A Quaint Relic From Our Archives on Computer Spying |
---|
ptownson@telecom-digest.org Fri, 15 Jun 2007 12:00:00 CDT
|
|
For a special treat this weekend, I have a book review on the 'Rise of the Computer State' which was published more than 23 years ago in this Digest, in 1984, when people were talking about the book by the same name which had been published thirty or forty years before _that_. I assume David Burnham who wrote the book we are reviewing today, has himself grown wiser over the years. In fact, if he is still around, he might favor us with a 2007 'revision'. I think Rob Kling might have grown more wise also.
As usual, ignore all these email addresses; I doubt any of them are
PAT
===============================================
11-Jan-84 22:49:51-PST,24630;000000000000
Rise of the Computer State by David Burnham
Review by Rob Kling
This book examines the ways that Federal agencies and elected
officials have employed computer-based information systems (CBIS) to
increase their power unfairly. Burnham's main theses are: 1) that
CBIS have often been effective media for extending the surveillance
potential of the host organization; 2) overall, citizens have lost
substantial power in their routine dealings with computer-using
organizations; 3) attempts to regulate the use of CBIS containing
personal records have been frail and largely ineffective relative to
the scale of operations that should be regulated; 4) some
organizations which employ sophisticated CBIS for intelligence, such
as the National Security Agency, are unaccountable to the larger
public.
These theses have a sinister tinge. As we enter 1984, the United
States is far from a police state. However, Burnham fears that the
slow, steady, consistent adoption of new surveillance systems and the
expansion of existing ones is eroding democratic political processes
in the United States. If he is correct, these are arguably the most
important consequences of computerization in the United States.
This is a trade book aimed at the same audience that reads
"Megatrends", "The Third Wave", or "Fifth Generation". Unlike these
highly popular books which are permeated with happy talk about the
social possibilities of widespread computerization, "The Rise of the
Computer State" examines the seamy underside of organizations that
employ CBIS to collect, manipulate, and communicate sensitive data
about all of us.
Burnham, a New York Times reporter, has written this book for a
popular audience. Its strengths lie in Burnham's sensitivity to the
civil liberties issues in practices that might simply appear
"expeditious" and in his eye for graphic detail in explaining how
organizations employ CBIS to make their operations efficient and
"effective."
Burnham examines two themes that link computerization with a
certain kind of organizational power: surveillance of "targeted"
people or groups and opinion polling. In a separate chapter he
examines the National Security Agency which he labels "the ultimate
computer bureaucracy."
SURVEILLANCE
Some organizations act under legislative mandates that many
people would label "pro-social". For example, the Bureau of Child
Support of the Los Angeles District Attorney's office uses CBIS to
seize California State tax refunds from certain runaway fathers who
are delinquent in their child support payments. A second group act
within the boundaries of legal, but unduly permissive information
practices. For example, a company called U.D. Registry provides
landlords with histories of disputes with previous landlords,
maintains records which are usually unknown to tenants and does little
to insure that they are treated fairly. A third group of
organizations engage in action that are either illegal or nearly so.
For example, U.S. Army's surveillance of liberal and leftist activists
in the late 1960's, extended well beyond the scope of "national
security." Burnham portrays these activities with sharp detail that
give color to routine practices and their participants.
Burnham is a staunch civil libertarian and sees all social
surveillance as problematic. It is easiest to criticize organizations
like the U.S. Army when they intrude upon political minorities and
thereby threaten First amendment rights. It is also easy to criticize
some of the "holes" in CBIS such as those operated by U.D. Registry,
which are unknown to people on whom records are kept, and who are not
legally obligated to enable people to see their records, correct
errors, or annotate their files case of disputes.
Burnham's criticisms reach much further than identifying the
problems with CBIS employed by the second and third groups of
organizations. He questions the first group as well. Burnham's
questions about organizations and systems for tracking runaway fathers
who leave their children on welfare illustrates of his concerns about
social strategies which depend upon extensive surveillance for
enforcement: 1) will the original target group be slowly enlarged
until it is much larger than originally intended in the enabling
legislation? 2) can the information system be extended by local
officials for surveillance upon "others who fall into disfavor?"
Burnham reports how the scope of these systems has expanded from
locating parents who were avoiding child support payments and whose
children were receiving funds from Federal welfare programs to include
any parent whose (ex)spouse seeks the other parent of their children.
