914 lines
50 KiB
Plaintext
914 lines
50 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Nov 15, 1992 Volume 4 : Issue 58
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Coop Eidolator: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.58 (Nov 15, 1992)
|
|||
|
File 1--Special Issue: A Computer & Information Technologies Platform
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Tue, 27 Oct 1992 22:00:03 -0800
|
|||
|
From: James I. Davis <jdav@WELL.SF.CA.US>
|
|||
|
Subject: File 1--A Computer & Information Technologies Platform
|
|||
|
|
|||
|
((MODERATORS' NOTE: The potential of computer technology to liberate
|
|||
|
also carries with it the potential to repress. Computer applications
|
|||
|
contain the risks of intruding on privacy, increasing our
|
|||
|
vulnerability to crime, and altering the social sphere by revising
|
|||
|
laws, class structure, and power/control systems. The consequences of
|
|||
|
computer technology are *social* and affect us all. Responsibility for
|
|||
|
recognizing the impact of expanding technology is not something that
|
|||
|
should be left to others--to "experts"--but that should be
|
|||
|
aggressively confronted by all of us.
|
|||
|
|
|||
|
This special issue presents a platform statement drafted by the
|
|||
|
Computer Professionals for Social Responsibility's Berkeley chapter as
|
|||
|
one way to begin recognizing the *political* implications of computer
|
|||
|
technology. We invite responses to it with the intent of sharpening
|
|||
|
the debates over the issues it raises.
|
|||
|
|
|||
|
The bibliography has been deleted because of spatial constraints.
|
|||
|
Those interested can obtain the complete text, including biblio, from
|
|||
|
the CuD ftp site (ftp.eff.org)).
|
|||
|
|
|||
|
+++++++++++++
|
|||
|
|
|||
|
A COMPUTER AND INFORMATION TECHNOLOGIES PLATFORM
|
|||
|
|
|||
|
Computer Professionals for Social Responsibility
|
|||
|
Berkeley Chapter
|
|||
|
Peace and Justice Working Group
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
As computer and information technologies become all pervasive, they
|
|||
|
touch more and more on the lives of everyone. Even so, their
|
|||
|
development and deployment remains unruly, undemocratic and
|
|||
|
unconcerned with the basic needs of humanity. Over the past 20 years,
|
|||
|
new technologies have dramatically enhanced our ability to collect and
|
|||
|
share information, to improve the quality of work, and to solve
|
|||
|
pressing problems like hunger, homelessness and disease. Yet over the
|
|||
|
same period we have witnessed a growing set of problems which are
|
|||
|
eroding the quality of life in our country. We have seen the virtual
|
|||
|
collapse of our public education system. Privacy has evaporated.
|
|||
|
Workplace monitoring has increased in parallel with the de-skilling or
|
|||
|
outright disappearance of work. Homelessness has reached new heights.
|
|||
|
Dangerous chemicals poison our environment. And our health is
|
|||
|
threatened by the growing pandemic of AIDS along with the resurgence
|
|||
|
of 19th century diseases like cholera and tuberculosis.
|
|||
|
|
|||
|
As a society, we possess the technical know-how to resolve
|
|||
|
homelessness, illiteracy, the absence of privacy, the skewed
|
|||
|
distribution of information and knowledge, the lack of health care,
|
|||
|
environmental damage, and poverty. These problems persist only because
|
|||
|
of the way we prioritize research and development, implement
|
|||
|
technologies, and distribute our social wealth. Determining social
|
|||
|
priorities for research, development, implementation and distribution
|
|||
|
is a political problem.
|
|||
|
|
|||
|
Political problems require political solutions. These are, of course,
|
|||
|
everyone's responsibility. As human beings, we have tried to examine
|
|||
|
these problems, and consider possible solutions. As people who design,
|
|||
|
create, study, and use computer and information technologies, we have
|
|||
|
taken the initiative to develop a political platform for these
|
|||
|
technologies. This platform describes a plausible, possible program
|
|||
|
for research, development, and implementation of computer and
|
|||
|
information technologies that will move towards resolving our most
|
|||
|
pressing social needs. This document also unites many groups and
|
|||
|
voices behind a common call for change in the emphasis and application
|
|||
|
of these technologies.
|
|||
|
|
|||
|
This platform addresses Computer and Information Technologies, because
|
|||
|
we work with those technologies, and we are most familiar with the
|
|||
|
issues and concerns related to those technologies. We do not address
|
|||
|
other key technologies like bioengineering or materials science,
|
|||
|
although some issues, for example, intellectual property rights or
|
|||
|
research priorities, apply equally well to those areas. We would like
|
|||
|
to see people familiar with those fields develop platforms as well.
|
|||
|
|
|||
|
Finally, we do not expect that this platform will ever be "finished."
|
|||
|
The rate of scientific and technical development continues to
|
|||
|
accelerate, and new issues will certainly emerge. Likewise, our
|
|||
|
understanding of the issues outlined here will evolve and deepen. Your
|
|||
|
comments are necessary for this document to be a relevant and useful
|
|||
|
effort.
|
|||
|
|
|||
|
We encourage candidates, organizations and individuals to adopt the
|
|||
|
provisions in this platform, and to take concrete steps towards making
|
|||
|
them a reality.
|
|||
|
|
|||
|
Peace and Justice Working Group Computer Professionals for Social
|
|||
|
Responsibility, Berkeley Chapter
|
|||
|
|
|||
|
August, 1992
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
PLATFORM GOALS
|
|||
|
|
|||
|
The goals of this platform are:
|
|||
|
|
|||
|
* To promote the use of Computer and Information Technologies to
|
|||
|
improve the quality of human life and maximize human potential.
|
|||
|
|
|||
|
* To provide broad and equal access to Computers and Information
|
|||
|
Technology tools.
|
|||
|
|
|||
|
* To raise consciousness about the effects of Computer and
|
|||
|
Information Technologies among the community of people who create and
|
|||
|
implement these technologies.
|
|||
|
|
|||
|
* To educate the general public about the effects Computers
|
|||
|
|
|||
|
and Information Technologies have on them.
|
|||
|
|
|||
|
* To focus public attention on the political agenda that determines
|
|||
|
what gets researched, funded, developed and distributed in Computer
|
|||
|
and Information Technologies.
