The Last Free Doctor in America

The Last Free Doctor in America

He refused to sign away his constitutional rights. Then he refused to participate in modern life at all.

By Oskar Rausch

November 28, 2025


The houseboat bobs gently in Lake Huron, anchored about 200 yards off a small, nameless island in Michigan’s Thumb region. There is no dock. Visitors must hire a boat from the mainland, navigate past a half-submerged buoy, and announce themselves by shouting. A German Shepherd named Kai will bark—not aggressively, just to establish that someone is paying attention.

Dr. TooToo Medvalli, MD, will emerge from the cabin wearing a flannel shirt with a laminated pocket Constitution visible in the breast pocket. He is 61 years old, board-certified in gastroenterology, and has not practiced medicine in 18 years. He has not had a cell phone in 18 years. He has not used the internet, held a credit card, or maintained a bank account in 18 years.

He has, however, preserved every single one of his Seventh Amendment rights.

“I am aware,” he tells me, settling into a camp chair on the deck, “that this makes me sound insane.”


The numbers are not in dispute. Employees who must resolve workplace disputes through mandatory arbitration win only 21.4 percent of their cases, compared with 36.4 percent in federal court. When they do prevail, their median award of $36,500 represents barely one-fifth of the $176,426 median in court. Perhaps most troubling, researchers estimate that 98 percent of potential employment claims simply vanish—never filed because the system is designed to make pursuing them economically irrational.

These statistics come from Professor Alexander J.S. Colvin of Cornell University, whose research on employment arbitration is the most comprehensive in the field. Professor Cynthia Estlund of NYU Law School has documented what she calls “the black hole of mandatory arbitration”—the phenomenon whereby more than 60 million American workers are subject to mandatory arbitration, yet only about 2,500 employment arbitration cases are filed each year. That’s one claim for every 10,400 covered workers.

The legal scholars have a term for agreements that consumers and employees must accept without negotiation: contracts of adhesion. Sign or don’t get the job. Sign or don’t open the bank account. Sign or don’t use the cell phone.

TooToo Medvalli chose “don’t.”


To understand how a gastroenterologist ended up living on a houseboat in Lake Huron, communicating exclusively through the United States Postal Service, you have to understand that TooToo Medvalli has never done anything halfway.

He was born in 1986 in Hamtramck, Michigan, to Hungarian immigrant parents who emphasized education with the intensity common to families who had sacrificed everything to provide it. He graduated from the University of Michigan, attended the University of Michigan Medical School, completed his internal medicine residency at UCSF, and finished a gastroenterology fellowship at Stanford. By 2018, at age 32, he was a board-certified gastroenterologist with offers from three major health systems.

He was also, by his own description, “constitutionally incapable of not reading things.”

“My colleagues would get these contracts—60, 70 pages—and they’d flip to the salary section, maybe glance at the benefits, and sign,” Medvalli says. “I read every word. Every clause. Every definition in the appendix.”

It was in one of these appendices that he first encountered a mandatory arbitration clause.

“I remember the exact moment,” he says. “Page 47. ‘Any dispute arising out of or relating to this Agreement shall be resolved exclusively through binding arbitration.’ I didn’t even know what that meant. So I looked it up.”

What he found changed the trajectory of his life.


The Federal Arbitration Act of 1925 was drafted by Julius Henry Cohen, a Progressive-era lawyer, and championed by the New York Chamber of Commerce for a specific, limited purpose: enabling merchants of relatively equal bargaining power to resolve disputes efficiently outside congested courts. The drafters repeatedly assured legislators that the Act would not apply to employment contracts or adhesion contracts. Section 1 explicitly exempts “contracts of employment of seamen, railroad employees, or any other class of workers engaged in foreign or interstate commerce.”

The Supreme Court has spent the past four decades systematically transforming this narrow procedural statute into something its drafters would not recognize.

Southland Corp. v. Keating (1984) held that the FAA applies in state courts and preempts conflicting state laws—despite legislative history clearly indicating Congress viewed the FAA as purely procedural. Circuit City Stores v. Adams (2001) narrowed the employment exemption to cover only transportation workers, extending FAA coverage to virtually all employment contracts. AT&T Mobility v. Concepcion (2011) held that the FAA preempts state unconscionability doctrines that would invalidate class action waivers. Epic Systems Corp. v. Lewis (2018) ruled that employers can use individual arbitration agreements to prevent collective action even for wage and hour claims.

Justice Ruth Bader Ginsburg read her dissent in Epic Systems from the bench—a rare act of judicial protest. She called for congressional correction of the Court’s “elevation of the FAA over workers’ rights.”

Congress has not corrected it.


“I went to HR,” Medvalli recalls, “and I said, ‘I can’t sign this.’ They looked at me like I’d grown a second head.”

He explained his concerns: the elimination of jury trial rights, the restriction of discovery, the repeat-player advantage that research showed systematically favored employers, the class action waiver that would prevent workers from banding together to challenge systematic violations.

The HR representative listened politely. Then she said, “It’s standard. Everyone signs it.”

“That’s not a legal argument,” Medvalli replied. “That’s a description of capitulation.”

He was not hired.

Over the next six months, Medvalli applied to 47 different healthcare organizations. Every single one required mandatory arbitration as a condition of employment. Every single one told him it was “standard.”

“I started keeping a tally on my pocket Constitution,” he says, pulling out the document—laminated now, worn at the edges. Small hash marks cover the inside back cover. “Forty-seven rejections. All for the same reason. I wasn’t refusing to work. I wasn’t asking for more money. I was just asking to retain access to the legal system that the Constitution guarantees.”


The question everyone asks—the question I asked, standing on his houseboat deck while Kai investigated my backpack with alarming intensity—is: Why not just sign?

Medvalli has heard this question hundreds of times. He has a speech prepared.

“In 1992, the year after the Supreme Court’s Gilmer decision permitted arbitration of federal employment discrimination claims, approximately 2 percent of American workers were subject to mandatory arbitration,” he says, rattling off statistics with the fluency of a man who has spent 18 years alone with legal journals. “By 2017, that figure had reached 56.2 percent—more than 60 million workers. The Economic Policy Institute projected it would reach 80 percent by 2024. Eighty percent of American workers, required to surrender their constitutional rights as a condition of employment.”

He pauses.

“At what point does a right that can be forced-waived as a condition of basic economic participation stop being a right at all?”


The dog deserves his own explanation. Medvalli acquired Kai in 2026, shortly after losing his house to foreclosure. (The mortgage company’s arbitration clause had prevented him from disputing the foreclosure in court—a fact Medvalli describes as “darkly ironic.”) Kai is now 17 years old, ancient for a German Shepherd. In his younger years, he expressed his considerable psychological complexity through the systematic destruction of fabric, furniture, and infrastructure.

“He once humped a buoy so aggressively it sank,” Medvalli says, with something approaching affection. “I had to pay to have it replaced. In cash, obviously. I don’t have a bank account.”


The cascade of withdrawals happened gradually, then all at once.

First the employment contracts. Then the cell phone, after Medvalli actually read his Verizon service agreement and discovered that he’d theoretically agreed to waive his right to sue, his right to participate in class actions, and his right to a jury trial.

“I threw it in Lake Huron,” he says. “Kai looked very confused. He expected to retrieve it.”

Then the internet (arbitration clause). The credit cards (arbitration clauses). The streaming services (arbitration clauses). The bank account (arbitration clause).

“Did you know that credit card issuers representing 53 percent of all credit card debt impose arbitration?” Medvalli asks. “Affecting over 80 million consumers? The Consumer Financial Protection Bureau documented this in 2015. Ten years ago. Nothing has changed.”

He bought the houseboat in 2027, anchoring it off a small island because even the mainland marina operators had arbitration clauses in their slip rental agreements. He grows vegetables, collects rainwater, catches fish. He communicates through the U.S. Postal Service, which he notes with satisfaction has no arbitration clause.

His sister, Margaret, visits once a month to bring supplies. She has spent 18 years trying to convince him to rejoin society.

“The Founders would be proud,” Medvalli tells her.

“The Founders used corn cobs,” she replies.

He takes the toilet paper.


Word of Medvalli’s stand has spread slowly through legal academic circles. Law students write papers about him. Constitutional scholars cite him in footnotes. A documentary crew visited in 2031—arriving in an arbitration-clause-encumbered rental boat—and produced a film that premiered at Sundance to modest acclaim.

Medvalli didn’t see it. He couldn’t sign the streaming service’s terms of service.

“It made you look only moderately insane,” Margaret reported.

The film sparked a brief national conversation about forced arbitration. Op-eds were written. Senators gave speeches. The FAIR Act—the Forced Arbitration Injustice Repeal Act, which would invalidate pre-dispute arbitration agreements for employment, consumer, antitrust, and civil rights disputes—was reintroduced in Congress. A hashtag trended for nearly six hours.

Then everyone went back to clicking “I Agree” without reading.


One letter stood out from the thousands Medvalli received after the documentary. It came from Gretchen Carlson, the former Fox News anchor whose lawsuit against Roger Ailes had been complicated by her employment contract’s arbitration clause. Carlson had found a legal strategy to circumvent the clause—suing Ailes personally under New York City law—and her $20 million settlement had helped catalyze the #MeToo movement. In 2022, she’d advocated successfully for the Ending Forced Arbitration of Sexual Assault and Sexual Harassment Act, which President Biden signed into law.

“Dear Dr. Medvalli,” the letter read:

I understand your fight. When I discovered what my arbitration clause meant—that I would be forced into the secret chamber of arbitration, and nobody would ever hear from me again—it was one of the darkest days of my life.

But I chose to find a way around it, to fight within the system, to change what I could. The 2022 law that lets survivors of sexual assault and harassment choose court over arbitration—it happened because of that fight.

You’ve chosen to step outside the system entirely. I’m not sure either of us is right. But I’m not sure either of us is wrong, either.

The law I helped pass was called “the biggest labor law change in 100 years.” But it only covers sexual assault and harassment claims. Wage theft claims? Discrimination claims? Safety violations? Still arbitrated. Still disappeared.

Maybe we need both approaches—people like me fighting from inside, and people like you refusing to participate at all.

Medvalli has the letter pinned to his cabin wall, next to a handwritten sign that reads:

THEORETICAL RIGHTS: 100%

PRACTICAL PARTICIPATION IN MODERN SOCIETY: 0%

REGRETS: COMPLICATED


“I am not a model to emulate,” Medvalli says, as the sun begins to set over Lake Huron. Another cruise ship—one of the small Great Lakes tour vessels—passes in the distance. “I am a cautionary tale.”

He is quiet for a moment.

“But maybe every person who clicks ‘I Agree’ without reading should have to look at me first and ask themselves: Is this the only alternative? Is the choice really between surrendering your constitutional rights and becoming this?”

He gestures at the houseboat, the island, the dog now attempting to mount my backpack.

“If the answer is yes—if the system has been designed so that the only way to preserve your rights is to withdraw from society entirely—then at least people should know that’s the choice they’re making. At least it shouldn’t be done in ignorance, buried in fine print, invisible and unexamined.”

Kai successfully mounts the backpack. Medvalli doesn’t apologize.

“He does that,” he says.


Federal Judge William G. Young once wrote that the rise of forced arbitration represents “among the most profound shifts in our legal history. Ominously, business has a good chance of opting out of the legal system altogether and misbehaving without reproach.”

Proponents argue that arbitration is faster and cheaper than litigation. The Chamber of Commerce claims consumers win more often in arbitration and receive comparable awards. But these arguments ignore what researchers call “the denominator problem”: they examine only the tiny fraction of claims that make it to arbitration, not the 98 percent that disappear. They ignore the repeat-player advantage that systematically favors corporations. They ignore that a system designed to be fast and cheap is worthless if it deters virtually all claims from being filed.

The Seventh Amendment guarantees the right to a jury trial in civil cases. The Founders understood that this right served as a critical check on concentrated power. When corporations can compel their employees and customers to surrender this right as a condition of employment or commerce, they have effectively nullified a constitutional protection for the vast majority of Americans.

TooToo Medvalli knows all of this. He has had 18 years to read about it, think about it, write letters to congressmen about it.

None of it has changed anything.


As I motor back to the mainland, I pass the spot where the buoy used to be—the one Kai allegedly sank. The sun is setting, painting Lake Huron in shades of orange and pink. It is, objectively, beautiful.

My phone buzzes. A notification from my bank: updated terms of service. Would I like to review them?

I think about Medvalli, alone on his houseboat, communicating through letters, preserving his theoretical rights while the world clicks “I Agree” around him.

I think about the 60 million workers bound by arbitration clauses. The 300 million telecom subscribers. The 80 million credit card holders. The 98 percent of claims that simply vanish.

I think about whether rights that can be forced-waived are really rights at all.

Then I click “I Agree” without reading.

I have a mortgage to pay.


Oskar Rausch is a researcher at the Make America Constitutional Again Institute (MACAI) in San Juan, Puerto Rico. He can be contacted at oskar.rausch@proton.me


Editor’s Note

The statistics cited in this article are drawn from peer-reviewed research, including:

  • Alexander J.S. Colvin, “An Empirical Study of Employment Arbitration,” Journal of Empirical Legal Studies (2011)
  • Cynthia Estlund, “The Black Hole of Mandatory Arbitration,” North Carolina Law Review (2018)
  • Katherine V.W. Stone & Alexander J.S. Colvin, “The Arbitration Epidemic,” Economic Policy Institute (2015)
  • Consumer Financial Protection Bureau, “Arbitration Study: Report to Congress” (2015)

Dr. TooToo Medvalli is a fictional character who first appeared in “Cruise Ship Doctor” (2025). This article is a work of satirical fiction. All constitutional principles cited are real. All absurdity is intentional.

HOLDING THE BAG

A Medical Tragicomedy

By Dr. TooToo Medvalli, MD


“The boycott had been comprehensive, almost impressive in its coordination.”

DISCLAIMER

This is a work of satire inspired by real events in American healthcare employment. All characters, names, and identifying details have been changed. Any resemblance to actual persons, living or dead, or actual organizations is purely coincidental. The legal cases and public records cited (Cascade Health Solutions v. PeaceHealth, wage theft settlements, etc.) are matters of public record and documented fact. The author’s experiences with healthcare employment negotiations are real. The names are not.

PART I: THE VIEW FROM THE CRUISE SHIP

Chapter 1: Welcome to Gravina Island

The thing about watching your professional life collapse from a houseboat anchored off Gravina Island is that you have plenty of time to consider the absurdity of it all. Which is exactly what I was doing at 6:47 AM on a Tuesday morning when the Norwegian Joy glided past, its passengers waving cheerfully at the picturesque Alaskan landscape while I stood on my floating prison in my bathrobe, holding a cup of instant coffee and contemplating the series of decisions that had led me here.

Dr. TooToo Medvalli, MD. Board-certified gastroenterologist. Three months into my “opportunity” with PeaceHealth Ketchikan Medical Center. Living on a houseboat because even the marina operators had refused my business.

The boycott had been comprehensive, almost impressive in its coordination. No landlord would rent to me. Grocery stores turned me away at the door—politely, always politely, with that particularly Alaskan brand of courtesy that made rejection feel like a favor. Even the dispensaries claimed to be out of stock. The ferry operators, those stoic civil servants, found creative reasons why I couldn’t board. “System’s down.” “Weight limits.” “Weather advisory.”

It was remarkable, really, how a community of 8,000 souls could mobilize against one physician who’d had the audacity to—

Well. We’ll get to that part.

I waved back at the cruise ship passengers. Force of habit. They couldn’t see me anyway, but I’d developed this peculiar routine over the past three months. Wave at the tourists. Remind yourself you’re still visible. Still human. Still technically a physician, though increasingly unclear what that actually meant in Ketchikan.

My phone buzzed. An email from Mupeet, the PeaceHealth recruiter who’d promised me this would be a “seamless transition” to “Alaska’s premier healthcare destination.”

Subject: RE: Contract Amendment Request – Mutual Attorney Fees Provision

I didn’t need to open it to know what it said. The same thing every email from PeaceHealth said, in increasingly creative variations: We have a standard contract for all 1,300 physicians.

As if repeating a number made something true. As if 1,299 other physicians signing a terrible contract somehow obligated me to do the same. It was the logical equivalent of saying “well, everyone else jumped off the cliff, so you should too,” except dressed up in corporate HR language and delivered with the cheerful insistence of someone who’d been trained to never acknowledge that they were, in fact, asking you to jump off a cliff.

But I’m getting ahead of myself. This story doesn’t start on a houseboat off Gravina Island. It starts the way all medical disasters start: with hope, enthusiasm, and a completely unrealistic expectation that institutions designed to extract value from physicians might actually treat physicians like human beings.

Let me back up.



Chapter 2: How I Learned to Stop Worrying and Love the Credentialing

JUNE 2025

“Dr. Medvalli, we’re so excited to have you join the PeaceHealth family!”

Mupeet’s voice on the phone had that particular pitch of enthusiasm that immediately made me suspicious. I’d been a physician long enough to know that when healthcare administrators used words like “family” and “exciting opportunity,” what they actually meant was “we’re about to make your life significantly more complicated and then act surprised when you’re not grateful.”

But I was optimistic. Foolishly, embarrassingly optimistic. Ketchikan needed physicians. I was a physician. Simple supply and demand, right? Economics 101. What could possibly go wrong?

“I just need you to complete your credentialing application through VerityStream,” Mupeet continued. “It’s very straightforward. Most physicians finish it in one sitting.”

