--------------------------------------------------------------------
T H E N E T W O R K O B S E R V E R
VOLUME 2, NUMBER 1 JANUARY 1995
--------------------------------------------------------------------
This month: Conservative infrastructure
Libraries and information activism
Information technology and the workplace
Mailer errors from hell
A batch of useful net resources
--------------------------------------------------------------------
Welcome to TNO 2(1).
This month's issue includes four brief articles by the editor,
plus the usual departments. The first article offers some
thoughts on the incoming Republican majority in the US Congress
and the shifting political structure that it reflects. I want to
assemble some materials toward a more sophisticated understanding
of the roles of technology in political life. More on this topic
in later issues.
The next two articles are transcripts of contributions to panel
discussions on the subjects of "the potential dark side of the
NII for the workplace" and "the NII and the Constitution". Each
begins with lengthy demurrals about the assigned topics, followed
by more positive analysis. As usual, I suggest that neither
technology nor law make any real difference in the world unless
people get together to actively make and use them rather than
passively predicting their "effects".
Finally, I offer my top-ten list of the most annoying phenomena
I encounter as the maintainer of a large mailing list. The error
messages produced by Internet mailers are probably the single
worst bit of user-interface design that the average network user
encounters, and many of them really are beyond belief. I was
once among the people who assert that the Internet brings true
freedom of the press, given the old saying that "freedom of the
press is enjoyed by whoever owns one". But I've realized that
this isn't really true -- the tools do not exist for any but the
most fortunate and sophisticated few percent of Internet users to
maintain their own large mailing lists. The net will not live up
to a fraction of its potential until this can change.
--------------------------------------------------------------------
The conservative revolution.
My liberal friends are virtually all in denial. They change the
channel when Rush Limbaugh comes on, they cite low voter turnout
figures as evidence against the electoral legitimacy of the new
Republican Congress, they assert as obvious that Republicans and
Democrats are the same by now anyway, they dismiss Newt Gingrich
and the editorialists of the Wall Street Journal as nut-cases,
they speculate that the 1980's provide grounds for predicting
that the new conservative movement will self-destruct and fade,
and they act as though they could rebut every last conservative
argument before breakfast with one hand tied behind their backs.
Dream on, my friends, because you are in serious trouble. Little
analysis of the detailed electoral numbers is required to figure
out that we're looking at the largest and deepest shift in US
political institutions since the New Deal. But the strongest
evidence goes beyond the numbers. The conservative movement has
built an impressive array of institutions, a system of parallel
structures with serious funding and a genuine mass base. This
includes parallel media institutions (the Washington Times, talk
radio and National Empowerment Television, all of them by-passing
the mainstream news), parallel public interest organizations (the
American Center for Law and Justice (ACLJ) competing head-to-head
with the ACLU, as well as a batch of other conservative legal
institutes employing the ACLU model but pressing property rights
and anti-affirmative action agendas), parallel intellectual
networks (based for the most part in privately funded think tanks
like the Heritage Foundation and Manhattan Institute, but also
in law schools and economics departments), and much else. One
reason why liberals can maintain their denial is that they have
chosen, by and large, to remain uninformed about these alternative
institutions. Their world has remained stable for so long that
they are unable to conceive that changing political conditions
could simply throw a switch, channeling cultural and financial
resources to the new institutions and leaving the old ones to
wither and die.
Money helps build such institutions, of course, but it's not
just money. The last decade has seen the rise of an extremely
well-organized network of activists who are much more thoroughly
studied in conservative ideology than the Reaganites of ten and
fifteen years ago. They support and recruit young Republican
activists on college campuses, they get vast amounts of ideology
distributed to people who can use it, and they sell large numbers
of books by Friedrich Hayek and Ludwig von Mises and a world of
other conservative theorists to people who really do read and
understand them. In particular, they have sophisticated ideas
about the structure of the liberal coalition and its weaknesses,
and they are exhibiting extraordinary precision and thoroughness
in applying pressure along the fracture lines.
One sign of the ongoing decimation of the liberal coalition
is its nearly complete lack of rhetorical traction in rebutting
conservative arguments. We can see this, for example, in the
impunity with which conservative rhetors have appropriated words
like "elites" (a term which no longer includes bankers but does
include journalists), "bigotry" and "hate" (now used to signify
opposition to the political program of religious conservatives),
and "political correctness" (a term which formerly was rarely
used in seriousness by anyone but sectarian Leninists but which
now routinely conflates social dissent and political repression).
