THE NATIONAL DATA CENTER AND PERSONAL PRIVACY (Nov, 1967)

I can’t tell you how excited I was when I found this magazine on eBay. I thought that the author was this Arthur Miller. An article about the personal privacy threats inherent in massive government databases, written by the author of the Crucible sounded amazing. It turns out that the author was actually this Arthur Miller, and I don’t think anyone could have done a better job.

This is the most amazingly prescient article I’ve ever read. When people write about the future they are usually wrong. When people write about the future of computers, they are usually even more wrong. This article got everything right. If you changed the tense and a few bits of jargon, then handed to me and told me it was written by the EFF, I’d believe it.

Just to give you an idea of how right he was on even the basic computer stuff, here’s the second paragraph of the article. Keep in mind that this is what desktop computers looked like in 1967.

“The modern computer is more than a sophisticated indexing or adding machine, or a miniaturized library; it is the keystone for a new communications medium whose capacities and implications we are only beginning to realize. In the foreseeable future, computer systems will be tied together by television, satellites, and lasers, and we will move large quantities of information over vast distances in imperceptible units of time.”

Forty-one years ago Arthur R. Miller laid out all of the privacy threats that we face now. The power that credit reporting databases have over us. The illegal government use of our financial and phone records. The attempt to build a master database tying all of these together. The fact that the government might consider you a threat if you so much as sent a Christmas card to someone the government has on a watch list. It’s all here. He basically predicted and laid out all of the arguments against the Total Information Awareness program and the current NSA programs that have been so much in the news.

It’s nice to know there were people who were so ahead of the curve in trying to protect our rights, and it’s a tragedy that more people didn’t listen. I think it speaks strongly to the need to pay attention to this stuff now, because this problem will only get worse.

|<<
<< Previous
1 of 6
|<<
<< Previous
1 of 6

THE NATIONAL DATA CENTER AND PERSONAL PRIVACY

by ARTHUR R. MILLER

The computer age is not to be stayed, as anyone knows who has been billed for another citizen’s charge account or has wondered what has happened to his paid-up magazine subscription. The computer science is already so advanced that experts envisage a huge National Data Center to speed and simplify the collection of pertinent information about Americans. Properly run, it could be a boon. But any person who has seen an FBI file or been party to a U.S. government “security check” has reason to know how the abuse or misuse of dossiers of unevaluated information can threaten an individual’s rights. A professor of law at the University of Michigan here discusses the precautions necessary to protect citizens from “governmental snooping and bureaucratic spinelessness or perfidy.” Professor Miller has testified on the subject before the Senate Subcommittee on Administrative Practice and Procedure. On page 58, Bob and Ray show what can happen if the safeguards fail.

The modern computer is more than a sophisticated indexing or adding machine, or a miniaturized library; it is the keystone for a new communications medium whose capacities and implications we are only beginning to realize. In the foreseeable future, computer systems will be tied together by television, satellites, and lasers, and we will move large quantities of information over vast distances in imperceptible units of time.

The benefits to be derived from the new technology are many. In one medical center, doctors are already using computers to monitor heart patients in an attempt to isolate the changes in body chemistry that precede a heart attack. The search is for an “early warning system” so that treatment is not delayed until after the heart attack has struck. Elsewhere, plans are being made to establish a data bank in which vast amounts of medical information will be accessible through remote terminals to doctors thousands of miles away. A doctor will then be able to determine the antidote for various poisons or get the latest literature on a disease by dialing a telephone or typing an inquiry on a computer console.

A committee of the Bureau of the Budget has proposed that the federal government set up a National Data Center to compile statistical information on various facets of our society. Certainly the computer can help us simplify record-keeping by assigning everyone a “birth” number that will identify him for tax returns, banking, education, social security, the draft, and other purposes. This number could also serve as a telephone number, which, when used on modern communication mechanisms, would make it possible to reach its holder directly no matter where he might be.

