EFTA00176507.pdf
PDF Source (No Download)
Extracted Text (OCR)
SUN (2007 Lefcourt+Dersroni ta
tv Sloman
EFTA00176507
LAW OFFICES OF
GERALD B. LEFammer, P.C.
A PROFESSIONAL CORPORATION
148 EAST 78Th
NEW YORE, NEW YORK 10021
GERALD B. LEFCOURT
lecourt@iefoourtlaw.corn
SHERYL E. REICH
NIcletcourtlawoom
RENATO C. STABILE
slabIle&elcourIlawcorn
FAITH A. FRIEDMAN
ffriocknon©lekoulaw.con
BY FEDERAL EXPRESS
TELEPHONE
FACSIMILE
July 6, 2007
Jeffrey Sloman, Esq., First Assistant United States Attorney
Matthew Menchel, Esq., Chief, Criminal Division
The United States Attorney's Office
Southern District of Florida
99 NE 4th Street
Miami, Florida 33132
Andrew Lourie, Deputy Chief, Northern Region
A. Marie Villafaila, Assistant United States Attorney
The United States Attorney's Office
Southern District of Florida
500 South Australian Avenue, Suite 400
West Palm Beach, Florida 33401
Jeffrey Epstein
Dear Messrs. Sloman, Menchel and Lourie and Ms. Villafafia:
We write as counsel to Jeffrey Epstein to follow-up on our meeting on June 26,
2007. We thought the meeting was extremely productive and appreciate your giving us
the opportunity to engage you on the facts, law and policy that will inform any decision
you make on how and whether to proceed.
I.
18 U.S.C. §2422(b) Has No Applicability to the Facts Here.
Even assuming the facts as you believe them to be, as demonstrated below, a
prosecution under 18 U.S.C. §2422(b) would violate the explicit terms of the statute, pose
insurmountable constitutional barriers, and be unprecedented, unwise, and utterly
inappropriate. This statute, with its mandatory minimum sentence' was designed to reach
I The statute in effect during the events at issue carries a mandatory five-year period of
incarceration. The current ten-year mandatory minimum was instituted in 2006.
EFTA00176508
LAW °MCC!,
OF
GERALD B. LEFCOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 2
those who deliberately, knowingly, and intentionally target and exploit children through
the intemet. Though the literal language may superficially apply to a wider variety of
behaviors, we submit that the statute cannot properly be used to prosecute what have
traditionally been viewed as state offenses, even if some facility or means of interstate
commerce can be said to have been used by someone at some point during the course of
events.
1.
Congress's Purpose
Section 2422(b), the so-called "Internet Luring Statute", addresses online
enticement of children. The subsection was included in Title, of the
Telecommunications Act of 1996, entitled "Obscenity and Violence", after the Senate
Judiciary Committee held a hearing regarding child endangerment via the intemet. See
H.R. Conf. Rep. No. 104-458, at 193 (1996), quoted in United States I Searcy, 418 F.3d
1193, 1197 (11th Cir. 2005); see also K. Seto, "Note: How Should Legislation Deal with
Children and the Victims and Perpetrators of Cyberstalking?" 9 Cardoso Women k L.J. 67
(2002).
In enacting the statute, Congress recognized that young people were using the
intemet in ever-increasing numbers, and it was proving to be a dangerous place.
According to a DOJ study, one in five youths (aged 10 to 17) had received a sexual
approach or solicitation over the intemet in the previous year. One in 33 had received an
"aggressive sexual solicitation", in which a predator had asked a young person to meet
somewhere or called a young person on the phone. U.S.D.O.J., Office of Justice
Programs, OVC Bulletin," Internet Crimes Against Children" (12/2001);
www.oip.usdoj.gov/ovc/aublications/bulletons/intemet " 2 2001/intemet _2_01_6.html.
Congress saw that, with so many children online, the interne created a new place
— cyberspace — where predators could easily target children for criminal acts. Use of the
intemet, which occurs in private, and the secrecy and deception that acting in cyberspace
permits, eliminated many of the risks predators face when making contact in person, and
presented special law enforcement problems that are difficult for any local jurisdiction to
tackle. The mandatory minimum sentence for a violation of this section was increased
from five years to ten years in 2006, by virtue of the Adam Walsh Child Protection and
Safety Act of 2006, which also eliminated any statute of limitations. See 18 U.S.C.
EFTA00176509
LAW OFFICES OF
GERALD B. LEFCOLTRT. PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 3
§3299.2 The law was named in memory of Adam Walsh who, 25 years earlier, had been
abducted from a department store and was later found murdered, and whose parents had
become advocates for missing children. In his signing statement, President Bush noted
that it increased federal penalties for crimes against children, imposing "tough mandatory
minimum penalties for the most serious crimes against our children." 2006
U.S.C.C.A.N. S35, 2006 WL 3064686 (emphasis added). The five-year mandatory
minimum it replaced was itself established as part of the PROTECT Act of 2003, another
law designed to strengthen the government's ability to deal with certain dangerous sexual
predators who exploited children in ways the states had been unable to address fully.3
2.
General Overview
It must be remembered that §2422(b), by using the phrase "any sexual activity for
which any person can be charged with a criminal offense", in some sense incorporates
all the sex offense laws of all 50 states, in all their variety and in all their ambiguity. This
in itself raises questions of the utmost seriousness, implicating fairness and the due
process clause. It also constitutes an extreme example of federal pre-emption, or, more
precisely, the wholesale annexation of the enforcement responsibility of each of the 50
states' sex-related crime statutes — whether felony, misdemeanor or violation — wherever
there has been use of the ever-present wires. To make every state sex "offense" involving
a person under 18 potentially into a mandatory minimum ten-year federal felony without
any statute of limitations is certainly not what Congress had in mind when it enacted
§2422(b).
2 Other federal crimes with ten-year mandatory minimum involve very serious acts. See, e.g., 18
U.S.C. §2113(e) (bank robbery where a person is killed or kidnapped); 18 U.S.C. §924 (involving
discharge of firearm).
3 Section 2422(b) has always carried a substantial penalty. When first enacted, the maximum
sentence it permitted was ten years. Pub.L. 104-104, Title I Sec. 508, 110 Stat. 137. After that,
the maximum was increased to 15 years. Pub.L. 105-314, Ale I, sec, 102, 112 Stat. 2975 (Oct.
30, 1998 to April 29, 2003).
4 A phrase which, by itself, and in the context of the remainder of the statute, raises mind-
numbing questions as to what, exactly, is proscribed.
EFTA00176510
LAW orreccs or
GERALD B. LEFCO1URT. P.C.
C
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 4
The bulk importation of complex bodies of state law is highly problematic, and
strongly counsels that such matters should be left to the states except in those rare
circumstances where both a federal interest is clear and weighty, and the states are for
some reason incapable of acting. Like issues of family law, these issues are
quintessentially of state concern within our federal system.
State laws regarding both sexual activity and the age of consent to engage therein
are hugely varied, reflecting different histories, values, politics, and personalities. See
Richard A. Posner & Katharine B. Silbaugh, A Guide to America's Sex Laws (1996). The
various and shifting societal reasons underlying those laws, and the societal pressures
operating in the area, where sexual mores change over time, complicate the matter even
further. See generally Richard A. Posner, Sex and Reason (1992). The history of the
Mann Act confirms the caution with which the federal government should approach this
entire area. For example, historically, the Act was used by some prosecutors in some
jurisdictions to prosecute acts — such as a man traveling with his paramour — which, we
submit, never implicated a legitimate federal concern. See generally D.J. Langum,
Crossing the Lines: Legislating Morality Under the Mann Act (1994).
Even where there is broad agreement that certain conduct should be criminalized,
the various states treat the very same conduct differently; to apply such laws selectively
by different federal prosecutors would undermine further what uniformity does exist. In
New York, for example, a 50 year old man who patronizes a 15 year old prostitute is
guilty of a Class A misdemeanor. New York Penal Law §230.04. If §2422(b) were read
expansively, then such person would face a 10-year mandatory minimum if he used the
telephone to set-up his date with the young prostitute, even if the date never happened.
And that would be so even if the prostitute were 17 'A (and despite the fact that in New
York the age of consent is 17, since prostitution is a "sexual offense" in New York).
Clearly, these are applications and outcomes Congress did not contemplate when it
enacted the law.
Instead, these are matters best left to state law and state law enforcement. In the
state, prosecutors and law enforcement authorities, who have far more experience dealing
with sexual crimes, can exercise their discretion as to whom to prosecute and for what
charges, taking into account both local attitudes and the wide range of circumstances that
may exist when sexual offenses, or possible sexual offenses, involving minors were, or
may have been, committed. That is particularly so since state laws generally permit the
exercise of sentencing discretion, allowing the punishment to fit both the crime and the
EFTA00176511
LAW CWINCEJ or
GERALD B. LEFCOURT, P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 5
perpetrator. Section 2422(b), with its ten-year mandatory minimum is far too blunt a tool
to use in any circumstances except the narrow, clear-cut, and egregious circumstances
Congress had in mind when it enacted this law.5
Though §2422(b) is susceptible to multiple interpretations, it was designed to
address a specific a problem with which Mr. Epstein's case has nothing in common. If
stretched to reach beyond the core concern of the statute, a host of problems immediately
arise. A simple reading of the words of the statute leaves any reasonable reader with far
more questions than answers as to what is illegal. Any attempt to apply the statute to Mr.
Epstein's situation highlights the many problems of vagueness, overbreadth, and simple
incomprehensibility lurking in or just below the statute's text.
3.
The Statute's Text And Its Thrust
Section 2422(b) currently provides:
Whoever, using the mail or any facility or means of
interstate or foreign commerce, or within the special
maritime and territorial jurisdiction of the United
States knowingly persuades, induces, entices or
coerces any individual who has not attained the age
of 18 years, to engage in prostitution or any sexual
activity for which any person can be charged with a
criminal offense, or attempts to do so, shall be fined
under this title and imprisoned not less than ten
years or for life.
The statutory language and reported decisions confirm the statute's important, but
narrow, focus: the luring of children over the intemet. Unlike 18 U.S.C. §§2241 et seq.,
5 Penalties under state statutes criminalizing online enticement also vary widely. According to the
National Center for Missing and Exploited Children, though the offense can be a felony in all
states, l5 states permit misdemeanor sentences in some cases (generally where the victim is 14 or
older). Nineteen states classify online enticement as a felony, but grant judges statutory
discretion to sentence offenders to less than one year in prison
/missingkids/servlet/NewsEventServlet?LanguageCounuy=en... 6/28/2007.
EFTA00176512
LAW orriccs OF
GERALD B. LEFCOTJET. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafla, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 6
§2422(b) does not establish any federal sex crimes with a minor. Section 2422's subject
is not sex or sexual activity or face-to-face sexual exploitation of minors. Such behavior
remains a matter of state, not federal, concern. The plain language of the statute
mandates focus on the communication and demands that the knowing "persuasion",
"inducement", "enticement" or "coercion" be done "using the mail or any facility or
means of interstate ...commerce" (emphasis added). Any other reading would violate
constitutional principles of fair warning, notice, lenity and due process. Additionally, any
broader reading would violate the clearly stated intent of Congress that enacted the law
and the President who signed it. It would also exceed the authority of Congress under the
Commerce Clause by federalizing virtually all state sex offenses involving people under
the age of 18.
Section 2422(b) defines a crime of communication, not of contact. It makes
unlawful a narrow category of communications, ones not protected by the First
Amendment. Both the attempt and the substantive crime defined by §2422 are complete
at the time when communication with a minor or purported minor takes place; the essence
of the crime occurs before any face-to-face meeting or any sexual activity with a minor,
and regardless of whether any meeting or activity ever occurs.
Turning the statute on its head by first looking at the alleged sexual activities and
then seeking to find a mailing, a use of the wires, or the involvement of another facility or
means of interstate commerce as a pretext for the invocation of federal jurisdiction would
be without precedent and make a narrowly-focused statute into virtually a complete
federalization of all state sex offenses involving minors.
4. The Statute Is Violated Only If A Facility Or Means Of Interstate
Commerce Is Used To Do the Persuading Or Inducing
Though the statute raises several difficult issues of construction, on one point it is
clear and unambiguous: To be guilty of a crime under §2422(b), the mail or a facility or
means of interstate commerce must be used to do the persuading or inducing. As the
Court wrote in United States I=
165 F.3d Appx. 586, 2006 WL 226038 (10th Cir.
2006), to prove a violation, the government must show "(1) the use of a facility of
interstate commerce; (2) to knowingly persuade, induce, entice or coerce, as well as
the other elements. See also United States' Bolen, 136 Fed. Appx. 325, 2005 WL
1475845 (11th Cir. 2005).
EFTA00176513
LAW OIIICL• or
GERALD B. LEFCOURT. PC.
C
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafana, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 7
The statutory language can bear no other construction. The words "whoever,
using . . . knowingly persuades .. ." necessarily requires that the "whoever" must "use"
the interstate facility to knowingly persuade. That is, the word "using" is in the present,
not the past, tense. Thus, the "using" must occur at the same time as the "persuading". If
the statute meant otherwise, it could and would have been drafted differently: "whoever
having used the mail and knowingly persuades" or "whoever uses the mail and
knowingly persuades". But, as it is written, the actor must use the interstate facility to
persuade or to entice, or to attempt to do so; use of the instrumentality cannot be
incidental or peripheral.
Indeed, assuming, arguendo, that the grammar and structure of the statute would
allow another interpretation — which we believe it does not — nevertheless the obvious,
straightforward reading controls. Anything else would violate the rule of lenity, requiring
strict construction of penal statutes, as well as the requirement of fair notice guaranteed
by the due process clause. 6 As Thomas Jefferson put it in 1823: "Laws are made for men
of ordinary understanding, and should therefore be construed by the ordinary rules of
common sense. Their meaning is not to be sought for in metaphysical subtleties, which
may make any thing mean every thing or nothing, at pleasure".
According to one of the world's leading experts on grammar and specifically, the
syntax and semantics of verbs, these rules of "ordinary understanding" and "common
sense" dictate that
. . . an English speaker, reading the statute, would naturally
understand it as applying only to persuasion (etc.) that is
done while "using the mail" (etc.). To understand it as
applying to persuasion (etc.) done subsequent to the use of
6 We note that the structure of this statute is radically different from the structure of §1341, the
mail fraud statute. There, the statute first describes the fraud and recognizes the federal concern
by requiring, for purposes of executing such scheme or artifice, that the defendant use the mail.
Section 2422(b) on the other hand defines the crime as using the mail to knowingly persuade, etc.
The difference in the language and structure of the two crimes clearly shows that with §2422(b),
using the mail to knowingly persuade is the essence of the crime.
EFTA00176514
LAW orriccs or
GKRALD B. LEPODITRT. P.C.
('
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafaila, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 8
the mail, phone, etc., would be an unnatural and
grammatically inaccurate reading of the language. 7
That the statute is so limited is also confirmed by the fact that prosecutors have
clearly understood this limitation. After conducting extensive research, we find no case
of a defendant being prosecuted under §2422(b) where he has used the internet or the
telephone, and then, by some other means, such as personal contact, attempted to
persuade, induce, or entice. On the contrary, all §2422(b) prosecutions we have reviewed
are premised on a defendant's use of the internet (or occasionally the text messaging on a
phone) as the vehicle of the inducement. See, e.g., United States, Murrel, 368 F.3d
1283, 1286 (11th Cir. 2004) (government must ... prove that Murrel , using the intemet,
acted with a specific intent to persuade a means to engage in unlawful sex).
In fact, we have reviewed every indictment filed in the Southern District of
Florida in which there is at least one allegation of a violation of §2422(b). To the extent
the facts could be discerned from the indictment, we found no case brought where the use
of the means of communication was remote from the persuading, coercion, etc.s
Such prosecutorial restraint is in full accord with the legislative intent, which, as
set forth above, was to go after intemet predators who use the means of communication
to persuade, coerce, etc. That the statute also makes reference to the mails and facilities
or means of interstate commerce other than the intend does not suggest that the statutory
purpose was broader: it is a common modus operandi of intemet predators to continue to
pursue young people whom they first contact on the intemet. If the statute were read to
make it a crime to induce or persuade where the inducement or persuasion did not occur
over the wires, the statute would sweep within it conduct that Congress had no intention
of making a federal crime. Given the ubiquity of the telephone in modem life, especially
To confirm our view of the "plain meaning" of the words, we asked Steven Pinker, Johnstone
Family Professor at Harvard University's Department of Psychology and a noted linguist, to
analyze the statute to determine the natural and linguistically logical reading or readings of the
section. Specifically, we asked whether the statute contemplates necessarily that the means of
communication must be the vehicle through which the persuading or enticing directly occurs.
According to Dr. Pinker, that is the sole rational reading in the English language. See Letter
annexed at Tab "A" at 3.
8 Annexed at Tab "B" is a chart in which each of the cases and its relevant facts are listed.
EFTA00176515
LAW OFFICILS or
GERALD B. LEFCOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 9
in the lives of young people, de-coupling the "persuasion/enticement" element from the
"use of the interstate facility" would make virtually any sexual activity with a minor,
chargeable under state law, a federal offense — with no statute of limitations and a
mandatory ten-year minimum sentence.
Indeed, given that the interstate highway system is itself an avenue of interstate
commerce, United States'. Home, 474 F.2d 1004, 1006 (7th Cir. 2007), allowing a
prosecution wherever a means or facility of interstate commerce is used and a forbidden
inducement later occurs, would mean that anyone who used the interstate highways, and
then, at some other time, induced a minor face-to-face to engage in forbidden activity (or
attempted to do so), would be subject to the mandatory ten years. The complete
federalization of sex crimes involving children would have occurred, though there is no
indication whatsoever that such a sea change in the federal/state balance was intended or
is even needed.
Moreover, such an expansive reading, even if permissible, would very likely
exceed the Commerce Clause power as the Supreme Court presently construes it. In
United Statest.
, 514 U.S. 549 (1995), the Supreme Court struck down the Gun-
Free School Zones Act, holding that it exceeded Congress's Commerce Clause authority.
In so ruling, the Court reaffirmed a set of fundamental principles, including that the
powers delegated to the federal government are few and defined, and that this
"constitutionally mandated division of authority was adopted by the Fjamers to ensure
protection of our fundamental
Id. at 552, quoting Gregory'. Ashcroft, 501
U.S. 452, 458 (1991). The
majority concluded that the statute before the Court
"upsets the federal balance to a degree that renders it an unconstitutional assertion of the
commerce power." Id at 580. In so ruling, the Court expressed its concern that an
overly expansive view of the interstate Commerce Clause "would effectively obliterate
the distinction between what is national and what is local and create a completely
centralized government." Id. at 557.
4
Makin it clear that the Court meant what it said in
five years later, in
United States' Morrison, 529 U.S. 598 (2000), the Court struck down the civil remedy
provision of the Violence Against Women Act of 1994, ruling that it, too, was beyond
Congress's Commerce Clause powers. Once again, the majority expressed concern that
"Congress might use the Commerce Clause to completely obliterate the Constitution's
distinction between national and local authority." Id at 615.
EFTA00176516
LAW orriccs or
GERALD B. LEFCOURT. PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Laurie, Esq.
A. Marie Villafafla, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 10
To the extent that §2422(b) criminalizes the use of the internet (or telephone) by a
sexual predator to target a vulnerable minor and to convince, or to try to convince, her to
engage in conduct proscribed by law, the statute may not be unconstitutional on its face.
See United States'. Tykarsky, 446 F.3d 458, 470 (3d Cir. 2006) (both §§ 2422(b) and
2423(6) "fall squarely Congress's power to regulate the first two categories of
activities described in..."). The statute would, however, be plainly unconstitutional if
it were applied to situations like Mr. Epstein's, where neither the telephone nor the
internet was used in that fashion, and where the use of the telephone was, at most, a
tenuous link in a chain of events that may, or may not, have preceded or followed sexual
contact with a minor? In other words, if the instrumentality of commerce is not the
vehicle used to facilitate the harm Congress is trying to address, but is simply a
"jurisdictional hook," the hook is too weakly connected to the problem (sexual crimes
against minors) to sustain the statute as a proper exercise of Commerce Clause power.
Questions about the nature of federalism, and, specifically, just how far the
federal government may go into matters of traditionally state concern, will continue to
arise and will be answered case-by-case. As Justice O'Connor said in her dissent in
Gonzales'. Raich, 545 U.S. 1, 47 (2005), ". . . the task is to identify a mode of analysis
that allows Congress to regulate more than nothing ... and less than everything..."
(O'Connor, J. dissenting). United States'. Ballinger, 395 F.3d 1218 (11th Cir. 2005),
illustrates the difficulty of the task. In that case, the deeply split en banc Court
considered whether and to what extent the Commerce Clause authority included the
power to punish a church arsonist who had traveled in interstate commerce to commit his
arsons.
Though clearly not settled, what is clear is that Congress's specification of a
jurisdictional element such as the use of an instrumentality or channel of interstate
9 As can be readily noted on the chart at Tab "B", to the extent discernable, every case brought
under §2422(b) in this district includes use of the internet. There are only four reported cases in
the Eleventh Circuit involving use of the phones only: three of them concern telephone calls to
travel agencies advertising overseas underage sex tou
and involved explicit talk of sexual
activity with known minors. A fourth is United States' Evans, 476 F.3d 1176 (11ih Cir. 2007)
(11th Cir, 2007). But there, in facts far different from those presented here, the defendant
"admitted using both a cellular telephone and a land-line telephone to entice Jane Doe to engage
in prostitution" (emphasis added). That admission makes Evans no precedent for a prosecution
here, since there is no evidence the phones were used "to entice".
EFTA00176517
LAW OMGCS Of
GERALD B. LBECOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 11
commerce does not, in and of itself, end the inquiry. Where the use of such
instrumentality is far removed from the conduct being targeted (in the case of §2422(b),
sexual exploitation of children), the lack of any basis for federal jurisdiction presents
itself squarely.
In Mr. Epstein's case, since the crime being considered (as Congress intended) is
the use of the internet by internet predators to target and lure vulnerable children to
engage in illicit sex, the law is arguably within Congress' Commerce Clause powers. But
Mr. Epstein's conduct would be outside the law's scope. If you were to contend that any
use of the telephone which is connected in any fashion to an act of sexual misconduct
with a minor is within the statute's scope, Congress would then have reached well into
traditional state spheres, and there is a powerful argument that Congress would have been
acting in excess of its Commerce Clause authority.
Elimination of Constitutional uncertainty regarding §2422(b) depends upon
confining it to situations where an instrumentality of interstate commerce has itself been
used for an immoral or injurious purpose. Statutes must be read to eliminate serious
doubts as to Constitutionality, as long as such a reading is not plainly contrary to the
intent of Congress. United States i X-Citement Video, Inc., 513 U.S. 64, 78 (1994),
citing Edward J. DeBartolo_Corp. . Florida Gulf Coast Building & Constr. Thades
Council, 485 U.S. 568 (1988). At the least, to eliminate questions as to its
constitutionality, §2422(b)'s reach must be limited to situations where there is a very
close connection between the use of an instrumentality of interstate commerce and the
persuasion or attempted persuasion that the statute makes a crime.
Moreover, even if, arguendo, the expansive reading of the statute would not
violate the Commerce Clause — which current case law strongly suggests it would —
nevertheless the federal interest in prosecuting sexual offenses involving minors where
the facility or means of interstate commerce was not the vehicle for committing the crime
is so attenuated that no such federal prosecution should be brought.
Here, there is no evidence that Mr. Epstein himself ever persuaded, induced,
enticed, or coerced anyone under the age of 18 over the telephone or internet to engage in
prostitution or other illegal conduct. Any prosecution would therefore have to be
predicated on a theory that he was criminally culpable for a telephone call made by a
third party. Such a theory of vicarious liability requires proof beyond a reasonable doubt
that the person making the telephone call and Mr. Epstein shared the same criminal intent
EFTA00176518
LAW *FMCS or
GERALD B. LEFCOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 12
and knowledge and, critically, that the shared intent and knowledge existed at the time of
the communication in question. Absent proof beyond a reasonable doubt that Mr.
Epstein had actual knowledge that the person making a telephone call would induce or
persuade a specific underage person during the telephone call to engage in unlawful
sexual activity or to engage in prostitution, there can be no federal crime.
If the telephone call in question were simply to schedule a topless massage, then
the call lacked the essential element of inducement, persuasion, enticement, or coercion.
