+ Page 82 + ---------------------------------------------------------------------------- ####### ######## ######## ########### ### ### ## ### ## # ### # Interpersonal Computing and ### ### ## ### ## ### Technology: ### ### ## ### ### An Electronic Journal for ### ######## ### ### the 21st Century ### ### ### ### ### ### ### ## ### ISSN: 1064-4326 ### ### ### ## ### July, 1994 ####### ### ######## ### Volume 2, Number 3, pp. 82-98 --------------------------------------------------------------------------- Published by the Center for Teaching and Technology, Academic Computer Center, Georgetown University, Washington, DC 20057 Additional support provided by the Center for Academic Computing, The Pennsylvania State University, University Park, PA 16802 This article is archived as PAUL IPCTV2N3 on LISTSERV@GUVM ---------------------------------------------------------------- TELECOMMUNICATIONS, ISOLATION, AND THE EROSION OF PRIVACY Michael J. Paul and John E. Gochenouer Barry University Miami Shores, Florida INTRODUCTION High-performance computing and high-speed networks have made it possible to link the components of information technology regardless of physical location. This web of communication is referred to as "cyberspace". Cyberspace, however, is far more than the interconnection of physical facilities for transmitting voice, data and images. It personifies telecommunication and implies that the synergy created by massive information exchange will result in an entity that will be greater than the sum of its parts. In fact, cyberspace may be the catalyst for "the greatest transformation of society and commerce since the invention of the automobile" (Stewart, 1993). + Page 83 + It is estimated that "two-thirds of U.S. workers are in information-related jobs, and the rest are in industries that rely heavily on information" (U.S. Department of Transportation, 1993). Enhanced access to information will clearly provide advantages. For example, workers can avoid wasting the time normally spent traveling to and from the workplace by "telecommuting" (i.e. "the partial or total substitution of telecommunications and/or computer technology for the daily commute to work" (Florida, 1993)). New communications technology also has the potential to dramatically impact the way we play and socialize with each other. "Imagine that you had a device that combined a telephone, a TV, a camcorder, and a personal computer. No matter where you went or what time it was, your child could see you and talk to you, you could watch a replay of your team's last game, you could browse the latest additions to the library, or you could find the best prices in town on groceries..." (The White House, 1993). Cyberspace could be a couch potato's dream come true. Even now the average adult sits for an average of 3-4 hours a day in front of a TV (Spring, 1993). As recreational and social applications of the cyberspace increase, there will be a greater temptation to extend this time of relative isolation. The cable and telephone companies certainly recognize the economic benefits from exploiting this. Shortly there will be 500 cable channels available to customers that have compatible devices and appropriate signal access. In order to effectively distribute these channels, two of the largest cable companies, TeleCommunications Inc. (TCI) and Time-Warner, have announced that they plan to install fiber cable in all neighborhoods reached by their franchises. Existing coaxial cable would then carry the requisite high-resolution, high bandwidth signals right into homes (Smith, 1993). The development of "virtual reality" and its subsequent incorporation into the cyberspace conjures up fantastic images of + Page 84 + a vicarious society. The ability to see, hear, touch, feel and smell programmed "experiences" and interactions with other persons without real physical contact will further reinforce isolation. There will be little need to venture out of the home. Ultimately, even intimate contact could be accomplished via a virtual reality hookup to the cyberspace. Maybe someday we will turn on our "cybercenter" and see an advertisement starring Karl Malden expounding "American Express Virtual Reality - Don't leave home...Ever". PROMISES FROM THE WHITE HOUSE In 1991 (then senator) Al Gore pushed the High Performance Computing Act of 1991 through Congress. It authorized $2.9 billion for the development of a National Research and Education Network (NREN) to be incorporated into an already existing communications network called Internet. As part of the scheme, the capacity of Internet is scheduled to be raised from 45 million bits per second to more than 3 billion bits per second. This is equivalent to being able to send 300 copies of "Moby Dick" across the network per second. In addition, public access to Internet is to be increased (The White House, 1993; Boucher, 1993). As Vice President, Gore has a greater ability to promote his agenda. On September 15, 1993, (upon urging from the White House) the National Telecommunications and Information Administration (NTIA) of the Department of Commerce released a document called "The National Information Infrastructure: Agenda for Action." This broad document proposes the development of a national information superhighway which will connect a "wide