Computer underground Digest Wed Feb 23, 1994 Volume 6 : Issue 18 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe (Coming back to archives any day) Acting Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Whacker Editor: Tonya Harding CONTENTS, #6.18 (Feb 23, 1994) File 1--CuD Policy on Copyright Media Pieces File 2--Canadian BBS licensing, Errors in the CRTC/FCC comparison File 3CPSR Petition Drive (Reminder) File 4--2nd International Virus Writing Contest File 5--Altered White House docs summary Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. To subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 ANONYMOUS FTP SITES: AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: ftp.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) UNITED STATES: aql.gatech.edu (128.61.10.53) in /pub/eff/cud etext.archive.umich.edu (141.211.164.18) in /pub/CuD ftp.eff.org (192.88.144.4) in /pub/Publications/CuD ftp.halcyon.com (192.135.191.2) in mirror2/cud KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Mon, 21 Feb 1994 21:19:57 CST From: CuD Moderators <cudigest@mindvox.phantom.com> Subject: File 1--CuD Policy on Copyright Media Pieces In a recent CuD, we inadvertantly reprinted an article from a net news service. We believed that it was permissable for reprint, but the post instead was intended only for our own information. Although we have (yet) received no complaints from the news service, we nonetheless regret the misunderstanding surrounding the nature of the post. For those unfamiliar with CuD's policy regarding reprints of news articles, it can be found in the FAQ (available from the ftp archives), it's rather simple: 1) Some articles are obviously personal and not intended to be published. Others aren't. If you aren't sure, be sure to include some indicator, such as "FYI ONLY," "not for publication," or some other note that alerts us that it's private. 2) We STRONGLY ENCOURAGE readers to send us news items from the media. We prefer that permission be obtained by the poster. We simply cannot check on such things. We don't have the time or resources. If permission has not been obtained, then edit the article and quote within "fair use" guidelines and sum the rest. If the article is exceptionally interesting, send it over with a note at the top indicating that permission was not obtained. If it's appropriate for running, we'll edit and summarize. The growing time constraints of running CuD mean that we increasingly depend on readers to ferret out articles and edit them down. The format should be about 70 characters per line, hex 05s removed, and a blank line between paragraphs. We do our best to be good net citizens and not tread on the copyright protections of others. At best such violations are discourteous, at worst illegal. So, edit articles in advance if you're able, and if not, let us know that status of the permission. ------------------------------ Date: Mon, 21 Feb 1994 09:21:23 -0500 From: bigsteve@DORSAI.DORSAI.ORG(Steve Coletti) Subject: File 2--Canadian BBS licensing, Errors in the CRTC/FCC comparison In his response to Lord Qorthon, (CuD 6.15/6.17), John Stephenson made some comparisons, albeit that Qorthon did first, between the CRTC and the FCC and their respective policies. By comparing rumored CRTC regulation of BBS's to the CRTC's mandate over broadcasting, Qorthon made the common mistake of most uninformed people. > > Consider the example of radio in the 40's and 50's. Before the > >CRTC was formed, anyone could broadcast radio signals legally from their > >home on any bandwidth. Fearing obscenity and extreme access to > >information, the CRTC was formed to sell licenses to broadcasters. > >Without such a license, you could be prosecuted for broadcasting. What is unfortunate is that while the "standards" for broadcasting may attempt to regulate morality, the division of the regulatory body that issues those rules is a separate entity from the one that regulates the wire/fiber based telecommunications industry. Each set their own rules and penalties. While it may be illegal to "broadcast" something indecent, there is nothing stopping you from being a foul mouth over a private telephone conversation, analog or data, in either country's regulations. Stephenson's attempt to correct only complicated matters due to some factual errors. > When I see this kind of history thrown out as "reality", it bothers me a > great deal. Government regulation of broadcasting existed from nearly the > beginning of the sector in Canada. The CBC and CRTC were formed not to stop > "obscenity and extreme access to information" but American commercial radio > control of Canadian airwaves. It was not the case that "anyone could > broadcast radio signals legally from their home on any bandwidth (sic)" - > even in the 1920s, the Fisheries Dept. was giving put licences. Not entirely true, the CBC was there long before the CRTC, it was modeled after the BBC. Up until the late 1960's, Canada allowed foreign ownership of it's broadcast stations via Canadian subsidiary companies, something the US did not allow, and still doesn't. If Canada had wanted to stop American ownership, Ottawa could have passed legislation earlier. If anything, the US was fed up with Americans who it deemed unfit to hold broadcast licenses that were going to Mexican border stations and buying large blocks of airtime to transmit their "snake oil" ads. The FCC was also after RKO General, Inc., due to