home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Nov 15, 1992 Volume 4 : Issue 58
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Coop Eidolator: Etaion Shrdlu, Junior
-
- CONTENTS, #4.58 (Nov 15, 1992)
- File 1--Special Issue: A Computer & Information Technologies Platform
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
- Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
- anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
- /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
- (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
- in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 27 Oct 1992 22:00:03 -0800
- From: James I. Davis <jdav@WELL.SF.CA.US>
- Subject: File 1--A Computer & Information Technologies Platform
-
- ((MODERATORS' NOTE: The potential of computer technology to liberate
- also carries with it the potential to repress. Computer applications
- contain the risks of intruding on privacy, increasing our
- vulnerability to crime, and altering the social sphere by revising
- laws, class structure, and power/control systems. The consequences of
- computer technology are *social* and affect us all. Responsibility for
- recognizing the impact of expanding technology is not something that
- should be left to others--to "experts"--but that should be
- aggressively confronted by all of us.
-
- This special issue presents a platform statement drafted by the
- Computer Professionals for Social Responsibility's Berkeley chapter as
- one way to begin recognizing the *political* implications of computer
- technology. We invite responses to it with the intent of sharpening
- the debates over the issues it raises.
-
- The bibliography has been deleted because of spatial constraints.
- Those interested can obtain the complete text, including biblio, from
- the CuD ftp site (ftp.eff.org)).
-
- +++++++++++++
-
- A COMPUTER AND INFORMATION TECHNOLOGIES PLATFORM
-
- Computer Professionals for Social Responsibility
- Berkeley Chapter
- Peace and Justice Working Group
-
- *****************************************************************
-
- INTRODUCTION
-
- As computer and information technologies become all pervasive, they
- touch more and more on the lives of everyone. Even so, their
- development and deployment remains unruly, undemocratic and
- unconcerned with the basic needs of humanity. Over the past 20 years,
- new technologies have dramatically enhanced our ability to collect and
- share information, to improve the quality of work, and to solve
- pressing problems like hunger, homelessness and disease. Yet over the
- same period we have witnessed a growing set of problems which are
- eroding the quality of life in our country. We have seen the virtual
- collapse of our public education system. Privacy has evaporated.
- Workplace monitoring has increased in parallel with the de-skilling or
- outright disappearance of work. Homelessness has reached new heights.
- Dangerous chemicals poison our environment. And our health is
- threatened by the growing pandemic of AIDS along with the resurgence
- of 19th century diseases like cholera and tuberculosis.
-
- As a society, we possess the technical know-how to resolve
- homelessness, illiteracy, the absence of privacy, the skewed
- distribution of information and knowledge, the lack of health care,
- environmental damage, and poverty. These problems persist only because
- of the way we prioritize research and development, implement
- technologies, and distribute our social wealth. Determining social
- priorities for research, development, implementation and distribution
- is a political problem.
-
- Political problems require political solutions. These are, of course,
- everyone's responsibility. As human beings, we have tried to examine
- these problems, and consider possible solutions. As people who design,
- create, study, and use computer and information technologies, we have
- taken the initiative to develop a political platform for these
- technologies. This platform describes a plausible, possible program
- for research, development, and implementation of computer and
- information technologies that will move towards resolving our most
- pressing social needs. This document also unites many groups and
- voices behind a common call for change in the emphasis and application
- of these technologies.
-
- This platform addresses Computer and Information Technologies, because
- we work with those technologies, and we are most familiar with the
- issues and concerns related to those technologies. We do not address
- other key technologies like bioengineering or materials science,
- although some issues, for example, intellectual property rights or
- research priorities, apply equally well to those areas. We would like
- to see people familiar with those fields develop platforms as well.
-
- Finally, we do not expect that this platform will ever be "finished."
- The rate of scientific and technical development continues to
- accelerate, and new issues will certainly emerge. Likewise, our
- understanding of the issues outlined here will evolve and deepen. Your
- comments are necessary for this document to be a relevant and useful
- effort.
-
- We encourage candidates, organizations and individuals to adopt the
- provisions in this platform, and to take concrete steps towards making
- them a reality.
-
- Peace and Justice Working Group Computer Professionals for Social
- Responsibility, Berkeley Chapter
-
- August, 1992
-
- *****************************************************************
-
- PLATFORM GOALS
-
- The goals of this platform are:
-
- * To promote the use of Computer and Information Technologies to
- improve the quality of human life and maximize human potential.
-
- * To provide broad and equal access to Computers and Information
- Technology tools.
-
- * To raise consciousness about the effects of Computer and
- Information Technologies among the community of people who create and
- implement these technologies.
-
- * To educate the general public about the effects Computers
-
- and Information Technologies have on them.
-
- * To focus public attention on the political agenda that determines
- what gets researched, funded, developed and distributed in Computer
- and Information Technologies.
