Privacy in the computer age.
Swish. Click. Swish. Click. The sound of computer disk drives and printers can be heard 24 hours per day around the globe. These computers are spreading gossip about us. What are they saying?
William Safire of the New York New York, state, United States
New York, Middle Atlantic state of the United States. It is bordered by Vermont, Massachusetts, Connecticut, and the Atlantic Ocean (E), New Jersey and Pennsylvania (S), Lakes Erie and Ontario and the Canadian province of Times wrote:
We are frisking each other. Picture
yourself going to work tomorrow,
handing over blood and urine samples,
taking a quick turn with the
house polygraph An instrument used to measure physiological responses in humans when they are questioned in order to determine if their answers are truthful.
Also known as a "lie detector," the polygraph has a controversial history in U.S. law. , turning out your
pockets and walking through some
new fluoroscope fluoroscope (flr`əskōp), instrument consisting of an X-ray machine (see X ray) and a fluorescent screen that may be used by physicians to view the internal organs of the body. . You object?
Whatsamatter, you got something
Robert Ellis Smith, publisher of the Privacy Journal, answered: "An employee with nothing to hide may well be an employee with nothing to offer!"
Journalists Safire and Smith worry about our privacy in this Computer Age for good reasons. Every day we hear about privacy in relation to abortion, AIDS testing, credit ratings, IRS An abbreviation for the Internal Revenue Service, a federal agency charged with the responsibility of administering and enforcing internal revenue laws. audits, medical records, or mailing lists. Today, it is hard to purchase an automobile or to vote without somebody plugging into a computer to verify our existence.
Our Computer Age is a double-edged sword. The good news first. Economical desktop or laptop computers let us search encyclopedias, dictionaries, and vast databases by pressing a few buttons. We often label this positive power the "Information Age" Now the bad news. The same computers permit credit agencies, insurance companies, and governments to collect, store, and sell data about us. Our "confidential" medical and bank records move freely from computer to computer - usually without our consent. Often the data in computer files is incorrect. For example, one Californian's life became a nightmare after 12 strangers began using her Social Security number for credit scams. I call this dark side of computer technology the "Surveillance Age"
How should humanists react to this cohabitation A living arrangement in which an unmarried couple lives together in a long-term relationship that resembles a marriage.
Couples cohabit, rather than marry, for a variety of reasons. They may want to test their compatibility before they commit to a legal union. with computers? Around 1900, Frederick W. Taylor, the "father of scientific management," urged employers to dictate their employees' smallest movements. In 1992, Big Manager's obsession with surveillance begins before we join the payroll. Corporations use lie detectors, voice-stress analyzers, urinalysis tests, fingerprints, retina scans, blood tests, and (not only in California!) handwriting analysis and astrology to screen us from other applicants. A popular software package, Auto-AOC (for Advance Office Controls), tells managers how quickly workers should move. This program dictates that it should take 7.5 seconds to open envelopes and 2.9 seconds to staple papers. In 1977, our calls to Bell Canada operators lasted 85 seconds on the average. A decade later, because of computer monitoring, the average call is 27 seconds. Operators are tempted to hang up on people with speech or hearing defects in order to fulfill their robotic quotas. Some of us hold that these computer usages attack our basic dignity; others among us hold that job efficiency is more vital than privacy.
Spying by corporate computers is spiraling. Computer designer Stephen Hollander told a Canadian conference: "More than 100 pieces of equipment described by George Orwell in 1984 now exist." Congresswoman Barbara Pringle of Cleveland tried to outlaw this inhumane monitoring of people; how, ever, her bill was killed by the business community. "It's crazy," she says. "You stop to sneeze sneeze, involuntary violent expiration of air through the nose and mouth. It results from stimulation of the nervous system in the nose, causing sudden contraction of the muscles of expiration. , and the machine says you're behind"
Criminal databanks also pose a threat to law-abiding citizens. Today, records about select criminals (usually excluding Fortune 500 and US. government-employed white-collar criminals) are stored in central computers. A major example is the FBI's National Crime Information Center. No doubt this system helps apprehend dangerous persons who should be behind bars, but what happens when the system goes haywire? Imagine yourself in the position of John Smith (an alias).
A few years ago, an Alabama prison escapee escapee A popular term for older relatives of those at risk for Huntington's disease, who didn't develop the disease. See Huntington's disease. ("Carl") got his hands on a copy of Smith's birth certificate. Carl obtained a Cafifornia driver's license in Smith's name and was arrested in Los Angeles as a murder suspect. After Carl was released from custody, Los Angeles police entered a murder arrest warrant for John Smith into the NCIC NCIC National Crime Information Center
NCIC National Cancer Institute of Canada
NCIC North Carolina Industrial Commission
NCIC National Cartographic Information Center
NCIC National Cancer Information Center (American Cancer Society) system. The warrant included none of Carl's physical features (including a tattoo). The real John Smith (a man from Saginaw, Michigan) was arrested three times, sometimes at gunpoint while handcuffed, as a murder suspect. Each time Smith was set free when the mistaken identity was proven; however, the Los Angeles police failed to change the false data in the NCIC files. Finally, Smith's nightmare ended; a Saginaw News reporter initiated a costly erasure ERASURE, contracts, evidence. The obliteration of a writing; it will render it void or not under the same circumstances as an interlineation. (q.v.) Vide 5 Pet. S. C. R. 560; 11 Co. 88; 4 Cruise, Dig. 368; 13 Vin. Ab. 41; Fitzg. 207; 5 Bing. R. 183; 3 C. & P. 65; 2 Wend. R. 555; 11 Conn. process. A court ruled that the city of Los Angeles
Why should we care about these data files? Suppose a police officer knowingly enters false data about you into the NCIC. (Maybe the officer owes you money or holds a personal grudge.) Or imagine that a secretary presses the wrong computer codes after your name. How will you know about, much less repair, these errors? Visit your local police or FBI office and ask them to show you what, if anything, the NCIC computer says about you. It is a safe bet that they will judge you a "nut" or a "suspicious" person. Can we trust any Big Brother who condemns us for wanting to know about ourselves?
