 7 : Issue 56
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- la Triviata: Which wine goes best with Unix?
-
- CONTENTS, #7.56 (Wed, Jul 5, 1995)
-
- File 1--NEWS FLASH: TIME finds "porn" on the Net
- File 2--Brock Meeks' Tracing of "CMU study"
- File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 5 May 1995 21:21:45 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 1--NEWS FLASH: TIME finds "porn" on the Net
-
- The July 3, 1995 cover story of Time Magazine (pp 38-43) is over top.
- "On a Screen Near You: CYBERPORN," screams the title. Graphics,
- including a a full-page fuzzy graphic of a man fornicating with his
- computer, makes it clear for even the reading-challenged: There's
- PORN on the NET!
-
- The story, written by Philip Elmer-Dewitt, a well-respected and
- generally highly credible Time technology writer, could otherwise be
- dismissed as just another typical bit of media hysteria if not for
- two minor elements: 1) The cover story is about an astonishingly
- flawed Carnegie Mellon study of large adult-oriented BBSes
- specializing in erotica, and 2) The story implies that erotica,
- including pictures that most of us would agree are grossly offensive,
- permeate the Net. Consider this snippet:
-
- THERE'S AN AWFUL LOT OF PORN ONLINE. In an 18-month study, the
- ((Carnegie Mellon research team--jt)) surveyed 917,410 sexually
- explicit pictures, descriptions, short stories and film clips.
- On those Usenet newsgroups whee digitized images are stored,
- 83.5% of the pictures were pornographic (p. 38).
-
- Now, there are several problems with this single paragraph that
- reflect both poor reporting and some of the study's problems:
-
- 1) The "study" didn't analyze 917,410 pictures, stories, and clips.
- It analyzed DESCRIPTIVE LISTINGS, even though the deceptive title and
- prose in the study itself would indicate otherwise. It is not until
- one reads the "methods" section of the study that the deception
- becomes evident.
-
- 2) The study did not examine 917,410 descriptive listings. After
- nearly three-quarters of the descriptions were eliminated for various
- reasons, only 292,114 remained.
-
- 3) The implication of the paragraph seems explicit: After examining
- nearly a million images, it was found that 83.5 percent of the
- pictures in binary Newsgroups are pornographic. The problem here is
- that those nearly one million images were from a select number of
- large ADULT BBSes, NOT Usenet, as implied by the wording.
-
- 4) Although the study itself uses that figure, it is not supported by
- the study's data, because the figure includes text messages as well
- as binary files.
-
- 5) The study examines only alt.binary or other groups, NOT
- comp.binary or other groups, and thus cannot make any general claim
- about "Usenet newsgroups."
-
- There are other problems with the study and with the Time article.
- These have been summarized in detail by a growing number of scholars
- and others (including some members of the Carnegie Mellon research
- team or "consultants" who are highly critical of the study).
-
- A set of critiques can be found at:
- http://www2000.ogsm.vanderbilt.edu
-
- CuD will provide further criticism of the story over the next few
- weeks. The study's author, Martin Rimm (a 30-year old undergraduate
- during the period when most of the study was written), has set up a
- homepage at: http://trfn.pgh.pa.us/guest/mrstudy.html, where he has
- indicated for the past few weeks that portions of the study, and more
- recently the study itself, would be posted. As of this date, it is
- not there.
-
- Why is the Time article and the "study" significant? Most of us
- recognize that Cyberage has introduced new problems related to adult
- material and access by children. Most of us would likely also agree
- that some mechanisms ought exist to prevent juveniles from accessing
- certain types of material. This is a complex issue. Sadly, Congress
- seems in a mood to impose restrictions that potentially subvert First
- Amendment protections on freedom of expression, and the national
- debate, such as it is, is fueled by media hysteria (such as the Time
- piece) and the demagoguery of some politicians. That Time would lend
- its credibility and the credibility of a respected writer to a study
- that is methodologically flawed, conceptually impoverished, and
- empirically inaccurate, is reckless. Already, the "findings" of the
- study have been distorted and introduced in Congress and used by some
- anti-pornography crusaders as proof that something must be done. An
- issue of such national social and legal importance ought not be
- shaped by a deceptive and flawed study.
-
- In coming issues, CuD will provide commentary on the study
- and related issues. The next post summarizes a chronology of
- the study.