-
- * To democratize (that is, enhance the public participation in) the
- process by which Computer and Information Technologies do or do not
- get researched, funded, developed and distributed.
-
-
- *****************************************************************
-
- PLATFORM SUMMARY
-
- A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
-
- 1. Universal access to education
- 2. Elimination of barriers to access to public information
- 3. An open National Data Traffic System
- 4. Expansion of the public library system
- 5. Expansion of public information treasury
- 6. Freedom of access to government data
- 7. Preservation of public information as a resource
- 8. Restoration of information as public property
-
- B. CIVIL LIBERTIES and PRIVACY
-
- 1. Education on civil liberties, privacy, and the implications
- of new technologies
- 2. Preservation of constitutional civil liberties
- 3. Right to privacy and the technology to ensure it
- 4. Community control of police and their technology
-
-
- C. WORK, HEALTH and SAFETY
-
- 1. Guaranteed income for displaced workers
- 2. Improved quality of work through worker control of it
- 3. Emphasis on health and safety
- 4. Equal opportunity to work
- 5. Protection for the homeworker
- 6. Retraining for new technologies
-
-
- D. THE ENVIRONMENT
-
- 1. Environmentally safe manufacturing
- 2. Planning for disposal or re-use of new products
- 3. Reclamation of the cultural environment as public space
-
-
- E. INTERNATIONAL COOPERATION
-
- 1. Replacement of "national competitiveness" with "global
- cooperation"
- 2. Global distribution of technical wealth
- 3. An end to the waste of technical resources embodied in the
- international arms trade
- 4. A new international information order
- 5. Equitable international division of labor
-
-
- F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
-
- 1. New emphasis in technical research priorities
- 2. Conversion to a peacetime economy
- 3. Socially responsible engineering and science
-
- *****************************************************************
- THE PLATFORM
- *****************************************************************
-
- A. ACCESS TO INFORMATION and INFORMATION TECHNOLOGIES
-
- The body of human knowledge is a social treasure collectively
- assembled through history. It belongs to no one person, company, or
- country. As a public treasure everyone must be guaranteed access to
- its riches. We must move beyond the division between information
- "consumer" and "provider" -- new information technologies enable each
- of us to contribute to the social treasury as well. An active
- democracy requires a well-informed citizenry with equal access to any
- tools that facilitate democratic decision-making. This platform calls
- for:
-
- 1. UNIVERSAL ACCESS TO EDUCATION: "23 Million adult Americans cannot
- read above fifth-grade level."[1] We reaffirm that quality education
- is a basic human right. We call for full funding for education through
- the university level to insure that everyone obtains the education
- they need to participate in and contribute to the "Information Age."
- Education must remain a public resource. Training and retraining to
- keep skills current with technology, and ease transition from old
- technologies to new technologies must be readily available. All people
- must have sufficient access to technology to ensure that there is no
- "information elite" in this society. Computers should be seen as tools
- to accomplish tasks, not ends in themselves. The public education
- system must provide students with access to computers, as well as the
- critical and analytical tools necessary to understand, evaluate and
- use new technologies. Staffed and funded computer learning centers
- should be set up in low-income urban and rural areas to provide such
- access and education to adults as well as children. Teachers require
- an understanding of the technology to use it effectively, and to
- communicate its benefits and limitations to students. These skills
- must be an integral part of the teacher training curriculum, and must
- also be available for teachers to continue to upgrade their skills as
- new tools become available. Finally, to learn, children need a
- nurturing environment, including a home, an adequate diet, and quality
- health care. Pitting "welfare" versus "education" is a vicious
- prescription for social failure. We call for adequate social services
- to ensure that our children have the environment in which they can
- benefit from their education.
-
- 2. ELIMINATION OF BARRIERS TO ACCESS TO INFORMATION TECHNOLOGY:
- Democracy requires an informed public, with generous access to
- information. However, access to information increasingly requires
- tools such as a computer and a modem, while only 13% of Americans own
- a personal computer, and of them, only 10% own a modem.[2] In
- addition, requiring fees to access databases locks out those without
- money. We must assure access to needed technology via methods such as
- a subsidized equipment program that can make basic computer and
- information technologies available to all. We call for the
- nationalization of research and public information databases, with
- access fees kept to a minimum to ensure access to the data. In many
- cases, the technology itself is a barrier to use of new technologies.
- We strongly encourage the research and development of non-proprietary
- interfaces and standards that simplify the use of new technology.
-
- 3. AN OPEN NATIONAL DATA TRAFFIC SYSTEM: An Information Society
- generates and uses massive amounts of information. It requires an
- infrastructure capable of handling that information. It also
- determines how we communicate with each other, how we disseminate our
- ideas, and how we learn from each other. The character of this system
- will have profound effects on everyone. The openness and accessibility
- of this network will determine the breadth and depth of the community
- we can create.