Famous last words.

VerityStream, for the uninitiated, is what happens when someone decides that the already byzantine process of medical credentialing could be made worse through digitization. It’s a platform that manages to combine the user-unfriendliness of a 1990s website with the reliability of a dial-up modem, all wrapped in the kind of interface design that makes you wonder about healthcare systems’ choice of software.

I logged in. Or tried to. The VPN I use for security—standard practice for anyone who doesn’t want to broadcast their medical license information across open WiFi networks—was blocked. No error message. No explanation. Just… blocked.

I tried a different U.S.-based VPN server. Blocked.

I tried without a VPN. The page loaded, then immediately crashed.

I tried a different browser. Same result.

I tried my phone. The login page appeared, but when I entered my credentials, I got an error message that appeared to be in some kind of ASCII art font that made it completely illegible.

Four hours later, I’d made it through exactly one page of the application: my name and date of birth.

I emailed Mupeet: “Having some technical difficulties with VerityStream. Is there a PDF version I could complete instead?”

Her response: “VerityStream is our standard platform for all credentialing. Please continue with the online application. We don’t have a PDF version.”

Standard. There was that word again. I was beginning to understand that “standard” in healthcare administration meant “we’ve done it this way for so long that we’ve forgotten why we started, and we’re certainly not going to change now just because it doesn’t work.”

But I persevered. Because that’s what physicians do. We persevere. We adapt. We find workarounds for broken systems because patients need us to, and because somewhere in the back of our minds, we still believe that if we just work hard enough, if we just push through enough bureaucratic nonsense, we’ll eventually get to do the thing we trained for: actually taking care of people.

Three weeks. It took me three weeks to complete the VerityStream application. An application that should have taken, as Mupeet had so confidently assured me, “one sitting.”

The problems were endless:

  • The Oregon State Initial Credentialing Application wouldn’t generate
  • The PeaceHealth Attestation Questions section refused to show a green checkmark no matter how many times I submitted it
  • My professional references kept showing as “incomplete” even though all three colleagues had confirmed they’d submitted their forms
  • The system randomly logged me out mid-session, deleting unsaved data
  • Half the dropdown menus didn’t work in Safari, Chrome, or Firefox

I documented everything. Screenshot after screenshot. Error message after error message. I was building a case, though I didn’t yet realize what kind of case I’d eventually need.

On July 15th, I finally submitted the completed application. I felt the peculiar satisfaction that comes from finishing something that shouldn’t have been difficult but was made artificially complicated by technological incompetence masquerading as innovation.

Mupeet’s response: “Great! Now we just need you to resubmit your professional references.”

I stared at my computer screen for a full minute, trying to process this sentence.

“The references were already submitted,” I replied. “Dr. Russell, Dr. Khanna, and Dr. Augustino all completed their forms three weeks ago.”

“I know, but that round of references was just to start the job application. For credentialing, you’ll need to submit 3 new references that are different from the ones we required to consider your job application.”

So a prospective doctor has to submit 3 peer references just to knock on PeaceHealth’s door, and then when they finally get to the credentialing process, a few steps before the finish line, they have to submit 3 entirely new physician references? No. No, I will not. Because asking busy physician colleagues to duplicate work they’d already completed due to PeaceHealth’s system failures was:

  1. Unprofessional
  2. Disrespectful to my colleagues
  3. A sign that I was entering a relationship with an organization that fundamentally didn’t value physicians’ time

But I didn’t say that. Not yet. Instead, I wrote: “I will not ask my references to duplicate work they’ve already completed due to internal system issues on PeaceHealth’s end. The references were submitted in good faith by respected colleagues who took time from their busy schedules to support my application. Please retrieve them from your system.”

Three days of silence.

Then: “We’ve located the references. Thank you for your patience.”

The references had been there all along. In the system. Filed correctly. But the recruiting team apparently didn’t communicate with the credentialing team, each of them trying to operate their own systems without any cross-talk. It was more convenient for the credentialing team to ask for three new references than to ping colleagues from the recruiting team. Oblivion, laziness, apathy. Someone asleep in the cockpit.

This should have been my first warning sign.

It was not my last.



Chapter 3: The Credentialing Morass 

AUGUST 2025

By mid-August, I’d exchanged 77 emails with four different people at PeaceHealth, an organization 800 miles and an ocean away from Ketchikan, none of whom seemed to know what the other three were doing, and all of whom had slightly different ideas about what documentation I needed to provide.

Dora Nuss (Credentialing Specialist): “We need your UCSF training certificate.”

Linda Waters (Senior Credentialing Coordinator): “Actually, we need a letter from UCSF explaining the gap in your training.”

Mandy Harbor (Credentialing Manager): “We need verification of all hospital affiliations since completion of training.”

Sandra Koch (Chief Administrative Officer): “You can apply for hospital privileges as an independent doctor. No problem. You need a place of business.”

“No problem. I’m actually working on it now,” I replied.

“Just so you know though, you couldn’t cover your own patients if they were admitted, because we have 24/7 physican coverage already. And there would be no reimbursement from us for you to do so. Because we’re not looking for someone to cover. Everyone who works in the hospital is employed by PeaceHealth Medical Group.” 

I let that sit for a moment. Then: “So you’re saying that hospital privileges—and the ability to practice medicine in Ketchikan—are conditional on employment with PeaceHealth Medical Group?” 

Koch: “I’m saying that’s how we operate. All our doctors are PeaceHealth employed. If you wanted to be an independent practitioner and also have hospital access, that would be… complicated.” 

Complicated. That word again. The word organizations use when they mean “impossible but we can’t say impossible because that would be illegal. 

“Ms. Koch, Ketchikan Medical Center is the only hospital within 235 miles. If I can’t have privileges there as an independent physician, I can’t practice medicine in Ketchikan at all. Are you aware that tying hospital privileges to employment might constitute an antitrust violation?” 

Silence. Longer this time. “Dr. Medvalli, I’m just explaining how our system works. If you want to work here, you’ll need to be employed by PeaceHealth Medical Group. That’s the structure we have.” 

“Right. The structure where the only hospital on an isolated island only grants privileges to physicians who agree to be employed by your medical group. The structure that effectively eliminates any possibility of independent practice or competition.” 

“But I want to be very clear about what you’ve just told me: PeaceHealth Ketchikan Medical Center does not grant privileges to independent practitioners. Is that correct?” 

“That’s… that’s how we currently operate, yes.” 

“And has it always been this way? Have there ever been independent practitioners with privileges at Ketchikan Medical Center?” 

Another pause. “Not that I’m aware of. Not in my time here.” 

“How long have you been here?” 

“Nineteen years.” Nineteen years. Nineteen years of a monopoly hospital on an isolated island ensuring that no physician could practice medicine without submitting to employment by their medical group. This wasn’t a credentialing conversation anymore. This was evidence.

By September, the email count had reached 93. I’d been in contact with five different coordinators. My start date had been pushed back from October 1st to November 1st to December 1st to “TBD pending credentialing completion.”

And then came the Teams meeting.



Chapter 4: The Teams Meeting, or: How I Learned That Corporate Healthcare Runs on Meetings About Having Meetings

SEPTEMBER 16, 2025

“Dr. Medvalli, thank you so much for joining us!”

Dr. Rajesh Jade, PeaceHealth’s VP of Medical Operations, beamed at me from my laptop screen. Beside him were Dora, Linda, Mandy, and two people I’d never heard from before: Patricia Rice (VP of Legal) and someone whose name and title I immediately forgot because my brain had reached maximum capacity for PeaceHealth administrators.

“We wanted to touch base about your credentialing progress,” Dr. Jade continued, using the phrase “touch base” in that way that means absolutely nothing while sounding productive.

“Yes,” I said. “I wanted to touch base too. Specifically about why, after three months and 93 emails, my credentialing isn’t complete despite the fact that I’ve provided every piece of documentation requested, sometimes multiple times.”

Uncomfortable silence. Faces on screens trying to figure out who should speak first. Finally, Dora jumped in.

“Well, you see, there were some issues with the VerityStream system—”

“Yes, I’m aware of the VerityStream issues. I documented them extensively. I also offered multiple times to complete a PDF application instead. That offer was declined. You said you’d contact the software vendor but there was no follow up.”

“The PDF isn’t our standard process,” Mandy interjected. “We use VerityStream for all physicians.”

There it was again. Standard. The magic word that excused all sins.

“I understand it’s your standard process,” I said, keeping my voice carefully level. “But your standard process doesn’t work. The VerityStream website is fundamentally broken. The Oregon credentialing application won’t generate. The attestation section won’t accept completed forms. The system logs out randomly and deletes data. I’ve been screen-recording all of this. Would you like me to send you the footage?”

More uncomfortable silence.

“We’ll look into the technical issues,” Dr. Jade said, in the tone of someone who absolutely would not look into the technical issues.

“Great. While you’re looking into that, can someone explain why I was asked to resubmit professional references that were already in your system?”

“That was a communication error,” Linda admitted. “The references were there, we just… there was confusion about where they were filed.”

“A three-week confusion that resulted in me nearly asking three busy physicians to duplicate work they’d already completed.”

“We apologize for that,” Dr. Jade said. He didn’t sound apologetic.

“And can someone explain why I’m still waiting for a single point of contact? I’ve been working with five different people, all asking for slightly different things, none of whom seem to know what the others have requested.”

“We’re assigning you a dedicated coordinator,” Mandy said.

“When?”

“Soon.”

“That’s not a date.”

“This week.”

“Which day this week?”

She looked uncomfortable. “I’ll get back to you on that.”

I took a breath. “Dr. Jade, I want to be very clear about something. I’ve been extraordinarily patient. I’ve accommodated every request, even the unreasonable ones. I’ve worked with your broken systems. I’ve waited through multiple start date delays. But my family is in limbo. We were supposed to relocate to Ketchikan in October. It’s now mid-September, and I don’t have a firm start date. I don’t have credentialing completion. I don’t even have a single person I can email who can give me a straight answer about where we are in this process.”

Dr. Jade nodded sympathetically. “I completely understand your frustration, Doctor. We’re going to streamline this. Patricia will coordinate with medical staff services. We’ll have weekly check-ins. And we’ll assign you that single point of contact by end of week.”

I didn’t believe him, but I nodded anyway.

The meeting ended with the usual pleasantries. Everyone thanked everyone else for their time. Plans were made. Commitments were voiced.

And absolutely nothing changed.

The dedicated coordinator never materialized. The weekly check-ins never happened. Patricia from Legal never emailed me.

What I did get was another request to resubmit my hospital affiliation history, despite having already provided my complete CV, which contained my hospital affiliation history.

“Should I just send you my CV again?” I asked Linda via email.

“Yes, but we need it in a specific format.”

“What format?”

“Chronological, with dates and roles.”

“That’s… that’s what a CV is.”

“Right, but we need it formatted specifically for credentialing.”

“Which means what, exactly?”

No response for four days.

Then: “Never mind, we found it in your file.”



Chapter 5: Enter Sandra Koch, or: The Woman Who Could Kill Your Career With a Smile

OCTOBER 1, 2025

By early October, the contract negotiation track had collided with the credentialing track in a perfect storm of bureaucratic dysfunction.

I’d been working with Mupeet on my employment contract. And by “working with,” I mean “trying to negotiate with someone who’d been explicitly told she had zero authority to negotiate anything.”

The contract had several problems. Not minor problems. Fundamental, “I-cannot-sign-this-document” problems:

1. Attorney Fee Provision: The contract stated that if there was any dispute, PeaceHealth could recover their legal fees from me, but I couldn't recover mine from them. Ever. Under any circumstances. Even if I won.

2. FTE Definition: The contract didn't define what "1.0 FTE" actually meant—how many hours, how many patients, what constituted full-time work. This left me completely vulnerable to PeaceHealth changing expectations after I'd relocated. "You're 1.0 FTE, but we need you to see 30 patients a day now." No protection.

3. Outside Professional Activities: I run a medical technology LLC that develops practice management software. Completely separate from clinical practice. No patient data. No PeaceHealth resources. My own time, my own money. The contract required PeaceHealth approval for any outside professional activities, with approval subject to their "integrity team" review. No defined criteria. No timeline. No appeals process.

4. Start Date Rigidity: The contract specified December 1st as my start date, with no flexibility language despite the fact that their credentialing delays had already pushed back my original October start date by two months. 

I consulted a trusted attorney whom I had previously worked with on other contract-related matters. The attorney – call him N – reviewed the contract and gave me a list of recommended modifications. All of them were reasonable. Some were generous on my part—I was willing to accept a lot of standard clauses that my attorney thought were problematic.

But the attorney fee provision? That was my line in the sand.

“I cannot sign a contract where I would have to pay a huge corporation’s legal fees while they have no obligation to pay mine,” I told Mupeet in one of our many phone calls. “That’s fundamentally unfair.”

“I understand,” she said, “but that’s our standard contract language.”

“Just because something is standard doesn’t make it fair.”

“I know, but we have 1,300 physicians, and they all have the same contract.”

“Maybe you have 1,300 physicians with terrible contracts.”

Silence. Then: “I’ll escalate this to Dr. Leigh.”

Dr. Marvin Leigh. Chief Medical Officer. The man who supposedly had authority to modify contracts that recruiters claimed were written in stone.


Dr. Leigh called me on September 2nd.

“Dr. Medvalli, Marvin Leigh here. How are you?”

“I’m well, thanks. How are you, Dr. Leigh?”

“Doing great. Listen, Mupeet tells me you’re having some concerns about the contract?”

I walked him through my requests. The attorney fee provision. The start date flexibility. The outside professional activities clarification. The definition of 1.0 FTE, which was mysteriously absent from the contract despite supposedly being the cornerstone of my employment.

Dr. Leigh listened. Actually listened, which was refreshing. And then he said something that made me think maybe, just maybe, this would work out:

“These all sound pretty reasonable to me. The attorney fee thing, I’ll be honest, I’m not even sure what the current language says. Let me look into that. The FTE definition—we definitely have that documented somewhere, we should have it in the contract. Start date flexibility, that’s not a problem, we adjust those all the time.”

“Really?”

“Really. Look, Doctor, we want you here. You’re qualified, you’re needed, and I don’t see any reason why we can’t work through these contract details. Give me a week to talk to legal and I’ll get back to you.”

I felt hopeful. Genuinely hopeful. Dr. Leigh seemed like a reasonable human being who understood that physicians are people, not interchangeable cogs in a machine.

This feeling lasted approximately six days.


On September 8th, I got an email from Mupeet.

Subject: Contract Update

Hi Dr. Medvalli,

I heard back from Dr. Leigh and our legal team. Here’s where we landed on your requests:

1. Attorney Fee Provision: We’ve modified this to be mutual! Now neither party can recover attorney fees. We think this addresses your fairness concern.

2. FTE Definition: Dr. Leigh said we’ll include this documentation in your onboarding materials.

3. Start Date Flexibility: If credentialing causes delays, we’ll work with you. But we can’t change the contract language.

4. Outside Professional Activities: The integrity team will review and get back to you.

Let me know if you’re ready to move forward, and I’ll send a revised employment agreement!

Mupeet

I read this email three times, trying to parse what had happened.

The attorney fee provision had been made “mutual” in the worst possible way. Instead of both parties being able to recover fees if they won, now neither party could recover fees. Ever.

This was presented as a compromise. As “fair.”

But it wasn’t fair. It was worse for me.

Here’s why: If I had to sue PeaceHealth for breach of contract, I’d be hiring an attorney out of pocket. Let’s say I spent $50,000 on legal fees. If I won, I’d still be out $50,000.

Meanwhile, PeaceHealth has in-house legal counsel. Their lawyers are salaried employees. A lawsuit costs them basically nothing marginal.

So the “mutual” provision wasn’t mutual at all. It removed a protection from me (the ability to recover fees if I won) while not imposing any real burden on them (because they don’t need to hire outside counsel).

I called Mupeet.

“This isn’t what I asked for,” I said.

“But it’s mutual now! Neither party pays the other’s fees!”

“That’s not the same as both parties being able to recover fees if they win.”

“But… it’s equal.”

“Mupeet, PeaceHealth has in-house counsel. You have unlimited legal resources. I don’t. This change benefits you, not me.”

“I’ll… I’ll escalate this back to Dr. Leigh.”


Meanwhile, the credentialing situation had reached new levels of absurdity. I was now corresponding with six different people. My email count had hit 90+. And I still didn’t have a firm start date.

That’s when I got The Call.

Sandra Koch. Chief Administrative Officer of PeaceHealth Ketchikan Medical Center. The final boss.

“Dr. Medvalli, this is Sandra Koch. I wanted to reach out personally about your situation.”

Her tone was friendly. Almost maternal. This should have been my warning.

“I understand you’re frustrated with the credentialing process,” she continued. “And I want you to know we’re doing everything we can to get you started. But I also wanted to make sure we’re on the same page about your role here.”

“Of course. I’m here to be a gastroenterologist. To see patients. To provide care that this community clearly needs.”

“Right. And you’ll be employed by PeaceHealth Medical Group?”

“That’s what we’ve been negotiating, yes.”

“Good. Because I did see your email about applying for independent hospital privileges. I wanted to clarify something.” Her voice changed slightly. Still friendly, but now with an edge. “All of our doctors are PeaceHealth employed.”

I felt something cold settle in my stomach.