-
- ------------------------------
-
- Date: Wed, 5 Jul 1995 23:58:59 -0500
- From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
- Subject: File 2--Brock Meeks' Tracing of "CMU study"
-
- CyberWire Dispatch // Copyright (c) 1995 //
-
- Jacking in from the "Point-Five Percent Solution" Port:
-
- Washington, DC -- Time magazine's credibility is hemorrhaging.
-
- The magazine's recent "Cyberporn" cover story has ignited a fire storm of
- criticism owing to its overblown coverage of a statistically
- inconsequential study, written by a university undergraduate.
-
- Time's story is being assailed as "reckless," "shoddy work" and an outright
- "fraud" by academics and civil liberties groups.
-
- Martin Rimm, who as an electrical engineering major at Carnegie Mellon
- University took 18 months to complete the study, says 90% of the criticism
- "is junk."
-
- The writer of the Time story, Philip Elmer-DeWitt, characterized the
- attacks as "a lot of rhetoric from a professional lobbyist and a professor
- who called it reckless and criminal before she had read" the study.
-
- Besides the pejoratives used to question how academically rigorous the Rimm
- study is, Time's critics also are chaffing at the veil of secrecy that has
- surrounded the study.
-
- Time, the Georgetown Law Review (where the study was formally published,
- despite the fact that it only deals with points of law inside footnotes)
- and ABC's Nightline, in a kind of media collusion, refused to let anyone
- outside those organizations do an independent review of the study before
- publication. Each cited secrecy and a prior arrangement with Rimm as the
- reason.
-
- At least a week before publication, Time magazine was alerted to several
- potential problems in the study's methodology. "I raised what I thought
- were several red flags," said Donna Hoffman, an associate professor of
- management at the Owen School at Vanderbilt, and one of the most respected
- researchers on Net access issues. "Those concerns were apparently
- ignored," she said.
-
- Further, at least two legal experts, Mike Godwin of the Electronic
- Frontier Foundation and Danny Weitzner of the Center for Democracy and
- Technology, were refused access to the study, despite being asked by Rimm
- to review the report's legal footnotes. Both declined to provide any legal
- analysis, issuing warnings that such analysis was impossible without seeing
- the footnotes in context.
-
- Time magazine, aware of all this, ran its story without noting any of the
- criticism.
-
-
- The .5 Percent Solution
- ===================
-
- One of the most egregious spin elements that Time used on the story was
- hyping Rimm's claim that 83.5% of all images on Use net are "pornographic."
-
- That 83.5% figure has already been sized on in by some members of Congress
- looking to bludgeon the First Amendment by placing unconstitutional
- constraints on Internet content. This figure is likely to become a
- rallying cry of the First Amendment impaired; it has been trumpeted in at
- least one Senate floor speech.
-
- Small problem: That figure -- and the study which ejaculated its results
- to a select media group under the cloak of secrecy -- is severely flawed,
- acording to several academics and civil liberties groups that have since
- obtained and analyzed a copy.
-
- By Rimm's own admission, the 83.5% figure is derived from a seven day time
- slice of the postings to only 17 of some 32 Usenet groups which typically
- carry image files. Usenet is comprised of thousands of newsgroups, the
- vast majority of which are text based.
-
- Further, Rimm's own figures show that his so-called "pornographic" images
- comprise merely ONE-HALF OF ONE PERCENT (.5) of all Internet traffic.
-
- Time reporter, Philip Elmer-DeWitt did report this fact. Sort of. But
- readers of the Tie story have to wade nearly 1,000 words into the story
- before stumbling across this passage: "As the Carnegie Mellon study is
- careful to point out, pornographic image files... represent only about 3
- percent of all the messages on the Usenet newsgroups, while the Usenet
- itself represents only 11.5 percent of the traffic on the Internet."
-
- DeWitt would later claim during an online discussion on the WELL that he
- didn't finish the math, citing the .5% figure, because readers tend to get
- lost when more than two figures are cranked into a paragraph. (See, Time
- takes care of you!)
-
- Cooking the Books
- ================
-
- To juice the coverage, Time also cited that the study had "surveyed 917,410
- sexually explicit pictures, descriptions, short stories and film clips."
- These files, however, were dredged up from adult BBS systems, not Internet
- newsgroups, a point that is not entirely clear when reading the article.
