-Caveat Lector-

  http://washingtonpost.com/wp-dyn/washtech/techweek/A26622-2001May14.html

   Wednesday, May 16, 2001; Page G10


        Night and Day, Computers Collect Information

        By Robert O'Harrow Jr.

        Washington Post Staff Writer


  The data collection begins in the morning, when Americans first sign onto
  the World Wide Web to check the weather or buy a book.

  It continues during their commute, as cameras and electronic toll booths
  chronicle their drive to the office. Someone may be monitoring workers at
  their jobs, recording what they buy at the grocery store, noting their
  whereabouts while they use their cell phones and scrutinizing their drug
  prescriptions.

  From morning until night, the mundane details of life are being tracked,
  recorded and analyzed. Cheaper computing power and a vastly expanding
  Internet have enabled businesses, government agencies and many others to
  watch what was once unwatchable and glean meaning and profit from the
  ephemera of daily activity.

  Data giants have created dossiers containing names, addresses, incomes,
  purchases and other details about 200 million American adults -- and then
  flashed them to customers on demand. Profile specialists make models of
  what consumers are likely to do or buy. All the while, information
  brokers look for data to sell, with rogue operators sometimes using
  trickery to collect details about bank accounts, stock portfolios,
  telephone calls and other confidential information.

  Many Americans believe that data collection has already gone too far. But
  information experts say this is only the beginning of an era in which
  more people and institutions will seek access to personal details not
  available in the past.

  "The tracking technologies we're talking about now are ubiquitous," said
  Deirdre Mulligan, director of the Samuelson Law, Technology and Public
  Policy Clinic at the University of California at Berkeley. "It has become
  so cheap and so easy."

  The benefits of the electronic aggregation of personal details are
  considerable -- and often made possible by individuals who actively share
  data in exchange for discounts, conveniences and the like. Growing files
  of medical information often help doctors and hospitals provide better
  treatment. Commuter information gleaned from toll booths can help
  regulate traffic flow and plan highways. Sales data can help stores
  control their inventory and keep prices down and profits up. Many
  companies use their growing stores of personal information to fight
  fraud.

  The data that grocery stores collect about shopping habits allow the
  stores to offer discounts and special promotions to keep profitable
  customers coming back. In addition, a growing number of companies,
  including hotel chains, use data collected about visits to personalize
  their services.

  "Information allows marketers to try and bring the personal touch back
  in," said Jerry Cerasale, senior vice president for government affairs at
  the Direct Marketing Association. "Part of the vibrant economy is that
  Americans have all the choices. If we restricted that flow of
  information, it would reduce those choices."

  At the same time, citizens and policymakers fear the erosion of privacy,
  surveys show. They worry that companies will use data to manipulate
  customers or share data without permission. One tangible threat of the
  proliferation of personal data is identity theft by fraud artists, who
  take on the persona of an individual and then run up bills in that name.

  This fraud has been fueled by easy access to Social Security numbers and
  other personal data. In a new report, federal regulators estimate that
  more than 500,000 people are victims of identity theft each year. A
  recent victim was golfing phenomenon Tiger Woods, surely one of the most
  recognizable figures in America. Using Woods's Social Security number,
  Anthony Taylor of Sacramento received a driver's license and credit cards
  in Woods's name and was convicted of making $17,000 in fraudulent
  purchases.

  Privacy advocates also worry about the government's use of personal
  information. The FBI, for instance, operates a computer system called
  Carnivore that, under a court order, can monitor the Internet for e-mail
  sent by suspects or others. To help track down parents who owe child
  support, the federal Administration for Children and Families has created
  a computerized data-monitoring system that includes all individuals with
  new jobs and the names, addresses, Social Security numbers, bank accounts
  and wages of working adults throughout the United States.

  One consequence of all this is that Congress has sharpened its focus on
  the privacy issue, with members introducing dozens of bills to regulate
  the flow of data. In recent years, Congress has approved restrictions on
  the use of driver records, financial data and information about children
  surfing the World Wide Web. The Bush administration has pledged to
  implement new medical privacy regulations approved by the Clinton
  administration, albeit with changes.

  "A lot of these things, looked at in isolation, may not seem provocative
  or invasive," said Stephen Keating, executive director of the Privacy
  Foundation, a research group in Denver. "But when you look at them
  collectively, it's clear we may be losing the ability to have a private
  life. That's why everyone feels so much unease about it."

  Surveys have shown repeatedly that nine of 10 people worry about privacy,
  with about three-quarters saying they are concerned, said Alan Westin,
  president of Privacy and American Business. Regardless of how Americans
  view the issue, however, there is no question about the increase of
  information-gathering in daily life.

