[fa.human-nets] HUMAN-NETS Digest V7 #7

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (01/11/84)

HUMAN-NETS Digest        Tuesday, 10 Jan 1984       Volume 7 : Issue 6

Today's Topics:
              Book Review - "Rise of the Computer State"
----------------------------------------------------------------------

Date:  9 Jan 1984 0128-PST
From: Rob-Kling <Kling%UCI-20B@UCI-750a>
Subject: Review-Rise of the Computer State



                  Rise of the Computer State by David Burnham
                  Published by Random House, New York - 1983.


                              Review by Rob Kling
                 Department of Information and Computer Science
                        University of California, Irvine
                             (KLING.UCI@RAND-relay)


          This book examines the ways that Federal agencies and elected
     officials have employed computer-based information systems (CBIS) to
     increase their power unfairly.  Burnham's main theses are:  1) that
     CBIS have often been effective media for extending the surveillance
     potential of the host organization;  2) overall, citizens have lost
     substantial power in their routine dealings with computer-using
     organizations;  3) attempts to regulate the use of CBIS containing
     personal records have been frail and largely ineffective relative to
     the scale of operations that should be regulated;  4) some
     organizations which employ sophisticated CBIS for intelligence, such
     as the National Security Agency, are unaccountable to the larger
     public.

          These theses have a sinister tinge.  As we enter 1984, the United
     States is far from a police state.  However, Burnham fears that the
     slow, steady, consistent adoption of new surveillance systems and the
     expansion of existing ones is eroding democratic political processes
     in the United States.  If he is correct, these are arguably the most
     important consequences of computerization in the United States.  

          This is a trade book aimed at the same audience that reads
     "Megatrends", "The Third Wave", or "Fifth Generation".  Unlike these
     highly popular books which are permeated with happy talk about the
     social possibilities of widespread computerization, "The Rise of the
     Computer State" examines the seamy underside of organizations that
     employ CBIS to collect, manipulate, and communicate sensitive data
     about all of us.

          Burnham, a New York Times reporter, has written this book for a
     popular audience.  Its strengths lie in Burnham's sensitivity to the
     civil liberties issues in practices that might simply appear
     "expeditious" and in his eye for graphic detail in explaining how
     organizations employ CBIS to make their operations efficient and
     "effective." 

          Burnham examines two themes that link computerization with a
     certain kind of organizational power:  surveillance of "targeted"
     people or groups and opinion polling.  In a separate chapter he
     examines the National Security Agency which he labels "the ultimate
     computer bureaucracy."

                                                                     Page 2


     SURVEILLANCE

          Some organizations act under legislative mandates that many
     people would label "pro-social".  For example, the Bureau of Child
     Support of the Los Angeles District Attorney's office uses CBIS to
     seize California State tax refunds from certain runaway fathers who
     are delinquent in their child support payments.  A second group act
     within the boundaries of legal, but unduly permissive information
     practices.  For example, a company called U.D. Registry provides
     landlords with histories of disputes with previous landlords,
     maintains records which are usually unknown to tenants and does little
     to insure that they are treated fairly.  A third group of
     organizations engage in action that are either illegal or nearly so.
     For example, U.S. Army's surveillance of liberal and leftist activists
     in the late 1960's, extended well beyond the scope of "national
     security." Burnham portrays these activities with sharp detail that
     give color to routine practices and their participants.

          Burnham is a staunch civil libertarian and sees all social
     surveillance as problematic.  It is easiest to criticize organizations
     like the U.S. Army when they intrude upon political minorities and
     thereby threaten First amendment rights.  It is also easy to criticize
     some of the "holes" in CBIS such as those operated by U.D. Registry,
     which are unknown to people on whom records are kept, and who are not
     legally obligated to enable people to see their records, correct
     errors, or annotate their files case of disputes.

          Burnham's criticisms reach much further than identifying the
     problems with CBIS employed by the second and third groups of
     organizations.  He questions the first group as well.  Burnham's
     questions about organizations and systems for tracking runaway fathers
     who leave their children on welfare illustrates of his concerns about
     social strategies which depend upon extensive surveillance for
     enforcement:  1) will the original target group be slowly enlarged
     until it is much larger than originally intended in the enabling
     legislation?  2) can the information system be extended by local
     officials for surveillance upon "others who fall into disfavor?"

