💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CUD › cud0756.txt captured on 2022-06-12 at 10:59:03.

View Raw

More Information

-=-=-=-=-=-=-


Computer underground Digest    Wed  Jul 5, 1995   Volume 7 : Issue 56
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       la Triviata:     Which wine goes best with Unix?

CONTENTS, #7.56 (Wed, Jul 5, 1995)

File 1--NEWS FLASH: TIME finds "porn" on the Net
File 2--Brock Meeks' Tracing of "CMU study"
File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Wed, 5 May 1995 21:21:45 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 1--NEWS FLASH: TIME finds "porn" on the Net

The July 3, 1995 cover story of Time Magazine (pp 38-43) is over top.
"On a Screen Near You: CYBERPORN," screams the title. Graphics,
including a a full-page fuzzy graphic of a man fornicating with his
computer, makes it clear for even the reading-challenged: There's
PORN on the NET!

The story, written by Philip Elmer-Dewitt, a well-respected and
generally highly credible Time technology writer, could otherwise be
dismissed as just another typical bit of media hysteria if not for
two minor elements:  1) The cover story is about an astonishingly
flawed Carnegie Mellon study of large adult-oriented BBSes
specializing in erotica, and 2) The story implies that erotica,
including pictures that most of us would agree are grossly offensive,
permeate the Net.  Consider this snippet:

     THERE'S AN AWFUL LOT OF PORN ONLINE. In an 18-month study, the
     ((Carnegie Mellon research team--jt)) surveyed 917,410 sexually
     explicit pictures, descriptions, short stories and film clips.
     On those Usenet newsgroups whee digitized images are stored,
     83.5% of the pictures were pornographic (p. 38).

Now, there are several problems with this single paragraph that
reflect both poor reporting and some of the study's problems:

1) The "study" didn't analyze 917,410 pictures, stories, and clips.
It analyzed DESCRIPTIVE LISTINGS, even though the deceptive title and
prose in the study itself would indicate otherwise.  It is not until
one reads the "methods" section of the study that the deception
becomes evident.

2) The study did not examine 917,410 descriptive listings.  After
nearly three-quarters of the descriptions were eliminated for various
reasons, only 292,114 remained.

3) The implication of the paragraph seems explicit: After examining
nearly a million images, it was found that 83.5 percent of the
pictures in binary Newsgroups are pornographic.  The problem here is
that those nearly one million images were from a select number of
large ADULT BBSes, NOT Usenet, as implied by the wording.

4) Although the study itself uses that figure, it is not supported by
the study's data, because the figure includes text messages as well
as binary files.

5) The study examines only alt.binary or other groups, NOT
comp.binary or other groups, and thus cannot make any general claim
about "Usenet newsgroups."

There are other problems with the study and with the Time article.
These have been summarized in detail by a growing number of scholars
and others (including some members of the Carnegie Mellon research
team or "consultants" who are highly critical of the study).

A set of critiques can be found at:
http://www2000.ogsm.vanderbilt.edu

CuD will provide further criticism of the story over the next few
weeks. The study's author, Martin Rimm (a 30-year old undergraduate
during the period when most of the study was written), has set up a
homepage at:  http://trfn.pgh.pa.us/guest/mrstudy.html, where he has
indicated for the past few weeks that portions of the study, and more
recently the study itself, would be posted. As of this date, it is
not there.

Why is the Time article and the "study" significant?  Most of us
recognize that Cyberage has introduced new problems related to adult
material and access by children. Most of us would likely also agree
that some mechanisms ought exist to prevent juveniles from accessing
certain types of material.  This is a complex issue. Sadly, Congress
seems in a mood to impose restrictions that potentially subvert First
Amendment protections on freedom of expression, and the national
debate, such as it is, is fueled by media hysteria (such as the Time
piece) and the demagoguery of some politicians. That Time would lend
its credibility and the credibility of a respected writer to a study
that is methodologically flawed, conceptually impoverished, and
empirically inaccurate, is reckless. Already, the "findings" of the
study have been distorted and introduced in Congress and used by some
anti-pornography crusaders as proof that something must be done.  An
issue of such national social and legal importance ought not be
shaped by a deceptive and flawed study.

In coming issues, CuD will provide commentary on the study
and related issues. The next post summarizes a chronology of
the study.