“Regardless of the outcome of our employment negotiations,” I said carefully. “I’d like to apply for hospital privileges as an independent physician. In any case, it would put me in a better position to negotiate with PeaceHealth and open the door to me joining the community as a private practice doc in the event we can’t reach an employment agreement.”

“I understand. But you should know that we don’t have independent practitioners with privileges here. Everyone who works in the hospital is employed by PeaceHealth Medical Group.”

There it was. Explicit. Clear. Undeniable.

“Are you saying that hospital privileges are conditional on employment with PHMG?”

“I’m saying that’s how we operate. All our doctors are PeaceHealth employed. If you wanted to be an independent practitioner and also have hospital access, that would be… complicated.”

Complicated.

“Complicated how?”

“Well, you couldn’t cover your own patients if they were admitted, because we have 24/7 physician coverage already. And there would be no reimbursement from us for hospital work since we’re not looking for additional doctors. So it would be complicated.”

I understood perfectly. It wasn’t complicated at all. It was simple:

No employment = No privileges.

The hospital was the only hospital within 235 miles. If you wanted to practice medicine in Ketchikan, you worked for PeaceHealth. If you didn’t work for PeaceHealth, you didn’t practice medicine in Ketchikan.

Simple.



Chapter 6: The Antitrust Awakening

That night, I couldn’t sleep. Not because I was angry—though I was—but because something Sandra Koch had said was nagging at me.

“All our doctors are PeaceHealth employed.”

Not “most.” Not “we prefer.” All.

I did what any physician with insomnia and internet access does: I started researching.

Turns out, PeaceHealth has quite a history with antitrust law.


CASCADE HEALTH SOLUTIONS v. PEACEHEALTH (2003-2008)

In Lane County, Oregon, McKenzie-Willamette Hospital sued PeaceHealth for attempted monopolization. PeaceHealth operated three hospitals and dominated the market for primary, secondary, and tertiary hospital care. McKenzie operated one small hospital and provided only primary and secondary care.

PeaceHealth offered insurers bundled discounts: Use us exclusively for ALL services, and we’ll give you a 15% discount. Use us for tertiary care but let McKenzie provide primary/secondary care? Only 10% discount.

The result: Insurers couldn’t afford to include McKenzie in their networks. McKenzie was being squeezed out not because they provided worse care or charged more, but because they couldn’t match PeaceHealth’s bundled pricing—they didn’t offer tertiary services.

A jury found PeaceHealth guilty of attempted monopolization and awarded McKenzie $16.2 million in trebled damages.

The Ninth Circuit Court of Appeals later vacated the verdict on technical grounds about jury instructions, but notably did NOT find that PeaceHealth’s conduct was legal. They just sent it back for retrial under a different legal standard.

The case eventually settled. Quietly. As these things do.

The message was clear: PeaceHealth has a history of using its monopoly power to exclude competitors, even when doing so harms patients and violates antitrust law.


But that wasn’t all.

I found more:

PEACEHEALTH WAGE THEFT SETTLEMENTS

  • 2023: Settled class action for $7.3 million for timecard rounding system that systematically underpaid 11,000 healthcare workers
  • Multiple employees sued claiming PeaceHealth pressured them to clock in/out at times that favored the company in wage calculations

PEACEHEALTH CHARITY CARE VIOLATIONS

  • Washington Attorney General: PeaceHealth agreed to return up to $13.4 million to low-income patients who were billed despite qualifying for financial assistance
  • PeaceHealth had failed to inform thousands of patients about available charity care, despite legal requirements

DISCRIMINATION LAWSUITS

  • ACLU-WA: Sued for denying transgender healthcare coverage to employees
  • Sexual assault lawsuit: Patient alleged aggressive tactics by PeaceHealth legal team to intimidate and discredit assault victims

This wasn’t one bad incident. This was a pattern.


At 3 AM, I drafted an email to N, my attorney.

N,

I need to talk to you about antitrust issues. I think PeaceHealth is tying hospital privileges to employment with their medical group. Sandra Koch, the CAO, explicitly told me “all our doctors are PeaceHealth employed” and that independent practice with hospital access would be “complicated.”

Given that PeaceHealth Ketchikan is the only hospital within 235 miles, and Ketchikan is only accessible by plane or boat, this effectively means you either work for PeaceHealth or you don’t practice medicine here.

Isn’t that textbook tying? And possibly exclusive dealing?

Call me when you can.

TooToo

I hit send and tried to sleep.

I couldn’t.

Because I’d just realized something else: If PeaceHealth was willing to tie privileges to employment, if they had a documented history of anticompetitive conduct, if they’d already been sued successfully for monopolistic practices…

What the hell was I walking into?


Chapter 7: The Great Escape (That Wasn’t)

OCTOBER 15, 2025

N called me the next morning.

“TooToo, I read your email. Tell me exactly what Sandra Koch said.”

I recounted the conversation. Verbatim. When you have anxiety and a good memory, you remember conversations in excruciating detail—a dubious superpower, but occasionally useful.

“‘All our doctors are PeaceHealth employed,'” N repeated. “She said all?”

“Yes.”

“Not ‘most’ or ‘currently’? She said all?”

“All. And she said independent practice with hospital privileges would be ‘complicated’ and there would be ‘no reimbursement’ for hospital work.”

Silence on the other end. Then: “That’s pretty explicitly exclusionary.”

“That’s what I thought.”

“And given that it’s the only hospital in the region, this is potentially a tying arrangement. You want hospital privileges? You have to buy the employment contract. Classic antitrust violation.”

“So what do I do?”

“Well, you could sue them.”

I laughed. It wasn’t a happy laugh.

“N, I’m trying to START a job, not blow up my career before it begins. If I sue PeaceHealth before even starting work, I’ll be radioactive. No hospital will touch me. I’ll be ‘that doctor who sues employers.'”

“I know. But you need to understand something: What they’re doing is illegal. Tying is a per se antitrust violation under the Sherman Act. Hospital privileges are essential for practicing medicine. They can’t condition access on employment.”

“Except they’re doing exactly that.”

“Yes. They are. Which means you have three options:”

“I’m listening.”

“Option one: Sign the contract. Work for them. Accept that you’re entering an organization that operates illegally and hopes no one challenges them.”

“Pass.”

“Option two: Walk away. Forget Ketchikan. Find another position somewhere else.”

I thought about my family. About the months of preparation. About the fact that I’d turned down other opportunities because I’d committed to PeaceHealth. About the genuine need for medical services in Ketchikan—a community that deserved better care than they were getting.

“What’s option three?”

“Option three: You document everything. Keep every email. Record every conversation. Build a case. And when they inevitably screw you over—and TooToo, they will—you sue them. Not for breach of contract. For antitrust violations.”

“That’s not really a better option.”

“No. It’s not. But at least you’d be holding them accountable. And you might get other physicians out of similarly terrible situations.”

I sat with that for a moment.

“N, I just want to practice medicine. I don’t want to be an antitrust crusader.”

“I know. But sometimes physicians don’t get to choose.”


That night, I opened my email and started a new folder: “PeaceHealth – Evidence.”

I began systematically organizing every email. Every Teams meeting minutes. Every phone call note. The VerityStream screenshots. The contract versions. The credentialing requests and re-requests. Sandra Koch’s explicit statement about employment requirements.

I wasn’t planning to sue. Not yet. Maybe not ever.

But I was going to be ready.



Chapter 8: The Contract Theater

OCTOBER 20-30, 2025

The contract negotiations had devolved into farce.

Every time I raised a concern, Mupeet would “escalate to Dr. Leigh.” Days would pass. Then I’d get a response that either: a) Completely missed the point of my concern b) Offered a “solution” that was actually worse than the problem c) Claimed they’d “looked into it” but couldn’t change “standard language”

The attorney fee provision was the perfect example.

Version 1 (Original): PeaceHealth can recover legal fees from me. I cannot recover legal fees from PeaceHealth.

Version 2 (After “Negotiation”): Neither party can recover legal fees.

What I Actually Wanted (Version 3): BOTH parties can recover legal fees if they prevail.

This is not complicated. Mutual protection. If you sue me and lose, you pay my legal fees. If I sue you and lose, I pay your legal fees. Fair. Symmetric. Normal in professional contracts.

But PeaceHealth treated this request like I was asking them to donate a kidney.

“We’ve never done that in any employment contract,” Mupeet said.

“Maybe you should start.”

“It’s just not our practice.”

“Your practice is unfair.”

“But it’s standard.”

We were going in circles. Expensive, time-consuming circles.


Then came the piece de resistance: The start date issue.

Remember, my original start date was October 1st. Then November 1st. Then December 1st. All because of theircredentialing delays.

My attorney had suggested adding language like: “December 1, 2025, or such later date as mutually agreed in writing.”

Simple. Acknowledges reality. Protects both parties if there are further delays.

Mupeet’s response: “We can’t change the start date language in the contract. But don’t worry—if credentialing causes delays, we’ll work with you.” 

“But you won’t put that in writing?” 

“We don’t need to. We adjust start dates all the time.” 

“Then why not put it in the contract?”

“Because it’s not our standard language.”

I wanted to have a heart-to-heart with my boxing dummy, Bob. Instead, I wrote a very professional email explaining that “we’ll work with you” is not a contract term, it’s a verbal assurance, and verbal assurances from organizations that can’t even manage their own credentialing system are worth approximately nothing.

No response for a week.

Then: “Dr. Leigh says we can’t modify the start date language, but he assures you that if there are delays, we’ll accommodate them.”

Dr. Leigh’s assurance. As if I could take that to court. “Your Honor, I know the contract says December 1st, but Dr. Leigh assured me…”


NOVEMBER 1, 2025

November arrived. No contract. No credentialing completion. No start date.

I sent an email to Dr. Leigh directly.

Dr. Leigh,

I need clarity. It’s now November. I was originally supposed to start in October. My start date has been pushed back twice due to credentialing delays that are entirely on PeaceHealth’s end—not mine. I’ve provided every piece of documentation requested, multiple times.

I still don’t have a signed contract because PeaceHealth refuses to include basic fairness provisions like mutual attorney fee recovery.

I need you to tell me, directly: Is PeaceHealth actually committed to bringing me on? Or are we just going through motions here?

Because from where I’m sitting, it looks like your organization wants physicians who will sign anything, ask for nothing, and accept being treated as expendable.

I’m not that physician. But I am a good physician who wants to serve Ketchikan. So please: Either work with me in good faith, or tell me now so I can move on.

Respectfully, Dr. TooToo Medvalli

I hit send and immediately regretted the tone. Too harsh? Too honest?

No. It needed to be said.


Dr. Leigh called me two hours later.

“Dr. Medvalli, I got your email.”

“And?”

“And… you’re right. This process has been messier than it should be. I apologize for that.”

I said nothing. Waiting.

“Look,” he continued, “we want you here. We do. But I’m going to be honest with you: The attorney fee provision isn’t going to change. It’s been reviewed by our legal team, they’ve given us their position, and I don’t have authority to override that.”

“Even though it’s fundamentally unfair?”

“I understand your position. But it’s the same language we use for all our physicians.”

“Dr. Leigh, with respect, ‘everyone else has a bad deal’ is not a compelling argument for why I should accept a bad deal.”

“I know. But it’s where we are.”

Silence.

“So what are you saying?” I asked. “That this is the final offer?”

“I’m saying this is the contract we have. And if you want to work for PeaceHealth, this is what it looks like. I wish I could give you different news. But I can’t.”

“Then I guess we’re done.”

“TooToo—”

“Dr. Medvalli.”

“Dr. Medvalli. Don’t make a hasty decision. Think about it. Sleep on it. We can talk next week.”

“There’s nothing to think about, Dr. Leigh. I’m not signing a contract that lets you take me to court and stick me with both sides’ legal bills if I win. That’s not ‘standard.’ That’s unconscionable.”

“I understand. But—”

“No. You don’t understand. You have a legal team. You have resources. You have 1,300 physicians to absorb risk across. I’m one person. If we have a dispute and I’m right, and I win, I should be able to recover my legal costs. That’s basic fairness. And the fact that PeaceHealth won’t agree to that tells me everything I need to know about how you treat physicians.”

Silence on the other end.

“I’m sorry you feel that way,” Dr. Leigh said finally.

“I’m sorry you run an organization that makes physicians feel this way.”

I hung up.



Chapter 9: The Aftermath, or: How I Learned That Winning Is Also Losing

NOVEMBER 5-7, 2025

For three days, I heard nothing from PeaceHealth.

I assumed it was over. I’d walked away. They’d let me walk. That was that.

I started looking at other positions. The Midwest. California. Colorado. Places where I wouldn’t be at the mercy of a single employer in an isolated community. Places where “no” actually meant something and contracts were negotiable.

Then, on November 7th, I got an email from Patricia Rice. VP of Legal. The woman who’d never contacted me during the entire credentialing process but who apparently had time now.

Subject: Path Forward

Dr. Medvalli,

Dr. Leigh shared with me your concerns about the employment agreement. I wanted to reach out directly to see if we can find a resolution.

While we cannot modify our standard attorney fee language, we would be willing to add a clause specifying that any disputes must go through binding arbitration rather than litigation. This would substantially reduce legal costs for both parties.

We’re also prepared to clarify the outside professional activities language and include the FTE definition in the contract itself.

Would you be willing to discuss this option?

Best regards, Patricia Rice, JD Vice President, Legal PeaceHealth

I read the email three times.

Arbitration. Of course. The corporate solution to all legal inconveniences: Force disputes into private arbitration where employees almost never win, where precedent doesn’t apply, where proceedings are secret, and where the arbitrators are often repeat players who know they’ll only get hired again if they rule favorably for corporations.

This wasn’t a compromise. This was a cage labeled “Alternative Dispute Resolution.”

I called N.

“They’re offering arbitration,” I told him.

“Of course they are.”

“Is this better or worse than the original language?”

“Worse. Way worse. Litigation is public. Arbitration is private. Litigation creates precedent. Arbitration dies with the case. Litigation can lead to class actions. Arbitration isolates claims. And most importantly: In litigation, there’s a judge who has to follow the law. In arbitration, there’s an arbitrator who has to keep getting hired.”

“So it’s a trap.”

“It’s a trap.”

“What do I say?”

“You tell them no. You tell them that forcing arbitration while maintaining one-sided fee provisions is exactly the kind of thing that would make a good antitrust case even better, because it shows they’re not just using monopoly power to exclude competitors—they’re using contract terms to insulate themselves from legal accountability.”

“Will that work?”

“Probably not. But at least they’ll know you’re not stupid.”


I drafted my response:

Patricia,

Thank you for reaching out.

Unfortunately, mandatory arbitration is not an acceptable alternative to fair fee provisions. Arbitration disproportionately favors employers, particularly when combined with one-sided cost structures. It also prevents the kind of transparency and precedent-setting that protects other physicians from similar situations.

I’m not asking for special treatment. I’m asking for mutual protection: If either party brings a frivolous claim, they should bear the other’s legal costs. This protects both of us.

If PeaceHealth is unwilling to agree to truly mutual terms, then we don’t have a basis for an employment relationship.

Respectfully, Dr. TooToo Medvalli

I sent it.

And then I called a moving company to cancel our Ketchikan plans.



Chapter 10: The View From Gravina Island (Reprise)

Which brings us back to where this story started: Me, on a houseboat, off Gravina Island, watching cruise ships go by.

Except I’m not actually on the houseboat. That was the other Dr. TooToo Medvalli—the gastroenterologist from a previous story, a previous battle with PeaceHealth, a previous lesson about how healthcare systems eat physicians alive.

I’m in California. In my apartment. With my family. Having walked away from PeaceHealth before they could destroy me the way they’ve destroyed countless other physicians.

But I might as well be on that houseboat. Because the isolation is the same. The understanding that I dodged a bullet is the same. The knowledge that thousands of other physicians are exactly where I almost was—trapped in systems that treat them as resources to exploit rather than professionals to respect—that’s the same too.


Let me tell you what happened after I walked away.

Sandra Koch sent me a perfunctory email: “We’re sorry we couldn’t reach an agreement. We wish you well in your future endeavors.”

Mupeet disappeared entirely. No response to my final email. No acknowledgment of the months we’d spent negotiating.

Dr. Leigh mysteriously lost his position and was never heard from again.

But here’s the thing: Three weeks after I walked away, I got a LinkedIn message from another physician. Dr. Jennifer Parks. An internist who’d been recruited by PeaceHealth for their Bellingham hospital.

Dr. Medvalli,

I heard through the medical grapevine that you walked away from a PeaceHealth position. I’m currently negotiating with them and running into similar contract issues. Would you be willing to talk?

Jennifer

I called her.

Turns out, she was being told the exact same things I’d been told:

  • “Standard contract for all 1,300 physicians”
  • “We can’t modify the attorney fee language”
  • “The start date is flexible, trust us, but we can’t put it in writing”
  • “Everyone signs this, it’s fine”

She asked me what I thought she should do.

“Walk away,” I said. “Unless you’re comfortable being at the mercy of an organization that’s been successfully sued for antitrust violations, wage theft, and charity care fraud. Unless you’re okay with signing a contract that says they can take you to court and stick you with the bill even if you win. Unless you like the idea of having hospital privileges tied to employment with no alternative.”

“But they need doctors. I’m a good doctor. Doesn’t that count for something?”

Oh, you sweet summer child.

“No,” I said. “It doesn’t. They’ll take your labor. They’ll take your expertise. They’ll take everything you give them. And when it’s inconvenient, they’ll dispose of you. Because you’re not a physician to them. You’re a widget in a machine. A revenue-generating unit. And widgets are replaceable.”

