Bibliogr@phy, In development
Texts, Books, Trade Journals & Papers, International Government Publications, Unpublished Reports.
This Bibliography is a good place to start if you have no knowledge about technology abuse. All of these publications are published by journals, magazines, or authors who probably have more recent writings! Evidence what may be happening to you is not in your head, and may be beyond your control. This page is against fascism. State controlled and heavily censored information societies can be sustained because of ignorance and complacency. Demand more. Joan Lunden, a network fascist, is highly paid for little to no skills because she is willing to keep you in the dark. Bloated egos and big salaries are at times signs of persons who participate in organized blacklisting. They along with the local newspaper, whose editor takes a cut of the profits, will not risk their position to tell you the truth. This is an opinion of this writer/filmmaker. It is based on several year civil court struggle alone against alleged industry wide communications blacklisting, in which I believe I succeeded, and hundreds of hours of research worldwide.
INFOWAR, an actual threat that computer and satellite technologies as a form of warfare are growing in importance over nuclear technology. Importantly, this September 1996 there was a conference in Virginia sponsored by several major corporations, IBM included. This Symposium was presented by international intelligence and U.S. military intelligence, as well as judges and others familiar with computer security or in this instance “unsecure computer” issues. It presented papers to study and prepare for “InfoWar”. Are you ready for an InfoWar?
Books and Texts
United Nations, Human Rights: A Compilation of International Instruments, Volume I, Second Part (May 1993) This is the first publication of the “Guidelines for the Regulation of Computerized Personal Data Files pages 536-539.
Symposium, Blackmail, 141, University of Pennsylvania Law Review, May 1993 (entire issue).
The Slumbering Sentinels, C. Weeramantry, Penguin Books 1983 (Excerpted on this website).
State Responsibility and the Direct Broadcast Satellite by Marika Natasha Taishoff. A publication of the Graduate Institute of International Studies in Geneva, Switzerland, 1985-86. This is a very technical description of treaties and outer space law. It is an excellent source of how communications systems work today. That knowledge alone can give you a greater understanding of the vast array of technology abuses possible and probable, and the legal responsibility of the “state”. The term “state” in this article primarily refers to a country in international documents.
Magazines, Trade Journals & Pamphlets
High Technology Law Journal has been on occasion to technology & constitutional rights what the Police MisConduct Manual is to criminal law & constitutional rights, an often fair source of information on new technologies and constitutional rights. It’s a good start for research.
Information Technology and Dataveillance by Roger A. Clarke in the Trade Journal, Communications of the A.C.M. (Association of Computing Machinery). May 1988 Pages 498 – 512. (78 footnotes that are themselves good reading). On page 505 of this article Mr. Clarke publishes a chart “Figure 3. Real and Potential Dangers of Dataveillance...Witch hunts…blacklisting…Denial of due process” . The article is premised on the fact “Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.”
Communications of the ACM over the past few years had several good articles including “Inside Risks” a regular column that is an archive of cases on risks arising in computer-related systems. They have also written an old article attacking the position of the FBI relative to their expanding blanket requests for telephone surveillance. The ACM is an association of computer professionals whose members are experts in all areas of computer machinery. Also you may see this publication by Peter Neuman who writes that same column for the A.C.M., The Risks Digest, Forum on Risks to the Public in Computers & Related Systems (you do have to look to find an interesting item!)
The New Surveillance by Gary T. Marx, Technology Review (May-June1985) I’ll be watching you: Reflections on the new surveillance by Gary T. Marx, Dissent (Winter 1985). Marx was a professor of sociology at M.I.T. when he wrote an unpublished paper which these two articles were drawn from. The unpublised paper was prepared for meetings on George Orwell held by the Council of Europe and The American Sociological Association. Excerpted: “The gigantic data banks made possible by computers raise important surveillance questions…Some of fiction’s imaginary surveillance technology, like the two-way television that George Orwell described, is now reality…The highly secretive National Security Agency-using 2,000 staffed interception posts throughout the world, and satellites, air-craft, and ships–monitors all electronic communications from and to the United States.” There may be more recent articles by this writer worth reading.
Privacy and Computers, Texas Law Review, Article 1987. Particularly at pages 1429-1430 where this very detailed law review article states “The processing of information in itself also does not particularly violate individual privacy…The dissemination, the transfer of personal information between business entities, endangers the individual’s privacy the most…The dissemination of personal information creates precisely the conditions that lead to violation of personal autonomy, selfhood, and the ability to relate with others. It fosters a sense of outrage in the individual, it makes it impossible to change roles when confronted with new people, and it makes it impossible for an individual to change her own definition of self” Writers aside: When compared to earlier definitions of the goals of “blacklisting”, isolation techniques impairing the “ability to relate with others” this fits within that goal. (See the Foley excerpt).