and ever- expanding range of equipment including cameras, scanners, key- boards, telephones, fax machines, computers, switches, compact + Page 85 + disks, video and audio tape, cable, wire, satellites, optical fiber transmission lines, microwave nets, switches, televisions, monitors, printers and much more." The language of this agenda is idealistic. It promises "immense" benefits, e.g.: "An advanced information infrastructure will enable U.S. firms to compete and win in the global economy, generating good jobs for the American people and eco- nomic growth for the nation. As importantly, the NII can transform the lives of the American people -- ameliorating the constraints of geography, disability, and economic status -- giving all Americans a fair opportunity to go as far as their talents and ambitions will take them." (The White House, 1993) The agenda projects that the information superhighway will make a significant contribution to "our most pressing economic and social challenges". These contributions affect almost all of the programs supported by the Clinton Administration, e.g.: - Streamlining the Government - Health Care - Stimulating the Economy - Creating New Jobs - Education - Globalization of the Economy - National Defense - Fighting Crime President Clinton has expressed his personal commitment to the principles of the NII. In a speech at the American University Centennial Celebration, Clinton contended: "...information has become global and has become king of the global economy. In earlier history, wealth was measured in land, gold, in oil, in machines. Today, the principal measure of our wealth is information -- its quality, its quantity, and the speed with which we acquire it and adapt to it" (Clinton, 1993). + Page 86 + Even without the Government's help, there is already a proliferation of distribution systems which could give Americans direct access to cyberspace in their homes or wherever they might be. The NII initiative proposes that the Government authorize billions of dollars in Federal appropriations to finance research and development of more effective global high speed communica- tions (The White House, 1993; Boucher, 1993). The price of this proposed government support is Government regulation. Since "the technologies to create, manipulate, manage and use information are of strategic importance for the United States" (The White House, 1993), ultimate control of the means of information distribution are critical to the vital goals of Government. With or without Government support, the development of these facilities is inevitable. Ever since the Rothschilds sent carrier pigeons from Paris to London in order to get a jump on the stock market, the inherent importance of information has been apparent. In the future, companies will have to be increasingly more responsive to their customers, suppliers, and changing market conditions. Companies must maintain a high degree of manufacturing flexibility and information technology skills in order to be competitive in the future. The superhighway is projected to reach far beyond traditional business applications. It is intended to reach directly into our homes. The Government proposes universal access to information and is opposed to allowing polarization between information "haves" and "have nots". The Clinton Administration is committed to this. For example, as part of a recent cable franchise negotiation, fiber optic cable was deployed in Harlem, where 40 percent of the residents live below the poverty line (The White House, 1993). + Page 87 + Realization of the technological advances suggested in the NII agenda will make cyberspace an integral part of personal daily life. For example, the agenda suggests: "...the production of powerful computers that will be held in the palm of our hand, as mobile as a watch and as personal as a wallet,...[they] will recognize speech, navigate streets, take notes, keep schedules, collect mail, manage money, open the door and start the car, among other computer functions we cannot imagine today" (The White House, 1993). The development of cyberspace will undoubtedly include an astonishing melange of irresistible technological conveniences and entertainment. All of these will be available without having to leave home. Will the explosion of cyberspace technology lead to physical isolation? DRIVING FORCES FOR ISOLATION Digital communications are rapidly increasing in capacity and accessibility. Currently, the widest used public backbone network is Internet. Internet is really a network of networks communicating via "Transmission Control Protocol/Internet Protocol (TCP/IP)". About 1,000 universities and colleges are attached to Internet. About the same number of high schools are also attached. In addition there is extensive governmental and commercial access to Internet. No one really knows how many people use Internet. In 1988, an estimated 33,000 persons were Internet users. Today there are more than two million computers on the Internet and almost 10,000 networks (Stewart, 1993). + Page 88 + With the superhighway in place, it will be possible for individuals to perform a large percentage of their activities without leaving home. Advanced technology could enhance these activities by incorporating high quality video, voice, digital access