Computer underground Digest Wed July 20, 1994 Volume 6 : Issue 66 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copper Ionizer: Ephram Shrustleau CONTENTS, #6.66 (Wed, July 20, 1994) File 1--Roger Clarke on authoritarian IT (fwd) File 2--cDc Global Domination Update #15 File 3--Privacy at risk: Educational Records Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Mon, 23 May 1994 13:33:48 -0400 (EDT) From: Stanton McCandlish <mech@EFF.ORG> Subject: File 1--Roger Clarke on authoritarian IT (fwd) From--Phil Agre <pagre@weber.ucsd.edu> Subject--Roger Clarke on authoritarian IT INFORMATION TECHNOLOGY WEAPON OF AUTHORITARIANISM OR TOOL OF DEMOCRACY? Paper being presented at the IFIP World Congress, Hamburg, 31 August 1994 Roger Clarke Department of Commerce Australian National University Canberra ACT 0200 Roger.Clarke@anu.edu.au Strong tendencies exist to apply information technology to support centralist, authoritarian world views. It is argued that alternative architectures can be readily created, which are more attuned to the openness and freedoms which are supposed to be the hallmarks of democratic government. It is questioned whether authoritarianism will be capable of surviving the complexities, dynamism and widely distributed power which are features of the emergent information societies. Keyword Codes: H.1, J.1, K.4 Keywords: information systems; administrative data processing; computers and society 1. INTRODUCTION The genre of 'anti-utopian' novels described futures repugnant to humanity. The classic image of an information-rich government dominating citizens' thoughts and actions is associated with Zamyatin's 'We' (1922) and Orwell's '1984' (1948), but the technological basis of the surveillance culture had been established as early as the late nineteenth century by Jeremy Bentham's designs for a model prison, incorporating the all-seeing and ubiquitous 'panopticon' (1791). Foucault (1975) argued that the prison metaphor was the leitmotiv of authoritarian society. Bradbury's 'Fahrenheit 451' (1953) and Umberto Eco's 'The Name of the Rose' (1980) speculated on the process and implications of denying information to the public.=20 Art anticipated reality. Information technology (IT) is now being systematically applied to public administration in ways consistent with the anti-utopian nightmare. This paper's purpose is to review the authoritarian model as a basis for applying IT in government, and to champion an alternative, democratic model of IT use. 2. AUTHORITARIANISM'S UNDERLYING ASSUMPTIONS AND VALUES An authoritarian society favours obedience to Authority over individual freedoms, to the extent of demanding subservience of the individual to the State. The notion clusters with tyranny (the cruel exercise of power), despotism and dictatorship (the exercise of absolute power), totalitarianism (single-party government) and fascism (a usually savage blend of authoritarianism with nationalism). Authoritarianism is associated with logical positivist and utilitarian philosophies. These perspectives place very high value on rational social engineering, law and order, and resource efficiency. The populace is perceived as unsophisticated, uneducated, unreliable, chaotic, and/or incorrigibly venal and immoral. For their own good, the organised State must impose control on the unruly people. A further assumption of the authoritarian perspective is that there exist humans with a level of both intelligence and morality superior to the common herd. In different ideologies, their innate superiority derives from different sources, such as the divine right of kings, wealth, force of arms, mystical power, what Machiavelli called virt=FA, wisdom, intellectual merit, technical capability, political cunning, demagogery, and/or public popularity. These superior humans are accepted as being the appropriate ones to make judgements on behalf of their society, with a minimum of checks and balances. They do this through social engineering; that is to say by organising and re-organising society in what they consider the rational way of achieving order and efficiency, and hence of delivering material well-being, and therefore spiritual happiness, for all. 3. THE AUTHORITARIAN MODEL OF I.T. APPLICATIONS Under an authoritarian regime, the populace must be managed. Tools and techniques that have proven effective in managing raw materials, manufactured goods and animals, can be applied to humans too. A unique identifier for each person, and its general use by government agencies and other organisations which conduct transactions with people, are highly desirable tools for efficient social administration. Public administration systems must be designed to exercise