home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-06-10 | 48.9 KB | 1,003 lines |
- A COMPUTER AND INFORMATION TECHNOLOGIES PLATFORM
-
- Computer Professionals for Social Responsibility
- Berkeley Chapter
- Peace and Justice Working Group
- (jdav@well.sf.ca.us)
-
- *****************************************************************
-
- INTRODUCTION
-
- As computer and information technologies become all pervasive, they
- touch more and more on the lives of everyone. Even so, their
- development and deployment remains unruly, undemocratic and
- unconcerned with the basic needs of humanity. Over the past 20 years,
- new technologies have dramatically enhanced our ability to collect and
- share information, to improve the quality of work, and to solve
- pressing problems like hunger, homelessness and disease. Yet over the
- same period we have witnessed a growing set of problems which are
- eroding the quality of life in our country. We have seen the virtual
- collapse of our public education system. Privacy has evaporated.
- Workplace monitoring has increased in parallel with the de-skilling or
- outright disappearance of work. Homelessness has reached new heights.
- Dangerous chemicals poison our environment. And our health is
- threatened by the growing pandemic of AIDS along with the resurgence
- of 19th century diseases like cholera and tuberculosis.
-
- As a society, we possess the technical know-how to resolve
- homelessness, illiteracy, the absence of privacy, the skewed
- distribution of information and knowledge, the lack of health care,
- environmental damage, and poverty. These problems persist only because
- of the way we prioritize research and development, implement
- technologies, and distribute our social wealth. Determining social
- priorities for research, development, implementation and distribution
- is a political problem.
-
- Political problems require political solutions. These are, of course,
- everyone's responsibility. As human beings, we have tried to examine
- these problems, and consider possible solutions. As people who design,
- create, study, and use computer and information technologies, we have
- taken the initiative to develop a political platform for these
- technologies. This platform describes a plausible, possible program
- for research, development, and implementation of computer and
- information technologies that will move towards resolving our most
- pressing social needs. This document also unites many groups and
- voices behind a common call for change in the emphasis and application
- of these technologies.
-
- This platform addresses Computer and Information Technologies, because
- we work with those technologies, and we are most familiar with the
- issues and concerns related to those technologies. We do not address
- other key technologies like bioengineering or materials science,
- although some issues, for example, intellectual property rights or
- research priorities, apply equally well to those areas. We would like
- to see people familiar with those fields develop platforms as well.
-
- Finally, we do not expect that this platform will ever be "finished."
- The rate of scientific and technical development continues to
- accelerate, and new issues will certainly emerge. Likewise, our
- understanding of the issues outlined here will evolve and deepen. Your
- comments are necessary for this document to be a relevant and useful
- effort.
-
- We encourage candidates, organizations and individuals to adopt the
- provisions in this platform, and to take concrete steps towards making
- them a reality.
-
- Peace and Justice Working Group
- Computer Professionals for Social Responsibility, Berkeley Chapter
-
- August, 1992
-
- *****************************************************************
-
- PLATFORM GOALS
-
- The goals of this platform are:
-
- * To promote the use of Computer and Information Technologies to
- improve the quality of human life and maximize human potential.
-
- * To provide broad and equal access to Computers and Information
- Technology tools.
-
- * To raise consciousness about the effects of Computer and
- Information Technologies among the community of people who create and
- implement these technologies.
-
- * To educate the general public about the effects Computers
-
- and Information Technologies have on them.
-
- * To focus public attention on the political agenda that determines
- what gets researched, funded, developed and distributed in Computer
- and Information Technologies.
-
- * To democratize (that is, enhance the public participation in) the
- process by which Computer and Information Technologies do or do not
- get researched, funded, developed and distributed.
-
-
- *****************************************************************
-
- PLATFORM SUMMARY
-
- A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
-
- 1. Universal access to education
- 2. Elimination of barriers to access to public information
- 3. An open National Data Traffic System
- 4. Expansion of the public library system
- 5. Expansion of public information treasury
- 6. Freedom of access to government data
- 7. Preservation of public information as a resource
- 8. Restoration of information as public property
-
- B. CIVIL LIBERTIES and PRIVACY
-
- 1. Education on civil liberties, privacy, and the implications
- of new technologies
- 2. Preservation of constitutional civil liberties
- 3. Right to privacy and the technology to ensure it
- 4. Community control of police and their technology
-
-
- C. WORK, HEALTH and SAFETY
-
- 1. Guaranteed income for displaced workers
- 2. Improved quality of work through worker control of it
- 3. Emphasis on health and safety
- 4. Equal opportunity to work
- 5. Protection for the homeworker
- 6. Retraining for new technologies
-
-
- D. THE ENVIRONMENT
-
- 1. Environmentally safe manufacturing
- 2. Planning for disposal or re-use of new products
- 3. Reclamation of the cultural environment as public space
-
-
- E. INTERNATIONAL COOPERATION
-
- 1. Replacement of "national competitiveness" with "global
- cooperation"
- 2. Global distribution of technical wealth
- 3. An end to the waste of technical resources embodied in the
- international arms trade
- 4. A new international information order
- 5. Equitable international division of labor
-
-
- F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
-
- 1. New emphasis in technical research priorities
- 2. Conversion to a peacetime economy
- 3. Socially responsible engineering and science
-
-
-
- *****************************************************************
- THE PLATFORM
- *****************************************************************
-
- A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
-
- The body of human knowledge is a social treasure collectively
- assembled through history. It belongs to no one person, company,
- or country. As a public treasure everyone must be guaranteed
- access to its riches. We must move beyond the division between
- information "consumer" and "provider" -- new information
- technologies enable each of us to contribute to the social
- treasury as well. An active democracy requires a well-informed
- citizenry with equal access to any tools that facilitate
- democratic decision-making. This platform calls for:
-
- 1. UNIVERSAL ACCESS TO EDUCATION: "23 Million adult Americans
- cannot read above fifth-grade level."[1] We reaffirm that quality
- education is a basic human right. We call for full funding for
- education through the university level to insure that everyone
- obtains the education they need to participate in and contribute
- to the "Information Age." Education must remain a public resource.