If the telephone call in question was to schedule a topless massage (or even more) with a
woman whose age was not known by Mr. Epstein to be under 18, it also fails to satisfy
the requirements of §2422(b). If Mr. Epstein had not formed the intent to engage in
unlawful sexual activity as of the time of the communication (even if he did form the
intent thereafter), an essential element of the federal statute is again lacking. If the
person making the call had knowledge or a criminal intent or belief not fully shared by
Mr. Epstein (for example, Mr. Epstein did not know the telephone call was intended to
induce a minor to engage in unlawful activity), the essential element of shared intent and
shared knowledge is again lacking.1° Finally, even if there were a call to schedule a
second meeting with someone who had previously been to the Epstein residence, this call
lacks the necessary element of persuasion, inducement, or enticing even if the person
receiving the call hoped or expected remuneration from the return visit. That is so
because the statute focuses on the content of the communication, not on any quid pro quo
that occurs thereafter at a meeting. The latter conduct is exclusively within the ambit of
state prosecution.
5. Other Reasons Whv 4 2422(b) Does Not Apply
As we demonstrate above, this statute is addressed to those who purposely and
intentionally target children. Here, there was no such targeting. As the Sixth Circuit said
in rejecting a First Amendment challenge to the statute: "The statute only applies to those
who `knowingly' persuade or entice, or attempt to persuade or enticesminors. United
States' Bailey, 228 F.3d 637, 639 (6th Cir. 2000). See United States'. Pcmfil, 338 F.3d
1° Indeed, this last problem is best illustrated by any cal
may claim to have made
to solicit persons to massage Mr. Epstein. Though Ms.
may have known the actual ages
of the women whom she called at the time she called, and may therefore have known that one or
more was in fact under 18, she was clear in speaking to detectives that she never communicated
such information to Mr. Epstein. Rather, she unders
on
wanted massages from
women at least 18 years of age. (Video Interview oft.
on October 3, 2005).
EFTA00176519
LAW OrrICCO or
GERALD B. LEFCOUler, P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 13
1299 (11th Cir. 2003) (scienter requirement discourages "unscrupulous enforcement" and
clarifies §2422(b)). Directed towards those who commit "the most serious crimes against
children," it cannot properly be used as a trap for the unwary, sweeping within its net all
who may — even unwittingly and unintentionally — communicate or otherwise interact
improperly with persons who turn out to be minors.
A prosecution of Mr. Epstein would violate the teachings of Bailey and Panfil. As
we believe we persuaded you at the June 26th meeting, Mr. Epstein never targeted minors.
On the contrary, what he did — at worst — was akin to putting up a sign saying to all, come
in if you are interested in giving a massage for $200. A few among those who accepted
the general invitation may have in fact been under 18 (though they lied about that age and
said they were 18), but that is, at its worst, comparable to "post[ing] messages for all
intemet users, either adults or children, to seek out and read at their discretion," which the
courts have held does not violate §2422(b).
Thus, for this reason as well, Mr. Epstein's case is far outside the parameters of
the §2422(b) cases that have been prosecuted. A key factor common to cases brought
under §2422(b) is not present here: Prosecutions under this statute have focused on a
sexual predator who used the internet to identify and to communicate with a child or
purported child (or a person with influence over such child or purported child), and did so
with the intent to arrange to engage in sexual activity with the child, with full knowledge
that sexual activity with an individual of that age was illegal. In light of this common and
well-accepted understanding, the cases decided under §2422(b) take as a given that its
proper application lies only where the defendant knows or believes the person with whom
he is interacting is a child.
Virtually all of the prosecutions brought under §2422(b) resulting in published
decisions have involved undercover "sting" operations, involving an essentially standard
fact pattern in which over an extended period of time and in the course of multiple
conversations on line an undercover agent pretends to be a young teenager. In each of the
cases, the prosecution had, from the very words used by the defendant, an all but
irrefutable case showing the clear knowledge and intent of the defendant. A prototypical
case is United States' Farner, 251 F.3d 510 (5th Cir. 2001), where the defendant
participated, over time, in instant messaging, e-mail, and follow-up telephone calls with a
person who identified herself as 14 years old, engaged in explicit internet conversation,
sent her pornographic pictures, persuaded her to meet with him for sexual activity,
arranged such a meeting, and traveled to the meeting place. The Fifth Circuit held that
EFTA00176520
LAW OFFICES OF
GERALD B. LEFCOURT. PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafla, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 14
defendant's §2422(b) attempt conviction was valid; it mattered not that the 14 year old
was really an adult FBI agent engaged in a sting operation, for the defendant "believed
Cindy to be a minor and acted on that belief." 251 F.3d at 512. Our own survey of the
cases brought in this district under §2422(b) confirms that prosecutions in this District
have also been all but limited to intemet sting cases. See Tab "B".
In the context of this standard fact pattern involving the internet's use by
predators, other Circuits, including the Eleventh, have been unanimous in holding that the
non-existence of an actual minor was of no moment; defendant's belief that hs was
dealing with a minor was sufficient to make out the crime. See United States'. Root, 296
F.3d 1222, 1227-32 (j1 di Cir. 2002); United States' Sims, 428 F.3d 945, 9a9 (10th Cir.
2005); United Stalest. Helder, 452 F.3d 751 (8th Cir. 2006); United States'. Meek, 366
F.3d 705, 717-20 (9th Cir. 2004). Likewise, the Circuits have rejected void for vagueness,
overbreadth, and First Amendment challenges to the statute, brought in the context of
these prototypical prosecutions where the internet was the vehicle of communication and
enticement, and the defendant demonstrated in writing his
lief that he was dealing with
a child well below the age ofsonsent. E.g., United States'. Tykarslcy, 446 F.3d 458, 473
(3d Cir. 2006); United States'. Thomas, 410 F.3d 1235, 1243-44 (10th Cir. 2005); United
Statest Panfil, supra, 338 F.3d at 1300-01 (11th Cir. 2003)."
II There are approximately two dozen Eleventh Circuit cases that include a prosecutio under
§2422(b), most of which involve the prototypical fact pattern. See, e.g., United States'. Morton,
364 F.3d 1300 (I I* Cir. 2004), judgment vacated for Booker consideration, 115 S. Ct. 1338
(2006); United Stalest Grego, 363 F.3d 1093 (II* Cir. 2004); United States'. Miranda, 348
F.3d 1322 (I I lb Cir. 2003); United States'. 7illmon, 195 F.3d 640 (11* Cir. 1999); United States1
&mill, supra, 338 F.3d 1299 (11* Cir. 2003); United Stalest. Garrett, 190 F.3d 1220 (11th Cir.
1999); United States' Burgess, 175 F.3d j261 (11th Cir. 1999); United States' Rojas, 145 Fed.
Appx. 647 (11* Cir. 2005); United States'. Root, 296 F.3d 1222 (11th Cir. 2002).
United Stalest Murrell, 368 F.3d 1283 (116 Cir. 2004), is in the same mold, except that, in that
sting operation, the defendant communicated, not with the purported 13 year old girl, but with an
undercover agent holding himself out to be the imaginary girl's father. The initial contacts
between Murrell and the agent occurred in internet chatrooms named "family love" and "Rent F
Vry Yng." Over time, Murrell sought to make arrangements with the girl's father to make his
daughter available for sex in exchange for money. After the initial intemet communications
concerning renting the girl for sexual purposes, further negotiations between the defendant and
the undercover occurred via the phone, per the defendant's suggestion. The Eleventh Circuit,
framing the issue to be whether the defendant must communicate directly with the minor or
supposed minor to violate §2422(b), answered the question in the negative, reasoning that "the
EFTA00176521
LAW OFFICES OF
GERALD B. Lamour:et PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 15
In light of this common and well-accepted understanding, the cases decided under
§2422(b) take as a given that its proper application lies only where the facts demonstrate
beyond dispute that the defendant knows or believes the person with whom he is
interacting is a minor.
The Ninth Circuit has so held. United States' Meek 366 F.3d 705, 718 (9h Cir.
2004), held that the term "knowingly" refers both to the verbs — "persuades", "induces",
"entices", or "coerces" — as well as to the object — "a person who has not achieved the
age of 18 years," citing United States' X-Citement Video, Inc., 513 U.S. 64 (1994), and
Staples' United States, 511 U.S. 606 (1994). The Meek Court wrote:
The statute requires mens rea, that is, a guilty mind. The
guilt arises from the defendant's knowledge of what he
intends to do. In this case, knowledge is subjective — it is
what is in the mind of the defendant.'
The very lengthy sentence under §2422(b) speaks against strict liability,
especially since it applies in cases where there is no sexual contact at all with any
person, let alone with a real minor. The Eleventh Circuit's decision in United States
Murrell, supra, reflects this same understanding of the statute. The Murrell court wrote
that, under the "plain language" of §2422(b), "to prove an attempt the government must
efficacy of §2422(b) would be eviscerated if a defendant could circumvent the statute simply by
employing an intermediary to carry out his intended objective. Id. at 1287. Fact patterns similar
to Murrell's exist in United States Hornaday, 392 F.3d 1306 (11 di Cir. 2004); United States
Houston, 177 Fed. Aepx. 57 (11" Cir. 2006); Chilled States' Searcy, 418 F.3d 1193 (11* Cir.
2005); United States' Scott, 426 F. 3d 1324 (11th Cir. 2005); and United States. Bolen, 136 Fed.
Appx. 325 (I Id' Cir. 2002).
12 Several Courts of Appeal have held that, in a prosecution under §2422(a), the defendant need
not know that the individual that a defendant has persuaded, induced, enticed, or coerced to
travel in interstate commerce is under the age of 18. United States Jones, 471 F.3d 535 (4th
Cir. 2006), is one of these cases, though its facts are very different, and much more egregious
than Mr. Epstein's. Assuming Jones was correctly decided and that the government need not
prove defendant's knowledge under §2422(a), that still does not answer the question under
§2422(b). The two are very different statutes, with different histories and different purposes.
And §2422(a), unlike subsection (b), carries no mandatory minimum sentence, let alone ten years.
EFTA00176522
LAW OIIICL• 01
GERat. B. Lisrcourr. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 16
first prove that Murrell, using the intemet, acted with a specific intent to persuade a
minor to engage in unlawful sex." 368 F.3d at 1286 (emphasis added).11 United States
Root, supra, 296 F.3d at 1227, follows this pattern, and confirms that, at the time the
defendant induces or entices the minor, he must intend to have sexual conduct with a
minor or one he believes to be a minor and know that such conduct is proscribed.
("Root's statement to task force agents upon his arrest confirmed that he believed he
would meet a 13-yearvld girl for sex, which he said he knew was wrong but `exciting").
See also United States'. Rojas, 145 Fed. Appx. 647 (11th Cir. 2005) (unpublished). This
mens rea requirement applies equally where the completed crime occurs.14
Finally, actus non Tacit reum, nisi mens sit rea — the act alone does not amount to
el<
guilt; it must be accompanied by a guilty mind. This principle of concurrence mandates
that the actus reus and the mens reus concur in time. See Paul H. Robinson, Criminal
Law §4.1 at 217 (1997) (concurrence requirement "means that the required culpability as
to the element must exist at the time of the conduct constituting the offense"); LaFave,
Substantive Criminal Law §3.11(a) (West 1986) (noting that Concurrence is a basic
principle of criminal law and "the better view is that there is concurrence when tke
defendant's mental state actuates the physical conduct"). See also United Stalest Bailey.
supra, 444 U.S. at 402. In this case, the requisite actus reus is absent; likewise the
required mental state. Even if those two fatal defects could be set aside, nevertheless,
there was no concurrence of guilty mind and evil act, providing an additional reason why
a successful prosecution under §2422(b) could not be brought.
6. Conclusion
In Mr. Epstein's case, there was no use of the intemet to induce, etc., and, given
the legislative history and purpose, that is itself dispositive. Nor does the case present
any of the dangers associated with intemet predators and cyberspace. Not surprisingly
13 Otherwise, the police could, for example, conduct a sting operation with a 17 year-old
pretending to be an 18 year-old. Such an absurd operation is surely not intended by the statute.
14 Even the completed crime does not require any sexual activity. Arguably, one commits the
attempt offense when the actor, on the intemet, asks a known or believed-to-be minor to have sex,
even if she says no. The completed offense occurs when he takes an additional step, even before
any sexual activity and regardless of whether one ever takes place.
EFTA00176523
LAW OFFICES OF
GEEtALD B. LEFCOURT, PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafaiia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 17
then, the statutory language does not fit: Mr. Epstein did not use any facility of interstate
commerce to do the forbidden act — to persuade, entice, induce, or coerce — nor did he
attempt to do so. Others did use the telephone to make a variety of arrangements for Mr.
Epstein's residence in Palm Beach, including getting the house ready for his arrival,
checking movie schedules, and making telephone calls to schedule doctor's
appointments, personal training, physical therapy and massages. Even if Mr. Epstein
could be held responsible for the use of the telephone on his behalf, nevertheless, calls
made by others regarding massages were not the statutorily proscribed persuasions or
enticements of a known minor to do acts known to be illegal. Within his home, even if
Mr. Epstein may arguably have persuaded or induced individuals to engage in forbidden
conduct with him, he did not violate §2422(b). If he engaged in such persuasion or
inducement, it occurred only face to face and spontaneously.
If such conduct constituted a crime, it would be a classic state offense. The state
is the appropriate forum for addressing these issues. Though in our meeting it was
asserted that cases under §2422(b) are often brought where there was simply use of a
telephone, and casual use at that, it would not from our survey appear to be so on either
count — that is, use of a telephone rather than the intemet, and use of the means of
communication remote from the enticing, etc. This is neither the defendant, nor the
factual context, to break new ground.
II.
Mr. Epstein Warrants Declination to Prosecute as Exercise of Discretion.
t
We believe strongly that no federal case would lie under the facts here. Moreover,
as we discussed, there is a pending state case against Mr. Epstein which can be resolved
in a way that vindicates the state's rights and obligations in this matter.
In considering an appropriate disposition in a case such as this, where the
applicability of the statute, both legally and as a matter of policy, raise serious questions,
and both the reliability and admissibility of much of the evidence is in doubt, it is useful
to consider how best to use the broad discretion you enjoy in choosing whether to
prosecute. In this regard, we suggest that having a greater understanding of who Jeffrey
Epstein is as a person may help inform how best to proceed.
Jeffrey Epstein was raised in a middle class neighborhood in Brooklyn, New
York, by hardworking parents. His father was a laborer and his mother a secretary. They
lived comfortably, but were by no means well off. Mr. Epstein's parents instilled a strong
work ethic in him, and growing up he held a variety of jobs to support himself, from
EFTA00176524
tAW OFFICES OF
GERALD B. Lurcourr, PC.
Jeffrey Simian, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafatia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 18
driving a taxi cab to working as a mechanic. Any notion that he was born with a "silver
spoon in his mouth" should be dismissed.
Although Mr. Epstein is self-made and worked long and hard, he could not have
achieved his successes without the personal guidance and support of others. These key
people first identified the promise in Mr. Epstein and brought him to Bear Stearns and
Company, Inc. There, starting in 1976 at the age of 23 as a floor trader's junior assistant,
he became in 1980 a limited partner. Among the very many benefits that his experience
there provided was an introduction to the people who ultimately became his clients.
Early in his professional career, Mr. Epstein realized the profound impact that
even one person can have on the life of another. His gratitude for the assistance he
personally received, and his sense of obligation to provide similar assistance and
guidance to others, is in large part, the motive for the primacy of philanthropy in his life
or his particular philanthropic interests. Mr. Epstein has devoted a substantial portion of
his time, efforts and financial resources to helping others, both on an individual basis and
on a more far reaching scope. Mr. Epstein gives generously, of both his time and his
financial resources equally to individuals whom he knows personally and well and to
those with whom he has had little or no personal contact. Just a few examples:
Some time ago, the two year old son of an employee was diagnosed with retinal
blastoma. When told, Mr. Epstein not only gave the employee unlimited time off to
attend to his son and promised whatever financial support was needed, but Mr. Epstein
made the full list of his medical and research contacts available. The employee was put
in contact with a former colleague who was then conducting eye research at Washington
University. Mr. Epstein organized several meetings to determine how the colleague could
be of assistance, including by arranging for further meetings with experts at Washington
University. Though the employee's son lost one eye, he is now an otherwise normal
twelve year old who attends private school along with his five siblings, the expenses of
which are borne by Mr. Epstein.
Several years ago, a new employee with whom Mr. Epstein had little or no prior
contact approached Mr. Epstein to request a change in his medical insurance. It was soon
revealed that the employee and his wife were experiencing fertility problems and they
were seeking treatments that cost nearly $15,000 per month. Mr. Epstein insisted on
paying directly for the treatments, and did so month after month. After each
unsuccessful cycle, Mr. Epstein sat with the employee, exploring available alternatives,
including adoption, and encouraging the employee to continue additional cycles at Mr.
Epstein's. Mr. Epstein referred the employee to medical experts with whom Mr. Epstein
EFTA00176525
LAW OFFICES OF
GERALD B. LEFCOURT, PC.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafta, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 19
r
was acquainted and assigned personnel to assist the employee with administrative and
secretarial needs that arose in seeking a solution to the problem. Mr. Epstein is now the
godfather of the employee's seven-year old twins.
Recently, both a second employee and a consultant of Mr. Epstein each confided
that they and their respective spouses were experiencing similar fertility problems.
Again, Mr. Epstein offered to pay the uncovered medical costs. The consultant and his
wife are now expecting their first child. The second employee continues with infertility
treatments.
Two years ago, a building workman approached Mr. Epstein with news that the
workman's wife needed a kidney transplant and that the workman's sister-in-law in
Colombia was a willing donor. The non English speaking workman had neither the
financial resources nor the know-how to get the sister-in-law to the United States. Mr.
Epstein arranged for immigration counsel to expedite a visa for the sister-in-law and
purchased the plane tickets for the sister-in-law's visit to the United States. The surgery
was a success and both patients recovered completely. The sister-in-law flew back to
Colombia at Mt Epstein's expense.
Mr. Epstein is a devoted advocate of personal improvement through education.
As a former board member of Rockefeller University, Mr. Epstein has made available
academic scholarships to worthy students, most of whom he has had no prior connection
to whatsoever. In addition, Mr. Epstein covers the tuition required to send the family
members of his employees to nursery, private elementary, middle and secondary schools
and colleges. He has funded and personally encouraged continuing education programs
for his adult employees and professional consultants.
Among his other acts:
•
On a trip to Rwanda to inspect the genocide camps, Mr. Epstein
approached the President of Rwanda and offered to help identify and then
to fund two worthy Rwandan students to earn undergraduate degrees in
the United States. The students, whom Mr. Epstein did not meet until after
their second year of studies, both are expected to graduate with honors
from the City University of New York in 2008. Notes from each of them
are annexed at Tab "C".
•
Even to those with less lofty goals, seeking only to advance in their chosen
paths, Mr. Epstein freely gives of his time to provide guidance and, when
appropriate, financial support. For example, Mr. Epstein has been meeting
EFTA00176526
LAW orrecc• or
GERALD B. LEFCOURT, P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafafia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 20
monthly with a teenage building workman whose expenses of vocational
school are being paid by Mr. Epstein. Each month, Mr. Epstein reviews
the workman's school progress and discusses career opportunities. One of
the monthly reports is annexed at Tab "D".
•
In addition, Mr. Epstein blocks out time each week to meet with young
professionals to discuss their career prospects and counsel them regarding
appropriate next steps.
Although Mr. Epstein is deeply committed to helping others in very personal and
meaningful ways, he has also sought to use his good fortune to help others on a broader
basis. Mr. Epstein has sponsored more than 70 athlete wellness programs, building
projects, scholarship funds and community interest programs in the United States Virgin
Islands alone.
Moreover, Mr. Epstein has given generously to support philanthropic
organizations across the United States and around the world, including America's
Agenda; Robin Hood; Alliance for Lupus Research; Ovarian Cancer Research Fund;
Friends of Israel Defense Forces; Seeds of Peace; the Jewish National Fund; the Hillel
Foundation; the National Council of Jewish Women; and the Intrepid Fallen Heroes Fund
— to name only a few.
In a feature article about Mr. Epstein in New York Magazine, former President
Clinton aptly described Mr. Epstein as "a committed philanthropist with a keen sense of
global markets and an in-depth knowledge of twenty-first-century science." President
Clinton reached this conclusion during a month-long trip to Africa with Mr. Epstein,
which Mr. Epstein hosted. The purpose of that trip was to increase AIDS awareness; to
work towards a solution to the AIDS crisis; and to provide funding to reduce the costs of
delivering medications to those inflicted with the disease.
Both before and after that trip to Africa, Mr. Epstein worked hard to achieve
improvements in people's lives on a global basis. He actively sought advancement of his
philanthropic goals through his participation and generous support of both the Trilateral
Commission and the Council on Foreign Relations. As you may know, the Trilateral
Commission was formed to foster closer cooperation among core democratic
industrialized areas of the world in the pursuit of goals beneficial to the global
population. The Council on Foreign Relations is an independent, national membership
organization and a nonpartisan center for scholars dedicated to increase international
understanding of world issues and the foreign policy decisions that affect those issues.
EFTA00176527
LAW omen
or
GERALD B. LEFCOURT. PC
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafitfia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 21
Mr. Epstein was part of the original group that conceived the Clinton Global
Initiative, which is described as a project "bringing together a community of global
leaders to devise and implement innovative solutions to some of the world's most
pressing challenges." Focuses of this initiative include poverty, climate change, global
health, and religious and ethnic conflicts.
Mr. Epstein has sought to improve people's lives through active participation in
worthy scientific and academic research projects, as well. He spent hundreds of hours
researching the world's best scientists, and he himself studied as a Harvard Fellow in
order to increase his own knowledge in fields that he believed could provide solutions to
the world's most difficult problems. He is committed to helping the right researchers find
those solutions, especially in the fields of medical science, human behavior and the
environment.
In the past four years alone, Mr. Epstein has made grants to research programs at
major institutions under the supervision of some of the most highly regarded research
professionals and scholars in their fields, including Martin Nowak, a mathematical
biologist who studies, among other things, the dynamics of infectious diseases and cancer
genetics; Martin Seligman, known for his work on Positive Psychology — that is to say
the psychology of personal fulfillment; Roger Schank, a leading researcher in the
application of cognitive learning theory to the curricula of formal education; the renown
physicist/cosmologist
Krauss, and many others. Institutions funded include
Harvard University; Penn State University; Lenox Hill Hospital (New York); the
Biomedical Research and Education Foundation; the Santa Fe Institute; Massachusetts
Institute of Technology; Case Western Reserve University; and Harvard Medical School's
Institute for Music and Brain Science.
Moreover, Mr. Epstein has sponsored and chaired symposia that have provided a
rare opportunity for the world's leading scholars and research professionals to share ideas
across interdisciplinary lines. These leaders gather to discuss important and complex
topics, including the origin of life, systems for understanding human behavior, and
personal genomics.
In order to expand the pool of qualified research professionals actively engaged in
addressing the world's numerous problems, Mr. Epstein co-founded, and served as a
trustee and actively participated in the selection committee of, the Scholar Rescue Fund.
The Scholar Rescue Fund (SRF) is a program of the Institute of International Education,
the group that, inter alia, administers the Fulbright Scholarship program. The SRF
provides support and safe haven to scholars at risk from around the world. Over the past
EFTA00176528
LAW orrice.
OF
GERALD B. LEPDOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie Villafatia, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 22
five years, SRF has made 155 grants to scholars from more than 37 countries. Scholars
are placed at host universities in a safe country. More than 87 institutions around the
world have hosted SRF scholars to date, including eight of the top ten universities in the
United States. Most recently, SRF launched the Iraq Scholar Rescue Project to save
scholars in Iraq, many of whom have been particularly targeted for kidnapping and death
since the conflict there began. Mr. Epstein is a highly valued member of the selection
committee. Just a few articles mentioning these and other projects are annexed at Tab
I
Even a casual review of the good works large and small in which he has involved
himself leads one to conclude that he has a powerful instinct to help others. He does this
not simply because he can, but because he has a deeply ingrained desire to do so. In fact,
he believes that, as a result of his good fortune, he is obligated to do so.
Since 2000, Mr. Epstein has funded educational assistance, science and research
and community and civic activities. As you can see, his philanthropy is not limited to
financial support. To the contrary, it has involved the dedication of a remarkable amount
of his time and effort and has yielded admirable results. It is noteworthy that a majority
of the people he has helped over the years have been those with whom he has had little or
no contact, which further confirms that he derives no personal benefit from his good
works, other than the personal satisfaction derived from using his good fortune to help
others.
The sincere devotion to others evidenced by Mr. Epstein's philanthropic activities
is no less apparent in his interpersonal relationships. Mr. Epstein has maintained both
long term significant, intimate as well as professional relationships. He remains close
personal friends with people with whom he went to high school and, to this day,
maintains close business contacts with his former colleagues at Bear Stearns. Those who
know Mr. Epstein well describe him admittedly as quirky but certainly not immoral; and
overall as kind, generous and warm-hearted. They have remained staunch supporters
despite the lurid media attention during this two-year investigation.
Mr. Epstein acknowledges that the activities under investigation, as well as the
investigation itself, have had and continue to have an unfortunate impact on many people.