-
- We call for a "National Data Traffic System" that can accommodate all
- traffic, not just corporate and large academic institution traffic, so
- that everyone has access to public information, and has the ability to
- add to the public information. This traffic system must be accessible
- to all. The traffic system will include a "highway" component, major
- information arteries connecting the country. We propose that the
- highway adopt a model similar to the federal highway system -- that
- is, a system built by and maintained publicly, as opposed to the
- "railroad" model, where the government subsidizes private corporations
- to build, maintain and control the system. The "highway model" will
- guarantee that the system serves the public interest. At the local
- level, the existing telephone and cable television systems can provide
- the "feeder roads", the "streets" and the "alleys" and the "dirt
- roads" of the data network through the adoption of an Integrated
- Services Digital Network (ISDN) system, along the lines proposed by
- the Electronic Frontier Foundation. The features proposed by EFF
- include affordable, ubiquitous ISDN; breaking the private monopoly
- control of the existing communication networks; short of public
- takeover of the networks, affirmation of "common carrier" principles;
- ease of use; a guarantee of personal privacy; and a guarantee of
- equitable access to communications media.[3]
-
- 4. EXPANSION OF THE PUBLIC LIBRARY SYSTEM: The public library system
- represents a public commitment to equal access to information,
- supported by community resources. Yet libraries, in the era of
- Computer and Information Technologies, are having their funding cut.
- We call for adequate funding of public libraries and an extension of
- the library system into neighborhoods. Librarians are the trained
- facilitators of information access. As such, librarians have a unique,
- strategic role to play in the "information society." We call for an
- expansion of library training programs, for an increase in the number
- of librarians, and for additional training for librarians so that they
- can maximize the use of new information-retrieval technology by the
- general public. Every public library must have, and provide to their
- clientele, access to the national data highway.
-
- 5. EXPANSION OF THE PUBLIC INFORMATION TREASURY: A market economy
- encourages the production of those commodities that the largest market
- wants. As information becomes a commodity, information that serves a
- small or specialized audience is in danger of not being collected, and
- not being available. For example, the president of commercial database
- vendor Dialog was quoted in 1986 as saying "We can't afford an
- investment in databases that are not going to earn their keep and pay
- back their development costs." When asked what areas were not paying
- their development costs, he answered, "Humanities."[4] Information
- collection should pro-actively meet broad social goals of equality and
- democracy. We must ensure that the widest possible kinds of social
- information are collected (not just those that have a ready and
- substantial market), while ensuring that the privacy of the individual
- is protected.
-
- 6. FREEDOM OF ACCESS TO GOVERNMENT DATA: Public records and economic
- data are public resources. We must ensure that the principles of
- "Freedom of Information" laws remain in place. Government agencies
- must comply with these laws, and should be punished for
- non-compliance. Government records that are kept in a digital format
- must be available electronically to the general public, provided that
- adequate guarantees are in place to protect the individual.
-
- 7. PROTECTION OF PUBLIC INFORMATION RESOURCES: Recently, we have seen
- a dangerous trend in which the Federal government sells off or
- licenses away rights to information collected at public expense, which
- is then sold back to the public at a profit. Access to public data now
- often requires paying an information-broker look-up fees.[5] Public
- resources must be public. We call for a halt to the privatization of
- public data.
-
- 8. RESTORATION OF INFORMATION AS PUBLIC PROPERTY: "Since new
- information technology includes easy ways of reproducing information,
- the existence of these [intellectual property] laws effectively
- curtails the widest possible spread of this new form of wealth. Unlike
- material objects, information can be shared widely without running
- out."[6] The constitutional rationale for intellectual property rights
- is to promote progress and creativity. The current mechanisms -- the
- patent system and the copyright system -- are not required to ensure
- progress. Other models exist for organizing and rewarding intellectual
- work, that do not require proprietary title to the results. For
- example, substantial and important research has been carried out by
- government institutions and state-supported university research. A
- rich library of public domain and "freeware" software exists. Peer or
- public recognition, awards, altruism, the urge to create or
- self-satisfaction in technical achievement are equally motivators for
- creative activity.
-
- Authors and inventors must be supported and rewarded for their work,
- but the copyright and patent system per se does not ensure that. Most
- patents, for example, are granted to corporations or to employees who
- have had to sign agreements to turn the ownership over to the employer
- through work-for-hire or other employment contracts as a condition of
- employment. The company, not the creating team, owns the patent. In
- addition, in many ways, patents and copyrights inhibit the development
- and implementation of new technology. For example, proprietary
- research is not shared, but is kept secret and needlessly duplicated
- by competing companies or countries. Companies sue each other over
- ownership of interfaces, with the consumer ultimately footing the
- bill. Software developers must "code around" proprietary algorithms,
- so as not to violate known patents; and they still run the risk of
- violating patents they don't know about. We call for a moratorium on
- software patents. We call for the abolition of property rights in
- knowledge, including algorithms and designs. We call for social
- funding of research and development, and the implementation of new
- systems, such as public competitions, to spur development of socially
- needed technology.
