Skip to main content
EFFecting Change Livestream August 28

EFFector - Volume 4, Issue 2 - New Social Vulnerabilities

EFFECTOR

EFFector - Volume 4, Issue 2 - New Social Vulnerabilities

              //////////////  //////////////// //////////////         
            ////             ////             ////                    
_________ /////////________ /////////_______ /////////________________
        ////               ////             ////                      
      //////////////////  ////             ////                       
                                                                      
//////////////////////////////////////////////////////////////////////
EFFector Online 4.2           12/17/1992               editors@eff.org
A Publication of the Electronic Frontier Foundation     ISSN 1062-9424
                     -==--==--==-<>-==--==--==-
                    MEGATRENDS OR MEGAMISTAKES?
        What Ever Happened to the Information Society?
  (Part 2 of 2 Parts.) Part 1 was published in EFFector Online 4.1)

              by Tom Forester, Senior Lecturer,
         School of Computing & Information Technology,
             Griffith University, Queensland, Australia

                [Continued from EFFector Online 4.1]
                      UNINTENDED CONSEQUENCES 

NEW SOCIAL VULNERABILITIES 

The IT revolution has created a whole new range of problems for
society - problems which were largely unexpected.  Some arise from
the propensity of computers to malfunction, others arise from their
misuse by humans.   

As complex industrial societies become more dependent on computers,
they become more vulnerable to technological failure because
computers have often proved to be unreliable, insecure and
unmanageable. Malfunctioning hardware and software is much more
common than many (especially those in the computer industry!) would
have us believe. There is little doubt that we put too much faith in
these supposedly-infallible machines. Computers are permeating almost
every aspect of our lives, but unlike other pervasive technologies
such as electricity, television and the motor car, computers are on
the whole less reliable and less predictable in their behaviour. This
is because they are discrete state digital electronic devices which
are prone to total and catastrophic failure. Computer systems, when
they are "down," are completely down, unlike analog or mechanical
devices which may only be partially down and are thus still partially
usable.    

Popular areas for computer malfunctions include telephone billing and
telephone switching software, bank statements and bank teller
machines, electronic funds transfer systems and motor vehicle licence
databases. Industrial robots have been known to go berserk, while
heart pacemakers and automatic garage door openers have been rendered
useless by electro-magnetic radiation or "electronic smog" emitted
from point-of-sale terminals, personal computers and video games. 
Although computers have often taken the "blame" on these occasions,
the ultimate cause of failure in most cases is, in fact, human error.
The cost of all this downtime is huge: for example, it has been
reported that British businesses suffer around 30 major mishaps a
year, involving losses of millions of pounds. The cost of software
failures alone in the UK is conservatively estimated at $900 million
per year (Woolnough 1988). In 1989, a British Computer Society
committee reported that much software was now so complex that current
skills in safety assessment were inadequate and therefore the safety
of people could not be guaranteed (Mellor 1989). 

Computers enable enormous quantities of information to be stored,
retrieved and transmitted at great speed on a scale not possible
before. This is all very well, but it has serious implications for
data security and personal privacy because computer networks are
inherently insecure. The recent activities of hackers and data
thieves in the US, Germany and Britain have shown how all-too-easy it
still is to break into even the most sophisticated financial and
military systems.  Malicious virus creators have wreaked havoc on
important academic and government communication networks. The list of
scams perpetrated by the new breed of high-tech criminals, ranging
from airline ticket reservation fraud to the reprogramming of the
chips inside mobile phones, is growing daily.  Some people have had
their careers and lives ruined by unauthorized users gaining access
to supposedly-confidential databases containing medical, financial
and criminal records.   