and virtual reality into the superhighway. This would provide major benefits for those who, for whatever reason, stay home. For instance, without leaving your living room: - The best schools, teachers and courses could be made available to all students via teleconferencing and other interac- tive media; - Art, literature, and science could be available from interactive digital li- braries that include voice and video; - By telecommuting, you could live any place without foregoing employment op- portunities; - You could see the latest movies, play the hottest video games, or bank and shop; - You could interact with the government directly to receive government benefits and information; - You could attend town meetings and vote; - You could monitor the locations and ac- tivities of a child or spouse; - Many health care and mental care services could be immediately available on line; - Enhanced communication could even allow lifelike human interaction with physical contact that included sight and sound. The addition of virtual reality might even include other senses (i.e. touch, smell, taste); and - The ability to fulfill your wildest sex- ual fantasy in the privacy of your home without real physical contact. + Page 89 + The implementation of cyberspace would allow all information to be digitized, cataloged, stored and conveniently accessed. If a paper copy of any information were desired, it could be printed in high resolution color (better than the original). Such a "paperless" society would not only be better for the environment, but also make exchanges of information more efficient and less time consuming. This new technology could easily lead to a society where venturing outside of the home would be far less frequent than it is now. It would certainly be tempting to sit in front of your "cybercenter" to work, be entertained and to communicate. It would be "easier" to choose isolation over the efforts necessary to physically interact with other humans. In addition to techno- logical developments, there are a number of other issues that could fuel a trend toward isolation, such as the growing threat of crime, the increasing traffic congestion in our cities (Schwartz, 1989), and the cost of transportation. The world population is expected to increase from 6 billion today to 12 billion within the next 40 years. This exponential increase in world population will undoubtedly exacerbate the problem. Increased demands for resources, environmental stress, and pollution will further encourage people to travel less. In the past 50 years, American society has already become the victim of more self imposed isolation than in any period of history. Social gatherings and "talking" have been replaced by TV and video games as the primary vehicles for entertainment. Physical interaction in the work place has been replaced by telephones and computers. Working in groups has yielded to solitary labor. When we have the technology to produce the virtual reality of all we need and desire, the temptation to stay home will be great. + Page 90 + ARE WE READY FOR ISOLATION? Approximately 38 million people, 30% of the U.S. labor force, already work at home at least part of the time (U.S. Department of Transportation, 1993). This includes telecommuters as well as those who are self-employed and working out of their home or those working at home after hours. Telecommuters are just a small portion of those who work at home. Their numbers, however, are showing a continual increase. According to a LINK resources survey, in 1992 there were 4.2 million telecommuters in the U.S. workforce. That is 3.3% of the workforce and represents a 27% increase from 1991 (LINK, 1992). By 1995 LINK predicts that 11 million people (9% of the U.S. workforce) will be telecommuting. By the year 2000, LINK estimates this to rise to 25 million people. According to the results of a State of Florida pilot program there is significant justification for telecommuting (Bishop, 1994). A survey of participants in the program showed that 72% said that their transportation expense decreased, 18% said that their clothing expense decreased, and 36% said that their food expense decreased. A survey of supervisors of telecommuters revealed that 75% said that quality of employee work increased and 100% said that the amount of work increased. In addition 87% of telecommuters stated that morale increased. Workers like telecommuting. In addition to working at home, more people are shopping at home. "Television shopping has grown from practically zero in 1985 to a $2.5 billion business last year (Altaner, 1994)." A Bear Stearns report predicts that home shopping could be a $100 billion to $150 billion business within 10 years. This is comparable to today's $70 billion in catalog sales. + Page 91 + There is some question as to whether new technology that enables us to work, shop and be entertained without leaving home will necessarily result in widespread physical isolation. Some believe that humans are too social to accept physical separation from each other for long periods of time. However, as world population soars, space becomes scarce, and environmental issues force a restriction of travel, the average person may not be able to afford the luxury of unnecessary mobility. Technology may increasingly provide