-
- B. CIVIL LIBERTIES and PRIVACY
-
- Advances in Computer and Information Technologies have facilitated
- communications and the accumulation, storage and processing of data.
- These same advances may be used to enlighten, empower and equalize but
- also to monitor, invade and control. Alarmingly, we witness more
- instances of the latter rather than of the former. This platform
- calls for:
-
- 1. EDUCATION ON CIVIL LIBERTIES, PRIVACY, AND THE IMPLICATIONS OF NEW
- TECHNOLOGIES: New technologies raise new opportunities and new
- challenges to existing civil liberties. In the absence of
- understanding and information about these technologies, dangerous
- policies can take root. For example, police agencies and the news
- media have portrayed certain computer users (often called "hackers")
- as "pirates" out to damage and infect all networks. While some
- computer crime of this sort does take place, such a demonization of
- computer users overlooks actual practice and statistics. This
- perception has led to an atmosphere of hysteria, opening the door to
- fundamental challenges to civil liberties. Homes have been raided,
- property has been confiscated, businesses have been shut down, all
- without due process. Technology skills have taken on the quality of
- "forbidden knowledge", where the possession of certain kinds of
- information is considered a crime. In the case of "hackers", this is
- largely due to a lack of understanding of the actual threat that
- "hackers" pose. We must ensure that legislators, law-enforcement
- agencies, the news media, and the general public understand Computer
- and Information Technologies instead of striking out blindly at any
- perceived threat. We must also ensure that policy caters to the
- general public and not just corporate and government security
- concerns.
-
- 2. PRESERVATION OF CONSTITUTIONAL CIVIL LIBERTIES: The U.S.
- Constitution provides an admirable model for guaranteeing rights and
- protections essential for a democratic society in the 18th century.
- Although the new worlds opened up by Computer and Information
- Technologies may require new interpretations and legislations, the
- freedoms guaranteed in the Bill of Rights must continue no matter what
- the technological method or medium. Steps must be taken to ensure that
- the guarantees of the Constitution and its amendments are extended to
- encompass the new technologies. For example, electronic transmission
- or computer communications must be considered as a form of speech; and
- information distributed on networked computers or other electronic
- forms must be considered a form of publishing (thereby covered by
- freedom of the press). The owner or operator of a computer or
- electronic or telecommunications facility should be held harmless for
- the content of information distributed by users of that facility,
- except as the owner or operator may, by contract, control information
- content. Those who author statements and those who have contractual
- authority to control content shall be the parties singularly
- responsible for such content. Freedom of assembly should be
- automatically extended to computer-based electronic conferencing.
- Search and seizure protections should be fully applicable to
- electronic mail, computerized information and personal computer
- systems.
-
- 3. RIGHT TO PRIVACY AND THE TECHNOLOGY TO ENSURE IT: Because Computer
- and Information Technologies make data collection, processing and
- manipulation easier, guaranteeing citizen privacy rights becomes
- problematic. Computer and Information Technology make the job of those
- who use data en-masse -- marketing firms, police, private data
- collection firms -- easier. We need to develop policies that control
- what, where, whom and for what reasons data is collected on an
- individual. Institutions that collect data on individuals must be
- responsible for the accuracy of the data they keep and must state how
- the information they obtain will be used and to whom it will be made
- available. Furthermore, we must establish penalties for
- non-compliance with these provisions. Systems should be in place to
- make it easy for individuals to know who has information about them,
- and what that information is.
-
- We must ensure that there is no implementation of any technological
- means of tracking individuals in this country through their everyday
- interactions. Technology exists that can ensure that electronic
- transactions are not used to track individuals. Encrypted digital
- keys, for example, provide the technical means to achieve anonymity in
- electronic transactions while avoiding a universal identifier. Where
- government financial assistance is now provided electronically, we
- must ensure that these mechanisms help empower the recipient, and do
- not become sophisticated means of tracking and policing behavior
- (e.g., by tracking what is bought, when it is bought, where it is
- bought, etc.).
-
- The technology to effectively ensure private communications is
- currently available. The adoption of a state-of-the-art standard has
- been held up while the government pushes for mandatory "back-doors" so
- that it can monitor communication. (Computer technology is treated
- differently here; for example, we do not legislate how complex a lock
- can be.) We must ensure that personal communication remains private by
- adopting an effective, readily available, de-militarized encryption
- standard.
-
- 4. COMMUNITY CONTROL OF POLICE AND THEIR TECHNOLOGY: New technologies
- have expanded the ability of police departments to maintain control
- over communities. The Los Angeles Police Department is perhaps an
- extreme example: they have compiled massive databases on
- African-American and Latino youth through "anti-gang" mass
- detainments. These databases are augmented by FBI video and photo
- analysis techniques. "But the real threat of these massive new
- databases and information technologies is... their application on a
- macro scale in the management of a criminalized population."[7] With
- new satellite navigational technology, "we shall soon see police
- departments with the technology to put the equivalent of an electronic
- bracelet on entire social groups."[8] We call for rigorous community
- control of police departments to protect the civil liberties of all
- residents.