We can also see it in the impunity with which these same rhetors
employ extreme vocabulary in their anti-liberal polemics -- read
any of P. J. O'Rourke's "enemies lists" in the American Spectator
for the prototype, but the phenomenon is pervasive.
Much will happen in the next few years. The Democratic Party will
disintegrate. The corporate funding on which it came increasingly
to rely as it alienated its mass base by increments since the late
1970's has now shifted radically toward the Republicans. (Most of
the figures you'll see won't seem to prove this, since the radical
shift only began toward the end of the 1994 campaign.) Corporate
money only went to the Democrats in the first place because money
buys access and the Democrats were the majority party. Now that
that's no longer true, this money will seek its natural home and
the inherent bias toward incumbents in the money-intensive political
process will lock in with extra strength. Enough things are
genuinely messed up in Washington that the new Republican majority
can be heroes simply by cleaning up the worst of them, starting with
Congressional rules. It'll take incredible discipline to balance
the budget, but they'll probably do it. If they do actually start
balancing the budget, though, they'll need to considerably deepen
the revolution. If they're smart, they'll take Bill Kristol's
suggestion and hold "show trials" of failed government programs,
presumably starting with the Departments of Energy, Transportation,
and Housing and Urban Development. Eventually they'll empty out
the Department of Education, since it's a creature of the Democrats'
most central constituency, the National Education Association, but
they don't need to do that immediately. What the liberal pollsters
don't understand is that the conservative ideological network
can back up Republican legislative initiatives with tremendous
grassroots firepower through talk radio and other media -- the crime
bill and failed attempts at lobbying reform in the previous Congress
provide good examples. What seems politically impossible today
won't seem so impossible once this machinery gets back in gear in a
few months. This effect will be awesome in the 1996 election cycle,
and Bill Clinton is more likely to be assassinated than he is to be
reelected.
The biggest question is whether the new conservative majority has
enough discipline to prevent a return to the social conditions
of the 1880's, when a laissez-faire legislative majority and
legal system permitted the profound social chaos inherent in an
unregulated market economy to express itself. Large business
coalitions are already forming to eviscerate the Securities
and Exchange Commission and the Food and Drug Administration,
which regulate perhaps the two most morally hazardous industries.
Increasingly frequent proposals to means-test Social Security
benefits will turn Social Security into a form of welfare and
thus greatly increase its political vulnerability. Once people
like Richard Posner and Richard Epstein are appointed to the
Supreme Court, if not before, look for New Zealand-style changes
in labor law and the end of affirmative action. It's a leftist's
dream, in an unfortunate and twisted way, but it will take place
against the background of a thoroughgoing conservative hegemony
that will make leftist arguments nearly unintelligible.
What does this have to do with networks? All along, I've pointed
at something important -- the infrastructure of the conservative
political movement. This includes technical infrastructure --
radio, Newt Gingrich's videos and conference calls, direct mail
and the databases that back it up, and so forth. It includes
institutional infrastructure -- activist training by groups like
Gopac, networking groups like the Council for National Policy,
the Free Press, and the whole world of institutions based in
conservative evangelical churches. It also includes what we
might call rhetorical infrastructure -- the discursive forms of
public relations that provide standard frames and logics for the
ceaseless circulation and reassembly of bits of fact and argument
and narrative by conservative pundits and activists. And it
includes what we might call ideological infrastructure -- the
basic framework of abstract ideas that get filled in with this
rhetorical material in particular settings.
No one or two of these basic types of infrastructure suffices to
characterize or explain the material workings of the conservative
movement. In particular, technology is an indissociable part
of the whole picture, but it is just one part. In another TNO
article I want to sketch a framework for thinking about the
communicative metabolism of social movements in general, but for
the moment I simply want to remark on the specific uses being
made of communication technology by this one particular movement.
As I keep saying, the technologies do not in themselves determine
how they will be used, but their specific workings do matter for
the workings of the larger social machinery -- the institutional,
rhetorical, and ideological machinery with which it articulates
in daily practice.
Will the conservative movement change its character as (or, I
suppose we should say, if) access to computer networking becomes
more widespread? We cannot be certain. We can be certain,
though, that computer networks will not themselves change any
existing movements or create any new ones. Rather than wait
for that to happen, let us become aware of the specific ways in
which different kinds of social movements take hold of particular
technologies, and let us keep on imagining the other ways in
which the technologies might be used.