control over people, in all of their various roles. There may be scope for at least some semblance of choice by individuals, but employees need to operate within a corporate culture, consumer demand needs to be statistically predictable, and citizens' freedom of choice needs to be constrained, lest unworkable parliaments eventuate, with too many splinter parties, independents and conscience votes. It is only logical that an authoritarian society should recognise the benefits of a unary executive branch, in which the boundaries between agencies are porous. In this way, data can flow freely (such that transaction data and client histories can be cross-verified, and changes of address and status cross-notified), and systems can be tightly integrated and efficient (and hence misdeameanours by people in one arena, such as traffic fines, can be readily punished through another, such as denial of a marriage licence, permission to move apartments, or approval for travel). Authoritarian IT-based systems use a centralised architecture. Elements may be physically dispersed, however, to achieve efficiency in data transmission, and to provide resilience against localised threats such as natural disasters and sabotage by dissidents. The general shape of such systems is that provided by cyberneticians: a cascade of control loops, culminating in a master-controller. In authoritarian regimes, information privacy and data security play important roles. These have little to do with the protection of people, however, but rather serve to protect the integrity of data, and of the system, and to legitimate the repressive system through the provision of nominal rights for data subjects. =46or discussions of the authoritarian application of technology in general, see Ellul (1964) and Packard (1964), and of IT in particular, see Rule (1974), Weizenbaum (1976), Kling (1978), Rule et al. (1980), Burnham (1983), OTA (1986), Laudon (1986), Clarke (1988), Davies (1992) and Ronfeldt (1992, pp.277-287). 4. INSTANCES OF AUTHORITARIAN APPLICATION OF I.T. The reader is by now (hopefully) annoyed by the extent to which the foregoing description has been a caricature, hyperbole, a 'straw man' designed to be easily criticised. However there are manifold instances of just these features in IT-based public administration systems, both those in operation and being conceived, in countries throughout the world. In North America, whose use of IT has been well ahead of that in most other countries, a 'national data center' was proposed as early as 1966. Elements of it have emerged, such as the widespread use of the Social Security Number (SSN) as a unique identifier, proposals for a health id card, and the all-but uncontrolled use of computer matching and profiling. Some protagonists in the current debates surrounding the national information infrastructure (NII) are seeking a network consistent with authoritarian control; for example, by insisting on use only of those cryptographic techniques which are 'crackable' by national security agencies. Australia has followed the North American tendency. It flirted with a national identification scheme in the late 1980s (Greenleaf & Nolan 1986, Clarke 1987, Graham 1990). When that was overwhelmingly rejected by the populace, senior executives in public sector agencies 'went underground'. They have variously gained Parliamentary support for, and smuggled through, a series of measures whose cumulative impact is in some ways already more emphatic than the 'Australia Card' would have been (Clarke 1992). The cultures of many Asian nations are well-suited to authoritarian regimes. There are elements of high-social-efficiency applications of IT in such nations as Singapore. Busy Asian countries have shown especial interest in vehicle monitoring systems. Thailand and the Phillipines appear eager to act as laboratories for United States corporations developing identification and surveillance technologies. Under China's strongly authoritarian political system, it is unlikely that IT will be applied in any way other than to bolster existing relationships between its citizens and the State. In Western Europe, Scandinavian countries lead the way with their social welfare systems and the heavy dependence of their citizens on the State. Denmark's citizen register is a model for authoritarian regimes everywhere, and a looming export success. Other countries are keenly adopting proposals to use IT to constrain the populace, by such means as identification cards (variously for football fans, patients, and the public in general), and the integration of data systems between government agencies, and between countries within and beyond the European Community. In