Computer systems are often incredibly complex - so complex, in fact,
that they are not always understood even by their creators (although
few are willing to admit it!). This often makes them completely
unmanageable. Unmanageable complexity can result in massive foul-ups
or spectacular budget "runaways."  For example, Bank of America in
1988 had to abandon a $20 million computer system after spending five
years and a further $60 million trying to make it work!  Allstate
Insurance saw the cost of its new system rise from $8 million to a
staggering $100 million and estimated completion delayed from 1987 to
1993!  Moreover, the problem seems to be getting worse: in 1988 the
American Arbitration Association took on 190 computer disputes, most
of which involved defective systems. The claims totalled $200 million
- up from only $31 million in 1984. 

Complexity can also result in disaster: no computer is 100 per cent
guaranteed because it is virtually impossible to anticipate all
sources of failure. Yet computers are regularly being used for all
sorts of critical applications such as saving lives, flying aircraft,
running nuclear power stations, transferring vast sums of money and
controlling missile systems - and this can sometimes have tragic
consequences.  For example, between 1982 and 1987, some 22 US
servicemen died in five separate crashes of the USAF's sophisticated
Blackhawk helicopter before the problem was traced to its computer-
based 'fly-by-wire' system (Forester and Morrison 1990). At least two
people were killed after receiving overdoses of radiation
administered by the computerized Therac 25 X-ray machines, and there
are many other examples of computer foul-ups causing death and injury
(Forester and Morrison 1990). 

Just to rub it in, I should also point out that computer systems are
equally  vulnerable to fires, floods, earthquakes and even quite
short power outages or voltage drops caused by "dirty power", as well
as attacks by outside hackers and sabotage from inside employees. For
example, in Chicago in 1986, a disgruntled employee at Encyclopedia
Britannica , angry at having been laid-off, merely tapped into the
encyclopedia's database and made a few alterations to the text being
prepared for a new edition of the renowned work - like changing
references to Jesus Christ to Allah and inserting the names of
company executives in odd positions. As one executive commented, "In
the computer age, this is exactly what we have nightmares about". 

A year later, another saboteur shut down the entire National
Association of Securities Dealers' automatic quotation service
(NASDAQ) for 82 minutes, keeping 20 million shares from being traded.
The saboteur in question was an adventurous squirrel, who had caused
a short circuit in Trumbull, Connecticut, where NASDAQ's main
computer is situated.  In Australia, foxes have taken to digging up
new optical fibre cables to eat the plastic cover, while sharks have
been doing the same to submarine fibre optic telephone cables on the
floor of the Pacific ocean.  In Denmark, a strike by 600 computer
personnel paralysed the government for four months in 1987, causing
the ruling party to call an early general election (UPI 1987), while
in the same year an Australian saboteur carefully severed 24 cables
in a Sydney tunnel and knocked out 35,000 telephone, fax and point-
of-sale lines, putting hundreds of businesses in 40 suburbs out of
action for up to 48 hours (The Australian, 23 November 1987, page 1). 

As society becomes more dependent on computers, we also become more
vulnerable to the misuse of computers by human beings. The theft of
copyright software is widespread, while recent, well-publicized
incidents of hacking, virus creation, computer-based fraud and
invasion of privacy have been followed by a rising chorus of calls
for improved "ethics" in computing and new laws to protect citizens
from computerized anarchy.  

It can be argued that the "information" or "knowledge" society cannot
possibly flourish unless better protection is offered to individuals
and companies who generate wealth from information.  Yet copying of
software is allegedly costing US producers alone $10-12 billion a
year, according to the Business Software Association (BSA).  In
Europe, where software piracy is costing producers $4.5 billion a
year according to EC figures, the BSA has been forced to mount raids
on major users in Italy and France. Even in Germany, "When you
compare the number of pcs sold with the amount of legitimate software
sold, two-thirds of the computers must be used as expensive
doorstops," says a Microsoft spokesman.  