--------------------------------------------------------------------
The NII and workplaces.
[This is an edited transcript of my contribution to a panel on
"The Potential Dark Side of the NII", organized by Stephen Bates
at the Annenberg Washington Program.]
My assigned topic here is "The Potential Dark Side of the NII in
the Workplace", and I want to start out by clearing the ground
with a series of hedges and qualifications organized around that
phrase. There are six of them.
First of all, the phrase "the NII" tends to presuppose that the
NII is a unitary system. This may actually happen if a generic
bit-transport protocol like Asynchronous Transfer Mode emerges
the most efficient way to ship all types of content for all
purposes. But an equally likely outcome is a great diversity of
information infrastructures tailored to different purposes.
Second, to speak of "the Dark Side of the NII" suggest that the
infrastructure itself produces good or bad social consequences,
and this is surely far too simple. The NII is not monolithic or
inevitable; rather, it will coevolve with a complex and varied
range of institutions and applications, and it is these things
that can be spoken of has having light or dark sides. I also
want to make sure we don't fall into single-factor explanations;
as the NII evolves, ten other important trends will be evolving
as well.
Third, in focusing on dark sides I'm wary of being typecast as
a technophobe. As I hope will become clear, my stance is more
complex and ambivalent than that, and I am quite enthusiastic
about the light sides that I do see.
Fourth, very little is known with any certainty about these
matters. The reality is evolving daily, and empirical research
is having a hard time keeping up. The argument I'll make here
rests on an extensive patchwork of different kinds of evidence,
but it is surely an oversimplification in many ways.
Fifth, from the point of view of analyzing workplaces, what's
crucial is not the NII, or National Information Infrastructure,
but the GII, or Global Information Infrastructure.
And sixth and finally, it is not at all easy to define what we
mean by a workplace. We want to be sure to include places like
kitchens that have often been neglected for their historical
associations with women's work, as well as places like commercial
trucks, airline seats, and hotel rooms that are increasingly
connected back to a mobile worker's home organization through
wireless and other forms of modern communications.
These points having been made, we're in a position to put the
emerging workplace in some kind of larger context. I want to
approach the topic of workplaces stealthily, starting with a
general consideration of the place of computer networks in the
global economy.
What do computer networks do? Or, more precisely, what do
computer networks allow people to do? For one thing, computer
networks contribute to a generalized decrease in transaction
costs. This effect is uneven, of course, being most intense in
finance and only starting to emerge in areas like legal services.
At the same time, computer networks also contribute to a
generalized decrease in coordination costs. As a result, we can
expect to observe a very complex pattern of structural changes in
virtually every industry.
Generalizations about these things are bound to be flawed,
particularly given our current state of knowledge, but some
broad themes are starting to become clear. As experience grows
with large-scale technologies of coordination, power shifts
increasingly to globally coordinated firms that have the capacity
to orchestrate sharp global competition among their suppliers.
These firms have a strong incentive to outsource everything
except their knowledge-intensive core competencies and to
rationalize and standardize their activities to obtain the
maximum advantage from their global scope. Production processes,
including formerly concentrated activities such as design,
are broken down into smaller units, which are then distributed
globally wherever they can find the optimal combinations of
infrastructure, wages, skills, and political conditions.
Within organizations, as a general matter, networking facilitates
two simultaneous trends that in the older regime of Fordist
assembly-line production would have seemed contradictory,
namely a decentralization of operational decision-making and a
centralization of organizational control.
How does computer networking facilitate these things? That's
the question that will let us get the new workplace in focus.
In particular, it's the question that will let us get the
potential "dark side" of this new workplace in focus. In recent
times concerns in this area have been articulated in terms of
"workplace privacy", and the metaphors for thinking about these
concerns have been derived from historical experiences of the
secret police: the Big Brother boss is watching you, for example
by reading your e-mail, or listening to you, for example by
tapping in on the conversations of telemarketing workers and
phone operators.
These phenomena are real enough, although their extent and
significance has been debated. Yet the underlying metaphors,
while useful enough up to a point, nonetheless really do not
allow us to grasp the shifting reality of the workplace in the
globally coordinated economy.
Instead, I think, we have to back up to the deep logic of
computer system design as it is currently taught and practiced.