Central and Eastern Europe, there was an expectation that democratic, free enterprise systems would arise to replace the authoritarianism of the collapsed communist regimes. In practice, few of those countries have ever known freedom of choice, and genuine democracy (as distinct from variants of authoritarianism referred to in local lexicons as 'democracy') is not on the agenda of many of these countries. Their focus is on economic growth, rationalist solutions to economic and social problems, and centralism. IT is seen as a tool of authoritarianism, not of democracy; of centralised power, not of a pluralist body politic; and of control, not of freedom. It can come as no surprise that public administration systems are being conceived in these ways. Applications of all kinds are developed by well-trained and self-confident engineers, using unequivocally rationalist techniques. System design comprises the expression of relevant parts of the present and near-future world in a formal model which has the important characteristic of being 'mappable' onto a machine. The application's users and 'usees' (i.e. the people affected by it) are treated as objects to be modelled, not as stakeholders with interests in the process and its outcomes. Human language is treated as though it were an (imprecise) formalism, rather than a means of interaction among people. The designers fail to notice that their formalisms cannot reflect the complexities, ambiguities and dynamism inherent in social systems, and the negotiation and accommodation processes which take place among humans and social groups (Clarke 1992b, Ciborra 1992, Agre 1994, Gronlund 1994). Hence the problems highlighted in this paper are to a considerable degree inherent in the techniques currently used to develop IT applications generally. Nonetheless, their greatest impact on people's freedom is by way of public administration systems. 5. THE DEMOCRATIC ALTERNATIVE The technological determinism notion has been applied to IT. In particular, IT has been accused of being inherently de-humanising, centralist and authoritarian (e.g. Roszak 1986). The standpoint adopted by this author is that technology is essentially morally 'ambivalent' (i.e. it has potential applications and potential impacts variously supportive of, and inimical to, any particular social value - Ellul, 1990). IT may make some paths easier than others, but the choice is made not by blind fate, but by politicians, government executives, and, not least, IT professionals. The alternative political philosophy to authoritarianism is democracy, popularly expressed as 'government of the people by the people for the people', and commonly implemented through representatives chosen regularly and frequently by the combined and equal vote of all competent adults. The democratic ideal derives from the assumption that no class of people has the right to dominate other classes. It reflects the renaissance conception of mankind, whereby each individual should have the opportunity to access and interpret for themselves the ideas of other people and of Gods; and, in more modern terms, should have the scope for self-determination and self-fulfilment. Early computer technology may indeed have encouraged centralisation, but since the marketplace debut of integrated circuitry and the mini-computer about 1970, modern IT has been readily applied in the service of democracy. Open IT-based systems involve nodes which are 'peers', with equal authority in respect of particular functions. For example, in a national health network, each node might take responsibility for all processing and storage relating to a particular aspect of the system's functionality (e.g. support of a particular regional clinic, or epidemiological research into a particular class of diseases), and have special rights recognised by all other nodes in that regard (e.g. the right of access, respectively, to identified data relating to specific patients, and to identifiable data relating to particular diseases and procedures). Similarly, particular kinds of data held at each node (e.g. data identifying a patient) might be recognised as being controlled by that node and require special authority before it could be released to any other node. One form of democratic topology is the unconstrained network, with maximum inter-connectivity, and dominion by each node over the services it provides. Another model is a variant on simple-minded cybernetics: a cascade of controllers which folds around, such that the ultimately controlled (the populace) are also the ultimate controllers (the voters). Before modern communications became available, the only practicable democratic mechanism for geographically