ebook img

The Privacy Poachers: How the Government and Big Corporations Gather, Use and Sell Information About You PDF

82 Pages·1992·47.158 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Privacy Poachers: How the Government and Big Corporations Gather, Use and Sell Information About You

J( 5,i (. z Lt 9" luv t?qz The Privacy Poachers How The Gouernmentand Big Corporalions Gather, Use and Sell lnformation AboutYou Tony Lesce / t' W I I f Loompanics Unlimited i Port Townsend, Washington 'I'hcsc rthcr fine books by Tony Lcsce are available from l.txrnrpanics Unlimited: . Thc Big House: How American prisons Work Contents o Espionage: Down and Dirty o Escape from Controlled Custody rhls bo2ty is sold for information purposes onry. Neither the author nor the publisher wilr be herd accouitobt" yo, thi use o, *tiii ifin" information contained in this book. THE PRIVACY POACHERS 1. The Birth of Big Brother . . . .I a 1992 by Tony Lesce 2. Who Wants to Know About You - and Why .......5 3. Information ........23 How Big Brother Collects 4. You? Ai1l la rnigy hftosr mre swerhvaerds.o Nevoe pi waritt hoof utht isth eb oporkio mr *aryi tbte. nre;p"r;ord"u,crerd;; oirr. s tpo"reud- 5. DWoheos' sth Oe pLeanwin gP rYotoeucrt Mail? .. .. ... .. .. 6.595 lisher. Revie:vs mal quote brief p^rug.r without ttre written lo,isent 6. IRS Cross-Matching Programs ....73 or rne pubt$her as long as proper credit is given. 7. UniversalRegistration ......77 8. Eye in the Sky .......81 Published by: 9. SurveillanceofBusinesses... .....85 Loompanics Unlimited P.O. Box I197 10. ModernElectronicSurveillance .........87 Port Townsend, WA 98368 11. ProtectingYourself .......111 Loompanics Unlimited is a division of Loompanics Enterprises, Inc. 12. Summing Up... ....143 13. For Further Reading .. . . . .145 rsBN l-5s9s0-086_7 Index ..149 Library of Congress Catalog Card Numb er 92_0g1233 The Birth of Big Brothcr I Ihe Birth of Big Brother George Orwell's novel, 1984, dealt with a little man, an average citizen being morally and intellectually strangled by a monstrous government tyranny personified by the leader, "Big Brother." This government had a monopoly on power, unlike reality today, several years after thc real-life year 1984 has come and gone. Today, we have a variety of police and regulatory agencies ruling our lives and collecting information about us. There are also private agencics and bureaus intruding into our privacy. Official police at local, state, and federal levels employ 600,000 people, with total budgets of about $30 billion. Private l.l security agencies alone have an estimated million people employed, according to an estimate on page 4l of the March, 1991 issue of the security industry magazine, Security Manage- ment. Another estimate, quoted in the November 15, 1991 issue of Law Enforcement News, states that private security employs 1.5 million persons, with an annual budget of $52 billion. Add to these the many credit bureaus, insurance company employees, medical record-keepers, and assorted state and private bureau- crats, and we have a number as formidable as it is impossible 2 ilil,t PRtvA('y POACHERS The Birth of Big Rnlhrr I t, prn d.wn. Today, the individual stands alone against a hun- More importantly, people were far from the heavy hand of tlrt'tl .r l thousand Big Brothers, hacking away at his'freedom. government regulation. W.rsc, thc annual growth rate of private security is about g%, During the 20th Century, while some Europeans were ex- twicc that of official law enforcement, according to an editorial pressing concern over the Americanization of Europe, a more by llrucc Cameron in the December, 1991, issue of Law and subtle and insidious process happened: the Europeanization of ( )nlcr magazine. America. While Europeans were agonizing over the introduc- 'l"he 20th Century has brought about new and unprecedented tion of the "Coca-Cola culture" into their homelands, Americans thrcats to individual freedom, especially in the united states. found their lives increasingly controlled and regimented. As long Hcre, many people think that they're much freer than they are ago as the Civil War, the government had introduced a Euro- in reality. If you deeply believe that you have certain inalienable pean practice: conscription. Draft boards registered all males of rights as an American, you'll find some nasty surprises within military age during both World Wars, the Korean, and the Viet- these pages. You'll find that some rights, which are so taken for namese Wars. Each male was required to carry his draft card granted that they're not enumerated in the constitution, are be- at all times, and this card served as a means of identification. ing infringed upon both in the name of corporate profit and War required information about the enemy, and during the govcrnment control. Civil War the U.S. Secret Service began under its first chief, America traditionally