- Training and retraining to keep skills current with technology,
- and ease transition from old technologies to new technologies must
- be readily available. All people must have sufficient access to
- technology to ensure that there is no "information elite" in this
- society. Computers should be seen as tools to accomplish tasks,
- not ends in themselves. The public education system must provide
- students with access to computers, as well as the critical and
- analytical tools necessary to understand, evaluate and use new
- technologies. Staffed and funded computer learning centers should
- be set up in low-income urban and rural areas to provide such
- access and education to adults as well as children. Teachers
- require an understanding of the technology to use it effectively,
- and to communicate its benefits and limitations to students. These
- skills must be an integral part of the teacher training
- curriculum, and must also be available for teachers to continue to
- upgrade their skills as new tools become available. Finally, to
- learn, children need a nurturing environment, including a home, an
- adequate diet, and quality health care. Pitting "welfare" versus
- "education" is a vicious prescription for social failure. We call
- for adequate social services to ensure that our children have the
- environment in which they can benefit from their education.
-
- 2. ELIMINATION OF BARRIERS TO ACCESS TO INFORMATION TECHNOLOGY:
- Democracy requires an informed public, with generous access to
- information. However, access to information increasingly requires
- tools such as a computer and a modem, while only 13% of Americans
- own a personal computer, and of them, only 10% own a modem.[2] In
- addition, requiring fees to access databases locks out those
- without money. We must assure access to needed technology via
- methods such as a subsidized equipment program that can make basic
- computer and information technologies available to all. We call
- for the nationalization of research and public information
- databases, with access fees kept to a minimum to ensure access to
- the data. In many cases, the technology itself is a barrier to use
- of new technologies. We strongly encourage the research and
- development of non-proprietary interfaces and standards that
- simplify the use of new technology.
-
- 3. AN OPEN NATIONAL DATA TRAFFIC SYSTEM: An Information Society
- generates and uses massive amounts of information. It requires an
- infrastructure capable of handling that information. It also
- determines how we communicate with each other, how we disseminate
- our ideas, and how we learn from each other. The character of this
- system will have profound effects on everyone. The openness and
- accessibility of this network will determine the breadth and depth
- of the community we can create.
-
- We call for a "National Data Traffic System" that can accommodate
- all traffic, not just corporate and large academic institution
- traffic, so that everyone has access to public information, and
- has the ability to add to the public information. This traffic
- system must be accessible to all. The traffic system will include
- a "highway" component, major information arteries connecting the
- country. We propose that the highway adopt a model similar to the
- federal highway system -- that is, a system built by and
- maintained publicly, as opposed to the "railroad" model, where the
- government subsidizes private corporations to build, maintain and
- control the system. The "highway model" will guarantee that the
- system serves the public interest. At the local level, the
- existing telephone and cable television systems can provide the
- "feeder roads", the "streets" and the "alleys" and the "dirt
- roads" of the data network through the adoption of an Integrated
- Services Digital Network (ISDN) system, along the lines proposed
- by the Electronic Frontier Foundation. The features proposed by
- EFF include affordable, ubiquitous ISDN; breaking the private
- monopoly control of the existing communication networks; short of
- public takeover of the networks, affirmation of "common carrier"
- principles; ease of use; a guarantee of personal privacy; and a
- guarantee of equitable access to communications media.[3]
-
- 4. EXPANSION OF THE PUBLIC LIBRARY SYSTEM: The public library
- system represents a public commitment to equal access to
- information, supported by community resources. Yet libraries, in
- the era of Computer and Information Technologies, are having their
- funding cut. We call for adequate funding of public libraries and
- an extension of the library system into neighborhoods. Librarians
- are the trained facilitators of information access. As such,
- librarians have a unique, strategic role to play in the
- "information society." We call for an expansion of library
- training programs, for an increase in the number of librarians,
- and for additional training for librarians so that they can
- maximize the use of new information-retrieval technology by the
- general public. Every public library must have, and provide to
- their clientele, access to the national data highway.
-
- 5. EXPANSION OF THE PUBLIC INFORMATION TREASURY: A market economy
- encourages the production of those commodities that the largest
- market wants. As information becomes a commodity, information that
- serves a small or specialized audience is in danger of not being
- collected, and not being available. For example, the president of
- commercial database vendor Dialog was quoted in 1986 as saying "We
- can't afford an investment in databases that are not going to earn
- their keep and pay back their development costs." When asked what
- areas were not paying their development costs, he answered,
- "Humanities."[4] Information collection should pro-actively meet
- broad social goals of equality and democracy. We must ensure that
- the widest possible kinds of social information are collected (not
- just those that have a ready and substantial market), while
- ensuring that the privacy of the individual is protected.