In Asia, software piracy is rampant. It has been estimated that 7 or
8 copies of well-known packages exist for every legitimate copy sold
in Singapore, where the local economy benefits to the tune of
millions of dollars a year from the counterfeiting of Western
products. In Taiwan, police raids in 1990 netted more than 5,000
counterfeit packages of MS-DOS, 6,000 counterfeit MS-DOS manuals in
English, French and German, and 12,500 disks with bogus Microsoft
labels on them (Jinman 1991).  Hong Kong police busted a software
mail order racket, seizing no less than 109,000 disks, manuals and
other counterfeit kit from a wooden hut on a remote hillside. They
had a street value of $3 million. It is estimated that 97% of all the
software in Thailand has been copied, while copying is also rife in
Pakistan, Malaysia, South Korea and mainland China. So much for the
economic "miracles" of those "little Dragons" of Asia!  

Unless more is done to curb software copying, we are likely to see,
first, a sharp decline in software production. With the erosion of
the potential rewards from software development, programmers are
likely to move into more lucrative areas of the IT industry. And less
software producers will mean less innovative software being produced. 
Second, continued copying will lead to continued rises in software
prices. Already, developers have to recoup the anticipated losses
from copying by charging more than would be necessary if people did
not copy in the first place. Because copying software is so easy and
so widespread, the law - whether it be copyright law, patent law or
contract law - is not a lot of use. Copying is hard to prove in court
and it is nigh impossible to catch copiers in the act. The best hope
for the IT industry is to try to change social attitudes and
individual consciences. 

"Hackers" are another unplanned product of the IT revolution.  Mostly
young males, these computer enthusiasts specialize in gaining
unauthorized access to other peoples' computer systems for fun and
for profit.  Some like the challenge of computer "cracking", some are
little more than electronic vandals who set out to cause damage,
while others have ended up betraying their country - like the members
of the Chaos Computer Club of West Germany who stole US military
secrets which they sold to the KGB in order to fund their expensive
drug habits (the charred body of one of their number, Karl Koch, was
later found in a forest outside Hannover).  In the last couple of
years, enormous time and effort has also been spent making good the
damage caused by malicious computer anarchists who have let loose
"viruses" which have infected thousands of systems and millions of
disks around the world.  

The IT revolution has also made it easier to put people under
electronic surveillance and it has increased the likelihood of
individuals having their privacy invaded.  Burnham (1983) pointed out
that IT enables governments and commercial organisations to store
vast amounts of "transactional data", such as details of phone calls,
financial payments, air travel, and so on.  From these, a composite
picture of an individual's friendships, spending habits and movements
can be built up.  New IT gadgetry makes it much easier to spy on
people with hidden bugs and other eavesdropping devices, to gather
information by, for example, illicit phone taps, and to directly
monitor the performance of employees  with videos and computers.
Electronic databases containing vital medical, financial and criminal
records - which are often inaccurate - have been accessed by
unauthorized users. As Linowes (1989) and Flaherty (1990) argue, this
creates a major problem of how to protect privacy in "information"
societies - a problem which the law has been slow to tackle. 

 
NEW PSYCHOLOGICAL MALADIES 

The IT revolution has brought with it a number of psychological
problems associated with computer-mediated communication. These have
implications for both organisational productivity and human
relationships.  

One major problem is that of "information overload" or so-called
"infoglut". This arises because modern society generates so much new
information that we are overwhelmed by it all and become unable to
distinguish between what is useful and what is not-so-useful. In
essence, it is a problem of not being able to see the wood for the
trees. For example, 14,000 book publishers in the US release onto the
market 50,000 new titles every year. There are now at least 40,000
scientific journals publishing more than 1 million new papers each
year - that's nearly 3,000 per day - and the scientific literature is
doubling every 10-15 years. Clearly, it is impossible for any one
individual to keep up with the literature, except for very small
areas.  The book and research paper explosion has been assisted by
the "publish or perish" ethic in academia, which encourages the
production of mediocre, repetitive and largely useless work. It also
creates a serious headache for cash-strapped libraries.  

