home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed July 20, 1994 Volume 6 : Issue 66
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copper Ionizer: Ephram Shrustleau
-
- CONTENTS, #6.66 (Wed, July 20, 1994)
-
- File 1--Roger Clarke on authoritarian IT (fwd)
- File 2--cDc Global Domination Update #15
- File 3--Privacy at risk: Educational Records
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Mon, 23 May 1994 13:33:48 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 1--Roger Clarke on authoritarian IT (fwd)
-
- From--Phil Agre <pagre@weber.ucsd.edu>
- Subject--Roger Clarke on authoritarian IT
-
- INFORMATION TECHNOLOGY
- WEAPON OF AUTHORITARIANISM OR TOOL OF DEMOCRACY?
-
-
- Paper being presented at the IFIP World Congress, Hamburg, 31 August 1994
-
-
- Roger Clarke
- Department of Commerce
- Australian National University
- Canberra ACT 0200
- Roger.Clarke@anu.edu.au
-
-
- Strong tendencies exist to apply information technology to support
- centralist, authoritarian world views. It is argued that alternative
- architectures can be readily created, which are more attuned to the
- openness and freedoms which are supposed to be the hallmarks of democratic
- government. It is questioned whether authoritarianism will be capable of
- surviving the complexities, dynamism and widely distributed power which are
- features of the emergent information societies.
-
- Keyword Codes: H.1, J.1, K.4
- Keywords: information systems; administrative data processing;
- computers and society
-
-
- 1. INTRODUCTION
-
- The genre of 'anti-utopian' novels described futures repugnant to humanity.
- The classic image of an information-rich government dominating citizens'
- thoughts and actions is associated with Zamyatin's 'We' (1922) and Orwell's
- '1984' (1948), but the technological basis of the surveillance culture had
- been established as early as the late nineteenth century by Jeremy
- Bentham's designs for a model prison, incorporating the all-seeing and
- ubiquitous 'panopticon' (1791). Foucault (1975) argued that the prison
- metaphor was the leitmotiv of authoritarian society. Bradbury's
- 'Fahrenheit 451' (1953) and Umberto Eco's 'The Name of the Rose' (1980)
- speculated on the process and implications of denying information to the
- public.=20
-
- Art anticipated reality. Information technology (IT) is now being
- systematically applied to public administration in ways consistent with the
- anti-utopian nightmare. This paper's purpose is to review the
- authoritarian model as a basis for applying IT in government, and to
- champion an alternative, democratic model of IT use.
-
-
- 2. AUTHORITARIANISM'S UNDERLYING ASSUMPTIONS AND VALUES
-
- An authoritarian society favours obedience to Authority over individual
- freedoms, to the extent of demanding subservience of the individual to the
- State. The notion clusters with tyranny (the cruel exercise of power),
- despotism and dictatorship (the exercise of absolute power),
- totalitarianism (single-party government) and fascism (a usually savage
- blend of authoritarianism with nationalism).
-
- Authoritarianism is associated with logical positivist and utilitarian
- philosophies. These perspectives place very high value on rational social
- engineering, law and order, and resource efficiency. The populace is
- perceived as unsophisticated, uneducated, unreliable, chaotic, and/or
- incorrigibly venal and immoral. For their own good, the organised State
- must impose control on the unruly people.
-
- A further assumption of the authoritarian perspective is that there exist
- humans with a level of both intelligence and morality superior to the
- common herd. In different ideologies, their innate superiority derives
- from different sources, such as the divine right of kings, wealth, force of
- arms, mystical power, what Machiavelli called virt=FA, wisdom, intellectual
- merit, technical capability, political cunning, demagogery, and/or public
- popularity. These superior humans are accepted as being the appropriate
- ones to make judgements on behalf of their society, with a minimum of
- checks and balances. They do this through social engineering; that is to
- say by organising and re-organising society in what they consider the
- rational way of achieving order and efficiency, and hence of delivering
- material well-being, and therefore spiritual happiness, for all.
-
-
- 3. THE AUTHORITARIAN MODEL OF I.T. APPLICATIONS
-
- Under an authoritarian regime, the populace must be managed. Tools and
- techniques that have proven effective in managing raw materials,
- manufactured goods and animals, can be applied to humans too. A unique
- identifier for each person, and its general use by government agencies and
- other organisations which conduct transactions with people, are highly
- desirable tools for efficient social administration. Public administration
- systems must be designed to exercise control over people, in all of their
- various roles. There may be scope for at least some semblance of choice by
- individuals, but employees need to operate within a corporate culture,
- consumer demand needs to be statistically predictable, and citizens'
- freedom of choice needs to be constrained, lest unworkable parliaments
- eventuate, with too many splinter parties, independents and conscience
- votes.