But such a Data Center poses a grave threat to individual freedom and privacy. With its insatiable appetite for information, its inability to forget anything that has been put into it, a central computer might become the heart of a government surveillance system that would lay bare our finances, our associations, or our mental and physical health to government inquisitors or even to casual observers. Computer technology is moving so rapidly that a sharp line between statistical and intelligence systems is bound to be obliterated. Even the most innocuous of centers could provide the “foot in the door” for the development of an individualized computer-based federal snooping system.

Since a National Data Center would be augmented by numerous subsystems or satellites operated by state and local governments or by private organizations, comprehensive national regulation of computer communications, whether of federal or nonfederal origin, ultimately will become imperative.

Moreover, deliberations should not be conducted in terms of computer capability as it exists today. New computer hardware is constantly being spawned, machine storage capacity and speed are increasing geometrically, and costs are declining. Thus at present we cannot imagine what the dimensions, the sophistication, or the snooping ability of the National Data Center will turn out to be ten or twenty years from now. Nor can we predict what new techniques will be developed to pierce any safeguards that Congress may set up in order to protect people against those who manipulate or falsify information they extract from or put into the center.

Of course, it would be foolish to prohibit the use of data-processing technology to carry out important governmental operations simply because it might be abused. However, it is necessary to fashion an adequate legal structure to protect the public against misuse of information handling.

IN the past, privacy has been relatively easy to protect for a number of reasons. Large quantities of information about individuals have not been available. Generally decentralized, uncollected, and uncollated, the available information has been relatively superficial, access to it has been difficult to secure, and most people are unable to interpret it. During the hearings held recently by two of the congressional subcommittees investigating invasions of privacy, however, revelations concerning the widespread use of modern electronic and optical snooping devices shocked us.

In testimony before the House Subcommittee on Invasion of Privacy, Edgar S. Dunn, Jr., a research analyst for Resources for the Future, Incorporated, pointed out that information in the center would not be intelligible to the snooper as are the contents of a manila folder. Computerized data require a machine, a code book, a set of instructions, and a technician in order to be comprehended. Presumably Mr. Dunn’s thesis is that if it is difficult or expensive to gain access to and interpret the data in the center, there is little likelihood of anyone’s trying to pry; if the snooper’s cost for unearthing a unit of dirt increases sufficiently, it will become too expensive for him to try to violate the center’s integrity.

Mr. Dunn’s logic fails to take into account other factors. First, if all the information gathered about an individual is in one place, the payoff for snooping is sharply enhanced. Thus, although the cost or difficulty of gaining access may be great, the amount of dirt available once access is gained is also great. Second, there is every reason to believe that the art of electronic surveillance will continue to become more efficient and economical. Third, governmental snooping is rarely deterred by cost.

Mr. Dunn also ignores a number of special dangers posed by a computerized National Data Center. Ever since the federal government’s entry into the taxation and social welfare spheres, increasing quantities of information have been recorded. Moreover, as recording processes have become mechanized and less cumbersome, there also has been centralization and collation of information. In something akin to Parkinson’s Law, the increase in information-handling capacity has created a tendency toward more extensive manipulation and analysis of recorded data, which, in turn, has required the collection of more and more data. The creation of the Data Center with electronic storage and retrieval capacity will accelerate this pattern.

Any increase in the amount of recorded information is certain to increase the risk of errors in reporting and recording and indexing. Information distortion also will be caused by machine malfunctioning. Moreover, people working with the data in Washington or at a distance through remote terminals can misuse the information. As information accumulates, the contents of an individual’s computerized dossier will appear more and more impressive and will impart a heightened sense of reliability to the user, which, coupled with the myth of computer infallibility, will make it less likely that the user will try to verify the recorded data. This will be true despite the “softness” or “imprecision” of much of the data. Our success or failure in life ultimately may turn on what other people decide to put into our files and on the programmer’s ability, or inability, to evaluate, process, and interrelate information. The great bulk of the information likely to find its way into the center will be gathered and processed by relatively unskilled and unimaginative people who lack discrimination and sensitivity. Furthermore, a computerized file has a certain indelible quality — adversities cannot be overcome simply by the passage of time.