Technology & Terrorism: Privatizing Public Violence, by Stephen Sloan, IEEE Technology and Society Magazine 8 (Summer 1991) (Paper presented at Conference on State Organized Terror, East Lansing, MI, Nov. 2-7, 1988 by a Political Science professor). The IEEE is a professional society of Electrical Engineers. Their writings are varied and their publications are many and the library of the International Telecommunications Union (regulating satellite space worldwide) has all their publications. Sloan writes “[R]epression…may threaten democratic states who might unwittingly move down the road to repression as a result of the continuing and accelerating revolution in science and technology.”
U.S. Government & International Publications, Conventions and Advisory Statements
Computer-Based National Information Systems: Technology and Public Policy Issues. A publication of the U.S. Congressional Office of Technology Assessment. September 1981. The O.T.A., although not a candid source, does commission studies that are helpful in identifying 1990’s blacklisting. Consider on pages 118-119 of this publication on pages headed “”Transborder Data Flow” and “InformationGap” the study states “Some observers have suggested that the advent of information technology will widen the gulf between the haves and the have-nots in society. This view is based on relative differences in what might be called ‘information literacy,’ the ability to use information technology to cope with everyday life”...Individuals who are technologically illiterate may be affected in several ways:…-they may be at serious disadvantage in legal proceedings, both criminal and civil;”
International Cooperation and Competition in Civilian Space Activites, Published in July 1985 this book is a 500 page look at International Satellite Communications and touches on issues such as, what corporations own what, and remote sensing from space in light of the “Land Remote-Sensing Commercialization Act of 1984”. That act in short allowed private and commercial use of technology for land remote sensing. This technology is being used to access the natural resources of a country from space. It has already been used to discover archeological sites and underground cities. The potential for harm lies in the discovery being used for commercial purposes potentially without the knowledge of the land owner. Mining for resources through remote sensing mapping and for schools of fish has been documented in detail in specific United Nations Committees about Remote Sensing.
The U.S. Office of Technology Assessment has a catalog that is free to you. They have other publications expressing concerns about technology outpacing the law , with rather censored examples. Their documents can be found at Telnet: otabbs.ota.gov, login: public and password: public or O.T.A. Electronic BBS and at O.T.A. Archives
The Office of Technology Assessment was formed from the Technology Assessment Act of Oct. 13, 1972, Public Law No. 92-484, 1972 U.S. Code Cong. & Administrative news (86 Stat.) 3568, 3573. That background report states: “The reason behind H.R. 10243 are rooted in the deep seated environmental, social and economic problems which comprise the great bulk of the serious difficulties confronting the Nation today…Congress has difficulty in comprehensively envisioning all of the potential influences of technology...” Writers aside: no kidding?
Regulating the use of personal data in the police sector. Recommendaiton Number R (87) 15 adopted by the Committee of Ministers of the Council of Europe on 17 September 1987 and Explanatory memorandum. Published in Strasbourg in 1988. This was given to me personally by someone working at the United Nations Center for Human Rights in Geneva, Switzerland. This document is a rarity as it recommends supervision on “Publicity, right of access to police files and right of rectification and right of appeal.” This document may be found now through the European Union.
United Nations, Commission on Human Rights, Committee on Human Rights and scientific and technological developments.
The following are a collection of minutes from Human Rights Commission meetings that were the background for a United Nations Resolution entitled “Guidelines for the regulation of computerized personal data filed”. It is a project of the Commission on Human Rights, Sub-Commission on Prevention of Discrimination and Protection of Minorities. The Committee is entitled “Human Rights and Scientific and Technological Developments”. It is important to note that this committee also at the same time was discussing a second and relevant issue, persons detained in mental institutes on non-medical grounds. That brought about a second resolution from this Commission on guidelines for detention of persons on the grounds of mental illness.
Mr. SCHIFTER (United States of America) (U.N. Doc. E/CN.4/1982/SR.30 page 4) “said that his delegation joined the consensus on draft resolution E/CN.4/1982/L.14 because the protection of persons detained on grounds of mental health raised problems in all countries, including his own…” Note he chastised the work of this commission because it passed over in “silence: first, the need for all States to take appropriate measures to prevent the possibility of infringement of the rights of individuals and groups through misuse of scientific and technological developments, in particular with regard to respect for privacy and the protection of the human personality and its physical and intellectual integrity; secondly, the need for States to take every necessary measure to ensure that the utilization of scientific and technological achievements promoted the fullest realization of human rights and fundamental freedoms.”
