853 lines
41 KiB
Plaintext
853 lines
41 KiB
Plaintext
Computer underground Digest Wed July 20, 1994 Volume 6 : Issue 66
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copper Ionizer: Ephram Shrustleau
|
|
|
|
CONTENTS, #6.66 (Wed, July 20, 1994)
|
|
|
|
File 1--Roger Clarke on authoritarian IT (fwd)
|
|
File 2--cDc Global Domination Update #15
|
|
File 3--Privacy at risk: Educational Records
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Mon, 23 May 1994 13:33:48 -0400 (EDT)
|
|
From: Stanton McCandlish <mech@EFF.ORG>
|
|
Subject: File 1--Roger Clarke on authoritarian IT (fwd)
|
|
|
|
From--Phil Agre <pagre@weber.ucsd.edu>
|
|
Subject--Roger Clarke on authoritarian IT
|
|
|
|
INFORMATION TECHNOLOGY
|
|
WEAPON OF AUTHORITARIANISM OR TOOL OF DEMOCRACY?
|
|
|
|
|
|
Paper being presented at the IFIP World Congress, Hamburg, 31 August 1994
|
|
|
|
|
|
Roger Clarke
|
|
Department of Commerce
|
|
Australian National University
|
|
Canberra ACT 0200
|
|
Roger.Clarke@anu.edu.au
|
|
|
|
|
|
Strong tendencies exist to apply information technology to support
|
|
centralist, authoritarian world views. It is argued that alternative
|
|
architectures can be readily created, which are more attuned to the
|
|
openness and freedoms which are supposed to be the hallmarks of democratic
|
|
government. It is questioned whether authoritarianism will be capable of
|
|
surviving the complexities, dynamism and widely distributed power which are
|
|
features of the emergent information societies.
|
|
|
|
Keyword Codes: H.1, J.1, K.4
|
|
Keywords: information systems; administrative data processing;
|
|
computers and society
|
|
|
|
|
|
1. INTRODUCTION
|
|
|
|
The genre of 'anti-utopian' novels described futures repugnant to humanity.
|
|
The classic image of an information-rich government dominating citizens'
|
|
thoughts and actions is associated with Zamyatin's 'We' (1922) and Orwell's
|
|
'1984' (1948), but the technological basis of the surveillance culture had
|
|
been established as early as the late nineteenth century by Jeremy
|
|
Bentham's designs for a model prison, incorporating the all-seeing and
|
|
ubiquitous 'panopticon' (1791). Foucault (1975) argued that the prison
|
|
metaphor was the leitmotiv of authoritarian society. Bradbury's
|
|
'Fahrenheit 451' (1953) and Umberto Eco's 'The Name of the Rose' (1980)
|
|
speculated on the process and implications of denying information to the
|
|
public.=20
|
|
|
|
Art anticipated reality. Information technology (IT) is now being
|
|
systematically applied to public administration in ways consistent with the
|
|
anti-utopian nightmare. This paper's purpose is to review the
|
|
authoritarian model as a basis for applying IT in government, and to
|
|
champion an alternative, democratic model of IT use.
|
|
|
|
|
|
2. AUTHORITARIANISM'S UNDERLYING ASSUMPTIONS AND VALUES
|
|
|
|
An authoritarian society favours obedience to Authority over individual
|
|
freedoms, to the extent of demanding subservience of the individual to the
|
|
State. The notion clusters with tyranny (the cruel exercise of power),
|
|
despotism and dictatorship (the exercise of absolute power),
|
|
totalitarianism (single-party government) and fascism (a usually savage
|
|
blend of authoritarianism with nationalism).
|
|
|
|
Authoritarianism is associated with logical positivist and utilitarian
|
|
philosophies. These perspectives place very high value on rational social
|
|
engineering, law and order, and resource efficiency. The populace is
|
|
perceived as unsophisticated, uneducated, unreliable, chaotic, and/or
|
|
incorrigibly venal and immoral. For their own good, the organised State
|
|
must impose control on the unruly people.
|
|
|
|
A further assumption of the authoritarian perspective is that there exist
|
|
humans with a level of both intelligence and morality superior to the
|
|
common herd. In different ideologies, their innate superiority derives
|
|
from different sources, such as the divine right of kings, wealth, force of
|
|
arms, mystical power, what Machiavelli called virt=FA, wisdom, intellectual
|
|
merit, technical capability, political cunning, demagogery, and/or public
|
|
popularity. These superior humans are accepted as being the appropriate
|
|
ones to make judgements on behalf of their society, with a minimum of
|
|
checks and balances. They do this through social engineering; that is to
|
|
say by organising and re-organising society in what they consider the
|
|
rational way of achieving order and efficiency, and hence of delivering
|
|
material well-being, and therefore spiritual happiness, for all.