This logic seems simple and compelling. In order to support
an activity, a computer has to represent it. And in order
to represent an activity, a computer has to, as the computer
people say, "capture" it. And in order for *this* to happen,
the activity must be reorganized in a way that permits it to
be captured by a computer. A great diversity of technologies
is rapidly arising to support this process, based on accounting
software, bar codes, smart cards, radio-frequency tracking
devices, and much else. Whereas formerly system design meant
something closer to one-user-one-machine, now it means the
overlapping of globally coordinated human activity systems with
globally distributed computational processes.
It's not very useful to think of these schemes in Orwellian
terms, as oppressively detailed surveillance installed for the
simple purpose of oppression. Rather it's the playing-out of a
technical logic within an evolving market structure.
We can make this concrete in the context of Total Quality
Management and related schemes, which employ to one degree
or another what I regard as the two crucial elements of the
new workplace, namely empowerment and measurement. Work
activities can be measured to the extent that they are
captured, thus ensuring centralized control, and competition
with other suppliers removes some of the need for old-fashioned
direct discipline, thus making room for local operational
decision-making authority and creating pressure for continuous
local innovation.
This situation, obviously, is not all bad. The reduction of
direct discipline and the creation of space for local initiative
are raising skill levels and sometimes genuinely improving
working conditions. At the same time, the thoroughgoing tracking
of work activities and the ceaseless competitive pressures
organized by global coordination can, in very short order,
introduce severe new pressures and a great deal of additional
insecurity and instability. This sort of thing cannot be good
for anyone's health, much less their family life.
This, it seems to me, is where we discover the "Dark Side of
the NII in the Workplace". What can be done? To the extent
that computer system design imposes detailed tracking on human
activities out of simple habit, just because that's how the
design methods *work*, standardization of different design
methods, for example based on cryptographically enforced
anonymity, might help. Yet while these methods may actually
take hold in some consumer and commerce contexts, employers have
little incentive to employ them in workplaces, not least given
the enormous inertia imposed by the existing dominant standards.
The real solutions will be found, I think, precisely in what
I think of as the "light side" of the NII, namely its use by
ordinary people and nonprofit organizations as part of the
current flowering of global civil society and the rediscovery of
democracy. By this I mean democracy in the broadest sense, of
people coming together to take some control over their own lives.
Along with the growth of globally coordinated industry, we're
also witnessing the rise of global coordination among the people
who work in industry. As economic growth brings pressures for
political freedom in countries like China, much of this newly
released democratic energy will be channeled precisely into
the use of new-generation communication technologies for global
solidarity work in the union movement. All of those people doing
high-value work for low pay will want the high standard of living
that we've historically enjoyed in the United States, and they
are going to figure out how we got it -- through education and
union organizing. And over the Internet I bet they'll teach us a
lot about how to get it back.
A short reading list:
Philip E. Agre, Surveillance and capture: Two models of privacy,
The Information Society 10(2), 1994, 101-127. (See TNO 1(7).)
Stephen P. Bradley, Jerry A. Hausman, and Richard L. Nolan,
eds, Globalization, Technology, and Competition: The Fusion of
Computers and Telecommunications in the 1990s, Boston: Harvard
Business School Press, 1993.
Bennett Harrison, Lean and Mean: The Changing Landscape of
Corporate Power in the Age of Flexibility, New York: Basic Books,
1994. (See TNO 1(12).)
Mike Parker, Inside the Circle: A Union Guide to QWL, Boston:
South End Press, 1985. (See TNO 1(6).)
--------------------------------------------------------------------
The Internet meets the Constitution.
[This is an edited transcript of some remarks I contributed to a
discussion organized by the Intellectual Freedom Committee of the
California Library Association at the CLA's recent conference.]
The topic we've been assigned today is "The Internet Meets the
Constitution". As computer networks become a more important part
of the larger process of getting information to people, a wide
variety of social choices will be made about the nature of that
machinery and how the machinery functions as part of society.
The Internet is an important test case for this process because
it is simultaneously one of the technical wonders of the world
and one of the world's greatest spontaneous experiments in
democracy. I will explain why I believe it is crucial for
librarians to take a leadership role in guiding the future
development of the Internet and information infrastructure
generally, but first I want to focus for a moment on the more
specific advertised topic of the Internet and the Constitution.