Improvements in IT enable us to gather, store and transmit
information in vast quantity, but not to interpret it.  But what are
we going to do with all that information?  We have plenty of
information technology - what is perhaps needed now is more
intelligence technology, to help us make sense of the growing volume
of information stored in the form of statistical data, documents,
messages, and so on.  For example, not many people know that the
infamous hole in the ozone layer remained undetected for seven years
as a result of infoglut. The hole had in fact been identified by a US
weather satellite in 1979, but nobody realised this at the time
because the information was buried - along with 3 million other
unread tapes - in the archives of the National Records Centre in
Washington DC. It was only when British scientists were analysing the
data much later in 1986 that the hole in the ozone was first
"discovered".  

In commerce and in government, it is alleged that infloglut is
affecting decision-making to such an extent that some organisations
now suffer from "analysis paralysis."  Managers and administrators
become overloaded and prevaricate by calling for more studies,
reports, etc, instead of actually making a decision.  But as someone
once said, "waiting for all the facts to come in" can be damn
frustrating if the facts never stop coming!  In the military sphere,
information overload has caused pilots to crash fighter aircraft.  It
has also played a role in civilian and military disasters such as
Bhopal and the downing of an Iranian airbus over the Persian Gulf by
the USS Vincennes. The US military is now having to spend large sums
of money on "human factors" research - that is, studying how humans
can adequately relate to complex, high-tech weapons systems which
operate at lightning-fast speeds.   

There is also serious concern that media infoglut is having a
damaging effect on society - in particular the younger generation. 
As Chesebro and Bonsall (1989) show, the television set is on in the
average American household for 7 hours and 7 minutes a day. In
addition, recorded video tapes are watched for a further 5 hours 8
minutes a week on average (1987 figures).  Young Americans can also
tune in to any of 9,300 radio stations in the US, on one of the 5.3
radios in the average American household.  In these and other ways,
the typical American encounters no less than 1,600 advertisements
each day.  By the age of 17, the average American child would have
seen over one-third of a million ads. It is little wonder that US
academics are talking about America "amusing itself to death", its
collective mind numbed by video-pulp, 10-second sound bites and 30-
second video clips.  A recent report by the Times Mirror group
concluded that the current under-30s generation in the US - despite
the benefits of a higher standard of living, better education,
information technology, etc - "knows less, cares less and reads
newspapers less than any generation in the past five decades" (Zoglin
1990).  

A second set of problems concerns the way some people use the new
computer-based communication technologies and how they relate to
other people as a result.  For instance, some managers have been
diagnosed "communicaholic" because of their obsessive desire to keep
in touch and to constantly communicate using their car phones and fax
machines. Some have allegedly become "spreadsheet junkies", playing
endless what-if? games on their computers, or "e.mail addicts"
spending hours sending and answering trivial e.mail messages. But
does this "hyperconnectedness" mean that they are doing their jobs
any better and are they making wiser decisions?  There is some
evidence that too much "in touch" may actually be destructive of work
relationships - subordinates usually want to be left alone to get on
with the job.  Calling people at home for progress reports can
increase stress by further blurring the boundaries between work and
nonwork. And what of those car phone conversations?  Many have long
suspected the quality of such communication and now research at
Loughborough University in the UK has confirmed that car phones can
seriously impair negotiating and decision-making skills.  Rather like
US president Gerald Ford (about whom it was said that he couldn't
think and chew gum at the same time), it seems that 4 out of 5 UK
executives cannot think and drive at the same time. For car phone
users, both their businesses and their cars were more likely to
crash. 

A further problem is "technobabble". This modern malady has two
aspects. The first is the inability of computer personnel to explain
in plain English just what they or their systems can do - or the
value in business terms of investing more money in IT equipment. In
many organisations, top management and IT departments still speak a
different language and this has serious consequences for
organisational efficiency.  Second, Barry (1991) has described the
way in which computer terminology and techno-jargon is being applied
indiscriminately to areas of life which have nothing at all to do
with technology. Thus, people these days do not merely converse with
each other, they interface.  It is not uncommon to hear people refer
to their leisure hours as downtime.  In California's Silicon Valley,
getting something off ones's chest is even known as core-dumping. 
Just as some people are coming to think of themselves as computers,
so they are also beginning to view computers as "intelligent" or
"thinking" people - and yet the analogy between conventional Von
Neumann computers and the human brain has long been discredited.