was "the land of the free," but from the Alan Pinkerton. The Secret Service and its sister agency, the late- start, government was developing a heavy hand to use on its arriving Federal Bureau of Investigation, continued the peace- citizens. shortly after the Revolution, the "whiskey Rebellion', time surveillance of American residents to root out "subversion." Spying upon citizens became routine, although the small size of dbrisotkiella otuet woviethr othuet riingthet rvoef nfatrimone rsa nandd t abrxeawtieorns tuo yp rtotrdeu cfee dtehreairl the agencies limited their ability. After World War II, both agencies enlarged to an unprecedented degree in peacetime, be- government. The government won, although hill people con_ cause of the cold war. Electronic data processing made it tinue to brew and distill on a small scale up to the piesent day. possible to keep tabs on millions of people quickly and ef- The l9th Century offered many more opportunities for ficiently, with small staffs. people who cherished their freedom and who wanted to remain In 1913, the income tax arrived, and at first few were worried free, to migrate west and make new starts. while the frontier because they didn't earn enough to be subject to the tax. This was still open, people wishing to escape the crowding and soon changed, and today the Treasury Department's lnternal rcgimentation of the East could find freedom in the wide-open Revenue Service, more than any other government agency, is spaces. The frontier was relatively safe, and despite the lack of playing "Big Brother" to many Americans. A draft board can't profuse crime statistics, it is plain to see that the danger from do much without a draft, but the IRS goes on forever because nrarauding Indians was far less than from present-day street practically every wage-earner pays income tax today. g'l'a.nngrsh isnt 'Enaes tern cities such as New york. Even Dodge City and The Treasury Department got further into the act during pro- were not as wild as the waterfront distriCts of hibition, when a special unit, the "Untouchables," took to the l:.stcrr citics, where hijack gangs and river pirates abounded. field against Al Capone and other bootleggers. The Treasury's I I ilt, I'1il\,\( \ t\)A('iltiRs W ho ll'onl: lo Know Aboul You and Why 5 ,,\lt,lr,l,'l.blrcco, and Firearms Bureau imposes taxes and rr^11rrl;rr.s rrrrnulircturing, importation, and sales in all three lr.ltl:' wlrilc ATF agents have performed valuable services in t:rr1rt'tirrg .r'rred criminals, especially with their "Achilles" l)r()l"rilnls, nrOst agents' efforts are spent in enforcing nit-picking ,lrst'rvrurce of technicalities by legitirnate gun dealers and fire- lVho lYants to l(now AboutYou ;rr rrrs lrobbyists. The truth is that enforcing procedural violations rrg'inst law-abiding citizens is far less dangerous than raiding - md \Yhv ;rr lncd criminals. t) A unit of the U.S. Department of Justice has also become vt'r.y intrusive, in its guise of fighting drug use. Originally t'stirblishcd as the Federal Bureau of Narcotics, its name and irriti,ls changed through the years, copying the style of the Soviet Sccrct Police. The "FBN" became the'.BNDD," the Bureau of ..DEA,,' Nirrcotics and Dangerous Drugs, and then the the Drug lrnkrrccment Administration. with each name change, its power Big Brotherism. the imposition ol' total control over one's rrrrd inlluence increased. Skillful propaganda hai convinced fellow man, attracts certain kinds ol'pcople. What kinds? Ob- ilrilny pcople that illegal drugs are the greatest threat in viously the ones who like to control others. Amcrican history, justifying extreme measures. Drug use has rrow taken the place of Communism as the bogeyman of the Such people are attractcd to policc work, as are those who | 990s. like to avenge wrongs and othcrs who seek adventure. Avengers and adventurers can find legitimate places in law enforcement, The greatest dangers, however, come from events outside of but controllers who drift into law enforcement often end up :pru,db lidce vsipeiwte. CAolln ggorevsesrinomnaeln rt easgisetnacnicees , magaeinntcaieins cboemgpinut esrh afirliensg, making life miserable for thc:ir fcllow man. thcir files during the 1970s. Although congress has not allowed Adventurers often join S.W.A.T. teams, where they get op- thc integration of distinct files into national databases, it's been portunities to go through doors and fight it out with the bad lr.ppening under the table. Privately-compiled and maintained guys. Avengers who get into criminal investigation can unravel computer dossiers, such as those put together by the direct_ bizarre and puzzling crimes, to bring the perpetrators to justice. rnarketing and credit industries, contain even more information Controllers, by contrast, don't really care about the dangerous rrh.ut you, and their use is, in practice, beyond the reach of law. or exacting aspects of