-
- C. WORK, HEALTH and SAFETY
-
- Computer and Information Technologies are having a dramatic effect on
- work. New technologies are forcing a reorganization of work. The
- changes affect millions of workers, and are of the same level and
- magnitude as the Industrial Revolution 150 years ago. The effects have
- been disastrous -- the loss of millions of manufacturing jobs, a fall
- in wages over the past 15 years, the lengthening of the work week for
- those who do have jobs, a rise in poverty and homelessness. Employed
- Americans now work more hours each week that at any time since 1966,
- while at this writing 9.5 million workers in the "official" workforce
- are unemployed, and millions more have given up hope of ever finding
- work.[9] Too often, products and profitability are given priority over
- the needs and health of the workers who produce both. For example,
- research is done on such matters as how humans contaminate the clean
- room process,[10] not on how the chemicals used in chip manufacturing
- poison the handlers. Or new technologies are implemented before
- adequate research is carried out on how they will affect the worker.
- This misplaced emphasis is wrong. This platform calls for:
-
- 1. GUARANTEED INCOME FOR DISPLACED WORKERS: New technologies mean an
- end to scarcity. Producing goods to meet our needs is a conscious
- human activity. Such production has been and is currently organized
- with specific goals in mind, namely the generation of the greatest
- possible profit for those who own the means of production. We can
- re-organize production.
-
- With production for private profit, corporations have implemented
- robotics and computer systems to cut labor costs, primarily through
- the elimination of jobs. Over the last ten years alone, one million
- manufacturing jobs have disappeared in the U.S. Workers at the jobs
- that remain are pressured to take wage and benefits cuts, to "compete"
- in the global labor market made possible by digital telecommunications
- and modern manufacturing techniques. Most new jobs have been created
- in the low-pay service sector. As a result, earnings for most workers
- have been falling.[11] The corporate transfer of jobs to low-wage
- areas, including overseas, affects not only low-skill assembly line
- work or data entry, but also computer programming and data analysis.
-
- Wages and benefits must be preserved in the face of automation or
- capital flight. Remaining work can be spread about by shortening the
- work week while maintaining the weekly wage rate. At the same time,
- steps must be taken to acknowledge that the nature of work is
- changing. In the face of the new technologies' ever-increasing
- productivity utilizing fewer and fewer workers, the distribution of
- necessities can no longer be tied to work. We must provide for workers
- who have lost their jobs due to automation or job flight, even if no
- work is available, by guaranteeing a livable income and retraining
- opportunities (see #6 below).
-
- 2. IMPROVED QUALITY OF WORK THROUGH WORKER CONTROL OF IT: Millions
- work boring, undignified jobs as a direct result of computer and
- information technology. Work is often degraded due to de-skilling,
- made possible by robotics and crude artificial intelligence
- technology; or by job-monitoring, made simple by digital technology.
- (Two-thirds of all workers are monitored as they work.[12]) Workers
- face greater difficulties in organizing to protect their rights.
- Technologies are often foisted on the workers, ignoring the obvious
- contributions the workers can make to the design process. The
- resulting designs further deprive the worker of control over the work
- process. In principle, tools should serve the workers, rather than the
- workers serving the tools.
-
- But new technologies could relieve humans of boring or dangerous work.
- Technology enables us to expand the scope of human activity. We could
- create the possibility of "work" becoming leisure. We call for the
- removal of all barriers to labor organizing as the first step toward
- giving workers the power to improve the quality of their work. Workers
- must be protected from intrusive monitoring and the stress that
- accompanies it. We must ensure worker involvement in the design
- process. We must also improve the design of user interfaces so that
- users can make full use of the power of the technology.
-
- Furthermore, it is not enough just to "participate" in the design
- process -- worker involvement must correspond with increased control
- over the work process, goals, etc. In other words, we must ensure that
- there is "no participation without power." Computer and Information
- Technologies facilitate peer-to-peer work relationships and the
- organization of work in new and challenging ways. Too often, though,
- in practice we see a tightening of control, with management taking
- more and more direct control over details on the shop floor. We must
- ensure that new technologies improve rather than degrade the nature of
- work.
-
- 3. EMPHASIS ON HEALTH AND SAFETY: Technologies are often developed
- with little or no concern for their effect on the workers who
- manufacture or use them.
-
- Electronics manufacturing uses many toxic chemicals. These chemicals
- are known to cause health problems such as cancer, birth defects and
- immune system disorders. Workers are entitled to a safe working
- environment, and must have the right to refuse unsafe work without
- fear of penalty. Workers have the right to know what chemicals and
- processes they work with and what their effects are. We call for
- increased research into developing safe manufacturing processes. We
- call for increased research into the effects of existing manufacturing
- processes on workers, and increased funding for occupational safety
- and health regulation enforcement.