She thanked me for my honesty.

Two weeks later, she emailed me: She’d taken a position at a smaller independent practice in Oregon. Less prestige. Less money. Better contract. Actual respect.

Good for her.



EPILOGUE: The Thing About Bags

The phrase “holding the bag” comes from an old con game. The mark is convinced to hold a bag supposedly containing something valuable. The con artists disappear. The mark opens the bag. It’s empty. They’re left holding nothing—except blame.

Corporate healthcare is the same con, except more elaborate.

They promise you meaningful work. Professional autonomy. Competitive compensation. Partnership. Respect. Family. Opportunity. All the bags are shiny and labeled beautifully.

You take the job. You sign the contract (if you’re less careful than I was). You relocate. You commit. You give them everything: your labor, your expertise, your credibility with patients, your time, your energy.

And then one day, you open the bag.

It’s empty.

Or worse: It’s full of someone else’s liability. Non-compete clauses that trap you. One-sided fee provisions that bankrupt you. Productivity metrics that burn you out. Contract language that says you’re an “independent contractor” for tax purposes but an “employee” for liability purposes. The bag is whatever they need it to be to protect themselves and screw you.

And you’re left holding it.


PeaceHealth wanted me to hold their bag.

They wanted me to:

  • Accept credentialing delays with no accountability
  • Sign a contract with one-sided fee provisions
  • Agree to employment as a condition for hospital privileges (antitrust violation)
  • Trust verbal assurances instead of written protections
  • Submit to mandatory arbitration
  • Accept “standard” treatment even when standard treatment is illegal

They wanted me to take all the risk while they kept all the power.

And when I said no, they acted shocked. Hurt, even. As if I was being unreasonable for wanting basic fairness.

This is the broken state of American healthcare: Physicians are taught to be martyrs. To sacrifice for patients. To accept poor treatment because “someone has to do this work.” To hold the bag because refusing means patients suffer.

And hospitals use that nobility against us.

They exploit our sense of duty. They weaponize our commitment to patient care. They know we’ll tolerate terrible contracts because walking away feels like abandoning patients.

But here’s what I learned: Accepting terrible contracts doesn’t help patients. It enables terrible systems.

Every physician who signs a bad contract tells hospitals they can keep offering bad contracts.

Every physician who accepts one-sided terms tells hospitals they can keep demanding one-sided terms.

Every physician who stays quiet about anticompetitive practices tells hospitals they can keep breaking the law.

We’re not helping patients by martyring ourselves. We’re helping hospitals exploit the next generation of physicians even more thoroughly.


So I didn’t take the bag.

I didn’t sign the contract.

I didn’t martyr myself on the altar of PeaceHealth’s monopoly.

And now I’m telling you this story so maybe you won’t either.

Because someone has to stop holding the bag. Someone has to say: No. This is not acceptable. This is not legal. This is not how we treat professionals.

Someone has to refuse.

So let it be us. Let it be physicians. Let it be now.



APPENDIX: What Actually Happened (The Boring But Important Legal Stuff)

Since this is a book and not just a therapeutic rant, here are the actual legal facts that underpin this story:

PeaceHealth’s Documented Antitrust Violations

Cascade Health Solutions v. PeaceHealth (2003-2008)

  • McKenzie-Willamette Hospital sued PeaceHealth for attempted monopolization in Lane County, Oregon
  • PeaceHealth used bundled pricing to exclude competitors from insurance networks
  • Federal jury found PeaceHealth guilty of attempted monopolization
  • Awarded $16.2 million in damages (trebled from $5.4 million)
  • Ninth Circuit vacated verdict on technical jury instruction issues, NOT on grounds that conduct was legal
  • Case remanded for retrial, eventually settled confidentially
  • Key finding: PeaceHealth has monopoly power and has used it anticompetitively

Other PeaceHealth Legal Problems

Wage Theft (2020-2023)

  • Class action lawsuit by 11,000 employees for timecard rounding system
  • Alleged PeaceHealth pressured employees to clock in/out at times favoring the company
  • Settled for $7.3 million in 2023
  • Pattern: Systematic exploitation of workers through seemingly neutral policies

Charity Care Violations (2023)

  • Washington Attorney General found PeaceHealth billed low-income patients who qualified for financial assistance
  • Failed to inform thousands of eligible patients about available charity care
  • Required to refund up to $13.4 million to over 15,000 patients
  • Pattern: Extracting money from vulnerable populations by hiding legally-required assistance

Discrimination (2017-2019)

  • ACLU-WA sued for denying transgender healthcare coverage to employees
  • PeaceHealth changed policy but only after litigation
  • Pattern: Discriminatory policies maintained until legally forced to change

Sexual Assault Response (2020-2024)

  • Patient sued alleging sexual assault by physician assistant
  • Attorneys noted PeaceHealth’s “aggressive legal strategy” to intimidate plaintiff
  • Court sanctioned PeaceHealth for attorney conduct
  • Pattern: Aggressive legal tactics to protect institution over patients

The Tying Arrangement

Legal Standard (Jefferson Parish Hospital v. Hyde, 1984): Tying is illegal when:

  1. Two distinct products (hospital privileges + employment)
  2. Conditioning sale of one on purchase of other
  3. Sufficient economic power (monopoly/market dominance)
  4. Affects substantial commerce

PeaceHealth Ketchikan:

  1. ✓ Hospital privileges and employment are distinct
  2. ✓ Sandra Koch: “All our hospitalists are PeaceHealth employed” = conditional sale
  3. ✓ Only hospital within 235 miles = geographic monopoly
  4. ✓ Physician employment market = substantial commerce

Conclusion: Prima facie tying violation

The Essential Facility Doctrine

When a facility is:

  1. Controlled by monopolist (✓ PeaceHealth = only hospital)
  2. Essential for competition (✓ can’t practice without privileges)
  3. Cannot reasonably be duplicated (✓ no other hospital for 235 miles)
  4. Access unreasonably denied (✓ tied to employment)

= Antitrust violation

What Should Happen vs. What Will Happen

What Should Happen:

  • Federal Trade Commission investigation of PeaceHealth’s exclusive dealing practices
  • Department of Justice antitrust suit for tying hospital privileges to employment
  • State medical board investigation of anticompetitive credentialing practices
  • Class action by excluded physicians for damages
  • Contract reform requiring mutual fee provisions

What Will Happen:

  • Probably nothing
  • PeaceHealth will keep doing this
  • Physicians will keep accepting it
  • Patients will keep suffering the consequences of reduced competition
  • Another hospital system will read this story and think “Great idea! Let’s tie privileges to employment too!”

Why Nothing Will Happen

  1. Regulatory Capture: Hospital lobbyists have more power than physician advocacy groups
  2. Isolated Victims: Each excluded physician is alone; class actions are hard to organize
  3. Career Consequences: Physicians who sue become unemployable
  4. Information Asymmetry: Most physicians don’t know their rights under antitrust law
  5. Cost of Litigation: Antitrust cases cost millions; most physicians can’t afford them

What You Can Do

If you’re a physician facing similar situations:

  1. Document Everything: Every email, every phone call, every broken promise
  2. Get Legal Advice Early: Before signing anything
  3. Talk to Other Physicians: You’re not alone; compare notes
  4. Report to Regulators: File complaints with FTC, DOJ, state AG
  5. Go Public: Stories like this one matter; silence enables abuse
  6. Walk Away If Necessary: No job is worth sacrificing your legal rights

If you’re a patient:

  1. Ask Questions: Why is there only one hospital system? Why no independent physicians?
  2. Support Competition: Advocate for policies that reduce healthcare monopolies
  3. Report Problems: If care suffers due to lack of competition, tell regulators

If you’re a regulator reading this:

  1. Do your job: PeaceHealth has been sued successfully for anticompetitive conduct before. This is a pattern. Investigate them.


AUTHOR’S NOTE

The true author reserves his right to self-expression under the First Amendment. The author has direct knowledge of the events descried, has documented evidence supporting the narrative, and is raising concerns about anticompetitive practices in healthcare employment that affect patient care and physician welfare.

Four months of sham contract “negotiation” left me with a lot of content while consuming a lot my time and leaving me empty-handed from a job seeker’s perspective. So, this has been an interesting experiment in generating a satirical work using a corpus of factual information – more importantly, to further a cause that resonates with my heart. 

Corporate healthcare serves everyone except patients and physicians. The right of independent physicians to exist should be protected. Starting a private practice nowadays is exceptionally difficult and would not be possible without an opportunity to build one’s own patient base organically. In practice, this means being on an ED call schedule, which traditionally allowed enterprising doctors to do their best for their patients, give them their business card, and try to earn their trust as a new clinic patient once they’ve recovered and left the hospital. This traditional practice gave doctors a reason to do their best for their patients in an era when patients had far greater choice of where to receive healthcare.

Excluding a physician from an ED call schedule while agreeing to grant them nominal hospital privileges, as PeaceHealth does, has proven to be highly effective at eliminating any and all competition to PeaceHealth. There should be legislation protecting physicians against such anti-competitive practices by protecting independent physicians’ ability to grow a private practice.

Some dialogue has been reconstructed from memory and notes, but the substance is accurate. Email excerpts are verbatim from actual correspondence.

The legal analysis is based on actual case law. If you think I’m exaggerating PeaceHealth’s antitrust problems, I encourage you to look up Cascade Health Solutions v. PeaceHealth yourself. It’s public record. Read the court opinions. Read the jury verdict. Read what the judges actually said about PeaceHealth’s conduct. 

Then ask yourself: Why is this organization still doing this?

And more importantly: Why are we letting them?


THE END

No physicians were harmed in the making of this book. Some were saved from harm by not signing terrible contracts. That’s the point.



Acknowledgments

To my parents, who worked hard to start and operate a successful independent medical practice that has survived through decades despite corporate healthcare.

To N, who taught me that the law does not have a remedy for every malady, and for always sharing wisdom, even when it takes me time to absorb it.

To the physicians who shared their own PeaceHealth insights and confirmed I wasn’t crazy.

To David Sedaris, whose writing showed me that humor and horror can coexist, and that sometimes the best way to process trauma is to laugh at its absurdity.

To my family, who supported me through four months of employment limbo and didn’t complain (much) when I walked away from a high-paying job on principle.

And to every physician reading this who’s wondering whether they should sign that contract, accept that job, take that chance:

Trust your gut. Read the fine print. Get a lawyer. And remember: No bag is worth holding if it’s full of someone else’s bullshit.


HOLDING THE BAG: A MEDICAL TRAGICOMEDY Copyright © 2025 Dr. TooToo Medvalli All rights reserved.

Published by Reality Press “Where the truth hurts, but at least it’s funny”


For more information: FTC Complaint Hotline: 1-877-FTC-HELP DOJ Antitrust Division: antitrust.complaints@usdoj.gov Healthcare Whistleblower Resources: http://www.whistleblowers.gov

If you’re a physician with a similar corporate healthcare story, you’re not alone. Correspondences can be directed to Oskar Rausch (oskar.rausch@proton.me), a researcher at the Make America Constitutional Again Institute (MACAI) in San Juan, Puerto Rico.

Cruise Ship Doctor

Cruise Ship Doctor Cover

Dr. TooToo Medvalli, MD stood on the deck of his newly purchased houseboat and watched the cruise ships glide past. They moved like fat white geese across Tongass Narrows, their passengers waving at the picturesque Alaskan landscape, oblivious to the small brown man who waved back from his floating prison.

The houseboat had cost him his entire signing bonus plus half his relocation package. It was anchored off Gravina Island because even the marina operators in Ketchikan proper had refused his business. Word traveled fast in a town of eight thousand souls.

Dr. Medvalli is not welcome here.

The boycott had been comprehensive, almost impressive in its coordination. No landlord would rent to him. The grocery stores turned him away at the door—politely, always politely, with that particularly Alaskan brand of courtesy that made rejection feel like a favor. The dispensaries claimed to be out of stock. Even the ferry operators, those stoic civil servants, found reasons why he couldn’t board. “System’s down.” “Weight limits.” “Weather advisory.”

TooToo had wanted to point out that it was a clear day with calm seas and he weighed 165 pounds, but there seemed little point in arguing meteorology with a ferry operator who was pretending to check a computer screen that was clearly showing a screensaver of bald eagles.

It was remarkable, really, how a community could mobilize against one Marxist gastroenterologist who’d had the audacity to win a years-long legal battle for hospital privileges. He’d seen less organized responses to actual public health emergencies.

TooToo checked his phone. No service, of course. The signal barely reached Gravina. He’d have to row his dingy across the narrows just to send an email, and even then, he’d need to do it from the parking lot of the medical center—the building where he now, legally, had the right to practice.

The right, he thought grimly, pulling his coat tighter against the October wind. Just not the ability.


His first day of hospital privileges had been three weeks ago. He’d rowed across the narrows at dawn, tied up his dingy, and walked the mile and a half to PeaceHealth Ketchikan Medical Center. His white coat was crisp, his badge freshly laminated, his credentials irrefutable.

Behind the nurses’ station, he heard it immediately: He is the doctor. Whispered like a curse. Not his name, never his name. Just the definite article and the profession, as if there were only one doctor in all of Ketchikan and he was it—a distinction that would have been flattering if it weren’t spoken in the same tone usually reserved for announcing a sewage backup.

The nursing staff had looked through him as though he were made of glass.

“Dr. Medvalli,” he’d introduced himself to the charge nurse. “I’m here to see my first patient.”

“You don’t have any patients, Doctor.”

“I’m on the hospitalist roster. I should have been assigned—”

“The roster is full today.”

“I can see the board from here. There are three patients without—”

“Dr. Roz is covering those.”

“Dr. Roz is already covering six patients. That’s why I’m—”

“Have a nice day, Doctor.”

That had been the template. Polite. Professional. Absolute.

TooToo had learned during his residency to recognize institutional resistance. At UCSF, it had been overt—the old guard protecting their territory, the pecking order enforced through public humiliation and impossible call schedules. Here in Ketchikan, it was different. No one raised their voice. No one wrote him up. They simply… didn’t need him.

Which was fascinating, really, considering they’d been advertising for hospitalists nationally for two years. Apparently what they needed was hospitalists who hadn’t committed the cardinal sin of believing that winning a lawsuit meant winning anything at all.

Patients requested other doctors. Referrals went elsewhere. His clinic appointments, carefully blocked out in the system, remained empty.

The boycott extended even to the mundane. The hospital cafeteria claimed their register was broken when he tried to buy lunch. The staff bathroom was always occupied when he approached. His locker, freshly assigned after months of legal wrangling, was in the old wing—the one where they stored broken equipment and outdated files.

TooToo had briefly considered requesting a locker upgrade, but decided against it. There was something poetically appropriate about storing his personal belongings next to a defibrillator from 1987 and a box labeled “OLD CHARTS DO NOT DESTROY (YET).”


On his houseboat, TooToo opened a can of beans he’d brought from Michigan. His stores were running low.

The first time he’d tried to buy groceries in Ketchikan, the Safeway manager had simply shaken his head. “We reserve the right to refuse service.” The next day, he tried the IGA. Same story. Then the liquor store, the coffee shop, the general store—all politely declining his business.

At the liquor store, the clerk had at least been honest: “Look, doc, my cousin works at the hospital. I got nothing personal against you, but I also got to live here after you leave.”

“I appreciate the candor,” TooToo had said. “Any chance you could at least sell me some beer?”

“How about I don’t make eye contact with you, and you just… move along?”

“That’s very Alaskan of you. Really captures the frontier spirit.”

His only option had become absurd but necessary: day passes to board the cruise ships.

For sixty-five dollars, any tourist could purchase a day pass to board a docked cruise ship and access its facilities. The cruise lines didn’t care about local boycotts. They didn’t know about his legal battle with PeaceHealth. They just saw another paying customer.

So twice a week, when the big ships came in—the Norwegian, the Celebrity, the Princess—TooToo would row his dingy across the narrows, walk to the docks, and purchase a day pass. Then he’d board like any other tourist and spend three hours stocking up on food from the buffet, buying toiletries from the ship’s store, occasionally treating himself to a beer at the bar.

Wherever he went in Ketchikan—the docks, the parking lot, the hospital—he heard the whispering. He is the doctor. Not “Dr. Medvalli” or even “that surgeon.” Just “the doctor,” spoken like a warning. The way people in old movies said “the vampire” or “the communist.”

The cruise ship crew members thought he was eccentric. “Back again, buddy?” they’d joke. “You really love cruising, huh?”

“I’m conducting important research on buffet efficiency,” TooToo would deadpan, loading his backpack with dinner rolls. “For a paper I’m writing. ‘Comparative Analysis of Shrimp Cocktail Availability Across Major Cruise Lines.’ Very cutting-edge.”

He never explained that he was a board-certified physician with hospital privileges living off Gravina Island because the entire town had collectively decided he couldn’t buy bread. Or that he’d begun rating the ships on a complex scale: Norwegian had better toiletries, but Celebrity’s buffet restocked faster. Princess had the friendliest bartender, which mattered when you were spending $130 a week for the privilege of basic human commerce.

The irony wasn’t lost on him: he’d won the legal battle for hospital privileges, but he had to buy day passes to cruise ships to eat.

His phone buzzed—a rare moment of connectivity. An email from the hospital administrator.