foreign anti-trust violations of it's parent company, then known as General Tire. RKO General owned Canadian border station CKLW in Windsor, Ont. which was heard throughout the Northeastern US. BTW, it took 20 years, but the FCC got RKO and Gencorp out of the broadcasting business. It's more likely that Canada stopped foreign ownership and insisted on mostly Canadian content due to pressure from the US, (or fear of getting the same kind of pressure Mexico was getting), and not the other way around. As for the licensing, that too is in error. As radio's first application was to communicate to ships at sea, it is likely that Fisheries did issue Canada's first radio licenses, as the Department of Commerce did in the US in those early days. However, borrowing the idea again from England, Canadian radio licenses were subsequently issued by the Canadian post office up until the CRTC was formed. > > If licensing comes into affect, we will LOSE this access. Not only > >will the pirate boards be hunted down and exterminated, but all > >currently LEGAL PUBLIC DOMAIN BBS's will also be made illegal unless > >they can afford a license. [stuff deleted] > > We don't yet know what the proposed licensing fee will be, but it > >could anywhere in the area of $300-$5,000. This could also depend on > >the size of the BBS. > > Licence fee for a non-profit radio station is $25 dollars a year. > Commercial stations pay a very small percent of their profit as the fee. > I'm not in favour of licensing, but $25? In the US, all DJs (commercial or > non-commercial, it doesn't matter) need an FCC licence to be on the air. > Now that is restrictive. Two more assumption that are wrong. Qorthon assumes that BBS's licenses will be parallel to commercial broadcast fees, while Stephenson says it's more like public radio license fees. Again I must state, the COMMON CARRIER division and the PRIVATE RADIO division are separate departments. Each one will determine it's own fees. For the most part, Canadian licenses are much cheaper than in the US, but the "restrictive" policy of requiring everyone in US radio to have a license is a crock. Only those persons who have to monitor or control the transmitter needs some sort of certification. You no longer need a license to read the meters or turn the transmitter off in an emergency, or on if the Chief Engineer tells you to. This is done by a permit. You fill out the form, the C.E. signs it, you mail it to the FCC with a processing fee, ($5.00?), and you are a flunky. You can bet most of your famous on air personalities and not allowed near a transmitter and therefore don't need a license or operator permit. > > Before I go into my plan of action, I want to tell you that if > >licensing comes into effect, if will be basically impossible to beat the > >system. All pirate radio stations in North America have been crushed by > >the government in a matter of months. Imagine how easy it will be to > >crush pirate bulletin board systems (and by that I simply mean BBS's > >without a license) with traceable phone numbers. Oh, don't make me gag with that Pirate Radio comparison schlock! As a former pirate I'll tell you that the stations that get busted do it too often, too long at any one stint, run too much power, or act like idiots on the air and ask for it. I know pirates who have been on the air for years without any problem, and others who over did it that got creamed in a few weeks. There was a pirate who lasted 5 days on the air, he made the mistake of setting up a few blocks from the FCC's local field office. I even know a former pirate who also was once a hacker, he's now working for a real radio station and is setting up their computer system in addition to his management duties. > It's hard for me to argue that folks running pirate boards shouldn't get > busted. While I don't agree with many aspects of our wonderful econimic > system, I don't think the way to reform it is through establishing pirate > bulliten boards. The software business is tough enough. I'm in total agreement with that, however this was in reply to Qorthon's statement that all unlicensed BBS's would be considered pirates. IMHO, I don't want to see any regulation of BBS's, but if it were to come about, it should be done in two ways. Commercial tech support BBS's and information providers would pay some sort of fee, they are using the BBS to make money. However private, hobby and non profit operations should be allowed to exist with a no, or minimal fee structure. I would hope that because of the waver of a fee, a reciprocity of free, or strictly voluntary payment, service would be required, at least for the basic service. Restrictions based on costs would be placed on the SYSOP's ability to charge for value added services. I would like to see the majority of any commercial fees be used to fund some sort of "Information Superhighway" provider that would exclusively serve the "little guy" and keep his costs down. Also some sort of national database of copyrighted software would be nice so System Administrators and SYSOP's can keep their BBS's clean. While I would not like to see it, some form of reporting that a user uploaded copyrighted material might also get put through by the lawmakers, (can you say George Orwell?), and that is something we should make sure doesn't come up. Ok, I wont be naive and say that all the collected fees are going to be channeled back in, after all how much of road, bridge