I want to make clear that I am not an attorney and that I cannot
quote chapter and verse of the law in this area. That's not such
a great handicap at the moment, though, since there simply *is*
very little settled law in this area at all. This is assuredly
going to change as more social life starts happening on the net
and more of the conflicts of that life move into the courts.
Nonetheless, it is my personal belief that librarians can expect
very little from new Constitutional law for the issues that most
concern them in the world of computer networks.
Partly this is due to the growing conservatism of the Supreme
Court, a trend that will probably continue, steadily if not
rapidly, for the rest of this decade. But it is also due to the
nature of the issues that are arising. Let me illustrate this
with a quick tour of five issues that concern librarians, most of
which arose in the discussions leading to this panel.
First, equal access to information for everyone. We're
all agreed that this is a good thing. But as information
increasingly becomes a commodity, equal access to information
becomes an entitlement. While a certain amount of due process
and equal protection might be found here, the courts are unlikely
to expand any kind of entitlement except through their review,
interpretation, and enforcement of particular legislation.
Second, ownership of information. This is a rapidly evolving
area, with a great deal of policy action going on in the Clinton
Administration right now which I urge you to learn more about.
The resulting proposals may include a variety of affirmative
requirements for organizations such as libraries to protect
the information property of others. The Republican Congress
is likely to support or even strengthen these proposals, and the
courts are unlikely to interfere to any significant degree on
First Amendment grounds or otherwise.
Third, privacy of communication. Much of the protection we
currently enjoy in this area derives from the 1986 Electronic
Communications Privacy Act. It has been a long time since
the Supreme Court has expanded its Constitutional privacy
jurisprudence, and some of the key precedents in this area are
built on complex interpolations of the First, Fourth, Fifth, and
Fourteenth Amendments that are highly vulnerable to limitation
in cases over the next few years. Privacy torts are in even
worse condition, and the courts do not seem to be accepting
academic arguments for an expanded tort law of informational
privacy, though some test cases may come up concerning
secondary uses of credit information and the like. Workplace
communication is receiving very little protection, not least
because the management owns the machinery. Most of the Internet
is in fact private property, and this fact bodes ill for broad
Constitutional protection for communication privacy, particularly
in workplace settings. Much remains to be seen, though.
Fourth, access to new technologies. It is widely held that
access to new-generation networking technologies is a social
justice issue. Historically this interest has been addressed
not through Constitutional law but through the universal service
provisions of the 1934 Communications Act. Attempts to update
that act failed in the last Congress, largely due to incoming
Majority Leader Bob Dole's opposition to updated universal
service and public access set-aside provisions. It is unlikely
that such provisions will even get out of committee in the
next Congress, and just as unlikely that the Supreme Court will
override the will of the legislature in this area.
Fifth, freedom of speech, press, and assembly on the net.
Some useful academic theory is being developed in this area,
and a number of cases have already been decided in the courts.
The outlook here is fairly good, but two crucial issues have
not been subjected to serious Constitutional test, namely the
scope of who counts as the press in cyberspace and the capacity
(or indeed, perhaps, the responsibility) of network owners and
service providers to restrict speech, press, and assembly within
their own domains.
The foregoing outline of Constitutional issues has been rapid and
oversimplified, and once again I do not want to present myself as
a final authority here. No doubt the situation is a little more
complex than I have made out. Nonetheless I hope you'll at least
consider the possibility that the future of information access in
a networked world is going to unfold not through Constitutional
guarantees but through organizing, action, and education in other
areas.
The main "other area" I want to consider here is what I call
the "architecture of information access". This is not just
the architecture of information machinery, though it certainly
includes that. And it is not just the architecture of
information itself, for example in cataloguing and interfaces,
though it crucially includes that as well. Much more generally,
the architecture of information access includes the whole network
of social relationships that surrounds and organizes the social
process of getting and using information. This includes schools,
bookstores, war stories told by coworkers, rumors on the street,
traditions passed from old to young, the press and specialized
commercial information delivery firms, and much else. From a
social justice standpoint, though, perhaps the crucial link in
the chain is the professional who knows about both people and
information, and about the hundreds of practical circumstances
that either connect people to information or else fail to connect
them.