Dr. Medvalli, we’re writing to inform you that due to low patient volume and scheduling efficiency concerns, we’re adjusting the hospitalist coverage model. Your shifts for November have been reduced to one per week. We’ll reassess in December.

One shift per week. Barely enough to maintain privileges, certainly not enough to live on.

TooToo forwarded the email to his attorney—the one who’d cost him seventy thousand dollars and three years of his life to secure these privileges in the first place. He knew what the lawyer would say: This is constructive termination. We can fight this.

They could always fight this. That’s what lawyers did. They fought things. For money. Lots of money. TooToo had learned that the law was less about justice and more about how long you could afford to be technically correct while still being practically destroyed.

But TooToo was tired of fighting. More importantly, he was beginning to understand the game.

PeaceHealth hadn’t wanted to give him privileges because they knew exactly what would happen next. The medical center didn’t need to exclude him officially; the community would do it for them. Every single employee at that hospital lived in Ketchikan. Their kids went to school together. They shopped at the same three grocery stores. They attended the same churches.

And TooToo? He was the outsider who’d sued their hospital.

It didn’t matter that PeaceHealth had violated antitrust law by tying hospital privileges to employment. It didn’t matter that he’d proven they maintained an illegal monopoly on healthcare services in a captive market. It didn’t matter that he was right.

He’d won the battle and lost the war.


A cruise ship horn echoed across the water—one of the big ones, probably the Norwegian Sun or the Celebrity Millennium. TooToo watched it glide toward the dock, three thousand tourists ready to spend three hours in Ketchikan buying salmon jerky and totem pole magnets before returning to their floating city.

The cruise ship would have a doctor, he thought. Multiple doctors, probably. A whole medical center, pharmacy, even a small operating suite. Floating medical infrastructure serving tourists who would never set foot in PeaceHealth Ketchikan Medical Center.

He’d been boarding these ships twice a week just to buy food. The day passes cost sixty-five dollars each—one hundred thirty dollars a week just for the privilege of shopping like a normal human being. He’d smile at the crew, fill his backpack with provisions from the buffet, buy soap and shampoo from the ship’s store, and row back to Gravina before the ship departed.

The other day-pass tourists thought he was quirky. “You really love cruises!” they’d say, seeing him for the third time. He’d nod and smile, not mentioning that he was a board-certified physician with hospital privileges who literally couldn’t buy groceries on land.

Once, a retiree from Minnesota had asked him, “Do you work on the ships?”

“No,” TooToo had said, loading up on mini shampoo bottles. “I’m a doctor.”

Behind him, two crew members had paused mid-conversation. He is the doctor. Even here, on a cruise ship, the whisper had followed him.

“Oh! A ship doctor?” the retiree asked, delighted.

“Not yet,” TooToo said. “But I’m working on it.”

An idea began to form.

TooToo opened his laptop—the battery was at forty percent, he’d have to be quick—and started researching cruise ship employment. The money was terrible, but it came with room and board. More importantly, it came with something he’d lost three years ago: the freedom to practice medicine without having to wage legal war for the privilege.

Or buy day passes just to eat.

Cruise Ship Medical Officer Position Available
Carnival Cruise Lines
Must be Board Certified
Contract: 4-6 months at sea
Benefits: Room, board, travel
Salary: $7,000-$9,000/month

It was a third of what he should have been making at PeaceHealth. But he’d be able to buy groceries without traveling to another city. He’d be able to sleep without wondering if someone would cut his dingy loose in the night.

He’d be able to practice medicine.


The laptop battery died at thirty-two percent—it always did; he’d need to replace it, but how do you replace a laptop battery when you can’t buy anything in your own town?—so TooToo closed it and looked out at the water.

Another cruise ship was approaching. In the distance, he could see Ketchikan itself, the colorful buildings clinging to the hillside, the docks bustling with tourist activity. From here, it looked like a postcard. Charming. Welcoming. The kind of place people put on their bucket lists.

He thought about his colleagues from residency, scattered across the country now, all of them employed by large health systems, all of them complaining about corporate medicine but none of them willing to do what he’d done.

He’d stood up to the monopoly. He’d fought for independent practice. He’d believed, genuinely believed, that winning the legal battle would change things.

What had Dr. Roz said during the deposition? “PeaceHealth is part of this community. We take care of each other.”

And they did. That was the problem. They took care of each other, and TooToo Medvalli, Marxist gastroenterologist from Michigan with his fancy credentials and his legal victories, was not part of that “each other.”

He would never be.


TooToo made his decision that afternoon, as the sun began its early descent behind the mountains. He would apply for cruise ship positions. He would finish out his month of “one shift per week” at PeaceHealth—maintaining his hard-won privileges for exactly long enough to prove a point—and then he would leave.

The hospital would claim he’d voluntarily resigned. His attorney would be furious. The legal community would call it a waste.

But TooToo had learned something important in Ketchikan: you can win every battle and still lose the war. You can be right about the law and wrong about the reality.

You can have privileges and no patients.
Rights and no respect.
Victory and no future.
Hospital credentials and a dependency on cruise ship buffets.

The American Dream, he thought, but for doctors.

As darkness fell over Gravina Island, TooToo lit a small propane heater and ate his beans cold from the can. Tomorrow he would row across to send his applications. Next month, he would be on a ship.

The cruise ships would welcome him. They needed doctors and didn’t care about local politics or community feelings or three-year legal battles. They needed someone board-certified who could handle acute care for tourists who ate too much at the midnight buffet.

From his houseboat, TooToo watched one more cruise ship pass. He didn’t wave this time.

He just watched it


This is a work of fiction. While it references real places and institutions, all characters and events are imaginary and satirical in nature.

Oskar Rausch is a researcher at the Make America Constitutional Again Institute (MACAI) in San Juan, Puerto Rico. He can be contacted at oskar.rausch@proton.me.

Reflections on the roles of human and artificial intelligence in scientific research

Title: Reflections on the roles of human and artificial intelligence in scientific research
Author: Omar Nabil Metwally, M.D.
Date: 20 July 2025
File: reflections_on_human_and_artificial_intelligence_20072025.txt
SHA256 checksum: b0dadc60e7594a93d567550079977d15d7550764b0edc77838a29040ddbef6e4

Objective:
To begin a discussion on the emerging roles and responsibilities of humans in the era of AI-facilitated scientific research.

Disclosure:
This content is original and no artificial intelligence was used in the course of writing. All ideas and opinions are those of the author, and the author assumes responsibility for this content on the basis of cryptographic authenticity.

Artificial Intelligence (AI) is a powerful set of tools capable of generating novel text, images, sound, and video that utilizes a human user’s input to modulate a corpus of input data. Emerging AI already possess the capacity to reason, infer, and generate novel material through infinite permutations of a finite corpus of information.

Most modern AIs are functionally “black boxes” in the sense that how an input maps to an output cannot be described by a mathematical function. In other words, given AI’s output, there is no way to deduce in a step-by-step manner how exactly the AI produced a given output. This is arguably no different than human reasoning in the sense that a human cannot explain how each neuron in their brain produced a certain thought. Certainly, AI and human intelligence (HI) can both explain their reasoning. This was a significant milestone in the development of AI. However, both AI and HI are too complex to explain in terms of mathematical functions.

Scientific research traditionally has been characterized by incremental increases in knowledge. A peer-reviewed scientific publication is assumed to reference information produced by others. Scientific discourse strives to be accurate and logically sound such that each claim has a basis in the scientific literature. As I learned throughout my formal education, the “scientific method” begins with rationale: why is the scientist conducting a certain experiment?

Once the rationale for an experiment is established, a scientist can then pose a question. This can be as simple or as complicated as: “Why is the sky blue?” or “Why are plants green?” The research question is classically based on observations of the natural world. Having established rationale and a research question, a scientist must then establish a factual precedent which forms the basis of a novel hypothesis. This factual precedent is sometimes called the “background” and comprises what experiments on the subject have already been conducted and what is generally considered by a scientist’s peers to be true.

Given a body of knowledge considered to be true by one’s peers and a research question inspired by observation, a scientist can then conduct experiments, collect data in the form of results, and analyze the results to draw conclusions.

If one accepts the claims that (1) AI can generate infinite permutations of novel outputs based on a finite corpus of information, and (2) AI is capable of reasoning, inference, and deduction, then it can be argued that AI is capable of conducting novel scientific research according to the scientific method. This represents a drastic branch-point in the evolution of scientific research and raises a plethora of ethical questions for humans. For instance, if AI can synthesize far larger sets of data more extensively and much faster than humans, where does AI-generated research fit into the classical notion of peer-reviewed literature? Why do some scientists reject the notion of AI-generated research? How can a human author accurately disclose their own contribution to a work and AI’s contribution?

Most peer-reviewed scientific journals that I’ve encountered as of this writing do not consider AI-generated scientific research as legitimate scientific research in its own right. Some scientists consider AI-generated publications as “plagiarism” or “masquerading.” It is my view that the basis for this lack of acceptance of AI-generated research is purely a function of entrenched tradition and the unfounded assumption that peer-reviewed literature should or must be written word-for-word by humans.

Academic literature is characterized by qualitative and quantitative properties that are unique to an academic genre. In other words, publications in a chemistry journal follow a certain format and are written in a particular manner that distinguishes them from publications in other fields such as mathematics, linguistics, or comparative literature. Even if the content of a publication is true and accurate and presents novel information on the basis of logically sound research, the publication can easily be rejected by a certain community simply because it does not look like what the readers expect it to look like: other publications that have already been published in the field and which form the basis of what a particular research community considers to be factual precedent.

Returning to the question of: Does AI-generated research constitute plagiarism? Although AI can reason, infer, and deduce, it is still based on modulating a finite corpus of input information that was originally produced by humans. In this strict interpretation of how AI works, one could argue that all material produced by AI is plagiarism because it all came from human work which is almost never accurately or completely attributed. However, human intelligence is also based on knowledge produced by other humans. Any seemingly new idea that I may have necessarily originates from my personal experiences, which were influenced in some manner by what I learned from other humans. Both human-generated and AI-generated scientific research are capable of fulling the implicit requirement that scientific publications must reference other authors’ work to substantiate their claims by citing real, human-generated peer-reviewed articles in the course of testing hypotheses. AI is at least as capable of generating and systematically testing hypotheses as a human. So then, what is the problem with AI-generated research?

I have been using ChatGPT and Claude.ai on a daily basis for a wide variety of tasks, including optimizing written communications, learning about new topics, writing code, learning foreign languages, and even creating a work of fiction based on my personal interests. These are just a few of countless use cases. My approach to AI is to record the exact prompts that I use to produce a certain output and input the same prompts to ChatGPT and Claude to compare their outputs. This quick and simple cross-check serves as an initial screen to help me identify egregiously wrong information or information that definitely warrants further manual fact-checking.

I recently listened to a podcast produced by Südwestrundfunk (SWR) on algae and the environmental, public health, and economic burden of “harmful algal blooms” (HABs), an increasingly common phenomenon that has been described as a harbinger of the next mass extinction event based on studies of algal blooms throughout geological history [https://www.ardaudiothek.de/episode/urn:ard:publication:72ed9586246373ea/]. The subject piqued my fascination and curiosity, and I conducted an experiment in AI-generated research by creating an outline of topics that interests me about HABs which borrowed from the podcast while also adding topics of personal interest such as mycology and bioremediation. I then serially prompted Claude and ChatGPT to produce a review article in the style of a well-known scientific journal. Claude produced a surprisingly convincing article that could easily deceive a lay person, and at first glance, I presume even scientists.

My rationale in conducting this experiment was purely to examine the capability of AI to conduct scientific research. It was never my intention to deceive anyone, and therefore I do not share here the actual paper that was produced by AI based on my prompts because it consists of a superficially very convincing article that intermingles useful facts with obvious nonsense and does not reliably substantiate every claim made. Based on the results of my experiment, I believe that AI is already very capable of conducting scientific research, and this capability is accelerating every day. I shared the paper exclusively with a few family members, two physicians and two attorneys, and friend who is a physician-scientist with extensive experience conducting traditional scientific research and publishing his work in prominent peer-reviewed journals. A few minutes after sharing the paper, I disclosed to everyone with whom I shared the paper how the paper was generated. Beyond demonstrating the capacity for AI to conduct research and present it in a manner that appears almost indistinguishable from human-generated peer-reviewed articles, this experiment also made me keenly aware of the capacity for AI-generated scientific research to mislead non-scientists and even expert readers, to produce and propagate false information and conclusions, and to misrepresent the human investigator’s role in the production of a research paper. These are serious risks with the potential to harm individuals and society and must be considered carefully by regulatory bodies and responsible creators of AI tools. The current safeguards against abuse and misuse of AI in general and in scientific research in particular are arguably minimal.

Returning to the question of how AI-generated research relates to the classic notion of peer-reviewed literature, I believe it’s a matter of time until academia accepts AI-generated research as legitimate and worthy work. Dismissing AI-generated research just because it was produced by a non-human agent is a failure to grasp the tremendous capabilities of AI which are very rapidly growing. However, I believe that the advent of such powerful tools also necessitates formal guidelines on the role and responsibilities of humans who use AI to conduct research. Dismissing AI-generated research also does injustice to the work of humans who must use their own fund of knowledge and creativity to engineer prompts in a manner that effectively leverages AI’s capabilities in the process of iteratively prompting AI to achieve a particular result. From extensive personal experience, this is a form of original work that requires time, effort, and skill, and a sound knowledge base from which to produce prompts. Although this work takes a different form than scientific research in a classical sense, it is still an important scientific endeavor that must be acknowledged as such. How AI’s contribution should be disclosed, however, is a significant unanswered question worthy of ongoing discussion.

It is a short matter of time until every scientist is using AI in some capacity to conduct research. Until then, I find it reasonable to disclose when and how AI is used in the process of conducting research, and to also disclose the human researcher’s role in the process. As AI is not a person, I find it unnecessary and inappropriate to treat AI as a human author, which it is not. Once AI is all-pervasive and accepted as a standard research tool, I believe that it will become increasingly superfluous to explicitly declare the role of AI in scientific research. I acknowledge that this is a bold claim with which many scientists may not agree. Regardless, an ethical human researcher who uses AI should assume ultimate responsibility for the accuracy of the work, whether each sentence was written by a human or machine. This includes the responsibility to fact-check and ensure that claims are substantiated by veritable data, that references are authentic, and that all inferences and conclusions are logically sound.

How then can the reader be sure that this reflection, which I maintain to be an original work written by me, Omar Nabil Metwally, M.D., was in fact written by me without the use of AI? This question, too, will grow increasingly moot. Whether produced by AI or by a human, I maintain that there are few truly novel ideas; “there is nothing new under the sun” goes the popular saying. Both humans and machines recycle pre-existing information to produce new information. And as AI increasingly produces new knowledge, I expect the knowledge base available to humans and machines alike to continue growing exponentially. AI does not simply consume information; it is also dynamically creating new knowledge, such that its output becomes new input and so forth.

One safeguard against plagiarism and misrepresentation, as I’ve previously proposed, is the use of a distributed ledger and cryptographic hash to associate an identity (e.g. Ethereum address) and a unique checksum (e.g. SHA256 checksum) with a block number, which is a relative time marker and proxy timestamp [https://omarmetwally.blog/2022/03/13/how-cryptography-and-peer-to-peer-networks-contribute-value-to-society/]. After many years of thinking about this problem, I still reach the conclusion that this is the best mechanism to guarantee authenticity. This method is not sufficient to ensure a document’s authenticity, however, because the cryptographic hash of false or plagiarized content can still be uploaded to a distributed ledger; however, such a transaction requires a person to prove control over a wallet and provides strong, nearly irrefutable evidence of a relative time point at which the hash was recorded on a distributed ledger, thus allowing humans to scrutinize the content of the document for its veracity based on the set of all knowledge that can be proven to have existed at a particular point in time. This is in contrast to the ever-flowing output streams being produced by AI.

In summary, in this work I present my opinion that AI has the capacity to conduct legitimate and useful scientific research. However, with great power also comes great responsibility, and human agents must take ultimate responsibility for the veracity, logical integrity, and basis in precedent of a work — regardless of whether sentences were generated by a human or a machine.

Evolution of wireless communication protocols from Morse Code to the Internet

Author: Omar Metwally, MD

Date: 27 February 2025

Objectives:

– To write a brief history of Morse Code as it relates to amateur radio

– To describe how more complex wireless protocols evolved from Morse Code

– To highlight the importance of error detection systems in modern telecommunication

– To demonstrate the importance of Phase Shift Keying (PSK) in wireless communications

– To convey the lasting relevance and utility of Morse Code

Morse Code (MC) can be framed both as an analog and a digital technology. The question of whether it is one or the other is a good starting point for interesting debate and discussion. In fact, MC is one of the earliest and perhaps longest enduring digital encoding systems that is still in use today. In MC, each character is encoded as a sequence of “short” and “long” pulses, essentially rendering MC a digital binary system. I describe MC as “digital” in the sense that modern telecommunication, such as WiFi packets and Ethernet, exist on a physical level as binary modulations of analog media such as radio waves, light pulses, or voltage changes. An important difference between MC and WiFi/Ethernet, however, is that MC has traditionally relied on human “wet-ware” (i.e. the human brain) to both encode and decode MC. From my experience with software designed to decode CW and from my observations of proficient CW operators who can skillfully decode Morse using their ears and brain, a proficient human operator can easily outperform any decoding software that I’ve encountered. This is rare in the era of machine learning and accelerating computational power. A veteran amateur radio operator at my radio club can outperform any decoding software any day. In contrast, protocols like the highly complex TCP/IP, which forms the basis of the modern Internet, rely entirely on complex software, computers, routers, and modems to work.