-
- The 917k figure is further msleading because even Rimm admits in his paper
- that he winnowed out so many files that his analysis is based on
- merely 294,114 files. And that STILL doesn't tell the whole story.
-
- To analyze such a huge number of files, by visually verifying that
- something called "Naked Bitch with Mardi Gras Beads" is actually a woman
- and not a hoaxed picture of a female dog (which actually happened), would
- have taken years. Instead, Rimm's analysis is based overwhelmingly on file
- *descriptions* only, not actual viewing, using an artificial intelligence
- program.
-
- Yet a reader of Time's cover story gets none of this analysis.
-
- Walking Back the Cat
- ===================
-
- How did a major magazine like Time get roped into reporting as "exhaustive"
- such an apparently flawed document? It was likely a combination of several
- factors, including errors in judgment, fatigue and the need to scoop the
- competition on a hot button issue of the day.
-
- The intelligence community often debriefs its operations through an
- exercise called "walking back the cat." During this exercise, the major
- players are gathered and the mission is examined in detail.
-
- While not all the information surrounding the events that led up to the
- Time cover story are known, let's walk back the cat on what we do know:
-
- Early 1994:
-
- Rimm assembles his "research team" to begin trolling some 68 adult BBSs.
- His team is instructed to try and obtain as much as possible data on the
- BBS customers through a kind of "social engineering."
-
- Dispatch interviewed 15 major adult BBS operators to ask about their
- participation with Rimm. None of them remember ever having spoken to Rimm
- or a member of his research team about the study.
-
- Dispatch asked Rimm: "Did your team go uncover, as it were, when getting
- permission from these [BBS operators] to use their information?" He
- replied only: "Discrete, ain't we?"
-
- When asked how he was able to obtain detailed customer profiles from
- usually skeptical operators of adult BBSs he says: "If you were a
- pornographer, and you don't have fancy computers or Ph.D. statisticians to
- assist you, wouldn't you be just a wee bit curious to see how you could
- adjust your inventories to better serve your clientele? Wouldn't you want
- to know that maybe you should decrease the number of oral sex images and
- increase the number of bondage images? Wouldn't you want someone to analyze
- your logfiles to better serve the tastes of each of your customers?
-
- October 1994:
-
- Eight months before the "exclusive first look" that Tie touts about its
- story on Rimm's findings, "people involved in the study were pitching it to
- the media," reports Michael C. Berch, editor of INFOBAHN magazine, in a
- posting to the alt.internet.media-coverage newsgroup.
-
- Berch said he took a flyer on the story because he had "other coverage of
- Internet erotica" in the works.
-
- Rimm says he has no knowledge of the exclusive offered to Infobahn or any
- other publication before shopping it to Time.
-
- During this time, Rimm also shops a draft of his study to the CMU
- administration, according to a Time magazine report last year. Shocked at
- the findings, the school scurries to implement a full scale censorship of
- alt.sex groups from the school's Usenet feed.
-
- November 1994:
-
- All hell breaks loose. Word gets out that Carnegie Mellon University has
- decided to make public its policy to censor all Alt.Sex newsgroups from
- flowing into its computers.
-
- The ensuing turmoil surrounding the CMU decision draws media attention and
- Time is there.
-
- Time reporter DeWitt hooks up with Rimm and using sparse stats drawn from
- the Rimm paper, he writes in the November 21, 1994 a story headlined
- "Censoring Cyberspace."
-
- In the story he refers to Rimm as only a "research associate." DeWitt's
- story says the CMU administration acted on a draft of Rimm's study "about
- to be released." In actually, the study doesn't see the light of day until
- some seven months later and only then under a secrecy agreement between
- Time and Georgetown Law Review.
-
- DeWitt writes in that November article that Rimm has "put together a
- picture collection that rivaled Bob Guccione's (917,410 in all)."
-
- In reality, Rimm had few, if any, actual images. The 917k figure then, as
- now, refers only to descriptions of images. And when the data was finally
- washed, only some 214k of those image *descriptions* were valid.
-
- Fast Forward to March 1995:
-
- Rimm finally finds a place to publish: The Georgetown Law Review. But he
- cuts a deal first: No one -- absolutely no one -- outside of the law
- review's immediate staff is allowed to read the full study.
-
- David G. Post, a visiting associate professor of law at the Georgetown
- University Law Center is approached "to help several of the student editors
- with questions that they had arising out of the study," he writes in a
- "Preliminary Discussion of Methodological Peculiarities in the Rimm Study
- of Pornography on the 'Information Superhighway,'" distributed after the
- Time article runs.