large countries was periodic (typically, 3- or 4-yearly) election of representatives. In information societies of the very near future, however, major policy decisions can be instigated, formulated, and decided by direct democracy. Voters may choose to delegate the articulation of broad policies to their elected representatives, but even this can be subject to the over-riding of unpopular decisions, and the removal of representatives the electorate considers are not performing their functions. Hierarchical topologies serve authoritarianism, whereas non-hierarchical ones are consistent with a free society. Access to data under the control of each node must be restricted, until and unless, via due process, disclosure is justified in fulfilment of some higher interest. Such topologies provide not only robustness and adaptability, but also integrity, because clients can trust them, and there is a lower risk of loss of quality (through suspicion and uncooperativeness), and of sabotage (through active attempts to mislead, and direct, destructive action). 6. INSTANCES OF DEMOCRATIC APPLICATION OF I.T. Is this image of democratic computing just a caricature too? Possibly, but examples exist. Local Area Network architectures are inverting the old notion of centralist processors accessed by terminals. The now-conventional names reflect the fact that 'client' workstations demand data and processing from 'servers': the user's device is in control, and the central facility performs at its bidding. In wide-area networking also, peer-to-peer protocols are rivalling and may be progressively replacing the older, hierarchical or 'star' configurations. At the level of inter-networking, the topology of the world-wide TCP/IP-based Internet is essentially flat, the systems software is highly distributed, the redundancy is very high, and its robustness, its resilience and its capacity to resist authoritarian governments are therefore all of a high order. The Internet's technical features have resulted in a culture very different from that on hierarchical nets. It provides a space in which imaginations have substantial freedoms. Some people use those freedoms to create new services and products; others to experiment with self-expression and group-experiences; some as a 'cybernetic' analogue to psychotropic drugs; and some just to distribute pornography or racist materials. Nor are the boundaries between these activities always clear-cut. It seems ironical that the Internet was sponsored by the United States military complex, but the irony is more apparent than real. Systems which support military operations cannot risk the fragility of centralisation, but rather demand robustness and resilience, and therefore redundancy. Moreover, aero-space-defense R. & D. is dispersed across vast numbers of universities and private sector research laboratories. It then seeks to complement competition by collaborative interaction among individual researchers and among potential research partners. To retain its technological and intellectual leadership, it was essential that the U.S.A. avoid the temptation to sustain centralised, authoritarian topologies; and to its credit it knowingly spawned a dynamic, world-wide, democratic network laboratory. 7. A SYNTHESIS This paper has considered the extremes of authoritarianism and democracy. Clearly, any society will demand not only freedoms, but also protections against those who use those freedoms to harm others. Naive authoritarian models are doomed to fail, because they deny freedoms; and naive democratic models are doomed to fail too, because they deny protections. Ronfeldt concluded that IT-based public administration (which he calls 'cyberocracy') "far from favoring democacy or totalitarianism ... may facilitate more advanced forms of both" (1990, p.283). How should new 'cyberocracies' be designed, and how should existing public administration systems be adapted to exploit the new opportunities, while balancing the needs for control and freedom? Authoritarian aspects of schemes could be justifiable in some societies as interim measures. Lenin and then Stalin judged that the country's large peasant population, and its institutions, were insufficiently mature for immediate implementation of the full Communist platform. Unfortunately the repression inherent in their interim arrangements became ingrained, and was only relieved by counter-revolution. Authoritarian elements in public administration should therefore be not only justified, but also demonstrably interim, i.e. the means must be shown whereby they will be replaced, by evolutionary processes, with alternative mechanisms consistent with democratic principles. In any case, the