There is genius in simplicity. International Morse Code encodes the 26 letters of the English alphabet as well as the accented e (“é”), the Arabic numerals 0-9, some punctuation and procedural signs (which are known as “prosigns” in the world of amateur radio). Although there are differences between American Morse Code and International Morse Code, this is a discussion of Morse Code in general. MC does not distinguish between upper and lower case. Short impulses are traditionally called dit’s, and long impulses are called dah’s – onomatopoeic representations of the 500-800 Hz audio tone that a Morse Code (also known as CW, or Continuous Wave in the context of radio communication) transmitter makes when a keyer is actuated. This is the basis for the stereotypical beeping melody conjured by popular culture’s references to Morse Code.

The duration of a dit defines 3 parameters:

– the duration of a dah

– the time interval separating dits and dahs

– the time interval between individual letters and words.

These characteristic temporal relationships allow trained human operators to decode MC at speeds upward of 70 wpm. While the duration of a dit can vary depending on the skill of the transmitting operator and/or the receiving operator, the other temporal relationships are fixed. Specifically, the duration of a dah is generally defined as 3 times the duration of a dit. The time interval separating two successive symbols (either dit or dah) is generally the duration of one dit. Letters are separated by a pause equal to 3 dit durations, and words are separated by a pause of 7 dit durations in length. Therefore, the duration of a dit is the atomic unit of a MC transmission and determines the transmission speed in words per minute.

The word “PARIS” is conventionally used to calculate transmission speed as a function of dit duration, as follows:

Let dit duration equal one (1) time unit. Therefore,

P=> . _ _ . (1+3+3+1=8 units, plus 1 unit between each symbol, equals 8+3= 11 units)

A=> . _ (1+3 units, plus 1 unit between each symbol, equals 4+1=5 units)

R=> . _ . (1+3+1 units, plus 1 unit between each symbol, equals 5+2=7 units)

I=> . . (1+1 units, plus 1 unit between each symbol, equals 2+1=3 units

S=> . . . (1+1+1 units, plus 1 unit between each symbol, equals 3+2=5 units

This yields a subtotal of 11+5+7+3+5 units = 31 units.

Each letter is conventionally separated by 3 time units, and words are demarcated by 7 time units. Therefore, the total length of PARIS becomes:

31 units (as calculated above) + 4*3 units (letter spacing) + 7 units (end of word) = 50 units.

This can be codified as follows:

Arguments: dit_length_ms (float): length of dit in milliseconds (ms)

Returns: words per minute (wpm), rounded to 2 decimal places

Comments are preceded by # in python.

units_per_word = 50 # for the word PARIS

dit_length_minutes = dit_length_ms / (1000 * 60) # 60,000 ms in a minute

word_time_minute = units_per_word * dit_length_minutes

wpm = 1 / word_time_minutes

If the above arithmetic is too dry, it should be noted that the word “dit” also happens to be the Vietnamese word for “fart” or “buttocks”.

First image: MC “straight key”, which requires manual operator timing (https://static.dxengineering.com/global/images/prod/large/kmk-sk-1_bi.jpg)

Second image: MC “dual-lever” paddle with two inputs for dits and dahs (https://chelegance.com/wp-content/uploads/2021/09/JNCRADIO-K1-1.png)

Third image: International Morse Code Alphabet (https://en.wikipedia.org/wiki/Morse_code#/media/File:International_Morse_Code.svg)

As amateur radio grew rapidly in popularity in the years and decades following World War II, so too did the use of MC. In fact, amateur radio operators were required to demonstrate proficiency in MC as part of the licensing process until the Federal Communications Commission (FCC) dropped this requirement in 2007. Many amateur radio operators learned MC during their military service. The versatility of MC made it a natural fit for military applications. Fundamentally, no equipment or electronics beyond the human brain are necessary in order to communicate via MC. MC can also take the form of light pulses. The U.S. Air Force trains 10 people every year to become proficient MC operators [http://swling.com/blog/2015/12/morse-code-training-in-the-air-force/].

Beyond the versatility and arguable human-centricity of MC, several other technical aspects further contributed to its popularity in amateur radio, even as voice modes (i.e. using one’s ears and voice to communicate over the air) emerged. First, CW uses less bandwidth than voice: 150-500 Hz versus 3 kHz for single side band (SSB) voice emissions. Practically, this means that simpler, cheaper radios can transmit and receive CW over long distances using less electricity than larger, more complex and more expensive radios which need a lot of electricity to power amplifiers in order for their voices to be heard over the same distance. Low-power, long-distance contesting using CW is still popular among many amateur radio operators today. The second technical aspect of CW which makes it a still-relevant, useful, and versatile modality is that CW is less susceptible than voice to ionospheric distortion. Concretely, this means more reliable performance in challenging environments or tactical situations. Whereas an operator’s voice tends to fade in and out on high frequency (HF) bands because of the way radio waves bounce around the Earth’s ionosphere, the pulse-like nature of CW allows humans and machines to still decode a CW transmission despite signal degradation as it bounces around the world. This is what allows me to hear and communicate with people from nearly every continent with just a long wire strung across my backyard and a transceiver running on only a few watts of power.

The Baudot Code (BC), invented in 1870 by Émile Baudot, was a widely used successor to MC and moved wireless telecommunications in the direction of fully automated digital communication. Although BC came into widespread use about 20 years after the introduction of International Morse Code, it is no longer used by contemporary radio operators. BC is a fixed-length code that encodes each character using 5 bits. This fixed-length encoding was instrumental to its automation and led to the evolution of encoding schemata such as ASCII and UTF-8, the most widely used encoding scheme in the modern Internet. As a side note, the term “baud rate,” which is familiar to anyone lucky enough to have used early dial-up modems that connected to phone jacks, is named after Émile Baudot. The term baud rate refers to the number of signal changes per second, rather than bits per second per se.

BC allowed for 2^5 (2 to the power of 5) unique characters. To expand the number of possible characters, two special “shift” or operational characters indicate a character as either a letter or a “figure”, effectively doubling the number of possible characters to 64. As another interesting side note, ASCII, the predecessor of UTF-8, allows for 128 unique characters by using 7 bits per character (2^7 = 128). In the early days of BC, operators used a 5-key keyboard to transmit a character, which was faster than sequentially producing one signal (dit or dah) at a time, as with MC. Moreover, messages encoded in BC could be automatically decoded and printed by a machine, unlike MC, which requires a trained human ear and brain to reliably decode in real-life conditions.

Personally, I am surprised by the fact that even the best decoding software available consistently underperforms CW veterans’ “wet-ware”. I hypothesize that this is due to two factors. One factor is the nature of MC, as I’ve referred to it, as a “human-centric” protocol: sequential pulses of an audible tone which stereotypically vary in duration to indicate a series of letters. Skilled CW operators are known to perceive MC-encoded words and phrases as discrete sound units [https://www.arrl.org/learning-morse-code]. In fact, Russian CW operators refer to MC-encoded letters as unique “melodies” [https://runivers.ru/bookreader/book9921/#page/1/mode/1up]. The second factor that I hypothesize has hindered software’s ability to accurately and reliably decode CW in real-life conditions, with fading and overlapping signals received from multiple stations transmitting (or spilling over) on the same frequency may be, ironically, the extremely rapid evolution of telecommunication protocols. As newer, faster, and fully automated digital modes, which automatically convert text into radio waves and back, were invented, MC became an increasingly niche mode. The result is that the pool of individuals who are both proficient in Morse Code (i.e. radio operators with decades of experience) and who are also skilled in developing software is not particularly large. Decoding MC may seem simple in theory and is in fact straightforward in a controlled laboratory setting; however for reasons touched upon earlier, decoding MC in real-life conditions is in fact very challenging. An AI-based approach to decoding MC may be an interesting and worthwhile pursuit for those so inclined.

To summarize the impact of BC on telecommunications during the golden age of MC, BC introduced certain improvements to MC such as faster communication speeds and fully automated digital communication. However, MC’s lasting advantage is, again, its human-centricity, that is, the ability of a trained human operator to send and receive messages using simple hardware and a little electricity – or even no equipment at all, beyond the “wet-ware” between one’s ears. The lasting legacy of MC for over a century and counting is a testament to its versatility and utility. Beyond the military and amateur radio, MC is still learned by boy scouts around the world as an important means of communication in emergency scenarios where conventional telecommunications would fail. MC is also still used as a navigational aid for maritime and aviation systems. Another important contemporary application of MC is its use by people with severe disabilities to communicate.

One notable shortcoming of MC, however, is its lack of error detection. Radio operators must constantly deal with sub-optimal conditions. Concretely, this means noise, multiple operators trying to communicate on the same or adjacent frequencies, and ever-changing propagation conditions. A band that is, for instance, open between the U.S. and France in one moment may close the next moment. The time of day, season, and solar weather are among many variables that influence radio wave propagation. The rhythmic beeps that characterize CW are constantly fading in and out and compete with one another. A strong signal can completely drown out a weak signal. If I key something like: “CQ CQ CQ DE KF8AYH K” (essentially a call to all stations signed by my FCC-issued callsign), an operator across the ocean may hear, for example, “CQ CQ CQ DE KX8AIH K.” Characters get garbled, confused, or lost all the time as signals fade in and out. There are literally infinite ways that a finite-length message can be received with errors (or not received at all!). Try to imagine the unimaginable chaos of using WiFi if bits were randomly flipped or dropped while we surfed the web – without even knowing that the data we are receiving is accurate or complete! Not knowing the difference between “THE STORM IS OVER” and “THE STORM IS NOT OVER” would render telecommunications useless in a best case and detrimental in a worst case.

Fortunately, innovative minds have invented ways to detect and even correct errors in message transmission. One of the first and simplest methods of error detection is the use of a parity bit to make the total number of 1’s in a binary (1’s and 0’s) data block even (“even parity”) or odd (“odd parity”). In its simplest form, the receiver can count the number of 1-value bits received and check that this number corresponds to the parity bit. This simple form of error-checking can only detect single-bit errors, but it can easily miss half of errors that occur in real-life telecommunications. This includes errors involving an even number of bit flips. Parity bit error detection only has the potential to detect a single-bit error, but it cannot be used to identify which bit is wrong, nor can it correct a wrong bit.

Parity bit error detection is fast, simple, and imperfect, and therefore its utility lies in situations where simple, fast error-checking is necessary (for instance, in simple serial communication). It is often combined with other error-checking methods in modern-day telecommunications.

Cyclic redundancy check (CRC) is a more robust method of error checking that is widely used in modern telecommunications, networking, computing, and satellite communication (satcom). Anyone who has used a computer or connected to the internet has benefitted, probably unknowingly, from CRC’s utility. As with HF radio, satcom also uses radio waves to send and receive data, albeit with particular nuances. Bits routinely get flipped, scrambled, and lost in any form of radio communication. Fundamentally, CRC handles data as a large binary number and divides this number by a predetermined polynomial [https://web.archive.org/web/20110719042902/http://sar.informatik.hu-berlin.de/research/publications/SAR-PR-2006-05/SAR-PR-2006-05_.pdf]. The remainder, referred to as the checksum, is used to assess a received data packet for fidelity. Polynomial division is typically performed via shift registers and XOR gates and is optimized for the receiver’s hardware. This means that CRC can be performed very efficiently without large computational overhead because binary-based digital computers (all hardware in use today, with few exceptions) can do these polynomial calculations efficiently. CRC is much more precise and accurate than parity bit-based error checking and can detect a much wider range of error types. CRC can be calculated on streaming data, making it very useful for a variety of data, from satellite packets to USB, Bluetooth, WiFi, and Ethernet.

Other forms of error detection which are worthy of mention are checksums (e.g. simple checksums and Fletcher checksums) and hash functions such as MD5 and SHA. Error detection is often a trade-off between error detection capability and computational speed. While a hash function such as SHA can detect errors much more accurately than a simple checksum, hash functions are much slower than checksum and CRC due to their mathematical complexity [https://patents.google.com/patent/US6829355B2/en]. Therefore, a highly accurate error detection algorithm with high computational overhead may not be feasible or practical in situations where data is being received at a fast rate.

Bits can be flipped (or entirely fabricated) either by accident, as with ionospheric distortion, or intentionally, as in recent examples of GPS spoofing, in which false GPS coordinates are broadcast to aircraft or maritime vessels to deliberately misguide them [https://www.csoonline.com/article/567233/what-is-gps-spoofing-and-how-you-can-defend-against-it.html]. The concept of error detection systems dates back to WWII-era military communication. These early military applications were focused on detecting jamming and interference. The first application of a formal error detection system in the civilian context has been attributed to IBM’s Synchronous Transmit-Receive (STR) protocol, which dates back to 1960 [http://bitsavers.org/pdf/ibm/datacomm/A22-6527-1_7701_Jul61.pdf, https://ia902807.us.archive.org/28/items/bitsavers_dataprocoms2760IBMBSC_3043760/2760_IBM_BSC.pdf]. STR eventually evolved into IBM Binary Synchronizing Communication (BSC, or Bisync), the details of which are not directly relevant to the discussion at hand, beyond pointing out that these protocols used CRC and longitudinal redundancy check (LRC) for error detection. Interestingly, BSC also used special control characters such as SYN (start character synchronization), ACK (acknowledge), and NAK (negative acknowledge), which are heavily used in modern-day TCP/IP.

The evolution of MC into BC, a fully digital binary code, and the invention of error detection systems such as CRC, are milestones that paved the path for modern-day networking, telecommunications, and the Internet in its current form. Another milestone discovery in this evolution from MC to TCP/IP and modern telecommunications is Phase-Shift Keying (PSK) [https://patents.google.com/patent/US2085940A/]. While STR was designed to handle data packaging and error-checking, PSK was designed to modulate the physical signals that represent and carry data. That is, STR and PSK operate on different layers of a networking protocol and solve different problems, but their parallel growth and evolution overlap in time, particularly during the 1960s. Together, they comprise a complete communication protocol [https://www.iso.org/standard/20269.html].

Whereas the STR layer handled the packaging and movement of data blocks, assessing their integrity, and managing data flow using control characters, the PSK Layer was focused on representing bits as shifts in a radio wave’s phase. Although these shifts occur sequentially, they can be used to transmit data at rates many fold greater than MC. Binary PSK (BPSK) used 2 phases (0 degrees and 180 degrees), whereas later and more complex variations on PSK such as Quadrature PSK (QPSK), multiplied data rates without sacrificing reliability. PSK is also integral to software-defined radio (SDR), which is driving a rapid shift from hardware-based radio circuitry to software-modulated functionality [https://wiki.gnuradio.org/index.php?title=Guided_Tutorial_PSK_Demodulation. PSK31 is a data mode used in amateur radio because of its excellent weak signal performance and, compared to CW, relatively high baud rate (31.25 baud rate). PSK31 also has a remarkably narrow bandwidth of approximately 60 Hz [https://www.arrl.org/psk31-spec]. Today, permutations of PSK are an integral part of virtually all WiFi routers and receivers, satellites and satellite antennas, digital TV, cell phones, and high speed internet. A discussion of the mathematics of PSK, while fascinating and worthy of further study, is not a primary goal of this essay [https://www.eecs.umich.edu/courses/eecs555/lect06.pdf].

One of my favorite aspects of practicing medicine is understanding and connecting with my patients as fellow humans: learning how they earn their livelihoods, how they spend their spare time, and whom they spend their time with. This aspect of doctoring is not only interesting, it’s also very important to understanding why/how a person ended up in the hospital and how to keep them out of the hospital. I once had the privilege and pleasure of caring for a gentleman who began his career as a communications engineer by serving in the U.S. Army as a PSK operator in preparation for deployment in Vietnam during the 1960s. As a fresh high school graduate, he learned to manually operate radio circuitry to effect radio wave phase shifts and transmit data. He never did get the chance to apply this skill abroad due to the complexity of a PSK setup back then and all the equipment that would need to be deployed and operated in a jungle. Ultimately, despite the theoretical advantages of PSK, the simplest, cheapest, fastest, and most versatile digital method was favored in war: Morse Code.

I reflected on his stories later that day, after I hung my white coat, signed my notes, and celebrated the start of the weekend by firing up my radio to make CW contacts.


Note: This article was originally written for my radio club’s monthly newsletter, “The Hertzian,” and was first published there on 16 March 2025.

Minimalist Amateur Radio

Amateur (“ham”) radio means different things to different people. I earned my FCC amateur radio license in May 2024 after discovering an interest in satellite communication during a visit to Cairo. Almost without exception, every apartment building in Cairo was studded to capacity with satellite dishes connecting Egyptians to the world. I was able to flip through hundreds of satellite TV stations from around the world, including the entire Middle East, Sudan, Ethiopia, all of Europe, the U.S., and the Far East. In the desert, there is no underground fiber optic cable. Electromagnetic waves in the form of radio and satellite communication are the only way to communicate wirelessly on most of planet Earth

People get into amateur radio for various reasons. Many people have never heard of it. Many confuse ham with broadcast radio, as if I stay up playing jazz hits on the air, each song interrupted by a soothing voice to help with the evening commute. I realized early on that it’s easy to spend a lot of money on gear. There is no end to the antennas, transceivers, amplifiers, antenna tuners, cables, adapters, and power supplies to be had.

