Came across this interesting publication : Computers and People written way back in 1975 (HT: JP Koning blog). In the publication, several people have written on computers and applications in 1975. Paul Armer, Center for Advanced Study in the Behavioral Sciences at Stanford Univ writes on Computer Technology and Surveillance. His take on Electronic Fund transfer (ETFs) is quite interesting and should be read by one and all. ETFs were just beginning to take shape back then. Let me now turn to a new topic. Several times I have” referred to situations where the technology under discussion was developed for reasons otherthan surveillance, but it happens that it is useful for surveillance purposes. As a prime example of this I want to talk about electronic funds transfersystems. I can’t
Amol Agrawal considers the following as important: Blogs to Read, Economics - macro, micro etc, Financial Markets/ Finance
This could be interesting, too:
Amol Agrawal writes Robert C. Merton and the Science of Finance
Amol Agrawal writes What Happens When Economics Doesn’t Reflect the Real World?
Paul Armer, Center for Advanced Study in the Behavioral Sciences at Stanford Univ writes on Computer Technology and Surveillance.
His take on Electronic Fund transfer (ETFs) is quite interesting and should be read by one and all. ETFs were just beginning to take shape back then.
Let me now turn to a new topic. Several times I have” referred to situations where the technology under discussion was developed for reasons other
than surveillance, but it happens that it is useful for surveillance purposes. As a prime example of this I want to talk about electronic funds transfer
systems. I can’t give you a detailed definition of an electronic funds transfer system (usually referred to as EFTS) because the system hasn’t been built.
Its final form will be an outcome of intensive com- petition, and also of government regulation. But the general form is reasonably clear. Terminals
will exist in stores, hotels, restaurants, etc. (where they are referred to as point-of-sale terminals), and in financial institutions, including un- attended terminals miles from the nearest office of the institution. In short, terminals will be at any location apt to have a large number of non-trivial financial transactions.
To give you an idea of how powerful a surveillance system an EFTS would be, consider the following. In 1971 a group of experts in computers, communication,
and surveillance was assembled and given the following task: Suppose you are advisors to the head of the KGB, the Soviet Secret Police. Further, suppose
that you are given the assignment of designing a system for the surveillance of all citizens and visitors within the boundaries of the USSR. Further,
the system is not to be too obtrusive or obvious.
Not only would it handle all the financial accounting and provide· the statistics crucial to a centrally planned economy; it was the best surveillance system we could imagine within the constraint that it not be obtrusive. That exercise was almost four years ago, and it was only a two-day effort. I am sure we could add some bells and whistles to increase its effectiveness somewhat.
But the fact remains that this group decided that if you wanted to build an unobtrusive system for surveillance, you couldn’t do much better than an EFTS.
Naturally, the EFTS proponents believe that laws could be written to prevent abuse of the system. I am less sanguine. I’m not concerned about the
bankers invading my privacy or using the system for surveillance purposes; but I am afraid that EFTS system operators may be unable to resist pressures
from government to let the EFTS be used for surveillance. There are in existence today computer systems which could be used in exactly this way, although
the number of financial transactions involved is comparatively small. What I haVe in mind here are the credit authorization systems of National BankAmericard, Master Charge, American Express, and various check authorization systems. All can have individual accounts flagged. If an individual tries to make a purchase, or tries to cash a check, the system is interrogated. If the account has a special flag the police (or whoever) can be notified where that individual is at that very instant.
Check authorization systems are especially subject to such abuse because they depend on the police for information about bad check passers and for information on forgers for their computer data bases. I have no doubt that such systems have already been so abused.
He quotes Orwell’s 1984:
Why should we be so concerned about surveillance? I don’t think I can put it any better than Henry Goldberg did in a recent ” 1984 is really a state of mind. If
you are always tied to the consequences of your past activity, you will probably adopt a ‘don’t stick your neck out’ attitude. This would create a pressure towards conformity, which would, in turn, lead to a society in which creativity would be an early victim and the democratic ideal of a citizenry with
control over its own destiny would not flourish for long.
In a recent speech Professor Philip B. Kurland pointed out that we will not celebrate the 200th anniversary of the U.S. Constitution until 1987,
and that before we can do so, we must successfully get past 1984. He further said that if he were in charge of some Bicentennial celebration, he would
require all participants to read Orwell’s “1984” to show what the new nation was created to avoid. I would extend the advice to those concerned about
electronic funds transfer systems. And to “1984” I would add the recently published “The War Against the Jews – 1933 to 1945″ and Tom Houston’s memo on domestic intelligence, which was issued to all American intelligence agencies in President Nixon’s name on July 23, 1970. The book “1984” shows what might happen; the latter two documents detail actual events.
It is amazing how people foresaw all these things when these ideas were just coming up. Yet, very little attention is paid to issues of privacy and surveillance when it comes to digital payments….