Burnham notes that there are few constitutional limits on the scope of
such an surveillance system. Why not, for example, expand its scope
so that creditors can track down their debtors? Or why not expand it
expand it so that people can locate lost relatives and old friends?
While these "information needs" are less heart wrenching than the
situations of women who turn to public assistance when their
ex-husbands refuse to pay court-mandated child support, they are also
"pro-social." Burnham argues that little prevents surveillance systems
such as this one from being slowly expanded to track ever larger
groups of people than legislative sentiment and a fragile coalition of
legislators who are sympathetic to civil liberties values.
Burnham uses this example to illustrate another key feature of
recent surveillance systems: records systems which are set up for
rather narrow purposes of one organization are used by investigators
in another organization. The Parent Locator System, for example, is
not a particular, specialized CBIS. Rather, it is a set of procedures
and arrangements which enable certain investigators to send lists of
"missing parents" to the Internal Revenue Service, the Social Security
Administration, the Defense Department, the Veterans Administration,
and the National Personnel Center. Each of these organizations honors
these requests, searches its CBIS for the current locations of the
"missing parents" and returns the information to the requestors on
magnetic tape.
While many CBIS could be operated as manual systems, these
searches would be prohibitively expensive add-ons with manual record
systems. However, the marginal costs of search are affordable with
computerized record systems. The Parent Locator "System" is one of
many "matching programs" in which public agencies use existing files
to search for deviants. Organizational payroll files have been
"matched" against welfare files to find gainfully employed people who
are committing welfare fraud. State Department of Motor Vehicle files
have been matched with Selective Service files to identify eligible 18
year olds who have not registered for the draft. In each of these
cases, the records of thousands of people who have broken no laws are
matched to find the few that have. Burnham finds the principle
offensive, even though the applications are expedient and have so far
have been aimed at lawbreakers. In his eyes, expediency and
efficiency should not be preeminent values for administrative action.
PRIVACY REGULATIONS
Burnham briefly examines some of the Federal privacy initiatives
of the last decade, including the Privacy Act of 1974, the proposals
of the Privacy Protection Study Commission, and the 1978 Financial
Right to Privacy Act. These laws have provided minimal protections,
and important protections of the Federal Right to Privacy Act have
been undermined in implementation by Federal agencies under Ford,
Carter, and Reagan. Only a few of the 155 recommendations reported by
the Privacy Protection Study Commission in 1977 have been enacted in
law.
Burnham mentions these laws and examines some of their
limitations. However, he doesn't evaluate their potential. Would
many of the problems of CBIS operated by firms like the U.D. Registry
be ameliorated if they were brought under laws like the Fair Credit
Reporting Act? Would civil liberties be better protected if the
remaining recommendations of the Privacy Protection Study Commission
were enacted in law? Unfortunately, Burnham is mute about these
possibilities.
Burnham is strongest in identifying concrete problems. Most
serious there is no permanent institutional counterweight to Federal
agencies when they propose new, more efficient, or enlarged personal
record systems. Agencies such as the FBI, the IRS, or the Social
Security Administration can return to Congress every few years with
proposals for massive CBIS which have problematic privacy aspects and
expect that sooner or later, the civil libertarians who restricted
their last proposal will be weaker or pre-occupied with other matters.
POLLING
Burnham examines opinion polling as another form of
organizational intelligence which has been rendered substantially more
efficient and sophisticated by computers. He views opinion polling by
elected officials and organizations which are campaigning for specific
legislation as selective intelligence which places the target public
at an unfair disadvantage. The main problem he sees in market
research in the service of electoral politics is the extent to which
it helps make propaganda less transparent and the public more
manipulable by marketing strategists who target different messages to
different groups. While there is nothing new in political actors
tailoring their appeals to different audiences, Burnham fears that the
modern versions of sophistry are less obvious and consequently far
more successful for those who can afford to employ them.
He also views opinion polls as easily subject to manipulation by
politicians seeking legitimacy or publicity. Polling is not simply a
reporting device. Pollers gain leverage relative to the larger public
since much of the audience for polls will read headlines and short
news items which distort the scientific meaning of a poll by
neglecting to explain the nature of the sample, the detailed
distribution of responses, or the questions asked. Political polling
is not only "information gathering;" it can be a devise for persuading
larger publics about the popularity of one's position.