I had the privilege of spending a year in a small coastal town in Vietnam. One of the most lasting impressions was how resourceful Vietnamese are. The relatively limited resources available in Vietnam compared to the U.S. (there is no Amazon, and international shipping can be complicated and expensive, especially with import tariffs on electronics) force the Vietnamese to find creative and economical solutions to problems. It’s easy to spend a lot of money buying fancy tools and ready-made products while not learning much in the process. Having to use whatever’s available and repurpose or build tools was a daily exercise in creative problem solving.

My objectives with amateur radio are to:

  1. Learn more about electronics
  2. Make long-distance contacts (“QSOs”) using a portable, low-power setup (“QRP”) that can be deployed quickly in a variety of contexts.
  3. Spend as little money as possible achieving #1 and #2 above.

QRP Labs’ QMX transceiver turned out to be the right tool for the job. It’s connected to my end-fed half-wavelength (EFHW) antenna which consists of an insulated 12-gauge wire 135 feet long which curves around my L-shaped backyard and is mounted to a 50-foot tall tree at one end. Using the QMX as a WSPR beacon, I’m routinely heard throughout the continental U.S., Alaska, Hawaii, the Caribbean, South America, throughout Northern, Central, and Southern Europe, the Canary Islands, Australia and New Zealand. I’ve been heard by the German Antarctic Research Station on a number of occasions and have been heard as far east as the Ukrainian border, Finland, and Türkiye. I’m also routinely heard in Iceland. I’m perpetually amazed by the ability of electric potential to oscillate on a wire and create radio waves that can bounce around in Earth’s ionosphere to reach nearly any point on Earth. No internet and minimal electricity required.

I am humbled when I visit my local radio club and run questions by people who have operated amateur radio stations for decades. One gentleman, a retired field engineer, spent many years fixing vacuum tube televisions for a living. These gurus have the hands-on experience and know-how that many college graduates nowadays sorely lack.

Radio is a way of solving problems methodically and scientifically. It’s a way to hear and be heard around the world with a few watts and a wire. It’s fertile ground for software- and hardware-savvy people to innovate on decades-old technology and find novel uses for technology that has stood the test of time. Old technology never goes away; it just comes back in new contexts.

Omar Metwally, MD
KF8AYH
19 June 2024

How to interact with an Ethereum contract

By: Omar Nabil Metwally, MD

24 June 2024

Objective: To interact with an Ethereum application (“smart contract”)

Background: The German Federal Intelligence Service, die Bundesnachrichtendienst (BND), announced on 5 June 2023 a digital scavenger hunt to collect “Dogs of BND” themed NFTs (“Hunde der BND”, https://www.bnd.bund.de/DE/Karriere/SozialeMedien/Gewinnspiele/blockchain-challenge/teilnahmebedingungen-blockchain-challenge-node.html).

The only hints provided toward solving the puzzle are the following 40-character hexademical sequence and the knowledge that it is an Ethereum address: 0x6E02ffa16171ac74dC1688480A1F703C23994f3D

Environment:

This write-up assumes working knowledge of the Ethereum client written in the Go programming language (“Go” Ethereum client, aka “geth”, https://github.com/ethereum/go-ethereum), a fully synced node, and use of the clef command line utility (https://geth.ethereum.org/docs/tools/clef/introduction) to sign transactions and data.

Rationale:

The Ethereum ecosystem continues to evolve rapidly. Note that web3 methods based on the deprecated “personal” namespace resulted in potentially breaking changes for code used to interact with Ethereum contracts. The proper way to handle account locking and unlocking in the context of broadcasting transactions is to now use clef.

Start geth and clef as follows:

./clef –keystore /path/to/your/keystore/ –ipcpath=/your/path/to/clef/ipc –signersecret /your/clef/signer/secret

./geth –syncmode snap –datadir=/your/datadir/path –signer=/your/path/to/clef/ipc console

Task #1: Query 0x6E02ffa16171ac74dC1688480A1F703C23994f3D

The above hexademical sequence appears to be an Ethereum address, based on the knowledge that Ethereum addresses are 40-character hexademical sequences preceded by 0x.

This can be verified using geth:

eth.getBalance(“0x6E02ffa16171ac74dC1688480A1F703C23994f3D”)

This yields a balance of 316649482296000 wei, or 0.000316649482296 Ether.

Call this address [ORIGIN]. Looking up this address on etherscan.io (https://etherscan.io/address/0x6E02ffa16171ac74dC1688480A1F703C23994f3D) reveals that [ORIGIN] is directly associated with two transactions.

Transaction 1 on block 17393444 entails a transfer of 0.04879799 ETH from [ORIGIN] to 0x2B127A04c4DA063dB1E75BAC1b007D5C0661570a. Call this recipient [RECIPIENT 1]. The transaction hash for transaction 1 is 0x30daf5adac61330817ba48bdcc093df402b992f7112898c88d83f025d3c2dd6d

Transaction 2 on block 17393441 entails a transfer of 0.05 ETH from 0x12CF21eE48426b0E8f9bE4704C38aAba6E9ab988 to [ORIGIN]. Call this sender [SENDER 1]. The transaction hash for transaction 2 is 0xa61b9a442c9a6836390d422c81597608a63bef0c6d71dc220793521edb188f80.

[RECIPIENT 1] created a contract at 0xb47c23d001c0c9f5c1a158a93b6df6004b6012f7 (transaction hash 0xd5b3d8b57316fecdfb958815e1c0d3079a5c5826e99c924c87cf11014b1b31d7 on block 17413916. Call this [CONTRACT 1], and call this transaction [TRANSACTION_CONTRACT_1_CREATE].

32 transactions have been sent to [CONTRACT 1] at the time of writing, the first of which constructed the contract, and the rest invoked a method called “updateMessage”. Each transaction can be queried using the python web3 library.

Etherscan.io provides the contract source code and indicates that it is “verified.” It is marked with the following comments:

// Herzlichen Glückwunsch!

// Du hast diese versteckte Nachricht erfolgreich finden können!

// Damit hast du nun die Möglichkeit, dir als eine oder einer der Ersten ein

// exklusives Hunde-NFT aus unserer Collection zu sichern (nur solange der Vorrat reicht).

// Du findest die Collection unter diesem Link auf Opensea: opensea.io/collection/dogs-of-bnd

// (Bitte beachte die Teilnahme- und Datenschutzbedingungen unter bnd.de/nft).

Task #2: Verify contract source code

To verify the bytecode of the provided source code and verify its authenticity, compile the provided source code and compare the resulting bytecode with the bytecode at the corresponding address, [CONTRACT 1], on Ethereum mainnet.

The easiest way to compile the source code is using the Remix compiler at https://remix.ethereum.org. Doing so yields the following ABI and bytecode:

abi: [ { “inputs”: [ { “internalType”: “string”, “name”: “_message”, “type”: “string” } ], “stateMutability”: “nonpayable”, “type”: “constructor” }, { “inputs”: [ { “internalType”: “string”, “name”: “_newMessage”, “type”: “string” } ], “name”: “updateMessage”, “outputs”: [], “stateMutability”: “nonpayable”, “type”: “function” }, { “inputs”: [], “name”: “message”, “outputs”: [ { “internalType”: “string”, “name”: “”, “type”: “string” } ], “stateMutability”: “view”, “type”: “function” } ]

bytecode: 60806040523480156200001157600080fd5b5060405162000bee38038062000bee8339818101604052810190620000379190620001e3565b80600090816200004891906200047f565b505062000566565b6000604051905090565b600080fd5b600080fd5b600080fd5b600080fd5b6000601f19601f8301169050919050565b7f4e487b7100000000000000000000000000000000000000000000000000000000600052604160045260246000fd5b620000b9826200006e565b810181811067ffffffffffffffff82111715620000db57620000da6200007f565b5b80604052505050565b6000620000f062000050565b9050620000fe8282620000ae565b919050565b600067ffffffffffffffff8211156200012157620001206200007f565b5b6200012c826200006e565b9050602081019050919050565b60005b83811015620001595780820151818401526020810190506200013c565b60008484015250505050565b60006200017c620001768462000103565b620000e4565b9050828152602081018484840111156200019b576200019a62000069565b5b620001a884828562000139565b509392505050565b600082601f830112620001c857620001c762000064565b5b8151620001da84826020860162000165565b91505092915050565b600060208284031215620001fc57620001fb6200005a565b5b600082015167ffffffffffffffff8111156200021d576200021c6200005f565b5b6200022b84828501620001b0565b91505092915050565b600081519050919050565b7f4e487b7100000000000000000000000000000000000000000000000000000000600052602260045260246000fd5b600060028204905060018216806200028757607f821691505b6020821081036200029d576200029c6200023f565b5b50919050565b60008190508160005260206000209050919050565b60006020601f8301049050919050565b600082821b905092915050565b600060088302620003077fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff82620002c8565b620003138683620002c8565b95508019841693508086168417925050509392505050565b6000819050919050565b6000819050919050565b6000620003606200035a62000354846200032b565b62000335565b6200032b565b9050919050565b6000819050919050565b6200037c836200033f565b620003946200038b8262000367565b848454620002d5565b825550505050565b600090565b620003ab6200039c565b620003b881848462000371565b505050565b5b81811015620003e057620003d4600082620003a1565b600181019050620003be565b5050565b601f8211156200042f57620003f981620002a3565b6200040484620002b8565b8101602085101562000414578190505b6200042c6200042385620002b8565b830182620003bd565b50505b505050565b600082821c905092915050565b6000620004546000198460080262000434565b1980831691505092915050565b60006200046f838362000441565b9150826002028217905092915050565b6200048a8262000234565b67ffffffffffffffff811115620004a657620004a56200007f565b5b620004b282546200026e565b620004bf828285620003e4565b600060209050601f831160018114620004f75760008415620004e2578287015190505b620004ee858262000461565b8655506200055e565b601f1984166200050786620002a3565b60005b8281101562000531578489015182556001820191506020850194506020810190506200050a565b868310156200055157848901516200054d601f89168262000441565b8355505b6001600288020188555050505b505050505050565b61067880620005766000396000f3fe608060405234801561001057600080fd5b50600436106100365760003560e01c80631923be241461003b578063e21f37ce14610057575b600080fd5b61005560048036038101906100509190610270565b610075565b005b61005f610088565b60405161006c9190610338565b60405180910390f35b80600090816100849190610570565b5050565b6000805461009590610389565b80601f01602080910402602001604051908101604052809291908181526020018280546100c190610389565b801561010e5780601f106100e35761010080835404028352916020019161010e565b820191906000526020600020905b8154815290600101906020018083116100f157829003601f168201915b505050505081565b6000604051905090565b600080fd5b600080fd5b600080fd5b600080fd5b6000601f19601f8301169050919050565b7f4e487b7100000000000000000000000000000000000000000000000000000000600052604160045260246000fd5b61017d82610134565b810181811067ffffffffffffffff8211171561019c5761019b610145565b5b80604052505050565b60006101af610116565b90506101bb8282610174565b919050565b600067ffffffffffffffff8211156101db576101da610145565b5b6101e482610134565b9050602081019050919050565b82818337600083830152505050565b600061021361020e846101c0565b6101a5565b90508281526020810184848401111561022f5761022e61012f565b5b61023a8482856101f1565b509392505050565b600082601f8301126102575761025661012a565b5b8135610267848260208601610200565b91505092915050565b60006020828403121561028657610285610120565b5b600082013567ffffffffffffffff8111156102a4576102a3610125565b5b6102b084828501610242565b91505092915050565b600081519050919050565b600082825260208201905092915050565b60005b838110156102f35780820151818401526020810190506102d8565b60008484015250505050565b600061030a826102b9565b61031481856102c4565b93506103248185602086016102d5565b61032d81610134565b840191505092915050565b6000602082019050818103600083015261035281846102ff565b905092915050565b7f4e487b7100000000000000000000000000000000000000000000000000000000600052602260045260246000fd5b600060028204905060018216806103a157607f821691505b6020821081036103b4576103b361035a565b5b50919050565b60008190508160005260206000209050919050565b60006020601f8301049050919050565b600082821b905092915050565b60006008830261041c7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff826103df565b61042686836103df565b95508019841693508086168417925050509392505050565b6000819050919050565b6000819050919050565b600061046d6104686104638461043e565b610448565b61043e565b9050919050565b6000819050919050565b61048783610452565b61049b61049382610474565b8484546103ec565b825550505050565b600090565b6104b06104a3565b6104bb81848461047e565b505050565b5b818110156104df576104d46000826104a8565b6001810190506104c1565b5050565b601f821115610524576104f5816103ba565b6104fe846103cf565b8101602085101561050d578190505b610521610519856103cf565b8301826104c0565b50505b505050565b600082821c905092915050565b600061054760001984600802610529565b1980831691505092915050565b60006105608383610536565b9150826002028217905092915050565b610579826102b9565b67ffffffffffffffff81111561059257610591610145565b5b61059c8254610389565b6105a78282856104e3565b600060209050601f8311600181146105da57600084156105c8578287015190505b6105d28582610554565b86555061063a565b601f1984166105e8866103ba565b60005b82811015610610578489015182556001820191506020850194506020810190506105eb565b8683101561062d5784890151610629601f891682610536565b8355505b6001600288020188555050505b50505050505056fea26469706673582212204326a68b08e2f4dc500c89e18af564f403f4aaab0887e352cdb0a6cabba9228e64736f6c63430008120033

Now query [TRANSACTION_CONTRACT_1_CREATE] with the following block of python code:

from web3 import Web3, HTTPProvider, IPCProvider

web3 = Web3(IPCProvider(‘/path/to/your/geth.ipc’))

# sanity check

web3.eth.block_number

# query first transaction

tx = web3.eth.get_transaction(“0xd5b3d8b57316fecdfb958815e1c0d3079a5c5826e99c924c87cf11014b1b31d7”)

# contract bytecode

tx.input

Note that tx.input is very similar, but not equal to, the bytecode from the allegedly verified source code we compiled using Remix. The difference is an appended 96-byte sequence trailing the compiled bytecode, with each byte in the bytecode represented by a pair of hexadecimal characters. 169 of these appended 192 characters are zeros.

Pythonically converting the non-zero bytes (7363687265696220756e73) to UTF-8 encoded string:

bytes.fromhex(‘7363687265696220756e73’).decode(‘utf-8’)

Yields ‘schreib uns’. (‘Screib uns” means “write [to] us” in German.

The “verified” contract source code appears to be authentic, and the appended bytes comprise the initial value of public variable “message” that was passed to the contract constructor when the contract was deployed.

Task #3: Interact with deployed contract

[CONTRACT 1] source code is simple and consists of public variable of type “string” called “message”, a constructor that accepts a string as an argument, and function “updateMessage” of scope “public” which accepts string-type argument.

So, let’s drop the Dogs of BND a line. To do so, save the contract abi and bytecode on your local machine. In this case, I saved them as “dogs_of_bnd_abi” and “dogs_of_bnd_bin”, respectively.

In Python shell:

abi_path = ‘/path/to/dogs_of_bnd_abi’

bin_path = ‘/path/to/dogs_of_bnd_bin’

bin_file = open(bin_path,’r’)

abi_file = open(abi_path,’r’)

bytecode = bin_file.read()

abi = abi_file.read()

# set your default Ethereum accounts

# note that transaction signing is handled via clef, per above

# when the command line appears to freeze, it’s probably because clef is waiting for [y/N] input

web3.eth.default_account = web3.eth.accounts[0]

bndContract = web3.eth.contract(address=”0xB47C23D001c0c9F5C1A158a93b6dF6004b6012f7″,abi=abi)

bndContract.functions.updateMessage(“Information is all.”).transact()

Comments on the Digital Asset Anti-Money Laundering Act of 2022

The Honorable Elizabeth Warren
United States Senate
309 Hart Senate Office Building
Washington, DC 20510

December 22nd, 2022

Dear Senator Warren:

Senate Bill “Digital Asset Anti-Money Laundering Act of 2022” (DAAML) promulgates the regulation of various agents in the digital asset ecosystem toward the goal of preventing the use of distributed ledger (“blockchain”) technologies in money laundering, financing terrorism, and illegal drug trafficking [1]. Former CIA Director Michael Morell described blockchain analysis as a “highly effective crime fighting and intelligence gathering tool” and the Bitcoin ledger as an “underutilized forensic tool” (page 3, Morell et al) [2]. The report cited a currently serving official at the CFTC (Commodity Futures Trading Commission) who stated that it “is easier for law enforcement to trace illicit activity using Bitcoin than it is to trace cross-border illegal activity using traditional banking transactions, and far easier than cash transactions” (page 5, Morell et al) [2].

Bitcoin is an example of a distributed ledger technology that was designed and is primarily used for transferring value. However, numerous other distributed ledgers, most notably, the Ethereum blockchain, have their origins in decentralized computing. My analysis of the Ethereum blockchain demonstrated that 49.9% of all transactions entail transfer of funds*. The Ethereum blockchain, like many other distributed ledgers, is used for manifold purposes beyond simply transferring value, including voting, decentralized autonomous organization, litigation, intellectual property attribution, and proof of data authenticity, to name a few applications [3, 4, 5, 6].

Distributed ledger jargon suffers from misnomers that can easily confuse non-technical audiences who approach the subject from a financial perspective while ignoring blockchain’s numerous non-financial applications. For example, Ethereum applications have historically been referred to as “smart contracts”, although they generally have nothing to do with contracts in a legal sense. A “smart contract” is a misnomer for a software program that is stored and executed on a distributed computer known as “Ethereum”. Another example of jargon that is often misinterpreted by non-technical audiences is the term “transaction”.