-
- 6. FREEDOM OF ACCESS TO GOVERNMENT DATA: Public records and
- economic data are public resources. We must ensure that the
- principles of "Freedom of Information" laws remain in place.
- Government agencies must comply with these laws, and should be
- punished for non-compliance. Government records that are kept in a
- digital format must be available electronically to the general
- public, provided that adequate guarantees are in place to protect
- the individual.
-
- 7. PROTECTION OF PUBLIC INFORMATION RESOURCES: Recently, we have
- seen a dangerous trend in which the Federal government sells off
- or licenses away rights to information collected at public
- expense, which is then sold back to the public at a profit. Access
- to public data now often requires paying an information-broker
- look-up fees.[5] Public resources must be public. We call for a
- halt to the privatization of public data.
-
- 8. RESTORATION OF INFORMATION AS PUBLIC PROPERTY: "Since new
- information technology includes easy ways of reproducing
- information, the existence of these [intellectual property] laws
- effectively curtails the widest possible spread of this new form
- of wealth. Unlike material objects, information can be shared
- widely without running out."[6] The constitutional rationale for
- intellectual property rights is to promote progress and
- creativity. The current mechanisms -- the patent system and the
- copyright system -- are not required to ensure progress. Other
- models exist for organizing and rewarding intellectual work, that
- do not require proprietary title to the results. For example,
- substantial and important research has been carried out by
- government institutions and state-supported university research. A
- rich library of public domain and "freeware" software exists. Peer
- or public recognition, awards, altruism, the urge to create or
- self-satisfaction in technical achievement are equally motivators
- for creative activity.
-
- Authors and inventors must be supported and rewarded for their
- work, but the copyright and patent system per se does not ensure
- that. Most patents, for example, are granted to corporations or to
- employees who have had to sign agreements to turn the ownership
- over to the employer through work-for-hire or other employment
- contracts as a condition of employment. The company, not the
- creating team, owns the patent. In addition, in many ways, patents
- and copyrights inhibit the development and implementation of new
- technology. For example, proprietary research is not shared, but
- is kept secret and needlessly duplicated by competing companies or
- countries. Companies sue each other over ownership of interfaces,
- with the consumer ultimately footing the bill. Software developers
- must "code around" proprietary algorithms, so as not to violate
- known patents; and they still run the risk of violating patents
- they don't know about. We call for a moratorium on software
- patents. We call for the abolition of property rights in
- knowledge, including algorithms and designs. We call for social
- funding of research and development, and the implementation of new
- systems, such as public competitions, to spur development of
- socially needed technology.
-
-
- *****************************************************************
-
- B. CIVIL LIBERTIES and PRIVACY
-
- Advances in Computer and Information Technologies have facilitated
- communications and the accumulation, storage and processing of
- data. These same advances may be used to enlighten, empower and
- equalize but also to monitor, invade and control. Alarmingly, we
- witness more instances of the latter rather than of the former.
- This platform calls for:
-
- 1. EDUCATION ON CIVIL LIBERTIES, PRIVACY, AND THE IMPLICATIONS OF
- NEW TECHNOLOGIES: New technologies raise new opportunities and new
- challenges to existing civil liberties. In the absence of
- understanding and information about these technologies, dangerous
- policies can take root. For example, police agencies and the news
- media have portrayed certain computer users (often called
- "hackers") as "pirates" out to damage and infect all networks.
- While some computer crime of this sort does take place, such a
- demonization of computer users overlooks actual practice and
- statistics. This perception has led to an atmosphere of hysteria,
- opening the door to fundamental challenges to civil liberties.
- Homes have been raided, property has been confiscated, businesses
- have been shut down, all without due process. Technology skills
- have taken on the quality of "forbidden knowledge", where the
- possession of certain kinds of information is considered a crime.
- In the case of "hackers", this is largely due to a lack of
- understanding of the actual threat that "hackers" pose. We must
- ensure that legislators, law-enforcement agencies, the news media,
- and the general public understand Computer and Information
- Technologies instead of striking out blindly at any perceived
- threat. We must also ensure that policy caters to the general
- public and not just corporate and government security concerns.
-
- 2. PRESERVATION OF CONSTITUTIONAL CIVIL LIBERTIES: The U.S.
- Constitution provides an admirable model for guaranteeing rights
- and protections essential for a democratic society in the 18th
- century. Although the new worlds opened up by Computer and
- Information Technologies may require new interpretations and
- legislations, the freedoms guaranteed in the Bill of Rights must
- continue no matter what the technological method or medium. Steps
- must be taken to ensure that the guarantees of the Constitution
- and its amendments are extended to encompass the new technologies.