|
|
|
|
|
|
3. THE AUTHORITARIAN MODEL OF I.T. APPLICATIONS
|
|
|
|
Under an authoritarian regime, the populace must be managed. Tools and
|
|
techniques that have proven effective in managing raw materials,
|
|
manufactured goods and animals, can be applied to humans too. A unique
|
|
identifier for each person, and its general use by government agencies and
|
|
other organisations which conduct transactions with people, are highly
|
|
desirable tools for efficient social administration. Public administration
|
|
systems must be designed to exercise control over people, in all of their
|
|
various roles. There may be scope for at least some semblance of choice by
|
|
individuals, but employees need to operate within a corporate culture,
|
|
consumer demand needs to be statistically predictable, and citizens'
|
|
freedom of choice needs to be constrained, lest unworkable parliaments
|
|
eventuate, with too many splinter parties, independents and conscience
|
|
votes.
|
|
|
|
It is only logical that an authoritarian society should recognise the
|
|
benefits of a unary executive branch, in which the boundaries between
|
|
agencies are porous. In this way, data can flow freely (such that
|
|
transaction data and client histories can be cross-verified, and changes of
|
|
address and status cross-notified), and systems can be tightly integrated
|
|
and efficient (and hence misdeameanours by people in one arena, such as
|
|
traffic fines, can be readily punished through another, such as denial of a
|
|
marriage licence, permission to move apartments, or approval for travel).
|
|
|
|
Authoritarian IT-based systems use a centralised architecture. Elements
|
|
may be physically dispersed, however, to achieve efficiency in data
|
|
transmission, and to provide resilience against localised threats such as
|
|
natural disasters and sabotage by dissidents. The general shape of such
|
|
systems is that provided by cyberneticians: a cascade of control loops,
|
|
culminating in a master-controller. In authoritarian regimes, information
|
|
privacy and data security play important roles. These have little to do
|
|
with the protection of people, however, but rather serve to protect the
|
|
integrity of data, and of the system, and to legitimate the repressive
|
|
system through the provision of nominal rights for data subjects.
|
|
|
|
=46or discussions of the authoritarian application of technology in general,
|
|
see Ellul (1964) and Packard (1964), and of IT in particular, see Rule
|
|
(1974), Weizenbaum (1976), Kling (1978), Rule et al. (1980), Burnham
|
|
(1983), OTA (1986), Laudon (1986), Clarke (1988), Davies (1992) and
|
|
Ronfeldt (1992, pp.277-287).
|
|
|
|
|
|
4. INSTANCES OF AUTHORITARIAN APPLICATION OF I.T.
|
|
|
|
The reader is by now (hopefully) annoyed by the extent to which the
|
|
foregoing description has been a caricature, hyperbole, a 'straw man'
|
|
designed to be easily criticised. However there are manifold instances of
|
|
just these features in IT-based public administration systems, both those
|
|
in operation and being conceived, in countries throughout the world. In
|
|
North America, whose use of IT has been well ahead of that in most other
|
|
countries, a 'national data center' was proposed as early as 1966.
|
|
Elements of it have emerged, such as the widespread use of the Social
|
|
Security Number (SSN) as a unique identifier, proposals for a health id
|
|
card, and the all-but uncontrolled use of computer matching and profiling.
|
|
Some protagonists in the current debates surrounding the national
|
|
information infrastructure (NII) are seeking a network consistent with
|
|
authoritarian control; for example, by insisting on use only of those
|
|
cryptographic techniques which are 'crackable' by national security
|
|
agencies.
|
|
|
|
Australia has followed the North American tendency. It flirted with a
|
|
national identification scheme in the late 1980s (Greenleaf & Nolan 1986,
|
|
Clarke 1987, Graham 1990). When that was overwhelmingly rejected by the
|
|
populace, senior executives in public sector agencies 'went underground'.
|
|
They have variously gained Parliamentary support for, and smuggled through,
|
|
a series of measures whose cumulative impact is in some ways already more
|
|
emphatic than the 'Australia Card' would have been (Clarke 1992).
|
|
|
|
The cultures of many Asian nations are well-suited to authoritarian
|
|
regimes. There are elements of high-social-efficiency applications of IT
|
|
in such nations as Singapore. Busy Asian countries have shown especial
|
|
interest in vehicle monitoring systems. Thailand and the Phillipines
|
|
appear eager to act as laboratories for United States corporations
|
|
developing identification and surveillance technologies. Under China's
|
|
strongly authoritarian political system, it is unlikely that IT will be
|
|
applied in any way other than to bolster existing relationships between its
|
|
citizens and the State.
|
|
|
|
In Western Europe, Scandinavian countries lead the way with their social
|
|
welfare systems and the heavy dependence of their citizens on the State.
|
|
Denmark's citizen register is a model for authoritarian regimes everywhere,
|
|
and a looming export success. Other countries are keenly adopting
|
|
proposals to use IT to constrain the populace, by such means as
|
|
identification cards (variously for football fans, patients, and the public
|
|
in general), and the integration of data systems between government
|
|
agencies, and between countries within and beyond the European Community.
|
|
|
|
In Central and Eastern Europe, there was an expectation that democratic,
|
|
free enterprise systems would arise to replace the authoritarianism of the
|
|
collapsed communist regimes. In practice, few of those countries have ever
|
|
known freedom of choice, and genuine democracy (as distinct from variants
|
|
of authoritarianism referred to in local lexicons as 'democracy') is not on
|
|
the agenda of many of these countries. Their focus is on economic growth,
|
|
rationalist solutions to economic and social problems, and centralism. IT
|
|
is seen as a tool of authoritarianism, not of democracy; of centralised
|
|
power, not of a pluralist body politic; and of control, not of freedom.