feasibility of grafting democratic features onto an essentially hierarchical model must be regarded as very slim. All power vests in the centre, and any softening of the system's features is by gift of the powerful. Moreover, the system can be manipulated by the powerful (for example, by monitoring nominally confidential communications), and privileges can be withdrawn by the powerful. No freedom-loving populace could regard such a system as credible, and would therefore only submit to it as a result of coercion. Is the alternative feasible: to graft control mechanisms onto an essentially open model? Communication channels can still be tapped and storage devices searched (under warrant). Evidence arising from such interceptions and searches can still be presented in a court of law. Certain actions and uses of IT can be expressly made illegal. The ex post facto controls can therefore still function within open, democratically conceived public administration. Toffler distinguished this form of IT application by coining the term 'practopia' (1980, p.368). What is not so simple to contrive within open systems is effective real-time monitoring and control: Foucault's 'prison' is readily implemented using hierarchical topologies, but if the nodes and arcs of networks are not all under the control of Authority, then preventive controls become much harder to bring to fruition. That, then, is the essential battleground between authoritarian and democratic models of IT: should someone or some class of people, and in particular politicians and senior public sector executives, be permitted to have the power to prevent transgressions? Because it is that kind of control over the public which is at the very heart of the anti-utopian nightmare. 8. CONCLUSIONS Power does not need to be explicitly and consciously granted to public administrators by the voting public, or by their elected representatives. It can accrue, slowly and gently, through developments in IT, through new applications of established techniques, through the gradual 'creep' of existing schemes into new functions, and through seemingly harmless refinements to statutes. As frogs are reputed to do, a society might resist being put into boiling water, yet be lulled to sleep in warm water slowly brought to the boil. This paper commenced by referring to early literary premonitions of authoritarian applications of IT. The fictional literature has undergone a transition. The turning-point was John Brunner's 'The Shockwave Rider' (1975), which explicitly owed a debt to Alvin Toffler's 'Future Shock' (1971). For much of the novel, the hero appears to be putting up a brave fight against inevitable defeat by the State. By turning the power of the net against its sponsors, the hero discovers pockets of surviving resistance, and galvanises the latent opposition to the State. Unlike anti-utopian novels, the book ends on an ambiguous, but (from the humanistic perspective) an optimistic note. Subsequent novels have adopted a quite different pattern. In such works as William Gibson's 'Neuromancer' (1984), and the 'cyberpunk' genre it spawned (see Sterling 1986), people are prosthetic-enhanced cyborgs, plug directly into the net, and induce their 'highs' through a mix of drugs and cyberspace. More importantly for the argument being pursued here, national and regional governments exercise very little power. The hypercorps (successors to the transnational corporations) are responsible for organised economic activity, the majority of the net, and a great deal of the information. Outside this limited, polite society skulk large numbers of people, in communities in which formal law and order have broken down and tribal patterns have re-emerged. Officialdom has not been able to sustain the myth that it was in control; society has become ungovernable. Little echoes of these patterns are evident in contemporary societies. The use of the Internet for anti-social purposes is proving much harder to control than similar behaviour using the telephone network. IT contributed significantly to the breakdown of the Soviet Union because, in addition to improving production effectiveness and efficiency, PCs delivered 'samizdat' - the means for cheap reproduction of dissident newsletters. Lies that had been lived for seven decades could not withstand the heat generated by eager users of a potentially democratising technology. And that was before inter-networking and computer-mediated communications had achieved any degree of sophistication. IT may be applied to public administration in ways consistent with authoritarianism or with democracy. Proponents of hierarchical structures and social engineering, chief amongst them senior