law enforcement. Going after armed desperadoes is dangerous, because they sometimes open fire against police officers. It's safer to target legitimate citizens, because they don't shoot back. Big Brothers are always bureaucrats who have job tenure, not elected politicians. Politicians have better things to do, such as (r 'l lll,, I'lllV4('Y POACIIERS Who lilants to Know About You - and Why 7 (:ollr(:tingi campaign funds, paying back favors, and keeping high a law enforcing the Eighteenth Amendment, the Constitutional pnrl'ilt:s so that they may be re-elected. The controllers are amendment imposing prohibition. Banning consumption of nnonynlous, and their job tenure doesn't depend on re-election alcoholic beverages, prohibition madc possible the rise of big- cvcry l'cw years. Many work for private agencies and bureaus, name bootleggers and helped to shape the organized crime ilnonyntously, collecting information and controlling the lives of picture we have today. Although Congrcss repealed prohibition pcoplc thcy never see, and who may not even know the con- in 1933, the criminal empires did not go out of business. Having trollcrs cxist. built up their power and economic infrastructures by catering to people's want for drink, they moved into supplying other illicit wants, such as gambling and narcotics. During World War II, Victimless Crimes the mobs were deeply into the black market, with the tacit sup- port of millions of clients. One way the Big Brother mentality shows itself is by creating Today, drugs are in the news, because the federal government victimless crimes, "offenses against morality," which serve as is in a position to control substances people put into their mouths levers for control and prosecution. Many local "blue laws," such or noses, or inject into their veins. A tremendous amount of as Boston's ban on shining shoes on Sundays, have appeared, public-relations hype has convinced many Americans that drugs and are today either ignored because of their ridiculousness, or are a serious threat, despite the absurdities in the government's wiped off the books when legislatures revise penal codes. In New policies. On one hand, drugs listed as "illegal" are banned, but York State, for example, until the new penal code appeared in legal drugs such as alcohol and tobacco are not only allowed, 1965, teenage masturbation was illegal. This was obviously not but taxed by the government. There is even a tobacco crop sub- cnforced, or the jails would have been full of adolescent onanists. sidy given to farmers by the Department of Agriculture. Private On the federal level, there have been serious encroachments employers are even attacking employees'right to use legal drugs, <ln individual freedom through various federal blue laws. One such as tobacco, off-duty. of the first was the Comstock Act of 1873, originally aimed at pornography. In the form in which it passed into law, the send- ing of both obscene literature and contraceptive information Guilt By Association through the mail became illegal. Only a century after it passed did the Supreme Court emasculate the Comstock Act, in the The Big Brothers in our society share the police mentality, lamous Lady Chatterly case. which derives from common life experiences. Obviously, people The Mann Act of l9l0 was aimed at interstate transportation of like interests tend to band together, and even form groups and of prostitutes, but a Supreme Court interpretation soon made it associations to share their interests. Some, such as bird-watching applicable to any unmarried couple eloping across state lines. clubs, don't attract the attention of the police. Others, such as '[hc Harrison Act of 1914 made it illegal to use certain pre- fringe political parties, sex clubs, and various informal groups, scription drugs for non-medical (recreational) purposes, and led are of definite interest to police officers at various levels. Federal lo thc cstablishment of the Federal Bureau of Narcotics. The police are interested in anyone who may be violating federal rtrosl troublosome of all, however, was the Volstead Act of 1919, laws, or helping someone to subvert the United States. r",i illt t'til!A( \ t'()A('ilt,tRS Who Wttnt,s to Know About You and llhy 9 llr. r.r r('srlt is that government surveillance includes not compile several lists. These might be of people living in that .rrlv rlrrs. wh. have broken the law, but those who might be- jurisdiction who owned a certain m:rkc of vehicle, or who had (;rrs(. rl tlreir backgrounds, interests, associates, etc. On6 land_ been burglarized during the past ycar. Alone, each list meant rrr;rrl' prlic.y statcment was by U.S. Attorney General Robert little, but taken together, these lists rrarrowed the field of sus- .l:rtksrrr, in 1940. He stated that it was necessary to maintain pects, or allowed finding witnesses to a crinrc. " ..stt':rtly surveillance over individuals and