|
|
|
|
It can come as no surprise that public administration systems are being
|
|
conceived in these ways. Applications of all kinds are developed by
|
|
well-trained and self-confident engineers, using unequivocally rationalist
|
|
techniques. System design comprises the expression of relevant parts of
|
|
the present and near-future world in a formal model which has the important
|
|
characteristic of being 'mappable' onto a machine. The application's users
|
|
and 'usees' (i.e. the people affected by it) are treated as objects to be
|
|
modelled, not as stakeholders with interests in the process and its
|
|
outcomes. Human language is treated as though it were an (imprecise)
|
|
formalism, rather than a means of interaction among people. The designers
|
|
fail to notice that their formalisms cannot reflect the complexities,
|
|
ambiguities and dynamism inherent in social systems, and the negotiation
|
|
and accommodation processes which take place among humans and social groups
|
|
(Clarke 1992b, Ciborra 1992, Agre 1994, Gronlund 1994).
|
|
|
|
Hence the problems highlighted in this paper are to a considerable degree
|
|
inherent in the techniques currently used to develop IT applications
|
|
generally. Nonetheless, their greatest impact on people's freedom is by
|
|
way of public administration systems.
|
|
|
|
|
|
5. THE DEMOCRATIC ALTERNATIVE
|
|
|
|
The technological determinism notion has been applied to IT. In
|
|
particular, IT has been accused of being inherently de-humanising,
|
|
centralist and authoritarian (e.g. Roszak 1986). The standpoint adopted by
|
|
this author is that technology is essentially morally 'ambivalent' (i.e. it
|
|
has potential applications and potential impacts variously supportive of,
|
|
and inimical to, any particular social value - Ellul, 1990). IT may make
|
|
some paths easier than others, but the choice is made not by blind fate,
|
|
but by politicians, government executives, and, not least, IT
|
|
professionals.
|
|
|
|
The alternative political philosophy to authoritarianism is democracy,
|
|
popularly expressed as 'government of the people by the people for the
|
|
people', and commonly implemented through representatives chosen regularly
|
|
and frequently by the combined and equal vote of all competent adults. The
|
|
democratic ideal derives from the assumption that no class of people has
|
|
the right to dominate other classes. It reflects the renaissance
|
|
conception of mankind, whereby each individual should have the opportunity
|
|
to access and interpret for themselves the ideas of other people and of
|
|
Gods; and, in more modern terms, should have the scope for
|
|
self-determination and self-fulfilment.
|
|
|
|
Early computer technology may indeed have encouraged centralisation, but
|
|
since the marketplace debut of integrated circuitry and the mini-computer
|
|
about 1970, modern IT has been readily applied in the service of democracy.
|
|
Open IT-based systems involve nodes which are 'peers', with equal
|
|
authority in respect of particular functions. For example, in a national
|
|
health network, each node might take responsibility for all processing and
|
|
storage relating to a particular aspect of the system's functionality (e.g.
|
|
support of a particular regional clinic, or epidemiological research into a
|
|
particular class of diseases), and have special rights recognised by all
|
|
other nodes in that regard (e.g. the right of access, respectively, to
|
|
identified data relating to specific patients, and to identifiable data
|
|
relating to particular diseases and procedures). Similarly, particular
|
|
kinds of data held at each node (e.g. data identifying a patient) might be
|
|
recognised as being controlled by that node and require special authority
|
|
before it could be released to any other node.
|
|
|
|
One form of democratic topology is the unconstrained network, with maximum
|
|
inter-connectivity, and dominion by each node over the services it
|
|
provides. Another model is a variant on simple-minded cybernetics: a
|
|
cascade of controllers which folds around, such that the ultimately
|
|
controlled (the populace) are also the ultimate controllers (the voters).
|
|
Before modern communications became available, the only practicable
|
|
democratic mechanism for geographically large countries was periodic
|
|
(typically, 3- or 4-yearly) election of representatives. In information
|
|
societies of the very near future, however, major policy decisions can be
|
|
instigated, formulated, and decided by direct democracy. Voters may choose
|
|
to delegate the articulation of broad policies to their elected
|
|
representatives, but even this can be subject to the over-riding of
|
|
unpopular decisions, and the removal of representatives the electorate
|
|
considers are not performing their functions.
|
|
|
|
Hierarchical topologies serve authoritarianism, whereas non-hierarchical
|
|
ones are consistent with a free society. Access to data under the control
|
|
of each node must be restricted, until and unless, via due process,
|
|
disclosure is justified in fulfilment of some higher interest. Such
|
|
topologies provide not only robustness and adaptability, but also
|
|
integrity, because clients can trust them, and there is a lower risk of
|
|
loss of quality (through suspicion and uncooperativeness), and of sabotage
|
|
(through active attempts to mislead, and direct, destructive action).