|
|||
|
|
|||
|
* To democratize (that is, enhance the public participation in) the
|
|||
|
process by which Computer and Information Technologies do or do not
|
|||
|
get researched, funded, developed and distributed.
|
|||
|
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
PLATFORM SUMMARY
|
|||
|
|
|||
|
A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
|
|||
|
|
|||
|
1. Universal access to education
|
|||
|
2. Elimination of barriers to access to public information
|
|||
|
3. An open National Data Traffic System
|
|||
|
4. Expansion of the public library system
|
|||
|
5. Expansion of public information treasury
|
|||
|
6. Freedom of access to government data
|
|||
|
7. Preservation of public information as a resource
|
|||
|
8. Restoration of information as public property
|
|||
|
|
|||
|
B. CIVIL LIBERTIES and PRIVACY
|
|||
|
|
|||
|
1. Education on civil liberties, privacy, and the implications
|
|||
|
of new technologies
|
|||
|
2. Preservation of constitutional civil liberties
|
|||
|
3. Right to privacy and the technology to ensure it
|
|||
|
4. Community control of police and their technology
|
|||
|
|
|||
|
|
|||
|
C. WORK, HEALTH and SAFETY
|
|||
|
|
|||
|
1. Guaranteed income for displaced workers
|
|||
|
2. Improved quality of work through worker control of it
|
|||
|
3. Emphasis on health and safety
|
|||
|
4. Equal opportunity to work
|
|||
|
5. Protection for the homeworker
|
|||
|
6. Retraining for new technologies
|
|||
|
|
|||
|
|
|||
|
D. THE ENVIRONMENT
|
|||
|
|
|||
|
1. Environmentally safe manufacturing
|
|||
|
2. Planning for disposal or re-use of new products
|
|||
|
3. Reclamation of the cultural environment as public space
|
|||
|
|
|||
|
|
|||
|
E. INTERNATIONAL COOPERATION
|
|||
|
|
|||
|
1. Replacement of "national competitiveness" with "global
|
|||
|
cooperation"
|
|||
|
2. Global distribution of technical wealth
|
|||
|
3. An end to the waste of technical resources embodied in the
|
|||
|
international arms trade
|
|||
|
4. A new international information order
|
|||
|
5. Equitable international division of labor
|
|||
|
|
|||
|
|
|||
|
F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
|
|||
|
|
|||
|
1. New emphasis in technical research priorities
|
|||
|
2. Conversion to a peacetime economy
|
|||
|
3. Socially responsible engineering and science
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
THE PLATFORM
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
|
|||
|
|
|||
|
The body of human knowledge is a social treasure collectively
|
|||
|
assembled through history. It belongs to no one person, company, or
|
|||
|
country. As a public treasure everyone must be guaranteed access to
|
|||
|
its riches. We must move beyond the division between information
|
|||
|
"consumer" and "provider" -- new information technologies enable each
|
|||
|
of us to contribute to the social treasury as well. An active
|
|||
|
democracy requires a well-informed citizenry with equal access to any
|
|||
|
tools that facilitate democratic decision-making. This platform calls
|
|||
|
for:
|
|||
|
|
|||
|
1. UNIVERSAL ACCESS TO EDUCATION: "23 Million adult Americans cannot
|
|||
|
read above fifth-grade level."[1] We reaffirm that quality education
|
|||
|
is a basic human right. We call for full funding for education through
|
|||
|
the university level to insure that everyone obtains the education
|
|||
|
they need to participate in and contribute to the "Information Age."
|
|||
|
Education must remain a public resource. Training and retraining to
|
|||
|
keep skills current with technology, and ease transition from old
|
|||
|
technologies to new technologies must be readily available. All people
|
|||
|
must have sufficient access to technology to ensure that there is no
|
|||
|
"information elite" in this society. Computers should be seen as tools
|
|||
|
to accomplish tasks, not ends in themselves. The public education
|
|||
|
system must provide students with access to computers, as well as the
|
|||
|
critical and analytical tools necessary to understand, evaluate and
|
|||
|
use new technologies. Staffed and funded computer learning centers
|
|||
|
should be set up in low-income urban and rural areas to provide such
|
|||
|
access and education to adults as well as children. Teachers require
|
|||
|
an understanding of the technology to use it effectively, and to
|
|||
|
communicate its benefits and limitations to students. These skills
|
|||
|
must be an integral part of the teacher training curriculum, and must
|
|||
|
also be available for teachers to continue to upgrade their skills as
|
|||
|
new tools become available. Finally, to learn, children need a
|
|||
|
nurturing environment, including a home, an adequate diet, and quality
|
|||
|
health care. Pitting "welfare" versus "education" is a vicious
|
|||
|
prescription for social failure. We call for adequate social services
|
|||
|
to ensure that our children have the environment in which they can
|
|||
|
benefit from their education.
|
|||
|
|
|||
|
2. ELIMINATION OF BARRIERS TO ACCESS TO INFORMATION TECHNOLOGY:
|
|||
|
Democracy requires an informed public, with generous access to
|
|||
|
information. However, access to information increasingly requires
|
|||
|
tools such as a computer and a modem, while only 13% of Americans own
|
|||
|
a personal computer, and of them, only 10% own a modem.[2] In
|
|||
|
addition, requiring fees to access databases locks out those without
|
|||
|
money. We must assure access to needed technology via methods such as
|
|||
|
a subsidized equipment program that can make basic computer and
|
|||
|
information technologies available to all. We call for the
|
|||
|
nationalization of research and public information databases, with
|
|||
|
access fees kept to a minimum to ensure access to the data. In many
|
|||
|
cases, the technology itself is a barrier to use of new technologies.
|
|||
|
We strongly encourage the research and development of non-proprietary
|
|||
|
interfaces and standards that simplify the use of new technology.
|
|||
|
|
|||
|
3. AN OPEN NATIONAL DATA TRAFFIC SYSTEM: An Information Society
|
|||
|
generates and uses massive amounts of information. It requires an
|
|||
|
infrastructure capable of handling that information. It also
|
|||
|
determines how we communicate with each other, how we disseminate our
|
|||
|
ideas, and how we learn from each other. The character of this system
|
|||
|
will have profound effects on everyone. The openness and accessibility
|
|||
|
of this network will determine the breadth and depth of the community
|
|||
|
we can create.