the cure for loneliness. Virtual reality and increased electronic communications may supply the "next best thing to actually being there." Even for those who venture forth from their homes, the work environment for the two-thirds of our population whose work is primarily information, will be largely dominated by electronic communications. Personal computers, cellular phones, fax machines, and email have already replaced much of the personal contact we enjoyed in the past. We have become dependent on cyberspace. LOSS OF PRIVACY Increased reliance on cyberspace will create new vulnerabilities. Electronic databases may be broken into and copied. It may be possible to monitor personal and sensitive proprietary data transmissions across the superhighway. Information vital to government, industry and personal welfare may be corrupted or destroyed through accident, sabotage or catastrophic natural disaster. The privacy which the employee hoped to gain by isolating himself/herself will probably be an illusion. For example, supervisors at American Express have retained the ability to monitor employees who have signed up for the Hearth program (working at home) to ensure "tight control" (Sherman, 1993). + Page 92 + There will certainly be a debate over what information should be public and what should be private. With high perfor- mance computing capabilities, information that was once consid- ered public or benign may become an important part of your profile in some marketing research company's database. The potential for abuse is great. Packaging and selling information about a company's customers would be of increased value. This could easily invade what we now consider to be private. For example, employment decisions may be based on an individual's preference in video rentals, on book borrowings from the library or on non-prescription drug purchases. In order to ensure communications privacy, the Clinton Administration has proposed an encryption standard to be used to scramble (encrypt) audio, video and data communications. On April 16, 1993 the Clinton Administration announced the "Clipper Chip Directive". This chip is intended to "protect the privacy of citizens, while enabling law enforcement agencies to continue to use court-authorized wiretaps to fight terrorism, drug rings, organized crime, and corruption" (The White House, 1993; Anthes, 1993). The "Clipper" is an on-line encryption device that will automatically encrypt and decrypt communications. It uses a "public key" encryption scheme. This means that the encryption keys and decryption keys are asymmetric (not the same). The encryption keys are publicly broadcast. This allows anyone to send encrypted messages to the computer to which that key be- longs. The receiving computer could then use its private decryp- tion keys to transform the message into plain text (decoded form). Such a scheme protects against the possibility of the decryption keys being stolen because they only exist in one place. The Clipper uses an encryption algorithm called "Skip- jack" which relies on two 80 bit keys to decrypt messages. It is considered to provide fairly good security (Anthes, 1993). + Page 93 + The Government, however, has proposed the institution of a "key escrow" system whereby the Government would record every- body's private keys. The Government would then be able to decrypt all conversations. This includes conversations that are considered confidential such as attorney-client, doctor-patient and so on. Of course, a court authorized wiretap would first have to be obtained. How much security does the key escrow system offer? There have been reports of the FBI getting groups of signed blank search warrants from the Department of Justice. Stanford Univer- sity Professor Martin E. Hellman reported that former Attorney General John Mitchell was in the habit of handing down blank but signed wiretap authorizations, 40 to 50 at a time, rather than personally reviewing each request as required by law (Anthes, 1993). The key escrow system is tantamount to giving government agencies (such as the IRS) the keys to your house filing cabinet as long as they promised not to use them without proper authorization. In addition, because of the obvious marketability of stolen keys, it would probably not be long before organized crime and foreign intelligence agencies would obtain copies of the key escrow databases. In 1992, the FBI proposed legislation designed to ensure wiretapping capabilities. If passed, the bill would virtually outlaw any encryption scheme not sanctioned and breakable by the Government. Section 2201 of the bill entitled "Cooperation of Telecommunications Providers With Law Enforcement," reads in part: "It is the sense of Congress that providers of elec- tronic communications services and manufacturers of electronic communications service equipment shall ensure that communications systems permit the govern- ment to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law." + Page 94 + The bill was not enacted. In response to its defeat, the FBI made the following press release: "...affording a criminal subject the means, through encryption, of securely communicating in furtherance of an illicit activity is tantamount to providing a sanc- tuary immune from judicially authorized collection of