-
- It is only logical that an authoritarian society should recognise the
- benefits of a unary executive branch, in which the boundaries between
- agencies are porous. In this way, data can flow freely (such that
- transaction data and client histories can be cross-verified, and changes of
- address and status cross-notified), and systems can be tightly integrated
- and efficient (and hence misdeameanours by people in one arena, such as
- traffic fines, can be readily punished through another, such as denial of a
- marriage licence, permission to move apartments, or approval for travel).
-
- Authoritarian IT-based systems use a centralised architecture. Elements
- may be physically dispersed, however, to achieve efficiency in data
- transmission, and to provide resilience against localised threats such as
- natural disasters and sabotage by dissidents. The general shape of such
- systems is that provided by cyberneticians: a cascade of control loops,
- culminating in a master-controller. In authoritarian regimes, information
- privacy and data security play important roles. These have little to do
- with the protection of people, however, but rather serve to protect the
- integrity of data, and of the system, and to legitimate the repressive
- system through the provision of nominal rights for data subjects.
-
- =46or discussions of the authoritarian application of technology in general,
- see Ellul (1964) and Packard (1964), and of IT in particular, see Rule
- (1974), Weizenbaum (1976), Kling (1978), Rule et al. (1980), Burnham
- (1983), OTA (1986), Laudon (1986), Clarke (1988), Davies (1992) and
- Ronfeldt (1992, pp.277-287).
-
-
- 4. INSTANCES OF AUTHORITARIAN APPLICATION OF I.T.
-
- The reader is by now (hopefully) annoyed by the extent to which the
- foregoing description has been a caricature, hyperbole, a 'straw man'
- designed to be easily criticised. However there are manifold instances of
- just these features in IT-based public administration systems, both those
- in operation and being conceived, in countries throughout the world. In
- North America, whose use of IT has been well ahead of that in most other
- countries, a 'national data center' was proposed as early as 1966.
- Elements of it have emerged, such as the widespread use of the Social
- Security Number (SSN) as a unique identifier, proposals for a health id
- card, and the all-but uncontrolled use of computer matching and profiling.
- Some protagonists in the current debates surrounding the national
- information infrastructure (NII) are seeking a network consistent with
- authoritarian control; for example, by insisting on use only of those
- cryptographic techniques which are 'crackable' by national security
- agencies.
-
- Australia has followed the North American tendency. It flirted with a
- national identification scheme in the late 1980s (Greenleaf & Nolan 1986,
- Clarke 1987, Graham 1990). When that was overwhelmingly rejected by the
- populace, senior executives in public sector agencies 'went underground'.
- They have variously gained Parliamentary support for, and smuggled through,
- a series of measures whose cumulative impact is in some ways already more
- emphatic than the 'Australia Card' would have been (Clarke 1992).
-
- The cultures of many Asian nations are well-suited to authoritarian
- regimes. There are elements of high-social-efficiency applications of IT
- in such nations as Singapore. Busy Asian countries have shown especial
- interest in vehicle monitoring systems. Thailand and the Phillipines
- appear eager to act as laboratories for United States corporations
- developing identification and surveillance technologies. Under China's
- strongly authoritarian political system, it is unlikely that IT will be
- applied in any way other than to bolster existing relationships between its
- citizens and the State.
-
- In Western Europe, Scandinavian countries lead the way with their social
- welfare systems and the heavy dependence of their citizens on the State.
- Denmark's citizen register is a model for authoritarian regimes everywhere,
- and a looming export success. Other countries are keenly adopting
- proposals to use IT to constrain the populace, by such means as
- identification cards (variously for football fans, patients, and the public
- in general), and the integration of data systems between government
- agencies, and between countries within and beyond the European Community.
-
- In Central and Eastern Europe, there was an expectation that democratic,
- free enterprise systems would arise to replace the authoritarianism of the
- collapsed communist regimes. In practice, few of those countries have ever
- known freedom of choice, and genuine democracy (as distinct from variants
- of authoritarianism referred to in local lexicons as 'democracy') is not on
- the agenda of many of these countries. Their focus is on economic growth,
- rationalist solutions to economic and social problems, and centralism. IT
- is seen as a tool of authoritarianism, not of democracy; of centralised
- power, not of a pluralist body politic; and of control, not of freedom.