|
|||
|
|
|||
|
We call for a "National Data Traffic System" that can accommodate all
|
|||
|
traffic, not just corporate and large academic institution traffic, so
|
|||
|
that everyone has access to public information, and has the ability to
|
|||
|
add to the public information. This traffic system must be accessible
|
|||
|
to all. The traffic system will include a "highway" component, major
|
|||
|
information arteries connecting the country. We propose that the
|
|||
|
highway adopt a model similar to the federal highway system -- that
|
|||
|
is, a system built by and maintained publicly, as opposed to the
|
|||
|
"railroad" model, where the government subsidizes private corporations
|
|||
|
to build, maintain and control the system. The "highway model" will
|
|||
|
guarantee that the system serves the public interest. At the local
|
|||
|
level, the existing telephone and cable television systems can provide
|
|||
|
the "feeder roads", the "streets" and the "alleys" and the "dirt
|
|||
|
roads" of the data network through the adoption of an Integrated
|
|||
|
Services Digital Network (ISDN) system, along the lines proposed by
|
|||
|
the Electronic Frontier Foundation. The features proposed by EFF
|
|||
|
include affordable, ubiquitous ISDN; breaking the private monopoly
|
|||
|
control of the existing communication networks; short of public
|
|||
|
takeover of the networks, affirmation of "common carrier" principles;
|
|||
|
ease of use; a guarantee of personal privacy; and a guarantee of
|
|||
|
equitable access to communications media.[3]
|
|||
|
|
|||
|
4. EXPANSION OF THE PUBLIC LIBRARY SYSTEM: The public library system
|
|||
|
represents a public commitment to equal access to information,
|
|||
|
supported by community resources. Yet libraries, in the era of
|
|||
|
Computer and Information Technologies, are having their funding cut.
|
|||
|
We call for adequate funding of public libraries and an extension of
|
|||
|
the library system into neighborhoods. Librarians are the trained
|
|||
|
facilitators of information access. As such, librarians have a unique,
|
|||
|
strategic role to play in the "information society." We call for an
|
|||
|
expansion of library training programs, for an increase in the number
|
|||
|
of librarians, and for additional training for librarians so that they
|
|||
|
can maximize the use of new information-retrieval technology by the
|
|||
|
general public. Every public library must have, and provide to their
|
|||
|
clientele, access to the national data highway.
|
|||
|
|
|||
|
5. EXPANSION OF THE PUBLIC INFORMATION TREASURY: A market economy
|
|||
|
encourages the production of those commodities that the largest market
|
|||
|
wants. As information becomes a commodity, information that serves a
|
|||
|
small or specialized audience is in danger of not being collected, and
|
|||
|
not being available. For example, the president of commercial database
|
|||
|
vendor Dialog was quoted in 1986 as saying "We can't afford an
|
|||
|
investment in databases that are not going to earn their keep and pay
|
|||
|
back their development costs." When asked what areas were not paying
|
|||
|
their development costs, he answered, "Humanities."[4] Information
|
|||
|
collection should pro-actively meet broad social goals of equality and
|
|||
|
democracy. We must ensure that the widest possible kinds of social
|
|||
|
information are collected (not just those that have a ready and
|
|||
|
substantial market), while ensuring that the privacy of the individual
|
|||
|
is protected.
|
|||
|
|
|||
|
6. FREEDOM OF ACCESS TO GOVERNMENT DATA: Public records and economic
|
|||
|
data are public resources. We must ensure that the principles of
|
|||
|
"Freedom of Information" laws remain in place. Government agencies
|
|||
|
must comply with these laws, and should be punished for
|
|||
|
non-compliance. Government records that are kept in a digital format
|
|||
|
must be available electronically to the general public, provided that
|
|||
|
adequate guarantees are in place to protect the individual.
|
|||
|
|
|||
|
7. PROTECTION OF PUBLIC INFORMATION RESOURCES: Recently, we have seen
|
|||
|
a dangerous trend in which the Federal government sells off or
|
|||
|
licenses away rights to information collected at public expense, which
|
|||
|
is then sold back to the public at a profit. Access to public data now
|
|||
|
often requires paying an information-broker look-up fees.[5] Public
|
|||
|
resources must be public. We call for a halt to the privatization of
|
|||
|
public data.
|
|||
|
|
|||
|
8. RESTORATION OF INFORMATION AS PUBLIC PROPERTY: "Since new
|
|||
|
information technology includes easy ways of reproducing information,
|
|||
|
the existence of these [intellectual property] laws effectively
|
|||
|
curtails the widest possible spread of this new form of wealth. Unlike
|
|||
|
material objects, information can be shared widely without running
|
|||
|
out."[6] The constitutional rationale for intellectual property rights
|
|||
|
is to promote progress and creativity. The current mechanisms -- the
|
|||
|
patent system and the copyright system -- are not required to ensure
|
|||
|
progress. Other models exist for organizing and rewarding intellectual
|
|||
|
work, that do not require proprietary title to the results. For
|
|||
|
example, substantial and important research has been carried out by
|
|||
|
government institutions and state-supported university research. A
|
|||
|
rich library of public domain and "freeware" software exists. Peer or
|
|||
|
public recognition, awards, altruism, the urge to create or
|
|||
|
self-satisfaction in technical achievement are equally motivators for
|
|||
|
creative activity.
|
|||
|
|
|||
|
Authors and inventors must be supported and rewarded for their work,
|
|||
|
but the copyright and patent system per se does not ensure that. Most
|
|||
|
patents, for example, are granted to corporations or to employees who
|
|||
|
have had to sign agreements to turn the ownership over to the employer
|
|||
|
through work-for-hire or other employment contracts as a condition of
|
|||
|
employment. The company, not the creating team, owns the patent. In
|
|||
|
addition, in many ways, patents and copyrights inhibit the development
|
|||
|
and implementation of new technology. For example, proprietary
|
|||
|
research is not shared, but is kept secret and needlessly duplicated
|
|||
|
by competing companies or countries. Companies sue each other over
|
|||
|
ownership of interfaces, with the consumer ultimately footing the
|
|||
|
bill. Software developers must "code around" proprietary algorithms,
|
|||
|
so as not to violate known patents; and they still run the risk of
|
|||
|
violating patents they don't know about. We call for a moratorium on
|
|||
|
software patents. We call for the abolition of property rights in
|
|||
|
knowledge, including algorithms and designs. We call for social
|
|||
|
funding of research and development, and the implementation of new
|
|||
|
systems, such as public competitions, to spur development of socially
|
|||
|
needed technology.