          Burnham reports how the scope of these systems has expanded from
     locating parents who were avoiding child support payments and whose
     children were receiving funds from Federal welfare programs to include
     any parent whose (ex)spouse seeks the other parent of their children.
     Burnham notes that there are few constitutional limits on the scope of
     such an surveillance system.  Why not, for example, expand its scope
     so that creditors can track down their debtors?  Or why not expand it
     expand it so that people can locate lost relatives and old friends?
     While these "information needs" are less heart wrenching than the
     situations of women who turn to public assistance when their
     ex-husbands refuse to pay court-mandated child support, they are also
     "pro-social." Burnham argues that little prevents surveillance systems
     such as this one from being slowly expanded to track ever larger
     groups of people than legislative sentiment and a fragile coalition of
     legislators who are sympathetic to civil liberties values.
                                                                     Page 3


          Burnham uses this example to illustrate another key feature of
     recent surveillance systems:  records systems which are set up for
     rather narrow purposes of one organization are used by investigators
     in another organization.  The Parent Locator System, for example, is
     not a particular, specialized CBIS.  Rather, it is a set of procedures
     and arrangements which enable certain investigators to send lists of
     "missing parents" to the Internal Revenue Service, the Social Security
     Administration, the Defense Department, the Veterans Administration,
     and the National Personnel Center.  Each of these organizations honors
     these requests, searches its CBIS for the current locations of the
     "missing parents" and returns the information to the requestors on
     magnetic tape.

          While many CBIS could be operated as manual systems, these
     searches would be prohibitively expensive add-ons with manual record
     systems.  However, the marginal costs of search are affordable with
     computerized record systems.  The Parent Locator "System" is one of
     many "matching programs" in which public agencies use existing files
     to search for deviants.  Organizational payroll files have been
     "matched" against welfare files to find gainfully employed people who
     are committing welfare fraud.  State Department of Motor Vehicle files
     have been matched with Selective Service files to identify eligible 18
     year olds who have not registered for the draft.  In each of these
     cases, the records of thousands of people who have broken no laws are
     matched to find the few that have.  Burnham finds the principle
     offensive, even though the applications are expedient and have so far
     have been aimed at lawbreakers.  In his eyes, expediency and
     efficiency should not be preeminent values for administrative action.


          PRIVACY REGULATIONS

          Burnham briefly examines some of the Federal privacy initiatives
     of the last decade, including the Privacy Act of 1974, the proposals
     of the Privacy Protection Study Commission, and the 1978 Financial
     Right to Privacy Act.  These laws have provided minimal protections,
     and important protections of the Federal Right to Privacy Act have
     been undermined in implementation by Federal agencies under Ford,
     Carter, and Reagan.  Only a few of the 155 recommendations reported by
     the Privacy Protection Study Commission in 1977 have been enacted in
     law.  

          Burnham mentions these laws and examines some of their
     limitations.  However, he doesn't evaluate their potential.  Would
     many of the problems of CBIS operated by firms like the U.D. Registry
     be ameliorated if they were brought under laws like the Fair Credit
     Reporting Act?  Would civil liberties be better protected if the
     remaining recommendations of the Privacy Protection Study Commission
     were enacted in law?  Unfortunately, Burnham is mute about these
     possibilities.

          Burnham is strongest in identifying concrete problems.  Most
     serious there is no permanent institutional counterweight to Federal
     agencies when they propose new, more efficient, or enlarged personal
     record systems.  Agencies such as the FBI, the IRS, or the Social
                                                                     Page 4


     Security Administration can return to Congress every few years with
     proposals for massive CBIS which have problematic privacy aspects and
     expect that sooner or later, the civil libertarians who restricted
     their last proposal will be weaker or pre-occupied with other matters.

     POLLING

          Burnham examines opinion polling as another form of
     organizational intelligence which has been rendered substantially more
     efficient and sophisticated by computers.  He views opinion polling by
     elected officials and organizations which are campaigning for specific
     legislation as selective intelligence which places the target public
     at an unfair disadvantage.  The main problem he sees in market
     research in the service of electoral politics is the extent to which
     it helps make propaganda less transparent and the public more
     manipulable by marketing strategists who target different messages to
     different groups.  While there is nothing new in political actors
     tailoring their appeals to different audiences, Burnham fears that the
     modern versions of sophistry are less obvious and consequently far
     more successful for those who can afford to employ them.