------------------------------

Date: Wed, 5 Jul 1995 23:58:59 -0500
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
Subject: File 2--Brock Meeks' Tracing of "CMU study"

 CyberWire Dispatch // Copyright (c) 1995 //

 Jacking in from the "Point-Five Percent Solution" Port:

 Washington, DC -- Time magazine's credibility is hemorrhaging.

 The magazine's recent "Cyberporn" cover story has ignited a fire storm of
 criticism owing to its overblown coverage of a statistically
 inconsequential study,  written by a university undergraduate.

 Time's story is being assailed as "reckless," "shoddy work" and an outright
 "fraud" by academics and civil liberties groups.

 Martin Rimm, who as an electrical engineering major at Carnegie Mellon
 University took 18 months to complete the study,  says 90% of the criticism
 "is junk."

 The writer of the Time story,  Philip Elmer-DeWitt, characterized the
 attacks as "a lot of rhetoric from a professional lobbyist and a professor
 who called it reckless and criminal before she had read" the study.

 Besides the pejoratives used to question how academically rigorous the Rimm
 study is, Time's critics also are chaffing at the veil of secrecy that has
 surrounded the study.

 Time, the Georgetown Law Review (where the study was formally published,
 despite the fact that it only deals with points of law inside footnotes)
 and ABC's Nightline, in a kind of media collusion, refused to let anyone
 outside those organizations do an independent review of the study before
 publication.  Each cited secrecy and a prior arrangement with Rimm as the
 reason.

 At least a week before publication, Time magazine was alerted to several
 potential problems in the study's methodology.  "I raised what I thought
 were several red flags," said Donna Hoffman, an associate professor of
 management at the Owen School at Vanderbilt, and one of the most respected
 researchers on Net access issues.  "Those concerns were apparently
 ignored," she said.

 Further, at least two legal experts, Mike Godwin of the Electronic
 Frontier Foundation and Danny Weitzner of the Center for Democracy and
 Technology, were refused access to the study, despite being asked by Rimm
 to review the report's legal footnotes.  Both declined to provide any legal
 analysis, issuing warnings that such analysis was impossible without seeing
 the footnotes in context.

 Time magazine, aware of all this, ran its story without noting any of the
 criticism.


 The .5 Percent Solution
 ===================

 One of the most egregious spin elements that Time used on the story was
 hyping Rimm's claim that 83.5% of all images on Use net are "pornographic."

 That 83.5% figure has already been sized on in by some members of Congress
 looking to bludgeon the First Amendment by placing unconstitutional
 constraints on Internet content.  This figure is likely to become a
 rallying cry of the First Amendment impaired;  it has been trumpeted in at
 least one Senate floor speech.

 Small problem:  That figure -- and the study which ejaculated its results
 to a select media group under the cloak of secrecy --  is severely flawed,
 acording to several academics and civil liberties groups that have since
 obtained and analyzed a copy.

 By Rimm's own admission, the 83.5% figure is derived from a seven day time
 slice of the postings to only 17 of some 32 Usenet groups which typically
 carry image files.  Usenet is comprised of thousands of newsgroups, the
 vast majority of which are text based.

 Further, Rimm's own figures show that his so-called "pornographic" images
 comprise merely ONE-HALF OF ONE PERCENT (.5) of all Internet traffic.

 Time reporter, Philip Elmer-DeWitt did report this fact.  Sort of.  But
 readers of the Tie story have to wade nearly 1,000 words into the story
 before stumbling across this passage: "As the Carnegie Mellon study is
 careful to point out, pornographic image files... represent only about 3
 percent of all the messages on the Usenet newsgroups, while the Usenet
 itself represents only 11.5 percent of the traffic on the Internet."

 DeWitt would later claim during an online discussion on the WELL that he
 didn't finish the math, citing the .5% figure, because readers tend to get
 lost when more than two figures are cranked into a paragraph.  (See, Time
 takes care of you!)

 Cooking the Books
 ================

 To juice the coverage, Time also cited that the study had "surveyed 917,410
 sexually explicit pictures, descriptions, short stories and film clips."
 These files, however, were dredged up from adult BBS systems, not Internet
 newsgroups, a point that is not entirely clear when reading the article.

 The 917k figure is further msleading because even Rimm admits in his paper
 that he winnowed out so many files that his analysis is based on
 merely 294,114 files.  And that STILL doesn't tell the whole story.