|
|
|
|
|
|
6. INSTANCES OF DEMOCRATIC APPLICATION OF I.T.
|
|
|
|
Is this image of democratic computing just a caricature too? Possibly, but
|
|
examples exist. Local Area Network architectures are inverting the old
|
|
notion of centralist processors accessed by terminals. The
|
|
now-conventional names reflect the fact that 'client' workstations demand
|
|
data and processing from 'servers': the user's device is in control, and
|
|
the central facility performs at its bidding. In wide-area networking
|
|
also, peer-to-peer protocols are rivalling and may be progressively
|
|
replacing the older, hierarchical or 'star' configurations. At the level
|
|
of inter-networking, the topology of the world-wide TCP/IP-based Internet
|
|
is essentially flat, the systems software is highly distributed, the
|
|
redundancy is very high, and its robustness, its resilience and its
|
|
capacity to resist authoritarian governments are therefore all of a high
|
|
order.
|
|
|
|
The Internet's technical features have resulted in a culture very different
|
|
from that on hierarchical nets. It provides a space in which imaginations
|
|
have substantial freedoms. Some people use those freedoms to create new
|
|
services and products; others to experiment with self-expression and
|
|
group-experiences; some as a 'cybernetic' analogue to psychotropic drugs;
|
|
and some just to distribute pornography or racist materials. Nor are the
|
|
boundaries between these activities always clear-cut.
|
|
|
|
It seems ironical that the Internet was sponsored by the United States
|
|
military complex, but the irony is more apparent than real. Systems which
|
|
support military operations cannot risk the fragility of centralisation,
|
|
but rather demand robustness and resilience, and therefore redundancy.
|
|
Moreover, aero-space-defense R. & D. is dispersed across vast numbers of
|
|
universities and private sector research laboratories. It then seeks to
|
|
complement competition by collaborative interaction among individual
|
|
researchers and among potential research partners. To retain its
|
|
technological and intellectual leadership, it was essential that the U.S.A.
|
|
avoid the temptation to sustain centralised, authoritarian topologies; and
|
|
to its credit it knowingly spawned a dynamic, world-wide, democratic
|
|
network laboratory.
|
|
|
|
|
|
7. A SYNTHESIS
|
|
|
|
This paper has considered the extremes of authoritarianism and democracy.
|
|
Clearly, any society will demand not only freedoms, but also protections
|
|
against those who use those freedoms to harm others. Naive authoritarian
|
|
models are doomed to fail, because they deny freedoms; and naive
|
|
democratic models are doomed to fail too, because they deny protections.
|
|
Ronfeldt concluded that IT-based public administration (which he calls
|
|
'cyberocracy') "far from favoring democacy or totalitarianism ... may
|
|
facilitate more advanced forms of both" (1990, p.283). How should new
|
|
'cyberocracies' be designed, and how should existing public administration
|
|
systems be adapted to exploit the new opportunities, while balancing the
|
|
needs for control and freedom?
|
|
|
|
Authoritarian aspects of schemes could be justifiable in some societies as
|
|
interim measures. Lenin and then Stalin judged that the country's large
|
|
peasant population, and its institutions, were insufficiently mature for
|
|
immediate implementation of the full Communist platform. Unfortunately the
|
|
repression inherent in their interim arrangements became ingrained, and was
|
|
only relieved by counter-revolution. Authoritarian elements in public
|
|
administration should therefore be not only justified, but also
|
|
demonstrably interim, i.e. the means must be shown whereby they will be
|
|
replaced, by evolutionary processes, with alternative mechanisms consistent
|
|
with democratic principles.
|
|
|
|
In any case, the feasibility of grafting democratic features onto an
|
|
essentially hierarchical model must be regarded as very slim. All power
|
|
vests in the centre, and any softening of the system's features is by gift
|
|
of the powerful. Moreover, the system can be manipulated by the powerful
|
|
(for example, by monitoring nominally confidential communications), and
|
|
privileges can be withdrawn by the powerful. No freedom-loving populace
|
|
could regard such a system as credible, and would therefore only submit to
|
|
it as a result of coercion.
|
|
|
|
Is the alternative feasible: to graft control mechanisms onto an
|
|
essentially open model? Communication channels can still be tapped and
|
|
storage devices searched (under warrant). Evidence arising from such
|
|
interceptions and searches can still be presented in a court of law.
|
|
Certain actions and uses of IT can be expressly made illegal. The ex post
|
|
facto controls can therefore still function within open, democratically
|
|
conceived public administration. Toffler distinguished this form of IT
|
|
application by coining the term 'practopia' (1980, p.368).
|
|
|
|
What is not so simple to contrive within open systems is effective
|
|
real-time monitoring and control: Foucault's 'prison' is readily
|
|
implemented using hierarchical topologies, but if the nodes and arcs of
|
|
networks are not all under the control of Authority, then preventive
|
|
controls become much harder to bring to fruition. That, then, is the
|
|
essential battleground between authoritarian and democratic models of IT:
|
|
should someone or some class of people, and in particular politicians and
|
|
senior public sector executives, be permitted to have the power to prevent
|
|
transgressions? Because it is that kind of control over the public which
|
|
is at the very heart of the anti-utopian nightmare.