and tunnel tolls are diverted to mass transit, some help to equalize access is going to be needed once the telco's and cableco's take control of the Internet's successor. Instead of having anxiety attacks the next time a BBS's regulation fee is proposed or rumored, we should all begin to think that it will be inevitable and how we would like the money to be spent. Before the commercial users try to legislate the local BBS out of business, just like the cell phone industry made it illegal for radio scanners to tune in the cellular band, we might want to beat them to the punch and have some sort of self perpetuating small BBS support system in place they can't stop. Maybe regulation is a good thing, if we can do it right. ------------------------------ Date: Sun, 20 Feb 1994 13:51:32 EST From: David Sobel <dsobel@WASHOFC.CPSR.ORG> Subject: File 3CPSR Petition Drive (Reminder) ((MODERATORS' NOTE: For those who missed the anti-CLIPPER petition in CuD and elsewhere, we reprint it here. The momentum is growing in opposition to Clipper. If you have already sent in a petition, DO NOT send in a second one, but if you haven't, here's your chance to lend your "voice" to the fray.)) Electronic Petition to Oppose Clipper *Please Distribute Widely* On January 24, many of the nation's leading experts in cryptography and computer security wrote President Clinton and asked him to withdraw the Clipper proposal. The public response to the letter has been extremely favorable, including coverage in the New York Times and numerous computer and security trade magazines. Many people have expressed interest in adding their names to the letter. In response to these requests, CPSR is organizing an Internet petition drive to oppose the Clipper proposal. We will deliver the signed petition to the White House, complete with the names of all the people who oppose Clipper. To sign on to the letter, send a message to: Clipper.petition@cpsr.org with the message "I oppose Clipper" (no quotes) You will receive a return message confirming your vote. Please distribute this announcement so that others may also express their opposition to the Clipper proposal. CPSR is a membership-based public interest organization. For membership information, please email cpsr@cpsr.org. For more information about Clipper, please consult the CPSR Internet Library - FTP/WAIS/Gopher CPSR.ORG /cpsr/privacy/crypto/clipper ===================================================================== The President The White House Washington, DC 20500 Dear Mr. President: We are writing to you regarding the "Clipper" escrowed encryption proposal now under consideration by the White House. We wish to express our concern about this plan and similar technical standards that may be proposed for the nation's communications infrastructure. The current proposal was developed in secret by federal agencies primarily concerned about electronic surveillance, not privacy protection. Critical aspects of the plan remain classified and thus beyond public review. The private sector and the public have expressed nearly unanimous opposition to Clipper. In the formal request for comments conducted by the Department of Commerce last year, less than a handful of respondents supported the plan. Several hundred opposed it. If the plan goes forward, commercial firms that hope to develop new products will face extensive government obstacles. Cryptographers who wish to develop new privacy enhancing technologies will be discouraged. Citizens who anticipate that the progress of technology will enhance personal privacy will find their expectations unfulfilled. Some have proposed that Clipper be adopted on a voluntary basis and suggest that other technical approaches will remain viable. The government, however, exerts enormous influence in the marketplace, and the likelihood that competing standards would survive is small. Few in the user community believe that the proposal would be truly voluntary. The Clipper proposal should not be adopted. We believe that if this proposal and the associated standards go forward, even on a voluntary basis, privacy protection will be diminished, innovation will be slowed, government accountability will be lessened, and the openness necessary to ensure the successful development of the nation's communications infrastructure will be threatened. We respectfully ask the White House to withdraw the Clipper proposal. ------------------------------ Date: Fri, 18 Feb 94 18:55 EST From: "AMERICAN EAGLE PUBLICATION INC." <0005847161@MCIMAIL.COM> Subject: File 4--2nd International Virus Writing Contest ************************************************************* Announcing The Second International Virus Writing Contest Sponsored by American Eagle Publications, Inc. P.O. Box 41401 Tucson, AZ 85717 USA and The Crypt Infosystems BBS +1 (818) 683-0854 *** The Goal *** The purpose of this contest is to write a fully functional computer virus that entertains people with political satire. Viruses will be judged on the basis of originality, creativity, functionality, and political incorrectness. *** Eligibility *** Anyone who can write a computer virus is eligible. *** Contest Dates *** The contest is underway from January 1, 1994 until June 30, 1994. Your submissions must be received by June 30 to qualify. The winner of the contest will be announced at the DEFCON conference in Las Vegas, July 22-24, 1994. If you can be present, an official award will