With a profound sense of regret, Mr. Epstein hopes to end any further embarrassment to
all who are and who may become involved in this serious matter. Resolution of the
outstanding charges in the state would put an appropriate end to the matter for everyone.
EFTA00176529
LAW orrias or
GERALD B. LEFCOURT. P.C.
Jeffrey Sloman, Esq.
Matthew Menchel, Esq.
Andrew Lourie, Esq.
A. Marie VillafaiIa, Esq.
The United States Attorney's Office
Southern District of Florida
July 6, 2007
Page 23
Again, we and our colleagues thank you for your attention at the June 26 meeting.
I welcome any questions or comments you may have and am available to discuss this and
any other issues at your earliest convenience.
Very truly yours,
Goud?
Gerald B. Lefcourt
cati
a
.O i b m
Alan Dershowitz
cc: Lilly Ann Sanchez, Esq.
Roy Black, Esq.
EFTA00176530
•
C.)
c
EFTA00176531
STEVEN PINKER
Johnstone Family Professor
DEPARTMENT OF PSYCHOLOGY
HARVARD UNIVERSITY
Professor Alan Dershowitz
Harvard Law School
Harvard University
Cambridge, MA 02138
June 28, 2007
Dear Alan,
I'm happy to offer the help of my knowledge in linguistics to determine the natural
interpretation of a statute you have inquired about. My comments refer to how a literate English
speaker would interpret the statute, based on research on the syntax and semantics of verbs. I
consider myself an expert on this topic, having written about it in many scholarly articles and in
three books: Learnability and Cognition (MIT Press, 1989), Lexical and Conceptual Semantics
(coedited with Beth Levin; Blackwell, 1992), and The Stuff of Thought: Language as a Window
into Human Nature (Viking, 2007).
The statute at issue is as follows:
Whoever, using the mail or any facility or means of interstate or
foreign commerce, or within the special maritime and territorial
jurisdiction of the United States knowingly persuades, induces,
entices, or coerces any individual who has not attained the age of
18 years, to engage in prostitution or any sexual activity for which
any person can be charged with a criminal offense, or attempts to
do so, shall be fined under this title and imprisoned not less than
ten years or for life.
Your question, as I understand it, pertains to the temporal and causal relationship
between the person's use of the mail (or other interstate/foreign instrument) and his knowingly
persuading (inducing, cnticing, etc.) the minor. Simplifying the various disjuncts and subordinate
clauses so that we may concentrate on the semantics, the relevant part of the statute is effectively
this:
Whoever, using the mail etc., knowingly persuades a minor to
engage in a criminal sexual activity, shall be fined and imprisoned.
So the question is: does this statute apply (1) to someone who uses the mail (or Internet or
phone) and subsequently persuades a minor, in person, to engage in sex, or does it apply only to
(2) someone who persuades a minor, over the phone (etc.) to engage in sex? That is, if John
phones a woman asking her only to have dinner, and then, at dinner, persuades her to engage in
illegal sex, does his behavior fall under the language of the statute?
Linguistically, this boils down to how the appositive gerundive phrase "using the mail"
relates to the causative main verb "persuades." The gerundive phrase is playing the semantic role
William James.' 970 I 33 Kirkland Street I Cambridge I Massachusetts 02138
P 617.495.0831 I f 617.495.8279 I oinker@wih.harvard.edu
EFTA00176532
of instrument: something used as a means to the ends specified by the causative verb. So the
question is how an instrument-phrase is ordinarily interpreted. We can clarify this by simplifying
even further and substituting concrete events for the abstract ones in the statute:
(a) John, using a hammer, broke the glass.
Now consider the following scenarios:
(b) John uses a hammer to bang nails into a piece of wood. Then
he puts the hammer down, reaches for a glass, and deliberately
smashes the glass against the table.
(c) With his right hand, John hammers in a nail. While he is doing
this, he reaches for a glass with his left hand, and deliberately
smashes the glass against the table.
(d) John takes a hammer and deliberately swings it against the
glass, breaking it.
It's clear that no English speaker would ever use the sentence (a) to describe scenario (b).
Similarly, sentence (a) would almost certainly not be used to describe scenario (c): any English
speaker would say "while using a hammer," not just "using a hammer." The only scenario that
can be described by (a) is the one in (d). In other words, the event denoted by the instrumental
gerundive phrase must immediately precede the event denoted by the causative verb, and the
actor has to use the instrument in order to bring about the change indicated by the causative
verb; that is, it has to be the means to an end.
There is an additional condition that has to be met. Consider scenario (e):
(e) Mary is holding a glass. John stands behind Mary, and bangs a
hammer against an iron bar. The noise startles Mary, who drops
the glass, breaking it.
Here, too, it would be pretty weird to use sentence (a) to describe the scenario, even if John
intended for the glass to break as a result of the scenario. As far as English verbs are concerned,
the only means to the end that counts is the one that directly and immediately precedes the end.
In addition, the way in which the means brings about the end has to be more-or-less
stereotyped—the circuitous and unconventional means in this case (startling Mary) renders the
sentence unacceptable.
Finally, to be as charitable as possible to alternative interpretations, consider scenario (f):
(f) A glass is packed in a wooden crate. John smashes the crate
with a hammer in order to open it. He reaches for the glass and
hurls it against the floor, breaking it.
Even with this scenario it would be very odd to say "John, using a hammer, broke the glass."
Once again, the use of the hammer has to the immediate cause of the breaking of the glass, not
one separated from it by several links in a causal chain.
Getting back to the statute in question, I would conclude that it would naturally apply
only to someone who used the Internet or phone (or other relevant facility) as the direct,
immediate, and intended means to the end of persuasion: that is, the sexual come-on would have
to be on the phone or in the Internet message. If one doubts this, one only has to consider a
scenario in which John phones Mary to invite her to dinner, having no sexual intentions
whatsoever, and during dinner is struck by her beauty and relaxed by the wine, and decides on
EFTA00176533
the spur of the moment to try to seduce her. No one could possibly describe that as "John, using
the phone, seduced Mary," since he had no such intention at the time he used the phone.
These properties of the use of verbs—immediateness, means-ends, directness,
stereotypy—have been discussed in the literature on the lexical semantics of causative verbs for
almost forty years. They have also been confirmed in experiments that ask people whether they
could use various sentences to describe particular scenarios. I append below a few of the
references to the relevant scholarly literature.
My professional conclusion, in sum, is that an English speaker, reading the statute, would
naturally understand it as applying only to persuasion (etc.) that is done while "using the mail"
(etc.). To understand it as applying to persuasion (etc.) done subsequent to the use of the mail,
phone, etc., would be an unnatural and grammatically inaccurate reading of the language.
I hope this helps to clarify your question. Please don't hesitate to be in touch if I can
clarify or expand on this analysis.
Sincerely,
Fodor, J. A. (1970). Three reasons for not deriving "kill" from "cause to die". Linguistic
Inquiry, 1, 429-438.
Gergely, G., & Bever, T. G. (1986). Relatedness intutions and mental represenation of
causative verbs. Cognition, 23, 211-277.
Levin, B., & Pinker, S. (Eds.). (1992). Lexical and conceptual semantics. Cambridge, Mass.:
Blackwell.
Pinker, S. (1989). Learnability and cognition: The acquisition of argument structure.
Cambridge, Mass.: MIT Press.
Shibatani, M. (1976). The grammar of causative constructions: A conspectus. In M.
Shibatani (Ed.), Syntax and semantics 6: The grammar of causative constructions. New
York: Academic Press.
Talmy, L. (1988). Force dynamics in language and cognition. Cognitive Science, 12, 49-
100.
Wolff, P. (2003). Direct causation in the linguistic coding and individuation of causal
events. Cognition, 88, 1-48.
Wolff, P., & Song, G. (2003). Models of causation and the semantics of causal verbs.
Cognitive Psychology, 47, 276-332.
EFTA00176534
EFTA00176535
Southern District of Florida Cases Charging 18 U.S.C.S. 2422 (b)
Case #
Defendant
Counts
Other Charges
Summary
97-8093
Paul Panunzio
2
2 counts 2422(6)
Use of intemet to entice
minor to engage in sex
activity.
00-6034
John Palmer
2
18 U.S.C.S.
2252A(a)(5)(B)
Use of internet to entice
minor to engage in sex
activity.
01-0704
Michael Nyberg
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-0734
Franco Sabri
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on intemet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-0756
Eduardo Alvarez
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on intemet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-0783
Prem D'Sa
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on intemet
chat service. D had
sexually explicit
EFTA00176536
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-0961
Jose Mayorga
I
[None]
D met u/c officer (posing
as 13 y.o. girl) on internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-0998
Gustavo Desouza
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-1004
Ferrys Miranda
I
[None]
D met u/c officer (posing
as 12 y.o. girl) on internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-1139
James Patterson
1
[None]
D met u/c officer (posing
as 13 y.o. girl) on internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-1174
Roberto
I
[None]
Use of internet to entice
minor to engage in sex
2
EFTA00176537
activity.
01-6024
James Boutin
2
18 U.S.C.S.
2252A(a)(5)(B)
Use of internee to entice
minor to engage in sex
activity.
01-6107
Otis Wragg
1
[None]
Use of Internet to entice
minor to engage in sex
activity.
01-6157
Kelly Jones
4
18 U.S.C.S.
2252A(a)( I );
18 U.S.C.S.
2252A(a)(2)(A);
18 U.S.C.S.
2252A(a)(5)(B)
Use of intemet to entice
minor to engage in sex
activity.
01-6185
Byron Matthai
1
[None]
Use of internee to entice
minor to engage in sex
activity.
01-6203
Anthony Gentile
2
18 U.S.C.S.
2252A(a)(5)(B)
Use of intemet to entice
minor to engage in sex
activity.
01-8073
Jerrold Levy
5
2 counts 2422(b);
18 U.S.C.S.
2252A(a)(2);
18 U.S.C.S.
2252A(a)(5)(B);
18 U.S.C.S.
2252(a)(4)
D communicated with u/c
officer (posing as 14 y.o.
boy) on Internet; D had
sexually explicit
conversation with ofc., set
up meeting on internee for
purpose of having sex; D
arrested at meeting site.
Police obtained SW for
D's home and seized
computer. Police located
another minor boy that D
had previously
communicated w/ and
engaged in sexual activity
md; child pornography also
found on computer.
(Affidavit attached).
01-8097
John Estevez
1
[None]
D met u/c officer (posing
as 13/14 y.o. girl) on
intemet chat service. D
had sexually explicit
3
EFTA00176538
conversations with ofc.; D
gave u/c his cell phone
#; u/c called D (3 taped
phone calls); set up
meeting on internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
01-8161
Carlos Navas
I
[None]
Use of internet to entice
minor to engage in sex
activity.
02-
14077
Anthony Murrell
I
[None]
D met u/c officer (posing
as a mother with a 13 y.o.
daughter) on Internet chat
room; D was looking to be
w/ a mother and daughter.
D gave his phone # to u/c.
D met same u/c (posing as
dad with 13 y.o. daughter)
in another chat room; D
wanted to rent daughter. D
gave his phone # to u/c and
u/c called him to speak
about arrangements. Next
day D & u/c had further
conversation thru the chat
room. 4 days later D
called u/c on phone
making meeting
arrangements & agreed to
pay $300. D arrested at
hotel meeting site.
(Affidavit attached).
02-
14080
Douglas
Bourdon
I
[None]
Use of internet to entice
minor to engage in sex
activity.
02-
14081
James Hornaday
I
[None]
D met u/c (posing as father
with 2 minor
children) in internet
chatroom. D looking to
have sex with family; u/c
called D several times
and D had sexually explicit
conversations w/
4
EFTA00176539
u/c. D also sent nude
photos of himself for
minors to see.
02-
Brian Pan fi I
I
[None)
D met u/c officer (posing
20342
as 13 y.o. girl) on intemet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on Internet for
purpose of having sex; D
asked u/c to call him once
she reached the meeting
point; u/c called; D
arrested at meeting site.
(Affidavit attached).
02-
John Orrega
I
[None}
D met u/c officer (posing
20408
as 13 y.o. girl) on Internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on Internet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
02-
Donald Kent
I
i None]
D met u/c officer (posing
20437
as 13 y.o. girl) on Internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on intemet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
02-
Mark 0beinuner
2
18 U.S.C.S. 1470
D met u/c officer (posing
20705
as 13 y.o. girl) on
Internet chat service. D
had sexually explicit
conversation with ofc. D
sent obscene photos to
u/c and masturbated on
webcam for u/c. D gave
u/c his phone #; u/c called
5
EFTA00176540
D and D had sexually
explicit conversation with
u/c on phone.
02-
21012
William Yon
3
3 counts of 2422(b)
D contacted 2 15 y.o.
girls/students via the
Internet and had sexually
explicit conversations with
them. Girls went to police.
D set up meeting with u/c
ofc. posing as one of the
girls for purpose of having
sex. D went to meeting
site and then returned
home. D arrested at home.
(Affidavit attached).
02-
80042
Samuel Morton
25
2 counts 2422(b);
18 U.S.C.S.
2252A(a)(2);
18 U.S.C.S.
2252(a)(2);
18 U.S.C.S.
2252(a)(4);
18 U.S.C.S. 2253
D met several u/c officers
(posing as minor
girls) on intemet chat
service. D had sexually
explicit conversation with
ofcs. D sent obscene
photos to u/c. D had
several phone
conversations w/ different
u/c officers.
02-
80072
Todd Kroeber
6
18 U.S.C.S.
2252(a)(2);
18 U.S.C.S.
2252A(a)(2);
18 U.S.C.S.
2252A(a)(5)(B)
Use of facility of interstate
commerce to entice a
minor to engage in sex
activity (does not specify
the facility).
Knowingly received child
pornography.
Knowingly distributed
child pornography in
interstate commerce by
computer.
02-
80171
Elias Guimaraes
1
[None]
Use of intemet to entice
minor to engage in sex
activity.
03-
14028
Edgar Searcy
1
[None]
D met u/c officer (posing
as a dad with a 13 y.o.
6
EFTA00176541
daughter) on intemet chat
room utilized by people
trading their children for
sex. D gave his phone # to
u/c. U/c called D at set up
meeting. D stated that he
intended to have sex w/
u/c's daughter. D arrested
at meeting site.
03-
Joesph Poignant
1
[None]
Use of intemet and
13068
telephone to entice minor
to engage in sex activity.
03-
David Brautigam
I
[None]
D met u/c officer (posing
20043
as 13 y.o. girl) on intemet
chat service. D (using 2
usernames) had sexually
explicit conversation with
ofc., set up meeting on
intemet for purpose of
having sex; arrested at
meeting site. (Affidavit
attached).
03-
Joseph Messier
1
I None]
D met u/c officer (posing
20060
as 13 y.o. girl) on Internet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on intemet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
03-
Marco Pena
I
[None]
D met u/c officer (posing
20132
as 13 y.o. girl) on intemet
chat service. D had
sexually explicit
conversation with ofc., set
up meeting on intemet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
03-
Jaime
2
2 counts of 2422(b)
D met u/c officer (posing
20133
Montealegre
as 14 y.o. girl) on intemet
chat service. D had
7
EFTA00176542
sexually explicit
conversation with ofc., set
up meeting on intemet for
purpose of having sex;
arrested at meeting site.
(Affidavit attached).
03-
Kenneth Sciacca
I
(None I
Use of intemet to entice
80164
minor to engage in sex
activity.
04-
1 imothy Dal nail
1
[None]
Use of intemet to entice
14009
minor to engage in sex
activity.
04-
James Brown
I
[None]
Use of intemet to entice
14032
minor to engage in sex
activity.
04-
William Kama!
I
[None]
Use of intemet to entice
14063
minor to engage in sex
activity.
04-
Andres Rojas
I
[None]
D met u/c officer (posing
20040
as minor girl) on
intemet chat service. D
had sexually explicit
conversation with u/c ofc.
04-
Carlos Barroso
3
2 counts of 18
Use of intemet to entice
20055
U.S.C.S. 1470
minor to engage in sex
activity.
Transfer of obscene
material via the intemet.
04-
Derek
2
18 U.S.C.S. 1594(a)
D responded to an
20408
advertisement in a
newspaper
for Costa Rica Taboo
Vacations, a fake travel
agency run by federal
investigators. D
negotiated and paid for a
trip to Costa Rica in
which he planned to have
sex with 16-year old
minors. He cancelled the
8
EFTA00176543
trip, but arranged for
Taboo Vacations to
provide him with underage
sex with the Costa Rican
girls in the U.S. D set
up meeting at hotel. D
arrested at hotel.
04-
.lames Marquez
3
18 U.S.C.S. 2423(e);
Knowingly attempted to
20409
18 U.S.C.S. 1594(a)
induce minor to engage in
prostitution. [no other
facts]
04-
Wallace Strevell
3
18 U.S.C.S. 2423(e);
D called "travel agency" to
20520
18 U.S.C.S. 1594(a)
arrange for trip to
Costa Rica for sex w/
minors. D had several
phone conversations w/
travel agency. D bought
tickets and made
reservations at hotel. D
arrested at airport.
04-
Vincent Springer
3
18 U.S.C.S. 2423(e);
Knowingly attempted to
20551
18 U.S.C.S. 1594(a)
induce minor to engage in
prostitution. [no other
facts]
04-
Clarke
18 U.S.C.S. 2423(e);
D attempted to arrange to
20656
18 U.S.C.S. 1594(a)
have sex w/ minor
girls in Costa Rica thru
fake "travel agency."
04-
Ryan Kannett
9
18 U.S.C.S.
Use of Internet to entice
20837
2252A(a)(2)(A);
18 U.S.C.S.
minor under 12 y.o. to
engage in sex activity.
2252A(a)(5)(B);
21 U.S.C.S. 841(a)(1);
Possessed and distributed
child pornography.
18 U.S.C.S.
924(c)(1XA);
Possession with intent to
sell drugs.
18 U.S.C.S. 2253;
21 U.S.C.S. 853
18 U.S.C.S. 924(d)(1)
Knowingly carry firearm
during drug trafficking
crime.
04-
Raymond
13
2 counts 2422(b);
Use of intemet to entice
60046
Bohning
18 U.S.C.S.
2251(c)(1), (c)(2), and
minor to engage in sex
activity.
(e);
Traveled to England for
9
EFTA00176544
18 U.S.C.S. 2423(b)
and (f);
purpose of having sex with
minor.
18 U.S.C.S.
2252A(a)(1);
18 U.S.C.S.
Sent, distributed, and
received child
pornography.
2252A(a)(2)(A);
18 U.S.C.S.
2252A(a)(2)(B);
18 U.S.C.S.
2252A(a)(6)0;
18 U.S.C.S.
2252A(a)(5)(B)
05-
Gerald Smith
1
[None]
Use of internet to entice
14011
minor to engage in sex
activity.
05-
Timothy
4
2 counts of 2422(b)
Use of internet to entice
14024
Campbell
18 U.S.C.S.
2252(a)(2);
minor to engage in sex
activity.
18 U.S.C.S.
2252(A)(4)(B)
Received and possessed
child pornography that had
been transported in
interstate commerce.
05-
Adam Statland
3
18 U.S.C.S. 2423(b)
Use of internet to entice
14039
minor to engage in sex
activity.
Traveled from California
to Florida w/ intent to
engage in sexual activity
with a minor.
05-
Robert Carlo
1
[None]
Use of internet to entice
14046
minor to engage in sex
activity.
05-
Mark Rader
2
18 U.S.C.S.
Use of internet to entice
14047
2252(a)(1)
minor to engage in sex
activity.
Knowingly transported
child pornography in
interstate commerce.
05-
Robert Latham
2
18 U.S.C.S.
Use of internet to entice
14060
2252(a)(1)
minor to engage in sex
activity.
Knowingly transported
10
EFTA00176545
child pornography by a
computer.
05-
Ralph Poole, Jr.
1
[None]
Use of internet to entice
14099
minor to engage in sex
activity.
05-
Mark Madison
3
18 U.S.C.S.
Operation of child
20444
Justin Evans
3
1591(a)(1);
prostitution ring in Miami.
Chad Ycarby
3
18 U.S.C.S.
14 y.o. girl worked for
1591(a)(2);
Evans as prostitute.
18 U.S.C.S. 2423(e)
Evans arranged dates for
her at hotels, and she
gave money from dates to
Evans. Evans called
14 y.o. girl to inform her
of dates. Evans also
gave girl's phone /4 to
customers. Evans
supplied girl with
condoms.
05-
Edward Byrd
1
[None]
Use of internet to entice
60049
minor to engage in sex
activity.
05-
Callahan
2
18 U.S.C.S. 2423(b)
Use of internet to entice
60073
minor to engage in sex
activity.
05-
Thomas
1
[None]
D met u/c officer (posing
80023
Bohannon
as 15 y.o. girl) on
internet chat service. D
had sexually explicit
conversation with ofc., set
up meeting on
internet for purpose of
having sex; arrested at
meeting site.
05-
Laronn Houston
1
[None]
D met u/c officer (posing
80029
as a mother with a 14
y.o. daughter) on internet
chat room. D set up
meeting w/ mother &
11
EFTA00176546
minor. D arrested at
meeting site.
05-
80200
Lucas Phelps
5
18 U.S.C.S. 1470
Use of intemet to entice
minor to engage in sex
activity.
Attempt to knowingly
transfer child pornography
in interstate commerce to a
minor.
06-
14003
Octavio
Villalona
2
18 U.S.C.S.
2252(a)(1)
Use of intemet to entice
minor to engage in sex
activity.
Knowingly transported
child pornography by a
computer.
06-
14006
Daniel Williams
1
[None]
Use of internet to entice
minor to engage in sex
activity.
06-
14007
Ricky Barnett
1
[None]
Use of Internet to entice
minor to engage in sex
activity.
06-
14011
John Everhart, II
I
[None]
Use of internet to entice
minor to engage in sex
activity.
06-
14016
Eric Rollins
3
2 counts 2422(b)
18 U.S.C.S. 2422(a)
Use of Internet to entice
minor to engage in sex
activity.
Knowingly enticed a
minor to travel in interstate
commerce to engage in
sexual activity.
06-
14053
Richard Grande,
Jr.
1
[None]
Use of intemet to entice
minor to engage in sex
activity.
06-
14069
Eric Matthews
4
18 U.S.C.S. 1470;
18 U.S.C.S.
2252(a)(2)
Use of intemet to entice
minor to engage in sex
activity.
Knowingly transferred
obscene material to a
minor in interstate
commerce.
12
EFTA00176547
Knowingly distributed
child pornography in
interstate commerce.
06-
14074
Anthony Perez
3
18 U.S.C.S. 1470;
18 U.S.C.S. 2251 (a)
and (e)
Use of intemet to entice
minor to engage in sex
activity.
Knowingly transferred
obscene material to a
minor under 16 y.o. in
interstate commerce.
Enticed minor to engage in
sexual conduct for purpose
of transporting visual
depiction in interstate
commerce.
06-
20249
Michael
I
[None]
Knowingly attempted to
induce minor to engage in
prostitution. [no other
facts]
06-
20341
Dino Pancaro
3
18 U.S.C.S. 2423(e);
18 U.S.C.S. 1594(a)
Knowingly attempted to
induce minor to engage in
prostitution.
Attempted to travel to
engage in commercial sex
act with a minor.
06-
20734
Demond Osley
Stacey Greer
8
18 U.S.C.S.
1591(aX1);
18 U.S.C.S. 2421;
18 U.S.C.S. 2422(a);
18 U.S.C.S.
1001(aX2);
18 U.S.C.S.
1028(aX4)
Minor arrested for
prostitution on Miami
Beach.
When questioned by
officers, minor said Osley
brought her from Michigan
to Florida for
purpose of prostitution;
Osley became unhappy
with minor b/c she was not
meeting daily quota;
Osley sold minor to Greer.
Greer takes minor to
hotel, forces her to have
sex, video tapes minor
and takes photos of her to
distribute on internet.
Greer also forces minor
into prostitution thru
13
EFTA00176548
threats of violence. Minor
identified Osley and
Greer. Both arrested.
06-
20783
Keith Lanzon
I
[None
Use of intemet to entice
minor to engage in sex
activity.
06-
80031
Lynn Mann
3
18 U.S.C.S. 1470;
18 U.S.C.S.
2252A(a)(5)(B);
18 U.S.C.S.
2252A(b)(2)
Use of Internet to entice
minor to engage in sex
activity.
Distribute child
pornography to a minor.
Possession of child
pornography.
06-
80034
Rafael Ramirez,
Jr.
1
[None]
Use of internet to entice
minor to engage in sex
activity.
06-
80058
Adam McDaniel
2
18 U.S.C.S. 2423(b)
D was 19 in Texas, met 14
y.o. girl on internet
who lived in Florida. D &
girl communicated
by email & phone. D flew
to Florida, met w/
girl and had sex w/ her in a
hotel.