There are further dangers. The very existence of a National Data Center may encourage certain federal officials to engage in questionable surveillance tactics. For example, optical scanners — devices with the capacity to read a variety of type fonts or handwriting at fantastic rates of speed — could be used to monitor our mail. By linking scanners with a computer system, the information drawn in by the scanner would be converted into machine-readable form and transferred into the subject’s file in the National Data Center.

Then, with sophisticated programming, the dossiers of all of the surveillance subject’s correspondents could be produced at the touch of a button, and an appropriate entry — perhaps “associates with known criminals” — could be added to all of them. As a result, someone who simply exchanges Christmas cards with a person whose mail is being monitored might find himself under surveillance or might be turned down when he applies for a job with the government or requests a government grant or applies for some other governmental benefit. An untested, impersonal, and erroneous computer entry such as “associates with known criminals” has marked him, and he is helpless to rectify the situation. Indeed, it is likely that he would not even be aware that the entry existed.

These tactics, as well as the possibility of coupling wiretapping and computer processing, undoubtedly will be extremely attractive to overzealous law-enforcement officers. Similarly, the ability to transfer into the National Data Center quantities of information maintained in nonfederal files — credit ratings, educational information from schools and universities, local and state tax information, and medical records — will enable governmental snoopers to obtain data that they have no authority to secure on their own.

The compilation of information by unskilled personnel also creates serious problems of accuracy. It is not simply a matter of the truth or falsity of what is recorded. Information can be entirely accurate and sufficient in one context and wholly incomplete and misleading in another. For example, the bare statement of an individual’s marital status has entirely different connotations to the selective service, a credit bureau, the Internal Revenue Service, and the social security administration. Consider a computer entry of “divorced” and the different embellishment that would be necessary in each of those contexts to portray an accurate picture of an individual’s situation.

The question of context is most graphically illustrated by the unexplained and incomplete arrest record. It is unlikely that a citizen whose file contains an entry “arrested, 6/1/42; convicted felony, 1/6/43; three years, federal penitentiary” would be given federal employment or be accorded the governmental courtesies accorded other citizens. Yet the subject may simply have been a conscientious objector. And what about the entry “arrested, disorderly conduct; sentenced six months Gotham City jail.” Without further explanation, who – would know that the person involved was a civil rights demonstrator whose conviction was reversed on appeal?

Finally, the risks to privacy created by a National Data Center lie not only in the misuse of the system by those who desire to injure others or who can obtain some personal advantage by doing so. There also is a legitimate concern that government employees in routine clerical positions will have the capacity to inflict damage through negligence, sloppiness, thoughtlessness, or sheer stupidity, by unintentionally rendering a record inaccurate, or losing it, or disseminating its contents to people not authorized to see it.

To ensure freedom from governmental intrusion, Congress must legislate reasonably precise standards regarding the information that can be recorded in the National Data Center. Certain types of information should not be recorded even if it is technically feasible to do so and a legitimate administrative objective exists. For example, it has long been “feasible,” and from some vantage points “desirable,” to require citizens to carry and display passports when traveling in this country, or to require universal fingerprinting. But we have not done so because these encroachments on our liberties are deemed inconsistent with the philosophical fiber of our society. Likewise, highly personal information, especially medical and psychiatric information, should not be permitted in the center unless human life depends upon recording it.

Legislation sharply limiting the information which federal agencies and officials can extract from private citizens is absolutely essential. To reinforce these limitations, the statute creating the Data Center should prohibit recording any information collected without specific congressional authorization. Until the quality of the center’s operations and the nature of its impact on individual privacy can be better perceived, the center’s activities should be restricted to the preservation of factual data.

The necessary procedural and technical safeguards seem to fall into two categories: those needed to guarantee the accuracy and integrity of the stored information, and those needed to control its dissemination.