The rise of information technologies is bringing us many new
efficiencies and opportunities, but it only makes more complex
and more crucial the architecture of information access. Now in
addition to all of the above we have computer user groups, school
classes and after-school computer clubs, local computer gurus,
the whole on-line community, friends and coworkers helping one
another to get computer-based work done, system and interface
designers, and much else. What is the role of information
professionals in this whole network? It is a crucial role,
obviously, because all of the new complexity of information
access makes it even less inevitable that people will get
connected to the information they need. The amount of knowledge
needed to connect people to information in the new world is
staggering, and that knowledge only grows through the experience
of actually doing it and reporting back to the profession on what
is happening.
Many technical people are wholly unaware of this phenomenon.
They are designing the net with little awareness of the complex
social architecture of information access. As library automation
specialist Karen Coyle points out, the Internet as it stands
is an amateur job. There's plenty of information, but it's
largely disorganized, with only the most haphazard provision
for professional help in connecting people to information.
This has to change, and it has to change soon before anti-social
technical standards become entrenched through widespread use and
commercialization.
What can librarians do about this? Plenty. Two things need
to happen hand-in-hand: experimentation and publicity. My
colleague, infrastructure policy expert Francois Bar, emphasizes
the crucial role of end-user experimentation in defining the
network architecture of the future. These experiments can have
a huge impact on the world through publicity. This means giving
presentations and demos to community groups, holding events and
sending out press releases, and making code and documentation
available on the net.
But above all it means organizing: going out in the community
and building an active constituency for information access
and intellectual freedom. Organizing is the only way anything
has ever changed in the world, and it's the only way we're going
to ensure that the democratic potentials of new information
technologies become real in our community and our nation the day
after tomorrow.
--------------------------------------------------------------------
Bouncemail top ten.
In running a large mailing list for the past year or so, I
have become acquainted with a depressing variety of dysfunctional
mail handling software. I've gathered here my top ten least
favorite phenomena in hopes that a Universal Union of Large List
Maintainers might spring up to force them to get fixed:
10. Mailers that give intermittent "user unknown" messages
for users who perfectly well exist, perhaps because they
cannot detect transient local network problems well enough
to postpone delivering mail.
9. The confusion over the Errors-To: field, which sure
seems like a good idea to me but which apparently is not
part of the standard. It is supported by most but not
all mailers. If it didn't exist then I'd have to run my
mailing list from a separate account.
8. Mailers that generate messages lacking well-formed
headers, most commonly addresses like "someone@local"
without proper domain information.
7. Mailers that tell me "Press F1 for help with VNM error
codes" even though my function keys are unlikely to be
programmed the same way as they are for users at the
site that generates the bouncemail message. In general,
mailers designed on the assumption that all senders and
recipients of messages would use that same mailer --
particularly when the mailer in question does not think in
terms of standard IP domain formats.
6. Mailers that complain that a certain message could not be
delivered but do not specify who in particular the message
could not be delivered to. Also, mailers that complain
that a forwarded message could not be delivered without
providing any indication of what address(es) the message
was forwarded from.
5. Vacation programs that respond to bulk or mailing-list
mail or that do not keep track of who they've replied to,
with the result that I get batches of spurious vacation
messages (sometimes in German) as each holiday approaches.
4. Mailers that generate mail that cannot be replied to.
Sometimes a message says "From: Fred_Q_Smith@foobar.com",
even though the user's account is actually called "fqs".
Sometimes I have no idea why I cannot reply to a message,
and the mailer offers me no help in figuring it out.
This is particularly annoying when the sender in question
starts sending further messages to the effect of, "you
should reply to my messages, you rude person!" It is
even more annoying when the machine that generated the
bogus message does not have a "postmaster" alias defined.
3. Mailers that take a month before giving up on the delivery
of messages to a missing user, whereupon they initiate
a monthlong stream of error messages, individually, for
every one of the messages I've sent in the last month.
2. Mail-reading programs that automatically generate a little
message to the effect of "so-and-so read your message
about "routine administrative notes" on December 3rd at
08:41" -- even when the message was sent to a mailing list
and not directly to the person reading it. The people
whose mail readers generate these messages are usually not
aware of them, and their site maintainers usually do not
know how to shut them off.
1. The astoundingly baroque and uninformative error messages
that I have gotten from the Novell mailer.
