70
Chapter 4
I tried early alternatives that fell short. I even tried using PageMaker and
exporting styled text into Word document files. Ultimately, I had no choice
but to continue to use Word. My clients sent me Word documents that I could
not open unless I used Word too. I sent Word documents back to them
because that's what they wanted. Who knows what evil may have lurked in
those Word documents?
What Up, Word Doc? A Format for Disaster
The Word document format is the addiction. Not Word itself or some special
feature of the program, but the Word doc file format. For a long time, the
only way to open a Word doc file was to use Word; without alternatives, busi-
nesses migrated to Word and the rest of the Office package and got stuck
there. As Word doc files proliferated (and as Microsoft wiped out the com-
petition in word processing programs), they hooked everyone they touched.
Just what is in those files? More than you realize. Word files can violate
your privacy. The program is most often configured by default to automatically
track and record changes you make to a document. A record of all changes
is silently embedded in the doc file every time you save it. It's easy as pie for
someone to recover this record and see all the revisions. Most Word document
files contain a revision log that is a listing of the last 10 edits of a document,
showing the names of the people who worked with the document and the
names of the files used for storing versions of the document.
A W E A P O N O F M A S S D E L U S I O N
Word documents are notorious for containing tracked changes and revisions that
could be embarrassing if discovered, and they are easy to discover. The British
government of Tony Blair learned this lesson the hard way. In February 2003,
10 Downing Street published an important dossier on Iraq's security and intelligence
organizations--the same dossier cited by Secretary of State Colin Powell in his
address to the United Nations later that month. It was published as a Word
document. A quick examination of hidden revision logs in the Word document
revealed that much of the material in the dossier was actually plagiarized from an
American Ph.D. student.
*
Dr. Glen Rangwala, a lecturer in politics at Cambridge University, discovered
that the bulk of the 19-page document was directly copied without acknowledgment
from an article in The Middle East Review of International Affairs titled "Iraq's
Security and Intelligence Network: A Guide and Analysis" (September 2002), written
by the student. As a result, during the week of June 23, 2003, the British Parliament
held embarrassing hearings on the Blair dossier and other PR efforts by the UK
Government leading up to the Iraq war.
*
Smith, Richard M. ComputerBytesMan.com. June 30, 2003. See www.computerbytesman.com/
privacy/blair.htm. See also Rangwala, Glen. "Intelligence? The British dossier on Iraq's security
infrastructure." The Campaign Against Sanctions on Iraq. See www.casi.org.uk/discuss/2003/
msg00457.html.
jsntm_02.book Page 70 Wednesday, September 28, 2005 1:10 PM
No Starch Press
© 2005 by Tony Bove