groupr within the .lllr ritctl States who are so sympathetic with thJsystem or designs lirrcign dictators as to make them a likely source of federal Case Study: The U.S. Secret Service l;rw vi.lation." This shows the sharp difference between what rr:rny pcople think of as the police function and the way law Included in the duties of thc Sccrct Servicc is thc protection t'rrlirrccment officials themselves see it. of the president, vice president, thcir lamilics, president-elects, 'l'o many, crime prevention is clearing away slums, poverty, presidential candidates, and somc othcr pcoplc from time to rrnd rther degrading social influences that allegbdly cause crime. time. This has been a very frustrating task, especially when a 'l'his is a naive view, because many criminals oo not come from president has been killed. The Sccrct Servicc has, over the years, slums, and many slum dwellers do not break laws. Other made a continual and energetic study of thc type of person who rncthods of crime prevention are increased physical security, kills presidents, to be able to idcntily and stop potential assassins such as burglar alarms, bars on windows, oouble-locked doors, before they strike. ctc. H.wever, law enforcement officials have yet another view .l' crime prevention, surveillance of those tikely to commit Identify ing Potential Assassin.s crimes, and entrapment of those who are predisposed to crime. The very small number of persons who have killed or made The result of this outlook is a frantic compiling of lists. There deadly attacks on American presidents has made it difficult to .rc lists of the relatives and friends of convictedcriminals, lists identify typical characteristics. Until 1975, all were male. That .l' their neighbors, prison cellmates, and even lists of their year, Sara Jane Moore and "Squeaky" Fromme tried to shoot victims and the witnesses who testified at their trials. There are President Ford, providing empirical evidence that potential lists of people who belong to various political parties and threats now had to include both sexes. .rganizations, those who subscribe to subversive publications, Some popular writers, perhaps guided by the muddled .nd in at least one bizarre instance, a rist of rp".tutoi, at the trial thinking of Secret Service agents, described Presidential ol'a Black militant.r attackers as "loners." What this word is supposed to mean is List compilation and cross-matching is a legitimate police unclear, especially because attackers varied widely in back- invcstigative technique. The TV viewing public sa-w examples of ground, education, and social situations. Lee Harvey Oswald, for th.is in a short-lived police procedural series of two decades ago. example, was a married man. Most others were single. It has also I'his was Dan Augusd starring Burt Reynolds and Norman FEu. been "politically correct" to describe presidential attackers as It may have seemed strange that, at the beginning of every in_ mentally disturbed, or somehow alienated, to discredit them and vcstigation Reynolds asked his side-kict, worman Feli, to deny their acts legitimacy. This further muddies the waters, l0 't'il1,t t)RtvACY POACHERS Wfu,t Wants to Know About You - and Why I I l lrt'cirusc it suggests that the attackers' ability to think and plan Wallace, is "stalking." The Secret Service, which was respon- nrny hc insufficient. Actually, all successful ones planned well sible for Wallace's protection during his presidential campaign, examined newsreels and videotapes of the public appearances of trrrough, and even the close misses, such as Collazo and Torre- all of their protectees, scanning crowd shots, and found Bremer's soln, wcrc too close for comfort. 'l'hc face in many of them. He had followed President Nixon around one characteristic shared by all but one attacker is what the country, and finally settled for Wallacc, presumably because wc oan call the "Insignificant Nobody" syndrome, at the risk of access to him was easier. crcating another trendy term. Only John Wilkes Booth was rcn<lwned, as an actor. All others were what show business After the Kennedy assassination, the Secret Service obtained extra funds and officers to enlarge its Protective Research pcople call "nobodies." The nobody, by definition, blends in Section. Secret Service management realiz.ed that the original with the crowd, making him or her very, very hard to identify. criterion, threats against the president, was not enough. Another characteristic, which isn't very helpful in identifying potential assassins, is youthfulness. Practically all assassins and The Secret Service is now interested in anyone who utters would-be assassins have been younger than 40, and many were threats against p-tuhrbeliact figures, is a member of a subversive group in their twenties. that may be a to the president and other protectees, and others *ho for various reasons are potential threats. This