 To analyze such a huge number of files, by visually verifying that
 something called "Naked Bitch with Mardi Gras Beads" is actually a woman
 and not a hoaxed picture of a female dog (which actually happened), would
 have taken years.  Instead, Rimm's analysis is based overwhelmingly on file
 *descriptions* only, not actual viewing, using an artificial intelligence
 program.

 Yet a reader of Time's cover story gets none of this analysis.

 Walking Back the Cat
 ===================

 How did a major magazine like Time get roped into reporting as "exhaustive"
 such an apparently flawed document?  It was likely a combination of several
 factors, including errors in judgment, fatigue and the need to scoop the
 competition on a hot button issue of the day.

 The intelligence community often debriefs its operations through an
 exercise called "walking back the cat."  During this exercise, the major
 players are gathered and the mission is examined in detail.

 While not all the information surrounding the events that led up to the
 Time cover story are known, let's walk back the cat on what we do know:

 Early 1994:

 Rimm assembles his "research team" to begin trolling some 68 adult BBSs.
 His team is instructed to try and obtain as much as possible data on the
 BBS customers through a kind of "social engineering."

 Dispatch interviewed 15 major adult BBS operators to ask about their
 participation with Rimm.  None of them remember ever having spoken to Rimm
 or a member of his research team about the study.

 Dispatch asked Rimm:  "Did your team go uncover, as it were, when getting
 permission from these [BBS operators] to use their information?"  He
 replied only:  "Discrete, ain't we?"

 When asked how he was able to obtain detailed customer profiles from
 usually skeptical operators of adult BBSs he says:  "If you were a
 pornographer, and you don't have fancy computers or Ph.D. statisticians to
 assist you, wouldn't you be just a wee bit curious to see how you could
 adjust your inventories to better serve your clientele? Wouldn't you want
 to know that maybe you should decrease the number of oral sex images and
 increase the number of bondage images? Wouldn't you want someone to analyze
 your logfiles to better serve the tastes of each of your customers?

 October 1994:

 Eight months before the "exclusive first look" that Tie touts about its
 story on Rimm's findings, "people involved in the study were pitching it to
 the media," reports  Michael C. Berch, editor of INFOBAHN magazine, in a
 posting to the alt.internet.media-coverage newsgroup.

 Berch said he took a flyer on the story because he had "other coverage of
 Internet erotica" in the works.

 Rimm says he has no knowledge of the exclusive offered to Infobahn or any
 other publication before shopping it to Time.

 During this time,  Rimm also shops a draft of his study to the CMU
 administration, according to a Time magazine report last year.  Shocked at
 the findings, the school scurries to implement a full scale censorship of
 alt.sex groups from the school's Usenet feed.

 November 1994:

 All hell breaks loose. Word gets out that Carnegie Mellon University has
 decided to make public its policy to censor all Alt.Sex newsgroups from
 flowing into its computers.

 The ensuing turmoil surrounding the CMU decision draws media attention and
 Time is there.

 Time reporter DeWitt hooks up with Rimm and using sparse stats drawn from
 the Rimm paper, he writes in the November 21, 1994 a story headlined
 "Censoring Cyberspace."

 In the story he refers to Rimm as only a "research associate."  DeWitt's
 story says the CMU administration acted on a draft of Rimm's study "about
 to be released."  In actually, the study doesn't see the light of day until
 some seven months later and only then under a secrecy agreement between
 Time and Georgetown Law Review.

 DeWitt writes in that November article that Rimm has "put together a
 picture collection  that rivaled Bob Guccione's (917,410 in all)."

 In reality, Rimm had few, if any, actual images.  The 917k figure then, as
 now, refers only to descriptions of images.  And when the data was finally
 washed, only some 214k of those image *descriptions* were valid.

 Fast Forward to March 1995:

 Rimm finally finds a place to publish:  The Georgetown Law Review.  But he
 cuts a deal first:  No one -- absolutely no one -- outside of the law
 review's immediate staff is allowed to read the full study.

 David G. Post, a visiting associate professor of law at the Georgetown
 University Law Center is approached "to help several of the student editors
 with questions that they had arising out of the study," he writes in a
 "Preliminary Discussion of Methodological Peculiarities in the Rimm Study
 of Pornography on the 'Information Superhighway,'" distributed after the
 Time article runs.