|
|
|
|
|
|
8. CONCLUSIONS
|
|
|
|
Power does not need to be explicitly and consciously granted to public
|
|
administrators by the voting public, or by their elected representatives.
|
|
It can accrue, slowly and gently, through developments in IT, through new
|
|
applications of established techniques, through the gradual 'creep' of
|
|
existing schemes into new functions, and through seemingly harmless
|
|
refinements to statutes. As frogs are reputed to do, a society might
|
|
resist being put into boiling water, yet be lulled to sleep in warm water
|
|
slowly brought to the boil.
|
|
|
|
This paper commenced by referring to early literary premonitions of
|
|
authoritarian applications of IT. The fictional literature has undergone a
|
|
transition. The turning-point was John Brunner's 'The Shockwave Rider'
|
|
(1975), which explicitly owed a debt to Alvin Toffler's 'Future Shock'
|
|
(1971). For much of the novel, the hero appears to be putting up a brave
|
|
fight against inevitable defeat by the State. By turning the power of the
|
|
net against its sponsors, the hero discovers pockets of surviving
|
|
resistance, and galvanises the latent opposition to the State. Unlike
|
|
anti-utopian novels, the book ends on an ambiguous, but (from the
|
|
humanistic perspective) an optimistic note.
|
|
|
|
Subsequent novels have adopted a quite different pattern. In such works as
|
|
William Gibson's 'Neuromancer' (1984), and the 'cyberpunk' genre it spawned
|
|
(see Sterling 1986), people are prosthetic-enhanced cyborgs, plug directly
|
|
into the net, and induce their 'highs' through a mix of drugs and
|
|
cyberspace. More importantly for the argument being pursued here, national
|
|
and regional governments exercise very little power. The hypercorps
|
|
(successors to the transnational corporations) are responsible for
|
|
organised economic activity, the majority of the net, and a great deal of
|
|
the information. Outside this limited, polite society skulk large numbers
|
|
of people, in communities in which formal law and order have broken down
|
|
and tribal patterns have re-emerged. Officialdom has not been able to
|
|
sustain the myth that it was in control; society has become ungovernable.
|
|
|
|
Little echoes of these patterns are evident in contemporary societies. The
|
|
use of the Internet for anti-social purposes is proving much harder to
|
|
control than similar behaviour using the telephone network. IT contributed
|
|
significantly to the breakdown of the Soviet Union because, in addition to
|
|
improving production effectiveness and efficiency, PCs delivered 'samizdat'
|
|
- the means for cheap reproduction of dissident newsletters. Lies that had
|
|
been lived for seven decades could not withstand the heat generated by
|
|
eager users of a potentially democratising technology. And that was before
|
|
inter-networking and computer-mediated communications had achieved any
|
|
degree of sophistication.
|
|
|
|
IT may be applied to public administration in ways consistent with
|
|
authoritarianism or with democracy. Proponents of hierarchical structures
|
|
and social engineering, chief amongst them senior public sector executives,
|
|
must at the very least appreciate the limits of tolerance of authoritarian
|
|
measures within their society. Preferably, governments should ensure that
|
|
social administration schemes are not emphatically centralised and
|
|
incapable of adaptation towards more liberal patterns. And most desirably,
|
|
public servants, governments and voters themselves, should be exploiting
|
|
the opportunities for more effective democracy which are being created by
|
|
information technology.
|
|
|
|
|
|
References
|
|
|
|
Agre P. (1994) 'Design for Democracy' Working Paper, Department of
|
|
Communication, Uni. of California at San Diego (February 1994)
|
|
|
|
Beniger J.R. (1986) 'The Control Revolution: Technological and
|
|
Economic Origins of the Information Society' Harvard Uni. Press, Cambridge
|
|
MA, 1986
|
|
|
|
Bentham J. (1791) 'Panopticon; or, the Inspection House', London, 1791
|
|
|
|
Bradbury R. (1953) 'Fahrenheit 451 ... The Temperature at Which Books Burn'
|
|
Ballantine Books, 1953
|
|
|
|
Brunner J. (1975) 'The Shockwave Rider' Ballantine, 1975
|
|
|
|
Burnham D. (1983) 'The Rise of the Computer State' Random House, New
|
|
York, 1983
|
|
|
|
Ciborra C. (1992) 'From Thinking to Tinkering: The Grassroots of
