Web-porn scandal rocks White House

               West Wingers downloaded gay, bestial,
               teen sex videos, jamming firewall system


               By Paul Sperry
               � 2000 WorldNetDaily.com

               WASHINGTON -- A consultant hired last year to beef
               up security for the White House's computer network
               found massive pornographic video files passing through
               the system's Internet firewall, WorldNetDaily has
               learned.

               Some of the downloaded files were traced back to West
               Wing officials as recently as the beginning of last year,
               during the height of the impeachment crisis, say sources
               who were involved in replacing the firewall system as part
               of Y2K security upgrades.

               The real-time video files -- which came from hard-core
               porn sites featuring homosexual, farm-animal and teen
               sex acts -- were so large in byte volume that they
               accounted for most of the traffic coming into the firewall,
               sources told WorldNetDaily.

               All Internet links and e-mail must first pass through the
               firewall before coming into the local area network for the
               Executive Office of the President and on to individual
               network users. The firewall system is designed to screen
               Internet traffic for messages containing network-crippling
               viruses.

               A Y2K computer consultant in early 1999 discovered
               the unusually large volume of porn-site traffic coming into
               the White House while reviewing the firewall logs.

               A White House computer specialist recalled the reaction
               of one of the contractors at the time.

               "He started to laugh and said, 'It looks like the majority
               of traffic going through the firewall is pornography,'" said
               the White House employee, who spoke on the condition
               of anonymity.

               Both President Clinton and Vice President Al Gore have
               denounced cyber-porn and have pushed so-called
               "E-chips" to block the Internet's "purveyors of
               pornography," as Gore called them last year.

               White House cyber-security experts have asked
               WorldNetDaily to withhold the name of the Y2K
               contractor that upgraded the firewall system, arguing that
               disclosing the information would tip off hackers to the
               security software the White House is using and make it
               easier for them to breach the network. WorldNetDaily
               agreed to reveal only that the company is based in
               California.

               The firewall logs show the uniform resource locator, or
               URL (basically the Web zip code), of the porn sites from
               which the videos (MOVs) and still-graphics (JPEGs and
               GIFs) were downloaded.

               "There were things that said 'teen,'" the White House
               computer expert said. "There was gay and bestiality stuff
               too."

               Bestiality? "Donkeys, goats, dogs," explained the source,
               who later accessed some of the raunchier sites. "It's
               embarrassing."

               Upon the discovery of the heavy XXX-rated traffic,
               White House security specialists undertook a "forensics"
               effort to ID the White House network users who were
               downloading -- and watching -- the videos on
               government computers and time.

               Investigators, including White House Security Officer
               Charles Easley, looked at a number of variables to
               separate the habitual from the accidental Web-porn
               surfers. They scanned firewall logs over several weeks so
               they could see the repeat offenders. They also zeroed in
               on the large-byte files.

               What they found was shocking.

               "There were some significant names. I can say, yes, West
               Wing," said one White House source familiar with the
               investigation. "There were women too."

               Many of the offenders also officed out of the Old
               Executive Office Building, including presidential
               personnel, sources say. One was in national security.

               One of the worst offenders, however, was a senior White
               House computer-systems manager, who was
               reprimanded but allowed to stay in the White House after
               being treated for an "addiction" to porn. Sources say the
               porn abuser is so sensitive to the possibility of public
               exposure that he would likely take his own life if his name
               were disclosed here.

               Security experts weren't just worried about the
               bandwidth-eating Web videos slowing down the White
               House computer network for legitimate business, or
               bringing a "Trojan horse" virus into the system. They also
               feared they could open up White House officials to
               blackmail from outsiders looking to access the network.

               "It's a potential security risk," said one White House
               insider. "A hacker could call up an official and say, 'I
               have evidence you've been downloading kiddy porn.
               Give me your network passcode, or else.'"

               The Internet-linked network is unclassified (although
               another, classified network exists in the White House),
               but most everything on it is still sensitive.

               At any given time it may contain secret agendas for
               high-level meetings over trade and other policies, for
               example, or advance data from unpublished economic
               reports. Such information is potentially valuable to
               anyone from foreign diplomats looking for geopolitical
               leverage to stock traders looking for an edge.

               By February 1999, after the California contractor had
               replaced the old firewall and alerted officials to the
               cyber-porn problem, White House computer specialists
               set up filters to block employee access to the porn sites.

               Officials could have installed filters on the old Internet
               firewall, but never did -- except in the case of one site, an
               X-rated spoof of the official White House site. (Last
               year, a New Jersey man who says he accidentally logged
               onto the unofficial White House site in a public library,
               was escorted off by police and banned from the library.)

               According to White House insiders, White House
               guidelines for proper computer use by employees
               prohibit using them for profit, but do not specifically
               restrict using them to access Internet pornography.

               Last year an Internet porn policy was submitted to White
               House lawyers, but was not instated as part of any global
               policy, sources say.

               In 1997, Clinton and Gore announced a "strategy for a
               family friendly Internet" which included proposing the
               distribution of "E-chip" technology for filtering
               cyber-porn.

               "We all know and we've heard the horror stories about
               the inappropriate material for children that can be found
               on the Internet," Clinton said during the July 16, 1997,
               press conference.

               The event's press release said: "The president
               emphasized that government (has) an important role to
               play in achieving the goal of a family friendly Internet."

               "The President made clear that the administration remains
               committed to the vigorous enforcement of federal
               prohibitions against the transmission of child pornography
               and obscenity over the Internet," the release added, "and
               the use of the Internet by pedophiles to entice children to
               engage in sexual activity."

               Last year, Gore encouraged parents to "restrict their
               children's e-mail contact to keep the potential predators
               at bay -- purveyors of pornography."

               He said they must be protected from "red light districts in
               cyberspace."

               The White House has resisted requests from Congress, a
               federal court and other investigators to turn over Internet
               firewall logs -- which are stored on emergency back-up
               tapes -- in response to subpoenas for missing e-mail sent
               to West Wing officials over the Internet. Incoming e-mail
               also travels through the firewall.

               White House lawyers have argued that the logs don't
               include the contents of the e-mail, just the "to" and
               "from," and therefore would not be helpful to
               investigators. Besides, they claim, only the past several
               months worth of firewall logs are stored on back-up
               tapes; previous tapes of logs are recycled.

               Besides incoming e-mails, the tapes of the 1998 and
               1999 firewall logs also recorded the massive volume of
               porn traffic going into the White House network over that
               period, sources say.



               Paul Sperry is Washington bureau chief for
               WorldNetDaily.


=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:                    <[EMAIL PROTECTED]>
                      *Mike Spitzer*     <[EMAIL PROTECTED]>
                         ~~~~~~~~          <[EMAIL PROTECTED]>

   The Best Way To Destroy Enemies Is To Change Them To Friends
       Shalom, A Salaam Aleikum, and to all, A Good Day.
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to