CDR: Word.
George at Orwellian.Org
George at Orwellian.Org
Fri Oct 20 13:29:18 PDT 2000
Of course all of us knew this. The article is
good for explaining to non-technical friends.
http://interactive.wsj.com/articles/SB972002214791170991.htm
October 20, 2000
Electronic Form of 'Invisible Ink'
Inside Files May Reveal Secrets
By MICHAEL J. MCCARTHY
Staff Reporter of THE WALL STREET JOURNAL
ST. PAUL, Minn. -- For weeks this summer, Mike Ciresi's campaign staff
was baffled by a strange series of e-mail messages slamming the U.S.
Senate candidate.
Sent to Minnesota Democratic Party officials, the messages were signed
by a Katie Stevens. But after a failed attempt to track her down, Mr.
Ciresi's staff began to suspect foul play.
The first e-mail, which arrived in May, impugned the candidate's ethics
and those of his Minneapolis law firm. It was accompanied by six pages
of court cases, citations and footnotes. The attachments convinced
Mr. Ciresi's staff that the e-mail was part of a well-funded "opposition
research" effort. But two months and three negative e-mails later,
his staff still had nothing to go on. Then in July, one tenacious Ciresi
aide, playing a hunch, made a few mouse clicks and uncovered an
intriguing clue: hidden text that seemed to link the e-mail to the
campaign of the Republican incumbent.
Tracking the Metadata
It turns out there's more than meets the eye in the average
word-processing document. A typical Microsoft Word file, for example,
can include the author's name, the name of his or her company, the
names of each person who has worked on the document and, depending
on the options selected, deleted text and other revisions, all hidden
from view, as if written in invisible ink. That's because Word, the
dominant word-processing software, contains a lot of what Microsoft
Corp. calls "metadata," information that doesn't appear on a user's
screen simply because commands in the file tell computer monitors and
printers to ignore it.
But a savvy reader can peek at much of this behind-the-scenes fiddling
by using widely available text-reader programs, such as Notepad, or
by simply selecting the right word-processing options. Sometimes,
depending on a computer's settings, Word revisions that weren't at
all visible to the writer are obvious to the recipient. And when those
documents get zapped through cyberspace as e-mail attachments, the
inside information they contain can set the sender up for embarrassment
or worse.
'Highlight Changes'
One such e-mail snafu in Seattle sent both parties scrambling for fixes.
In late 1998, Payne Consulting Group received an e-mail that included
an attached contract prepared for it by its law firm, Davis Wright
Tremaine. By clicking on the "highlight changes" option, Payne and
the law firm say, Payne could clearly see revisions that revealed the
contract had originally been drafted for another Davis Wright client.
The law firm quickly devised security procedures for removing hidden
text from its files. Payne, meanwhile, developed a free program called
Metadata Assistant to purge any unseen, unwanted information from
documents. The program can be downloaded from the firm's Web site,
www.payneconsulting (www.payneconsulting.com). One reason Payne doesn't
charge for it: "We can't guarantee everything is stripped out," says
Robert Affleck, vice president of development.
"The big concern is that people are sending around things they don't
know they're sending around," says Steve McDonald, associate legal
counsel at Ohio State University, who teaches a class in cyberspace
law.
Microsoft has "gotten few customer complaints" about the problem, says
Lisa Gurry, a product manager for Microsoft Office. But she adds that
those will be addressed in late spring in the next version of Microsoft
Office, which will include a "privacy option" to allow a Word document's
author to "remove all personal information with the click of one button
and be warned if you're saving tracked changes and comments." For now,
Microsoft offers a nine-page article through its Web site on "How to
Minimize Metadata in Microsoft Word Documents."
It was this kind of data that gave Ciresi campaign aides the first
break in their investigation of the e-mails plaguing their candidate.
The first in the series, titled "Who Is Michael Ciresi?", arrived May
19. It described the clients of law firm Robins, Kaplan, Miller & Ciresi
as "a rogues' gallery of polluters, price fixers, tortfeasors,
predators, civil-rights violators and frauds." A second searing e-mail
arrived just before Minnesota Democrats convened in early June to
endorse a candidate in the state's senatorial race. A third followed.
Then, a fourth.
"I was getting so frustrated trying to figure out where these came
from," recalls Mark Hinds, the campaign's deputy field director.
But as he sat thinking at his desk in the Democratic Party's offices
here in early July, a light bulb clicked on. Mr. Hinds suddenly recalled
how at a previous job he used to sort Word documents by using keywords
and names in the program's "properties" box. With that in mind, he
clicked on the Word attachment to the fourth and latest e-mail, OIL
SPILL LOBBYISTS.doc. The properties box, which he found by using Word's
file menu, instantly showed that the document was created July 8 and
was "Last Saved by: Chris Gunhus." His thoughts immediately turned
to Christine Gunhus, the political director and former chief of staff
for Sen. Rod Grams, the Republican Mr. Ciresi had been hoping to unseat.
"Come here, you gotta see this," Mr. Hinds says he called out to fellow
campaign workers, who gathered around his computer. They started
searching through the previous e-mails. The first one said "Last Saved
by: Kinko's Customer" and listed "gunhus" as the author. They found
other names and more dates and times that the documents had been created
and stored.
The Ciresi campaign alerted local authorities to its discoveries, which
were first reported by the Minneapolis Star Tribune. The campaign
alleged that the masquerade wasn't just a political dirty trick but
a possible misdemeanor. A Minnesota law, which was designed to
discourage anonymous attacks on politicians, requires those involved
in election campaigns to disclose that fact in any political literature
they prepare or distribute. The law exempts individuals who spend less
than $300 on their activities and observe certain other limits.
By late August, the Anoka County attorney's office had amassed enough
evidence to persuade a judge to let it seize two computers and nine
computer disks from Ms. Gunhus's Ham Lake, Minn., home.
Asked if Ms. Gunhus was involved in writing or editing any of the
e-mails under investigation, Doug Kelley, her attorney, wouldn't
comment. "In the long run," he says, "she will be found not to have
violated any laws." Ms. Gunhus declined to be interviewed.
Sen. Grams's campaign denies that it produced or authorized the e-mails.
But after discovering the names tucked deep inside the e-mail messages,
Bob Decheine, the Ciresi campaign manager, believes otherwise. "We
think we have found a smoking gun," he says.
County investigators, however, proceeded carefully, after learning
that anyone could easily have framed Ms. Gunhus by entering her name
in the properties box. "I could put in that 'William Shakespeare' is
the author," says Bryan Lindberg, the assistant attorney leading the
inquiry.
But then, Mr. Lindberg says, his team uncovered a more substantive
link. Subpoenaed phone and Internet-access records linked the "Katie
Stevens" Hotmail account used to send the attack e-mails to a Kinko's
document-processing center and a phone line listed as belonging to
Ms. Gunhus's home, according to an affidavit filed by the county
attorney's office as part of its search-warrant request. "The telephone
number back to the Gunhus residence in Ham Lake gave us the probable
cause to look at her computers," Mr. Lindberg says.
Mr. Ciresi lost his state's Democratic primary last month. The
investigation into the e-mail messages continues.
More information about the cypherpunks-legacy
mailing list