|
|||
|
|
|||
|
B. CIVIL LIBERTIES and PRIVACY
|
|||
|
|
|||
|
Advances in Computer and Information Technologies have facilitated
|
|||
|
communications and the accumulation, storage and processing of data.
|
|||
|
These same advances may be used to enlighten, empower and equalize but
|
|||
|
also to monitor, invade and control. Alarmingly, we witness more
|
|||
|
instances of the latter rather than of the former. This platform
|
|||
|
calls for:
|
|||
|
|
|||
|
1. EDUCATION ON CIVIL LIBERTIES, PRIVACY, AND THE IMPLICATIONS OF NEW
|
|||
|
TECHNOLOGIES: New technologies raise new opportunities and new
|
|||
|
challenges to existing civil liberties. In the absence of
|
|||
|
understanding and information about these technologies, dangerous
|
|||
|
policies can take root. For example, police agencies and the news
|
|||
|
media have portrayed certain computer users (often called "hackers")
|
|||
|
as "pirates" out to damage and infect all networks. While some
|
|||
|
computer crime of this sort does take place, such a demonization of
|
|||
|
computer users overlooks actual practice and statistics. This
|
|||
|
perception has led to an atmosphere of hysteria, opening the door to
|
|||
|
fundamental challenges to civil liberties. Homes have been raided,
|
|||
|
property has been confiscated, businesses have been shut down, all
|
|||
|
without due process. Technology skills have taken on the quality of
|
|||
|
"forbidden knowledge", where the possession of certain kinds of
|
|||
|
information is considered a crime. In the case of "hackers", this is
|
|||
|
largely due to a lack of understanding of the actual threat that
|
|||
|
"hackers" pose. We must ensure that legislators, law-enforcement
|
|||
|
agencies, the news media, and the general public understand Computer
|
|||
|
and Information Technologies instead of striking out blindly at any
|
|||
|
perceived threat. We must also ensure that policy caters to the
|
|||
|
general public and not just corporate and government security
|
|||
|
concerns.
|
|||
|
|
|||
|
2. PRESERVATION OF CONSTITUTIONAL CIVIL LIBERTIES: The U.S.
|
|||
|
Constitution provides an admirable model for guaranteeing rights and
|
|||
|
protections essential for a democratic society in the 18th century.
|
|||
|
Although the new worlds opened up by Computer and Information
|
|||
|
Technologies may require new interpretations and legislations, the
|
|||
|
freedoms guaranteed in the Bill of Rights must continue no matter what
|
|||
|
the technological method or medium. Steps must be taken to ensure that
|
|||
|
the guarantees of the Constitution and its amendments are extended to
|
|||
|
encompass the new technologies. For example, electronic transmission
|
|||
|
or computer communications must be considered as a form of speech; and
|
|||
|
information distributed on networked computers or other electronic
|
|||
|
forms must be considered a form of publishing (thereby covered by
|
|||
|
freedom of the press). The owner or operator of a computer or
|
|||
|
electronic or telecommunications facility should be held harmless for
|
|||
|
the content of information distributed by users of that facility,
|
|||
|
except as the owner or operator may, by contract, control information
|
|||
|
content. Those who author statements and those who have contractual
|
|||
|
authority to control content shall be the parties singularly
|
|||
|
responsible for such content. Freedom of assembly should be
|
|||
|
automatically extended to computer-based electronic conferencing.
|
|||
|
Search and seizure protections should be fully applicable to
|
|||
|
electronic mail, computerized information and personal computer
|
|||
|
systems.
|
|||
|
|
|||
|
3. RIGHT TO PRIVACY AND THE TECHNOLOGY TO ENSURE IT: Because Computer
|
|||
|
and Information Technologies make data collection, processing and
|
|||
|
manipulation easier, guaranteeing citizen privacy rights becomes
|
|||
|
problematic. Computer and Information Technology make the job of those
|
|||
|
who use data en-masse -- marketing firms, police, private data
|
|||
|
collection firms -- easier. We need to develop policies that control
|
|||
|
what, where, whom and for what reasons data is collected on an
|
|||
|
individual. Institutions that collect data on individuals must be
|
|||
|
responsible for the accuracy of the data they keep and must state how
|
|||
|
the information they obtain will be used and to whom it will be made
|
|||
|
available. Furthermore, we must establish penalties for
|
|||
|
non-compliance with these provisions. Systems should be in place to
|
|||
|
make it easy for individuals to know who has information about them,
|
|||
|
and what that information is.
|
|||
|
|
|||
|
We must ensure that there is no implementation of any technological
|
|||
|
means of tracking individuals in this country through their everyday
|
|||
|
interactions. Technology exists that can ensure that electronic
|
|||
|
transactions are not used to track individuals. Encrypted digital
|
|||
|
keys, for example, provide the technical means to achieve anonymity in
|
|||
|
electronic transactions while avoiding a universal identifier. Where
|
|||
|
government financial assistance is now provided electronically, we
|
|||
|
must ensure that these mechanisms help empower the recipient, and do
|
|||
|
not become sophisticated means of tracking and policing behavior
|
|||
|
(e.g., by tracking what is bought, when it is bought, where it is
|
|||
|
bought, etc.).
|
|||
|
|
|||
|
The technology to effectively ensure private communications is
|
|||
|
currently available. The adoption of a state-of-the-art standard has
|
|||
|
been held up while the government pushes for mandatory "back-doors" so
|
|||
|
that it can monitor communication. (Computer technology is treated
|
|||
|
differently here; for example, we do not legislate how complex a lock
|
|||
|
can be.) We must ensure that personal communication remains private by
|
|||
|
adopting an effective, readily available, de-militarized encryption
|
|||
|
standard.