-
- It can come as no surprise that public administration systems are being
- conceived in these ways. Applications of all kinds are developed by
- well-trained and self-confident engineers, using unequivocally rationalist
- techniques. System design comprises the expression of relevant parts of
- the present and near-future world in a formal model which has the important
- characteristic of being 'mappable' onto a machine. The application's users
- and 'usees' (i.e. the people affected by it) are treated as objects to be
- modelled, not as stakeholders with interests in the process and its
- outcomes. Human language is treated as though it were an (imprecise)
- formalism, rather than a means of interaction among people. The designers
- fail to notice that their formalisms cannot reflect the complexities,
- ambiguities and dynamism inherent in social systems, and the negotiation
- and accommodation processes which take place among humans and social groups
- (Clarke 1992b, Ciborra 1992, Agre 1994, Gronlund 1994).
-
- Hence the problems highlighted in this paper are to a considerable degree
- inherent in the techniques currently used to develop IT applications
- generally. Nonetheless, their greatest impact on people's freedom is by
- way of public administration systems.
-
-
- 5. THE DEMOCRATIC ALTERNATIVE
-
- The technological determinism notion has been applied to IT. In
- particular, IT has been accused of being inherently de-humanising,
- centralist and authoritarian (e.g. Roszak 1986). The standpoint adopted by
- this author is that technology is essentially morally 'ambivalent' (i.e. it
- has potential applications and potential impacts variously supportive of,
- and inimical to, any particular social value - Ellul, 1990). IT may make
- some paths easier than others, but the choice is made not by blind fate,
- but by politicians, government executives, and, not least, IT
- professionals.
-
- The alternative political philosophy to authoritarianism is democracy,
- popularly expressed as 'government of the people by the people for the
- people', and commonly implemented through representatives chosen regularly
- and frequently by the combined and equal vote of all competent adults. The
- democratic ideal derives from the assumption that no class of people has
- the right to dominate other classes. It reflects the renaissance
- conception of mankind, whereby each individual should have the opportunity
- to access and interpret for themselves the ideas of other people and of
- Gods; and, in more modern terms, should have the scope for
- self-determination and self-fulfilment.
-
- Early computer technology may indeed have encouraged centralisation, but
- since the marketplace debut of integrated circuitry and the mini-computer
- about 1970, modern IT has been readily applied in the service of democracy.
- Open IT-based systems involve nodes which are 'peers', with equal
- authority in respect of particular functions. For example, in a national
- health network, each node might take responsibility for all processing and
- storage relating to a particular aspect of the system's functionality (e.g.
- support of a particular regional clinic, or epidemiological research into a
- particular class of diseases), and have special rights recognised by all
- other nodes in that regard (e.g. the right of access, respectively, to
- identified data relating to specific patients, and to identifiable data
- relating to particular diseases and procedures). Similarly, particular
- kinds of data held at each node (e.g. data identifying a patient) might be
- recognised as being controlled by that node and require special authority
- before it could be released to any other node.
-
- One form of democratic topology is the unconstrained network, with maximum
- inter-connectivity, and dominion by each node over the services it
- provides. Another model is a variant on simple-minded cybernetics: a
- cascade of controllers which folds around, such that the ultimately
- controlled (the populace) are also the ultimate controllers (the voters).
- Before modern communications became available, the only practicable
- democratic mechanism for geographically large countries was periodic
- (typically, 3- or 4-yearly) election of representatives. In information
- societies of the very near future, however, major policy decisions can be
- instigated, formulated, and decided by direct democracy. Voters may choose
- to delegate the articulation of broad policies to their elected
- representatives, but even this can be subject to the over-riding of
- unpopular decisions, and the removal of representatives the electorate
- considers are not performing their functions.
-
- Hierarchical topologies serve authoritarianism, whereas non-hierarchical
- ones are consistent with a free society. Access to data under the control
- of each node must be restricted, until and unless, via due process,
- disclosure is justified in fulfilment of some higher interest. Such
- topologies provide not only robustness and adaptability, but also
- integrity, because clients can trust them, and there is a lower risk of
- loss of quality (through suspicion and uncooperativeness), and of sabotage
- (through active attempts to mislead, and direct, destructive action).
-
-
- 6. INSTANCES OF DEMOCRATIC APPLICATION OF I.T.