-
- The rate of repetitive motion disorders has risen with the
- introduction of computers in the workplace -- they now account for
- half of all occupational injuries, up from 18% in 1981.[13]
- Musculo-skeletal disorders, eyestrain and stress are commonly
- associated with computer use. There is still no conclusive study on
- the harmful effects of VDT extremely low frequency (ELF) and very low
- frequency (VLF) electromagnetic field emissions.[14] Together these
- occupational health tragedies point to a failure by manufacturers,
- employers and government to adequately research or implement policies
- that protect workers. We call for funding of major studies on the
- effects of computers in the workplace. We call for the immediate
- adoption of ergonomic standards that protect the worker. We must
- ensure that pro-active standards exist before new technologies are put
- in place. Manufacturers and employers should pay now for research and
- worker environment improvement rather than later, after the damage has
- been done, in lawsuits and disability claims. We must ensure that
- worker safety always comes first, not short-sighted, short-term
- profits that blindly overlook future suffering, disabilities and
- millions in medical bills.
-
- 4. EQUAL OPPORTUNITY TO WORK: Computer and Information Technology
- institutions are overwhelmingly dominated by white males. Programs
- must be adopted to increase the direct participation of
- under-represented groups in the Computer and Information Technology
- industries.
-
- 5. PROTECTION FOR THE HOMEWORKER: Computer and Information
- Technologies have enabled new patterns of working. "Telecommuting" may
- be preferred by many workers, it may expand opportunities for workers
- who are homebound, and it would reduce the wastefulness of commuting.
- At the same time, homework has traditionally increased the
- exploitation of workers, deprived them of organizing opportunities,
- and hidden them from the protection of health and safety regulations.
- We must guarantee that crimes of the past do not reappear in an
- electronic disguise. Computer and Information Technologies make
- possible new forms of organization for work beyond homework, such as
- neighborhood work centers: common spaces where people who work for
- different enterprises can work from the same facility. Such
- alternative structures should be supported.
-
- 6. RETRAINING FOR NEW TECHNOLOGIES: As new technologies develop, new
- skills are required to utilize them. Workers are often expected to pay
- for their own training and years of schooling at no cost to the
- employer. Training workers in new skills must be a priority, the cost
- of which must be shared by employers and the government, and not the
- sole responsibility of the worker.
-
- D. THE ENVIRONMENT
-
- We share one planet. While our understanding of the environment
- increases, and the impact of previous technologies and neglect become
- more and more apparent, too little attention is paid to the effects of
- new technologies, including Computer and Information Technologies, on
- the environment, both physical and cultural. The creation of a global
- sustainable economy must be a priority. This platform calls for:
-
- 1. ENVIRONMENTALLY SAFE MANUFACTURING: The manufacture of electronics
- technology is among the most unhealthy and profoundly toxic human
- enterprises ever undertaken.[15] The computer and information
- technology industries must be cleaned up. Manufacturers cannot
- continue their destruction of our environment for their profit. They
- must be made to pay the actual cost of production, factoring in
- environmental cleanup costs for manufacturing methods and products
- that are environmentally unsafe. Priority must be placed on developing
- and implementing new manufacturing techniques that are environmentally
- safe, such as the "no-clean" systems which eliminate ozone-shredding
- chlorofluorocarbons (CFCs) from the production of electronic circuit
- boards.[16] We must ensure that these standards are adopted globally,
- to prohibit unsafe technologies from migrating to other countries with
- lax or non-existent environmental protection laws. No manufacturing
- technique should be implemented unless it can be proven to be
- environmentally safe. We must ensure industry's responsiveness to the
- communities (and countries) in which they are located. Neighborhoods
- and countries must participate in the planning process, and must be
- informed of the environmental consequences of the industries that
- surround them. They must have the right to shut down an enterprise or
- require the enterprise to cleanup or change their manufacturing
- processes.
-
- 2. PLANNING FOR DISPOSAL OR RE-USE OF NEW PRODUCTS: As new
- technologies become commodities with a finite life-cycle, new
- questions loom as to what happens to them when they are discarded.
- Little is known about what happens to these products when they hit the
- landfill. We must ensure that manufacturers and designers include
- recycling and/or disposal in the design and distribution of their
- products. Manufacturers must be responsible for the disposal of
- commodities once their usefulness is exhausted. Manufacturers must
- make every effort to ensure longevity and re-use of equipment. For
- example, product specifications might be made public after a specified
- period of time so that future users could continue to find support for
- their systems. Or manufacturers might be responsible for ensuring that
- spare parts continue to be available after a product is no longer
- manufactured. Manufacturers could sponsor reclamation projects to
- strip discarded systems and utilize the components for training
- projects or new products, or they could facilitate getting old
- equipment to people who can use it.