public sector executives, must at the very least appreciate the limits of tolerance of authoritarian measures within their society. Preferably, governments should ensure that social administration schemes are not emphatically centralised and incapable of adaptation towards more liberal patterns. And most desirably, public servants, governments and voters themselves, should be exploiting the opportunities for more effective democracy which are being created by information technology. References Agre P. (1994) 'Design for Democracy' Working Paper, Department of Communication, Uni. of California at San Diego (February 1994) Beniger J.R. (1986) 'The Control Revolution: Technological and Economic Origins of the Information Society' Harvard Uni. Press, Cambridge MA, 1986 Bentham J. (1791) 'Panopticon; or, the Inspection House', London, 1791 Bradbury R. (1953) 'Fahrenheit 451 ... The Temperature at Which Books Burn' Ballantine Books, 1953 Brunner J. (1975) 'The Shockwave Rider' Ballantine, 1975 Burnham D. (1983) 'The Rise of the Computer State' Random House, New York, 1983 Ciborra C. (1992) 'From Thinking to Tinkering: The Grassroots of Strategic Information Systems' The Information Society 8,4 (Oct-Dec 1992) Clarke R.A. (1987) 'Just Another Piece of Plastic for Your Wallet: The Australia Card' Prometheus 5,1 June 1987. Republished in Computers & Society 18,1 (January 1988), with an Addendum in Computers & Society 18,3 (July 1988) Clarke R.A. (1988) 'Information Technology and Dataveillance' Commun. ACM 31,5 (May 1988) 498-512 Clarke R.A. (1992a) 'The Resistible Rise of the Australian National Personal Data System' Software L. J. 5,1 (January 1992) Clarke R.A. (1992b) 'Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm' Proc. IFIP World Congress, Madrid (September 1992) Davies S. (1992) 'Big Brother: Australia's Growing Web of Surveillance' Simon & Schuster, Sydney, 1992 Eco U. (1980) 'The Name of the Rose' Picador, 1980, 1984 Ellul J. (1964) 'The Technological Society' Knopf, New York, 1964 Ellul J. (1990) 'The Technological Bluff' William B. Eerdmans, Grand Rapids MI, 1986 Foucault M. (1975) 'Discipline and Punish: The Birth of the Prison' Penguin, 1975, 1979 Gibson W. (1984) 'Neuromancer' Grafton/Collins, London, 1984 Gibson W. (1993) 'Virtual Light' Bantam, New York, 1993 Graham P. (1990) 'A Case Study of Computers in Public Administration: The Australia Card' Austral. Comp. J. 22,2 (May 1990) Greenleaf G.W. & Nolan J. (1986) 'The Deceptive History of the Australia Card' Aust. Qtly 58,4 407-25 (1986) Gronlund A. (1994) 'Public Information Systems' Proc. IFIP World Congress, Hamburg (September 1994) Kling R. (1978) 'Automated Welfare Client Tracking and Welfare Service Integration: The Political Economy of Computing' Comm ACM 21,6 (June 1978) 484-93 Laudon K.C. (1986) 'Dossier Society: Value Choices in the Design of National Information Systems' Columbia U.P., 1986 Orwell G. (1948) '1984' Penguin, 1948, 1980 OTA (1986) 'Federal Government Information Technology: Electronic Record Systems and Individual Privacy' OTA-CIT-296, U.S. Govt Printing Office, Washington DC, Jun 1986 Packard V. (1964) 'The Naked Society' McKay, New York, 1964 Ronfeldt D. (1992) 'Cyberocracy is Coming' The Information Society 8,4 (Oct-Dec 1992) Roszak T. (1986) 'The Cult of Information' Pantheon, 1986 Rule J.B. (1974) 'Private Lives and Public Surveillance: Social Control in the Computer Age' Schocken Books, 1974 Rule J.B., McAdam D., Stearns L. & Uglow D. (1980) 'The Politics of Privacy' New American Library, 1980 Sterling B. (Ed.) (1986) 'Mirrorshades: The Cyberpunk Anthology' Arbor House, New York, 1986 Toffler A. (1971) 'Future Shock' Bantam Books, New York, 1971 Toffler A. (1980) 'The Third Wave' Pan Books, 1980, 1981 Weizenbaum J. (1976) 'Computer Power and Human Reason, Publisher, 1976 Zamyatin E. (1922) 'We' Penguin, 1992, 1980 ------------------------------ Date: Fri, 15 Jul 94 18:45:31 EDT From: sratte@PHANTOM.COM(Swamp Ratte) Subject: File 2--cDc Global Domination Update #15 ((___)) [ x x ] cDc communications \ / Global Domination Update #15 (' ') May 1st, 1994 (U) Est. 1986 New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for May, 1994: +_________________________/Text Files\_______________________ 251: "The False Prophets" by Lady Carolin. It's kind of an inside joke. 'cept ain't nobody laughin'. 252: "The Bishop" by Curtis Yarvin. "Father McKenzie, writing the words of a sermon that no one will hear..." Lonely priest decides he'll be the Pope. And who's to stop him? Let's all be Pope. 253: "Better, Stronger, Faster" by Omega & White Knight. Amazing document hacked-out of a CIA computer reveals use of popular TV program starring Lee Majors to cover up space alien presence. 