-
- Is this image of democratic computing just a caricature too? Possibly, but
- examples exist. Local Area Network architectures are inverting the old
- notion of centralist processors accessed by terminals. The
- now-conventional names reflect the fact that 'client' workstations demand
- data and processing from 'servers': the user's device is in control, and
- the central facility performs at its bidding. In wide-area networking
- also, peer-to-peer protocols are rivalling and may be progressively
- replacing the older, hierarchical or 'star' configurations. At the level
- of inter-networking, the topology of the world-wide TCP/IP-based Internet
- is essentially flat, the systems software is highly distributed, the
- redundancy is very high, and its robustness, its resilience and its
- capacity to resist authoritarian governments are therefore all of a high
- order.
-
- The Internet's technical features have resulted in a culture very different
- from that on hierarchical nets. It provides a space in which imaginations
- have substantial freedoms. Some people use those freedoms to create new
- services and products; others to experiment with self-expression and
- group-experiences; some as a 'cybernetic' analogue to psychotropic drugs;
- and some just to distribute pornography or racist materials. Nor are the
- boundaries between these activities always clear-cut.
-
- It seems ironical that the Internet was sponsored by the United States
- military complex, but the irony is more apparent than real. Systems which
- support military operations cannot risk the fragility of centralisation,
- but rather demand robustness and resilience, and therefore redundancy.
- Moreover, aero-space-defense R. & D. is dispersed across vast numbers of
- universities and private sector research laboratories. It then seeks to
- complement competition by collaborative interaction among individual
- researchers and among potential research partners. To retain its
- technological and intellectual leadership, it was essential that the U.S.A.
- avoid the temptation to sustain centralised, authoritarian topologies; and
- to its credit it knowingly spawned a dynamic, world-wide, democratic
- network laboratory.
-
-
- 7. A SYNTHESIS
-
- This paper has considered the extremes of authoritarianism and democracy.
- Clearly, any society will demand not only freedoms, but also protections
- against those who use those freedoms to harm others. Naive authoritarian
- models are doomed to fail, because they deny freedoms; and naive
- democratic models are doomed to fail too, because they deny protections.
- Ronfeldt concluded that IT-based public administration (which he calls
- 'cyberocracy') "far from favoring democacy or totalitarianism ... may
- facilitate more advanced forms of both" (1990, p.283). How should new
- 'cyberocracies' be designed, and how should existing public administration
- systems be adapted to exploit the new opportunities, while balancing the
- needs for control and freedom?
-
- Authoritarian aspects of schemes could be justifiable in some societies as
- interim measures. Lenin and then Stalin judged that the country's large
- peasant population, and its institutions, were insufficiently mature for
- immediate implementation of the full Communist platform. Unfortunately the
- repression inherent in their interim arrangements became ingrained, and was
- only relieved by counter-revolution. Authoritarian elements in public
- administration should therefore be not only justified, but also
- demonstrably interim, i.e. the means must be shown whereby they will be
- replaced, by evolutionary processes, with alternative mechanisms consistent
- with democratic principles.
-
- In any case, the feasibility of grafting democratic features onto an
- essentially hierarchical model must be regarded as very slim. All power
- vests in the centre, and any softening of the system's features is by gift
- of the powerful. Moreover, the system can be manipulated by the powerful
- (for example, by monitoring nominally confidential communications), and
- privileges can be withdrawn by the powerful. No freedom-loving populace
- could regard such a system as credible, and would therefore only submit to
- it as a result of coercion.
-
- Is the alternative feasible: to graft control mechanisms onto an
- essentially open model? Communication channels can still be tapped and
- storage devices searched (under warrant). Evidence arising from such
- interceptions and searches can still be presented in a court of law.
- Certain actions and uses of IT can be expressly made illegal. The ex post
- facto controls can therefore still function within open, democratically
- conceived public administration. Toffler distinguished this form of IT
- application by coining the term 'practopia' (1980, p.368).
-
- What is not so simple to contrive within open systems is effective
- real-time monitoring and control: Foucault's 'prison' is readily
- implemented using hierarchical topologies, but if the nodes and arcs of
- networks are not all under the control of Authority, then preventive
- controls become much harder to bring to fruition. That, then, is the
- essential battleground between authoritarian and democratic models of IT:
- should someone or some class of people, and in particular politicians and
- senior public sector executives, be permitted to have the power to prevent
- transgressions? Because it is that kind of control over the public which
- is at the very heart of the anti-utopian nightmare.