be bestowed on you at that time. ************************************************************* Details ************************************************************* The philosopher Friedrik Nietzsche once said that if you want to kill something, you must laugh at it--and laugh at it deeply. So there should be little wonder that political satire is as old as politics itself. Is there something going on in the political arena that you abhor, that makes you sick, that is just plain wrong? Well, here's your chance to make a mockery of it. I've always had this idea that if someone wrote a sufficiently witty virus that really addressed the issues the way the people (not the press, not the politicians) saw them, it might just get passed around by people voluntarily. Let's find out. Write a virus that is itself a political satire. I don't mean a virus that simply displays a message. I mean a living entity whose every move--whose every action--is politically motivated. If you need more than one virus to make your point--perhaps two viruses working together, or something like that, that is fine. ----------------------------------------------------------- Let me give you a simple example: The Political Correctness Virus This virus is a spoof on the "political correctness" movement--which is just a form of self-imposed censorship-- that is sweeping american intellectual circles, particularly colleges and universities. This virus is a memory resident boot sector virus which maintains a list of politically incorrect words on your computer system. It also hooks the keyboard interrupt and monitors every keystroke you make. If you type a politically incorrect word into the computer, the PCV springs into action. Politically incorrect words are ranked at three different offense levels. When the PCV encounters such a word, it determines what offense level that word is, and acts accordingly. The least offensive words merely register a beep. More offensive words cause a beep to sound for 10 seconds. The most offensive words cause a siren to sound for two minutes, locking the system for that duration. If you turn the computer off before the two minutes are up, the virus will stop the boot process for five minutes, with sirens, when you turn it back on. If you allow the siren to complete, then you can proceed. The virus has two different word lists, both stored in an encrypted and compressed format. The list is selected at random when the system is infected, after which it cannot be changed. The first list is the "proper" list of political correctness no-no's. For example, a word like "sodomite" is among the worst possible offenses. The second list is an inverted list of no-no's. This list trys to force you to use "sodomite" by flagging words like "gay" and "homosexual" as no-no's. If you allow the PCV to live in your system for three months without getting a single flag, you are given the supreme honor of viewing the word list assigned to you and adding a word to it. If you get more than 3000 flags in a lifetime, the virus will force you to enter a politically correct word before allowing you to start the computer, since you are obviously unwilling to submit to its censorship. The virus also uses powerful means to prevent disinfection, so that, once you get it, you can't get rid of it without a major effort. ------------------------------------------------------------ Now, I know you can get a lot more creative than this--so do it! Design your virus carefully, so that everything it does has meaning. Then send it in. Here are the criteria we'll use: 1. Originality: Your virus must be an original work. Do not send us anything that is not 100% yours. Your message should be original too. Do not just ape what everybody else is saying, especially the media. Also, a refined wit is much to be preferred over vulgarity. Vulgarity is a substitute for original wit. Foul language, porn, etc., are out. Destructive features should be incorporated only if they are VERY appropriate (perhaps if you are commenting on real live genocide in your country, or something like that). In general, though, destructive features will hurt you, not help you. The one exception is modifying anti-virus programs. That is considered to be CONstructive activity. 2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes can say something about politics and issues. Think of it like this: displaying a message on the screen is like reading a text file. What we want is the equivalent of a multi-media extrvaganza. Use all the system's resources to tell your message. Don't be afraid to write a virus that has some wierd mode of infecting programs that tells a story, or to write one that sends faxes to the White House, or sends an automatic request for reams of free information to some government agency. 3. Functionality: The virus has to work. If it only works on some machines, or under some versions of DOS, or what-not, then that will count against you. The better it is at infecting systems and moving around, the better off you will be. So, for example, if you write a file-infector, make sure it can jump directories, and--if you're up to it--migrate across a network. 