254: "Hung Like a Horse" by Krass Katt. Blech. Weird, kooky things go on at veterinary hospitals. 255: "Mess o' Top Ten Lists" by The Death Vegetable & Iskra. Like the title says. It's humor, man, humor. 256: "Fecal George" by David Humphrey. Another blech one. Nutty, crazy college kids, eating anything for a quick buck. 257: "Goodnight, Benjamin" by Tequila Willy. Spooky, zany business. 258: "Spontaneous Combustion and the Aryan Parade" by FLaMinG SeVeReD HeaD. They're on Demerol, they've got a '67 Camaro, and some fresh white mice to play with. Whee-doggers. 259: "The HoHoCon 1993 Experience" by Count Zero. All experiences are relative, but here's one to relate to. CZ drops the skinny on the most recent major computer underground convention. 260: "Vegas, 1976" by Mad Mac. Snortin' coke and jacking off to a HINEY BOY magazine in the bathroom of the Sands in Los Vegas just isn't safe anymore. +_____________________________/cDc Gnuz\____________________________ "cDc is the Meat group. All the wannabes can step to the Breads an' Cereals groups, baby." cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list! Send mail to cDc@cypher.com and include some wonderlessly elite message along he lines of "ADD ME 2 DA MAILIN LIZT!!@&!" NEW Official cDc Global Domination Factory Direct Outlets: PHR33DUM 204/775-3038 The Truth Sayer's Domain 210/493-9975 The Black Skyline 214/317-3091 Club Baby Seal 817/429-4636 Cyber Neurotic Reality Test 905/729-0238 Twilight of the Idols +61-3-226-3386 We're always taking t-file submissions, so if you've got a file and want to really get it out there, there's no better way than with cDc. Upload text to The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post office box in Lubbock, TX. Pretty cool buncha t-files: PuD, Pizza Underground Digest. Good thing on TV: __The Mod Squad_ on E! at 7pm CST. Aaron Spelling, what a guy. _The Love Boat_, _Charlie's Angels_, _BH 90210_, and THIS. Hero/Role Model of the Month: People say there's not anybody to look up to anymore. HA! What about Sammy Davis, Jr.? He's Black, he's Jewish, and he's Dead. He sung "The Candy Man," he wore lots of gold jewlery, he hung out with Sinatra, and he referred to everyone as "cat" or "baby." Sammy was a prince, baby, a prince. Stupid Computer Geek, Part X: "In October, Houston, Tex., computer enthusiast Shawn Kevin Quinn, 17, pleaded no contest to putting out a murder contract on the boyfriend of a girl he had eyes for. According to the man Quinn contacted, Quinn offered to pay $5.30 plus seven Atari game cartridges. After a psychological exam portrayed Quinn as merely socially retarded by his computer obsession, a judge sentenced him to 10 years' probation." [Ft. Worth Star-Telegram-AP, October 1993]. Contributed by Omega. S. Ratte' cDc/Editor and P|-|Ear13zz |_3@DeRrr "We're into t-files for the groupies and money." Middle finger for all. Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453. Internet: sratte@phantom.com. =========================================================== cDc Global Domination Update #15-by Swamp Ratte'-"Hyperbole is our business" Copyright (c) 1994 cDc communications. All Rights Reserved. ------------------------------ Date: Mon, 18 Jul 1994 18:03:24 -0700 From: email list server <listserv@SNYSIDE.SUNNYSIDE.COM> Subject: File 3--Privacy at risk: Educational Records Seattle CPSR Policy Fact Sheet K-12 Student Records: Privacy at Risk +---------------------------------------- TOPIC The U.S. education system is rapidly building a nationwide network of electronic student records. This computer network will make possible the exchange of information among various agencies and employers, and the continuous tracking of individuals through the social service, education and criminal justice systems, into higher education, the military and the workplace. WHAT IS THE ISSUE? There is no adequate guarantee that the collection and sharing of personal information will be done only with the knowledge and consent of students or their parents. Changes Are Coming to Student Records National proposals being implemented today include: - An electronic "portfolio" to be kept on each student, containing personal essays and other completed work. - Asking enrolling kindergartners for their Social Security Numbers, which will be used to track each student's career after high school. - Sending High school students' transcripts and "teachers' confidential ratings of a student's work-related behavior," to employers via an electronic network called WORKLINK. At the heart of these changes is a national electronic student records network, coordinated by the federal government and adopted by states with federal