Of course errors happen. The basic point here is that the error
messages are so incomprehensible, so incomplete, so inconsistent,
and so difficult to adjust or control. The right way to do this,
in my view, would be for mailers to be talking to one another and
maintaining updated status tables for the process of delivering
(or not delivering) each message. A reasonable amount of useful
information could travel over these lines of communication, and
my mailer could consequently provide me with some significantly
more useful functionalities. Imagine a GUI interface with a
window showing the messages that got bounced, deferred, and so
forth. And imagine that I could just click on each one to say,
in one nice clean operation, "okay, let's just take this person
off the mailing list, send them a nice explanatory note in case
they're magically back on-line, and expunge from the system all
remaining traces of existing messages from me to them or error
messages from these mailers about them".
--------------------------------------------------------------------
This month's recommendations.
Campaigns and Elections. You must go read the December/January
1995 issue of the US magazine "Campaigns and Elections" ("The
Magazine for Political Professionals"). It's a special issue on
"grassroots lobbying", the practice of mobilizing and organizing
constituencies of "ordinary people" to pressure legislators on
specific issues, or issues affecting specific interest groups.
Of course, people have mobilized and organized themselves and
one another since the Stone Age. What's different now is the
rise of professionalized commercial firms that go out and create
grassroots movements for paying customers. Numerous such firms
have advertisements in this issue of C&E, and the issue would
be worth the $4.50 cover price for the ads alone. The issue even
includes a four-page "Grassroots Lobbying Buyer's Guide" listing
well over a hundred companies. In short, C&E is the cheapest and
easiest window onto the extraordinary distortion of democracy in
modern times, so check it out. (Ten issues a year, $29.95, 1511
K Street NW #1020, Washington DC 20077-1720.)
Kevin Phillips, The Politics of Rich and Poor: Wealth and the
American Electorate in the Reagan Aftermath, New York: Random
House, 1990. My car apparently having blown a gasket in its
exhaust manifold on Christmas, I spent Boxing Day at home reading
Kevin Phillips and Friedrich von Hayek in alternating chapters
with Rush Limbaugh's "The Way Things Ought to Be", seeking
some clue as to the nature of the vacuum currently being filled
in American political culture by the sophistry, mendacity, and
cruelty of the latter's muddled declamations. More about Hayek
another time, but I must say that the experience expanded my
already awestruck respect for Phillips, who is the foremost
student of American electoral politics. (Everyone who reads
Campaigns and Elections reads Phillips as well.) Despite his
being a Republican, he is merciless in his dissection of the
unfortunate structural changes in American society during the
1980's, and acute in his historical comparisons to the 1880's
and 1920's, among other relevant decades -- and not just in
generalities, but region by region and sector by sector. So now
I guess I'll have to get his new book, whose title is "Arrogant
Capital" -- the word "capital", I gather, referring to economic
and political elites equally.
Bob Scher, The Fear of Cooking, Boston: Houghton Mifflin, 1984.
Not a cookbook but a book about how to cook. This is the book
that got me past following recipes to being awake and aware in
the kitchen, able to cook without a recipe and able to diverge
confidently from recipes when the situation demands. Its motto
is "it's right in front of you". Charmingly eccentric and well
observed, its lessons about tastes, smells, rules, messes, fears,
failures, and learning are all written from the standpoint of
experience -- a mortal person getting along in a real kitchen.
This book has gone out of print for some weird reason, but if
you pester the publisher and talk to the best used book store in
town, you might be able to track one down.
--------------------------------------------------------------------
Company of the month.
This month's company is:
Equifax
1600 Peachtree Street NW
Atlanta, Georgia 30309
phone: (404) 885-8231
You've probably heard of Equifax -- they're one of the largest
companies collecting and distributing credit information on
consumers. They are also the most sophisticated among such
companies in terms of their public relations. They invest real
money in activities like publishing annual surveys of public
opinion about privacy issues. You might have seen, for example,
a recent Equifax press release revealing that a majority of
the American public would be willing to create a database of
residents for purposes of regulating illegal immigration. This
is no doubt accurate, at least assuming that the public is not
yet fully informed about the downside of such a proposal, but
the fact that they selected *this* number as the lead on their
press release provides some idea of the subtle game they play.
I recommend that everyone learn about the rhetoric and methods
of public relations around privacy issues, and an easy way to
get started is by obtaining and carefully studying Equifax's
materials on the subject. You'll find, of course, that they do
in fact have some valid arguments and that they do engage in some
responsible practices. The subtle thing is how privacy issues
are framed in the first place, and this is a matter best studied
through careful, repeated readings of the text, without having
to determine right away whether the facts and arguments being
offered are correct.