-
-
- 8. CONCLUSIONS
-
- Power does not need to be explicitly and consciously granted to public
- administrators by the voting public, or by their elected representatives.
- It can accrue, slowly and gently, through developments in IT, through new
- applications of established techniques, through the gradual 'creep' of
- existing schemes into new functions, and through seemingly harmless
- refinements to statutes. As frogs are reputed to do, a society might
- resist being put into boiling water, yet be lulled to sleep in warm water
- slowly brought to the boil.
-
- This paper commenced by referring to early literary premonitions of
- authoritarian applications of IT. The fictional literature has undergone a
- transition. The turning-point was John Brunner's 'The Shockwave Rider'
- (1975), which explicitly owed a debt to Alvin Toffler's 'Future Shock'
- (1971). For much of the novel, the hero appears to be putting up a brave
- fight against inevitable defeat by the State. By turning the power of the
- net against its sponsors, the hero discovers pockets of surviving
- resistance, and galvanises the latent opposition to the State. Unlike
- anti-utopian novels, the book ends on an ambiguous, but (from the
- humanistic perspective) an optimistic note.
-
- Subsequent novels have adopted a quite different pattern. In such works as
- William Gibson's 'Neuromancer' (1984), and the 'cyberpunk' genre it spawned
- (see Sterling 1986), people are prosthetic-enhanced cyborgs, plug directly
- into the net, and induce their 'highs' through a mix of drugs and
- cyberspace. More importantly for the argument being pursued here, national
- and regional governments exercise very little power. The hypercorps
- (successors to the transnational corporations) are responsible for
- organised economic activity, the majority of the net, and a great deal of
- the information. Outside this limited, polite society skulk large numbers
- of people, in communities in which formal law and order have broken down
- and tribal patterns have re-emerged. Officialdom has not been able to
- sustain the myth that it was in control; society has become ungovernable.
-
- Little echoes of these patterns are evident in contemporary societies. The
- use of the Internet for anti-social purposes is proving much harder to
- control than similar behaviour using the telephone network. IT contributed
- significantly to the breakdown of the Soviet Union because, in addition to
- improving production effectiveness and efficiency, PCs delivered 'samizdat'
- - the means for cheap reproduction of dissident newsletters. Lies that had
- been lived for seven decades could not withstand the heat generated by
- eager users of a potentially democratising technology. And that was before
- inter-networking and computer-mediated communications had achieved any
- degree of sophistication.
-
- IT may be applied to public administration in ways consistent with
- authoritarianism or with democracy. Proponents of hierarchical structures
- and social engineering, chief amongst them senior public sector executives,
- must at the very least appreciate the limits of tolerance of authoritarian
- measures within their society. Preferably, governments should ensure that
- social administration schemes are not emphatically centralised and
- incapable of adaptation towards more liberal patterns. And most desirably,
- public servants, governments and voters themselves, should be exploiting
- the opportunities for more effective democracy which are being created by
- information technology.
-
-
- References
-
- Agre P. (1994) 'Design for Democracy' Working Paper, Department of
- Communication, Uni. of California at San Diego (February 1994)
-
- Beniger J.R. (1986) 'The Control Revolution: Technological and
- Economic Origins of the Information Society' Harvard Uni. Press, Cambridge
- MA, 1986
-
- Bentham J. (1791) 'Panopticon; or, the Inspection House', London, 1791
-
- Bradbury R. (1953) 'Fahrenheit 451 ... The Temperature at Which Books Burn'
- Ballantine Books, 1953
-
- Brunner J. (1975) 'The Shockwave Rider' Ballantine, 1975
-
- Burnham D. (1983) 'The Rise of the Computer State' Random House, New