Sir Anthony Williams (United Kindom) (U.N. Doc. E/CN.4/1986/SR.21, page 4, paragraphs 14&) “17. Another issue of particular concern to his Government was the abuse of psychiatry and of medical treatment with respect to persons detained on non-medical grounds…The Sub- Commission report on the subject (E/CN.4/Sub.2/1983/17), which left no doubt about the seriousness of the issue, reached some horrifying conclusions regarding the practices employed. It was imperative to establish without delay guidelines which would deter further occurrence of such practices…”
Mr. Quinn (Australia) (U.N. Doc. E/CN.4/1986/SR.21, page 16, paragraph 87&) “…There had also been a tendency to blame scientific and technological developments [by the debates at the U.N. Commission] themselves for human-rights abuses, whereas they stemmed from decisions as to the application of such developments…Computer technology developments could provide enormous benefits, for example in census taking, but the individual must be protected from unnecessary interference with his privacy or the use of false information to his detriment…”
Mr. Klenner (German Democratic Republic) (U.N. Doc. E/CN.4/1986/SR.21 page 7) …”Technological progress did not automatically imply human rights progress, however: scientific discoveries could be used for good purposes or just as easily for bad one. The enemy of black South Africans was not the computer, but the apartheid politicians and financiers who perfected their institutionalized racism with the help of such devices.” On technology and the arms race “…’Star wars’ was not a means of creating heaven on earth, but it could result in hell on earth.”
Mr. Mezzalama (Observer for Italy) (U.N. Doc. E/CN.4/1986/SR.21 page 8, paragraph 42)…The cinema, television, tape recorders, & listening devices could become ways and means of intruding upon the privacy of individuals and violating their psychic integrity, freedom and intellectual autonomy. Similarly, the indiscriminate use of computers and other devices within the context of automation and cybernetics could compromise human individuality…44. The Sub-Commission’s work to date outlines the guidelines and principles required to establish a more balanced relationship between technological development and the protection of human rights. Guidelines such as those on the protection of persons detained on the grounds of mental ill-health (E/CN.4/Sub.2/1985/20) and in the field of computerized personal files (E/CN.4/Sub.2/ 1983/18) represented clearly-defined and well adapted material upon which States could draw.
Ms. Dourtcheva (Women’s International Democratic Federation – WIDF) (U.N. Doc. E/CN.4/1986/SR.21/ page 12, paragraph 65) “WIDF was convinced that the social effects of scientific and technological developments depended on the social and economic system of the individual country… the introduction of new technologies had been used as a pretext for the further exclusion of women from the labour market, while the persistent infringement of their right to equal pay for equal work had been aggravated by the violation of their right to work.”
Mr. Mullor (Observer for the Holy See) (U.N. Doc. E/CN.4/1986/SR.23, page 7, paragraph 25) “…Secondly, the contention that priority should be given either to civil and political rights or to economic and social rights was a false and meaningless alternative. In actual fact, all human rights co-existed and they advanced or regressed together. Justice was a climate, and not an occasional act. The right to work – to cite one example – could not be fully exercised in the absence of the right to free choice of employment; work without freedom was mere slavery.” Writer’s aside: The “Holy See” is an arm of the Catholic Pope, the Vatican being a “state”.
Mr. Rajkumar (Pax Romana) (U.N. Doc. E/CN.4/1983/SR.31 page 6, paragraph 25) “As to information and communication technologies the accumulation and selective use of information could lead to an accumulation of power, in both the private and public domains. The study on guidelines in the field of computerized personal files was still awaited, bu the Commission should be aware of the use of electronic mass media, including the various types of satellite already in operation, and the many forms of surveillance equipment now available, including some for individual behavioral control. The chief dangers were centralization, limited access and remoteness…” Writer’s Aside: PAX ROMANA is an intellectual Catholic Organization of sorts.
Mr. Konstantinov (Bulgaria) (U.N. Doc E/CN.4/1983/SR.50/Add.1, page 8) “…one of the negative effects of scientific and technological progress was the ever-increasing unemployment in some countries. It was well known in which countries that occurred and what was at the origin or the violation of the right to work. Misuses of science and technology was possible only when the results achieved in that field were employed for the benefit of selfish private interests. Consequently the effects of scientific and technological developments on the right to work should be studied.”
Militarization in the Information Age by Cees J. Hamelink. Background Paper, commission of the churches on internatonal affairs. This was published as paper 1986/2 in 1986, but according to the World Council of Churches it’s no longer in publication. It is only 48 pages long covering issues such as Psychological Warfare. That section includes a definition of phsychological warfare to include “Disinformation..the fabrication and distortion of information for the purpose of legitimizing one’s own operations, de-legitimizing the enemy’s operations and misleading the enemy. Disinformation can be directed at domestic and/or foreign audiences.” The writer goes on to write about journalists allegedly working for the Central Intelligence Agency.
The World Council of Churches may send you a photocopy. The address of their central office is: 150 route de Ferney, 1211 Geneva 20, Switzerland. They have a liaison office in New York at the U.N. This was only a pamplet but I thought it was significant because of the religious source.
. Compilation by Pamela Curry. 0riginal expression copyright protected under the Berne Convention. Humorous Aside: It would not be advisable to slavishly copy this list for a school paper because if you get kicked out of school and your case ends up in the supreme court this author’s work may be recognized. Well, at least by the clerks who told her she could fax them a paper…only persons in Federal prisons can fax a paper…well I wasn’t in federal prison but I am notorious for a few things there. Blue Ribbon Campaign…Most of this was cited in my Briefs to the U