          He also views opinion polls as easily subject to manipulation by

     politicians seeking legitimacy or publicity.  Polling is not simply a
     reporting device.  Pollers gain leverage relative to the larger public
     since much of the audience for polls will read headlines and short
     news items which distort the scientific meaning of a poll by
     neglecting to explain the nature of the sample, the detailed
     distribution of responses, or the questions asked.  Political polling
     is not only "information gathering;" it can be a devise for persuading
     larger publics about the popularity of one's position.

     NATIONAL SECURITY AGENCY

          In a dramatic chapter, Burnham reports how the National Security
     Agency (NSA) has operated under a charter which has remained secret it
     was initiated by President Truman in 1952.  The NSA specializes in
     electronic surveillance.  A large fraction of its efforts probably go
     to observing military force deployments and strategic resources
     worldwide.  Burnham reports how the NSA has also illegally
     eavesdropped on a significant fraction of international telephone
     calls and telex messages which leave the United States.

          Burnham reports on the character of specific programs of domestic
     surveillance which were illegal.  According to Burnham, the NSA
     developed files on political dissidents including civil rights
     activists, antiwar activists, members of Congress, and ordinary
     citizens who were critical of official government policies.  While
     most of the domestic political surveillance appeared to take place in
     the late 1960's through mid-1970's, the shroud of secrecy that
     surrounds the NSA makes it difficult to have significant Congressional
     oversight of its policies and practices.

          During the last 5 years, the NSA has moved to control
     cryptographic research in the United States.  Recently developed
     encryption schemes are based on sophisticated algorithms which require
                                                                     Page 5


     digital circuits for rapid coding and decoding.  Some of the new
     schemes even allow the code keys to be public, rather than secret.  As
     more business operations in the United States is computerized,
     organizations seek ways to protect the privacy of data such as large
     funds transfers.  Thus the market for efficient and effective data
     encryption devices has expanded beyond the intelligence community to
     include financial institutions.

          The NSA has recently taken control of this research out of the
     hands of the National Science Foundation, even though it has no
     publicly documented legal mandate for its action.  There are deep
     policy questions about whether national security is well served by the
     availability of cheap encrypting devices which are effectively
     unbreakable.  These questions are not being raised in public debates,
     nor does Burnham shed much light on them.  Rather he simply adopts the
     libertarian critique of surveillance.  Like other political labels
     with strong moral content, it has been abused as a cover for unsavory
     actions carried out by government operatives.  The term in not wholly
     vacuous and Burnham glosses most of the knotty policy issues.

     TOWARD A POLICE STATE?

          Burnham's theses are loosely fabricated from dramatic examples.
     He does not offer explicit hypotheses, strong organizing concepts, and
     a way of placing his examples in a context which enables a reader to
     understand their overall significance.  Examples of bad outcomes can
     elicit sympathy for "victims." But systematic information about the
     frequency and extent of problems and abuses are necessary to
     demonstrate that the overall social setup within which they happen is
     badly flawed, corrupt, or perverse.  Some of his examples of people
     victimized by slips in CBIS and organizational practices suggest that
     Kafka has provided better guiding images than Orwell for appreciating
     a computer-based, mobile, organizational society.

          Burnham has little taste for irony, and explores Orwellian abuse
     rather than Kafkaesque happenings.  Do the events Burnham describes
     indicate that Federal agencies and other large computer users are
     pushing the the US along a path of political development that is
     leading to a much less democratic form of Federal government?
     Unfortunately, Burnham does not describe the changing nature of
     Congressional oversight and public accountability sufficiently well to
     provide a clear answer to that question.  He succeeds in generating
     sentiments in favor of this hypothesis by his accumulated cases of
     organizational seaminess and occasional abuse.  But he relies heavily
     upon a reader's distrust of elected officials and large bureaucracies
     to help cement his case.  He also relies upon general theses about
     power, such as Lord Acton's maxim.  Unchecked power often corrupts and
     organizations are often less willing to be fair to their clients than
     efficient and autonomous.  But general principles do not make the
     particular case since the variations in actual organizational
     practices are significant and vast.

          One peculiar feature of contemporary police states, such as those
     in Eastern Europe and Latin America, is the extent to which they have
     relied upon low technologies for extensive social control and even
                                                                     Page 6


     mass terror.  Many abusive ruling cliques rely upon neighborhood
     informants, secret trials, and mysterious disappearances to maintain
     control.  They don't need database management systems, teleprocessing,
     and spy satellites.  Low technology strategies are especially
     effective in "small town" societies.  