4. Political incorrectness: Since computer viruses are politically incorrect, their message should be too. If you send us a pro-establishment virus, then you will not win this contest. A word to the wise: think twice about what's correct and what's not. Many positions are only superficially incorrect, though they are really quite fasionable among the establishment. Look at it this way: if you could get a well- written letter expressing your view published in a big city newspaper, then it's not sufficiently incorrect. There are a LOT of ideas that are unofficially censored by society-- especially the media and academia. They tend to make themselves out to be the rebels, but they are really the establishment. If you can't think of anything creatively incorrect and sufficiently obnoxious then you shouldn't be writing viruses in the first place. ************************************************************* How to Submit an Entry You may mail your entry to American Eagle Publications at the above address, or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it by dialing the Crypt Infosystems BBS and uploading it there. To get on to the system quickly, efficiently and anonymously, log on as VIRUS, using the password CONTEST. An entry consists of: 1. A complete copy of your virus, both source and executable files. 2. If the political satire isn't perfectly obvious, send a verbal description of how the virus works and why it does what it does. This is especially important if you are not an American and you are commenting on something that has not received worldwide attention. I don't care if you're Bulgarian and you're commenting on something we've never heard of--just make sure you explain it, or we won't understand and you'll lose. 3. If you want to be recognized for your work, include your name (real or handle), and a way we can get in contact with you. By submitting an entry, you grant American Eagle Publications, Inc. the right to publish your virus in any form. You agree not to make your virus public prior to July 25, 1994. If you do, you are automatically disqualified from the contest. For the sake of privacy, you may encrypt your entry and send it in with the following PGP key (which we highly recommend if you have PGP): -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.1 mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai 8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR tApDT05URVNUXzk0 =Z20c -----END PGP PUBLIC KEY BLOCK----- Good luck! **************************************************************** P R I Z E S In addition to instant worldwide fame and recognition, you'll get: 1. A cash prize of $100 US. 2. A year's subscription to Computer Virus Developments Quarterly. 3. Your virus will be published in Computer Virus Developments Quarterly, and other fine journals. 4. A handsome engraved plaque recognizing your contribution to the betterment of mankind. 5. A free secret surprise that we cannot tell you about right now, valued at $100. Two runner-ups will receive the secret surprise. ***************************************************************** !! GO FOR IT !! ***************************************************************** ------------------------------ Date: 19 Feb 1994 21:19:49 -0800 From: croberts@crl.com (Char Roberts) Subject: File 5--Altered White House docs summary The following has to do with the accuracy and reliability of what we receive on-line. This is a summary of the controversy over "Altered White House documents" which I first posted to the Internet newsgroup alt.internet.services on Feb. 5. The Associated Press got involved, and the AP story was picked up by ClariNet, Prodigy, CompuServe, Fidonet, and other on-line services, as well as the Rush Limbaugh radio program and newspapers. After that public exposure, we received a "we goofed" letter from the White House. I'm snipping and pasting the gist of this story below. Most of it appeared on the USENET newsgroup alt.internet.services under "Altered White House documents," but it went everywhere and I never did track it all. The on-line community has been quite supportive of the need to protect the reliability of government documents offered electronically. Background: Prof. Elizabeth McCaughey wrote an article criticizing President Clinton's health care plan which was published in the New Republic in January. The White House issued a rebuttal on January 31 which became a news story due to its strong language, which included phrases such as "blatant lie." On Feb 5, 1994 I used anonymous ftp to get a copy of this rebuttal from whitehouse.gov: cd pub/political-science/whitehouse-papers/1994/Feb get 1994-01-31-Analysis-of-the-New-Republic-Article-on-Health- Care-Reform ============================== From: croberts@crl.com (Char Roberts) Newsgroups: alt.internet.services Subject--Altered White House documents Date: 5 Feb 1994 09:38:23 -0800 I assume everyone knows about the ftp site whitehouse.gov. I just discovered that the Clinton rebuttal to Elizabeth McCaughey's critique of his health care plan has been altered on whitehouse.gov - with no mention in the current version that it has been changed. According to Associated Press writer Tom Raum, the original White House rebuttal to McCaughey's New Republic magazine article used the word "lie" four times. The copy of the White House rebuttal I just downloaded (Feb 5, morning, pacific time) does not contain the word lie nor does it contain any indication that it is a "revised" version. ....Clinton admitted to the use of "lie" but it has since been removed from the version available for anonymous ftp at whitehouse.gov. Makes you wonder just how ... accurate the rest of the information there might