06-
80135
David Girouard
2
18 U.S.C.S. 2423(b)
Use of Internet and cellular
telephone to entice minor
to engage in sex activity.
07-
14002
Benjamin■
4
18 U.S.C.S. 1470;
18 U.S.C.S.
2252A(aX2)(M;
18 U.S.C.S.
2252(bX1);
18 U.S.C.S.
2252(a)(4)(B)
Use of intemet to entice
minor to engage in sex
activity.
Knowingly transferred
obscene material to a
minor under 16 y.o. in
interstate commerce.
Knowingly distributed
child pornography in
interstate commerce.
Possession of child
pornography.
07-
14004
Ricky
2
18 U.S.C.S. 2251 (a)
and (e)
Use of internet to entice
minor to engage in sex
14
EFTA00176549
activity.
Attempted production of
child pornography thru
interstate commerce.
07-
Carl Berrier
2
18 U.S.C.S.
Use of internet to entice
14005
2252A(a)(2)(A);
18 U.S.C.S.
minor to engage in sex
activity.
2252A(b)(1)
Knowingly distributed
child pornography in
interstate commerce.
07-
Francesco Simo
1
[None]
Use of internet to entice
14015
minor to engage in sex
activity.
07-
Joseph Crutchley
I
[None]
Use of internet to entice
14016
minor to engage in sex
activity.
07-
14024
Evans
il
Evans
i
3
1
18 U.S.C.S. 2423(a);
18 U.S.C.S. 2423(e)
Use of internet to entice
minor to engage in sex
activity.
Conspiracy to transport a
minor to engage in sexual
activity.
Knowingly transport (or
attempt) a minor to engage
in sexual activity.
07-
Sammy
4
18 U.S.C.S. 1591(a);
Knowingly attempted to
20214
Carpenter,
Darryl Jennings,
Luroy Jennings
18 U.S.C.S. 2422(a)
induce minor to engage in
prostitution.
07-
Nelson Cintron
3
18 U.S.C.S.
Use of intemet to entice
60049
2252A(a)(2)(A);
18 U.S.C.S.
minor to engage in sex
activity.
2252A(a)(5)(B)
Possessed and distributed
child pornography.
07-
Oliver Buelow
2
18 U.S.C.S. 2423(b)
[No factual information]
60084
07-
Marion
3
18 U.S.C.S. 2423(a);
Use of internet and cellular
80099
Yarbrough
18 U.S.C.S. 2422(a)
telephone to entice
minor to engage in sex
15
EFTA00176550
activity.
Transport minor to engage
in sex activity.
Entice minor to travel in
interstate commerce to
engage in sex activity.
16
EFTA00176551
f
(
4-
C
C
EFTA00176552
City College
UI NewYork
INTERNATIONAL STUDIES PROGRAM
Jeffrey Epstein
do Darren Indyke Esq.
457 Madison Avenue — 14th Floor
New York,
N.Y. 10022.
Dear Mr. Epstein,
North Academic Center, Room 6/141
160 Convent Avenue
New York, New York 10031
TEL:l
FAX:
www.ccny.cuny.edu
August 21,2006.
Thank you for your continued and generous support of the undergraduate academic
careers of Georges Ndabashimiye and Nicole Mutesi.
Both students have done very well both academically and in co-curricular life and expect
to graduate in June, 2008. Georges will return to Rwanda to teach and Nicole plans to
join the energy industry which is focused on developing Rwanda's newly found resources
in natural gas.
Your support of these two students will thus contribute to the human resource wealth of
Rwanda.
Yours sincerely,
Marina W. Fernando Ph.D.
Director, International Studies Program
and Deputy Dean of Social Science.
THE CITY UNIVERSITY OF NEW YORK
EFTA00176553
o$104106
tton in etstekt,
\a3UE kis *GA you ,‘cit
\is
/VOL
r'n-1/46
klAilietl
Dona plios
(nit/ -liva-ecta hisu beam. 3
ereaki
apvCCCat-e_ ow- ezneret•.
ccovt,-ek coo 2a muck
Quit
Sr Ls. 9,nar a nit Act
In".3
ger-
AIZ/IL
O0(1O1 Ceara.-
YI•1 Otatte —
rAtt
SGOES -
111.,om irk 8.0 vituALA-
Sivlemity
tii coLe M UTEs
EFTA00176554
D /
cP9- / 20'D
am het sitter" ,
4604 _.„ 4tr
T
otvlor2 rek- 1/41,d;we
la ° e_&
1" Ntui
c)(1<.
toiatt
aikage4
rut a cti s
4urk
t act • Lon
s ,
EFTA00176555
EFTA00176556
teo\r- •Sticsret1
.ssee.-\r,
E‘s-Or
rrovettvsr
v40,,,rA, 3r, -1-0.14-
3rt,
yo..)
3?•(.4A-
t
cAocte
16t)
‘r ,
\oe..Oc-
\c‘tc1/4Veo
tc : ‘
c-AVI
CC\r‘
S k‘rANON
1 •
M. ,
\AMMNI C
4 13
AtM
1 0 %.•
\\VA'
.
\roam
work
\CV:kra )
`et".
$ m -
I
Sc‘cAS
3
C"-e0.-\\•1
-
%r 0 CI ‘Sr Zot:(4‘
Che•
Ay-toAte•
MS.°.
W.OknlitS)
•0
\t-V
10 1/41
Akf.o)c
sotcl
re. r
\zet‘s
cx‘o \t.
0-Vo,c‘y
one ;en .%
ThQine
Or,
tmaA
c
.1/4. `n\\-- ,
S%'%6S_
tzsi
s___
$ol bcc, 3
0:99.)\-
I cy \ot.
\Anats- -1AvAt
-01
\Nt.5
sr-4;3Sr
4ve,5
sm.,
\NT
. ‘as
vs,
N-0
ty.e
‘,4,a\A\
\Note
C.0.1—t.
Sc
T_
))-orA
cs,x‘ce,
4ri.
1\o\ -
Nu,-coc-1,,c*A-t‘l
s cntl
\K-
Ai •
N)60at
\jaorYcmc
re.
\I -A
•lo., 9NtftYkr
R \c"v") ‘4"X"e
411k
\l e"'
--
en\St.
\)t.i'ort
1A -4,N
\ re,
s&)AIN 5
Irb
S\ -C\ q t -
A"b
1a.
_e
sa
\:St,
'(ay.
\two_
Akera.
CtcNc
ANNA-
we\
t6c.ksZt)...
)ro 0
I've
\Ae4a-
Phr;c• corsC3 \ lin
ININ\
Cl-t.c-t eige_ro,stto t,
ti t S.•• \r`conS
tk•S
:it
\\MI t
t,
tecir;; Ccok
a teN
'no%)
.k-vo
etY•S
VINC0
;-\
'.'ht
e•C.P;.nefftr5
teems-e.
Coa c-Se
c
Pic ot.tS goh:INS
°‘A
•Ske.Ct;(SerCIIV\1""
\i‘l\e‘%\C
vti
- 5A°‘`8 '‘ a
'AwnN-I-
\lc)
In&
trAnstS. .
st‘trt.
-s_
WAs-
\-\•;.T.grt
cw:N\
.9>L4 t x`sesa.k4r).
SCoC
NItc\ct\to,\
cAvtA, tc‘cs
ctrA
(cm. t
EFTA00176557
•c•••
‘.c- .1 c-4
t.r.f.X-1
N\e.S\C. -
It-'1.2 se.
csre").,.
\ \\\
'move
r
\\,\\%.
R—eck.\
\ouk 'cse
\{b‘)
V•PNC3M1
\ ‘‘‘6e.
\los).
My_
\.3
k-qt.
iss‘2.
T
\•••10.
("I'r,
t -£. ._
. ite.AA-; h)
Pr.
)
\cWv\''‘ ''TsrskS
/‘. . \:eC\-.r t(46).t_
C6st- ter
, cmi.
Z.
1-34..1.‘y ...tea
A.
xc..,-5
\-e
k
\re\
.
4 SAYx
o.
\A\ Nto\t.
\o / r
_
O
\\\Lt.
sti\Nt
c\-.1Y\
b\:\ 5rse.S.S
.1C.r.T3N4
So \
r.
.‘Y-+
0
._‘/A
.ecks\t/
\k\-.
‘f.•Or
.
_
.
.
CNN...
Y•-•etV
S-\-vxv
cNY\
z
vos)
. .
.
4-ez".
Stox0A.A1
\
Th\. .
\ 'NeAs
k*C.%)‘•
e
-
.he .1T
.14`
`AY'At 17-
.
•,•\()e-
Pro.
t) vr\lc•
•
-
\\
4ek
\ec\SA-
tY-#...
WAY \Y—
yo,,
.
..r*.,0
Moos
V4\1
\VIA \ASA-6
\Nato.
yo.)
•\4,-.O1\14- . Alf•Aal
v4tr-c.
.
Q‘I`\` • ;!‘' z•-
.
Isr\s.
. 11.0
WVer.
(r
kx,c
Vtes.ce,
‘4\;4„,
cAN1/44
*rt.
tv,4„,
-"svc`-'3
\"\^`6` "
%.t1r.1‘)
VNeror
kot•
NN.^‘
4 -VA'N
5
c
'fry.
y
.c
c.'
6`4),\\A.s(t ,e,
\ f\ (We
(1/4
EFTA00176558
EFTA00176559
447 of 1456 DOCUMENTS
Copyright 2004 Gale Group, Inc.
ASAP
Copyright 2004 American Association for Artificial Intelligence
AI Magazine
June 22, 2004
SECTION: No. 2, Vol. 25; Pg. 113; ISSN: 0738.4602
LAC-ACC-NO: 119024857
LENGTH: 7274 words
HEADLINE: The St. Thomas common sense symposium: designing architectures for human-level
intelligence.
BYLINE: Minsky, Marvin; Singh, Push; Stomas, Aaron
BODY:
To build a machine that has "common sense" was once a principal goal in the field of artificial
intelligence. But most researchers in recent years have retreated from that ambitious aim. Instead, each
developed some special technique that could deal with some class of problem well, but does poorly at
almost everything else. We are convinced, however, that no one such method will ever turn out to be
"best," and that instead, the powerful AI systems of the future will use a diverse array of resources that,
together, will deal with a great range of problems. To build a machine that's resourceful enough to have
humanlike common sense, we must develop ways to combine the advantages of multiple methods to
represent knowledge, multiple ways to make inferences, and multiple ways to learn. We held a two-day
symposium in St. Thomas, U.S. Virgin Islands, to discuss such a project--to develop new architectural
schemes that can bridge between different strategies and representations. This article reports on the events
and ideas developed at this meeting and subsequent thoughts by the authors on how to make progress.
• *****•*•
*
The Need for Synthesis in Modern AI
To build a machine that has "common sense was once a principal goal in the field of artificial
intelligence. But most researchers in recent years have retreated from that ambitious aim. Instead, each
developed some special technique that could deal with some class of problem well, but does poorly at
almost everything else. An outsider might regard our field as a chaotic array of attempts to exploit the
advantages of (for example) neural networks, formal logic, genetic programming, or statistical inference--
with the proponents of each method maintaining that their chosen technique will someday replace most of
the other competitors.
We do not mean to dismiss any particular technique. However, we are convinced that no one such
method will ever turn out to be "best," and that instead, the powerful AI systems of the future will use a
diverse array of resources that, together, will deal with a great range of problems. In other words, we
should not seek a single "unified theory!" To build a machine that is resourceful enough to have humanlike
common sense, we must develop ways to combine the advantages of multiple methods to represent
knowledge, multiple ways to make inferences, and multiple ways to learn.
We held a two-day symposium in St. Thomas, U.S. Virgin Islands, to discuss such a project--to
develop new architectural schemes that can bridge between different strategies and representations. This
article reports on the events and ideas developed at this meeting and subsequent thoughts by the authors on
how to make progress. (1)
Organizing the Diversity of Al Methods
EFTA00176560
Marvin Minsky kicked off the meeting by discussing how we might begin to organize the many
techniques that have been developed in AI so far. While AI researchers have invented many
representations, methods, and architectures for solving many types of problems, they still have little
understanding of the strengths and weaknesses of each these techniques. We need a theory that helps to
map the types of probkms we face onto the types of solutions that are available to us. When should one use
a neural network? When should one use statistical learning? When should one use logical theorem proving?
To help answer these kinds of questions, Minsky suggested that we could organize different AI
methods into a "causal diversity matrix" (figure I). Here, each problem-solving method, such as analogical
reasoning, logical theorem proving, and statistical inference, is assessed in terms of its competence at
dealing with problem domains with different causal structures.
[FIGURE I OMITTED]
Statistical inference is often useful for situations that are affected by many different matched causal
components, but where each contributes only slightly to the final phenomenon. A good example of such a
problem-type is visual texture classification, such as determining whether a region in an image is a patch of
skin or a fragment of a cloud. This can be done by summing the contributions of many small pieces of
evidence such as the individual pixels of the texture. No one pixel is terribly important, but en masse they
determine the classification. Formal logic, on the other hand, works well on problems where there are
relatively few causal components, but which are arranged in intricate structures sensitive to the slightest
disturbance or inconsistency. An example of such a problem-type is verifying the correctness of a computer
program, whose behavior can be changed completely by modifying a single bit of its code. Case-based and
analogical reasoning lie between these extremes, matched to problems where there are a moderate number
of causal components each with a modest amount of influence. Many common sense domains, such as
human social reasoning, may fall into this category. Such problems may involve knowledge too difficult to
formalize as a small set of logical axioms, or too difficult to acquire enough data about to train an adequate
statistical model.
It is true that many of these techniques have worked well outside of the regimes suggested by this
causal diversity matrix. For example, statistical methods have found application in realms where previously
rule•based methods were the norm, such as in the syntactic parsing of natural language text. However, we
need a richer heuristic theory of when to apply different AI techniques, and this causal diversity matrix
could be an initial step toward that. We need to further develop and extend such theories to include the
entire range of Al methods that have been developed, so that we can more systematically exploit the
advantages of particular techniques.
How could such a "meta-theory of AI techniques" be used by an AI architecture? Before we turned to
this question, we discussed a concrete problem domain in which we could think more clearly about the goal
of building a machine with common sense.
Returning to the Blocks World
Later that first morning, Push Singh presented a possible target domain for a commonsense
architecture project. Consider the situation of two children playing together with blocks (figure 2).
[FIGURE 2 OMIlibD]
Even in this simple situation, the children may have concerns that span many "mental realms":
Physical: What if I pulled out that bottom block?
Bodily: Can I reach that green block from here?
Social: Should I help him with his tower or knock it down?
Psychological: I forgot where I left the blue block.
Visual: Is the blue block hidden behind that stack?
Spatial: Can I arrange those blocks into the shape of a table?
Tactile: What would it feel like to grab five blocks at once?
EFTA00176561
Self-Reflective: I'm getting bored with this--at else is there to do?
Singh argued that no present-day M system demonstrates such a broad range of commonsense skills.
Any architecture we design should aim to achieve some competence within each of these and other
important mental realms. He proposed that to do this we work within the simplest possible domain
requiring reasoning in each of these realms. He suggested that we develop our architectures within a
physically realistic model world resembling the classic Blocks World, but where the world was populated
by several simulated beings, and thus emphasizing social problems in addition to physical ones. These
beings would manipulate simple objects like blocks, balls, and cylinders, and would participate in the kinds
of scenarios depicted in figure 3. which include jointly building structures of various kinds, competing to
solve puzzles. teaching each other skills through examples and through conversation. and verbally
reflecting on their own successes and failures.
(FIGURE 3 OMITTED
The apparent simplicity of this world is deceptive, for many of the kinds of problems that show up in
this world have not yet been tackled in AI, for they require combining elements of the following:
Spatial reasoning about the spatial arrangements of objects in one's environment and how the parts of
objects are oriented and situated in relation to one another. (Which of those blocks is closest to me?)
Physical reasoning about the dynamic behavior of physical objects with masses and
colliding/supporting surfaces. (What would happen if I removed that middle block from the tower?)
Bodily reasoning about the capabilities of one's physical body. (Can I reach that block without having
to getup?)
Visual reasoning about the world that underlies what can be seen. (Is that a cylinder-shaped block or
part of a person's leg?)
Psychological reasoning about the goals and beliefs oneself and of others. (What is the other person
trying to do?)
Social reasoning about the relationships, shared goals and histories that exist between people. (How
can I accomplish my goal without the other person interfering?)
Reflective reasoning about one's own recent deliberations. (What was I trying to do a moment ago?)
Conversational reasoning about how to express one's ideas to others. (How can l explain my problem
to the other person?)
Educational reasoning about how to best learn about some subject, or to teach it to someone else.
(How can I generalize useful rules about the world from experiences?)
Many of the meeting participants were enthusiastic about this proposal and agreed that there would be
challenging visual, spatial, and robotics problems within this domain. Ken Forbus pointed out that the
video game communities would soon produce programmable virtual worlds that would easily meet our
needs. Several participants mentioned the success of the RoboCup competitions (Kitano et al. 1997), but
some concluded that the RoboCup domain, while appropriate for those interested in the problem of
coordinating multiagent teams in a competitive scenario, was very different in character from the situation
of two or three people more slowly working together on a physical task, communicating in natural
language, and in general operating on a more thoughtful and reflective level.
Still, the participants had a heated debate about the adequacy of the proposed problem domain. The
most common criticism was that this world does not contain enough of a variety of objects or richness of
behavior. Doug Lenat suggested a solution to this, which was to embed the people within not a Blocks
World, but instead somewhere like a typical house or office, as in the popular computer game The Sims.
Doug Riecken argued that we could develop enough of the architecture within the more limited virtual
world, and later add extensions to deal with a wider range of objects and phenomena.
A different response to this criticism was that in order to focus on architectural issues, it would help to
simplify the problem domain, so that we could focus less on acquiring a large mass of world knowledge,
and more on developing better ways for systems to use the knowledge they have. However, other
EFTA00176562
participants argued that restricting the world would not entirely bypass the need for large databases of
commonsense knowledge, for even this simple world would likely require hundreds of thousands or even
millions of elementary pieces of commonsense knowledge about space, time, physics, bodies, social
interactions, object appearances, and so forth.
Other participants disagreed with the virtual world domain. They felt that we should instead take the
more practical approach of developing the architecture by starting with a useful application like a search
engine or conversational agent, and extending its common sense abilities over time. But Ben Kuipers
worried that choosing too specific an application would lead to what happened to most previous projects--
someone discovers some set of ad hoc tricks that leads to adequate performance, without making any more
general progress toward more versatile, resourceful, or "more intelligent" systems.
In the end, after long debates we achieved a substantial consensus that to solve harder problems
requiring common sense, we first needed to solve the more restricted class of problems that show up in
simpler domains like the proposed virtual world. Once we get the core of the architecture functioning in
this rich but limited domain, we can attempt to extend it—or it extend itself--to deal with a broader range of
problems using a much broader array of commonsense knowledge.
Large-Scale Architectures for Human-level Intelligence
In the afternoon, we discussed large-scale architectures for machines with human-level intelligence
and common sense. Marvin Minsky and Aaron Sloman each presented their current architectural proposals
as a starting point for the meeting participants to criticize, debug, and elaborate. These two architectures
share so many features that we will refer to them together as the Minsky-Sloman model.
These architectures are distinguished by their emphasis on reflective thinking. Most cognitive models
have focused only on ways to react or deliberate. However, to make machines more versatile, they will
need better ways to recognize and repair the obstacles, bugs and deficiencies that result from their own
activities. In particular, whenever one strategy fails, they'll need to have a collection of ways to switch to
alternative ways to think. To provide for this, Minsky's architectural design includes several reflective
levels beyond the reactive and deliberative levels. Here is one view of his model for the architecture of a
person's mind, as described in his book, The Emotion Machine, and shown here in figure 4.
(FIGURE 4 OMITTED]
Some participants questioned the need for so many reflective layers; would not a single one be
enough? Minsky responded by arguing that today, when our theories still explain too little, we should
elaborate rather than simplify, and we should be building theories with more parts, not fewer. This general
philosophy pervades his architectural design, with its many layers, representations, critics, reasoning
methods, and other diverse types of components. Only once we have built an architecture rich enough to
explain most of what people can do will it make sense to try to simplify things. But today, we are still far
from an architectural design that explains even a tiny fraction of human cognition.
Aaron Sloman's Cognition and Affect project has explored a space of architectures proposed as
models for human minds; a sketch of Sloman's H-CogAff model is shown in figure 5.
(FIGURE 5 OMITTED)
This architecture appears to provide a framework for defining with greater precision than previously a
host of mental concepts, including affective concepts, such as "emotion," "attitude," "mood," "pleasure,"
and so on. For instance, H-CogAff allows us to define at least three distinct varieties of emotions; primary,
secondary and tertiary emotions, involving different layers of the architecture which evolved at different
times--and the same architecture can also distinguish different forms of learning, perception, and control of
behavior. (A different architecture might be better for exploring analogous states of insects, reptiles, or
other mammals.) Human infants probably have a much-reduced version of the architecture that includes
self-bootstrapping mechanisms that lead to the adult form.
The central idea behind the Minsky-Sloman architectures is that the source of human resourcefulness
and robustness is the diversity of our cognitive processes: we have many ways to solve every kind of
problem--both in the world and in the mind--so that when we get stuck using one method of solution, we
EFTA00176563
can rapidly switch to another. There is no single underlying knowledge representation scheme or
inferencing mechanism.
How do such architectures support such diversity? In the case of Minsky's Emotion Machine
architecture, the top level is organized as follows. When the system encounters a problem, it first uses some
knowledge about "problem-types" to select some "way-to-think" that might work. Minsky describes "ways-
to-think" as configurations of agents within the mind that dispose it towards using certain styles of
representation. collections of commonsense knowledge, strategies for reasoning, types of goals and
preferences, memories of past experiences, manners of reflections, and all the other aspects that go into a
particular "cognitive style." One source of knowledge relating problem-types to ways-to-think is the causal
diversity matrix discussed at the start of the meeting--for example, if the system were presented with a
social problem, it might use the causal diversity matrix to then select a case-bascd style of reasoning, and a
particular database of social reasoning episodes to use with it.
However, any particular such approach is likely to fail in various ways. Then if certain "critic" agents
notice specific ways in which that approach has failed, they either suggest strategies to adapt that approach,
or suggest alternative ways-to-think, as suggested shown in figure 6. This is not done by employing any
simple strategy for reflection and repair, but rather by using large arrays of higher level knowledge about
where each way-to-think has advantages and disadvantages, and how to adapt them to new contexts.
[FIGURE 6 OMITTED]
In Minsky's design, several ways-to-think are usually active in parallel. This enables the system to
quickly and fluently switch between different ways-to-think because, instead of starting over at each
transition, each newly activated way-to-think will find an already-prepared representation. The system will
rarely "get stuck" because those alternative ways-to-think will be ready to take over when the present one
runs into trouble, as shown in figure 7.
[FIGURE 7 OMITTED]
Here each way-to-think involves reasoning in a particular subset of mental realms. Impasses
encountered while reasoning in one set of mental realms can be overcome within others. Further
information about these architectures can be found in Singh and Minsky (2003), Sloman (2001), and
McCarthy et al. (2002). Minsky's model will be described in detail in his new book The Emotion Machine
(Minsky, forthcoming).
Generally, the participants were sympathetic to these proposals, and all agreed with the idea that to
achieve human-level intelligence we needed to develop more effective ways to combine multiple AI
techniques. Ken Forbus suggested that we needed a kind of "component marketplace," and that we should
find ways to instrument these components so that the reflective layers of the architecture had useful
information available to them. He contrasted the Soar project (Laird, Newell, and Rosenbloom 1987) as an
effort to eliminate and unify components rather than to accumulate and diversify them, as in the Minsky-
Sloman proposals. Ashwin Ram and Larry Birnbaum both pointed out that despite the agreement over the
architectural proposals it was still not clear what the particular components of the architecture would be.
They pointed out that we needed to think more about what the units of reasoning would be. In other words,
we needed to come up with a good list of way-to-think. Some examples might include the following:
Solving problems by making analogies to past experiences
Predicting what will happen next by rule-based mental simulations
Constructing new "ways to think" by building new collections of agents
Explaining unexpected events by diagnosing causal graphs
Learning from problem-solving episodes by debugging semantic networks
Inferring the state of other minds by re-using self-models
Classifying types of situations using statistical inference
Getting unstuck by reformulating the problem situation
This list could be extended to include all available AI techniques.
EFTA00176564
Educating the Architecture
On the morning of the second day of the meeting, we addressed the problem of how to supply the
architecture with a broad range of commonsense knowledge, so that it would not have to "start from
scratch." We all agreed that learning was of value, but we didn't all agree on where to start. Many
researchers would like to start with nothing; however, Aaron Sloman pointed out that an architecture that
comes with no knowledge is like a programming language that comes with no programs or libraries.