Much of our privacy is disappearing because of the worship of "efficiency." When we use credit cards rather than cash, we tell our VISA computer what we eat, drink, and wear. When we use a cordless or cellular phone rather than a phone with wires, we make it easy for nosy nos·y or nos·ey
adj. nos·i·er, nos·i·est Informal
1. Given to prying into the affairs of others; snoopy. See Synonyms at curious.
2. Prying; inquisitive. neighbors and political snoops SNOOPS - Craske, 1988. An extension of SCOOPS with meta-objects that can redirect messages to other objects. "SNOOPS: An Object-Oriented language Enhancement Supporting Dynamic Program Reeconfiguration", N. Craske, SIGPLAN Notices 26(10): 53-62 (Oct 1991). to eavesdrop eaves·drop
intr.v. eaves·dropped, eaves·drop·ping, eaves·drops
To listen secretly to the private conversation of others. . When we rent videos rather than visit movie theaters, we notify computers about our cinematic tastes. Daily, we volunteer data about ourselves that, in pre-computer culture, were gleaned only by the secret police.
In the 1990s, our right to personal privacy will face unique trials because of new computer applications.
What would you say if the post office photocopied all of your mad and saved it in a warehouse? Today, millions of us give that awesome power to the owners of telephone voice boxes and E-mail systems. The Russian KGB KGB: see secret police.
Russian Komitet Gosudarstvennoy Bezopasnosti
(“Committee for State Security”) Soviet agency responsible for intelligence, counterintelligence, and internal security. could only dream of such power.
We are entering a Brave New Web of electronic media which will ink people and institutions. Already, millions of us employ computer networks like Compuserve (owned by H & R Block), Prodigy (owned by IBM (International Business Machines Corporation, Armonk, NY, www.ibm.com) The world's largest computer company. IBM's product lines include the S/390 mainframes (zSeries), AS/400 midrange business systems (iSeries), RS/6000 workstations and servers (pSeries), Intel-based servers (xSeries) and Sears), and GEnie (owned by General Electric). These "nets" are used to pay bills, to pursue hobbies, to solicit sex, and to deliver personal mail. All of these exchanges are saved on computer disks. Who can stop the directors at these networks from "leaking" our personal files to whomever whom·ev·er
The objective case of whoever. See Usage Note at who.
the objective form of whoever: they wish?
Today, we join computer networks by choice. For instance, I subscribe to the WELL (Whole Earth 'Lectronic Link). Anyone with proper computer skills can mail me documents or photos at my computer address: "abacard@-well.sf.ca.us" Similarly, I attend conferences and meetings - all on my computer screen. In the near future, nets might well become as necessary as telephones.
(The American Humanist Association The American Humanist Association (AHA) is an educational organization in the United States that advances Humanism. It is the original Humanist organization, and embraces secular, religious, and other manifestations of Humanist philosophy. might desire to join or launch a computer network. This would enable the AHA to organize events, distribute memos, and collect dues with ease. Also, members could interact daily in this new humanist community.)
Who will own and rule these networks? Media moguls such as Pat Robertson, defense giants such as General Electric, or the public? Who win patrol our privacy?
Fortunately, a few socially aware computer groups wrestle with these issues. The Electronic Frontier Foundation See EFF.
(body) Electronic Frontier Foundation - (EFF) A group established to address social and legal issues arising from the impact on society of the increasingly pervasive use of computers as a means of communication and information distribution. (EFF (Electronic Frontier Foundation, San Francisco, CA, www.eff.org) A non-profit civil liberties organization founded in 1990 by Mitchell Kapor and John Perry Barlow. It works in the public interest to protect privacy and freedom of expression in the arenas of computers and the Internet. ), based in Washington, D.C., and the Computer Professionals for Social Responsibility Computer Professionals for Social Responsibility - (CPSR) A non-profit organisation whose mission is to provide the public and policymakers with realistic assessments of the power, promise and problems of Information Technology and the effects of computers on society. (CPSR CPSR - Computer Professionals for Social Responsibility ), centered in Palo Alto, Cafifornia, are two notable examples. These people are working to ensure that the Bill of Rights is extended to our Computer Age. Specifically, they are pushing for a legal guarantee that would state: "No person shall be denied credit, employment, or the opportunity to engage in a commercial transaction for failure to provide his or her Social Security number" Also, EFF and CPSR are fighting to give us the legal and technical power to encrypt (encode) our computer messages to secure our privacy.
Harvard constitutional law scholar Laurence H. Tribe views technological threats to our freedoms as so serious that he has proposed a constitutional amendment that would apply to computers.
Essayist Phyllis McGinley gives us more food for thought: "The human animal needs a freedom seldom mentioned: freedom from intrusion. He needs a little privacy quite as much as he wants understanding or vitamins or exercise or praise."
Many a time, humanists have routed tyrants who have used spys to degrade and control people. We must struggle to make the Computer Age our servant, not our master!
Scientist Andre Bacard is the author of Hunger for Power: Who Rules the World and How. A guest on hundreds of radio talk shows, he can be reached at Box 3009, Stanford, CA 94309.