be... ============================== This elicited a response from Bill Casti who defended the WH and accused me of "knee jerk" reactions etc. Flames deleted, but my response to Casti was significant to development of the story, since it prompted him to forward the whole thing to Jock Gill at the White House: ============================== Clipped from alt.internet.services Char Roberts responds to Bill Casti (quire@vector.casti.com) >I assume that neither of you know the difference between a >speech-as-written and a speech-as-delivered. Oops, Bill, you didn't read the entire thread. It never was a speech, only a written rebuttal by the White House to an article written in the New Republic by Elizabeth McCaughey. Please re examine the thread. I added on Feb 8 that it was neither a position paper nor a public speech; it was a written rebuttal to Ms. McCaughey's article, presented by Dee Dee Myers as "documentation." To quote press secretary Myers' statement of January 31: "The following documentation is in response to Elizabeth McCaughey's article... This documentation clarifies the facts surrounding the President's approach to health care reform." The "documentation" I found at whitehouse.gov on the morning of Feb. 5 does not match the reported "document" described in the AP article which appeared in my newspaper on Feb. 4. .... The document at whitehouse.gov simply doesn't match the original described by AP reporter Tom Raum... It certainly is clear from the AP newspaper article that the word "lie" was used by the White House in its written rebuttal to Elizabeth McCaughey's article. But the word lie was NOT in the version at whitehouse.gov, nor was that version identified as having been revised. It's just hanging out there for the convenience and edification of the on-line community as if it were the real thing... ============================== More from alt.internet.services Date: Wed, 9 Feb 1994 22:08:36 -0500 (EST) From: Bill Casti <quire@vector.casti.com> I have forwarded (intact) Char Roberts' commentary to my contacts at the Office of Media Affairs at the White House, who are responsible for the documents that are placed in the directories at UNC which are, in turn, mirrored by the whitehouse.gov. I have sent Mr/Ms Roberts private email confirming this and assuring that either they will contact him/her directly or I will pass along their response. I have agreed that files that are changed from the original "text- as-written" should, in the future, be identified as "revised" files, so as to avoid all the other erroneous conclusions that might well be drawn from even such an "appearance of impropriety", whether or not any impropriety has ever, in fact, occurred. Regards. Bill Casti ============================== I then received this note from Jock Gill: ============================== Date: Thu, 10 Feb 1994 11:08:48 -0500 (EST) From: Jock Gill <jgill@eop.gov> Subject--Documents at Publications@WhiteHouse.gov To: croberts@crl.com You should know that we do not edit or alter documents posted to Publications@WhiteHouse.gov. It would appear that the reporter in question may have obtained an unpublished, earlier draft with a different vocabulary. Again, we do not alter documents. Regards, Jock Gill ============================== I wrote back: ============================== >From croberts Thu Feb 10 16:02:06 1994 Subject--Documents at Whitehouse.gov Date: Thu, 10 Feb 1994 16:02:06 -0800 (PST) To: Jock Gill <jgill@eop.gov> Regarding your letter to me of February 10, 1994, in which you stated: [repeat of above letter] This was an unsatisfactory answer to my concerns about the difference between the Associated Press version of the White House rebuttal to Elizabeth McCaughey's article on health care and the on-line version I found at whitehouse.gov. Therefore, my husband called AP reporter Tom Raum and asked him where he received his version. He stated that he and other reporters received it directly from the White House. Mr. Raum faxed us his copy. It contains the word "lie" several times. The version at WhiteHouse.gov does not contain the word "lie" at all. Mr. Raum has since obtained his own copy of the on-line version and has confirmed to us that it differs from what he was given by the White House. We also called Ms. McCaughey's office at the Manhattan Institute of Public Policy and confirmed that the rebuttal they actually received from the White House used the word "lie." Mr. Raum clearly did not obtain an "unpublished, earlier draft with a different vocabulary." He obtained his version directly from the White House. Therefore, the fact that the on-line version is different from the version sent to Ms. McCaughey and given to reporters indicates that the White House *does* edit or alter documents posted to whitehouse.gov. The issue here is not over the particulars of the Clinton rebuttal to Ms. McCaughey - it is over the integrity of on-line information provided for public consumption by the White House. We have been champions of this administration's apparent eagerness to participate in the electronic "information super highway." It is disappointing and the implications are frightening to discover that there has been a "sanitized" version presented to the on-line public. This is a mis-use of the electronic media, which should not be tolerated by a free society. This response will be posted to all of the newsgroups I know of which have been following this topic and to all of the people