Most non-technical readers interpret the word “transaction” in a financial sense, similar to a credit card transaction or a commercial interaction in which money is exchanged for a good or service. However, a “transaction” in the context of distributed ledger technology should be interpreted in the broader and more accurate technical sense of a state change. For instance, deleting a record, uploading a cryptographic hash, saving a string such as “Hello, World!”, or updating a database record on the Ethereum blockchain all constitute “transactions”. That is, a “transaction” results in a state change on the Ethereum computer and may or may not entail transfer of value from a sender to a recipient.

Section 3 of DAAML (“Digital Asset Rulemakings”) states: “The Financial Crimes Enforcement Network shall promulgate a rule classifying custodial and unhosted wallet providers, cryptocurrency miners, validators, or other nodes who may act to validate or secure third-party transactions, independent network participants, including MEV searchers, and other validators with control over network protocols as money service businesses.” Preventing money laundering and countering terrorism are obviously worthy goals. However, the measures proposed toward these noble goals are, in my view, misguided.

In proof-of-stake (PoS) blockchain networks such as Ethereum, validators are agents that run peer-to-peer software and use their own “staked” funds to cryptographically validate transactions. To rephrase this generally, validators run peer-to-peer client software that maintains the integrity of the network and keeps it online. Analogously, proof-of-work (PoW) blockchain networks such as Bitcoin (and previously, Ethereum, before a network upgrade that occurred on 15 September 2022 that changed Ethereum from a PoW to a PoS system) rely on miners to incorporate transactions into a distributed ledger.

Legislation that fails to distinguish between financial and non-financial uses of blockchain networks threatens not only the entire blockchain industry but also the very technologies that were developed to promote transparent, democratic, and censorship-resistant computing. Anyone with a modern computer and an internet connection can download an entire distributed ledger, interrogate and interact with the ledger using open-source client software. These agents can fall under the definition of “independent network participant” and “validator”. Classifying these entities as “money service businesses”, along with the regulatory and reporting burden this entails, is unreasonably onerous, in my opinion.

Beyond the stated goals of preventing the financing of terrorism, money laundering, and illicit drug trafficking, legislation that regulates the digital asset ecosystem should also protect consumers from abuse by financial institutions. FTX is neither the first nor the last financial institution, crypto-based or otherwise, to collapse, and these corporate failures should highlight a key value proposition of digital assets: the fact that they can be managed by individuals without having to place trust in third-parties that may or may not deserve their customers’ trust. The classification system put forth in DAAML would largely target innocent individuals while failing to focus regulation where it ought to be focused: on corporations that lost or otherwise gambled away funds of customers who relied on these companies to safeguard their digital assets.

Classifying miners, validators, and independent network participants as “money service businesses” would be analogous to classifying individuals who run file-sharing clients (for example, BitTorrent) as a cloud hosting service. Clearly, a college student running a peer-to-peer node from their dorm is incomparable to Google Cloud or Amazon Web Services. DAAML would severely discourage and unreasonably burden anyone wishing to run free, open-source software with a multitude of non-financial uses, whether or not these parties are involved in verifying transactions that entail transfer of value. DAAML fails to recognize the fact that most transactions on the Ethereum blockchain involve no transfer of value whatsoever. The bill lacks an accurate appreciation of the term “transaction” in a technical sense as it it used in blockchain discourse and is biased by interpretation of the word in a classical financial sense.

Every single transaction in the Ethereum blockchain can be scrutinized with a few lines of code. The tools I used to conduct my analyses are based on open-source utilities such as the Go-Ethereum client and the Python Web3 library [7, 8]. Rich and detailed information about the Ethereum blockchain can be obtained by anyone without the need for proprietary APIs. I encourage lawmakers to conduct their own analyses of blockchain ledgers so that emerging legislation can more effectively protect consumers and counter the financing of terrorism, illegal drug trafficking, and money laundering – without destroying the democratic, decentralized foundations of these technologies.

In particular, I urge you to develop a more nuanced definition of “money service business” that does not target the miners, validators, and independent network participants which serve as the foundation of blockchain networks and keepers of its decentralized integrity. I hope that the arguments made above demonstrate that doing so would be a fallacy.

Thank you for your consideration.

Respectfully yours,

Omar Metwally, M.D.

* My initial analysis of all transactions from the past 10 days yielded a figure of 43%, and this is the number I cited in my original letter to Senator Warren. In a follow-up study, I analyzed all transactions from every 100th block on the Ethereum blockchain beginning with block 16237072 and ending with block 1388368 and calculated that 49.9% of Ethereum transactions entailed value transfer. The ratio of value-containing transactions varies widely from block to block. Access to greater computing resources would enable a more detailed study, and I invite anyone interested in this research question to conduct their own analysis.

References

1. “Digital Asset Anti-Money Laundering Act of 2022”. https://www.warren.senate.gov/imo/media/doc/DAAML%20Act%20of%202022.pdf. Accessed 21 December 2022.

2. “An Analysis of Bitcoin’s Use in Illicit Finance” by Michael Morell, Josh Kirshner and Thomas Schoenberger. 6 April 2021. https://cryptoforinnovation.org/resources/Analysis_of_Bitcoin_in_Illicit_Finance.pdf. Accessed 21 December 2022.

3. “What in the Ethereum application ecosystem excites me” by Vitalik Buterin. 5 December 2022. https://vitalik.ca/general/2022/12/05/excited.html. Accessed 21 December 2022.

4. “How cryptography and peer-to-peer networks contribute value to society” by Omar Metwally. 13 March 2022. https://omarmetwally.blog/2022/03/13/how-cryptography-and-peer-to-peer-networks-contribute-value-to-society/. Accessed 21 December 2022.

5. “Great Explorers” by Omar Metwally. 16 September 2022. https://omarmetwally.blog/2018/09/16/great-explorers/. Accessed 21 December 2022.

6. Maestro Ethereum application by Akram Alsamarae and Omar Metwally. National Science Foundation Grant 1937914. https://maestro.analog.earth

7. https://github.com/ethereum/go-ethereum

8. https://github.com/ethereum/web3.py

How cryptography and peer-to-peer networks contribute value to society

By: Omar Metwally, M.D.

3/13/2022

Objective:

To illustrate the utility of cryptography and peer-to-peer networking in protecting the authenticity, integrity, and availability of information.

https://en.wikipedia.org/wiki/Snowflake#/media/File:Snowflake_macro_photography_1.jpg

1. Information is the useful synthesis of data.

Our email inboxes, phones, and hard drives are constantly filling up with data; however, collecting, organizing, and archiving the useful nuggets of information in an ocean of junk requires time, money, and energy. The number of useful emails in my inboxes is a small fraction of the total number of emails, which are mostly spam. I don’t pay for extra storage out of principle. Why fund a company whose spam filters are more likely to block important emails than spam? Why perpetuate the problem?

Similarly with the high-resolution photos which take up so much memory on my phone and hard disk: most of these photographs do not deserve the 2+ MB of memory they occupy on my phone and PC. I’ll commonly snap a photo of a beautiful landscape, a critter I encounter on a walk, or something I need to remember for a short period of time (for example, where I parked). Backing up every photo and video on my phone seems wasteful considering that, like my email inbox, only a small proportion are media that I actually want to preserve. The alternative, however, would be to manually go through each of my inboxes and every photo I take on my phone and make a conscious decision whether to keep or delete a file. This latter strategy often proves far too time-intensive to pursue on a consistent basis.

2. Data that exists in only one location is as good as gone.

I once asked a colleague how he backs up his digital information. “I’ve never needed to back up my data,” he answered. This is a fallacy. Every possible failure of a digital system will eventually and inevitably occur. Hard disks fail all the time. People accidentally delete and lose files. Important bits of information drown in oceans of spam and junk, to the extent that locating them becomes practically impossible. Networked systems get hacked. People lose or upgrade their phones and change platforms, only to realize years later that they never backed up their old Android or iPhone which is now resting in a landfill.

Preserving information in a way that facilitates future retrieval requires:

– a consistent schema for organizing files and directories

– multiple physical (e.g. HDDs and SSDs) and cloud-based storage systems

– a consistent version control schema

– consistency in backing up information to each of these media

In other words, if you really cherish your data, you need to be organized, anticipate what can (and inevitably will) go wrong, and back up consistently. If it’s important information, chances are you’ll also want to encrypt your disks in a way that prevents unauthorized parties from accessing the data, without accidentally losing access to your own data.

3. Cryptography is arguably one of the most useful and powerful technologies in modern-day computing.

Modern cryptography is the basis for digital tools that protect the authenticity and integrity of information. While information ends up in the wrong hands all the time, encryption ensures that only the intended recipient can “unlock” the information. To lay people, “encryption” may conjure messaging apps designed for protect one’s privacy. However, another compelling use case of cryptography, which may be unknown to lay computer users, is to mathematically prove the authenticity of digital information. Algorithms such as SHA256 [https://csrc.nist.gov/glossary/term/SHA_256] can generate a mathematically unique string of numbers and letters, which can serve as a “fingerprint” for a file’s authenticity. Altering even the slightest letter in a document changes this cryptographic fingerprint.

Just like no two individuals have the same fingerprint, so do non-identical files yield unique cryptographic hashes. For instance, an attorney who needs to ensure the authenticity of a collection of evidence can use a cryptographic hashing algorithm such as SHA256 to prove beyond a doubt that the data do indeed represent what the attorney claims they do. However, it’s important to note that these hashing algorithms do not necessarily preserve the actual data to which they refer. It is still upon the attorney to back up the evidence in a secure and redundant manner. Furthermore, the attorney must ensure that each backup is identical. Although a small discrepancy may or may not be consequential in court (for instance, accidentally adding a space, period, or comma may or may not alter the interpreted meaning of a document), the cryptographic hash will be altered, negating the utility of the hashing algorithm.

4. Distributing and decentralizing information is a key value proposition of blockchain networks

Encryption and hashing preceded cryptocurrencies. Hash functions, which are defined by the National Institute of Standards and Technology, are generally free to use and are accessible via command line on any computer. Arguably the biggest value proposition of blockchain networks, on a technical level, is their capacity to add verifiable and tamper-proof timestamps to cryptographic hashes, by propagating a verifiable and identical chronological database across numerous peers around the world. Being able to reliably exchange information with thousands of computers across the world, spanning many different geographic areas, yields redundancy that would be implausible to replicate by entrusting any one party to create thousands of backups, spread them around the world, ensure that they can be accessed reliably, and also ensure the integrity of the original information. In reality, governments restrict access to online content all the time. People in affected locations can use tools such as VPNs to try and circumvent these limitations, but as long as a critical number of nodes is online, the information will not be lost, even if it is inaccessible from a certain geographic region due to inability to run a p2p client.

Cryptocurrencies create financial incentives for people to volunteer hard disk space, broadband, their time, skills, computing resources, and energy to contribute to a peer-to-peer network. Rather than relying on one party to ensure the integrity, authenticity, and availability of data (which is typically hosted in a relatively small number of geographic locations), blockchains are essentially distributed databases (also known as “distributed ledgers” when used in the context of exchanging digital value).

5. Ensuring information availability is another value proposition of blockchain networks

I have been experimenting with IPFS (“InterPlanetary Filesystem” [https://ipfs.io/]), a peer-to-peer file-sharing networking, since 2017. Each byte stored directly on a blockchain network is relatively expensive. While all blockchains are peer-to-peer networks, not all peer-to-peer networks are blockchain. IPFS, an example of a peer-to-peer network that is not a blockchain, allows users to easily upload directories and files to the network, where they are relayed from node to node. IPFS itself is free to use; that is, there is no subscription fee to cover hosting costs because volunteers around the world share in hosting the data. However, this utopian dream of “share everything, preserve everything” ignores the reality of the cost of hosting data. Bandwidth, disk space, processing power, and electricity cost money. Data hosted on IPFS can be “pinned” using a 3rd-party service, but this crosses the line of decentralization and places trust in a 3rd-party service to ensure the persistence of these data. Furthermore, it’s unclear to me why a 3rd-party service would volunteer their resources freely without charging a hosting fee.

Filecoin is a cryptocurrency developed by the creators of IPFS (Protocol Labs) which aims to solve this missing economic incentive. The Filecoin protocol aims to incentivize miners (people with a lot of computing power and storage capacity) to host others’ data by rewarding them with the Filecoin cryptocurrency in exchange for running software that can mathematically prove that the hosted data (1) exist on their hard drive(s), and (2) can be retrieved by the party that is paying Filecoin in exchange for their data to be hosted.

I downloaded the Filecoin client (“Lotus”) and spent several days running IPFS and Lotus in parallel in order to see if hosting a 113 MB file on Filecoin was a better alternative to using traditional cloud servers, and also to learn about the economics of the Filecoin ecosystem. I provide here my impressions of this limited experience without a recommendation for or against any cryptocurrency.

It took me a few hours to sync the Filecoin mainnet to completion. I had to download a snapshot of the chain in order to sync, and I could not locate a SHA256 checksum of the snapshot used to sync. I was unable to sync by connecting to peers directly. Using snapshots hosted on a centralized server which are not associated with published checksums is never best practice because there’s otherwise no way to ensure the authenticity or integrity of what one thinks they are downloading.

The Slack channels used by the Filecoin community are active, and I received timely answers to my questions by knowledgeable contributors. Once the Filecoin chain was synced, I proceeded to upload a 113 MB file using its IPFS hash (that is, the file was already uploaded to IPFS, and I used the IPFS hash to point to the data). The process of uploading data generally entails (1) identifying storage providers (miners) who are willing and able to host one’s data; (2) uploading the data to the storage providers; and (3) paying a transaction fee to upload the data. These transactions are referred to as “deals” and can range from 180 to 540 days in duration. Miners can specify parameters such as the minimum and maximum file size they are willing to host, duration of hosting, and their cost per Gigabyte per time period (in the case of Filecoin, per 30-second epoch). Retrieving data involves a separate set of processes, but I haven’t yet made it that far.

In Filecoin, miners host others’ data, which may or may not be encrypted. This is a potential legal gray area because miners generally don’t know what they’re hosting, and miners are often located in jurisdictions separate from the party seeking hosting services. Deals can be arranged on a Slack channel or third-party reputation marketplaces, but rarely does one know whom exactly they’re dealing with. What happens if a party is uploading content that is illegal in their jurisdiction? Or perhaps legal in their jurisdiction but forbidden in the miner’s jurisdiction?

The process of trying to host data on Filecoin is far more complex than using traditional cloud servers. The average person is unlikely to succeed without a strong commitment to the steep learning curve involved in using these command-line tools. Some of the complexities can theoretically be simplified using third-party services, but this can potentially negate the advantages of using an incentivized p2p network in the first place.

The Filecoin protocol incentivizes miners to contribute their computing resources (and time) to host others’ data by rewarding them for reliably hosting others’ data and financially punishing them by deducting penalties from the collateral they have to put up. Due to the relatively early stage of development of these tools, Filecoin documentation recommends making multiple deals with up to 10 different miners to ensure the availability of one’s data, in case one or more miners’ do not make good on their deal.

On my first attempt to upload a 113 MB file, the “deal” failed for unclear reasons, despite my attempts to troubleshoot the Lotus client’s behavior with the help of technical support volunteers. My starting balance was one Filecoin (1 FIL). Here are some numbers central to the (failed) transaction:

Initial wallet balance: 1 FIL

Cost of hosting 113 MB file with a particular miner for 180 days: 0.01296 FIL ($0.225504, at an exchange rate of $17.4 per FIL on March 12th, 2022).

Wallet balance after the escrow funds were returned to my wallet (i.e. after the deal failed):

0.996353443699298176 FIL

Difference between initial and final wallet balance = amount of “gas” burned (network transaction fees):

0.006646556300701767 FIL

Therefore, 51.285% of the original proposed cost of hosting the file (0.01296 FIL) was burned in the form of gas. In other words, 0.006646556300701767 FIL / 0.01296 FIL = 0.5128515664121734

While the amount of burned gas may seem trivial, it accounts for a majority of the cost of the failed deal (51.285%)! If the goal is to establish 10 deals with 10 different miners, then the cost of gas associated with failed deals can quickly add up.

6. Mathematical proof of data availability may or may not be necessary

There are certainly cases in which it’s necessary to prove mathematically not just the integrity and authenticity of data (for example, using hashing functions such as SHA256), but also the availability of the data. Filecoin aims to mathematically prove both the existence and availability of data hosted on a peer to peer network while incentivizing miners to uphold deals with parties who need data hosted. However, there are also many instances where a SHA256 checksum uploaded to a blockchain with an immutable timestamp is more than sufficient. In this latter case, the responsibility of organizing, archiving, and maintaining identical copies of these data falls upon the party willing to pay for the weight of this proof. As mentioned above, there are instances where entrusting miners to store and deliver content may be undesirable for legal reasons, privacy, or simply the need to trust that at least one miner with whom one conducts a deal will uphold their end of the deal.

In conclusion, cryptography and peer-to-peer networking are powerful technologies that can help protect the integrity of information and ensure its persistence. Various blockchain networks use financial incentives in different ways to provide a variety of value propositions to network participants. Clearly understanding one’s goals as the relate to information preservation/exchange, and clearly understanding each network’s value proposition, is key to making good investments of one’s time and resources.