- York, 1983
-
- Ciborra C. (1992) 'From Thinking to Tinkering: The Grassroots of
- Strategic Information Systems' The Information Society 8,4 (Oct-Dec
- 1992)
-
- Clarke R.A. (1987) 'Just Another Piece of Plastic for Your Wallet:
- The Australia Card' Prometheus 5,1 June 1987. Republished in Computers
- & Society 18,1 (January 1988), with an Addendum in Computers & Society
- 18,3 (July 1988)
-
- Clarke R.A. (1988) 'Information Technology and Dataveillance'
- Commun. ACM 31,5 (May 1988) 498-512
-
- Clarke R.A. (1992a) 'The Resistible Rise of the Australian National
- Personal Data System' Software L. J. 5,1 (January 1992)
-
- Clarke R.A. (1992b) 'Extra-Organisational Systems: A Challenge to the
- Software Engineering Paradigm' Proc. IFIP World Congress, Madrid
- (September 1992)
-
- Davies S. (1992) 'Big Brother: Australia's Growing Web of
- Surveillance' Simon & Schuster, Sydney, 1992
-
- Eco U. (1980) 'The Name of the Rose' Picador, 1980, 1984
-
- Ellul J. (1964) 'The Technological Society' Knopf, New York, 1964
-
- Ellul J. (1990) 'The Technological Bluff' William B. Eerdmans, Grand
- Rapids MI, 1986
-
- Foucault M. (1975) 'Discipline and Punish: The Birth of the Prison'
- Penguin, 1975, 1979
-
- Gibson W. (1984) 'Neuromancer' Grafton/Collins, London, 1984
-
- Gibson W. (1993) 'Virtual Light' Bantam, New York, 1993
-
- Graham P. (1990) 'A Case Study of Computers in Public
- Administration: The Australia Card' Austral. Comp. J. 22,2 (May 1990)
-
- Greenleaf G.W. & Nolan J. (1986)
- 'The Deceptive History of the Australia Card'
- Aust. Qtly 58,4 407-25 (1986)
-
- Gronlund A. (1994) 'Public Information Systems' Proc. IFIP World
- Congress, Hamburg (September 1994)
-
- Kling R. (1978) 'Automated Welfare Client Tracking and Welfare Service
- Integration: The Political Economy of Computing'
- Comm ACM 21,6 (June 1978) 484-93
-
- Laudon K.C. (1986) 'Dossier Society: Value Choices in the Design of
- National Information Systems' Columbia U.P., 1986
-
- Orwell G. (1948) '1984' Penguin, 1948, 1980
-
- OTA (1986) 'Federal Government Information Technology: Electronic
- Record Systems and Individual Privacy' OTA-CIT-296, U.S. Govt Printing
- Office, Washington DC, Jun 1986
-
- Packard V. (1964) 'The Naked Society' McKay, New York, 1964
-
- Ronfeldt D. (1992) 'Cyberocracy is Coming' The Information Society
- 8,4 (Oct-Dec 1992)
-
- Roszak T. (1986) 'The Cult of Information' Pantheon, 1986
-
- Rule J.B. (1974) 'Private Lives and Public Surveillance: Social
- Control in the Computer Age' Schocken Books, 1974
-
- Rule J.B., McAdam D., Stearns L. & Uglow D. (1980)
- 'The Politics of Privacy' New American Library, 1980
-
- Sterling B. (Ed.) (1986) 'Mirrorshades: The Cyberpunk Anthology'
- Arbor House, New York, 1986
-
- Toffler A. (1971) 'Future Shock' Bantam Books, New York, 1971
-
- Toffler A. (1980) 'The Third Wave' Pan Books, 1980, 1981
-
- Weizenbaum J. (1976) 'Computer Power and Human Reason, Publisher, 1976
-
- Zamyatin E. (1922) 'We' Penguin, 1992, 1980
-
- ------------------------------
-
- Date: Fri, 15 Jul 94 18:45:31 EDT
- From: sratte@PHANTOM.COM(Swamp Ratte)
- Subject: File 2--cDc Global Domination Update #15
-
- ((___))
- [ x x ] cDc communications
- \ / Global Domination Update #15
- (' ') May 1st, 1994
- (U)
- Est. 1986
-
- New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for May, 1994:
-
- +_________________________/Text Files\_______________________
-
- 251: "The False Prophets" by Lady Carolin. It's kind of an inside
- joke. 'cept ain't nobody laughin'.
-
- 252: "The Bishop" by Curtis Yarvin. "Father McKenzie, writing the
- words of a sermon that no one will hear..." Lonely priest decides
- he'll be the Pope. And who's to stop him? Let's all be Pope.
-
- 253: "Better, Stronger, Faster" by Omega & White Knight. Amazing
- document hacked-out of a CIA computer reveals use of popular TV
- program starring Lee Majors to cover up space alien presence.
-
- 254: "Hung Like a Horse" by Krass Katt. Blech. Weird, kooky things
- go on at veterinary hospitals.
-
- 255: "Mess o' Top Ten Lists" by The Death Vegetable & Iskra. Like the
- title says. It's humor, man, humor.