- For example, electronic transmission or computer communications
- must be considered as a form of speech; and information
- distributed on networked computers or other electronic forms must
- be considered a form of publishing (thereby covered by freedom of
- the press). The owner or operator of a computer or electronic or
- telecommunications facility should be held harmless for the
- content of information distributed by users of that facility,
- except as the owner or operator may, by contract, control
- information content. Those who author statements and those who
- have contractual authority to control content shall be the parties
- singularly responsible for such content. Freedom of assembly
- should be automatically extended to computer-based electronic
- conferencing. Search and seizure protections should be fully
- applicable to electronic mail, computerized information and
- personal computer systems.
-
- 3. RIGHT TO PRIVACY AND THE TECHNOLOGY TO ENSURE IT: Because
- Computer and Information Technologies make data collection,
- processing and manipulation easier, guaranteeing citizen privacy
- rights becomes problematic. Computer and Information Technology
- make the job of those who use data en-masse -- marketing firms,
- police, private data collection firms -- easier. We need to
- develop policies that control what, where, whom and for what
- reasons data is collected on an individual. Institutions that
- collect data on individuals must be responsible for the accuracy
- of the data they keep and must state how the information they
- obtain will be used and to whom it will be made available.
- Furthermore, we must establish penalties for non-compliance with
- these provisions. Systems should be in place to make it easy for
- individuals to know who has information about them, and what that
- information is.
-
- We must ensure that there is no implementation of any
- technological means of tracking individuals in this country
- through their everyday interactions. Technology exists that can
- ensure that electronic transactions are not used to track
- individuals. Encrypted digital keys, for example, provide the
- technical means to achieve anonymity in electronic transactions
- while avoiding a universal identifier. Where government financial
- assistance is now provided electronically, we must ensure that
- these mechanisms help empower the recipient, and do not become
- sophisticated means of tracking and policing behavior (e.g., by
- tracking what is bought, when it is bought, where it is bought,
- etc.).
-
- The technology to effectively ensure private communications is
- currently available. The adoption of a state-of-the-art standard
- has been held up while the government pushes for mandatory "back-
- doors" so that it can monitor communication. (Computer technology
- is treated differently here; for example, we do not legislate how
- complex a lock can be.) We must ensure that personal communication
- remains private by adopting an effective, readily available, de-
- militarized encryption standard.
-
- 4. COMMUNITY CONTROL OF POLICE AND THEIR TECHNOLOGY: New
- technologies have expanded the ability of police departments to
- maintain control over communities. The Los Angeles Police
- Department is perhaps an extreme example: they have compiled
- massive databases on African-American and Latino youth through
- "anti-gang" mass detainments. These databases are augmented by FBI
- video and photo analysis techniques. "But the real threat of these
- massive new databases and information technologies is... their
- application on a macro scale in the management of a criminalized
- population."[7] With new satellite navigational technology, "we
- shall soon see police departments with the technology to put the
- equivalent of an electronic bracelet on entire social groups."[8]
- We call for rigorous community control of police departments to
- protect the civil liberties of all residents.
-
-
- *****************************************************************
-
- C. WORK, HEALTH and SAFETY
-
- Computer and Information Technologies are having a dramatic effect
- on work. New technologies are forcing a reorganization of work.
- The changes affect millions of workers, and are of the same level
- and magnitude as the Industrial Revolution 150 years ago. The
- effects have been disastrous -- the loss of millions of
- manufacturing jobs, a fall in wages over the past 15 years, the
- lengthening of the work week for those who do have jobs, a rise in
- poverty and homelessness. Employed Americans now work more hours
- each week that at any time since 1966, while at this writing 9.5
- million workers in the "official" workforce are unemployed, and
- millions more have given up hope of ever finding work.[9] Too
- often, products and profitability are given priority over the
- needs and health of the workers who produce both. For example,
- research is done on such matters as how humans contaminate the
- clean room process,[10] not on how the chemicals used in chip
- manufacturing poison the handlers. Or new technologies are
- implemented before adequate research is carried out on how they
- will affect the worker. This misplaced emphasis is wrong. This
- platform calls for:
-
- 1. GUARANTEED INCOME FOR DISPLACED WORKERS: New technologies mean
- an end to scarcity. Producing goods to meet our needs is a
- conscious human activity. Such production has been and is
- currently organized with specific goals in mind, namely the
- generation of the greatest possible profit for those who own the
- means of production. We can re-organize production.
-
- With production for private profit, corporations have implemented
- robotics and computer systems to cut labor costs, primarily
- through the elimination of jobs. Over the last ten years alone,
- one million manufacturing jobs have disappeared in the U.S.
- Workers at the jobs that remain are pressured to take wage and
- benefits cuts, to "compete" in the global labor market made
- possible by digital telecommunications and modern manufacturing
- techniques. Most new jobs have been created in the low-pay service
- sector. As a result, earnings for most workers have been
- falling.[11] The corporate transfer of jobs to low-wage areas,
- including overseas, affects not only low-skill assembly line work
- or data entry, but also computer programming and data analysis.
-
- Wages and benefits must be preserved in the face of automation or
- capital flight. Remaining work can be spread about by shortening
- the work week while maintaining the weekly wage rate. At the same
- time, steps must be taken to acknowledge that the nature of work
- is changing. In the face of the new technologies' ever-increasing
- productivity utilizing fewer and fewer workers, the distribution
- of necessities can no longer be tied to work. We must provide for
- workers who have lost their jobs due to automation or job flight,
- even if no work is available, by guaranteeing a livable income and
- retraining opportunities (see #6 below).