-
- But when Post, who says he has "research interests in this area," asks to
- be shown a copy of the study before advising the students, he too is
- rebuffed. "[T]hey were unable to do so because of a secrecy arrangement
- they had made with Mr. Rimm," he writes in his preliminary discussion.
-
- Post also writes: "One would have, perhaps, more confidence in the results
- of the Rimm study had it been subjected to more vigorous peer review."
-
- Law review journals, however, unlike rigorous scientific journals, are not
- routinely peer reviewed.
-
- But this study and it purported results were anything but "routine." The
- potential magnitude of the study, which was not lost on Rimm -- he'd
- already seen the white bread Administration at CMU rush to trample the
- First Amendment after reading an early draft -- should have been enough for
- the Georgetown Law Review, not to mention the editors at Time, to *demand*
- outside review and Rimm be damned.
-
- Hoffman readily acknowledges that law reviews aren't subject to peer
- reviews. (Note: Maybe this is why the majority of lawyers can't write
- their way past a moderately bright 14-year-old.) However, she says quite
- bluntly and correctly: "A study like this belongs in a peer reviewed
- journal if it's going to be used to impact public policies and stimulate
- public debate on an important societal issue."
-
- June 1995:
-
- Mike Godwin, online council for the Electronic Frontier Foundation and
- Daniel Weitzner, deputy director of the Center for Democracy and
- Technology, have, at separate times, been asked by Rimm to review the legal
- footnotes for accuracy.
-
- Godwin and Weitzner say the task is impossible without seeing the full
- report. They are denied that request.
-
- Weitzner fires off several critical concerns he has about the footnotes
- anyway, noting that any kind of real analysis is impossible.
-
- Rimm later "thanks" Weitzner for his "participation," even though Weitzner
- clearly had denied the review request.
-
- June 8-18, 1995:
-
- A copy of the study arrives at Time magazine where it sits idle. DeWit is
- up to his journalistic elbows trying to edit a major Time cover story on
- Estrogen. The story is complex and riding herd on it stresses DeWitt.
-
- The good news: word filters down to him that his promotion, which has
- "been in the works for some time," he says, will be official in a couple
- of weeks, about the time of his vacation and right after he puts another
- major cover story bed: the flash point "Cyberporn" story."
-
- Four Time correspondents are assigned to the story to help with the
- research.
-
- Time passes quickly. Rimm's story, like a forest fire, begins to create
- its own atmosphere, that rarefied air of "The "Exclusive." In the
- unrelenting, brutalizing competition of the newsweeklies, the scoop is
- the ace in the hole.
-
- The Time editors were convinced the Rimm study was their Ace. Somebody
- should have told them it was dealt from the bottom of the deck.
-
- So now DeWitt begins pushing for his story, citing its exclusive nature.
- But DeWitt is negotiating the story's placement based on character flaw:
- He was already sold on the story, having used it back in November during
- the CMU censorship dust up. The story held up then, it should hold up on
- the cover. Besides, if it were good enough for the Georgetown
- Law Review, it was good enough for Time.
-
- And DeWitt plays the law review card readily, admitting: "If [Georgetown]
- hadn't accepted [Rimm's study] for publication, we wouldn't have done our
- story."
-
- At this point, DeWitt has too much invested in the story. Somehow he
- ignores the lingering doubts and presses forward with the writing. Later,
- on the WELL he will admit to personally be "pulling for" the validity of
- Rimm's study.
-
- Meanwhile, one of his reporters, Hannah Bloch, is picking up some bad vibes
- from professor Hoffman.
-
- Hoffman and her husband/research partner, Tom Novak, have tagged-teamed
- some of the Net's trickiest usage based problems, developing some of the
- first quantitative models for accurate WEB "traffic accounting." And even
- from reading the abstract of Rimm's study, Hoffman smells sloppy research.
- "This is a nice example of bad research," she says.
-
- After the Bloch-Hoffman telephone tag review finally ends, Hoffman says she
- still feels like Bloch "didn't get it." Hoffman E-mails DeWitt directly
- with her concerns
-
- When Hoffman asks DeWitt to see a copy of the study, he balks, citing the
- secrecy arrangement with Rimm. Hoffman lays out her concerns about Rimm's
- methodology and E-mails them to DeWitt. Among those concerns, Hoffman
- notes that a study of such reported significance should have been subject
- to some kind of peer review.