-
- 256: "Fecal George" by David Humphrey. Another blech one. Nutty,
- crazy college kids, eating anything for a quick buck.
-
- 257: "Goodnight, Benjamin" by Tequila Willy. Spooky, zany business.
-
- 258: "Spontaneous Combustion and the Aryan Parade" by FLaMinG SeVeReD
- HeaD. They're on Demerol, they've got a '67 Camaro, and some fresh
- white mice to play with. Whee-doggers.
-
- 259: "The HoHoCon 1993 Experience" by Count Zero. All experiences are
- relative, but here's one to relate to. CZ drops the skinny on the
- most recent major computer underground convention.
-
- 260: "Vegas, 1976" by Mad Mac. Snortin' coke and jacking off to a
- HINEY BOY magazine in the bathroom of the Sands in Los Vegas just
- isn't safe anymore.
-
- +_____________________________/cDc Gnuz\____________________________
-
- "cDc is the Meat group. All the wannabes can step to
- the Breads an' Cereals groups, baby."
-
- cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list!
- Send mail to cDc@cypher.com and include some wonderlessly elite message along
- he lines of "ADD ME 2 DA MAILIN LIZT!!@&!"
-
- NEW Official cDc Global Domination Factory Direct Outlets:
-
- PHR33DUM 204/775-3038
- The Truth Sayer's Domain 210/493-9975
- The Black Skyline 214/317-3091
- Club Baby Seal 817/429-4636
- Cyber Neurotic Reality Test 905/729-0238
- Twilight of the Idols +61-3-226-3386
-
- We're always taking t-file submissions, so if you've got a file and
- want to really get it out there, there's no better way than with cDc.
- Upload text to The Polka AE, to sratte@phantom.com, or send disks or
- hardcopy to the cDc post office box in Lubbock, TX.
-
- Pretty cool buncha t-files: PuD, Pizza Underground Digest.
-
- Good thing on TV: __The Mod Squad_ on E! at 7pm CST. Aaron Spelling,
- what a guy. _The Love Boat_, _Charlie's Angels_, _BH 90210_, and
- THIS.
-
- Hero/Role Model of the Month: People say there's not anybody to look
- up to anymore. HA! What about Sammy Davis, Jr.? He's Black, he's
- Jewish, and he's Dead. He sung "The Candy Man," he wore lots of gold
- jewlery, he hung out with Sinatra, and he referred to everyone as
- "cat" or "baby." Sammy was a prince, baby, a prince.
-
- Stupid Computer Geek, Part X: "In October, Houston, Tex., computer
- enthusiast Shawn Kevin Quinn, 17, pleaded no contest to putting out a
- murder contract on the boyfriend of a girl he had eyes for. According
- to the man Quinn contacted, Quinn offered to pay $5.30 plus seven
- Atari game cartridges. After a psychological exam portrayed Quinn as
- merely socially retarded by his computer obsession, a judge sentenced
- him to 10 years' probation." [Ft. Worth Star-Telegram-AP, October
- 1993]. Contributed by Omega.
-
- S. Ratte'
- cDc/Editor and P|-|Ear13zz |_3@DeRrr
- "We're into t-files for the groupies and money."
- Middle finger for all.
-
- Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453.
- Internet: sratte@phantom.com.
- ===========================================================
-
- cDc Global Domination Update #15-by Swamp Ratte'-"Hyperbole is our business"
- Copyright (c) 1994 cDc communications. All Rights Reserved.
-
- ------------------------------
-
- Date: Mon, 18 Jul 1994 18:03:24 -0700
- From: email list server <listserv@SNYSIDE.SUNNYSIDE.COM>
- Subject: File 3--Privacy at risk: Educational Records
-
- Seattle CPSR Policy Fact Sheet
- K-12 Student Records: Privacy at Risk
- +----------------------------------------
-
- TOPIC
-
- The U.S. education system is rapidly building a nationwide network of
- electronic student records. This computer network will make possible the
- exchange of information among various agencies and employers, and the
- continuous tracking of individuals through the social service, education
- and criminal justice systems, into higher education, the military and the
- workplace.
-
- WHAT IS THE ISSUE?
-
- There is no adequate guarantee that the collection and sharing of personal
- information will be done only with the knowledge and consent of students or
- their parents.
-
- Changes Are Coming to Student Records
- National proposals being implemented today include:
-
- - An electronic "portfolio" to be kept on each student, containing
- personal essays and other completed work.
-
- - Asking enrolling kindergartners for their Social Security Numbers,
- which will be used to track each student's career after high school.