To ensure the accuracy of the center’s files, an individual should have an opportunity to correct errors in information concerning him. Perhaps a print-out of his computer file should be sent to him once a year. Admittedly, this process would be expensive; some agencies will argue that the value of certain information will be lost if it is known that the government has it; and there might be squabbles between citizens and the Data Center concerning the accuracy of the file that would entail costly administrative proceedings. Nonetheless, the right of a citizen to be protected against governmental dissemination of misinformation is so important that we must be willing to pay some price to preserve it. Instead of an annual mailing, citizens could be given access to their files on request, perhaps through a network of remote computer terminals situated in government buildings throughout the country. What is necessary is a procedure for periodically determining when data are outmoded or should be removed from the file.

Turning to the question of access, the center’s computer hardware and software must be designed to limit access to the information. A medical history given to a government doctor in connection with an application for veteran’s benefits should not be available to federal employees not legitimately involved in processing the application. One solution may be to store information according to its sensitivity or its accessibility, or both. Then, governmental officials can be assigned access keys that will let them reach only those portions of the center’s files that are relevant to their particular governmental function.

Everyone directing an inquiry to the center or seeking to deposit information in it should be required to identify himself. Finger- or voice-prints ultimately may be the best form of identification. As snooping techniques become more sophisticated, systems may even be needed to counter the possibility of forgery or duplication; perhaps an answerback system or a combination of finger- and voice-prints will be necessary. In addition, the center should be equipped with protector files to record the identity of inquirers, and these files should be audited to unearth misuse of the system. It probably will also be necessary to audit the programs controlling the manipulation of the files and access to the system to make sure that no one has inserted a secret “door” or a password permitting entry to the data by unauthorized personnel. It is frightening to realize that at present there apparently is no foolproof way to prevent occasional “monitor intrusion” in large data-processing systems. Additional protection against these risks can be achieved by exercising great care in selecting programming personnel.

In the future, sophisticated connections between the center and federal offices throughout the country and between the federal center and numerous state, local, and private centers probably will exist. As a result, information will move into and out of the center over substantial distances by telephone lines or microwave relays. The center’s “network” character will require information to be protected against wiretapping and other forms of electronic eavesdropping. Transmission in the clear undoubtedly will have to be proscribed, and data in machine-readable form will have to be scrambled or further encoded so that they can be rendered intelligible only by a decoding process built into the system’s authorized terminals. Although it may not be worth the effort or expense to develop completely breakproof codes, sufficient scrambling or coding to make it expensive for an eavesdropper to intercept the center’s transmission will be necessary. If information in the center is arranged according to sensitivity or accessibility, the most efficient procedure may be to use codes of different degrees of complexity.

At a minimum, congressional action is necessary to establish the appropriate balance between the needs of the national government in accumulating, processing, and disseminating information and the right of individual privacy. This legislation must be reinforced by statutory civil remedies and penal sanctions.

Testimony before Congress concerning the intrusive activities of the Post Office, the Internal Revenue Service, and the Immigration and Naturalization Service gives us cause to balk at delegating authority over the Data Center to any of the agencies that have a stake in the content of data collected by the government. Some federal personnel are already involved in mail-cover operations, electronic bugging, wiretapping, and other invasions of privacy, and undoubtedly they would try to crack the security of any Data Center that maintains information on an individual basis. Thus it would be folly to leave the center in the hands of any agency whose employees are known to engage in antiprivacy activities. Similarly, the center must be kept away from government officials who are likely to become so entranced with operating sophisticated machinery and manipulating large masses of data that they will not respect an individual’s right to privacy.

The conclusion seems inescapable: control over the center must be lodged outside existing channels. A new, completely independent agency, bureau, or office should be established — perhaps as an adjunct to the Census Bureau or the National Archives — to formulate policy under whatever legislative guidelines are enacted to ensure the privacy of all citizens. The organization would operate the center, regulate the nature of the information that can be recorded and stored, ensure its accuracy, and protect the center against breaches of security.

The new agency’s ability to avoid becoming a captive of the governmental units using the center would be crucial. Perhaps with proper staffing and well-delineated lines of authority to Congress or the President, the center could achieve the degree of independence needed to protect individuals against governmental or private misuse of information in the center. At the other end of the spectrum, the center cannot become an island unto itself, populated by technocrats whose conduct is shielded by the alleged omniscience of the machines they manage and who are neither responsive nor responsible to anyone.