-
- But DeWitt blows off Hoffman's concerns, not because of flawed logic or
- some perceived hidden agenda. Nope, DeWitt decides to dismiss Hoffman out
- of hand when he discovers -- quite suddenly -- that law review journals are
- rarely peer reviewed. This somehow significantly lowers the credibility
- factor of Hoffman's concerns in DeWitt's mind and for whatever reason, he
- ignores them.
-
- The concerns are never raised. Not in editorial meetings, not in the text
- of the story. Nowhere. A Time reader is lead to believe that the study
- was rigorous and without fault.
-
- In truth, the story had been criticized on several levels and by several
- different people. The connection? None, save for their concern about
- sloppy research.
-
- So DeWitt presses on. Don't let facts stand in the way... he has a story
- to write, a vacation to get ready for. This is his baby and he's under the
- gun to deliver.
-
- June 19-23
-
- With barely a chance to breathe after the work on Time's Estrogen cover
- story, as well as several other stories, DeWitt wades into the reports from
- his other correspondents.
-
- He fields editorial questions from higher up. There are still gapping,
- mawing holes in the story. By end of the day Monday, the 19th, he knows he
- has to start writing come Tuesday morning. This is crunch time. There is
- no more slack in the schedule. Artwork has been commissioned. The cover
- slot secured. His vacation is looking better all the time....
-
- Meanwhile, Time's public relations arm is cranking into high gear. They
- know they have a hot cover coming up. They want to get the most mileage
- out it they can. Where do they turn? Television.
-
- They consult with Rimm. He's pitched the idea of giving the story to
- 20/20's Barbara Walters. Rejected. Too light weight. Larry King Live is
- suggested. Good talk hype, high visibility, but not a serious enough
- venue. Rejected. Conan and the Late Show were never considered.
-
- Finally, the Time spin doctors decid on Ted Koppel and Nightline. "We
- thought Koppel would do a more balanced job," DeWitt said.
-
- Time calls ABC. "It's an exclusive and it's yours if you want it." Nobody
- mentions the fact that ABC was the third choice...
-
- Another secrecy deal is cut. Nightline can't give the study to anyone else
- either The article hits the stands on the 26th, but by that time DeWitt
- will be vacationing. The ABC producers decide to tape him Friday, the
- 23rd.
-
- Thursday hits and DeWitt mets the 6 p.m. deadline. Researchers comb the
- story. Top editors read it, too. "Needs some work," they say and DeWitt
- cranks up the computer to satisfy his bosses. The issue is put to bed.
-
- Friday, June 23rd -- It's Darkest Before the Dawn
-
- At 22 hundred hours, 43 minutes, Jim Thomas uploads to the WELL, under a
- new topic residing inside the "media" conference, an urgent message being
- sent through Cyberspace by Voters Telecom Watch.
-
- The VTW alert puts the Net on notice: Time is ready to publish on Monday a
- study of porn on the Net. The VTW alert acts like an early warning flare:
- "The catch is that no one even knows if the study's methods are valid,
- because no one is being allowed to read it due to an exclusive deal between
- Time and the institution that funded the study."
-
- Saturday, June 24th -- Bad Moon Rising
-
- Early in the morning Hoffman logs on to the WELL and jolts the media
- conference, calling the Rimm study "reckless research" and noting how
- difficult it is to discuss porn on the Net without throwing fuel on the
- fire.
-
- DeWitt follows some five hours later with his own assessment of Hoffman's
- opening salvo. He says that Hoffman is right about fueling the fire. But
- he drops a bomb of his own: He wonders aloud how Hoffman can call the
- study reckless when she's never even read it.
-
- However, he conveniently forgets to tell other WELL members that he denied
- several requests -- Hoffman's among them -- from people to see the study
- before they commented on the record. He also fails to mention that it was
- a secret agreement with Rimm that made any independent review of the study
- impossible.
-
- This early exchange, in a topic called merely "Newsweeklies," set the stage
- for what would become a romp into "way new" journalism of the first degree.
-
- Over the course of the next eight days, this topic on the WELL would
- ignite a grassroots investigative team held together with no particular
- agenda other than seeing all the facts about the Time story vetted.