 But when Post, who says he has "research interests in this area," asks to
 be shown a copy of the study before advising the students, he too is
 rebuffed.  "[T]hey were unable to do so because of a secrecy arrangement
 they had made with Mr. Rimm," he writes in his preliminary discussion.

 Post also writes: "One would have, perhaps, more confidence in the results
 of the Rimm study had it been subjected to more vigorous peer review."

 Law review journals, however, unlike rigorous scientific journals, are not
 routinely peer reviewed.

 But this study and it purported results were anything but "routine."  The
 potential magnitude of the study, which was not lost on Rimm -- he'd
 already seen the white bread Administration at CMU rush to trample the
 First Amendment after reading an early draft -- should have been enough for
 the Georgetown Law Review, not to mention the editors at Time, to *demand*
 outside review and Rimm be damned.

 Hoffman readily acknowledges that law reviews aren't subject to peer
 reviews.   (Note:  Maybe this is why the majority of lawyers can't write
 their way past a moderately bright 14-year-old.)  However, she says quite
 bluntly and correctly:  "A study like this belongs in a peer reviewed
 journal if it's going to be used to impact public policies and stimulate
 public debate on an important societal issue."

 June 1995:

 Mike Godwin, online council for the Electronic Frontier Foundation and
 Daniel Weitzner, deputy director of the Center for Democracy and
 Technology, have, at separate times, been asked by Rimm to review the legal
 footnotes for accuracy.

 Godwin and Weitzner say the task is impossible without seeing the full
 report.  They are denied that request.

 Weitzner fires off several critical concerns he has about the footnotes
 anyway, noting that any kind of real analysis is impossible.

 Rimm later "thanks" Weitzner for his "participation," even though Weitzner
 clearly had denied the review request.

 June 8-18, 1995:

 A copy of the study arrives at Time magazine where it sits idle.  DeWit is
 up to his journalistic elbows trying to edit a major Time cover story on
 Estrogen.  The story is complex and riding herd on it stresses DeWitt.

 The good news:  word filters down to him that his promotion, which has
 "been in the works for some time," he says,  will be official in a couple
 of weeks, about the time of his vacation and right after he puts another
 major cover story bed:  the flash point "Cyberporn" story."

 Four Time correspondents are assigned to the story to help with the
 research.

 Time passes quickly.  Rimm's story, like a forest fire, begins to create
 its own atmosphere, that  rarefied air of "The "Exclusive." In the
 unrelenting, brutalizing competition of the newsweeklies, the scoop is
 the ace in the hole.

 The Time editors were convinced the Rimm study was their Ace. Somebody
 should have told them it was dealt from the bottom of the deck.

 So now DeWitt begins pushing for his story, citing its exclusive nature.
 But DeWitt is negotiating the story's placement based on character flaw:
 He was already sold on the story, having used it back in November during
 the CMU censorship dust up.  The story held up then, it should hold up on
 the cover.  Besides, if it were good enough for the Georgetown
 Law Review, it was good enough for Time.

 And DeWitt plays the law review card readily, admitting:  "If [Georgetown]
 hadn't accepted [Rimm's study] for publication, we wouldn't have done our
 story."

 At this point, DeWitt has too much invested in the story.  Somehow he
 ignores the lingering doubts and presses forward with the writing.  Later,
 on the WELL he will admit to personally be "pulling for" the validity of
 Rimm's study.

 Meanwhile, one of his reporters, Hannah Bloch, is picking up some bad vibes
 from professor Hoffman.

 Hoffman and her husband/research partner, Tom Novak, have tagged-teamed
 some of the Net's trickiest usage based problems, developing some of the
 first quantitative models for accurate WEB "traffic accounting." And even
 from reading the abstract of Rimm's study, Hoffman smells sloppy research.
 "This is a nice example of bad research," she says.

 After the Bloch-Hoffman telephone tag review finally ends, Hoffman says she
 still feels like Bloch "didn't get it."  Hoffman E-mails DeWitt directly
 with her concerns

 When Hoffman asks DeWitt to see a copy of the study, he balks, citing the
 secrecy arrangement with Rimm.  Hoffman lays out her concerns about Rimm's
 methodology and E-mails them to DeWitt.  Among those concerns, Hoffman
 notes that a study of such reported significance should have been subject
 to some kind of peer review.