The proposed agency should be established before the center is planned. To date, there has been virtually no meaningful exchange among scientists, technicians, legal experts, and government people on the implications of the center. The center also might consider supporting some of the planned nonfederal computer networks, such as the Inter-university Communications Council’s (EDUCOM) plan to link the major universities together, using them as models or operating laboratories to test procedures and hardware for the federal center.

To satisfy those who argue for the early establishment of a purely statistical Data Center, it might be possible for the proposed agency to set up a modest center in which information which does not invade privacy could be made available to government officials, educators, and private researchers. Other federal agencies might establish satellite centers that would contain information too sensitive to be recorded in the statistical center during that institution’s formative period, although the data in satellites ultimately might be transferred to the national center.

The threat to individual privacy posed by the computer comes from the private sector as well as the proposed federal Data Center. Each year state and local governments, educational institutions, trade associations, and industrial firms establish data centers that collect and store quantities of information about individuals. Because the high cost of computer installation forces many organizations to operate on a time-share basis, the nonfederal centers pose a special danger to privacy. Without effective screening and built-in security devices, one participant, accidentally or deliberately, may invade and extract or alter the computer files of another participant. Moreover, because many time-share systems operate over large geographic areas, their transmissions will be vulnerable to tapping or malicious destruction unless they are scrambled or encoded. Right now, a mailing list containing 150 to 170 million names, accompanied by addresses and financial data, is being compiled. The list is so structured that it yields sublists of people in various vocational and avocational categories. Where the necessary in- formation to produce this monster came from and how one gets off the list are mysteries.

Currently there are more than two thousand independent credit bureaus in the United States, many of whose files are being computerized. Eventually, these bureaus will make a network of their computers, creating a ready source of detailed information about an individual’s finances. The accuracy of these records will become increasingly crucial; an honest dispute between a consumer and a retailer over a bill may produce an unexplained and unexpungeable “no pay” evaluation in the computer and result in considerable damage to the buyer’s credit rating.

In testimony before the House subcommittee, the director of the New York State Identification and Intelligence System described a data bank containing files on “known” criminals that ultimately will contain millions of entries. He expressed a willingness to exchange information with police officials in other states as soon as the state systems could be meshed. If this system is tied into the National Data Center or New York’s Bureau of Motor Vehicles or welfare agencies, it would permit someone to direct an inquiry to the computer file of “known” criminals, find an entry under the name of his subject, and rely on that entry to the subject’s detriment without attempting to verify its accuracy.

Congress should consider the need for legislation setting standards to be met by nonfederal computer organizations in providing information about private persons and restraining federal officers from access to certain types of information from nonfederal data centers. Nonfederal systems should be required to install some protective devices and procedures. This is not to suggest that Congress should necessarily impose the same controls on nonfederal systems that it may choose to impose on the federal center. But a protector file to record the source of inquiries and modest encoding would probably prevent wide-scale abuse, although security needs vary from system to system. Since security may be facilitated by installing protective devices in the computer hardware itself, the possible need for regulation of certain aspects of computer manufacturing also should be taken into account.

The possibility of regulating transmission between federal and nonfederal centers and the interaction among nonfederal centers also should be considered. The specter of a federal agency, such as the Veterans’ Administration, reaching into a citizen’s medical file in a data center operated by a network of hospitals to augment the federal center’s file is a disturbing one. Regulating the security of the transmissions and imposing sanctions for noncompliance and eavesdropping would preserve individual privacy against governmental snooping and bureaucratic spinelessness or perfidy.

21 comments
  1. Ordinary Guy says: April 1, 200812:51 pm

    This is an amazing find and a great article. I place a blog post on my blog pointing back here. I recently wrote an article about PCI and RFID tag tracking on my blog (http://ramblingordinary…) and find our failure to pay attention to this prediction 41 years later both frightening and amusing at the same time.

    A great article.

  2. Dane says: April 1, 20081:44 pm

    OOPS! This isn’t Arthur (A.) Miller the famous author — this Arthur R. Miller is a legal guru. Notice how the cover has “lawyer’s critique.” Either way, it’s a fantastic find!!