evidence." Based on this statement, anyone who develops encryption technology that the Government cannot break (or has difficulty breaking) may be guilty of a Federal offense. If the FBI has its way, privacy will be the first "road kill" of the information superhighway. CONCLUSION As we stand at the brink of a new technology that promises to significantly alter our society, what questions should we ask ourselves? Will enhanced communications technology afford the opportunities of better interaction with our fellow man? Or will it cause us to cower in isolation -- afraid to venture from our homes -- content with our electronic addictions? Will it safeguard privacy or will it cause our lives to become open books to those who would manipulate us? Will we care? On one hand, the development of cyberspace could lead to unprecedented opportunities for communication. This new technology may become the foundation for an enlightened society where vast amounts of information are available to everyone. Education, health care, crime prevention, and the economy could all be enhanced. It could be fundamental in increasing the quality of life in the future. + Page 95 + On the other hand, the ominous image of life in cyberspace is a society where individuals are addicted to an illusion of fulfillment. It depicts a superhighway where information is controlled by governments and mega-corporations provide new generations of glitzy electronic narcotics. It suggests neighborhoods where people sit alone, facing an inevitable loss of privacy as they frantically click the remote control, desperately seeking something to numb them to the consequences of isolation. REFERENCES Altaner, David (1994). Changing Picture. Sun-Sentinal Weekly Business, Sun-Sentinal, Miami, June 20, 1994, p. 6 Arizona Energy Office, AT&T (1991). AT&T, State of Arizona Telecommuting Pilot Six Month Evaluation. Phoenix, AZ: Arizona Department of Commerce. Anthes, Gary H. (1993). All Eyes on Clipper. Computerworld, 27(24), pp. 73-75. Bishop, Martin (1994). Report on the State Employee Telecommuting Pilot Project. Tallahassee, FL: Florida Department of Management Services. Boucher, et. al. (1993). High Performance Computing and High Speed Networking Applications Act of 1993. 103rd Congress: 1st Session in the House of Representatives, H.R. 1757. Clinton, William (1993). Remarks by the President at American University Centennial Celebration. The White House, Office of the Press Secretary. + Page 96 + Florida Department of Management Services (1993). Telecommuting Guide. Tallahassee, FL. Gochenouer, John (1993). Isolation Without Privacy. Faculty Working Paper, Miami Shores, FL: Andreas School of Business, Barry University. LINK Resources (1992). National Work-at-Home Survey, press release. New York, NY: LINK Resources. Schwartz, Joe (1989). Future Lock. American Demographics, 11(11), pp. 116-117. Sherman, Stratford (1993). How to Bolster the Bottom Line. Fortune: 128(7), pp. 14-28. Smith, Norris P. (1993). Data Highway Involves More than Just Fiber and Bandwidth. HPCwire: subject 337. Spring, Jim (1993). Seven Days of Play. American Demograph- ics, 15(3), pp. 50-54 Stewart, Thomas A. (1993). Boom Time on the New Frontier. Fortune, 128(7), pp. 153-162. U.S. Department of Commerce (1992). Statistical Abstract of the U.S. 1992, Washington D.C. U.S. Department of Transportation (1993). Transportation Implications of Telecommuting, Washington D.C. The White House (1993). The National Information Infrastructure Agenda For Action. NTIA NII Office, Washington, D.C. + Page 97 + ---------------------------------------------------------------- BIOGRAPHICAL NOTE: Dr. Michael Paul currently is an Assistant Professor of MIS at Barry University in Miami Shores, Florida. He graduated from Ohio State University with a B.A. in Theatre. He was awarded a B.S., M.S., and a Ph.D. in Computer Science from Florida International University. His present position was preceded by a 15 year career in industry. Dr. John Gochenouer currently is an Associate Professor of MIS and Management at Barry University in Miami Shores, Florida. He graduated from the University of Maryland with a B.S. in Finance. He was awarded the M.B.A. with a Management Science concentration, also from the University of Maryland. He received a Ph.D. in Management Theory from the Florida Institute of Technology. His present position was preceded by a 15 year career in industry in which he served in MIS management positions. Michael J. Paul Andreas School of Business Barry University Miami Shores, Florida (305) 899-3518 PAUL@buvax.barry.edu John E. Gochenouer Andreas School of Business Barry University Miami Shores, Florida (305) 899-3516 GOCHEN@buvax.barry.edu + Page 98 + --------------------------------------------------------------------------- Interpersonal Computing and Technology: An Electronic Journal for the 21st Century Copyright 1994 Georgetown University. Copyright of individual articles in this publication is retained by the individual authors. Copyright of the compilation as a whole is held by Georgetown University. It is asked that any republication of this article state that the article was first published in IPCT-J. Contributions to IPCT-J can be submitted by electronic mail in APA style to: Gerald Phillips, Editor IPCT-J GMP3@PSUVM.PSU.EDU