One view that was expressed was that approaches that start out with too little initial knowledge would
likely not achieve enough versatility in any practical length of time. Minsky criticized the increasing
popularity of the concept of a "baby machine"--leaning systems designed to achieve great competence,
given very little initial structure. Some of these ideas include genetic programming, robots that learn by
associating sensory-motor patterns, and online chatbots that try to learn language by generalizing from
thousands of conversations. Nlinsky's complaint was that the problem is not that the concept of a baby
machine is itself unsound, but rather that we don't know how to do it yet. Such approaches have all failed to
make much progress because they started out with inadequate schemes for learning new things. You cannot
teach algebra to a cat; among other things, human infants are already equipped with architectural features to
equip them to think about the causes of their successes and failures and then to make appropriate changes.
Today we do not yet have enough ideas about how to represent, organize, and use much of commonsense
knowledge, let alone build a machine that could learn all of that automatically on its own. As John
McCarthy noted long ago: "in order for a program to be capable of learning something, it must first be able
to represent that knowledge."
There arc very few general-purpose commonsense knowledge resources in the Al community. Doug
Lenat gave a wonderful presentation of the Cyc system, which is presently the project furthest along at
developing a useful and reusable such resource for the AI community, so that new Al programs don't have
to start with almost nothing. The Cyc project (Lenat 1995) has developed a great many ways to represent
commonsense knowledge, and has built a database of over a million commonsense facts and rules.
However, Lenat estimated that an adult-level commonsense system might require 100 million units of
commonsense knowledge, and so one of their current directions is to move to a distributed knowledge
acquisition approach, where it is hoped that eventually thousands of volunteer teachers around the world
will work together teach Cyc new commonsense knowledge. Lenat spent some time describing the
development of friendly interfaces to Cyc that allow nonlogicians to participate in the complicated teaching
and debugging processes involved in building up the Cyc knowledge base.
Many of the participants agreed that Cyc would be useful, and some suggested we could even base our
effort on top of it, but others were sharply critical. Jeffrey Siskind doubted that Cyc contained the spatial
and perceptual knowledge needed to do important kinds of visual scene interpretation. Roger Schenk
argued that Cyc's axiomatic approach was unsuitable for making the kinds of generalizations and analogies
that a more case-based and narrative-oriented approach would support. Srini Narayanan worried that the
Cyc project was not adequately based on what cognitive scientists have learned about how people make
commonsense inferences. Oliver Steele concluded that while we disagreed about whether Cyc was 90% of
the solution or only 10%, this was really an empirical question that we would answer during the course of
the project. But generally, the architectural proposal was regarded as complementary to parallel efforts to
accumulate substantial commonsense knowledge bases.
Minsky predicted that if we used Cyc, we might need to augment each existing item of knowledge
with additional kinds of procedural and heuristic knowledge, such as descriptions of (1) problems that this
knowledge item could help solve; (2) ways of thinking that it could participate in; (3) known arguments for
and against using it; and (4) ways to adapt it to new contexts.
It was stressed that knowledge about the world was not enough by itself--we also need a knowledge
base about how to reason, reflect and learn, the knowledge that the reflective layers of the architecture must
possess. The problem remains that the programs we have for using knowledge are not flexible enough, and
neither Cyc's "adult machine" approach of supplying a great deal of world knowledge, nor the "baby
machine" approach of learning common sense from raw sensory-motor experience, will likely succeed
without first developing an architecture that supports multiple ways to reason, learn, and reflect upon and
improve its activities.
EFTA00176565
An Important Application
Several of the participants felt that such a project would not receive substantial support unless it
proposed an application that clearly would benefit much of the world. Not just an improvement to
something existing, it would need to be one that could not be built without being capable of human-level
commonsense reasoning.
After a good deal of argument, several participants converged upon a vision from The Diamond Age,
a novel by Nell Stephenson. That novel envisioned an "intelligent book"--The Young Ladies Illustrated
Primer--that, when given to a young girl, would immediately bond with her and come to understand her so
well as to become a powerful personal tutor and mentor.
This suggested that we could try to build a personalized teaching machine that would adapt itself to
someone's particular circumstances, difficulties, and needs. The system would carry out a conversation with
you, to help you understand a problem or achieve some goal. You could discuss with it such subjects as
how to choose a house or car, how to learn to play a game or get better at some subject, how to decide
whether to go to the doctor, and so forth. It would help you by telling you what to read, stepping you
through solutions, and teaching you about the subject in other ways it found to be effective for you.
Textbooks then could be replaced by systems that know how to explain ideas to you in particular, because
they would know your background, your skills, and how you best learn.
This kind of application could form the basis for a completely new way to interact with computers,
one that bypasses the complexities and limitations of current operating systems. It would use common
sense in many different ways: (1) It would understand human goals so that it could avoid the silliest
mistakes. (2) It would understand human reasoning so that it could present you with the right level of detail
and avoid saying things that you probably inferred. (3) It would converse in natural language so that you
could easily talk to it about complex matters without having to learn a special language or complex
interface.
To build such a kind of "helping machine." we would first need to give it knowledge about space.
time, beliefs, plans, stories, mistakes, successes, relationships, and so forth, as well as good conversational
skills. However, little of this could be realized by anything less than a system with common sense. To
accomplish this we would need to pursue some sequence of more modest goals that would help one with
simpler problem types--until the system achieved the sorts of competence that we expect from a typical
human four- or five-year-old.
However, to get such a system to work, we would need to address many presently unsolved
commonsense problems that show up in the model-world problem domain.
Final Consensus
The participants agreed that no single technique (such as statistics, logic, or neural networks) could
cope with a sufficiently wide range of problem-types. To achieve human-level intelligence we must create
an architecture that can support many different ways to represent, acquire, and apply many kinds of
commonsense knowledge.
Most participants agreed that we should combine our efforts to develop a model world that supports
simplified versions of everyday physical, social, and psychological problems. This simplified world would
then be used to develop and debug the core components of the architecture. Later, we can expand it to solve
more difficult and more practical problems.
The participants did not all agree on which particular larger-scale application would both attract
sufficient support and also produce substantial progress toward making machines that use commonsense
knowledge. Still, many agreed with the concept of a personalized teaching machine that would come to
understand you so well that it could adapt to your particular circumstances, difficulties, and needs.
Ben Kuipers sketched the diagram shown in figure 8, which captures the general dependencies
between the three points of consensus: Practical applications depend on developing an architecture for
commonsense thinking flexible enough to integrate a wide array of processes and representations of
problems that come up in the model-world problem domain.
(FIGURE 8 OMITTED]
EFTA00176566
A Collaborative Project?
At the end of the meeting, we brainstormed about how we might organize a distributed, collaborative
project to build an architecture based on the ideas discussed at this meeting. It is a difficult challenge, both
technically and socially, to get a community of researchers to work on a common project. However,
successes in the Open Source community show that such distributed projects are feasible when the
components can be reasonably disassociated.
Furthermore, this kind of architecture itself should help to make it easy for members of the project to
add new types of representations and processes. However, we first would have to develop a set of protocols
to support the interoperation of such a diverse array of methods. Erik Mueller suggested that such an
organization could be modeled after the World Wide Web Consortium (W3C), and its job would largely be
to assess, standardize and publish the protocols and underlying tools that such a distributed effort would
demand.
While we did not sketch a detailed plan for how to proceed, Aaron Sloman, Erik Mueller and Push
Singh listed some technical steps that such a project would need:
First, it should not be too hard to develop a suitable virtual model world, because the present-day
video game and computer graphics industry has produced most of the required components. These should
already include adequate libraries for computer graphics, physics simulation, collision detection, and so
forth.
Second, we need to develop and order the set of miniscenarios that we will use to organize and
evaluate our progress. This would be a continuous process, as new types of problems will constantly be
identified.
Third, what kinds of protocols could the agents of this cognitive system use to coordinate with each
other? This would include messages for updating representations, describing goals, identifying impasses,
requesting knowledge, and so forth. We would consider the radical proposal to use, for this, an lnterlingua
based on a simplified form of English, rather than trying to develop some brand new ontology for
expressing commonsense ideas. Of course, each individual agent could be free to use internally whatever
ontology or representation scheme was most convenient and useful.
Fourth, we would need to create a comprehensive catalog of ways-to-think, to incorporate into the
architecture. A commonsense system should be at least capable of reasoning about prediction, explanation,
generalization, exemplification, planning, diagnosis, reflection, debugging, learning, and abstracting.
Fifth, what are the kinds of self-reflections that a commonsense system should be able to make of
itself, and how should these invoke and modify ways-to-think as problems are encountered?
Sixth, in any case, such a system will need a substantial, general-purpose, and reusable commonsense
knowledge base about the spatial, physical, bodily, social, psychological, reflective, and other important
realms, enough to deal with a broad range of problems within the model world problem domain.
Finally, we might need to develop a new kind of "intention-based" programming language to support
the construction of such an architecture.
Towards the Future
Since our meeting similar sentiments have been expressed at DARPA, most notably in the recent
"Cognitive Systems" Information Processing Technology Office (IPTO) Broad Agency Announcement
(BAA) (Brachman and Lemnios 2002), which solicits proposals for building AI systems that combine
many elements of knowledge, reasoning, and learning. While we are gratified that architectural approaches
are becoming more popular, we would like to see more emphasis placed on architectural designs that
specifically support more common sense styles of thinking.
There was a genuine sense of excitement at this meeting. The participants felt that it was a rare
opportunity to focus once more on the grand goal of building a human-level intelligence. Over the next few
years, we plan to develop a concrete implementation of an architecture based on the ideas discussed at this
meeting, and we invite the rest of the Al community to join us in such efforts.
Acknowledgements
EFTA00176567
We would like to thank Cecile Dejongh for taking care of the local arrangements, and extend a very
special thanks to Linda Stone for making this meeting happen. This meeting was made possible by the
generous support of Jeffrey Et/stela,
Note
(I.) This meeting was held in St. Thomas, U.S. Virgin Islands, on April 14.16, 2002. The meeting
included the following participants: Larry Birnbaum (Northwestern University), Ken Forbus (Northwestern
University), Ben Kuipers (University of Texas at Austin), Dou las Lenat (Cycotp), Henry Lieberman
(Massachusetts Institute of Technology), Henry Minsky (
Systems), Marvin Minsky (Massachusetts
Institute of Technology), Erik Mueller (IBM T. J. WatsonResearch Center), Srini Narayanan (University
of California, Berkeley), Ashwin Ram (Georgia Institute of Technology), Doug Riecken (IBM T. J. Watson
Research Center), Roger Schank (Carnegie Mellon University), Mary Shepard (Cycorp), Push Singh
(Massachusetts Institute of Technology), Jelivlark Siskind (Purdue University), Aaron Sloman
(University of Birmingham), Oliver Steele (Systems), Linda Stone (independent consultant), Vemor
Vinge (San Diego State University), and Michael Witbrock (Cycorp).
References
Braclunan, Ronald; and Lenutios, Zachary 2002. DARPA's New Cognitive Systems Vision.
Computing Research News, 14(5):1, 8.
Kitano, Hiroaki; Asada, Minoru; Kuniyoshi, Yasuo; Noda, Itsuki; Osawa, Eiichi; and Matsubara,
Hitoshi. 1997. RoboCup: A Challenge problem for AI. Al Magazine, 18(1):73-85.
Laird, John; Newell, Allen; and Rosenbloom, Paul 1987. SOAR: An Architecture for General
Intelligence. AI Journal, 33(I):1-64.
Lenat, Doug. 1995. CYC: A Large-scale Investment in Knowledge Infrastructure. Communications of
the ACM, 38(11):33-38.
McCarthy, John; Minsky, Marvin; Sloman, Aaron; Gong, Leiguang; Lau, Tessa; Morgenstern, Leora;
Mueller, Erik; Riecken, Doug; Singh, Moninder, and Singh, Push 2002. An Architecture of Diversity for
Commonsense Reasoning. IBM Systems Journal, 41(3):530-539.
Minsky, Marvin. (forthcoming). The Emotion Machine. Pantheon, New York. Several chapters are
on-line at http://web.media.mit.edu/people/minsIcy
Minsky, Marvin 1992. Future of AI Technology. Toshiba Review, 47(7).
Singh, Push ; and Minsky, Marvin. 2003. An Architecture for Combining Ways to Think Paper
presented at the International Conference on Knowledge Intensive Multi-Agent Systems. Cambridge,
Mass., September 30--October 3.
Sloman, Aaron 2001. Beyond Shallow Models of Emotion. Cognitive Processing, 1(1):530-539.
Marvin Minsky has made many contributions to AI, cognitive psychology, mathematics,
computational linguistics, robotics, and optics. In recent years he has worked chiefly on imparting to
machines the human capacity for commonsense reasoning. His conception of human intellectual structure
and function is presented in The Society of Mind which is also the title of the course he teaches at MIT. He
received his B.A. and Ph.D. in mathematics at Harvard and Princeton. In 1951 he built the SNARC, the
first neural network simulator. His other inventions include mechanical hands and other robotic devices, the
confocal scanning microscope, the "Muse" synthesizer for musical variations (with E. Fredkin), and the
first LOGO "turtle" (with S. Papert). A member of the NAS, NAE and Argentine NAS, he has received the
ACM Turing Award, the MIT Killian Award, the Japan Prize, the IJCAI Research Excellence Award, the
Rank Prize and the Robert Wood Prize for Optoelectronics, and the Benjamin Franklin Medal.
Push Singh is a doctoral candidate in MIT's Department of Electrical Engineering and Computer
Science. His research is focused on finding ways to give computers humanlike common sense, and he is
presently collaborating with Marvin Minsky to develop an architecture for commonsense thinking that
makes use of many types of mechanisms for reasoning, representation, and reflection. He started the Open
Mind Common Sense project at MIT, an effort to build large-scale commonsense knowledge bases by
turning to the general public, and has worked on incorporating commonsense reasoning into a variety of
EFTA00176568
real-world applications. Singh received his B.S. and M.Eng. in electrical engineering and computer science
from MIT.
Aaron Sloman is a professor of AI and cognitive science at the University of Birmingham, UK. He
received his B.Sc. in mathematics and physics (Cape Town, 1956), and a D.Phil. Philosophy, from Oxford
(1962). Sloman is a Rhodes Scholar, a Fellow of AAAI, AISB, and ECCAI. He is also author of The
Computer Revolution in Philosophy (1978) and many theoretical papers on vision, diagrammatic
reasoning, forms of representation. architectures, emotions, consciousness, philosophy of Al, and tools for
exploring architectures. Sloman maintains the FreePoplog open source web site and is about to embark on a
large EC-funded robotics project. All papers, presentations, and software are accessible from his home
page: www.cs.bham.ac.uW ass/
RELATED ARTICLE: Establishing a Collection of Graded Miniscenarios.
How would we guide such a project and measure its progress over time? Some participants suggested
trying to emulate the abilities of human children at various ages. However, others argued that while this
should inspire us. we should not use it as a plan for the project. because we don't really yet know enough
about the details of early human mental development.
Aaron Sloman argued that it might be better to try to model the mind of a four- or five-year-old human
child because that might lead more directly toward more substantial adult abilities. After the meeting,
Sloman developed the notion of a "commonsense miniscenario," a concrete description in the form of a
simple storyboard of a particular skill that a commonsense architecture should be able to demonstrate. Each
miniscenario has several features: (1) It describes some forms of competence, which are robust insofar as
they can cope with wide ranges of variation in the conditions; and (2) each comes with some meta-
competence for thinking and speaking about what was done. For example competence can have a number
of different facets, including describing the process; explaining why something was done, or why
something else would not have worked; being able to answer hypothetical questions about what would
happen otherwise; being able to improve performance in such ways as improving fluency, removing bugs
in strategics. and expanding the variety of contexts. The system should also be able to further justify these
kinds of remarks.
Sloman proposed this example of a sequence of increasingly sophisticated such miniscenarios in the
proposed multi-robot problem domain:
I. Person wants to get box from high shelf. Ladder is in place. Person climbs ladder, picks up box, and
climbs down.
2. As for 1, except that the person climbs ladder, fords he can't reach the box because it's too far to one
side, so he climbs down, moves the ladder sideways, then as 1.
3. As for 1, except that the ladder is lying on the floor at the far end of the room. He drags it across the
room lifts it against the wall, then as I.
4. As for I, except that if asked while climbing the ladder why he is climbing it the person answers:
something like "To get the box." it should understand why "To get to the top of the ladder" or "To increase
my height above the floor" would be inappropriate, albeit correct.
5. As for 2 and 3, except that when asked, "Why are you moving the ladder?" the person gives a
sensible reply. This can depend in complex ways on the previous contexts, as when there is already a ladder
closer to the box, but which looks unsafe or has just been painted. If asked, "would it be safe to climb if the
foot of the ladder is right up against the wall?" the person can reply with an answer that shows an
understanding of the physics and geometry of the situation.
6. The ladder is not long enough to reach the shelf if put against the wall at a safe angle for climbing.
Another person suggests moving the bottom closer to the wall, and offers to hold the bottom of the ladder
to make it safe. If asked why holding it will make it safe, gives a sensible answer about preventing rotation
of ►adder.
7. There is no ladder, but there are wooden rungs, and rails with holes from which a ladder can be
constructed. The person makes a ladder and then acts as in previous scenarios. (This needs further
EFTA00176569
unpacking, e.g. regarding sensible sequences of actions, things that can go wrong during the construction,
and how to recover from them, etc.)
8. As for 7, but the rungs fit only loosely into the holes in the rails. Person assembles the ladder but
refuses to climb up it, and if asked why can explain why it is unsafe.
9. Person watching another who is about to climb up the ladder with loose rungs should be able to
explain that a calamity could result, that the other might be hurt, and that people don't like being hurt.
Such a system should be made to face a substantial library of such graded sequences of mini-scenarios
that require it both to ►earn new skills, to improve its abilities to reflect on them, and (with practice) to
become much more fluent and quick at achieving these tasks. These orderings should be based on such
factors as the required complexity of objects, processes, and knowledge involved, the linguistic competence
required, and the understanding of how others think and feel. That library could include all sorts of things
children learn to do in such various contexts as dressing and undressing dolls, coloring in a picture book,
taking a bath (or washing a dog), making toys out of Meccano and other construction kits, eating a meal,
feeding a baby, cleaning a mess made by spilling some powder or liquid, reading a story and answering
questions about it, making up stories, discussing behavior of a naughty person, and learning to think and
talk about the past, the future, and about distant places, etc.
IAC-CREATE-DATE: July 8, 2004
LOAD-DATE: July 09, 2004
EFTA00176570
301 of 1456 DOCUMENTS
Copyright 2005 Gale Group, Inc.
All Rights Reserved
ASAP
Copyright 2005 American Academy of Arts and Sciences
Daedalus
June 22, 2005
SECTION: Pg. 42(10) Vol. 134 No. 3 ISSN: 0011.5266
ACC-NO: 135697725
LENGTH: 5572 words
HEADLINE: Compromised work.
BYLINE: Gardner, Howard
BODY:
One would like to find an abundance of good workers across the professions: teachers who have
mastered their subject matter, present itwell, and behave in a civil manner toward students and peers;
physicians who are knowledgeable about the latest techniques and medications and who cater to the ill no
matter where they are encountered and whether they have resources; lawyers who can argue a case
persuasivelyand who make their services available to those in need, irrespectiveof their ability to pay.
Occasionally the impressive achievements ofsuch individuals are publicly honored; and those concerned
about thelong-term welfare of the society hope that aspiring teachers, physicians, and lawyers will have
ample exposure to such exemplars of good work.
Not surprisingly, the absence of good work commands the attention of scholars, journalists, dramatists,
politicians, and ordinary folk. We are, perhaps naturally, perhaps understandably, fascinated to learn about
the teacher who fails an exam or seduces a student; the physician who fakes her credentials or operates on
the wrong patient; thelawyer who skirts the law or only defends the wealthy. As a friend quipped, Time
Warner might sell more copies if it renamed its venerable business publication Misfortune.
In the GoodWork Project in which my colleagues and I are involved,we are focusing on those
individuals and institutions that aspire toward, and in the happiest case, exemplify, good work. There is
much to be learned from careful study of a journalist like Edward IL Murrow, a physician like Albert
Schweitzer, a publisher like Katharine Graham, a public servant like John Gardner (no relation). Yet it is
important to recognize that many individuals fail to achieve good work, that some do not even strive to be
good workers, and that in the absence of compelling role models, future workers stand little chance of
becoming good workers themselves. Hence, it is justifiable at times to suspend our focus on good work to
see what can be learned from frankly deviant cases.
In what follows, I focus on what we have come to speak of as 'compromised work.' (1) We
conceptualize this variant as work that is not,sirictly speaking, illegal, but whose quality compromises the
ethical core of a profession. We do not concern ourselves with individuals who merit the descriptor 'bad
workers'--the journalist who steals, the physician who commits assault and battery, the lawyer who
murders. Presumably these individuals would engage in such illegal acts irrespective of their professional
status, and it is the job of law enforcement officials, and not of professional gate-keepers, to call these
miscreants to account. Rather, our concern is with the journalist who makes up stories, the politician whose
word has no warrant, the physician who fails to heed the latest medical innovations and thus provides
substandard treatment. Each of these individuals may at one time have embraced core values—journalistic
integrity, political veracity,medical acumen—but at some point turned his back on the profession.If we can
better understand how once good workers begin to compromise their work, we may be able to enhance the
ranks of good workers.
EFTA00176571
It is easiest to spot compromised work in professions that have existed for some time and whose
principal values are widely shared. In such domains there should be consensual processes of training,
recognized mentors, and established procedures in place for censuring or ostracizing those whose work
violates norms of the domain, with disbarment or loss of license as the ultimate sanction. Of the three
professions I will treat in this essay, law is closest to the prototype, journalism is furthest (many journalists
lack formal training), and accounting is somewhere in between.
Since our project began (and no doubt long before), the pages of the newspapers have been filled with
examples of compromised work; indeed, in preparing this essay I have sometimes been tempted to clip half
the stories in the daily newspaper. Here I focus on three cases from recent years that caught both my
attention and that of the broaderpublic. The first case involves Jayson Blair, an ambitious reporter for The
New York Times who was fired after it was discovered he had plagiarized and fabricated stories. The
second case centers on Hill and Barlow, a venerable Boston law firm that closed abruptly when its
profitable real estate department announced it was leaving the firm. The third case centers on the flagship
accounting firm Arthur Andersenthat went bankrupt after the Enron scandal of 2001.
In my initial study of compromised work, (2) I chose these cases because they apparently represented
three levels of analysis: Jayson Blair as an instance of compromised work by a single, flawed individual;
Hill and Barlow as an instance of compromised work within a singleinstitution; and the Arthur Andersen--
Enron debacle as an instance of compromised work throughout a profession. My study revealed, however,
surprising continuities across these three apparently distinct levels of analysis. In each case, I found I was
studying individuals as well as institutions, and, indeed, an entire industry. Also to my surprise, I
discovered that institutions held in high regard might be especially vulnerable to the insidious virus of
compromised work; I hadexpected that such institutions harbored righting mechanisms that for some reason
had failed to detect the of fending party. Finally, I expected that at least some instances of compromised
work would be isolated and of relatively short duration. A far more complex and, to mymind, more
troubling picture emerged--a picture that, moreover, reflects ominous trends in American society.
In 1999, Jayson Blair, a young African American with a flair for writing, became a regular reporter for
The New York Times. Even beforehis stint at the Times, Blair had been regarded by peers and supervisors
with a combination of admiration and suspicion. There was no question that Blair wrote well, had a nose
for important stories, was a gifted schrnoozer, and had impressed the governing powers at the college and
community newspapers where he had worked. At the same time, observers wondered whether he in fact
had exercised the due diligence that is expected of a reporter, and indeed, supervisors had detected ahighly
unusual number of errors in his stories. While he had occasionally been admonished for carelessness, there
had been few consequences. In fact, at the Times, Executive Editor Howell Raines and Managing Editor
Gerald Boyd gave increasingly important assignments to Blair.
When Blair was discovered to have plagiarized a story from the SanAntonio Express-News, he was
immediately forced to resign. Then on May 11, 2003, in an unprecedented bout of self-examination, The
New York Times devoted over four full pages to documentation of numerous cases of invention,
plagiarism, and fraudulent expense and travel reports. Nor did the brouhaha over the Blair affair die down.
Six weeks later, editors Raines and Boyd were forced to resign their posts, and the new editorial regime at
the Times explicitly dissociated itself from the policies and practices of its predecessors.
At first blush, Jayson Blair seemed to be an isolated case--a reporter who refused to play by the rules
and who may well have been emotionally disturbed. And in fact, there is ample evidence that Blair was a
troubled young man who should have been carefully scrutinized foryears. He was so unpopular at his
college newspaper that he was relieved of his editorial position. When he was an intern at The Boston
Globe in 1996-1997 and a freelancer there in 1998-1999, the sloppinessof his coverage was discussed.