|
|||
|
|
|||
|
4. COMMUNITY CONTROL OF POLICE AND THEIR TECHNOLOGY: New technologies
|
|||
|
have expanded the ability of police departments to maintain control
|
|||
|
over communities. The Los Angeles Police Department is perhaps an
|
|||
|
extreme example: they have compiled massive databases on
|
|||
|
African-American and Latino youth through "anti-gang" mass
|
|||
|
detainments. These databases are augmented by FBI video and photo
|
|||
|
analysis techniques. "But the real threat of these massive new
|
|||
|
databases and information technologies is... their application on a
|
|||
|
macro scale in the management of a criminalized population."[7] With
|
|||
|
new satellite navigational technology, "we shall soon see police
|
|||
|
departments with the technology to put the equivalent of an electronic
|
|||
|
bracelet on entire social groups."[8] We call for rigorous community
|
|||
|
control of police departments to protect the civil liberties of all
|
|||
|
residents.
|
|||
|
|
|||
|
C. WORK, HEALTH and SAFETY
|
|||
|
|
|||
|
Computer and Information Technologies are having a dramatic effect on
|
|||
|
work. New technologies are forcing a reorganization of work. The
|
|||
|
changes affect millions of workers, and are of the same level and
|
|||
|
magnitude as the Industrial Revolution 150 years ago. The effects have
|
|||
|
been disastrous -- the loss of millions of manufacturing jobs, a fall
|
|||
|
in wages over the past 15 years, the lengthening of the work week for
|
|||
|
those who do have jobs, a rise in poverty and homelessness. Employed
|
|||
|
Americans now work more hours each week that at any time since 1966,
|
|||
|
while at this writing 9.5 million workers in the "official" workforce
|
|||
|
are unemployed, and millions more have given up hope of ever finding
|
|||
|
work.[9] Too often, products and profitability are given priority over
|
|||
|
the needs and health of the workers who produce both. For example,
|
|||
|
research is done on such matters as how humans contaminate the clean
|
|||
|
room process,[10] not on how the chemicals used in chip manufacturing
|
|||
|
poison the handlers. Or new technologies are implemented before
|
|||
|
adequate research is carried out on how they will affect the worker.
|
|||
|
This misplaced emphasis is wrong. This platform calls for:
|
|||
|
|
|||
|
1. GUARANTEED INCOME FOR DISPLACED WORKERS: New technologies mean an
|
|||
|
end to scarcity. Producing goods to meet our needs is a conscious
|
|||
|
human activity. Such production has been and is currently organized
|
|||
|
with specific goals in mind, namely the generation of the greatest
|
|||
|
possible profit for those who own the means of production. We can
|
|||
|
re-organize production.
|
|||
|
|
|||
|
With production for private profit, corporations have implemented
|
|||
|
robotics and computer systems to cut labor costs, primarily through
|
|||
|
the elimination of jobs. Over the last ten years alone, one million
|
|||
|
manufacturing jobs have disappeared in the U.S. Workers at the jobs
|
|||
|
that remain are pressured to take wage and benefits cuts, to "compete"
|
|||
|
in the global labor market made possible by digital telecommunications
|
|||
|
and modern manufacturing techniques. Most new jobs have been created
|
|||
|
in the low-pay service sector. As a result, earnings for most workers
|
|||
|
have been falling.[11] The corporate transfer of jobs to low-wage
|
|||
|
areas, including overseas, affects not only low-skill assembly line
|
|||
|
work or data entry, but also computer programming and data analysis.
|
|||
|
|
|||
|
Wages and benefits must be preserved in the face of automation or
|
|||
|
capital flight. Remaining work can be spread about by shortening the
|
|||
|
work week while maintaining the weekly wage rate. At the same time,
|
|||
|
steps must be taken to acknowledge that the nature of work is
|
|||
|
changing. In the face of the new technologies' ever-increasing
|
|||
|
productivity utilizing fewer and fewer workers, the distribution of
|
|||
|
necessities can no longer be tied to work. We must provide for workers
|
|||
|
who have lost their jobs due to automation or job flight, even if no
|
|||
|
work is available, by guaranteeing a livable income and retraining
|
|||
|
opportunities (see #6 below).
|
|||
|
|
|||
|
2. IMPROVED QUALITY OF WORK THROUGH WORKER CONTROL OF IT: Millions
|
|||
|
work boring, undignified jobs as a direct result of computer and
|
|||
|
information technology. Work is often degraded due to de-skilling,
|
|||
|
made possible by robotics and crude artificial intelligence
|
|||
|
technology; or by job-monitoring, made simple by digital technology.
|
|||
|
(Two-thirds of all workers are monitored as they work.[12]) Workers
|
|||
|
face greater difficulties in organizing to protect their rights.
|
|||
|
Technologies are often foisted on the workers, ignoring the obvious
|
|||
|
contributions the workers can make to the design process. The
|
|||
|
resulting designs further deprive the worker of control over the work
|
|||
|
process. In principle, tools should serve the workers, rather than the
|
|||
|
workers serving the tools.
|
|||
|
|
|||
|
But new technologies could relieve humans of boring or dangerous work.
|
|||
|
Technology enables us to expand the scope of human activity. We could
|
|||
|
create the possibility of "work" becoming leisure. We call for the
|
|||
|
removal of all barriers to labor organizing as the first step toward
|
|||
|
giving workers the power to improve the quality of their work. Workers
|
|||
|
must be protected from intrusive monitoring and the stress that
|
|||
|
accompanies it. We must ensure worker involvement in the design
|
|||
|
process. We must also improve the design of user interfaces so that
|
|||
|
users can make full use of the power of the technology.
|
|||
|
|
|||
|
Furthermore, it is not enough just to "participate" in the design
|
|||
|
process -- worker involvement must correspond with increased control
|
|||
|
over the work process, goals, etc. In other words, we must ensure that
|
|||
|
there is "no participation without power." Computer and Information
|
|||
|
Technologies facilitate peer-to-peer work relationships and the
|
|||
|
organization of work in new and challenging ways. Too often, though,
|
|||
|
in practice we see a tightening of control, with management taking
|
|||
|
more and more direct control over details on the shop floor. We must
|
|||
|
ensure that new technologies improve rather than degrade the nature of
|
|||
|
work.
|
|||
|
|
|||
|
3. EMPHASIS ON HEALTH AND SAFETY: Technologies are often developed
|
|||
|
with little or no concern for their effect on the workers who
|
|||
|
manufacture or use them.