-
- 2. IMPROVED QUALITY OF WORK THROUGH WORKER CONTROL OF IT: Millions
- work boring, undignified jobs as a direct result of computer and
- information technology. Work is often degraded due to de-skilling,
- made possible by robotics and crude artificial intelligence
- technology; or by job-monitoring, made simple by digital
- technology. (Two-thirds of all workers are monitored as they
- work.[12]) Workers face greater difficulties in organizing to
- protect their rights. Technologies are often foisted on the
- workers, ignoring the obvious contributions the workers can make
- to the design process. The resulting designs further deprive the
- worker of control over the work process. In principle, tools
- should serve the workers, rather than the workers serving the
- tools.
-
- But new technologies could relieve humans of boring or dangerous
- work. Technology enables us to expand the scope of human activity.
- We could create the possibility of "work" becoming leisure. We
- call for the removal of all barriers to labor organizing as the
- first step toward giving workers the power to improve the quality
- of their work. Workers must be protected from intrusive monitoring
- and the stress that accompanies it. We must ensure worker
- involvement in the design process. We must also improve the design
- of user interfaces so that users can make full use of the power of
- the technology.
-
- Furthermore, it is not enough just to "participate" in the design
- process -- worker involvement must correspond with increased
- control over the work process, goals, etc. In other words, we must
- ensure that there is "no participation without power." Computer
- and Information Technologies facilitate peer-to-peer work
- relationships and the organization of work in new and challenging
- ways. Too often, though, in practice we see a tightening of
- control, with management taking more and more direct control over
- details on the shop floor. We must ensure that new technologies
- improve rather than degrade the nature of work.
-
- 3. EMPHASIS ON HEALTH AND SAFETY: Technologies are often developed
- with little or no concern for their effect on the workers who
- manufacture or use them.
-
- Electronics manufacturing uses many toxic chemicals. These
- chemicals are known to cause health problems such as cancer, birth
- defects and immune system disorders. Workers are entitled to a
- safe working environment, and must have the right to refuse unsafe
- work without fear of penalty. Workers have the right to know what
- chemicals and processes they work with and what their effects are.
- We call for increased research into developing safe manufacturing
- processes. We call for increased research into the effects of
- existing manufacturing processes on workers, and increased funding
- for occupational safety and health regulation enforcement.
-
- The rate of repetitive motion disorders has risen with the
- introduction of computers in the workplace -- they now account for
- half of all occupational injuries, up from 18% in 1981.[13]
- Musculo-skeletal disorders, eyestrain and stress are commonly
- associated with computer use. There is still no conclusive study
- on the harmful effects of VDT extremely low frequency (ELF) and
- very low frequency (VLF) electromagnetic field emissions.[14]
- Together these occupational health tragedies point to a failure by
- manufacturers, employers and government to adequately research or
- implement policies that protect workers. We call for funding of
- major studies on the effects of computers in the workplace. We
- call for the immediate adoption of ergonomic standards that
- protect the worker. We must ensure that pro-active standards exist
- before new technologies are put in place. Manufacturers and
- employers should pay now for research and worker environment
- improvement rather than later, after the damage has been done, in
- lawsuits and disability claims. We must ensure that worker safety
- always comes first, not short-sighted, short-term profits that
- blindly overlook future suffering, disabilities and millions in
- medical bills.
-
- 4. EQUAL OPPORTUNITY TO WORK: Computer and Information Technology
- institutions are overwhelmingly dominated by white males. Programs
- must be adopted to increase the direct participation of under-
- represented groups in the Computer and Information Technology
- industries.
-
- 5. PROTECTION FOR THE HOMEWORKER: Computer and Information
- Technologies have enabled new patterns of working. "Telecommuting"
- may be preferred by many workers, it may expand opportunities for
- workers who are homebound, and it would reduce the wastefulness of
- commuting. At the same time, homework has traditionally increased
- the exploitation of workers, deprived them of organizing
- opportunities, and hidden them from the protection of health and
- safety regulations. We must guarantee that crimes of the past do
- not reappear in an electronic disguise. Computer and Information
- Technologies make possible new forms of organization for work
- beyond homework, such as neighborhood work centers: common spaces
- where people who work for different enterprises can work from the
- same facility. Such alternative structures should be supported.
-
- 6. RETRAINING FOR NEW TECHNOLOGIES: As new technologies develop,
- new skills are required to utilize them. Workers are often
- expected to pay for their own training and years of schooling at
- no cost to the employer. Training workers in new skills must be a
- priority, the cost of which must be shared by employers and the
- government, and not the sole responsibility of the worker.
-
-
- *****************************************************************
-
- D. THE ENVIRONMENT
-
- We share one planet. While our understanding of the environment
- increases, and the impact of previous technologies and neglect
- become more and more apparent, too little attention is paid to the
- effects of new technologies, including Computer and Information
- Technologies, on the environment, both physical and cultural. The
- creation of a global sustainable economy must be a priority. This
- platform calls for:
-
- 1. ENVIRONMENTALLY SAFE MANUFACTURING: The manufacture of
- electronics technology is among the most unhealthy and profoundly
- toxic human enterprises ever undertaken.[15] The computer and
- information technology industries must be cleaned up.