-
- Steven Levy, a writer for Newsweek, weighs in. He's also written something
- about Porn and the Net for his publication that will run on Monday. The
- Rimm study gets a single, dubious paragraph.
-
- Levy would have missed the Rimm reference altogether, but Georgetown law
- professor David Post tips him to the fact that Time is running the story.
-
- Levy scrambles himself to get a copy of the study. He gets shutout. The
- law review won't give him a copy, citing the secrecy arrangement with Rimm.
-
-
- Levy tries to find out what Rimm or the Law Review are getting in return
- for all their secrecy. Each tells Levy to talk to the other. He gets no
- answer.
-
- In the WELL conference he voices his concern about such secrecy
- arrangements, wondering if it was trade off for assurances that the story
- would get a cover.
-
- What Levy doesn't know is that in the coming days, the mere mention of
- Rimm's study in his story causes the blood pressure to rise within the Time
- top editorial staff. Gone was their "exclusive," or so they thought,
- despite the fact that Levy had virtually no detailed knowledge of the Rimm
- paper. DeWitt will be made to answer for "the leak" when Time does a
- postmortem on the story.
-
- DeWitt barks back at Levy, defending the secret agreement with Rimm. He
- says he's "much more comfortable" with that arrangement than with some that
- Newsweek has made made with top business executives. He drops Levy a
- compliment, calling him "one of the best," and then backhands him: "It's
- not my fault he works for the magazine that secured exclusive right to
- Hitler's 'diaries.'"
-
- He later takes back the remark about the Hitler Diaries, admitting it was
- "a low blow," explaining he found it a bit ironic for Newsweek to be
- claiming the high moral ground.
-
- A critical mass begins to form; WELLites begin to limber up, taking free
- shots at Time and DeWitt... and all before anyone has seen the story.
-
- EFF's Godwin weighs in, the voice of reason: "Let's hold off criticizing
- Time until we see what the story looks like." And yet, in the cming days,
- it will be Godwin that rises up as judge, jury and executioner of DeWitt
- and Time.
-
- The fun has just begun and DeWitt is about to step into a virtual home only
- the Menendez brothers could love.
-
- June 25, 7:36 p.m. -- The Feeding Begins
-
- "The Time article is available on America Online right now," is the single
- line message posted to Newsweeklies on the WELL.
-
- A feeding frenzy is about to take place and over the course of the next
- several days the topic will resemble a great roiling, shark infested pool.
- Time and DeWitt are the chum.
-
- The events that shake out over the next few days, while localized on the
- WELL, are significant. First, the article's principal author has his
- virtual "home base" here. Second, the WELL becomes the focal point of the
- most intensive and extensive critiques of the Rimm study, a factor that
- proves invaluable, considering that Rimm was successful in bypassing this
- traditional academic gauntlet.
-
- The early reviews of the Time story are horrendous. Someone suggests that
- the phrase "Rimm Job" will be used to identify overhyped undergraduate
- studies that masquerade as major newsmagazine cover stories.
-
- Monday June 26, O-Dark-Thirty
-
- DeWitt logs and posts a comment at 2:38 a.m. That prompts John Seabrook
- of the New Yorker magazine to query nearly 3 hours later: "You're up
- early. Trouble sleeping?"
-
- At 2:39 p.m. Godwin's life for the next eight days is defined by this
- posting: "Philip's story is an utter disaster, and it will damage the
- debate about this issue because we will have to spend lots of time
- correcting misunderstandings that are directly attributable to the story."
-
- Godwin proceeds to take huge, vicious chunks from the underbelly of the Time
- article by attacking it's least defensible position: The infamous 83.5%
- figure.
-
- Godwin will continue to feast at table of Time for days to come, at times
- posting several devastating comments in a row. He is a machine. He admits
- to "obsessing" on the issue, but "I'm obsessing over what is the truth," he
- tells Dispatch about midnight.
-
- He is on the edge of a day too far gone to care about, at the brink of the
- next too dark to foretell.
-
- He has been unrelenting in his strategic dismantling of DeWitt and the Rimm
- paper. Even his voice sounds tired. But all this takes its toll: DeWitt
- had been a friend. "I feel like something has died," he will say later.
- And to a large extent, something has.