Try to defamiliarize the text in as many ways as you can.
Ask, how do the facts and arguments *work*? What is it like
to read them? With Buddha-like detachment, take note when you
find yourself adopting their questions as your own or thinking
"gee, I never thought of it that way". Read the text out loud
to some writers and artists and solicit their instant reactions.
Look up the etymologies of the words in a dictionary. Notice
the metaphors (fluids, conduits, forces, measurement, vision,
etc) and extrapolate them. How else might they have written it?
What implicit ideas do they have about ordinary people and their
beliefs and concerns about privacy? What implicit ideas do they
convey about the nature and structure of the personal information
industry? Gather a batch of reactions to the text based on such
questions -- it helps a lot to write them down as you go along.
Then sleep on it and send some relevant Internet discussion group
a message reporting what you've discovered.
(Of course, you can do all of these things with my own writing
as well, or the writing of anyone else expressing concerns about
privacy issues. It's just that theirs is much more interesting.)
Do not, however, harass the people at Equifax -- only request
their position statements on privacy issues if you genuinely wish
to read them. Thanks very much.
--------------------------------------------------------------------
Follow-up.
A couple of people from the Washington public interest community
responded to my discussion of Issue Dynamics Inc in TNO 1(12).
They pointed out that the founder of IDI, Sam Simon, far from
being a corporate PR person, is a long-time associate of Ralph
Nader, and they were particularly pained by my having mentioned
IDI in the same breath as Newt Gingrich. I didn't mean to
equate the two. The fact is, though, that IDI talks and acts
like a fairly sophisticated public relations firm operating
on the Internet, and my main goal was to educate net people
on the nature of PR work so that they can make their own fully
informed judgements about it. At the same time, these folks
correctly point out that IDI has associated itself with a number
of good causes, such as the Brock Meeks defense fund. I'm not
saying that it's a simple picture; I just want everyone to have
the facts to evaluate the picture for themselves.
As a footnote, one of my correspondents suggested that IDI's site
is called idi.net because IDI considers itself an Internet access
provider, and many access providers use the .net. I must admit
I had not thought of that. At the same time, it doesn't explain
wireless.policy.net.
The Chronicle of Higher Education is now on the Internet at
gopher://chronicle.merit.edu:70/1/
The first bona fide web artwork that I've seen and liked is "Life
With Father" by Joseph Squier. Its URL (which I've broken over
two lines because it's long) is:
http://gertrude.art.uiuc.edu/ludgate/the/place/stories/
life_with_father/Life_With_Father.html
It'll work better if you have a Macintosh with a large screen and
a fair amount of memory.
The EFF archive includes a nice concise how-to on lobbying.
Look in this directory, which has some other useful stuff too:
http://www.eff.org/pub/EFF/Frontier_Files/EFF_Files/Activism/
The lobbying file is called lobby_techniques.faq
The folks at LLNL have an extensive set of telecom net resources
indexed at http://www-atp.llnl.gov/atp/telecom.html
Plus more random stuff at http://www-atp.llnl.gov/atp/link.html
David Chaum's Scientific American article on digital cash is
available at http://digicash.support.nl/publish/sciam.html
Al Whaley <al.whaley@sunnyside.com>, who runs the CPSR gopher
and web pages, has been accumulating the messages to the Red Rock
Eater on-line. The URL is http://www.cpsr.org/cpsr/lists/rre
The Supercomputing '95 conference is going to be in San Diego
in December, chaired by Sid Karin of the San Diego Supercomputer
Center. They want to have a thoroughly wired conference, which
should be interesting. Check out their web pages at this URL:
http://sc95.sdsc.edu/SC95
In case anyone is interested, I've made web pages out of my
thirty-odd contributions to Risks this year. The URL is:
http://dlis.gseis.ucla.edu/people/pagre/risks-94.html
--------------------------------------------------------------------
Phil Agre, editor pagre@ucla.edu
Department of Information Studies
University of California, Los Angeles +1 (310) 825-7154
Los Angeles, California 90095-1520 FAX 206-4460
USA
--------------------------------------------------------------------
Copyright 1995 by the editor. You may forward this issue of The
Network Observer electronically to anyone for any non-commercial
purpose. Comments and suggestions are always appreciated.
--------------------------------------------------------------------
Go back to the top of the file