- Manufacturers cannot continue their destruction of our environment
- for their profit. They must be made to pay the actual cost of
- production, factoring in environmental cleanup costs for
- manufacturing methods and products that are environmentally
- unsafe. Priority must be placed on developing and implementing new
- manufacturing techniques that are environmentally safe, such as
- the "no-clean" systems which eliminate ozone-shredding
- chlorofluorocarbons (CFCs) from the production of electronic
- circuit boards.[16] We must ensure that these standards are
- adopted globally, to prohibit unsafe technologies from migrating
- to other countries with lax or non-existent environmental
- protection laws. No manufacturing technique should be implemented
- unless it can be proven to be environmentally safe. We must ensure
- industry's responsiveness to the communities (and countries) in
- which they are located. Neighborhoods and countries must
- participate in the planning process, and must be informed of the
- environmental consequences of the industries that surround them.
- They must have the right to shut down an enterprise or require the
- enterprise to cleanup or change their manufacturing processes.
-
- 2. PLANNING FOR DISPOSAL OR RE-USE OF NEW PRODUCTS: As new
- technologies become commodities with a finite life-cycle, new
- questions loom as to what happens to them when they are discarded.
- Little is known about what happens to these products when they hit
- the landfill. We must ensure that manufacturers and designers
- include recycling and/or disposal in the design and distribution
- of their products. Manufacturers must be responsible for the
- disposal of commodities once their usefulness is exhausted.
- Manufacturers must make every effort to ensure longevity and re-
- use of equipment. For example, product specifications might be
- made public after a specified period of time so that future users
- could continue to find support for their systems. Or manufacturers
- might be responsible for ensuring that spare parts continue to be
- available after a product is no longer manufactured. Manufacturers
- could sponsor reclamation projects to strip discarded systems and
- utilize the components for training projects or new products, or
- they could facilitate getting old equipment to people who can use
- it.
-
- 3. RECLAMATION OF THE CULTURAL ENVIRONMENT AS PUBLIC SPACE: We
- live not only in a natural environment, but also in a cultural
- environment. "The cultural environment is the system of stories
- and images that cultivates much of who we are, what we think, what
- we do, and how we conduct our affairs. Until recently, it was
- primarily hand-crafted, home-made, community-inspired. It is that
- no longer."[17] Computers and information technologies have
- facilitated a transformation so that our culture is taken and then
- sold back to us via a media that is dominated by a handful of
- corporations. At the same time, new technologies promise new
- opportunities for creativity, and new opportunities for reaching
- specific audiences. But both older (e.g., book and newspaper
- publishing) and newer (e.g., cable television and computer games)
- media throughout the world are controlled by the same multi-
- national corporations. We advocate computer and information
- technology that fights the commodification of culture and nurtures
- and protects diversity. This is only possible with a rigorous
- public support for production and distribution of culture. We must
- use new technologies to ensure the diverse points of view that are
- necessary for a healthy society. We must ensure a media that is
- responsive to the needs of the entire population. We must ensure
- true debate on issues of importance to our communities. We must
- ensure that our multi-faceted creativity has access to an
- audience. And we must also recognize that in many cultural
- instances computer and information technology tools are intrusive
- and inappropriate.[18]
-
-
- *****************************************************************
-
- E. INTERNATIONAL COOPERATION
-
- Historically, information flow around the world has tended to be
- one-way, and technology transfer from developed countries to
- underdeveloped countries has been restricted. These policies have
- reinforced the dependency of underdeveloped countries on the U.S.,
- Japan and Western Europe. As international competition for markets
- and resources intensifies, "national competitiveness" has become a
- negative driving consideration in technology policy. This platform
- calls for:
-
- 1. REPLACEMENT OF "NATIONAL COMPETITIVENESS" WITH "GLOBAL
- COOPERATION": The most popular rationale for investing in high
- technology in the United States is "national competitiveness."
- This is an inappropriate rhetoric around which to organize
- technology policy. It ignores the fact that the largest economic
- enterprises in the world today are international, not national.
- "National competitiveness" is also inappropriate in a world of
- increasing and accelerating global interdependence and a detailed
- division of labor that now routinely takes in the entire planet's
- workforce. Finally, "national competitiveness" is inappropriate in
- a world in which two-thirds of the world's population lives in
- abject poverty and environmental collapse -- the rhetoric of
- "national competitiveness" should be replaced by a rhetoric of
- "global cooperative development."
-
- 2. GLOBAL DISTRIBUTION OF TECHNICAL WEALTH: The global division of
- labor is fostering a "brain drain" of scientists and engineers,
- transferring badly-needed expertise from the developing world to
- the industrialized world. Fully 40% of the engineering graduate
- students in American universities are from foreign countries,
- typically from countries with little or no advanced technological
- infrastructure. A large majority of these graduate students stay
- in the U.S. when they complete their studies. American immigration
- laws also favor immigrants with advanced scientific or technical
- education. This intensifies the disparity between the advanced
- countries and those with widespread poverty. This concentration of
- technical expertise reinforces a global hierarchy and dependence.
- Expertise on questions of international import, such as global
- warming, toxic dumping, acid rain, and protection of genetic
- diversity becomes the exclusive domain of the developed countries.