includes The president gets a lot of mail, some of which is hate mail, people who do a lot of complaining about the government, and in 1940 the Secret Service established its Protective Re- peopte who write abusive letters to the president, and people scarch Section to scrutinize threatening mail and track down the who try to personally contact high public officials for redress of writers. Logically, a safe assumption is that someone who imaginiry grievances. The Secret Service is also interested in threatens the president in writing merits further investigation. habitual gate crashers, as they may show up uninvited at govern- Federal law prohibits uttering threats against the president, ment functions.3 providing a convenient hinge for prosecution. However, The FBI now furnishes to the Secret Service the names of experience has shown that it's not enough to pursue and arrest people who are subversive, fascist, rightist, or in political flnge people who make threats. There are other patterns of behavior groups, and who are also irrational or unstable. Other criteria which the Secret Service considers significant. In the case of ire making threats against government officials, making bombs, Oswald, there were several items which, although they did not showing violent tendencies, and behavior showing a "propensity fit Secret Service criteria at the time, were obviously significant for violence and hatred against organized government."a with hindsight. Oswald had defected to the Soviet Union, had an attitude of hostility and arrogance towards the United States, Gathering Information on Potential, ssassins was pro-Castro, had lied during interviews with FBI agents, had contacted Soviet officials during a trip to Mexico, and most im- The Secret Service now has a computerized file, into which portantly, worked in a place which gave him a good sniper's it enters information collected by its agents within the Protective vicw of the motorcade route.2 Research Section, as well as referrals from other law enforce- ment agencies such as the FBI and local police. Although the Another behavior pattern, which became startlingly clear after details of its liaison with other government agencies are Artlrrrr llrcmer shot and paralyzed Alabama Governor George l.) ! tt!' I'Rt!'A( \' l,()ACIIERS Ll/ho ll/unts to Know About You and Wh.v' 13 t r lrrssrlit'tl, it's s:rlc to assume that, once a name shows up as a This is the sort of material gcneratcd by government paper- tlrrt':rl, St't'r'ct Scrvice agents contact other agencies to dig out pushers who know that a case filc's volume is more important rvlr;rtt'vt'r' irrlirrrnation they may have on file about this person. lhan its contents. Paper mills gencratc paperwork by the pound, l'r'rlt'r:rl :rgcrrcics include the Internal Revenue Service, as well not the page, in the expectation that nobtdy will read the files, ;rs rrll policc agencies. When the need involves a threat against anyway. tlrr'prcsiclcnt, it's hard to see how any agency, federal or not, t orrkl rclusc cooperation. Blacklists Case Study: U.S. Army Intelligence Blacklists are, theoretically, illegal' cxccpt when the govern- ment keeps them. The U.S. Atttlrncy General's subversive 'l'his is worth a quick look, partly because it offers a parallel aorpgpalinciazatiotionnss, olinst tihse o bnaes ikse tphta gt smtr:rn:msibbelyr sfhoipr ninat ioonnea l osfe cthueristey to thc information-gathering of the U.S. Secret Service. During organizations may indicate a security risk in certain sensitive lhc 1960s, when there were many race and Vietnam War riots, jo6s. There is sound reasoning in this, because it would be very t l.S. Army lntelligence agents began recruiting informers, infil- -dang"rour to have a member Ol'a subversive organization with trating peace groups, and gathering information on individuals his finger on a nuclear button. However, in practice- the and groups connected with the racial-equality and anti-war government overdoes it, using the list to bar these people frorn nrovements. There were lists of suspect organizations, lists of all government emPloYment. lxrtcntially suspect organizations, lists of subversive individuals, irrrd lists of possible subversive individuals. In one instance, there More significant, because they're out of government control was cven a mug book containing photographs and histories of and publiC view, are blacklists kept by private companies and pcrsons under suspicion. organizations. While their original purposes may have.been legitimate, at times there are severe abuses- An example is the One problem with these information gathering efforts was lisi kept by the insurance industry of people who file claims. The that they were very indiscriminate. Organizations listed in Army purpose is to disclose those who file more than an average num- Iilcs included the League of Women Voters. Senator Edmund 6et-ot claims, alerting