assistance. Publication 93-03 of the National Education Goals Panel, a federally appointed group recently empowered by the Goals 2000 bill to oversee education restructuring nationally, recommends as "essential" that school districts and/or states collect expanded information on individual students, including: - month and extent of first prenatal care, - birthweight, - name, type, and number of years in a preschool program, - poverty status, - physical, emotional and other development at ages 5 and 6, - date of last routine health and dental care, - extracurricular activities, - type and hours per week of community service, - name of post-secondary institution attended, - post-secondary degree or credential, - employment status, - type of employment and employer name, - whether registered to vote. It also notes other "data elements useful for research and school management purposes": - names of persons living in student household, - relationship of those persons to student, - highest level of education for "primary care-givers," - total family income, - public assistance status and years of benefits, - number of moves in the last five years, - nature and ownership of dwelling. Many of these information categories also were included in the public draft of the 'Student Data Handbook for Elementary and Secondary Schools', developed by the Council of Chief State School Officers to standardize student record terminology across the nation. State and local agencies theoretically design their own information systems, but the handbook encourages them to collect information for policymakers at all levels. Among the data elements are: - evidence verifying date of birth, - social security number, - attitudinal test, - personality test, - military service experience, - description of employment permit (including permit number,) - type of dwelling, - telephone number of employer. WHO CAN ACCESS THIS COMPREHENSIVE INFORMATION? Officers, employees and agents of local, state and federal educational agencies and private education researchers may be given access to individual student records without student or parent consent, according to the federal Family Educational Rights and Privacy Act of 1974 (20 USC 1232g) and related federal regulations (34 CFR 99.3). Washington state law echoes this federal law. WHAT IS COMING NEXT? Recent Washington state legislation (SB 6428, HB 1209, HB 2319) directly links each public school district with a self-governing group of social service and community agencies that will provide services for families. This type of program is described in detail in the book, Together We Can, published jointly by the U.S. Department of Education and the U.S. Department of Health and Human Services. The book speaks of "overcoming the confidentiality barrier," and suggests creating centralized data banks that gather information about individuals from various government agencies - or in other ways ensuring agencies, "ready access to each other's records." The book calls for a federal role in coordinating policies, regulations and data collection. A group in St. Louis, MO, called Wallbridge Caring Communities, is cited as a model for seeking agreements to allow computer linkups with schools and the social service and criminal justice systems to track school progress, referrals and criminal activity. WHAT HAPPENED TO ONE COMMUNITY In Kennewick, WA, over 4,000 kindergarten through fourth graders were rated by their teachers on how often they lie, cheat, sneak, steal, exhibit a negative attitude, act aggressively, and whether they are rejected by their peers. The scores, with names attached, were sent to a private psychiatric center under contract to screen for "at-risk" students who might benefit from its programs. All of this was done without the knowledge and consent of the children or their parents. CPSR's POSITION CPSR Seattle believes that schools other agencies should minimize the collection, distribution and retention of personal data. Students and/or their parents should decide who has access to detailed personal information. CPSR ACTIONS Representatives of CPSR Seattle have gone to Olympia to: - oppose the use of the Social Security Number as the standard student identifier, - urge legislators to set educational goals that can be measured without invading privacy, - oppose turning over individual student records to law enforcement officials apart from a court order or official investigation. Computer Professionals for Social Responsibility - Seattle Chapter P.O. Box 85481, Seattle, WA 98145-1481 (206) 365-4528 cpsr-seattle@csli.stanford.edu ------------------------------ End of Computer Underground Digest #6.66 ************************************