-
- 3. RECLAMATION OF THE CULTURAL ENVIRONMENT AS PUBLIC SPACE: We live
- not only in a natural environment, but also in a cultural environment.
- "The cultural environment is the system of stories and images that
- cultivates much of who we are, what we think, what we do, and how we
- conduct our affairs. Until recently, it was primarily hand-crafted,
- home-made, community-inspired. It is that no longer."[17] Computers
- and information technologies have facilitated a transformation so that
- our culture is taken and then sold back to us via a media that is
- dominated by a handful of corporations. At the same time, new
- technologies promise new opportunities for creativity, and new
- opportunities for reaching specific audiences. But both older (e.g.,
- book and newspaper publishing) and newer (e.g., cable television and
- computer games) media throughout the world are controlled by the same
- multi-national corporations. We advocate computer and information
- technology that fights the commodification of culture and nurtures and
- protects diversity. This is only possible with a rigorous public
- support for production and distribution of culture. We must use new
- technologies to ensure the diverse points of view that are necessary
- for a healthy society. We must ensure a media that is responsive to
- the needs of the entire population. We must ensure true debate on
- issues of importance to our communities. We must ensure that our
- multi-faceted creativity has access to an audience. And we must also
- recognize that in many cultural instances computer and information
- technology tools are intrusive and inappropriate.[18]
-
-
- *****************************************************************
-
- E. INTERNATIONAL COOPERATION
-
- Historically, information flow around the world has tended to be
- one-way, and technology transfer from developed countries to
- underdeveloped countries has been restricted. These policies have
- reinforced the dependency of underdeveloped countries on the U.S.,
- Japan and Western Europe. As international competition for markets and
- resources intensifies, "national competitiveness" has become a
- negative driving consideration in technology policy. This platform
- calls for:
-
- 1. REPLACEMENT OF "NATIONAL COMPETITIVENESS" WITH "GLOBAL
- COOPERATION": The most popular rationale for investing in high
- technology in the United States is "national competitiveness." This is
- an inappropriate rhetoric around which to organize technology policy.
- It ignores the fact that the largest economic enterprises in the world
- today are international, not national. "National competitiveness" is
- also inappropriate in a world of increasing and accelerating global
- interdependence and a detailed division of labor that now routinely
- takes in the entire planet's workforce. Finally, "national
- competitiveness" is inappropriate in a world in which two-thirds of
- the world's population lives in abject poverty and environmental
- collapse -- the rhetoric of "national competitiveness" should be
- replaced by a rhetoric of "global cooperative development."
-
- 2. GLOBAL DISTRIBUTION OF TECHNICAL WEALTH: The global division of
- labor is fostering a "brain drain" of scientists and engineers,
- transferring badly-needed expertise from the developing world to the
- industrialized world. Fully 40% of the engineering graduate students
- in American universities are from foreign countries, typically from
- countries with little or no advanced technological infrastructure. A
- large majority of these graduate students stay in the U.S. when they
- complete their studies. American immigration laws also favor
- immigrants with advanced scientific or technical education. This
- intensifies the disparity between the advanced countries and those
- with widespread poverty. This concentration of technical expertise
- reinforces a global hierarchy and dependence. Expertise on questions
- of international import, such as global warming, toxic dumping, acid
- rain, and protection of genetic diversity becomes the exclusive domain
- of the developed countries. With so much of the world's scientific
- and technical expertise located in the monoculture of the
- industrialized world, the developing world has the disadvantage not
- only of meager financial resources and dependence on foreign capital,
- but the added disadvantage of living under the technical domination of
- the rich countries. This platform calls for a conscious policy of
- distributing scientific and technical talent around the world. For
- example, incentives can be given to encourage emigration to countries
- in need of technological talent.
-
- 3. AN END TO THE WASTE OF TECHNICAL RESOURCES EMBODIED IN THE
- INTERNATIONAL ARMS TRADE: The world currently spends about $1 trillion
- annually on weapons. This is a massive transfer of wealth to
- arms-producing countries, and especially the United States, the
- world's largest arms exporting nation.[19] Weapons of interest to all
- countries are increasingly high tech, so a continuing disproportion of
- international investments in high technology will be in weapons
- systems. Weapons sales not only increase international tensions and
- the likelihood of war, but they also reinforce authoritarian regimes,
- deter democratic reform, support the abuse of human rights, divert
- critical resources from urgent problems of human and environmental
- need, and continue the accelerating disparity between rich and poor
- nations. We call for a complete and permanent dismantling of the
- global arms market.