  From dawn to dusk and beyond, data is collected, massaged, sold and
  scrutinized every day of the year.

  When people log onto their computers and visit their favorite Web sites,
  a computer is almost certainly watching. That's because most Web sites
  use "cookies," little strings of numbers and symbols that enable the site
  to track online peregrinations. Companies such as Engage Inc., an online
  advertising and marketing specialist, use cookies to create detailed
  profiles of what the people using a particular computer see and do at
  thousands of Web sites. The information can be used to target ads so that
  someone whose Web habits indicated he was outdoors-oriented and affluent
  might get personalized ads for, say, high-end sport-utility vehicles.

  Most online companies post privacy policies, but making sense of them can
  be taxing. Sometimes the policies simply note that a company has no plans
  to take responsibility for how the information is used.

  Driving used to be virtually anonymous unless the police handed out a
  ticket for speeding or a commuter saw a friend along the road. Now more
  than 7.5 million Americans have traded away information about their
  whereabouts for the convenience and efficiency of electronic tolls like
  those used on the Greenway in Loudoun County and on highways and bridges
  across the country.

  If drivers have a transponder in their car, the automatic toll systems
  record when they entered a stretch of highway and when they left. This
  information is used for billing. It can sometimes be reviewed by law
  enforcement authorities. In some cases, travel records can be subpoenaed
  for civil lawsuits to establish whereabouts.

  Monitoring has also increased in the workplace. The proportion of major
  firms that check employee e-mail, monitor telephone calls or use cameras
  to record worker activity has increased from about a third in 1997 to
  more than three-quarters this year, according to surveys by the American
  Management Association. Some of the policies are aimed at maintaining
  productivity, others at preventing illegal or improper use of company
  property.

  An array of companies, including Dow Chemical Co. and the New York Times
  Co., have fired workers recently for violating company e-mail policies.
  In 1999, the New York Times fired more than 20 employees for e-mailing
  "inappropriate and offensive" material, such as sex jokes and sexually
  explicit materials. Dow Chemical fired about 50 employees for improperly
  using e-mail and suspended 200 for sending sexually explicit or violent
  images using the company's communications system.

  In the course of a day, opportunities arise for data collection if
  employees run errands on their lunch breaks, such as filling
  prescriptions. When people use prescription cards provided by health
  plans, the pharmacy flashes information about the prescription to a
  pharmacy benefit manager, which tracks the drugs that are being bought.

  The pharmacy benefit manager could urge the pharmacist -- instantly -- to
  ask patients to switch to a cheaper drug, and if the pharmacist is
  successful in getting the customer to agree, the pharmacist might be
  rewarded. In addition, some benefit managers send representatives
  directly to doctors to suggest different drug therapies for particular
  patients.

  On the way home from work, a typical family might use a shopper card to
  receive a discount on groceries. The grocery store records every purchase
  made and adds those details to a database file. The grocery's marketers
  use the database to track eating and spending habits, and to make
  personalized offers to customers.

  In some cases, law enforcement authorities subpoena grocery records when
  they believe it can help an investigation. That's what happened during a
  Drug Enforcement Administration investigation in Arizona not long ago.

  There is no break at home either. Computers, hand-held computing devices,
  digital television . . . these devices and a fast-growing number of
  others all enable someone to track personal activities.

  The act of calling a toll-free 800-number in response to a TV commercial
  can lead to the creation of a file about the caller. When drug companies
  urge consumers to call, they are sometimes building files of people with
  particular ailments. Withholding a name during the call is no guarantee
  they don't know who the caller is. Armed with a telephone number (which
  shows up on a computer screen as the call comes in) a company called
  Acxiom can zip name, address and details about a household to an operator
  while the caller waits on the line.

  "Every device that you have that is connected to some other electronic
  device generates some transactional record," said James Dempsey, deputy
  director of the Center for Democracy and Technology, a nonprofit advocacy
  group in the District. "Every time you reach for your wallet, unless you
  pay in cash, you're generating a record."

  While Americans sleep, data warehousers, marketers, financial services
  companies and insurers are constantly buying, sharing and parsing data
  about family income, spending habits, purchases, house value, children
  and so forth. Their stated aim is to improve their marketing efforts and
  to personalize services. They also want to identify the most profitable
  customers -- and stop paying valuable attention to the rest.

  "This stuff is just beginning," said Joseph Turow, a professor and
  privacy specialist at the University of Pennsylvania's Annenberg School
  for Communication. "Just because we haven't heard of disastrous invasions
  of privacy as the result of the collection of information, [we shouldn't
  say] it won't happen. We can safely assume there will be major abuses."

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to