- With so much of the world's scientific and technical expertise
- located in the monoculture of the industrialized world, the
- developing world has the disadvantage not only of meager financial
- resources and dependence on foreign capital, but the added
- disadvantage of living under the technical domination of the rich
- countries. This platform calls for a conscious policy of
- distributing scientific and technical talent around the world. For
- example, incentives can be given to encourage emigration to
- countries in need of technological talent.
-
- 3. AN END TO THE WASTE OF TECHNICAL RESOURCES EMBODIED IN THE
- INTERNATIONAL ARMS TRADE: The world currently spends about $1
- trillion annually on weapons. This is a massive transfer of wealth
- to arms-producing countries, and especially the United States, the
- world's largest arms exporting nation.[19] Weapons of interest to
- all countries are increasingly high tech, so a continuing
- disproportion of international investments in high technology will
- be in weapons systems. Weapons sales not only increase
- international tensions and the likelihood of war, but they also
- reinforce authoritarian regimes, deter democratic reform, support
- the abuse of human rights, divert critical resources from urgent
- problems of human and environmental need, and continue the
- accelerating disparity between rich and poor nations. We call for
- a complete and permanent dismantling of the global arms market.
-
- 4. A NEW INTERNATIONAL INFORMATION ORDER: The growing disparity
- between "information rich" and "information poor" is by no means
- limited to the U.S. Disparities within industrialized countries
- are dwarfed by international disparities between the
- industrialized countries and the developing world. A global
- telecommunications regime has developed that favors the rich over
- the poor, and the gap is growing steadily. As a simple example,
- rich countries are able to deploy and use space-based technologies
- such as earth-surveillance satellites and microwave
- telecommunications links to gather intelligence and distribute
- information all over the globe. The concentration of information
- power in single countries is even more advanced when viewed
- internationally. We call for the placement of international
- information collection and distribution under international
- control.
-
- 5. EQUITABLE INTERNATIONAL DIVISION OF LABOR: Improved
- communication and coordination made possible by Computer and
- Information Technologies has accelerated the development of a new
- global division of labor where dirty manufacturing industries are
- moved to developing countries, and "clean" knowledge industries
- are promoted in the developed countries. This pattern of
- development ensures that underdeveloped countries remain
- underdeveloped and turns them into environmental wastelands. We
- must ensure a truly new world order that equitably distributes
- work, and ends the destruction and enforced underdevelopment of
- vast sections of the world's population.
-
-
- *****************************************************************
-
- F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
-
- Computer and Information Technologies were born of the military
- and to this day are profoundly influenced by the military. People
- often talk of the "trickle down" or "spin-off" effect, in which
- money spent on military applications yields technology for
- general, non-military applications. This makes little sense when
- the military pursues absurd or irrelevant technology such as
- computer chips that will survive a nuclear war. There are very
- few, if any, cases of military technology producing tangible
- commercial breakthroughs. At the same time, various studies have
- shown that money invested in non-military programs creates more
- jobs than money invested in military hardware. Also, new
- technologies are developed with little or no public discussion as
- to their social consequences. Technologies are developed, and then
- their developers go in search of problems for their technology to
- solve. Pressing social needs are neglected, while elite debates
- about technology focus on military applications or consumer
- devices like high definition television (HDTV). Or pressing social
- problems are approached as "technical" problems, fixable by new or
- better technology. This platform calls for:
-
- 1. NEW EMPHASIS IN TECHNICAL RESEARCH PRIORITIES: Current research
- planning is either in private hands, or closely controlled by
- government agencies. As a result, research priorities are often
- shielded from public discussion or even knowledge. New
- technologies are often developed as "tools looking for uses, means
- looking for ends"[20] or to serve destructive rather than
- constructive goals. HDTV and the Strategic Defense Initiative
- (SDI) are examples. Substantial university research on new
- technologies is still financed and controlled by the Department of
- Defense. While military-based research has occasionally led to
- inventions which were of general use, this effect has been mostly
- coincidental, and the gap between the interests of military
- research and the needs of society has widened to the point that
- even such coincidental "public good" from military controlled
- technology research now seems unlikely. These misguided research
- priorities not only waste financial resources, but drain away the
- intellectual resources of the scientific community from pressing
- social problems where new technological research might be
- particularly useful such as in the area of the environment. We
- must ensure that Computer and Information Technology research is
- problem-driven and is under the control of the people it will
- affect. We must ensure that new technologies will not be harmful
- to humans or the environment. We must ensure that human and social
- needs are given priority, as opposed to support for military or
- police programs. We must ensure that technical research is
- directed toward problems which have a realistic chance of being
- solved technically rather than blindly seeking technical solutions
- for problems which ought to be addressed by other means.
-
- 2. CONVERSION TO A PEACETIME ECONOMY: There is no justification
- for the power the Pentagon holds over this country, particularly
- in light of recent international developments. We must dismantle
- our dependency on military programs. We must realign our budget
- priorities to focus on social problems rather than on exaggerated
- military threats. The released research and development monies
- should be redirected toward solving pressing social and
- environmental problems. We must move towards the goal of the
- elimination of the international market in weapons. Job re-
- training in socially useful skills must become a priority.