  3. Not telling says: April 1, 20081:46 pm

    Great read. Still very much applicable today.

  4. zippyspincycle says: April 1, 20082:31 pm

    Terrific find–will share this with my students. But why, oh why, did you not include Bob & Ray’s take on the topic (p 58 of that issue)? (OK, fair use and all that…)

  5. Filepromptdotcom says: April 1, 20082:53 pm

    Nice piece of history, and still true

    http://www.fileprompt.c…

  6. Charlie says: April 1, 20082:57 pm

    zippy: Just haven’t gotten to it, I will soon.

  7. RB says: April 1, 20083:14 pm

    Amazing article that gets one thing wrong – the danger is even greater than Miller predicted.

  8. spootmonkey says: April 1, 20084:33 pm

    Great find and a amzing article… Could I repost it with link on you?

  9. nlpnt says: April 1, 20086:20 pm

    Scary.
    Perhaps the biggest change is that day-to-day exposure to PCs has givien a well-deserved beating to the notion of The Computer as omniscient and infallible!
    I had seen on “Countdown” just this night that the government has been giving credit bureaus access to the terror watch list…

    http://www.msnbc.msn.co…

  10. Tim says: April 2, 20086:57 am

    Taking distrust and paranoia to unprecedented levels in 1967. Nice.

  11. Charlie says: April 2, 20088:55 am

    Tim » You’re not paranoid if they really are out to get you.

  12. Warren Keiner says: April 2, 20089:19 am

    Coincidentally, the other Arthur Miller, the author of the Crucible, also has important roots
    to The University of Michigan:

    http://en.wikipedia.org…

  13. Benzene says: April 2, 200810:55 am

    The best part of this article is that he correctly assumes that people don’t change along with the technology. Every other “inventions of tomorrow” article seems to think we’ll all melt down our guns to make computer chips and flying cars and start an automated utopia. Miller realizes that people will continue to be jerks and correctly assumes that a national network might require regulation and security.

    ARPAnet was built just a couple years after he wrote this. In a way, he got this in just in time.

  14. Albatross says: April 3, 20087:41 am

    “Arthur Miller” is apparently a pseudonym for Cassandra ( http://en.wikipedia.org… )

  15. Warren says: April 3, 20088:08 am

    Cassandra. Very good allegory :) Thanks!

  16. Toronto says: April 8, 20086:55 am

    So, can we get a link to the Bob and Ray article, too?

  17. /pd says: April 9, 200811:41 am

    This one brillent find .. thank you for sharing !!

  18. Barbara R says: April 16, 20082:39 am

    There was a series of Reith Lectures on the BBC years ago, which focussed on the proliferation of data, both “good” and “bad” and it’s propensity to clog everything up, since the “bad” data was indestinguishable from the “good” many times. The arguement, put crudely, was that in an oral society ideas that proved useless tended to get forgotten and good ideas were passed around, providing an evolution of ideas. Once information was permanently recorded the rubbish would mount up and be almost impossible to get rid of. Just check out the Internet to verify this.
    I used to wory a lot about this, but you know what? Human ingenuity usually prevails and good ideas are still passed around, albeit often informally. Just make sure your friends are not too gullible and exchange information with them freely and it will probably all work out ok.

  19. Hello World says: May 6, 20089:28 pm

    nice post my main hombre man supreme pimp ya

  20. Mike says: July 12, 20084:21 pm

    Our cell phones, ez-pass and other devices, track where we are, every email and comment is saved, our credit card purchases are tracked, our grocery stores keep track of how much milk we buy, but I wouldn’t worry too much. I mean they are doing it for our own good… right?

  21. Marc says: July 21, 20088:57 am

    zippyspincycle, Toronto: Here’s apparently a copy of “Boby & Ray’s take on it”:

    http://limulus.net/blog…

    (otherwise try searching for the title “The day the computers got Waldon Ashenfelter”)

Submit comment

You must be logged in to post a comment.