Shortly after he began to work full-time at the Times, Metropolitan Editor Jonathan Landman sent around a
note that said, "We have got to stop Jayson from writing for the Times. Right now." Blair soon
accumulated a record number of corrections and complaints about his coverage. His behavior aroused
dislike and suspicion among many of his contemporaries. But despite ample warning signs, Raines and
Boyd took him under their wings; he was praised andoffered ever-more important assignments. And, to the
shame of the Times, the decisive discovery of plagiarism was made not by its own staff but by a reporter
for a regional paper.
EFTA00176572
To be sure, Blair had been a bad egg whose misbehaviors were more flagrant than those of his
contemporaries. But at least since publisher Arthur Sulzberger had appointed Raines as managing editor in
2001,a strong set of explicit and implicit signals had been sent to the Times staff. Reporters were told they
had to increase the "competitivemetabolism" of the news coverage. Those who wrote flashy, trendy stories
were rewarded with promotions, special privileges, and ample front-page coverage. In contrast, reporters
who took a more thoughtful, less sensational approach, who emphasized the journalistic precept
ofcarefulness, found themselves increasingly marginalized. Nor was this new culture a secret: in a much-
discussed portrait of Raines that appeared in The New Yorker in June of 2002, the changing milieu at
theTimes was detailed and critiqued.
Had Jayson Blair been a truly isolated case, it is highly likely that the Sulzberger-Raines-Boyd
managerial team would have survived intact and perhaps continued its questionably hectic pace and
excessively dramatic bent. Once the Blair case broke, however, other heroes and casualties soon emerged.
The most flagrant consequence was the abrupt resignation of star reporter Rick Bragg, who was accused of
using unacknowledged stringers and of embellishing his lengthy and highly evocative stories. While Raines
and Boyd fought to keep their positions, it was probably inevitable that sooner or later they would be
squeezed out. The replacement appointment of Bill Keller, an individual widely considered a contrast in
temperament and journalistic values, served as a sign that the Times was rejecting the go-go atmosphere of
the previous few years.
Under Raines and Boyd, the Times had been engaged in an example ofwhat I will call 'superficial
alignment.' The editors were looking for young reporters who exemplified the pace and coverage they
sought;the fact that Blair was African American was a bonus and, by the editors' own admission, caused
them to cut him slack. For his part, Blair was keen at discerning what his editors desired; and, as befits an
accomplished con man, he knew how to give the impression of good workand to cover his tracks. What
both sides avoided in this pas de deuxwas a genuine alignment that honored the tried-and-true mission of
journalism. Had Blair been subjected to a mentoring regime of tough love, he might have turned into a
genuinely good reporter. And had he somehow slipped through an otherwise well-regulated training and
supervision system, it is unlikely that the discovery of his misdeeds would have caused such turmoil in his
company and, indeed, in the wider journalistic profession.
During the second week of December of 2002, residents of Boston were astonished to learn that the
prestigious law firm Hill and Barlow had closed down the previous weekend. The firm had been in
existence for over a century, was esteemed in the community, and comprised in its legal ranks many
prominent citizens, including at various times three governors of the Commonwealth. With their deep
involvement in thecommunity--exemplified by their defense in the famous Sacco-Vanzetticase of the
1920s--Hill and Barlow partners epitomized what legal scholar Anthony Kronman has called "lawyer
statesmen." For outsiders, there was little reason to suspect any significant problems at Hill and Barlow--
and none whatsoever to prepare them for its sudden dissolution.
A word about partnerships is in order here. Examination of about twelve hundred interviews in the
eight domains considered in the GoodWork Project reveals that only lawyers speak regularly about
partnerships. In part a financial arrangement, in part a social network, the partnership serves as the locus for
daily activity, the attraction andsharing of clients, and the mechanism for services and payment. The
transition from associate to partner is the legal equivalent of the attainment of tenure in the academy; and in
many ways, partners behavelike members of a faculty. Young lawyers serve as associates until, assuming a
good record and available slots, they are welcomed into the partnership, which is likely to be their home for
the remainder of their professional lives. It goes without saying that the health and stability of the
partnership is crucial for its constituent members, staff, and clients.
Each partnership has an institutional culture, passed on both explicitly and implicitly from the older
partners to the new members of the association. By all reports, the institutional culture of the Hilland
Barlow of old stressed intellectual and legal excellence; community service, including the holding of
elected or appointed office; and a willingness to earn somewhat less money than competitors, in return for a
lifestyle that was more balanced and that went beyond the sheer number and rate of billable hours. (3)
Outsider& initial reaction to the sudden closure of Hill and Barlow was shock. After all, this was a
partnership that had been highly esteemed for decades. To observers and the media, it appeared that overly
avaricious lawyers from the real estate division had issued a fait accompli to their bewildered colleagues,
EFTA00176573
thereby in one act destroying a distinguished New England law firm. The shock was compounded by the
fact that the remaining partners did not even try to reconstitute the firm, but instead interpreted this mass
exodus as a sign that the firm could no longer survive.
Closer examination reveals that the problems went back many years,perhaps several decades. Through
the middle of the twentieth century, Hill and Barlow did indeed have a deserved reputation as a firm of
outstanding lawyer statesmen who not only were leaders in litigation and trusts, but who also stood out for
their service to the community. Yet, on my analysis, this sterling reputation turns out to have been a mixed
blessing. By the 1970s and 1980s, the situation in law had changed dramatically throughout the land.
Whether lamented or not, the era of the lawyer statesman was over. Law firms were becoming much larger
and more internationalized; corporate law divisions and the high-metabolism specialty of mergers and
acquisitions were growing morerapidly than other spheres: many large corporations built up their own in-
house legal teams; and individual lawyers were becoming far more mobile, as opportunities to make very
large salaries materialized for those who were willing to jump ship.
None of these trends in itself necessitated a de-professionalization of the law. And indeed, many
moderately sized law firms in New England and elsewhere took steps to modulate these trends: they
increased in size or developed distinctive niches; they actively sought largecorporate clients; and they
reconfigured salary schedules to reward those lawyers who brought in the most business. Perhaps most
importantly, the more reflective firms realized that law was becoming more ofa business; they recruited or
trained professional managers; they were sensitive to the clout of specific partners and divisions; they paid
close attention to changing patterns of income and expenses; they established governance vehicles whereby
the most important members consulted regularly about trends and how best to meet them; they favored
frequent, open, frank communications about all matters that materially affected the firm; and they were
prepared, when necessary and with regret, to retire or marginalize partners who could not in any
demonstrable way contribute to the well-being of the firm.
According to our interviews with former members of Hill and Barlow, the firm did not seriously
undertake any of these measures. Memberscontinued to take pride in the history of the firm, and many
continued to serve the community in various ways. But they did not work any longer as a firm of dedicated
partners (epithets such as 'a hotel forlawyers' and 'university-style governance' were used by
informants).Costs spiraled, but steps were not taken to increase income commensurately (or to lower costs,
for example, by reducing the number of associates or moving to less luxurious quarters). Most damaging,
the Infirm never was able to create a governance structure that was widelyrespected by its members and
that could meet these various challenges. On my analysis, it was the combination of the inordinately
successful real estate group, on the one hand, and the ensemble of dysfunctional governance structures, on
the other, that made the firm's closure inevitable.
I do not conclude that the Hill and Barlow partners necessarily compromised their practice of law per
se. I do believe that both the real estate division, and the remaining partners who failed to deal decisively
with the shifting terrain, undermined law as a profession. Inacting in their own self-interest, they
contributed to the destruction of the accumulated wisdom, public service emphasis, and pluralistic view of
legal practice that had once characterized Hill and Barlow.To the extent that law simply becomes a
collection of free-agent practitioners, for sale to the highest bidder, or a set of employees of multinational
corporations, it will indeed be a diminished profession.
Accounting became a technical rather than back-of-the-envelope practice in the seventeenth and
eighteenth centuries with the widespreaduse of double-entry bookkeeping and other financial and business
innovations. With the rise of corporations a century ago, and the adventof increasingly complex taxation
and investment policies, the role of the independent certified auditor gained steadily in importance.
Particularly at times of crisis, such as the stock market collapses during the first two-thirds of the twentieth
century, the public was reminded of the importance of the accounting professions. Perhaps to hisadvantage,
the auditor was seen as a rather colorless individual whofollowed technical rules in the manner of the
archetypical Dickensian clerk or Weberian bureaucrat.
Within the profession and amongst those with close ties to the profession, there was keen awareness of
crucial shifts that began in the1970s. The wall that had once separated auditors from the firms theywere
monitoring had begun to crumble. Increasingly, personnel circulated between accounting firms and well-
heeled client firms. Accounting firms set up consulting branches that worked with client firms; over time
EFTA00176574
the amount of consulting business often equaled or even surpassed that dedicated to the monitoring of the
books. In the go-go financial milieu of the 1980s and 1990s, as documented in our Good Work Project and
many other sources, markets became increasingly dominant in many spheres of life. Indeed, at the end of
the 1990s, I made a quip that turned out to be uncannily prophetic: "If markets come to control everything,
in the end there will be only one profession--accounting. And that is because only the auditors will be able
to tell us whether the books are on the level or have been cooked."
But like most of the public, I was unprepared for the huge accounting scandals that captured the
headlines at the start of the twenty-first century. Led by the renowned firm Arthur Andersen, all the
majorfmns were shown to have abandoned their professional disinterestedness (or 'independence,' as it is
referred to in the profession) in flagrant ways. It was no longer unusual for accountants to hold stock in,
work for, or consult for the firms they were allegedly monitoring;and for their pan, firms went out of their
way to provide lucrativework and extra perks for the supposedly independent auditors.
The smoking gun was the relationship between energy giant Enron and the flagship professional
services firm of Arthur Andersen. These firms met powerful sanctions: bankruptcy with possible jail terms
for those high-level managers whose involvement crossed the line from compromised to frankly bad work.
At the time of this writing, other major accounting firms like Ernst and Young and
PricewaterhouseCoopers have also had to pay significant penalties; punitive new regulations and legislation
have been put into place; and many other business firms--established ones like General Electric and Xerox,
newer ones like Tyco, WorldCom, and Global Crossing--have undergone probes or have even dissolved.
Mean-while, the tacit or demonstrable complicity of members of boards of directors has been amply
documented, and the domain of accounting as a whole lies very much under suspicion, its standingas a
profession open to strong challenge.
The core value of the profession of public accounting is captured in the descriptor 'public.' Accountants
receive training, licenses, and status commensurate thereto on the assumption that they will represent the
public's interest in their review of the financial practicesof individuals or corporations. Should the books
appear questionablein any way, it is the duty of the public accountant to raise questions to the responsible
individual or corporation, and, if necessary, to refuse to certify that the accounts conform to generally
accepted accounting principles.
Whether one thinks of journalism, law, or accounting, it is tempting to posit a golden age--a time when
professionals were professionals, and the vast majority exemplified the highest values of the domain. But
the mixed reputation of lawyers and journalists over the decades reveals the superficiality of such an
analysis. And when one examines the history of accounting in the United States in the twentieth century,
one also discovers an oscillation between periods when auditors were under suspicion for questionable
practices, and periods when corrective measures were installed and the prestige of the profession was
restored. Indeed, such a swing of the pendulum can be seen in thehistory of Arthur Andersen.
At the start of the twentieth century, like other accounting firms, Andersen carried out non-audit
services. By the 1960s, it was possible to become an Andersen consultant without having worked as an
auditor for the two prior years; and in 1973, a separate consulting arm of the firm had been set up. In the
late 1970s, CEO Harvey Kapnick tried unsuccessfully to split the firm into two separate entities and was
pressured to resign thereafter. During the 1980s, the consulting arm of the firm became increasingly
powerful, and the lines between consulting and auditing blurred. By the late 1980s, the tension between the
accounting and consulting arms was so acute that the two parts ofthe firm were in constant argument and
occasionally in court. By 1999, Arthur Andersen had become the slowest growing of the Big Five
accounting firms, and in 2000, the consulting arm, Accenture, finally became a wholly independent entity.
As is now well known, Andersen had become the auditor for Enron. Widely touted as a model for a
new kind of company for a new millennium, Enron trafficked in the selling of energy (especially gas) and
energy futures. In 2000, it was, on paper, the seventh largest firm in the United States, with a book value of
100 billion dollars. In 2001, the Enron bubble burst when it became clear that much of the corporation's
alleged size, activity, and profitability was in fact fraudulent, the result of imaginative advertising and
improper accounting. Andwhen Arthur Andersen began to shred its Enron documents, the fate ofthe firm
was sealed in the eyes of the media, the general public, and, eventually, the legal system.
EFTA00176575
Studies of the Andersen-Enron connection reveal that it had been deeply compromised for years.
Enron was one of Andersen's largest clients; it paid a total of over fifty million dollars a year to Andersen's
auditing, consulting, and tax divisions. Employees shuttled back and forth between the two companies with
such ease and frequency that it was sometimes difficult to tell for which they were working; at least eighty
former Andersen auditors were working for Enron. The supposed line between the company being audited
and the auditors evaluating the books of that company had become so blurred that, in effect, itno longer
existed. And yet it has proved difficult to demonstrate sheer illegality. This is both because the nature of
Enron's business was so new and so convoluted, and because so much of the role of the auditor/accountant
remains an issue of professional judgment rather than of sheer legality or illegality.
In my view, the chief embodiment of compromised work in the accounting profession is the condition
of wearing two hats--hats that inevitably pit key interests against one another. On the one hand, as
representatives of the public, auditors and their umbrella organizations are supposed to remain at arm's
length from the companies they monitor. On the other hand, the excitement and the monetary gains
availablefor consulting prove irresistibly seductive for many auditors and their umbrella organizations. One
cannot at the same time offer advice and feedback to companies while standing disinterestedly apart from
their practices; in effect, one has become judge and litigant at the same time.
In each of the cases discussed, the background history covered a much longer period than I had
anticipated. Jayson Blair's case reflected larger-scale trends at the Times, dating back to the 1980s and
exacerbated by the appointment of a new managerial regime in 2001; Hill and Barlow failed to recognize,
let alone adapt to, forces that middle-sized law firms had been confronting for decades; and Arthur
Andersen encountered longstanding tensions in the accounting profession regarding appropriate relations
with clients. Nor are the cases restricted to the particular examples on which I happened to focus: Within
journalism, similar scandals had occurred in recent years at The BostonGlobe, The Washington Post, USA
Today, and The New Republic. Severaldozen major law firms in Boston and elsewhere had either closed
dovmor were absorbed into larger and more profitable firms. In recent years, each of the Big Five
accounting firms saw significant scandals; comparable 'multiple hats' problems arose in Europe and Asia:
and compensatory legislation like the Sarbanes-Oxley Act caused turbulence in a great many American
corporations. Whatever their usefulness for conceptualization and exposition, the three levels of analysis
that I had selected turned out to be more closely related than I had expected.
If the study of good work is in its early adolescence, then the examination of compromised work is in
its infancy. Firm conclusions would be decidedly premature. And yet, given the importance of the problem,
and its indissoluble links to issues of good work, a few summary comments are in order.
Because persons and institutions can go bad for any number of reasons, isolated cases of compromised
work cannot be prevented. What is susceptible to treatment is the soil in which compromised work is likely
to arise and thrive. Our three cases and others that could have been treated suggest that superficial signs of
alignment can in fact be the enemies of good work. Respected institutions like The New York Times, Hill
and Barlow, and Arthur Andersen create in their members--and in the general public--the belief that these
institutions are inherently good and above suspicion. Those assigned the job of surveillance internally or
externally may become lax, and, accordingly, those who arc tempted to practice compromised work may
find an unexpectedlypromising breeding ground. (In writing about the Jayson Blair case in The New
Yorker of June 30, 2003, Elizabeth Kolbert said that this "paper of record" cannot afford to "check up" on
its employees; it hasto assume they are trustworthy.)
Indeed, these circumstances obtained in each of our three examples: Jayson Blair was on the make;
Raines and Boyd wanted to remake the culture of the Times even at the cost of violating its most
importantvalues. And while various alarm bells tolled, none sounded loudly enough or insistently enough
to be heard. Despite the enviable reputation of Hill and Barlow, many lawyers left the partnership starting
in the 1980s; the particular requests of the real estate group were not taken seriously enough; and attempts
to address the issue of financial survival and partnership communication were undertaken too late andwith
too little sense of urgency. Arthur Andersen had actually resisted temptations to enter the consulting world.
But when it finally succumbed, it entered with a vengeance--and despite warnings about conflicts of
interest. Spokespersons for the firm continued to enunciate the fundamentals of accounting, but too many
partners and workers were trying to wear two incompatible hats. When the ambivalent Andersen
encountered the swashbuckling Enron, a disaster was in the making.
EFTA00176576
In each case, superficial features and blandishments obscured the central values of the domain. During
the Blair-Raines period at the Times, scrupulous and fair reporting was sacrificed to the
immediatelyaccessible and sexy. At Hill and Barlow, the norms of an effective partnership were
undermined, as lawyers and entire departments went their own selfish way. And sometime in the last few
decades, those responsible for the atmosphere of an accounting company forgot that it was supposed to be a
public trust. Those on the inside should have seenthese problems and made loud noises, but efforts to right
the culture were too weak and ineffective. And so in each case it took a dramatic event--Blaits plagiarism,
the real estate department's exodus, the Enron meltdown--to reveal what should have been clearer to those
onthe outside and clearest to those entrusted with preserving and embodying the values of the domain.
What happens when such a critical point is reached? It is possible, of course, that the domain will
continue to deteriorate, and may come to be replaced altogether. Newspaper editor Harold Evans has
quipped, "The problem many organizations face is not to stay in business but to stay in journalism." The
lawyer statesman no longer exists; it remains unclear whether he is being replaced by a viable option, or
whether lawyers have just become high-priced free agents or cogs in a corporate legal machine. And if
there are too many Enrons and Global Crossings, the Big Five will dwindle to Little Zero--and it is not
clear whether the books will be monitored in the future by independent accountants, government officials,
or private investigators.
It is also possible that these professions will continue to survive but attract a different type of person
with different kinds of values. With few exceptions, for example, broadcast television joumalismexists as
entertainment rather than as news. Totalitarian countries have bookkeepers, but, as the old joke goes, they
produce "whatever numbers you would like us to produce." And it is certainly possible tohave lawyer
whores who sell their services to the highest bidder. Insuch cases, those who want to know what is really
happening in the world, whether the books are really accurate, or whether they can get a fair trial, will no
longer look to the members of the ascribed profession.
One goal of the GoodWork Project is to help bring about a happier scenario. Professions will always
feel pressures of one type or another, and, at the time of powerful market forces, these pressures can be
decisive. The forces cannot be ignored; they must be dealt with--but they must not be succumbed to. Those
individuals, institutions, andprofessions that actively cope with these forces while adhering to the central
and irreplaceable values of the domain are most likely to survive and to thrive.
How to do this? In our project, we speak of the four Ms that help to propagate good work (these were
initially designed to address individuals, but they can be applied as well to institutions and even whole
professions). The Ms seek answers to the following questions: Whatis the mission of our domain? What are
the positive and negative models that we must keep in mind? When we look into the mirror as individual
professionals, are we proud or embarrassed by what we see? And: When we hold up the mirror to our
profession--or, indeed, our society--as a whole, are we proud or embarrassed by what we see? And, if
thelatter, what are we prepared to do about it?
I suggest that if the individuals and institutions described here had perennially posed these questions
and tried to answer them in a serious, transparent way, they would not have become targets for our study.
Howard Gardner is John H. and Elisabeth A. Hobbs Professor of Cognition and Education at the
Harvard Graduate School of Education. For the last decade, he has codirected the Good Work Project with
Mihaly Csikszentmihalyi and William Damon. Gardner has been a Fellow of the American Academy since
1995.
[c] 2005 by the American Academy of fits & Sciences
1 I thank Jeffrey Epstein for his support of these investigations.
2 I thank Ryan Modri, Paula Marshall, and Deborah Freier for theirinvaluable research efforts.
3 Technically, Hill and Barlow became a corporation in 1992.
LOAD-DATE: December 28, 2005
EFTA00176577
270 of 1456 DOCUMENTS
Copyright 2005 Telegraph Group Limited
All Rights Reserved
The Daily Telegraph (LONDON)
November 29. 2005 Tuesday
SECTION: FEATURES; Science; Pg. 26
LENGTH: 1091 words
HEADLINE: A DIY guide to saving Planet Earth Human survival depends on problem fixing not
avoidance - in particular learning how to cool down our planet, says David Deutsch
BYLINE: David Deutsch
BODY:
Let's start with a couple of ideas that everyone knows. The first - dramatically named Spaceship Earth -
is that our planet is uniquely suited to us and our survival. The universe outside is implacably hostile; if we
mess up our spaceship, we have nowhere else to go. The second is that, despite our traditional self-image,
human beings are not the hub of existence: as Stephen Hawking famously put it, we're just a chemical scum
on the surface of a typical planet in orbit around a typical star on the outskirts of a typical galaxy
Everyone knows these things, yet they arc both false. In fact, if you were looking for a pair of truths so
important that it's worth carving them on blocks of stone and reciting them every morning before breakfast,
you could do a lot worse than to carve denials of those two ideas
Are we at a typical place? Most places in the universe arc not on a planet, or even in a galaxy. Travel
right outside the galaxy - say, 100,000 light years - and you still haven't reached a typical place. You will
have to go about 1,000 times as far, into deep, intergalactic space, so remote that if the nearest star were to
explode as a supernova, it would be too faint to see. It's also very cold, less than three degrees above
absolute zero. And it's empty: less than one millionth the density of the highest vacuum that scientists can
currently attain.
That is how unlike Earth a typical location is. Yet the two are similar in one remarkable way.
Take a telescope and gaze even further out than where we've just been, at a "quasar". That was
originally short for "quasi-stellar object", meaning "it looks like a star". But we now know what it really is.
Billions of years ago, and billions of light years away, the centre of some galaxy collapsed towards a super-
massive black hole. Intense magnetic fields directed some of the matter and gravitational energy of that
collapse back out into intense jets, illuminating the surrounding gas with the brightness of a trillion suns.
Billions of years later on the other side of the universe, a certain kind of chemical scum can accurately
describe, model, predict and explain what those jets really are. One physical system, the human brain,
contains an accurate working model of an utterly dissimilar one, a quasar. Not just a superficial image but
an explanatory model embodying the same mathematical relationships and causal structure. That's
knowledge.
And if that weren't amazing enough, the faithfulness of this model is continually increasing. That's the
growth of knowledge. So this chemical scum is different. It models, with ever-increasing precision, the
structure of everything. Our planet, thanks to us, is a hub that contains within itself the structural and causal
essence of the rest of physical reality.
This doesn't require any special physics or miracle. Just matter and energy - and evidence, with which
we chose between rival explanations of what is really out there. In intergalactic space, these three
prerequisites are at their lowest ebb: it's empty, cold and dark.
EFTA00176578
But imagine a solar-system-sized cube of intergalactic space. That cube still contains a million tons of
matter. Which is more than enough, say, to build a fusion-powered space station complete with scientists
who might be collecting evidence to create an open-ended stream of knowledge, just like us - if the right
knowledge were there to start it off.
Therefore we are not in a uniquely hospitable place either. If intergalactic space is capable of creating
an open-ended stream of explanations, then so is almost anywhere. And the limiting factor, both there and
here, is not physical resources but knowledge.
The Astronomer Royal, Sir Martin Rees, has written a book about our vulnerability to scientific
accidents, terrorism using weapons of mass destruction and other dangers: he thinks civilisation has only a
50 per cent chance of surviving this century. But I believe our survival depends not on chance but on
whether we can create the relevant knowledge in time. It always has depended on that, and always will. The
vast majority of all species and all civilisations that have ever existed are now extinct. If we want to be the
exception, our only hope is to harness the one feature that distinguishes our species and our civilisation
from all others, namely our special relationship with the laws of physics: our ability to create new
knowledge.
Take global warming. According to the best available scientific theories, it is too late to avoid a global-
warming disaster. For if it's true that our best option is to suppress carbon-dioxide emissions with the Kyoto
protocol at a cost of hundreds of billions of pounds, then that's already a disaster by any reasonable
measure.
And those measures aren't even purported to solve the problem, merely to postpone it a little. Most
likely it was already too late before anyone even knew about it: in the 1970s, the best available science was
telling us that industrial emissions were about to precipitate a new Ice Age that would kill billions. The
lesson seems so clear that I am baffled that it does not inform public debate: it is that we cannot always
know.
No precautions, and no precautionary principle, can avoid problems that we do not yet foresee.