          Burnham's implicit argument is that less obtrusive forms of
     surveillance and social control can harm the political culture of
     liberal democracies.  CBIS are attractive to administrators and
     politicians because they promise heightened efficiencies and sometimes
     enhanced fairness in providing services to large mobile populations.
     However, the anecdotes of errors with a human cost and even abuses
     which Burnham piles on the reader, illustrate problems but do not make
     his case.

          Burnham's strongest case is his critique of the NSA's abuses of
     authority.  Like, the secret Law Enforcement Intelligence Units, much
     of the problem with the NSA comes from its shroud of secrecy and
     freedom from significant legislative oversight.  It's use of
     computer-based monitoring systems is incidental to its problematic
     place in American political life.

          I suspect that one basic issue is accountability of these
     agencies to the public through the legislatures.  At times this is no
     easy task when the administrative agencies can shroud their actions
     with the complexities of high technologies.  There is a strong case to
     be made that in the clashes between branches of government,
     administrative agencies have found legal and technological loopholes
     to temporarily free themselves from regulatory restraint.
     Congressional actions are not always right.  But there is an argument
     that administrative agencies have been able to exploit computer-based
     technologies to shift the balance of governmental power away from
     elected officials.  This systematic shift of power has been best
     documented in the case of local governments.  It is likely to be
     happening at other governmental levels as well.

     COMPUTERS AND POLITICS 

          Burnham is sensitive to the shifts of power to executive
     agencies.  But he is at a loss to explain them very well.  He misses
     the deeper politics of computing.  I find a clue to his misperception,
     a very common one, in his reference to "the computer's system of
     thinking." For Burnham, CBIS are simply highly structured, logical,
     possibly hierarchical information processing "tools." He misses the
     ways in which CBIS designs often reflect the "systems of thinking" of
     those who propose them.  CBIS promoters may label their preferences as
     "required by computers" to help their case, but they often ignore or
     discourage many technical and administrative alternatives.

          Many CBIS are usefully viewed as forms of social organization.
     Those who oversee them need some ability to appreciate technical
     alternatives and also have some substantive expertise in the
     organizational functions which have computer support.  This dual
     expertise is rare, particularly among elected officials at all levels
     of government.  As a consequence, they have trouble in providing
                                                                     Page 7


     sensible guidance to executive agency staff.

     QUALITY OF BURNHAM'S ANALYSIS

          I would like to like this book more than I do.  I like Burnham's
     eye for detail and his relentless questions about the underside of
     computer-based surveillance systems.  Some new data brokering
     organizations start up each year.  Each year, many existing
     organizations expand the scope and scale of their record keeping.
     Laws and administrative practices also change slowly each year.  Over
     ten year periods, these gradual small scale changes accumulate.
     Periodic reviews of these practices are useful.  As a consequence of
     continuing changes in organizational practices, legal arrangements,
     and technology, studies published in the early 1970's such as Westin
     and Baker's "Databanks in a Free Society" or James Rules' "Public
     Surveillance and Private Lives" have become dated.  Both of these
     studies pre-date the use of computer matching, and several Federal
     privacy initiatives.

          Unfortunately, this book is weak in analysis.  Even the chapter
     headings don't guide the argument.  The first three chapters are
     labelled "surveillance," "data bases," and "power." However, themes of
     power, surveillance, and data bases are strong elements in each of
     them.  The chapter labelled "power" primarily examines political
     polling.  This lax labelling of chapters signifies the way that
     Burnham eschews tough analysis in favor of easy sentimentalizing.

          It should be hard for Burnham, a reporter and hence a kind of
     intelligence agent, to find observation, reporting, and persuasion to
     be inherently sinister acts.  However, Burnham colors his narrative so
     that people who administer a CBIS are stigmatized in descriptions such
     as "(speaking) in the quiet monotones of many long-time government
     employees," or are "slightly Mephistopholean." People who sympathize
     with civil libertarian values are portrayed without any frailties.
     Burnham is deeply suspicious of pollsters and politicians who
     manipulate the public with numbers, but he is very adept at
     manipulating his audience with images.  These images which equate
     personal goodness with political philosophy grossly mislead.

          Despite these limitations, "The Rise of the Computer State" is
     particularly important because it helps articulate and illustrate
     important questions about computing and social power.  Unfortunately,
     there is no other up-to-date inquiry into organizational surveillance
     and high technology.

          "The Rise of the Computer State" is an important contribution to
     the tiny stream of literature which examines the political dimensions
     of computer-based technologies in public life.  I hope that many

***Sender closed connection***

=== brl netread error from RUTGERS at Tue Jan 10 22:21:06  ===