who have e-mailed me their deep concerns about this issue. Char Roberts -- and Justin Roberts croberts@crl.com ============================== The REASON Clinton's rebuttal became a story in the first place was due to the strong language, accusing Dr. McCaughey of lies. To have removed all references to the word "lie" from the on-line version struck us as a major disservice to the electronic community. This prompted my husband to track down the AP reporter whose story we had read. The reporter did not like the implication that his sources were not credible, particularly since he had worked off a press release handed to him by the White House! He broke the story to the wire service and it was distributed on Prodigy and CompuServe among others. After that, we received one last communication from the White House, to which I referred in what I thought would be my last post to alt.internet.services. That generated the following request: ============================== Sat, 12 Feb 1994 20:22:15 alt.internet.services Re: Altered White House documents quire@vector.casti.com Bill Casti at The Gnomes of Zurich (shhh!) re: Altered White House Documents Char Roberts (croberts@crl.com) wrote: : I have received a second note from Jock Gill : admitting that they erred in not putting the original version on- : line or noting that it had been revised. Char: Since you posted Jock's first note in its entirety, how 'bout doing the same with the second? I'd like to know EXACTLY what he wrote, as I'm sure others would, too. Seems only fair. ============================== I did post it, but not until I'd had a chance to write back to Mr. Gill and tell him I was posting our final correspondence. ============================== Sun, 13 Feb 1994 07:42:21 alt.internet.services Re: Altered White House documents croberts@crl.com This should be 30-30-30 for this story. We've finally had a chance to respond to the letter we received from Jock Gill after the story about on-line discrepancies broke on the AP wires. Here follows a copy of that correspondence: Dear Mr. Gill, We appreciate your candid response to our concerns about the integrity of White House documents on-line. Health care has yet to be mentioned in the volumes of e-mail and phone calls we have received in response to the AP article about our discovery of altered documents at whitehouse.gov. What seemed to alarm the on-line community was the issue of trustworthiness of documents offered to us by the government. I think this episode has indicated how intent the on-line community is on protecting the validity of its resources. As you well know, there seems to be increasing feeling among the American public that it can't trust government information. To have received a response blaming the reporter for using an "unpublished, earlier draft" didn't fit with facts already widely reported in the media, and seemed to be yet another disappointing example of the typical government response - don't admit anything, cover up everything! An honest "we goofed" is refreshing and we appreciate your second response; we wish it had been your *first* response. However, if this President has, as you say, "relied on this kind of on-line distribution to get his side of the message out" then it is even more important that the on-line message should match the original message! I'll try to post this to the places I know of which have been following the controversy, but frankly it grew so big that I no longer even know where it went. The information super highway is an amazing resource and the Internet seems to have a life of its own! --Char and Justin Roberts >Date: Fri, 11 Feb 1994 19:43:45 -0500 (EST) >From: Jock Gill <jgill@eop.gov> >Subject--Thank you for your note >To: croberts@crl.com > Thank you for your note concerning the item we posted on-line in the >response to the New Republic article. Let's start with the >bottom line: After publishing over 1,800 documents, we made a >mistake. We did not publish the original that was sent to >members of the press, nor did we mark as *edited* the altered >version that was sent on-line. We have done better in the >past; we will do better in the future. > There are two points about this controversy that should not >be overlooked. First, the President is deeply committed to >reforming the health care system, guaranteeing private >insurance that can never be taken away, and reducing costs >for the family and the country. His plan has been subjected >to unfair attacks, such as that published by the New >Republic, and so we are fighting back on his behalf. That is >why this document was published in the first place. > Second, as you said in your note to me, this >President is committed to reconnecting our people to the >government -- he is committed to new technologies and new >ways of communicating, and therefore relied on this kind of >on-line distribution to get his side of the message out. > I leave you only with the idea that he is fighting for >the right causes for the right reasons, and that I hope you >will not confuse human error with the strength of his beliefs >or the goodness of his intentions. > Sincerely, > Jock Gill ============================== I leave you with the idea that I hope the on-line community will, in the future, continue to be watchful and protective of its resources... --Char croberts@crl.com ------------------------------ End of Computer Underground Digest #6.18 ************************************