Therefore, society needs to shift its stance from problem avoidance to problem fixing. The world is abuzz
with plans to cut emissions at all costs. It ought to be buzzing with plans to cool the planet. Or to thrive on
a wanner one. And not at all costs, but efficiently. Some such plans exist: swarms of mirrors in space that
would deflect sunlight away from the Earth; encouraging aquatic organisms to eat more carbon dioxide,
and so on. Such problem-fixing ideas, currently mere fringe research, ought to be at the heart of
humankind's approach to an unknowable and dangerous future. The ability to put things right, not the
impossible prescience needed to stave off all harm in advance, is our only hope of survival.
So take those two stone tablets and carve the two denials I spoke of. On the first, carve: problems are
inevitable. And on the second: problems are soluble.
David Deutsch is a professor of physics at Oxford University. This month he won the $100,000 "Edge
of Computation" prize, funded by the philanthropist Jeffrey Epstein, for his work on quantum computers.
When he first proposed quantum computation in 1985, it seemed only a theoretical possibility. But the past
decade has seen simple quantum computers that many believe will pave the way to a scientific revolution.
LOAD-DATE: November 29, 2005
EFTA00176579
233 of 1456 DOCUMENTS
Copyright 2006 Associated Press
All Rights Reserved
The Associated Press State & Local Wire
March 17, 2006 Friday 11:52 PM GMT
SECTION: INTERNATIONAL NEWS
LENGTH: 1513 words
HEADLINE: A package of news briefs from the Caribbean
BYLINE: By The Associated Press
BODY:
CARIBBEAN: Sugar producers in final push to get more EU aid
GEORGETOWN, Guyana (AP) The Caribbean will send another team to several European capitals in
a final push to get more aid for the region's sugar industry after large subsidy cuts were imposed in January,
an official said Friday.
Representatives from the African, Caribbean and Pacific trade group head to Europe in April,
following a first group that went in early March seeking extra funds to deal with the EU's 36-percent cut in
sugar subsidies.
The EU for years gave its former colonies in the Caribbean, Africa and the Pacific preferential access
to its markets and paid high prices to encourage development. The World Trade Organization said the
regime was unfair and ordered the bloc to reduce quotas and prices for sugar, as well as for bananas and
cotton.
The EU has earmarked US$47 million ([#x20acJ40 million) in aid for the 18 sugar producing ACP
countries in 2006. Caribbean sugar producers argue the reduced compensation is unfair because EU farmers
who face the same subsidy cuts were to be compensated US$7.9 billion (t#x20ac]6.5 billion).
Caribbean sugar producers include Guyana, Jamaica, Belize, Trinidad and Barbados. St. Kitts closed
its industry after the cuts were first announced and because of rising production costs.
ST. VINCENT: St. Vincent police find bullet that killed PM's press secretary
KINGSTOWN, St. Vincent (AP) St. Vincent police have recovered the single bullet that killed the
prime minister's press secretary and have sent it to another Caribbean island for analysis, an official said
Friday.
The bullet was found imbedded in a seat in Glen Jackson's sport utility vehicle, said Bertram Pompey,
acting police commissioner, who declined to specify where the bullet was sent for testing.
Jackson, whose nude body was discovered Feb. 6 in the SUV near his home in the Cane Garden area
outside the capital, was Prime Minister Ralph Gonsalves' press secretary. He played major roles in the
governing Unity Labor Party's successful 2001 and 2005 elections campaigns and hosted a radio talk show
program.
Gonsalves has said two Scotland Yard specialists were expected to join three British investigators
working with local authorities to investigate Jackson's death. Thousands of people turned out Wednesday
for his funeral.
About 118,000 people live in St. Vincent and the Grenadines, an island chain in the southeast
Caribbean Sea.
EFTA00176580
JAMAICA: Jamaican man charged with killing six family members
KINGSTON, Jamaica (AP) A man has been charged with killing six family members, including four
children, whose bodies were found along a beach in western Jamaica last month, police said Friday.
Michael McLean, 38, was charged Thursday with six counts of murder, police said.
McLean, the common-law husband of one of the victims, Terry-Anne Mohammed, 42, has been in
custody since Feb. 28. He turned himself into police because he said he feared for his life after neighbors
accused him of the murders.
Mohammed's burnt corpse was found by police about a half-mile away from the mutilated body of her
8-year-old son, Jessie Ogilvie. The bodies of Mohammed's niece, Farika IMNIcCool, 27, and two of
her children were also found on the beach with their throats slashed.
One week later, police say McLean led them to a nearby parish where MtvIcCool's 6-year-old
daughter, Jhaid, was buried in a shallow grave.
The slayings may be drug-related, said Arthur Martin, assistant commissioner of police.
There were a record 1,669 homicides last year in Jamaica, which has recently received the help of
Scotland Yard and London's Metropolitan Police to fight the crime wave.
HAITI: New U.S. ambassador arrives, takes up post
PORT-AU-PRINCE, Haiti (AP) The United States will provide support to Haiti and work with the
country's recently elected government, the new U.S. ambassador said Friday.
Janet A. Sanderson, former ambassador to Algeria, also has served at diplomatic missions in Egypt,
Jordan, Israel, Kuwait and Bangladesh.
"With the election of a new president, new perspectives now present themselves to Haiti," she said
while presenting her credentials to the Haitian government. "Haitians are looking for a better life. And they
are ready though impatient to work ardently to succeed."
President
W. Bush nominated the career diplomat to replace James Foley, who left Haiti late
last year.
The United States is one of the main donors to Haiti, the poorest country in the Western Hemisphere.
GUYANA: U.S. diplomat lambasts drug trade, tells police to stop fraternizing with criminals
GEORGETOWN, Guyana (AP) The drug trade is fueling a surge in violent crime and corruption in
Guyana, and police must stop fraternizing with known drug traffickers, a U.S. official said Friday.
The drug trade has grown from a trickle to a multimillion dollar business in the South American
country, and communities are small enough for everyone to know who is involved in it, said Michael
Thomas, the U.S. embassy's deputy chief of mission.
"The public will not trust a police officer they see having lunch with a drug trafficker," said Thomas,
who spoke at the end of an FBI-sponsored community policing training course.
Drug trafficking accounts for an estimated 20 percent of the country's gross domestic product, the U.S.
State Department said in its annual narcotics report released last week. Local media regularly report crimes
that are believed to be related to drugs, the report said.
Weak law enforcement has contributed to the problem, and U.S. federal agents believe anti-drugs
agencies intercept a small amount of the cocaine that transits Guyana, the report said.
PUERTO RICO: U.S. contractor gets 10-year sentence in education fraud case
SAN JUAN, Puerto Rico (AP) A U.S. contractor was sentenced Friday to 10 years in prison for his
role in a US$4.3 million ([ffx20ac]3.6 million) fraud scandal involving Puerto Rico's education department
and its former chief.
EFTA00176581
Norman Olson was convicted of four counts of bribery for paying more than USS73,000
([#x20ac]60,400) in political favors as part of a scheme uncovered four years ago.
Olson, president and owner of National School Services, a Chicago-based business that provides
teacher training and education consultants, said he plans to appeal.
"I respect the decision of this court even though I feel that I am innocent of these charges," Olson said
following his sentencing.
Olson was found guilty of paying bribes to Victor Fajardo, former education secretary from 1994 to
2000, in exchange for contracts with the department between 1999 and 2000.
Fajardo pleaded guilty in 2002 to extorting some USS4.3 million from contractors doing business with
his agency.
U.S. VIRGIN ISLANDS: Nobel Prize winning physicists debate universe structure in U.S. Virgin
Islands
CHARLOTTE AMALIE, U.S. Virgin Islands (AP) Twenty of the world's top physicists, including
three Nobel Prize winners, are meeting in the U.S. Virgin Islands to debate the structure of the universe.
Nobel prize winners Gerardus 't Hoeft, David Gross and Frank Wilczek, and experimental and
theoretical physics pioneer Stephen Hawking are among the minds that have converged in the island of St.
Thomas to discuss some of physics most puzzling questions, such as the existence of black holes and
alternate dimensions.
"This is a remarkable group, as far as the level of people who are here," said Wilczek, who won the
2004 Nobel Prize in physics with Gross and H. David Politzer for their explanation of the force that binds
particles inside the atomic nucleus.
Jeffrey Epstein, a New York money manager whose J. Epstein Virgin Islands Foundation helped
finance the six-day conference that began Thursday night, said the U.S. Caribbean territory's natural beauty
will help the scientists relax and concentrate.
"You work best with friends. The idea is to take them for a walk on the beach. Take them on a
submarine ride," he said. "I think some really great ideas will come out of this."
CRICKET: Solanki spurs England A to series-leveling win
BRIDGETOWN, Barbados (AP) Captain Vikram Solanki spanked 92 as England A cruised to a series-
leveling 90-run triumph over West Indies A in their fourth one-day cricket international at Windward
Cricket Club on Friday.
The five-match rubber stood at 2-2 with the decider on Sunday at the same venue.
Solanki, the Worcestershire right-hander, cracked nine fours off 121 balls to lead the visitors to a
formidable 269 for nine off 50 oven.
The home team limped to 179-9 off 50 oven in its pursuit. England fast bowler Sajid Mahmood
engineered a top-order slide, claiming three for 33 while offspinner Gareth Batty took 3-26.
Left-hander Ryan Hinds topscorcd for West Indies with a labored 32 off 70 balls.
England A, batting first after winning the toss, stumbled early on as West Indies' new ball pair of
Andrew Richardson and Tino Best reduced it to 15-2 in the fifth over.
But Solanki and Jamie Dalrymple added 132 for the third wicket to tilt the balance back to their side.
Dalrymple cracked four fours and three sixes in 62 off 75 balls before he was stumped trying to hit out
at offspinner Omani Banks.
LOAD-DATE: March 18, 2006
EFTA00176582
461 of 1456 DOCUMENTS
Copyright 2004 SOFTLINE INFORMATION, INC.
Ethnic NewsWatch
Forward
April 23, 2004
SECTION: Vol. CVII; No. 31: Pg. 6
SLI-ACC-NO: 0604FWDM 104 000012
LENGTH: 936 words
HEADLINE: Fund Helps Persecuted Scholars Reach Safe Havens
BYLINE: Popper, Nathaniel
BODY:
In a seemingly different life, Ahmed Subhy Mansour was a scholar at
Cairo's venerated AI-Azhar University. He studied the history of dictatorship
in Islam and the place of death and paradise in the Koran. But some aspect of
his research did not go over well with the authorities, and in 1987 he was
fired from his position and jailed for two months.
Since then he has searched for a place to continue his work and his life,
particularly after a number of newspapers accused him of upholding Zionism, a
crime punishable by death in Egypt. After 15 years of wandering, last year he
finally found a new home -- as a research fellow at Harvard University.
The match was made through the Scholar Rescue Fund, started two years ago
by the Institute of International Education. Since it was created, the rescue
fund has enabled Mansour and 44 other scholars to escape persecution in their
home countries, and -- just as importantly for many of them -- to continue
their scholarly work with a position at an American university. At Harvard, for
example, Mansour has pushed ahead with the creation of a center for studying
and reforming the Wahabi influence on Islamic institutions in America.
The rescue fund is not the first such project run by the International
Institute of Education, which also sponsors the Fulbright scholarship program.
During the 1930s and 1940s, the institute's Emergency Committee in Aid of
Displaced Foreign Scholars helped bring more than 330 scholars, most of them
Jewish, from Nazi Germany to the United States, including such luminaries as
philosopher Martin Buber, physicist Enrico Fermi and novelist Thomas Mann.
Descendents of several of those earlier scholars, along with families of
other Jewish refugees, gathered recently at the Park Avenue apartment of Jewish
philanthropist Patti Kenner to raise money to help revive the rescue program.
After cocktails, the crowd of about 100 guests retired to Kenner's warm living
room to sit on plush couches among pastoral landscape paintings. Four recently
rescued scholars had been brought in for the evening, and two of them told
their respective tales of persecution in Iran and Pakistan, which seemed much
more than a world away from the safety of the Upper East Side.
"I've had such an easy life," Kenner said after hearing the scholars
speak, with a tone of gratitude that was representative of her guests. "I've
never experienced anything difficult. We're all so lucky."
EFTA00176583
The fund is being revived at a time when many observers are talking about
global antisemitism reaching its highest levels since the 1930s, when the last
rescue program was in operation. In the program's current incarnation, though,
none of the 45 scholars who have been rescued are Jewish.
The one scholar so far whose work was connected to the Jewish community
was a Palestinian scholar, who felt threatened by both Israeli and Palestinian
officials for his work analyzing the policy of political assassinations.
"He was advocating less violence on both sides, and it made him unpopular
with a lot of people." according to Robert Quinn, director of the Scholar
Rescue Fund.
The rescue fund has little in the way of guaranteed funds to ensure its
survival. The goal of the night was to raise 1 million for an endowed chair in
the name of Ruth Gruber, a 93-year old photojournalist who was on hand to tell
of her trip to Europe in 1944, when she helped rescue 1,000 Jewish refugees.
The Gruber chair is part of a larger effort to create a 10 million
endowment that is being leesefugee-turned-millionaire Henry Jarecki, along
with fellow businessmen
Soros, Thomas Russo and Jeffrey Epstein.
While the roster of scholars who have been helped suggests that the
Jewish funding for the program does not come out of a narrow ethnic
self-interest, the scars of Jewish history were evident beneath the surface of
the appeals for donations at Kennels apartment.
The guest speaker for the night was Hanna Holborn Gray, who came over
with her parents through the 1930s rescue program and went on to become the
first female president of the University of Chicago.
"In the 1930s, the German academic world was seen as a model, and one saw
how quickly that could vanish," Gray recalled.
Almost all of the 45 scholars funded in the last two years have hailed
from either African or Muslim-majority countries. Many of them -- including
Mansour and an Iranian scientist who spoke at Kennels home -- have been
punished for the pro-Western and pro-Israel slant in their work.
The fund's directors, however, have been astonished at the diversity of
the 450 scholars from 84 countries who have applied so far. Many of the
applicants come from far beyond the traditional disciplines of the humanities
in which dissidents might be expected to work.
The threat of bodily harm was a constant for most of the applicants, and
Jarecki ominously remembered that many of the more than 5000 applicants who
were turned down by the institute during the 1930s perished a few years later.
A scholar from the Ivory Coast at Kennels gathering described his own
situation -- being forced to hide in the countryside after teaching political
science courses that were critical of the government -- as a re-emergence of
darker periods from the past.
"This is the same old story," the African scholar said. "It is the
history of the universe. The history of power corrupting people."
Article copyright Forward Newspaper, L.L.C.
JOURNAL-CODE: FW
LOAD-DATE: September 30, 2004
EFTA00176584
math--counting
attitude--positive
10
9
66.6
60.0
speech act
9
60.0
space--size
8
53.3
space--grasping
7
46.6
sound--speech
7
46.6
logic--universal
7
46.6
quantification
space--housing
6
40.0
Table 2 Diverse schemes for story understanding
domains
Domain
Representation/Reasoning
Schemes
space
frame, generalized cylinder model,
interval logic, occupancy grid
time, action effects
causal model, event calculus,
situation calculus, transframc
reactivity
neural net, production system,
subsumption architecture
schemas, scripts
finite automaton, frame, frame-
Array, generalized Petri net
subgoaling
first-order logic, K-line, marker
passing, semantic net
emotions, attitudes
microneme, neural net, temporal
modal logic
** Trademark or registered trademark of Cycorp, Inc.
Cited references and notes
(1.) M. Minsky, The Emotion Machine, Pantheon, New York (forthcoming). Several chapters are on
line at http://web.media.mit.edu/ minsky.
(2.) The use of reading comprehension tests as a metric for evaluating story understanding systems
was previously proposed in L. Hirschman, M. Light, E. Breck, and J. Burger, "Deep Read: A Reading
Comprehension System," Proceedings of the 37th Annual Meeting of the Association for Computational
Linguistics, College Park, MD, June 1999, Association for Computational Linguistics (1999).
(3.) J. McCarthy, "Programs with Common Sense," Proceedings of the Symposium on Mechanisation
of Thought Processes, Her Majesty's Stationery Office, London (1958), pp. 77-84.
EFTA00176585
(4.) J. McCarthy, "From Here to Human-Level Intelligence," Proceedings of the Fifth International
Conference on Principles of Knowledge Representation and Reasoning (KR'96), Cambridge, MA,
November 1996, Morgan Kaufmann, San Mateo, CA (1996), pp. 640-646.
(5.) L. Morgenstern, "A Formal Theory of Multiple Agent Non-monotonic Reasoning," Proceedings
of the Eighth National Conference on Artificial Intelligence, AAAI Press. Menlo Park, CA (1990), pp. 538-
544.
(6.) E. I=
"The Naive Physics Perplex," AI Magazine 19, No. 4, 51-79 (1998).
(7.) D. Lenat, "Cyc: A Large-Scale Investment in Knowledge Infrastructure," Communications of the
ACM 38, No. 11, 32-38 (1995).
(8.) More details can be found in E. T. Mueller, "Story Understanding," to appear in Encyclopedia of
Cognitive Science, Nature Publishing Group, London (2002).
(9.) E. Charniak, Toward a Model of Children's Story Comprehension, Technical Report AITR-266,
Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA (1972).
(10.) R. C. Schank and R. P. Abelson, Scripts, Plans. Goals, and Understanding, L. Erlbaum
Associates, Hillsdale, NJ (1977).
(11.) R. E. Cullingford, Script Application: Computer Understanding of Newspaper Stories, Technical
Report YALE/DCS/trl 16, Computer Science Department, Yale University, New Haven, CT (1978).
(12.) R. Wilensky, Understanding Goal-Based Stories, Technical Report YALE/DCS/tr140, Computer
Science Department, Yale University, New Haven, CT (1978).
(13.) M.G. Dyer, In-Depth Understanding, MIT Press, Cambridge, MA (1983).
(14.) A. Ram, Question-Driven Understanding: An Integrated Theory of Story Understanding,
Memory, and Learning, Technical Report YALE/DCS(tr710, Computer Science Department. Yale
University, New Haven, CT (1989).
(15.) C. Dolan, Tensor Manipulation Networks: Connectionist and Symbolic Approaches to
Comprehension, Learning, and Planning, Technical Report 890030, Computer Science Department,
University of California, Los Angeles, CA (1989).
(16.) E.T. Mueller, Natural Language Processing with ThoughtTreasure, Signiform, New York
(1998), full text of book available on line at http://www.signiform.com/tt/book/.
(17.) L. G. Alexander, Longman English Grammar, Longman, London (1988).
(18.) E.
Representations of Commonsense Knowledge, Morgan Kauffman, San Mateo, CA
(1990).
(19.) S. E. Fahlman, NETL: A System for Representing and Using Real-World Knowledge, MIT
Press, Cambridge, MA (1979).
(20.) M. Shanahan, Solving the Frame Problem, MIT Press, Cambridge, MA (1997).
(21.) D.A. Randell, Z. Cui, and A. G. Cohn, "A Spatial Logic Based on Regions and Connection,"
Proceedings of the Third International Conference on Knowledge Representation and Reasoning, Morgan
Kaufmann, San Mateo, CA (1992), pp. 165.176.
(22.) B. Kuipers, "The Spatial Semantic Hierarchy," Artificial Intelligence 119, 191-233 (2000).
(23.) P. Singh, "The Public Acquisition of Commonsense Knowledge," Proceedings of the AAAI
Spring Symposium on Acquiring (and Using) Linguistic (and World) Knowledge for Information Access,
Palo Alto, CA, March 2002, American Association for Artificial Intelligence (2002).
(24.) M. Minsky, The Society of Mind, Simon & Schuster, New York (1985).
(25.) A. Sloman, "Beyond Shallow Models of Emotion," Cognitive Processing I, No. 1 (2001).
EFTA00176586
The reactive and deliberative layers differ in that the deliberative layer evolved much later and
requires a far more sophisticated long-term memory, as well as symbolic reasoning capabilities using a
short-term reusable memory. The meta-management layer may have evolved at a still later time and
requires explicit use of concepts referring to states of an information processing architecture. The earliest
organisms, such as most existing organisms, were totally reactive. Deliberative and meta-management
layers evolved later. Adult humans appear to have all three types of processing, which is probably rare
among other animals.
One of the key features that gives 11-Cogaff its generality is the fact that different components, instead
of forming parts of simple pipelines, can concurrently send information of various kinds to arbitrarily many
other components, allowing a wide variety of feedback mechanisms and triggering mechanisms.
In story understanding, the meta-management level may control the deliberative level in a number of
ways.
* If the deliberative level is spending too much time considering certain details and those details are
not crucial to the story, the meta-management level will make the deliberative level stop.
* If the deliberative level is spending too much time on a task that does not relate to the goal of
reading the story, the meta-management level will make the deliberative level stop.
* If the deliberative level becomes confused, the meta-management level will tell it to go back and
reread. The deliberative level may have ruled out a possibility earlier that needs to be reconsidered in light
of new information.
Minsky further elaborates the H-Cogaff architecture into the six-level architecture called "Model Six"
shown in Figure 2. (1) At its bottom lies a "zoo of instinctive subanimals" built upon ancient, ancestral
systems that still maintain our bodies and brains. These include systems for feeding, breathing, heating,
sleeping, and other systems that keep us alive. The deliberative and reflective levels are engaged to solve
more difficult kinds of problems. The self-reflective level is engaged when the problems involve our
relationships with our past and future selves. At the top lies machinery that we acquire from our societies.
such as suppressors and censors, imprimers and values, and our various kinds of self-ideals.
[FIGURE 2 OMITTED]
Multiple reasoning and representation schemes and levels. An architecture of diversity would embed
representations from natural language to micronemes (27,1) as depicted in Figure 3. The representations
depicted include frames, transframes, frame-arrays, K-lines, and micronemes. A frame is a representation
based on a set of slots to which other structures can be attached. (28) Each slot is connected to a default
assumption that is easily displaced by more specific information. A transframe is a particular type of frame
representing the causal trajectory between the initial and resulting states representing a situation that a legal
action was performed on. A frame-array is a collection of frames that share the same slots, making it easy
to change perspective with respect to physical viewpoint or other mental realms. A knowledge-line or K-
line is a wirelike structure that attaches itself to whichever resources are active in solving a problem. The
K-line simplifies activation of those same resources when solving a similar problem in the future.
Micronemes are low-level features for representing the many cognitive shades and hues of a context. In
Figure 3, new evolved structures are made from older lower-level ones, and the tower shown might be a
plausible Darwinian brain-development scheme.
[FIGURE 3 OMITTED)
Table 2 shows just a few of the diverse representation and reasoning schemes useful for domains of
story understanding.
We propose to address the commonsense reasoning problem starting with stories for very young
readers. However, to demonstrate all of the different ways we think when understanding a story, and what
we would eventually expect a commonsense story understanding system to be able to handle, consider the
following adult story (the discussion here is condensed from Reference 1).
Joan heard a ring and picked up the phone. Charles was answering her
question about how to use a certain technique. He suggested she read a
EFTA00176587
certain book, which he would soon bring to her since he had planned to be
in her neighborhood. Joan thanked hint and ended the call. Soon Charles
arrived and gave her the book.
Following are a few of the understandings an adult reader would have after hearing the story.
• Joan heard a ring. She recognizes it as a telephone bell and feels the need to respond quickly. She
knows how to use the telephone.
• She picked up the phone. She is subsequently holding the phone to her ear.
* Charles was answering her question. Charles and Joan arc not in the same room. Charles also knows
how to use the telephone.
• He suggested she read a certain book. Joan probably now feels some relief, since she knows where
to fmd the knowledge she needs.
* He had planned to be in her neighborhood. Joan will not be surprised when lie arrives, because she
will remember that he said he would come.
* He gave her the book. Will she have to give it back? The story does not tell us that.
These conclusions are based on reasoning and representations in many realms, as follow.
The physical realm. In this realm, give might mean the motion of the book through space. This could
be represented as a transframe that starts with Charles's hand holding the book and ends with Joan's hand
carrying it. One must know a lot about physical things and how they behave in space and time.
The social realm. In this realm, give may signify social acts that can alter the relationships of the
actors. What were Charles's motives or his attitudes? Clearly, he was not returning a loan. Was he hoping to
ingratiate himself? Or was he just being generous? How will Joan feel about Charles after he gives her the
book? One must know a lot about what people are. and a certain amount about how people work.
The dominion realm. Given Charles gave Joan the book, one infers not only that Joan is holding the
book, but also that, at least for a time, she possesses the right to use it.
The conversational realm. How do conversations work? Consider how many elaborate skills arc
involved in a typical verbal exchange. One has to keep track of what is being discussed, what one has
previously told the listener, and what the listener knows. Thus conversations are partly based on knowledge
of how human memories work and what is commonly known in one's culture. One has to make sure the
listener has understood what was said and why it was said. One certainly needs to know how to speak and
to understand some of what one may hear.