|
|||
|
|
|||
|
Electronics manufacturing uses many toxic chemicals. These chemicals
|
|||
|
are known to cause health problems such as cancer, birth defects and
|
|||
|
immune system disorders. Workers are entitled to a safe working
|
|||
|
environment, and must have the right to refuse unsafe work without
|
|||
|
fear of penalty. Workers have the right to know what chemicals and
|
|||
|
processes they work with and what their effects are. We call for
|
|||
|
increased research into developing safe manufacturing processes. We
|
|||
|
call for increased research into the effects of existing manufacturing
|
|||
|
processes on workers, and increased funding for occupational safety
|
|||
|
and health regulation enforcement.
|
|||
|
|
|||
|
The rate of repetitive motion disorders has risen with the
|
|||
|
introduction of computers in the workplace -- they now account for
|
|||
|
half of all occupational injuries, up from 18% in 1981.[13]
|
|||
|
Musculo-skeletal disorders, eyestrain and stress are commonly
|
|||
|
associated with computer use. There is still no conclusive study on
|
|||
|
the harmful effects of VDT extremely low frequency (ELF) and very low
|
|||
|
frequency (VLF) electromagnetic field emissions.[14] Together these
|
|||
|
occupational health tragedies point to a failure by manufacturers,
|
|||
|
employers and government to adequately research or implement policies
|
|||
|
that protect workers. We call for funding of major studies on the
|
|||
|
effects of computers in the workplace. We call for the immediate
|
|||
|
adoption of ergonomic standards that protect the worker. We must
|
|||
|
ensure that pro-active standards exist before new technologies are put
|
|||
|
in place. Manufacturers and employers should pay now for research and
|
|||
|
worker environment improvement rather than later, after the damage has
|
|||
|
been done, in lawsuits and disability claims. We must ensure that
|
|||
|
worker safety always comes first, not short-sighted, short-term
|
|||
|
profits that blindly overlook future suffering, disabilities and
|
|||
|
millions in medical bills.
|
|||
|
|
|||
|
4. EQUAL OPPORTUNITY TO WORK: Computer and Information Technology
|
|||
|
institutions are overwhelmingly dominated by white males. Programs
|
|||
|
must be adopted to increase the direct participation of
|
|||
|
under-represented groups in the Computer and Information Technology
|
|||
|
industries.
|
|||
|
|
|||
|
5. PROTECTION FOR THE HOMEWORKER: Computer and Information
|
|||
|
Technologies have enabled new patterns of working. "Telecommuting" may
|
|||
|
be preferred by many workers, it may expand opportunities for workers
|
|||
|
who are homebound, and it would reduce the wastefulness of commuting.
|
|||
|
At the same time, homework has traditionally increased the
|
|||
|
exploitation of workers, deprived them of organizing opportunities,
|
|||
|
and hidden them from the protection of health and safety regulations.
|
|||
|
We must guarantee that crimes of the past do not reappear in an
|
|||
|
electronic disguise. Computer and Information Technologies make
|
|||
|
possible new forms of organization for work beyond homework, such as
|
|||
|
neighborhood work centers: common spaces where people who work for
|
|||
|
different enterprises can work from the same facility. Such
|
|||
|
alternative structures should be supported.
|
|||
|
|
|||
|
6. RETRAINING FOR NEW TECHNOLOGIES: As new technologies develop, new
|
|||
|
skills are required to utilize them. Workers are often expected to pay
|
|||
|
for their own training and years of schooling at no cost to the
|
|||
|
employer. Training workers in new skills must be a priority, the cost
|
|||
|
of which must be shared by employers and the government, and not the
|
|||
|
sole responsibility of the worker.
|
|||
|
|
|||
|
D. THE ENVIRONMENT
|
|||
|
|
|||
|
We share one planet. While our understanding of the environment
|
|||
|
increases, and the impact of previous technologies and neglect become
|
|||
|
more and more apparent, too little attention is paid to the effects of
|
|||
|
new technologies, including Computer and Information Technologies, on
|
|||
|
the environment, both physical and cultural. The creation of a global
|
|||
|
sustainable economy must be a priority. This platform calls for:
|
|||
|
|
|||
|
1. ENVIRONMENTALLY SAFE MANUFACTURING: The manufacture of electronics
|
|||
|
technology is among the most unhealthy and profoundly toxic human
|
|||
|
enterprises ever undertaken.[15] The computer and information
|
|||
|
technology industries must be cleaned up. Manufacturers cannot
|
|||
|
continue their destruction of our environment for their profit. They
|
|||
|
must be made to pay the actual cost of production, factoring in
|
|||
|
environmental cleanup costs for manufacturing methods and products
|
|||
|
that are environmentally unsafe. Priority must be placed on developing
|
|||
|
and implementing new manufacturing techniques that are environmentally
|
|||
|
safe, such as the "no-clean" systems which eliminate ozone-shredding
|
|||
|
chlorofluorocarbons (CFCs) from the production of electronic circuit
|
|||
|
boards.[16] We must ensure that these standards are adopted globally,
|
|||
|
to prohibit unsafe technologies from migrating to other countries with
|
|||
|
lax or non-existent environmental protection laws. No manufacturing
|
|||
|
technique should be implemented unless it can be proven to be
|
|||
|
environmentally safe. We must ensure industry's responsiveness to the
|
|||
|
communities (and countries) in which they are located. Neighborhoods
|
|||
|
and countries must participate in the planning process, and must be
|
|||
|
informed of the environmental consequences of the industries that
|
|||
|
surround them. They must have the right to shut down an enterprise or
|
|||
|
require the enterprise to cleanup or change their manufacturing
|
|||
|
processes.
|
|||
|
|
|||
|
2. PLANNING FOR DISPOSAL OR RE-USE OF NEW PRODUCTS: As new
|
|||
|
technologies become commodities with a finite life-cycle, new
|
|||
|
questions loom as to what happens to them when they are discarded.
|
|||
|
Little is known about what happens to these products when they hit the
|
|||
|
landfill. We must ensure that manufacturers and designers include
|
|||
|
recycling and/or disposal in the design and distribution of their
|
|||
|
products. Manufacturers must be responsible for the disposal of
|
|||
|
commodities once their usefulness is exhausted. Manufacturers must
|
|||
|
make every effort to ensure longevity and re-use of equipment. For
|
|||
|
example, product specifications might be made public after a specified
|
|||
|
period of time so that future users could continue to find support for
|
|||
|
their systems. Or manufacturers might be responsible for ensuring that
|
|||
|
spare parts continue to be available after a product is no longer
|
|||
|
manufactured. Manufacturers could sponsor reclamation projects to
|
|||
|
strip discarded systems and utilize the components for training
|
|||
|
projects or new products, or they could facilitate getting old
|
|||
|
equipment to people who can use it.