|
|
Strategic Information Systems' The Information Society 8,4 (Oct-Dec
|
|
1992)
|
|
|
|
Clarke R.A. (1987) 'Just Another Piece of Plastic for Your Wallet:
|
|
The Australia Card' Prometheus 5,1 June 1987. Republished in Computers
|
|
& Society 18,1 (January 1988), with an Addendum in Computers & Society
|
|
18,3 (July 1988)
|
|
|
|
Clarke R.A. (1988) 'Information Technology and Dataveillance'
|
|
Commun. ACM 31,5 (May 1988) 498-512
|
|
|
|
Clarke R.A. (1992a) 'The Resistible Rise of the Australian National
|
|
Personal Data System' Software L. J. 5,1 (January 1992)
|
|
|
|
Clarke R.A. (1992b) 'Extra-Organisational Systems: A Challenge to the
|
|
Software Engineering Paradigm' Proc. IFIP World Congress, Madrid
|
|
(September 1992)
|
|
|
|
Davies S. (1992) 'Big Brother: Australia's Growing Web of
|
|
Surveillance' Simon & Schuster, Sydney, 1992
|
|
|
|
Eco U. (1980) 'The Name of the Rose' Picador, 1980, 1984
|
|
|
|
Ellul J. (1964) 'The Technological Society' Knopf, New York, 1964
|
|
|
|
Ellul J. (1990) 'The Technological Bluff' William B. Eerdmans, Grand
|
|
Rapids MI, 1986
|
|
|
|
Foucault M. (1975) 'Discipline and Punish: The Birth of the Prison'
|
|
Penguin, 1975, 1979
|
|
|
|
Gibson W. (1984) 'Neuromancer' Grafton/Collins, London, 1984
|
|
|
|
Gibson W. (1993) 'Virtual Light' Bantam, New York, 1993
|
|
|
|
Graham P. (1990) 'A Case Study of Computers in Public
|
|
Administration: The Australia Card' Austral. Comp. J. 22,2 (May 1990)
|
|
|
|
Greenleaf G.W. & Nolan J. (1986)
|
|
'The Deceptive History of the Australia Card'
|
|
Aust. Qtly 58,4 407-25 (1986)
|
|
|
|
Gronlund A. (1994) 'Public Information Systems' Proc. IFIP World
|
|
Congress, Hamburg (September 1994)
|
|
|
|
Kling R. (1978) 'Automated Welfare Client Tracking and Welfare Service
|
|
Integration: The Political Economy of Computing'
|
|
Comm ACM 21,6 (June 1978) 484-93
|
|
|
|
Laudon K.C. (1986) 'Dossier Society: Value Choices in the Design of
|
|
National Information Systems' Columbia U.P., 1986
|
|
|
|
Orwell G. (1948) '1984' Penguin, 1948, 1980
|
|
|
|
OTA (1986) 'Federal Government Information Technology: Electronic
|
|
Record Systems and Individual Privacy' OTA-CIT-296, U.S. Govt Printing
|
|
Office, Washington DC, Jun 1986
|
|
|
|
Packard V. (1964) 'The Naked Society' McKay, New York, 1964
|
|
|
|
Ronfeldt D. (1992) 'Cyberocracy is Coming' The Information Society
|
|
8,4 (Oct-Dec 1992)
|
|
|
|
Roszak T. (1986) 'The Cult of Information' Pantheon, 1986
|
|
|
|
Rule J.B. (1974) 'Private Lives and Public Surveillance: Social
|
|
Control in the Computer Age' Schocken Books, 1974
|
|
|
|
Rule J.B., McAdam D., Stearns L. & Uglow D. (1980)
|
|
'The Politics of Privacy' New American Library, 1980
|
|
|
|
Sterling B. (Ed.) (1986) 'Mirrorshades: The Cyberpunk Anthology'
|
|
Arbor House, New York, 1986
|
|
|
|
Toffler A. (1971) 'Future Shock' Bantam Books, New York, 1971
|
|
|
|
Toffler A. (1980) 'The Third Wave' Pan Books, 1980, 1981
|
|
|
|
Weizenbaum J. (1976) 'Computer Power and Human Reason, Publisher, 1976
|
|
|
|
Zamyatin E. (1922) 'We' Penguin, 1992, 1980
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 15 Jul 94 18:45:31 EDT
|
|
From: sratte@PHANTOM.COM(Swamp Ratte)
|
|
Subject: File 2--cDc Global Domination Update #15
|
|
|
|
((___))
|
|
[ x x ] cDc communications
|
|
\ / Global Domination Update #15
|
|
(' ') May 1st, 1994
|
|
(U)
|
|
Est. 1986
|
|
|
|
New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for May, 1994:
|
|
|
|
+_________________________/Text Files\_______________________
|
|
|
|
251: "The False Prophets" by Lady Carolin. It's kind of an inside
|
|
joke. 'cept ain't nobody laughin'.
|
|
|
|
252: "The Bishop" by Curtis Yarvin. "Father McKenzie, writing the
|
|
words of a sermon that no one will hear..." Lonely priest decides
|
|
he'll be the Pope. And who's to stop him? Let's all be Pope.
|
|
|
|
253: "Better, Stronger, Faster" by Omega & White Knight. Amazing
|
|
document hacked-out of a CIA computer reveals use of popular TV
|
|
program starring Lee Majors to cover up space alien presence.
|
|
|
|
254: "Hung Like a Horse" by Krass Katt. Blech. Weird, kooky things
|
|
go on at veterinary hospitals.
|
|
|
|
255: "Mess o' Top Ten Lists" by The Death Vegetable & Iskra. Like the
|
|
title says. It's humor, man, humor.
|
|
|
|
256: "Fecal George" by David Humphrey. Another blech one. Nutty,
|
|
crazy college kids, eating anything for a quick buck.