The procedural realm. How does one make a telephone call? One must first find a phone and dial a
number. Then once the connection has been established, one says hello, talks a bit, and eventually leads
into why one called. At the end, one says goodbye and hangs up the phone. Generally, such scripts have
certain steps that are specified, while other steps provide for more room to improvise.
The sensory and motor realms. Each of the above steps raises questions. For example, it takes only
one second or so for one's arm to reach out in order to pick up the phone. How can one do that so quickly?
The kinesthetic, tactile, and haptic realms. Using a telephone or any other physical object engages a
great base of body-related knowledge and skills. One anticipates how the phone will feel against one's car
or sandwiched between shoulder and cheek. One expects certain haptic sensations such as the feel of the
phone's weight. One strengthens one's grip when the phone starts to slip.
The temporal realms. People have elaborate models of time where events are located in futures and
pasts that are represented in relation to other times and events or in anecdotal stories.
The economic realm. People know and reason about the costs incurred by each action or transaction in
terms of money, energy, space, or time.
EFTA00176588
The reflective realm. People know about themselves. One knows to some degree what one can or
cannot do, what kinds of problems one can solve, how one's thinking and memory works, and what sorts of
things one is able to learn.
Along with these positive kinds of knowledge, one also has negative knowledge about what might go
wrong when using a phone. One must know what to do if one gets a wrong number, if there is no answer.
or if a modem or intercept recording is reached.
Example system with architecture of diversity. Thus far, the Sloman and Minsky architectures arc
theoretical constructs and have not yet been implemented. However, there are examples of working
systems that capture the spirit of such architectures. One such example is the M system depicted in Figure
4. (29) M integrates multiple reasoning processes and representations to serve as an assistant to a user
collaborating with other workers within a virtual meeting room that hosts multimedia desktop
conferencing. M serves to recognize and classify the actions performed by the participants as well as the
objects upon which the actions are applied; example actions and objects are brainstorming on a whiteboard,
coauthoring a document, and creating and working with other artifacts.
[FIGURE 4 OMITTED)
Next steps
The two recent meetings held in March 2002 at the IBM Thomas J. Watson Research Center and in
April 2002 on St. Thomas indicate that there is a dedicated group of recognized researchers interested in
working together on a project to develop a solution to commonsense reasoning. We are now planning to
undertake some of the next steps in a plan for such a project. The inspiration for this work comes from
Minsky's past and forthcoming work. We close with his thoughts on how such a project might be realized,
as follows.
Our goal is to aim toward a critical "change of phase" that will come when we cross a threshold at
which our systems know how to improve themselves. This is something that all young children can do, but
we do not know enough about how they do it; so one goal of the project must be to develop better models
of how normal people think.
We will start by trying to implement some of the architectures proposed over the past decade. There
already exist many useful schemes for representing and using knowledge mostly of a factual nature for use
on what we call the deliberative level. However, there has not been enough work on the higher reflective
and self-reflective levels that humans use, as they learn to improve their thinking itself. Any such system,
we claim, will need additional kinds of meta-resources, which will include systems that manage, criticize,
and modify the already operating parts of the structure.
In the field of Al we already have many resources related to this, for example, neural networks, formal
logic, relational databases, genetic programs, statistical methods, and of course the heuristic search,
planning, and case-based reasoning schemes of earlier years. However, our goal is not to discuss which
method is best. Instead we will try to develop a plan of how to incorporate into one system the virtues of
many different approaches. Of course, each such scheme has deficiencies and our hope is that our system
can escape from these by using higher-level, more reflective schemes that understand what each of those
other schemes can do and in what context they are most effective.
Table 1 Early reader corpus: top 10 domains of common
sense
Domain
Number
Percentage
of Stories of Stories
space--location
14
93.3
space--motion
11
73.3
EFTA00176589
606 of 1456 DOCUMENTS
Copyright 2002 Gale Group, Inc.
ASAP
Copyright 2002 All Rights Reserved.
IBM Systems Journal
September 1, 2002
SECTION: No. 3, Vol. 41; Pg. 530; ISSN: 0018.8670
IAC-ACC-NO: 91469723
LENGTH: 6160 words
HEADLINE: An architecture of diversity for commonsense reasoning; Technical forum.
BYLINE: McCarthy, J.; Minsky, M.; Sloman, A.; Gong, L.; Lau, T.; Morgenstern, L.; Mueller, E-.T.;
Riecken, D.; Singh, M.; Singh, P.
BODY:
Although computers excel at certain bounded tasks that arc difficult for humans, such as solving
integrals, they have difficulty performing commonsense tasks that are easy for humans, such as
understanding stories. In this Technical Forum contribution, we discuss commonsense reasoning and what
makes it difficult for computers. We contend that commonsense reasoning is too hard a problem to solve
using any single artificial intelligence technique. We propose a multilevel architecture consisting of diverse
reasoning and representation techniques that collaborate and reflect in order to allow the best teclutiques to
be used for the many situations that arise in commonsense reasoning. We present story understanding--
specifically, understanding and answering questions about progressively harder children's texts--as a task
for evaluating and scaling up a commonsense reasoning system.
In the fall of 2001, a proposal was developed by Marvin Minsky, Erik Mueller, Doug Riecken, Push
Singh, Aaron Sloman, and Oliver Steele for a project to develop a human-level commonsense reasoning
system. The basic proposal was (1) to develop certain ideas of Minsky and Sloman about a multilevel
cognitive architecture, and (2) to develop the system in a way that would exploit many existing artificial
intelligence techniques for commonsense reasoning and knowledge representation, such as case-based
reasoning, logic, neural nets, genetic algorithms, and heuristic search.
We proposed to organize a meeting at which we would bring together many of the major established
researchers in the area of commonsense knowledge and reasoning. Riecken organized a preliminary
meeting at the IBM Thomas J. Watson Research Center in March 2002, at which many IBM researchers
were invited to discuss and react to this general subject as well as to present their own ideas. Afterwards,
the specific proposal was discussed in more detail by specialists in commonsense knowledge and reasoning
at a meeting held on St. Thomas, Virgin Islands, in April 2002, and hosted by Jeffrey Epstein. This
Technical Forum contribution focuses on the preliminary meeting, but also contains some material
presented at the April meeting, including some material from Minsky's forthcoming book The Emotion
Machine. (1)
At the IBM meeting, a broad consensus was reached on three main points. First, there was agreement
that the community should strive toward solving a nontrivial problem that would require a level of
knowledge, and a capability of reasoning with that knowledge, beyond what is demonstrated by current
systems. The problem put forward was that of story understanding. An important advantage of the story
understanding task is that standardized tests are available to evaluate students on their reading
comprehension skills. Moreover, these tests require the use of commonsense reasoning skills. It is thus
possible to evaluate the performance of any story understanding system against that of students at different
reading levels. (2)
EFTA00176590
Second, there was consensus that the story understanding task provides a strong testbed for evaluating
a commonsense reasoning system. Not only does such a system need several different forms of reasoning,
representation, and learning, but it also needs them to work in conjunction with each other. In addition, the
task highlights the importance of using and reasoning with common sense. This is illustrated by a sentence
from a story about a child and her grandfather: "He gently takes my elbow as we walk so that I can help
show him the path." Knowledge of the fact that the grandfather is blind, and the commonsense facts that
people ordinarily use their sight to find paths and that blind people are unable to see, enable the inference
that the child is guiding the grandfather and not merely pointing out the path, another frequent sense of the
word "show." Absence of this commonsense knowledge could lead to the incorrect interpretation of the
word "show."
Third, there was agreement on the need to develop a testbed architecture for representation and
reasoning that allows different systems and representations to work with each other. Researchers often try
to solve a problem using just one form of representation and reasoning. But such an approach does not
work well for sufficiently complex problems such as story understanding. In contrast, enabling various
techniques to collaborate will allow the best techniques to be used for a given situation. Any such
architecture must provide metalevel control and knowledge that will enable different techniques to
determine whether or not they are suited for a given task, to decide what other techniques may be better for
the task, and to communicate information and share partial results with each other.
What makes commonsense reasoning difficult
Commonsense reasoning--the sort of reasoning we would expect a child to do easily--is difficult for
computers to do. Certainly, the relative paucity of results in this field does not reflect the considerable
effort that has been expended, starting with McCarthy's paper "Programs with Common Sense." (3)
Nevertheless, the problem remains unsolved. What is it about commonsense reasoning that makes it
difficult to automate? Various explanations have been suggested, some of which we discuss in this section.
McCarthys commonsense informatic situation. The knowledge needed to solve a commonsense
reasoning problem is typically much more extensive and general than the knowledge needed to solve
difficult problems. McCarthy points out that the knowledge needed to solve well-formulated problems in
fields such as physics or mathematics is bounded. (4) In contrast, there are no a priori limitations to the
facts that are needed to solve commonsense problems: the given knowledge may be incomplete; one may
have to use approximate concepts and approximate theories; one will generally have to use non-monotonic
reasoning to reach conclusions; and one will need some ability to reflect upon one's own reasoning
processes. Morgenstern provides an example of the commonsense informatic situation in the problem of
two friends arranging to meet for dinner at a restaurant. (5)
Explicit vs implicit knowledge. Commonsense knowledge is often implicit, whereas the knowledge
needed to solve well-formulated difficult problems is often explicit. For example, the knowledge needed to
solve integrals can be found in explicit form in a standard calculus textbook. However, the knowledge
needed to arrange a dinner meeting exists in vague, implicit form. Implicit knowledge must rust be made
explicit, which is a time-consuming task requiring a serious knowledge engineering effort.
Domain knowledge. A huge amount of knowledge is needed to do even simple forms of
commonsense reasoning. For example, to figure out what sorts of objects will work as stakes in a garden--a
reasoning task that seemingly demands no effort--requires knowledge of plant materials, how plants grow,
flexibility and hardness, shapes of plants, soil texture, properties of wind, spatial reasoning, and temporal
reasoning. (6) Although there have been a number of efforts to capture large amounts of world knowledge,
most notably the Cyc ** project, (7) we are not at this point aware of any knowledge base that contains the
information necessary to reason about stakes in a garden or about fumbling for an object in one's pocket.
This Technical Forum piece does not present a solution to these difficulties. Rather, we are attempting
to see how far we can progress on an importmit commonsense reasoning problem even in the presence of
such difficulties.
Story understanding as a vehicle for studying commonsense reasoning
Story understanding requires addressing the commonsense informatic situation. A story understanding
system should be able to read and understand a story, and demonstrate its understanding by (1) answering
EFTA00176591
questions about the story, (2) producing paraphrases and summaries of the story, and (3) integrating the
information the story contains into a database. Further, useful results from this work will have a direct
impact on many business products and services.
A brief history of story understanding systems. Starting in the 1960s, (8) researchers have studied
story understanding and have built systems that can read and answer questions about simple stories. An
early system built by Charniak (9) used a single mechanism, test-action demons, for making inferences in
understanding. In the 1970s, Schank and Abelson (10) proposed scripts, plans, and goals as knowledge
structures for understanding. These knowledge structures were incorporated into the SAtvi (11) and PAM
(12) story understanding systems.
In the 1980s, knowledge structures for emotions, story• themes, and spatialitemporal maps were
incorporated into BORIS. (13) AQUA (14) used case-based reasoning to retrieve and apply explanation
patterns in order to answer questions raised by anomalies encountered while reading a story. CRAM (15)
used a connectionist approach to story understanding.
Recent story understanding systems have adopted the approach of understanding a story by building
and maintaining a simulation that models the mental and physical states and events described in the story,
as demonstrated in ThoughtTreasure. (16) The advantage of this approach is that it is easy to answer
questions about the story simply by examining the contents of the simulation.
Critical problems for story understanding systems. The story understanding systems built so far work
only on the particular stories they are designed to handle. For example, SAM (11) handles five stories,
BORIS (13) three, AQUA (14) five, and ThoughtTreasure (16) three. What prevents story understanding
systems from scaling up to hundreds of previously unseen stories?
We contend that story understanding research is blocked on three critical problems: (I) complexity of
the structure of natural language, (2) necessity for large commonsense knowledge bases, and (3)
combinatorial explosion in the understanding process.
Complexity of the structure of natural language. Rare is the simple subject-verb-object sentence that
maps into a simple proposition. More typically, text contains numerous language phenomena such as
adverbials, compound nouns, direct and indirect speech, ellipsis, genitive constructions, and relative
clauses. (17) Present-day syntactic and semantic parsers have trouble producing accurate parses of typical
story sentences.
Necessity for large commonsense knowledge bases. Understanding even simple stories requires
knowing a huge number of facts. For example, understanding the first paragraph of The Cat in the Hat
requires knowing about children's play, how children can be affected by winter wea
heir relationship
to their parents, and notions of discipline, boredom, surprise, and risk. Similarly, as
(18) points out,
the first paragraph of The Tale of Benjamin Bunny assumes familiarity with concepts of quantity, space,
time, physics, goals, plans, needs, and communication.
Combinatorial explosion in the understanding process. Multiple possible interpretations arise at all
levels of language. Words are ambiguous as to part of speech and word sense. Sentences are syntactically
ambiguous. There arc several possible explanations for any action of a story character, several possible
explanations for those explanations, and so on. We get a combinatorial explosion: the understanding
process must search an extremely large space of possibilities.
Approaches to critical problems in story understanding. What can be done? We propose a three-
pronged approach. First, to deal with the complexity of the structure of natural language, we make a major
cut in complexity by going back to books for early readers. Second, to deal with the necessity for large
commonsense knowledge bases, we propose to identify the domains most frequently used in a restricted set
of stories and to address these first. Last, to deal with the combinatorial explosion in the understanding
process, we propose a new paradigm for commonsense reasoning: an architecture of diversity.
Early readers. Early reader texts are designed for preschool and kindergarten students. These texts
employ a small or controlled vocabulary, short sentences, and limited language constructions. Working
with early reader texts will enable us to effectively solve the language front-end problem using existing
research techniques.
EFTA00176592
Text annotation for domain identification. We cannot hope to deal with the commonsense informatic
situation head-on. The point of McCarthy's 1996 paper (4) is that any domain can be relevant to a particular
problem: when reading a story, any area of knowledge may be necessary for comprehension. This is less
true for stories designed for very young readers; although, as our examples above show, a great many
concepts and domains are still needed for full comprehension even of early reader texts. Nevertheless, we
believe we can make progress by choosing to address those domains that most frequently turn up in
children's stories. Such an approach would, we hope, make the problem tractable.
We thus propose the following corpus-based approach. We start with a corpus of stories at the
preschool and kindergarten levels and divide the corpus into a development set and a test set. We manually
annotate each story in the development set with an informal inventory of what domains of commonsense
knowledge and reasoning must be addressed in order to understand the story. We sort the domains by their
frequency and attempt to develop methods to understand the domains that occur most frequently. We start
with the most frequent domain, proceeding to the next most frequent domain, and so forth Development
proceeds on the development set, and a final evaluation of the generality of the system is conducted on the
previously unseen test set. We iterate this process on successively higher reading levels, progressing to
stories designed for Grades 1, 2, and 3. This approach, based on an incremental series of experiments, will
enable a significant research focus at each step on an architecture of diversity.
To demonstrate how this approach would work, we formed a corpus of 15 early reader stories and
annotated them as to the domains of common sense necessary for understanding them. The vocabulary size
was 561 words. The top 10 domains of common sense are shown in Table I. This provides us with a path
for research in understanding the story corpus: focus on handling the most frequently appearing domains of
common sense.
Dealing with these concepts is by no means trivial. We plan to leverage the extensive work that has
been done in these areas. Such work includes: ThoughtTreasure, (16) NETL2, (19) Cyc, (7) Shanahan's
formalization of time, (20) the RCC formalization of space, (21) and Kuipers's Spatial Semantic Hierarchy.
(22) We will also employ rapid knowledge formation techniques such as Open Mind. (23)
An architecture of diversity
Many attempts to build intelligent computers have hunted for a single mechanism (such as universal
sub-goaling, propagation rules, logical inference, probabilistic reasoning) or representation (such as
production rules, connectionist networks, logical formulas, causal networks) that would serve as a basis for
general intelligence. Why have these approaches so far failed to achieve human-level common sense?
We believe that the problem is too large to solve using any single approach. Human versatility must
emerge from a large-scale architecture of diversity in which each of several different reasoning
mechanisms and representations can help overcome the deficiencies of the other ones. (24,1) Our
hypothesis is that such an architecture can overcome the combinatorial explosion problem in story
understanding.
Multilevel cognitive architecture. We conjecture that the information processing architecture of a
human is something like the three-level architecture developed by Sloman in the Cognition and Affect
project (25) (H-Cogaff), shown in Figure 1. This conjecture is based on evidence of many kinds from
several disciplines, and constraints on evolvability, implementability in neural mechanisms, and
functionality. (26)
[FIGURE 1 OMITTED]
Reactive processes are those in which internal or external states detected by sensors immediately
trigger internal or external responses. Deliberative processes are those in which alternative possibilities for
action can be considered, categorized, evaluated, and selected or rejected. More generally a deliberative
mechanism may be capable of counterfactual reasoning about the past and present and hypothetical
reasoning about the future. The depth, precision, and validity of such reasoning can vary. Meta-
management processes add the ability to monitor, evaluate, and to some extent control processes occurring
within the system in much the same way as the whole system observes and acts on the environment. The
three layers operate concurrently and do not form a simple dominance hierarchy. Arrows represent flow of
information and control, and boundaries need not be sharp in all implementations.
EFTA00176593
543 of 1456 DOCUMENTS
Copyright 2003 The Financial Times Limited
Financial Times (London,England)
August 20, 2003 Wednesday
London Edition 1
SECTION: BACK PAGE - FIRST SECTION; Pg. 18
LENGTH: 748 words
HEADLINE: Wall Street spearheads push to secure academic freedom: A scheme that began in the 1930s,
and helped physicist Felix Bloch and writer Thomas Mann, seeks a Dollars 10m revival. Gary Silverman
reports
BYLINE: By GARY SILVERMAN
BODY:
About a year and a half ago, a small circle of wealthy investors collected Dollars 2m (Pounds 1.2m) to
conduct a novel experiment on the extent of global academic freedom.
The group, which included =Soros, Henry Jarecki and Jeffrey Epstein, established a fund to
help scholars escape threats in their home countries and find teaching work elsewhere. The donors made
their offer in the spirit of the movie, Field of Dreams, which held that "if you build it, they will come". Still,
they were stunned by the response.
About 300 academics from 65 countries sought help from the Scholar Rescue Fund, which is being
administered by the non-profit Institute of International Education.
Many of the threats to scholars came from likely suspects - African warlords, Colombian drug
traffickers, terrorists and religious fundamentalists. But the organisers were also struck by the heartbreaking
singularity of so many of the cases.
A marine biologist in a former republic of the Soviet Union angered government officials by studying
local shellfish populations. An African academic was threatened after discovering that funds had been
stolen from a university library. One western European government even sought help for a local scholar
who was threatened by a separatist movement.
"The overwhelming majority of cases involve people who haven't taken sides," said Allan Goodman,
IIE president and chief executive.
"They just happened to be scholars who are teaching in the wrong field, or they happened to be from
the wrong ethnic group or, in one case, they have the same surname as the leader of a faction and they have
been targeted."
The extent of the problem led the organisers to a sad conclusion - their work needed to take a more
permanent form.
They are now trying to raise a Dollars 10m endowment for the Scholar Rescue Fund. They may also
start an index of academic freedom that would spotlight abuses in particular countries.
"The impact and need has been greater than we expected," says Mr Soros, comparing the effort to his
work on behalf of central and eastern European dissidents in the 1980s.
So far, the fund has helped 30 scholars from 19 countries escape persecution and find work at
institutions ranging from Princeton University to the Geological Survey of Norway. The rescues
themselves can be dangerous and the IIE often turns to human rights groups for logistical help.
EFTA00176594
(
The fund arranges for the scholars to get teaching positions, providing annual stipends of up to Dollars
20,000 to smooth the transition.
The HE's role in helping intellectuals is not a new role as it started in the 1930s and was led by Edward
R. Murrow, an HE assistant director and later a legendary CBS reporter. Among those it helped were Felix
Bloch, the physicist. theologians Martin Buber and Paul
Tillich, Thomas Mann, the novelist, and philosopher Herbert Marcuse.
The latest effort to rescue scholars bears the imprint of Wall Street. Tom Russo, a Lehman Brothers
,vice-chairman and an IIE trustee, has been a prime mover in the project. He helped recruit the donors and
define the rationale for the rescue work. For Mr Russo, academic freedom is like market transparency - a
"source of light" that keeps society functioning smoothly.
Deciding on which requests should receive help has been a job worthy of Solomon. The fund has heard
from scholars who live in dangerous places but face no particular threat as individuals - a requirement for
receiving help. Mr Goodman says this is often the case in places such as Israel's occupied territories,
although the IIE has made one rescue there.
Dr Jarecki, a psychiatrist who made a fortune in bullion dealing and other ventures, said the fund is
also trying hard to avoid contributing to a "brain drain" of academic talent in developing countries. Many of
the applicants face threats to their security, but others simply want to move for economic reasons.
However, the organisers say they are trying to resist the temptation of being too cautious in their work.
He says he frequently brings up the example of a 1938 conference in Evian, France, that was held to
discuss the resettlement of German and Austrian Jews. The Dominican Republic agreed to accept between
50,000 and 100,000 Jews. But by the time the "proper" arrangements were made, a world war was raging
and it was too late to do much good.
In this case, Dr Jarecki says, the fund will work out how best to achieve its aims as it goes along. But,
he adds: "I thought we should start by doing it."
LOAD-DATE: August 19, 2003
EFTA00176595
Page 2
581 of 1456 DOCUMENTS
Copyright 2003 Associated Press
All Rights Reserved
The Associated Press State & Local Wire
February 7, 2003, Friday, BC cycle
SECTION: State and Regional
LENGTH: 200 words
HEADLINE: Financier pledges $30 million to support Harvard researcher
DATELINE: CAMBRIDGE, Mass.
BODY:
Reclusive financier Jeffrey Epstein has pledged up to $30 million to Harvard University to support a
newly recruited professor's research in the field of mathematical biology.
A spokeswoman for Harvard president
H. Summers confirmed Friday that Epstein's
contribution will support the research of Martin A. Nowak, who is scheduled to join the Harvard faculty on
July 1.
Epstein, who reportedly manages billions of dollars from his private island in the Caribbean, already
made a donation and plans to eventually establish a $30 million endowment to support Nowak's research,
spokeswoman Lucie McNeil said. She did not specify how much he has already given.
Nowak, 36, currently a professor at Princeton's Institute of Advanced Study, uses advanced
mathematics to model human behavior and to study evolutionary theory, viruses and cancers. He was
recruited to Harvard as part of Summers' commitment to grant tenure to young professors and those who do
interdisciplinary research.
The self-educated Epstein is both a longtime Harvard contributor and a benefactor of Nowak, to whom
he previously donated $500,000, the Harvard Crimson student newspaper reported.
LOAD-DATE: February 8, 2003
EFTA00176596
(26.) A. Sloman, "Architectural Requirements for Human-Like Agents both Natural and Artificial," K.
Dautenhahn, Editor, Human Cognition and Social Agent Technology, John Benjamins, Amsterdam (2000),
pp. 163-195.
(27.) M. Minsky, "Common Sense-Based Interfaces," Communications of the ACM 43, No. 8, 67.73
(2001).
(28.) M. Minsky, "A Framework for Representing Knowledge," AI Laboratory Memo 306, Artificial
Intelligence Laboralassachusetts Institute of Technology (1974), reprinted in The Psychology of
Computer Vision,
Winston, Editor, McGraw-Hill, New York (1975).
(29.) D. Riecken, "An Architecture of Integrated Agents." Communications of the ACM 37, No. 7,
107-116 (1994).
Accepted for publication May 17, 2002.
J. McCarthy
Stanford University
Stanford, California
M. Minsky
Massachusetts Institute of Technology
Cambridge, Massachusetts
A. Sloman
University of Birmingham
Birmingham, UK
L. Gong
IBM Research Division
Hawthorne, New York
T. Lau
IBM Research Division
Hawthorne, New York
L. Morgenstern
IBM Research Division
Hawthorne, New York
E. T. Mueller
IBM Research Division
Hawthorne, New York
EFTA00176597
D. Riecken
!BM Research Division
Hawthorne, Ncw York
M. Singh
IBM Research Division
Hawthorne, Ncw York
P. Singh
Massachusetts Institute of Technology
Cambridge, Massachusetts
IAC-CREATE-DATE: September 26, 2003
LOAD-DATE: October 07, 2003
EFTA00176598
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Dates
Email Addresses
Phone Numbers
Document Details
| Filename | EFTA00176507.pdf |
| File Size | 16358.5 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 239,231 characters |
| Indexed | 2026-02-11T11:09:53.970277 |