PUTTING HUMANS BACK IN THE PICTURE  

We have seen that many of the predictions made about the impact of
computers on society have been wide of the mark, primarily because
they have accorded too great a role to technology and too little a
role to human needs and abilities.  At the same time, there have been
a number of unanticipated problems thrown up by the IT revolution,
most of which involve the human factor.  

Perhaps the time has come for a major reassessment of our
relationship to technology, especially the new information and
communication technologies. After all, haven't manufacturers
belatedly discovered that expensive high-tech solutions are not
always appropriate for production problems, that robots are more
troublesome than people and that the most "flexible manufacturing
system" available to them is something called a human operator? 
Didn't one study of a government department conclude that the only
databases worth accessing were those carried around in the heads of
long-serving employees?  And is it not the case that the most
sophisticated communication technology available to us is still
something called speaking to each other?  One conclusion to be drawn
from this is that technological advances in computing seem to have
outpaced our ability to make use of them.  

Computers have also de-humanized many social activities ranging from
commercial transactions to hospital care. Human interaction has
tended to decline in the computerized workplace. ATMs have de-
personalized banking. Even crime has been de-personalized by the
computer - pressing a few keys to siphon-off funds is not the same as
bashing someone over the head and running-off with the cash!  To
many, the recent military conflict in the Gulf resembled a giant
video game and even became known as the "Nintendo War". There is also
little doubt that many computer scientists and other computer
enthusiasts have low needs for social interaction and seem to relate
better to their machines than they do to other human beings - the so-
called "nerd" syndrome.  Further, computers have speeded-up the pace
of life, leaving little time for calm reflection and contemplation.
This can lead to "technostress", fatigue, anxiety and burnout.  Most
people now know that slow is healthier, but there is little evidence
that people are slowing down.  

Perhaps we should go back to basics and first decide what we really
want out of life - a decent home, a satisfying family life, a
reasonable standard of living, a clean environment, an interesting
job with a healthy workstyle - and then direct technology toward
these simple, human ends. It would be nice to think that our schools
and colleges are helping make future generations more aware of the
choices and the possibilities, rather than fatalistically joining in
the uncritical, headlong rush toward an ill-defined and ill-thought-
out high-tech future.  

                         ===========
Opening Address to International Conference on the Information
Society, Gottlieb Duttweiler Institute / Green Meadow Foundation,
Zurich, Switzerland, 18 November 1991
                         ===========

                   -==--==--==-<>-==--==--==-


         THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
                       CALL FOR NOMINATIONS
                     Deadline: December 31,1992

In every field of human endeavor,there are those dedicated to expanding
knowledge,freedom,efficiency and utility. Along the electronic frontier,
this is especially true. To recognize this,the Electronic Frontier
Foundation has established the Pioneer Awards for deserving individuals
and organizations.

The Pioneer Awards are international and nominations are open to all.

In March of 1992, the first EFF Pioneer Awards were given in Washington
D.C. The winners were: Douglas C. Engelbart of Fremont, California;
Robert Kahn of Reston, Virginia; Jim Warren of Woodside, California; Tom
Jennings of San Francisco, California; and Andrzej Smereczynski of
Warsaw, Poland.

The Second Annual Pioneer Awards will be given in San Francisco,
California at the 3rd Conference on Computers, Freedom, and Privacy
in March of 1993.

All valid nominations will be reviewed by a panel of impartial judges
chosen for their knowledge of computer-based communications and the
technical, legal, and social issues involved in networking.