|
|
|
|
257: "Goodnight, Benjamin" by Tequila Willy. Spooky, zany business.
|
|
|
|
258: "Spontaneous Combustion and the Aryan Parade" by FLaMinG SeVeReD
|
|
HeaD. They're on Demerol, they've got a '67 Camaro, and some fresh
|
|
white mice to play with. Whee-doggers.
|
|
|
|
259: "The HoHoCon 1993 Experience" by Count Zero. All experiences are
|
|
relative, but here's one to relate to. CZ drops the skinny on the
|
|
most recent major computer underground convention.
|
|
|
|
260: "Vegas, 1976" by Mad Mac. Snortin' coke and jacking off to a
|
|
HINEY BOY magazine in the bathroom of the Sands in Los Vegas just
|
|
isn't safe anymore.
|
|
|
|
+_____________________________/cDc Gnuz\____________________________
|
|
|
|
"cDc is the Meat group. All the wannabes can step to
|
|
the Breads an' Cereals groups, baby."
|
|
|
|
cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list!
|
|
Send mail to cDc@cypher.com and include some wonderlessly elite message along
|
|
he lines of "ADD ME 2 DA MAILIN LIZT!!@&!"
|
|
|
|
NEW Official cDc Global Domination Factory Direct Outlets:
|
|
|
|
PHR33DUM 204/775-3038
|
|
The Truth Sayer's Domain 210/493-9975
|
|
The Black Skyline 214/317-3091
|
|
Club Baby Seal 817/429-4636
|
|
Cyber Neurotic Reality Test 905/729-0238
|
|
Twilight of the Idols +61-3-226-3386
|
|
|
|
We're always taking t-file submissions, so if you've got a file and
|
|
want to really get it out there, there's no better way than with cDc.
|
|
Upload text to The Polka AE, to sratte@phantom.com, or send disks or
|
|
hardcopy to the cDc post office box in Lubbock, TX.
|
|
|
|
Pretty cool buncha t-files: PuD, Pizza Underground Digest.
|
|
|
|
Good thing on TV: __The Mod Squad_ on E! at 7pm CST. Aaron Spelling,
|
|
what a guy. _The Love Boat_, _Charlie's Angels_, _BH 90210_, and
|
|
THIS.
|
|
|
|
Hero/Role Model of the Month: People say there's not anybody to look
|
|
up to anymore. HA! What about Sammy Davis, Jr.? He's Black, he's
|
|
Jewish, and he's Dead. He sung "The Candy Man," he wore lots of gold
|
|
jewlery, he hung out with Sinatra, and he referred to everyone as
|
|
"cat" or "baby." Sammy was a prince, baby, a prince.
|
|
|
|
Stupid Computer Geek, Part X: "In October, Houston, Tex., computer
|
|
enthusiast Shawn Kevin Quinn, 17, pleaded no contest to putting out a
|
|
murder contract on the boyfriend of a girl he had eyes for. According
|
|
to the man Quinn contacted, Quinn offered to pay $5.30 plus seven
|
|
Atari game cartridges. After a psychological exam portrayed Quinn as
|
|
merely socially retarded by his computer obsession, a judge sentenced
|
|
him to 10 years' probation." [Ft. Worth Star-Telegram-AP, October
|
|
1993]. Contributed by Omega.
|
|
|
|
S. Ratte'
|
|
cDc/Editor and P|-|Ear13zz |_3@DeRrr
|
|
"We're into t-files for the groupies and money."
|
|
Middle finger for all.
|
|
|
|
Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453.
|
|
Internet: sratte@phantom.com.
|
|
===========================================================
|
|
|
|
cDc Global Domination Update #15-by Swamp Ratte'-"Hyperbole is our business"
|
|
Copyright (c) 1994 cDc communications. All Rights Reserved.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 18 Jul 1994 18:03:24 -0700
|
|
From: email list server <listserv@SNYSIDE.SUNNYSIDE.COM>
|
|
Subject: File 3--Privacy at risk: Educational Records
|
|
|
|
Seattle CPSR Policy Fact Sheet
|
|
K-12 Student Records: Privacy at Risk
|
|
+----------------------------------------
|
|
|
|
TOPIC
|
|
|
|
The U.S. education system is rapidly building a nationwide network of
|
|
electronic student records. This computer network will make possible the
|
|
exchange of information among various agencies and employers, and the
|
|
continuous tracking of individuals through the social service, education
|
|
and criminal justice systems, into higher education, the military and the
|
|
workplace.
|
|
|
|
WHAT IS THE ISSUE?
|
|
|
|
There is no adequate guarantee that the collection and sharing of personal
|
|
information will be done only with the knowledge and consent of students or
|
|
their parents.
|
|
|
|
Changes Are Coming to Student Records
|
|
National proposals being implemented today include:
|
|
|
|
- An electronic "portfolio" to be kept on each student, containing
|
|
personal essays and other completed work.
|
|
|
|
- Asking enrolling kindergartners for their Social Security Numbers,
|
|
which will be used to track each student's career after high school.