|
|||
|
|
|||
|
3. RECLAMATION OF THE CULTURAL ENVIRONMENT AS PUBLIC SPACE: We live
|
|||
|
not only in a natural environment, but also in a cultural environment.
|
|||
|
"The cultural environment is the system of stories and images that
|
|||
|
cultivates much of who we are, what we think, what we do, and how we
|
|||
|
conduct our affairs. Until recently, it was primarily hand-crafted,
|
|||
|
home-made, community-inspired. It is that no longer."[17] Computers
|
|||
|
and information technologies have facilitated a transformation so that
|
|||
|
our culture is taken and then sold back to us via a media that is
|
|||
|
dominated by a handful of corporations. At the same time, new
|
|||
|
technologies promise new opportunities for creativity, and new
|
|||
|
opportunities for reaching specific audiences. But both older (e.g.,
|
|||
|
book and newspaper publishing) and newer (e.g., cable television and
|
|||
|
computer games) media throughout the world are controlled by the same
|
|||
|
multi-national corporations. We advocate computer and information
|
|||
|
technology that fights the commodification of culture and nurtures and
|
|||
|
protects diversity. This is only possible with a rigorous public
|
|||
|
support for production and distribution of culture. We must use new
|
|||
|
technologies to ensure the diverse points of view that are necessary
|
|||
|
for a healthy society. We must ensure a media that is responsive to
|
|||
|
the needs of the entire population. We must ensure true debate on
|
|||
|
issues of importance to our communities. We must ensure that our
|
|||
|
multi-faceted creativity has access to an audience. And we must also
|
|||
|
recognize that in many cultural instances computer and information
|
|||
|
technology tools are intrusive and inappropriate.[18]
|
|||
|
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
E. INTERNATIONAL COOPERATION
|
|||
|
|
|||
|
Historically, information flow around the world has tended to be
|
|||
|
one-way, and technology transfer from developed countries to
|
|||
|
underdeveloped countries has been restricted. These policies have
|
|||
|
reinforced the dependency of underdeveloped countries on the U.S.,
|
|||
|
Japan and Western Europe. As international competition for markets and
|
|||
|
resources intensifies, "national competitiveness" has become a
|
|||
|
negative driving consideration in technology policy. This platform
|
|||
|
calls for:
|
|||
|
|
|||
|
1. REPLACEMENT OF "NATIONAL COMPETITIVENESS" WITH "GLOBAL
|
|||
|
COOPERATION": The most popular rationale for investing in high
|
|||
|
technology in the United States is "national competitiveness." This is
|
|||
|
an inappropriate rhetoric around which to organize technology policy.
|
|||
|
It ignores the fact that the largest economic enterprises in the world
|
|||
|
today are international, not national. "National competitiveness" is
|
|||
|
also inappropriate in a world of increasing and accelerating global
|
|||
|
interdependence and a detailed division of labor that now routinely
|
|||
|
takes in the entire planet's workforce. Finally, "national
|
|||
|
competitiveness" is inappropriate in a world in which two-thirds of
|
|||
|
the world's population lives in abject poverty and environmental
|
|||
|
collapse -- the rhetoric of "national competitiveness" should be
|
|||
|
replaced by a rhetoric of "global cooperative development."
|
|||
|
|
|||
|
2. GLOBAL DISTRIBUTION OF TECHNICAL WEALTH: The global division of
|
|||
|
labor is fostering a "brain drain" of scientists and engineers,
|
|||
|
transferring badly-needed expertise from the developing world to the
|
|||
|
industrialized world. Fully 40% of the engineering graduate students
|
|||
|
in American universities are from foreign countries, typically from
|
|||
|
countries with little or no advanced technological infrastructure. A
|
|||
|
large majority of these graduate students stay in the U.S. when they
|
|||
|
complete their studies. American immigration laws also favor
|
|||
|
immigrants with advanced scientific or technical education. This
|
|||
|
intensifies the disparity between the advanced countries and those
|
|||
|
with widespread poverty. This concentration of technical expertise
|
|||
|
reinforces a global hierarchy and dependence. Expertise on questions
|
|||
|
of international import, such as global warming, toxic dumping, acid
|
|||
|
rain, and protection of genetic diversity becomes the exclusive domain
|
|||
|
of the developed countries. With so much of the world's scientific
|
|||
|
and technical expertise located in the monoculture of the
|
|||
|
industrialized world, the developing world has the disadvantage not
|
|||
|
only of meager financial resources and dependence on foreign capital,
|
|||
|
but the added disadvantage of living under the technical domination of
|
|||
|
the rich countries. This platform calls for a conscious policy of
|
|||
|
distributing scientific and technical talent around the world. For
|
|||
|
example, incentives can be given to encourage emigration to countries
|
|||
|
in need of technological talent.
|
|||
|
|
|||
|
3. AN END TO THE WASTE OF TECHNICAL RESOURCES EMBODIED IN THE
|
|||
|
INTERNATIONAL ARMS TRADE: The world currently spends about $1 trillion
|
|||
|
annually on weapons. This is a massive transfer of wealth to
|
|||
|
arms-producing countries, and especially the United States, the
|
|||
|
world's largest arms exporting nation.[19] Weapons of interest to all
|
|||
|
countries are increasingly high tech, so a continuing disproportion of
|
|||
|
international investments in high technology will be in weapons
|
|||
|
systems. Weapons sales not only increase international tensions and
|
|||
|
the likelihood of war, but they also reinforce authoritarian regimes,
|
|||
|
deter democratic reform, support the abuse of human rights, divert
|
|||
|
critical resources from urgent problems of human and environmental
|
|||
|
need, and continue the accelerating disparity between rich and poor
|
|||
|
nations. We call for a complete and permanent dismantling of the
|
|||
|
global arms market.