 But DeWitt blows off Hoffman's concerns, not because of flawed logic or
 some perceived hidden agenda.  Nope, DeWitt decides to dismiss Hoffman out
 of hand when he discovers -- quite suddenly -- that law review journals are
 rarely peer reviewed.   This somehow significantly lowers the credibility
 factor of Hoffman's concerns in DeWitt's mind and for whatever reason, he
 ignores them.

 The concerns are never raised.  Not in editorial meetings, not in the text
 of the story.  Nowhere.  A Time reader is lead to believe that the study
 was rigorous and without fault.

 In truth, the story had been criticized on several levels and by several
 different people.  The connection?  None, save for their concern about
 sloppy research.

 So DeWitt presses on.  Don't let facts stand in the way... he has a story
 to write, a vacation to get ready for.  This is his baby and he's under the
 gun to deliver.

 June 19-23

 With barely a chance to breathe after the work on Time's Estrogen cover
 story, as well as several other stories, DeWitt wades into the reports from
 his other correspondents.

 He fields editorial questions from higher up.  There are still gapping,
 mawing holes in the story.  By end of the day Monday, the 19th, he knows he
 has to start writing come Tuesday morning.   This is crunch time.  There is
 no more slack in the schedule.   Artwork has been commissioned.  The cover
 slot secured.  His vacation is looking better all the time....

 Meanwhile, Time's public relations arm is cranking into high gear.  They
 know they have a hot cover coming up.  They want to get the most mileage
 out it they can.  Where do they turn?  Television.

 They consult with Rimm.  He's pitched the idea of giving the story to
 20/20's Barbara Walters.  Rejected.  Too light weight.  Larry King Live is
 suggested.  Good talk hype, high visibility, but not a serious enough
 venue.  Rejected.  Conan and the Late Show were never considered.

 Finally, the Time spin doctors decid on Ted Koppel and Nightline.  "We
 thought Koppel would do a more balanced job," DeWitt said.

 Time calls ABC.  "It's an exclusive and it's yours if you want it."  Nobody
 mentions the fact that ABC was the third choice...

 Another secrecy deal is cut.  Nightline can't give the study to anyone else
 either  The article hits the stands on the 26th, but by that time DeWitt
 will  be vacationing.  The ABC producers decide to tape him Friday, the
 23rd.

 Thursday hits and DeWitt mets the 6 p.m. deadline.  Researchers comb the
 story.  Top editors read it, too.  "Needs some work," they say and DeWitt
 cranks up the computer to satisfy his bosses.  The issue is put to bed.

 Friday, June 23rd -- It's Darkest Before the Dawn

 At 22 hundred hours, 43 minutes, Jim Thomas uploads to the WELL, under a
 new topic residing inside the "media" conference, an urgent message being
 sent through Cyberspace by Voters Telecom Watch.

 The VTW alert puts the Net on notice: Time is ready to publish on Monday a
 study of porn on the Net.  The VTW alert acts like an early warning flare:
 "The catch is that no one even knows if the study's methods are valid,
 because no one is being allowed to read it due to an exclusive deal between
 Time and the institution that funded the study."

 Saturday, June 24th -- Bad Moon Rising

 Early in the morning Hoffman logs on to the WELL and jolts the media
 conference, calling the Rimm study "reckless research" and noting how
 difficult it is to discuss porn on the Net without throwing fuel on the
 fire.

 DeWitt follows some five hours later with his own assessment of Hoffman's
 opening salvo.  He says that Hoffman is right about fueling the fire.  But
 he drops a bomb of his own:  He wonders aloud how Hoffman can call the
 study reckless when she's never even read it.

 However, he conveniently forgets to tell other WELL members that he denied
 several requests -- Hoffman's among them -- from people to see the study
 before they commented on the record.  He also fails to mention  that it was
 a secret agreement with Rimm that made any independent review of the study
 impossible.

 This early exchange, in a topic called merely "Newsweeklies," set the stage
 for what would become a romp into "way new" journalism of the first degree.

 Over the course of the next eight days, this topic on the WELL would
 ignite a grassroots investigative team held together with no particular
 agenda other than seeing all the facts about the Time story vetted.

 Steven Levy, a writer for Newsweek, weighs in.  He's also written something
 about Porn and the Net for his publication that will run on Monday.   The
 Rimm study gets a single, dubious paragraph.