There are no specific categories for the Pioneer Awards, but the
following guidelines apply:

   1) The nominees must have made a substantial contribution to the
      health, growth, accessibility, or freedom of computer-based
      communications.

   2) The contribution may be technical, social, economic or cultural.

   3) Nominations may be of individuals, systems, or organizations in
      the private or public sectors.

   4) Nominations are open to all, and you may nominate more than one
      recipient. You may nominate yourself or your organization.

   5) All nominations, to be valid, must contain your reasons, however
      brief, on why you are nominating the individual or organization,
      along with a means of contacting the nominee, and your own contact
      number. No anonymous nominations will be allowed.

   6) Every person or organization, with the single exception of EFF
      staff members, are eligible for Pioneer Awards.

   7) Persons or representatives of organizations receiving a Pioneer
      Award will be invited to attend the ceremony at the Foundation's
      expense.

You may nominate as many as you wish, but please use one form per
nomination. You may return the forms to us via email to

             pioneer@eff.org

You may mail them to us at:
             Pioneer Awards, EFF,
             155 Second Street
             Cambridge MA 02141.

You may FAX them to us at:
             +1 617 864 0866

Just tell us the name of the nominee, the phone number or email address
at which the nominee can be reached, and, most important, why you feel
the nominee deserves the award.  You may attach supporting
documentation.  Please include your own name, address, and phone number.

We're looking for the Pioneers of the Electronic Frontier that have made
and are making a difference. Thanks for helping us find them,

The Electronic Frontier Foundation
                   -==--==--==-<>-==--==--==-

         MEMBERSHIP IN THE ELECTRONIC FRONTIER FOUNDATION

If you support our goals and our work, you can show that support by
becoming a member now. Members receive our bi-weekly electronic
newsletter, EFFector Online, the @eff.org newsletter
and special releases and other notices on our activities.  But because
we believe that support should be freely given, you can receive these
things even if you do not elect to become a member.

Our memberships are $20.00 per year for students, $40.00 per year for
regular members.  You may, of course, donate more if you wish.

Our privacy policy: The Electronic Frontier Foundation will never, under
any circumstances, sell any part of its membership list.  We will, from
time to time, share this list with other non-profit organizations whose
work we determine to be in line with our goals. If you do not grant
explicit permission, we assume that you do not wish your membership
disclosed to any group for any reason.

---------------- EFF MEMBERSHIP FORM ---------------

Mail to: The Electronic Frontier Foundation, Inc.
    155 Second St. #41
    Cambridge, MA 02141

I wish to become a member of the EFF  I enclose:$__________
    $20.00 (student or low income membership)
    $40.00 (regular membership)
    $100.00(Corporate or company membership.
    This allows any organization to
    become a member of EFF. It allows
    such an organization, if it wishes
    to designate up to five individuals
    within the organization as members.)

    I enclose an additional donation of $

Name:

Organization:

Address:

City or Town:

State:     Zip:    Phone:(    )     (optional)

FAX:(    )    (optional)

Email address:

I enclose a check [  ]   .
Please charge my membership in the amount of $
to my Mastercard [  ]     Visa [  ]    American Express [ ]

Number:

Expiration date:

Signature:

Date:

I hereby grant permission to the EFF to share my name with
other non-profit groups from time to time as it deems
appropriate   [  ]  .
      Initials:

Your membership/donation is fully tax deductible.
=====================================================================
     EFFector Online is published by
     The Electronic Frontier Foundation
     155 Second Street, Cambridge MA 02141
     Phone: +1 617 864 0665 FAX: +1 617 864 0866
     Internet Address: eff@eff.org
 Reproduction of this publication in electronic media is encouraged.
 Signed articles do not necessarily represent the view of the EFF.
 To reproduce signed articles individually, please contact the authors
 for their express permission.
=====================================================================
     This newsletter is printed on 100% recycled electrons.

Back to top

JavaScript license information