-
- 3. SOCIALLY RESPONSIBLE ENGINEERING AND SCIENCE: "Proposed
- technological projects should be closely examined to reveal the
- covert political conditions and artifact/ideas their making would
- entail. It is especially important for engineers and technical
- professionals whose wonderful creativity is often accompanied by
- appalling narrowmindedness. The education of engineers ought to
- prepare them to evaluate the kinds of political contexts,
- political ideas, political arguments and political consequences
- involved in their work."[21] To this list we can add developing an
- appreciation for the interconnectedness of the environments -- the
- natural, social and cultural -- we work in. We call for an
- increased emphasis on training in social education in the
- engineering and science departments of our schools and
- universities, public and private research laboratories and
- manufacturing and development facilities in order to meet these
- goals. Engineers must be exposed to the social impact of their
- work. This could be done through work-study projects or special
- fellowships. We need to also expand the body of people who "can do
- technology", that is, not only "humanize the hacker", but
- "hackerize the humanist" or "engineerize the worker."
-
-
- *****************************************************************
-
- FOOTNOTES
-
- 1. Patricia Glass-Schuman, "Reclaiming Our Technological Future."
- Whole Earth Review. Winter, 1991. p. 76.
-
- 2. Ibid, p. 76.
-
- 3. See the Kapor, Berman, and Weitzner article in the Further
- Reading section, also available electronically from info@eff.org.
-
- 4. Roger Summit, Information Today, May, 1986, as cited in
- Schiller, Culture, Inc., p. 81.15. Hayes, p. 65.
-
- 5. New York Times, December 26. 1991.
-
- 6. Michael Goldhaber, Reinventing Technology: Policies for
- Democratic Values. Routledge, 1986.
-
- 7. Mike Davis, CovertAction Information Bulletin. Summer, 1992. p.
- 18.
-
- 8. Ibid, p. 19.9. San Francisco Examiner, June 28, 1992.
-
- 10. Dennis Hayes, Behind the Silicon Curtain. South End Press.
- 1989. p. 79.
-
- 11. U.S. Bureau of Census, Statistical Abstract of the United
- States 1991. p. 413.
-
- 12. VDT Coalition, Berkeley, CA.
-
- 13. New York Times, December 16, 1989.
-
- 14. Macworld, May, 1990.
-
- 15. Hayes, p. 65.
-
- 16. New York Times, December 18, 1991.16. New York Times, December
- 18, 1991.
-
- 17. George Gerbner, "The Second American Revolution." Adbusters.
- Vol. 2, Number 1.
-
- 18. E.g., a CD-ROM rendition of a Shoshone ritual can never
- substitute for the ritual itself.
-
- 19. With the end of the Cold War, there will be increasing
- interest in the sale of weapons to developing nations because of
- the decline of the U.S. defense budget.
-
- 20. Langdon Winner, Whole Earth Review. Winter, 1991. p. 24.
-
- 21. Ibid.
-
-
- *****************************************************************
-
- FURTHER READING
-
- Alice Carnes and John Zerzan, Eds. Questioning Technology. Left
- Bank, 1988.
-
- Michael Goldhaber, Reinventing Technology: Policies for Democratic
- Values. Routledge, 1986.
-
- Dennis Hayes, Behind the Silicon Curtain. South End Press, 1989.
-
- Mitch Kapor, Jerry Berman, and Daniel Weitzner, "We Need a
- National Public Network." Whole Earth Review. Spring, 1992.
-
- Roger Karraker, "Highways of the Mind." Whole Earth Review.
- Spring, 1991.
-
- League for Programming Freedom, "Against Software Patents." LPF,
- 1991.
-
- League for Programming Freedom, "Against User Interface
- Copyright." LPF, 1991.
-
- Vincent Mosco and Janet Wasko, Eds. "The Political Economy of
- Information." University of Wisconsin Press, 1988.
-
- Herbert Schiller, Information and the Crisis Economy. Oxford
- University Press, 1986.
-
- Herbert Schiller, Culture, Inc.: The Corporate Takeover of Public
- Expression. Oxford University Press, 1989.
-
- Whole Earth Review, "Questioning Technology" special issue,
- Winter, 1991.
-
-
- *****************************************************************
-
- ACKNOWLEDGEMENTS
-
- This version of the platform was compiled by:
-
- The Peace and Justice Working Group
- Computer Professionals for Social Responsibility/Berkeley Chapter
- P.O. Box 40361
- Berkeley, CA 94704
- (415) 398-2818
- cpsr-peace@dewey.soe.berkeley.edu
-
- Write to the above to for more information on the platform, or to
- obtain printed copies ($4 each, postage paid).
-
-
- We have relied on the work of many other people for ideas and
- assistance, including Gary Chapman of the 21st Century Project,
- Jim Warren's work on computers and civil liberties, the authors of
- the works cited in the Further Reading section, and the very
- helpful and willing participants of the various workshops that we
- held in Berkeley over the past year.
-
-
- *****************************************************************
-
- Copyright (c) 1992 by Computer Professionals for Social
- Responsibility/Berkeley Chapter. You may use, share or reproduce
- all or any part of this, but may not restrict others from doing
- the same.
-
- *****************************************************************
- <end of A COMPUTER AND INFORMATION TECHNOLOGIES PLATFORM>
-