 Levy would have missed the Rimm reference altogether, but Georgetown law
 professor David Post tips him to the fact that Time is running the story.

 Levy scrambles himself to get a copy of the study.  He gets shutout.  The
 law review won't give him a copy, citing the secrecy arrangement with Rimm.


 Levy tries to find out what Rimm or the Law Review are getting in return
 for all their secrecy.  Each tells Levy to talk to the other.  He gets no
 answer.

 In the WELL conference he voices his concern about such secrecy
 arrangements, wondering if it was trade off for assurances that the story
 would get a cover.

 What Levy doesn't know is that in the coming days, the mere mention of
 Rimm's study in his story causes the blood pressure to rise within the Time
 top editorial staff.   Gone was their "exclusive," or so they thought,
 despite the fact that Levy had virtually no detailed knowledge of the Rimm
 paper.  DeWitt will be made to answer for "the leak" when Time does a
 postmortem on the story.

 DeWitt barks back at Levy, defending the secret agreement with Rimm.  He
 says he's "much more comfortable" with that arrangement than with some that
 Newsweek has made made with top business executives.  He drops Levy a
 compliment, calling him "one of the best," and then backhands him:  "It's
 not my fault he works for the magazine that secured exclusive right to
 Hitler's 'diaries.'"

 He later takes back the remark about the Hitler Diaries, admitting it was
 "a low blow," explaining he found it a bit ironic for Newsweek to be
 claiming the high moral ground.

 A critical mass begins to form;  WELLites begin to limber up, taking free
 shots at Time and DeWitt... and all before anyone has seen the story.

 EFF's Godwin weighs in, the voice of reason: "Let's hold off criticizing
 Time until we see what the story looks like."  And yet, in the cming days,
 it will be Godwin that rises up as judge, jury and executioner of DeWitt
 and Time.

 The fun has just begun and DeWitt is about to step into a virtual home only
 the Menendez brothers could love.

  June 25, 7:36 p.m. --  The Feeding Begins

  "The Time article is available on America Online right now," is the single
 line message posted to Newsweeklies on the WELL.

 A feeding frenzy is about to take place and over the course of the next
 several days the topic will resemble a great roiling, shark infested pool.
 Time and DeWitt are the chum.

 The events that shake out over the next few days, while localized on the
 WELL, are significant.  First, the article's principal author has his
 virtual "home base" here.  Second, the WELL becomes the focal point of the
 most intensive and extensive critiques of the Rimm study, a factor that
 proves invaluable, considering that Rimm was successful in bypassing this
 traditional academic gauntlet.

 The early reviews of the Time story are horrendous.   Someone suggests that
 the phrase "Rimm Job" will be used to identify overhyped undergraduate
 studies that masquerade as major newsmagazine cover stories.

 Monday June 26, O-Dark-Thirty

 DeWitt logs and posts a comment at 2:38 a.m.  That prompts John Seabrook
 of the New Yorker magazine to query nearly 3 hours later:  "You're up
 early. Trouble sleeping?"

 At 2:39 p.m. Godwin's life for the next eight days is defined by this
 posting:  "Philip's story is an utter disaster, and it will damage the
 debate about this issue because we will have to spend lots of time
 correcting misunderstandings that are directly attributable to the story."

 Godwin proceeds to take huge, vicious chunks from the underbelly of the Time
 article by attacking it's least defensible position:  The infamous 83.5%
 figure.

 Godwin will continue to feast at table of Time for days to come, at times
 posting several devastating comments in a row.  He is a machine.  He admits
 to "obsessing" on the issue, but "I'm obsessing over what is the truth," he
 tells Dispatch about midnight.

 He is on the edge of a day too far gone to care about, at the brink of the
 next too dark to foretell.

 He has been unrelenting in his strategic dismantling of DeWitt and the Rimm
 paper.  Even his voice sounds tired.  But all this takes its toll:  DeWitt
 had been a friend.  "I feel like something has died," he will say later.
 And to a large extent, something has.

 The packaging of the story gets hammered as well.  The shock artwork, which
 includes a damn near pornographic image in its own right -- what can only
 be described as a man fucking a computer terminal -- is outrageously
 sensationalistic.  DeWitt even admits at one point that he agrees with
 views that the art is "over the top."

 9:30 Monday Evening...