|
|
|
|
- Sending High school students' transcripts and "teachers' confidential
|
|
ratings of a student's work-related behavior," to employers via an
|
|
electronic network called WORKLINK.
|
|
|
|
At the heart of these changes is a national electronic student records
|
|
network, coordinated by the federal government and adopted by states with
|
|
federal assistance.
|
|
|
|
Publication 93-03 of the National Education Goals Panel, a federally
|
|
appointed group recently empowered by the Goals 2000 bill to oversee
|
|
education restructuring nationally, recommends as "essential" that school
|
|
districts and/or states collect expanded information on individual
|
|
students, including:
|
|
- month and extent of first prenatal care,
|
|
- birthweight,
|
|
- name, type, and number of years in a preschool program,
|
|
- poverty status,
|
|
- physical, emotional and other development at ages 5 and 6,
|
|
- date of last routine health and dental care,
|
|
- extracurricular activities,
|
|
- type and hours per week of community service,
|
|
- name of post-secondary institution attended,
|
|
- post-secondary degree or credential,
|
|
- employment status,
|
|
- type of employment and employer name,
|
|
- whether registered to vote.
|
|
|
|
It also notes other "data elements useful for research and school
|
|
management purposes":
|
|
- names of persons living in student household,
|
|
- relationship of those persons to student,
|
|
- highest level of education for "primary care-givers,"
|
|
- total family income,
|
|
- public assistance status and years of benefits,
|
|
- number of moves in the last five years,
|
|
- nature and ownership of dwelling.
|
|
|
|
Many of these information categories also were included in the public draft
|
|
of the 'Student Data Handbook for Elementary and Secondary Schools',
|
|
developed by the Council of Chief State School Officers to standardize
|
|
student record terminology across the nation. State and local agencies
|
|
theoretically design their own information systems, but the handbook
|
|
encourages them to collect information for policymakers at all levels.
|
|
Among the data elements are:
|
|
- evidence verifying date of birth,
|
|
- social security number,
|
|
- attitudinal test,
|
|
- personality test,
|
|
- military service experience,
|
|
- description of employment permit (including permit number,)
|
|
- type of dwelling,
|
|
- telephone number of employer.
|
|
|
|
WHO CAN ACCESS THIS COMPREHENSIVE INFORMATION?
|
|
|
|
Officers, employees and agents of local, state and federal educational
|
|
agencies and private education researchers may be given access to
|
|
individual student records without student or parent consent, according to
|
|
the federal Family Educational Rights and Privacy Act of 1974 (20 USC
|
|
1232g) and related federal regulations (34 CFR 99.3). Washington state law
|
|
echoes this federal law.
|
|
|
|
WHAT IS COMING NEXT?
|
|
|
|
Recent Washington state legislation (SB 6428, HB 1209, HB 2319) directly
|
|
links each public school district with a self-governing group of social
|
|
service and community agencies that will provide services for families.
|
|
|
|
This type of program is described in detail in the book, Together We Can,
|
|
published jointly by the U.S. Department of Education and the U.S.
|
|
Department of Health and Human Services. The book speaks of "overcoming
|
|
the confidentiality barrier," and suggests creating centralized data banks
|
|
that gather information about individuals from various government agencies -
|
|
or in other ways ensuring agencies, "ready access to each other's records."
|
|
|
|
The book calls for a federal role in coordinating policies, regulations and
|
|
data collection. A group in St. Louis, MO, called Wallbridge Caring
|
|
Communities, is cited as a model for seeking agreements to allow computer
|
|
linkups with schools and the social service and criminal justice systems to
|
|
track school progress, referrals and criminal activity.
|
|
|
|
WHAT HAPPENED TO ONE COMMUNITY
|
|
|
|
In Kennewick, WA, over 4,000 kindergarten through fourth graders were rated
|
|
by their teachers on how often they lie, cheat, sneak, steal, exhibit a
|
|
negative attitude, act aggressively, and whether they are rejected by their
|
|
peers. The scores, with names attached, were sent to a private psychiatric
|
|
center under contract to screen for "at-risk" students who might benefit
|
|
from its programs. All of this was done without the knowledge and consent
|
|
of the children or their parents.
|
|
|
|
CPSR's POSITION
|
|
|
|
CPSR Seattle believes that schools other agencies should minimize the
|
|
collection, distribution and retention of personal data. Students and/or
|
|
their parents should decide who has access to detailed personal
|
|
information.
|
|
|
|
CPSR ACTIONS
|
|
|
|
Representatives of CPSR Seattle have gone to Olympia to:
|
|
- oppose the use of the Social Security Number as the standard student
|
|
identifier,
|
|
|
|
- urge legislators to set educational goals that can be measured without
|
|
invading privacy,
|
|
|
|
- oppose turning over individual student records to law enforcement
|
|
officials apart from a court order or official investigation.
|
|
|
|
Computer Professionals for Social Responsibility - Seattle Chapter
|
|
P.O. Box 85481, Seattle, WA 98145-1481 (206) 365-4528
|
|
cpsr-seattle@csli.stanford.edu
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.66
|
|
************************************
|
|
|