NATIONAL SECURITY AGENCY
In a dramatic chapter, Burnham reports how the National Security
Agency (NSA) has operated under a charter which has remained secret it
was initiated by President Truman in 1952. The NSA specializes in
electronic surveillance. A large fraction of its efforts probably go
to observing military force deployments and strategic resources
worldwide. Burnham reports how the NSA has also illegally
eavesdropped on a significant fraction of international telephone
calls and telex messages which leave the United States.
Burnham reports on the character of specific programs of domestic
surveillance which were illegal. According to Burnham, the NSA
developed files on political dissidents including civil rights
activists, antiwar activists, members of Congress, and ordinary
citizens who were critical of official government policies. While
most of the domestic political surveillance appeared to take place in
the late 1960's through mid-1970's, the shroud of secrecy that
surrounds the NSA makes it difficult to have significant Congressional
oversight of its policies and practices.
During the last 5 years, the NSA has moved to control
cryptographic research in the United States. Recently developed
encryption schemes are based on sophisticated algorithms which require
digital circuits for rapid coding and decoding. Some of the new
schemes even allow the code keys to be public, rather than secret. As
more business operations in the United States is computerized,
organizations seek ways to protect the privacy of data such as large
funds transfers. Thus the market for efficient and effective data
encryption devices has expanded beyond the intelligence community to
include financial institutions.
The NSA has recently taken control of this research out of the
hands of the National Science Foundation, even though it has no
publicly documented legal mandate for its action. There are deep
policy questions about whether national security is well served by the
availability of cheap encrypting devices which are effectively
unbreakable. These questions are not being raised in public debates,
nor does Burnham shed much light on them. Rather he simply adopts the
libertarian critique of surveillance. Like other political labels
with strong moral content, it has been abused as a cover for unsavory
actions carried out by government operatives. The term in not wholly
vacuous and Burnham glosses most of the knotty policy issues.
TOWARD A POLICE STATE?
Burnham's theses are loosely fabricated from dramatic examples.
He does not offer explicit hypotheses, strong organizing concepts, and
a way of placing his examples in a context which enables a reader to
understand their overall significance. Examples of bad outcomes can
elicit sympathy for "victims." But systematic information about the
frequency and extent of problems and abuses are necessary to
demonstrate that the overall social setup within which they happen is
badly flawed, corrupt, or perverse. Some of his examples of people
victimized by slips in CBIS and organizational practices suggest that
Kafka has provided better guiding images than Orwell for appreciating
a computer-based, mobile, organizational society.
Burnham has little taste for irony, and explores Orwellian abuse
rather than Kafkaesque happenings. Do the events Burnham describes
indicate that Federal agencies and other large computer users are
pushing the the US along a path of political development that is
leading to a much less democratic form of Federal government?
Unfortunately, Burnham does not describe the changing nature of
Congressional oversight and public accountability sufficiently well to
provide a clear answer to that question. He succeeds in generating
sentiments in favor of this hypothesis by his accumulated cases of
organizational seaminess and occasional abuse. But he relies heavily
upon a reader's distrust of elected officials and large bureaucracies
to help cement his case. He also relies upon general theses about
power, such as Lord Acton's maxim. Unchecked power often corrupts and
organizations are often less willing to be fair to their clients than
efficient and autonomous. But general principles do not make the
particular case since the variations in actual organizational
practices are significant and vast.
One peculiar feature of contemporary police states, such as those
in Eastern Europe and Latin America, is the extent to which they have
relied upon low technologies for extensive social control and even
mass terror. Many abusive ruling cliques rely upon neighborhood
informants, secret trials, and mysterious disappearances to maintain
control. They don't need database management systems, teleprocessing,
and spy satellites. Low technology strategies are especially
effective in "small town" societies.
Burnham's implicit argument is that less obtrusive forms of
surveillance and social control can harm the political culture of
liberal democracies. CBIS are attractive to administrators and
politicians because they promise heightened efficiencies and sometimes
enhanced fairness in providing services to large mobile populations.
However, the anecdotes of errors with a human cost and even abuses
which Burnham piles on the reader, illustrate problems but do not make
his case.
Burnham's strongest case is his critique of the NSA's abuses of
authority. Like, the secret Law Enforcement Intelligence Units, much
of the problem with the NSA comes from its shroud of secrecy and
freedom from significant legislative oversight. It's use of
computer-based monitoring systems is incidental to its problematic
place in American political life.