 By now DeWitt and Time are bloody if not bowed.  A crack in Time's story
 begins to surface.

 DeWitt admits it himself, acknowledging that he "should have had a graph"
 in the story that referenced the advance criticism of the study that he
 knew about.  "That was probably a screw up," writes on the WELL.   He says
 he "couldn't risk" giving anyone, such as Hoffman, and advance copy of the
 study for fear it would "leak."

 Tuesday June 27th -- The Plot Moistens

 Virtually bleeding from a thousand cuts, DeWitt acknowledges that the
 pressure got to him while writing the story.  In fact, he says that if he
 and his team had had more time and "more presence of mind" they would have
 called in an "outside expert" to review the study.

 But "presence of mind" was apparently lacking.  DeWitt admits that he had
 to go from editing one cover story to writing the next with only the
 weekend to rejuvenate.  "Such is the life at a newsmagazine these days," he
 writes.

 Jim Thomas surfs into a WEB site that i supposed to carry the Rimm study.
 What Thomas finds instead is a brief description of the study, a pointer to
 the law review article and a phone number were you can buy it -- not
 download it.

 And then he points out a curious note contained on the page:   "Current
 plans for pages include the Introductory text from this article and the
 conspiracies which have reached the ears of the researchers."  But there's
 no other explanation.

 Nightline runs its exclusive by arrangement segment.  DeWitt has already
 been taped the previous Friday.  Godwin goes head to head with Ralph Reed
 of the Christian Coalition.

 Godwin becomes an instant hero:  He jumps into first into the discussion
 and is able to play the "family values" card before Reed.  But Reed is
 tossing out facts and figures as if he has somehow been given an advance
 copy of the so-secret study.

 When Rimm is asked if Reed had some kind of advance peek at the study, Rimm
 says:  "Ralphy never saw the fucking study."

 Wednesday, June 28th

 Hoffman appears back on the WELL after a two day absence.  She is shocked:
 In the media topic alone there have been 250 new posts.

 Hoffman announces that she and her husband/partner, having finally obtained
 a copy of the study, are beginning a systematic critique of the Rimm
 report.

 Six days later the Hoffman/Novak report is complete, all 9,000 words of it.
  It turns out to be devastating.

 Professor David Post, from the Georgetown University Law Center, cruises
 onto the Net with his own detailed critique of the Rimm study.  Post
 deconstructs Rimm's report in the same manner as the Hoffman/Novak paper.

 Thursday, June 29th

 Hoffman discovers that the cryptic WEB page message alluding to
 "conspiracies" is aimed at her.  On the WEB site, it seems Hoffman is being
 singled out for being a bit too vocal.

 Hoffman fires off a nasty note to Rimm's faculty advisors at CMU.  They
 answer quickly, apologizing for "conspiracy" language that "has no place in
 academic discourse," according to Marvin Sirbu, one of Rimm's advisors.

 Rimm answers Hoffman, too.  He apologizes for the WEB page, saying that the
 person who put it up had done so "accidentally."

 The WEB page goes back to "normal."

 Friday, June 30-Monday, July 3rd

 There is not a minute's rest for DeWitt.  He is continuously hounded
 whenever he goes online.  All this is very tiring for DeWitt.  Finally,
 after a long protracted battle on the WELL, DeWitt seems to be inching near
 defeat, at least on certain points.

 David Kline, a freelance writer and contributor to Wired magazine, logs in
 and writes that DeWitt didn't conduct what he calls "journalistic due
 diligence" by investigating the study thoroughlly and by not mentioning
 that other experts raised several doubts.

 Kline's message has rung the brass bell.

 The next time DeWitt logs in, he cites Kline's message saying: "I think
 he's put his finger on precisely where I screwed up."

 And yet, the story won't die.  Going into Monday night (July 3), Rimm
 himself was preparing a detailed assault the Hoffman/Novak critique.

 I asked for an advance copy... Rimm said it was secret until he was ready
 to announce it.

 Why am I not surprised

 Meeks (whew... finally) out...

------------------------------


------------------------------

Date: Sun, 19 Apr 1995 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 3--Cu Digest Header Info (unchanged since 19 Apr, 1995)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CUDIGEST
Send it to  LISTSERV@VMD.CSO.UIUC.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
         In ITALY: Bits against the Empire BBS:  +39-464-435189
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu:80/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.56