-
- - Sending High school students' transcripts and "teachers' confidential
- ratings of a student's work-related behavior," to employers via an
- electronic network called WORKLINK.
-
- At the heart of these changes is a national electronic student records
- network, coordinated by the federal government and adopted by states with
- federal assistance.
-
- Publication 93-03 of the National Education Goals Panel, a federally
- appointed group recently empowered by the Goals 2000 bill to oversee
- education restructuring nationally, recommends as "essential" that school
- districts and/or states collect expanded information on individual
- students, including:
- - month and extent of first prenatal care,
- - birthweight,
- - name, type, and number of years in a preschool program,
- - poverty status,
- - physical, emotional and other development at ages 5 and 6,
- - date of last routine health and dental care,
- - extracurricular activities,
- - type and hours per week of community service,
- - name of post-secondary institution attended,
- - post-secondary degree or credential,
- - employment status,
- - type of employment and employer name,
- - whether registered to vote.
-
- It also notes other "data elements useful for research and school
- management purposes":
- - names of persons living in student household,
- - relationship of those persons to student,
- - highest level of education for "primary care-givers,"
- - total family income,
- - public assistance status and years of benefits,
- - number of moves in the last five years,
- - nature and ownership of dwelling.
-
- Many of these information categories also were included in the public draft
- of the 'Student Data Handbook for Elementary and Secondary Schools',
- developed by the Council of Chief State School Officers to standardize
- student record terminology across the nation. State and local agencies
- theoretically design their own information systems, but the handbook
- encourages them to collect information for policymakers at all levels.
- Among the data elements are:
- - evidence verifying date of birth,
- - social security number,
- - attitudinal test,
- - personality test,
- - military service experience,
- - description of employment permit (including permit number,)
- - type of dwelling,
- - telephone number of employer.
-
- WHO CAN ACCESS THIS COMPREHENSIVE INFORMATION?
-
- Officers, employees and agents of local, state and federal educational
- agencies and private education researchers may be given access to
- individual student records without student or parent consent, according to
- the federal Family Educational Rights and Privacy Act of 1974 (20 USC
- 1232g) and related federal regulations (34 CFR 99.3). Washington state law
- echoes this federal law.
-
- WHAT IS COMING NEXT?
-
- Recent Washington state legislation (SB 6428, HB 1209, HB 2319) directly
- links each public school district with a self-governing group of social
- service and community agencies that will provide services for families.
-
- This type of program is described in detail in the book, Together We Can,
- published jointly by the U.S. Department of Education and the U.S.
- Department of Health and Human Services. The book speaks of "overcoming
- the confidentiality barrier," and suggests creating centralized data banks
- that gather information about individuals from various government agencies -
- or in other ways ensuring agencies, "ready access to each other's records."
-
- The book calls for a federal role in coordinating policies, regulations and
- data collection. A group in St. Louis, MO, called Wallbridge Caring
- Communities, is cited as a model for seeking agreements to allow computer
- linkups with schools and the social service and criminal justice systems to
- track school progress, referrals and criminal activity.
-
- WHAT HAPPENED TO ONE COMMUNITY
-
- In Kennewick, WA, over 4,000 kindergarten through fourth graders were rated
- by their teachers on how often they lie, cheat, sneak, steal, exhibit a
- negative attitude, act aggressively, and whether they are rejected by their
- peers. The scores, with names attached, were sent to a private psychiatric
- center under contract to screen for "at-risk" students who might benefit
- from its programs. All of this was done without the knowledge and consent
- of the children or their parents.
-
- CPSR's POSITION
-
- CPSR Seattle believes that schools other agencies should minimize the
- collection, distribution and retention of personal data. Students and/or
- their parents should decide who has access to detailed personal
- information.
-
- CPSR ACTIONS
-
- Representatives of CPSR Seattle have gone to Olympia to:
- - oppose the use of the Social Security Number as the standard student
- identifier,
-
- - urge legislators to set educational goals that can be measured without
- invading privacy,
-
- - oppose turning over individual student records to law enforcement
- officials apart from a court order or official investigation.
-
- Computer Professionals for Social Responsibility - Seattle Chapter
- P.O. Box 85481, Seattle, WA 98145-1481 (206) 365-4528
- cpsr-seattle@csli.stanford.edu
-
- ------------------------------
-
- End of Computer Underground Digest #6.66
- ************************************
-
- ^Z
-
-