I suspect that one basic issue is accountability of these
agencies to the public through the legislatures. At times this is no
easy task when the administrative agencies can shroud their actions
with the complexities of high technologies. There is a strong case to
be made that in the clashes between branches of government,
administrative agencies have found legal and technological loopholes
to temporarily free themselves from regulatory restraint.
Congressional actions are not always right. But there is an argument
that administrative agencies have been able to exploit computer-based
technologies to shift the balance of governmental power away from
elected officials. This systematic shift of power has been best
documented in the case of local governments. It is likely to be
happening at other governmental levels as well.
COMPUTERS AND POLITICS
Burnham is sensitive to the shifts of power to executive
agencies. But he is at a loss to explain them very well. He misses
the deeper politics of computing. I find a clue to his misperception,
a very common one, in his reference to "the computer's system of
thinking." For Burnham, CBIS are simply highly structured, logical,
possibly hierarchical information processing "tools." He misses the
ways in which CBIS designs often reflect the "systems of thinking" of
those who propose them. CBIS promoters may label their preferences as
"required by computers" to help their case, but they often ignore or
discourage many technical and administrative alternatives.
Many CBIS are usefully viewed as forms of social organization.
They are composed of many layers of data, programs, and communications
support stretched across different organizations. Those who oversee
them need some ability to appreciate technical alternatives and also
have some substantive expertise in the organizational functions which
have computer support. This dual expertise is rare, particularly
among elected officials at all levels of government. As a
consequence, they have trouble in providing sensible guidance to
executive agency staff.
QUALITY OF BURNHAM'S ANALYSIS
I would like to like this book more than I do. I like Burnham's
eye for detail and his relentless questions about the underside of
computer-based surveillance systems. Some new data brokering
organizations start up each year. Each year, many existing
organizations expand the scope and scale of their record keeping.
Laws and administrative practices also change slowly each year. Over
ten year periods, these gradual small scale changes accumulate.
Periodic reviews of these practices are useful. As a consequence of
continuing changes in organizational practices, legal arrangements,
and technology, studies published in the early 1970's such as Westin
and Baker's "Databanks in a Free Society" or James Rules' "Public
Surveillance and Private Lives" have become dated. Both of these
studies pre-date the use of computer matching, and several Federal
privacy initiatives.
Unfortunately, this book is weak in analysis. Even the chapter
headings don't guide the argument. The first three chapters are
labelled "surveillance," "data bases," and "power." However, themes of
power, surveillance, and data bases are strong elements in each of
them. The chapter labelled "power" primarily examines political
polling. This lax labelling of chapters signifies the way that
Burnham eschews tough analysis in favor of easy sentimentalizing.
It should be hard for Burnham, a reporter and hence a kind of
intelligence agent, to find observation, reporting, and persuasion to
be inherently sinister acts. However, Burnham colors his narrative so
that people who administer a CBIS are stigmatized in descriptions such
as "(speaking) in the quiet monotones of many long-time government
employees," or are "slightly Mephistopholean." People who sympathize
with civil libertarian values are portrayed without any frailties.
Burnham is deeply suspicious of pollsters and politicians who
manipulate the public with numbers, but he is very adept at
manipulating his audience with images. These images which equate
personal goodness with political philosophy grossly mislead.
Despite these limitations, "The Rise of the Computer State" is
particularly important because it helps articulate and illustrate
important questions about computing and social power. Unfortunately,
there is no other up-to-date inquiry into organizational surveillance
and high technology.
"The Rise of the Computer State" is an important contribution to
the tiny stream of literature which examines the political dimensions
of computer-based technologies in public life. I hope that many
people read this book despite its analytical flaws. It helps
dramatize the current problems of computer-based surveillance systems.
Burnham's graphic episodes can help give people who are not intimate
with CBIS a keen appreciation of the dilemmas which their use and
users are now creating. It can help more systematic investigators by
providing a rich set of clues from which to continue this inquiry.
These questions will not go away after 1984 has passed.
================================================================
It is interesting, is it not, how so much of what shocked the public
PAT |
Post Followup Article | Use your browser's quoting feature to quote article into reply |
Go to Next message: PRN NewsWire: "AT&T Selects Vendors for U-verse G-PON Fiber Deployment" | |
Go to Previous message: John Hines: "Re: 'Dr. Phil Show' Gets Ripped Off by Con Artist" | |
TELECOM Digest: Home Page |