-
- The packaging of the story gets hammered as well. The shock artwork, which
- includes a damn near pornographic image in its own right -- what can only
- be described as a man fucking a computer terminal -- is outrageously
- sensationalistic. DeWitt even admits at one point that he agrees with
- views that the art is "over the top."
-
- 9:30 Monday Evening...
-
- By now DeWitt and Time are bloody if not bowed. A crack in Time's story
- begins to surface.
-
- DeWitt admits it himself, acknowledging that he "should have had a graph"
- in the story that referenced the advance criticism of the study that he
- knew about. "That was probably a screw up," writes on the WELL. He says
- he "couldn't risk" giving anyone, such as Hoffman, and advance copy of the
- study for fear it would "leak."
-
- Tuesday June 27th -- The Plot Moistens
-
- Virtually bleeding from a thousand cuts, DeWitt acknowledges that the
- pressure got to him while writing the story. In fact, he says that if he
- and his team had had more time and "more presence of mind" they would have
- called in an "outside expert" to review the study.
-
- But "presence of mind" was apparently lacking. DeWitt admits that he had
- to go from editing one cover story to writing the next with only the
- weekend to rejuvenate. "Such is the life at a newsmagazine these days," he
- writes.
-
- Jim Thomas surfs into a WEB site that i supposed to carry the Rimm study.
- What Thomas finds instead is a brief description of the study, a pointer to
- the law review article and a phone number were you can buy it -- not
- download it.
-
- And then he points out a curious note contained on the page: "Current
- plans for pages include the Introductory text from this article and the
- conspiracies which have reached the ears of the researchers." But there's
- no other explanation.
-
- Nightline runs its exclusive by arrangement segment. DeWitt has already
- been taped the previous Friday. Godwin goes head to head with Ralph Reed
- of the Christian Coalition.
-
- Godwin becomes an instant hero: He jumps into first into the discussion
- and is able to play the "family values" card before Reed. But Reed is
- tossing out facts and figures as if he has somehow been given an advance
- copy of the so-secret study.
-
- When Rimm is asked if Reed had some kind of advance peek at the study, Rimm
- says: "Ralphy never saw the fucking study."
-
- Wednesday, June 28th
-
- Hoffman appears back on the WELL after a two day absence. She is shocked:
- In the media topic alone there have been 250 new posts.
-
- Hoffman announces that she and her husband/partner, having finally obtained
- a copy of the study, are beginning a systematic critique of the Rimm
- report.
-
- Six days later the Hoffman/Novak report is complete, all 9,000 words of it.
- It turns out to be devastating.
-
- Professor David Post, from the Georgetown University Law Center, cruises
- onto the Net with his own detailed critique of the Rimm study. Post
- deconstructs Rimm's report in the same manner as the Hoffman/Novak paper.
-
- Thursday, June 29th
-
- Hoffman discovers that the cryptic WEB page message alluding to
- "conspiracies" is aimed at her. On the WEB site, it seems Hoffman is being
- singled out for being a bit too vocal.
-
- Hoffman fires off a nasty note to Rimm's faculty advisors at CMU. They
- answer quickly, apologizing for "conspiracy" language that "has no place in
- academic discourse," according to Marvin Sirbu, one of Rimm's advisors.
-
- Rimm answers Hoffman, too. He apologizes for the WEB page, saying that the
- person who put it up had done so "accidentally."
-
- The WEB page goes back to "normal."
-
- Friday, June 30-Monday, July 3rd
-
- There is not a minute's rest for DeWitt. He is continuously hounded
- whenever he goes online. All this is very tiring for DeWitt. Finally,
- after a long protracted battle on the WELL, DeWitt seems to be inching near
- defeat, at least on certain points.
-
- David Kline, a freelance writer and contributor to Wired magazine, logs in
- and writes that DeWitt didn't conduct what he calls "journalistic due
- diligence" by investigating the study thoroughlly and by not mentioning
- that other experts raised several doubts.
-
- Kline's message has rung the brass bell.
-
- The next time DeWitt logs in, he cites Kline's message saying: "I think
- he's put his finger on precisely where I screwed up."
-
- And yet, the story won't die. Going into Monday night (July 3), Rimm
- himself was preparing a detailed assault the Hoffman/Novak critique.
-
- I asked for an advance copy... Rimm said it was secret until he was ready
- to announce it.
-
- Why am I not surprised
-
- Meeks (whew... finally) out...
-
- ------------------------------
-
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.56
- ************************************
-
-