-
- 4. A NEW INTERNATIONAL INFORMATION ORDER: The growing disparity
- between "information rich" and "information poor" is by no means
- limited to the U.S. Disparities within industrialized countries are
- dwarfed by international disparities between the industrialized
- countries and the developing world. A global telecommunications regime
- has developed that favors the rich over the poor, and the gap is
- growing steadily. As a simple example, rich countries are able to
- deploy and use space-based technologies such as earth-surveillance
- satellites and microwave telecommunications links to gather
- intelligence and distribute information all over the globe. The
- concentration of information power in single countries is even more
- advanced when viewed internationally. We call for the placement of
- international information collection and distribution under
- international control.
-
- 5. EQUITABLE INTERNATIONAL DIVISION OF LABOR: Improved communication
- and coordination made possible by Computer and Information
- Technologies has accelerated the development of a new global division
- of labor where dirty manufacturing industries are moved to developing
- countries, and "clean" knowledge industries are promoted in the
- developed countries. This pattern of development ensures that
- underdeveloped countries remain underdeveloped and turns them into
- environmental wastelands. We must ensure a truly new world order that
- equitably distributes work, and ends the destruction and enforced
- underdevelopment of vast sections of the world's population.
-
- F. RESPONSIBLE USE OF COMPUTERS and INFORMATION TECHNOLOGIES
-
- Computer and Information Technologies were born of the military and to
- this day are profoundly influenced by the military. People often talk
- of the "trickle down" or "spin-off" effect, in which money spent on
- military applications yields technology for general, non-military
- applications. This makes little sense when the military pursues absurd
- or irrelevant technology such as computer chips that will survive a
- nuclear war. There are very few, if any, cases of military technology
- producing tangible commercial breakthroughs. At the same time, various
- studies have shown that money invested in non-military programs
- creates more jobs than money invested in military hardware. Also, new
- technologies are developed with little or no public discussion as to
- their social consequences. Technologies are developed, and then their
- developers go in search of problems for their technology to solve.
- Pressing social needs are neglected, while elite debates about
- technology focus on military applications or consumer devices like
- high definition television (HDTV). Or pressing social problems are
- approached as "technical" problems, fixable by new or better
- technology. This platform calls for:
-
- 1. NEW EMPHASIS IN TECHNICAL RESEARCH PRIORITIES: Current research
- planning is either in private hands, or closely controlled by
- government agencies. As a result, research priorities are often
- shielded from public discussion or even knowledge. New technologies
- are often developed as "tools looking for uses, means looking for
- ends"[20] or to serve destructive rather than constructive goals. HDTV
- and the Strategic Defense Initiative (SDI) are examples. Substantial
- university research on new technologies is still financed and
- controlled by the Department of Defense. While military-based research
- has occasionally led to inventions which were of general use, this
- effect has been mostly coincidental, and the gap between the interests
- of military research and the needs of society has widened to the point
- that even such coincidental "public good" from military controlled
- technology research now seems unlikely. These misguided research
- priorities not only waste financial resources, but drain away the
- intellectual resources of the scientific community from pressing
- social problems where new technological research might be particularly
- useful such as in the area of the environment. We must ensure that
- Computer and Information Technology research is problem-driven and is
- under the control of the people it will affect. We must ensure that
- new technologies will not be harmful to humans or the environment. We
- must ensure that human and social needs are given priority, as opposed
- to support for military or police programs. We must ensure that
- technical research is directed toward problems which have a realistic
- chance of being solved technically rather than blindly seeking
- technical solutions for problems which ought to be addressed by other
- means.
-
- 2. CONVERSION TO A PEACETIME ECONOMY: There is no justification for
- the power the Pentagon holds over this country, particularly in light
- of recent international developments. We must dismantle our dependency
- on military programs. We must realign our budget priorities to focus
- on social problems rather than on exaggerated military threats. The
- released research and development monies should be redirected toward
- solving pressing social and environmental problems. We must move
- towards the goal of the elimination of the international market in
- weapons. Job re-training in socially useful skills must become a
- priority.
-
- 3. SOCIALLY RESPONSIBLE ENGINEERING AND SCIENCE: "Proposed
- technological projects should be closely examined to reveal the covert
- political conditions and artifact/ideas their making would entail. It
- is especially important for engineers and technical professionals
- whose wonderful creativity is often accompanied by appalling
- narrow-mindedness. The education of engineers ought to prepare them to
- evaluate the kinds of political contexts, political ideas, political
- arguments and political consequences involved in their work."[21] To
- this list we can add developing an appreciation for the
- interconnectedness of the environments -- the natural, social and
- cultural -- we work in. We call for an increased emphasis on training
- in social education in the engineering and science departments of our
- schools and universities, public and private research laboratories and
- manufacturing and development facilities in order to meet these goals.
- Engineers must be exposed to the social impact of their work. This
- could be done through work-study projects or special fellowships. We
- need to also expand the body of people who "can do technology", that
- is, not only "humanize the hacker", but "hackerize the humanist" or
- "engineerize the worker."
-
- ------------------------------
-
- End of Computer Underground Digest #4.58
- ************************************
-