|
|||
|
|
|||
|
4. A NEW INTERNATIONAL INFORMATION ORDER: The growing disparity
|
|||
|
between "information rich" and "information poor" is by no means
|
|||
|
limited to the U.S. Disparities within industrialized countries are
|
|||
|
dwarfed by international disparities between the industrialized
|
|||
|
countries and the developing world. A global telecommunications regime
|
|||
|
has developed that favors the rich over the poor, and the gap is
|
|||
|
growing steadily. As a simple example, rich countries are able to
|
|||
|
deploy and use space-based technologies such as earth-surveillance
|
|||
|
satellites and microwave telecommunications links to gather
|
|||
|
intelligence and distribute information all over the globe. The
|
|||
|
concentration of information power in single countries is even more
|
|||
|
advanced when viewed internationally. We call for the placement of
|
|||
|
international information collection and distribution under
|
|||
|
international control.
|
|||
|
|
|||
|
5. EQUITABLE INTERNATIONAL DIVISION OF LABOR: Improved communication
|
|||
|
and coordination made possible by Computer and Information
|
|||
|
Technologies has accelerated the development of a new global division
|
|||
|
of labor where dirty manufacturing industries are moved to developing
|
|||
|
countries, and "clean" knowledge industries are promoted in the
|
|||
|
developed countries. This pattern of development ensures that
|
|||
|
underdeveloped countries remain underdeveloped and turns them into
|
|||
|
environmental wastelands. We must ensure a truly new world order that
|
|||
|
equitably distributes work, and ends the destruction and enforced
|
|||
|
underdevelopment of vast sections of the world's population.
|
|||
|
|
|||
|
F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
|
|||
|
|
|||
|
Computer and Information Technologies were born of the military and to
|
|||
|
this day are profoundly influenced by the military. People often talk
|
|||
|
of the "trickle down" or "spin-off" effect, in which money spent on
|
|||
|
military applications yields technology for general, non-military
|
|||
|
applications. This makes little sense when the military pursues absurd
|
|||
|
or irrelevant technology such as computer chips that will survive a
|
|||
|
nuclear war. There are very few, if any, cases of military technology
|
|||
|
producing tangible commercial breakthroughs. At the same time, various
|
|||
|
studies have shown that money invested in non-military programs
|
|||
|
creates more jobs than money invested in military hardware. Also, new
|
|||
|
technologies are developed with little or no public discussion as to
|
|||
|
their social consequences. Technologies are developed, and then their
|
|||
|
developers go in search of problems for their technology to solve.
|
|||
|
Pressing social needs are neglected, while elite debates about
|
|||
|
technology focus on military applications or consumer devices like
|
|||
|
high definition television (HDTV). Or pressing social problems are
|
|||
|
approached as "technical" problems, fixable by new or better
|
|||
|
technology. This platform calls for:
|
|||
|
|
|||
|
1. NEW EMPHASIS IN TECHNICAL RESEARCH PRIORITIES: Current research
|
|||
|
planning is either in private hands, or closely controlled by
|
|||
|
government agencies. As a result, research priorities are often
|
|||
|
shielded from public discussion or even knowledge. New technologies
|
|||
|
are often developed as "tools looking for uses, means looking for
|
|||
|
ends"[20] or to serve destructive rather than constructive goals. HDTV
|
|||
|
and the Strategic Defense Initiative (SDI) are examples. Substantial
|
|||
|
university research on new technologies is still financed and
|
|||
|
controlled by the Department of Defense. While military-based research
|
|||
|
has occasionally led to inventions which were of general use, this
|
|||
|
effect has been mostly coincidental, and the gap between the interests
|
|||
|
of military research and the needs of society has widened to the point
|
|||
|
that even such coincidental "public good" from military controlled
|
|||
|
technology research now seems unlikely. These misguided research
|
|||
|
priorities not only waste financial resources, but drain away the
|
|||
|
intellectual resources of the scientific community from pressing
|
|||
|
social problems where new technological research might be particularly
|
|||
|
useful such as in the area of the environment. We must ensure that
|
|||
|
Computer and Information Technology research is problem-driven and is
|
|||
|
under the control of the people it will affect. We must ensure that
|
|||
|
new technologies will not be harmful to humans or the environment. We
|
|||
|
must ensure that human and social needs are given priority, as opposed
|
|||
|
to support for military or police programs. We must ensure that
|
|||
|
technical research is directed toward problems which have a realistic
|
|||
|
chance of being solved technically rather than blindly seeking
|
|||
|
technical solutions for problems which ought to be addressed by other
|
|||
|
means.
|
|||
|
|
|||
|
2. CONVERSION TO A PEACETIME ECONOMY: There is no justification for
|
|||
|
the power the Pentagon holds over this country, particularly in light
|
|||
|
of recent international developments. We must dismantle our dependency
|
|||
|
on military programs. We must realign our budget priorities to focus
|
|||
|
on social problems rather than on exaggerated military threats. The
|
|||
|
released research and development monies should be redirected toward
|
|||
|
solving pressing social and environmental problems. We must move
|
|||
|
towards the goal of the elimination of the international market in
|
|||
|
weapons. Job re-training in socially useful skills must become a
|
|||
|
priority.
|
|||
|
|
|||
|
3. SOCIALLY RESPONSIBLE ENGINEERING AND SCIENCE: "Proposed
|
|||
|
technological projects should be closely examined to reveal the covert
|
|||
|
political conditions and artifact/ideas their making would entail. It
|
|||
|
is especially important for engineers and technical professionals
|
|||
|
whose wonderful creativity is often accompanied by appalling
|
|||
|
narrow-mindedness. The education of engineers ought to prepare them to
|
|||
|
evaluate the kinds of political contexts, political ideas, political
|
|||
|
arguments and political consequences involved in their work."[21] To
|
|||
|
this list we can add developing an appreciation for the
|
|||
|
interconnectedness of the environments -- the natural, social and
|
|||
|
cultural -- we work in. We call for an increased emphasis on training
|
|||
|
in social education in the engineering and science departments of our
|
|||
|
schools and universities, public and private research laboratories and
|
|||
|
manufacturing and development facilities in order to meet these goals.
|
|||
|
Engineers must be exposed to the social impact of their work. This
|
|||
|
could be done through work-study projects or special fellowships. We
|
|||
|
need to also expand the body of people who "can do technology", that
|
|||
|
is, not only "humanize the hacker", but "hackerize the humanist" or
|
|||
|
"engineerize the worker."
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.58
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|