investigators to possible systematic frauds, Muskie was one of the individuals.5 but they also serve to identify high-risk clients, people who may Another problem was the poor quality of the information simply be unlucky. glthcred, because of the ineptness of the investigators. Some of The Employer's Information Service, of Gretna, Louisiana, thc notations in individual case files seem stupid: keeps track of employees who have had work-related injuries'6 "Paranoid trends, not qualified for military service." Thii can, of course, be helpful in tracking cases of repeated fraud. It can also be useful in tracking careless, accident-prone, "ltcported to be psycho." or simply unlucky people. This type of database can easily serve "Known to have many known associates." as a blacklist. I4,I'III.: I'RIVA(]Y POACHERS Who ll/ants to Know About You - and Why 15 l l)rrctors refer to their own blacklist of people who have filed corporate description of a "troublemaker" often includes rnalpractice suits against other doctors in the past. This isn't new. members of labor organizations. Corporations and business Wcll ovcr a decade ago, "Telident," in Southern California, associations keep blacklists of union members and activists, opcratcd a service for doctors listing the names of patients who although this is strictly illegal. had filed malpractice suits. An extra feature was that Telident Organizations that generate and maintain blacklists operate would also provide the names of doctors who had testified on undeiinnocuous names that tell nothing about what they really bohalf of the plaintiffs.T do. There are "employer's councils" purporting to promote This type of information provides a basis for declining to ac- "stability" in labor'management relations. "Stability" is a code cept such persons as patients. However, the medical establish- word pertaining to combating labor unions, which often demand ment, which has clout in Washington, has made sure that a highei wages, benefi6, and improved working conditions. Other government database of doctors disciplined for malfeasance or private surveillance organizations have names which are even malpractice isn't available to the public. Information in the iess informative, such as "ABC Services, Inc.," "XYZ Asso- National Practitioner Data Bank will be available only to hos- ciates," and "Consolidated Services, Inc." pitals and health-maintenance organizations.8 Paternalistic employers have been tyrannical in their sur- Landlords are interested in rejecting people who might be veillance and control of employees' private lives. Ford Motor troublesome tenants. To meet this need, one former deputy Company set an example during the early part of the 20th district attorney in Los Angeles formed a company to provide Century. Ford's employee snooping division was called the landlords in the area with information on such people. Gleaning "sociological department," and employed 100 investigators to information from court records, this man built up a computer visit employees' homes and report on what they found. They database of persons who had had any sort of legal action filed monitored employees' drinking habits, sex lives, household against them by landlords. Unfortunately, some garbage had cleanliness, and how they spent their leisure time.ro crept into his records. One man, who had paid his brother's rent At the time, it was common for employment applications to for him one month, was named in court papers relating to an contain probing questions relating to personal habits and eviction order against his brother. From then on, he was attitudes. These included smoking, alcohol consumption, and stigmatized whenever he tried to rent an apartment. A woman swearing and vulgar language. Some asked if the applicant had who found that her newly-rented apartment was roach-infested ever been divorced, to which organizations or churches he be- gave her landlord notice. He countered with an eviction order. longed, and who his political leader might be. Her name went into the computer, and years later, she found it Some companies, even today, go further than merely trying very hard to rent an apartment.e to avoid hiring dishonest or incompetent employees. With rising It's understandable that a company executive may have an health insurance costs, some are trying to weed out those who interest in detecting "troublemakers" and declining to hire them. might make more claims and raise premiums. One 1982 survey This can mean a chronically absent employee, or one convicted by the U.S. Oflice of Technology Assessment found that 18 of stealing from his employer. As we'll see, certain personal and American companies at the time were using genetic screening to medical characteristics can also preclude hiring. However, the test for high vulnerability to toxins. This was, for the most part,

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.