صور الصفحة
PDF
النشر الإلكتروني

Marx, Reichman / COMPUTERS AS INFORMANTS 449

automatic deposit until 1981. During that time her daughter drew on the money that was regularly deposited in her deceased mother's account. This seems to involve a lesser degree of moral turpitude than cases where the deceased's signature is forged directly on the social security check. As with the above welfare cases, should such unwitting government encouragement in a violation be treated the same way as more autonomous violations?

20. See, for example, Westin and Baker (1972), Rule et al. (1980), and Perrolle (1983), for treatments of privacy and computers.

21. For example, in 1983 a federal judge in the District of Columbia ruled that a form mailed to 4 million social security recipients “makes a mockery of the consent requirement." The crippled, blind, and disabled recipients of supplemental security income were led to believe that their assistance might be denied if they refused to authorize access to their otherwise confidential tax returns.

22. For example, U.S. Department of Health and Human Services auditors found that the Social Security Administration's system for transferring large volumes of data between centralized computers and local offices could be improperly accessed rather easily. This was also the case for access to Social Security Administration terminals (U.S. Department of Health and Human Services, 1981:

11).

23. For a discussion of the politics of conferring “routine use” status, see Kircher (1981).

24. For example, Office of Management and Budget guidelines for federal matching programs require that information concerning “routine use" matches be published in the Federal Register in reasonable proximity to their implementation. Technically, those subject to data searching are given notice in this way. However such publication requirements may have little meaning, since those subject to data searching are unlikely to read the Federal Register. Furthermore, "the reasonable proximity" requirement does not assure publication before the search is implemented. For example, a match conducted on federal student loans in August 1982 was not published in the Federal Register until December 1982 (U.S. Senate, 1982: 182).

25. What is often the fait accompli and incomprehensible and hidden nature of the process for determining guilt may show some parallel to the use of witches and trial by ordeal and other magical means for determining guilt.

26. For example, see U.S. Senate (1982: 4-40).

27. One difficulty in assessing impact is whether or not the rates of infraction stay the same. For example, 1981-1983 saw a significant increase in the use of systematic data searching and a concomitant rise in the discovery of fraud. But it is difficult to know how much of this is due to better discovery and how much to a worsened economy that may have resulted in increased rates of fraud.

28. Undercover means, for example, are expensive, restricted in scope, intrusive, and may "discover" crimes that would not have occurred were it not for the instigative activity of the investigation. Yet they can make discoveries not possible with other means. The investigator can exercise considerable initiative over the process. In contrast, efforts to increase citizen reporting are still relatively passive and dependent on whether or not, and with what, citizens choose to come forward. Undercover means are inexpensive and can cover a broad range of persons and areas. Anonymous means such as hotlines can encourage responsible as well as irresponsible accusations. Systematic data searching can be broad in scope and

450 AMERICAN BEHAVIORAL SCIENTIST

relatively inexpensive, and can avoid problems such as generating crime or maliciously inspired accusations, but, as noted, it has other costs.

29. Of course, keeping it a secret may work against the goal of deterrence. An implicit choice may be made between minimizing neutralization and maximizing deterrence. One solution is to hint at the powerful means of discovery being used without being specific. But leaks and the experience of apprehended persons work against this.

30. Lipsky (1980: 122), for example, finds that the routinization of bureaucratic functions reduces the chance to discover unique circumstances requiring flexible responses. The problem is compounded when a computer rather than a human agent is involved. Reliance on the computer (or any other machine) as a surrogate for human decision making may permit violations that deviate from the average to go undetected.

31. For example, in using a social security number other than one's own the unsophisticated person may simply make up a number and run the risk of being detected because he or she has chosen a number that was never issued. But sophisticated offenders will simply take a genuine number belonging to someone else and use that. Their chance of being discovered via a match of claimed to real social security numbers is slight. On the frequency and ease with which false identification is used, see the Report of the Federal Advisory Committee (1976).

32. This depends on the relative distribution of offender types. There is likely to be significant variation across offenses.

33. Beyond pushing toward discovery of a particular type of offender within an offense category, the computer may subtly influence the type of offenses to which police devote their energies. For example, a former chief of the Kansas City Police Department believes that computerization has led to an undue focus on minor offenses (unregistered cars, parking scofflaws) that can be dealt with very efficiently at the expense of other more important and difficult to solve crime problems (cited in Goldman 1983). The effectiveness of the means becomes an important, and often barely recognized, factor in deciding what ends will be pursued.

REFERENCES

ALTHEIDE, D. (1975) "The irony of security." Urban Life 4: 179-195.

and J. JOHNSON (1980) Bureaucratic Propaganda. Boston: Allyn & Bacon. Arson News (1981) "Arson control has most successful year." January. BLACK, D. (1980) The Manners and Customs of Police. New York: Academic. BURNHAM, D. (1983) The Rise of the Computer State. New York: Random House.

COHEN, S. (1979) "The punitive city: notes on the dispersal of social control." Contemporary Crises 3, 4: 339-363.

FOUCAULT, M. (1977) Discipline and Punish: The Birth of the Prison. New York: Pantheon.

GOLDMAN, D. (1983) "The electronic Rorschach." Psychology Today (February): 36-43.

Marx, Reichman / COMPUTERS AS INFORMANTS 451

GREENWOOD, P. (1982) Selective Incapacitation. Santa Monica, CA: Rand Corporation.

KATZ, J. (1978) "Concerted ignorance: the social construction of cover-up." Urban Life 8: 295-316.

KIRCHER, J. (1981) “A history of computer matching in federal government programs." Computerworld (December 14).

KUTTNER, B. (1983) "The declining middle." Atlantic (July): 60-72.

LAUDON, K. C. (1983) "Data quality and due process in large record systems: criminal record systems." Communications of the Assn. for Computing Machinery.

LIPSKY, M. (1980) Street Level Bureaucrats. New York: Russell Sage.

MARX. G. T. (1983) “Notes on the discovery, collection and assessment of hidden and dirty data," in J. Kitsuse and J. Schneider (eds.) Studies in the Sociology of Social Problems. Norwood, NJ: Ablex.

-(1982) “Who really gets stung: some questions regarding the new police undercover work." Crime and Delinquency 28: 165-193.

(1981) "Ironies of social control: authorities as contributors to deviance through escalation, nonenforcement and covert facilitation." Social Problems 28: 221-246.

MAWBY, R.I. (1981) “Overcoming the barriers of privacy." Criminology 18: 501-521. National Legislative Conference on Arson (1982) Anti-Arson Manual. Columbus,

OH: Author.

New York Civil Liberties Union (1982) An Evaluation of New York State's Wage Reporting System: The Real Cost of Computer Matching. New York: Author. PARKER, D. (1976) Crime by Computer. New York: Scribner. PERROLLE, J. (1983) “Computer generated social problems." Presented at the meeting of the Society for the Study of Social Problems, Detroit. President's Council on Integrity and Efficiency (1983) A Summary Report of Inspectors General's Activities. Washington, DC: Government Printing Office. REICHMAN, N. (1983) "Ferreting out fraud: the manufacture and control of fraudulent insurance claims." Ph. D. dissertation, Massachusetts Institute of Technology.

REISS, A. (1971) The Police and the Public. New Haven, CT: Yale Univ. Press. Report of the Federal Advisory Committee on False Identification (1976) The Criminal Use of False Identification. Washington, DC: Government Printing Office.

REUTER, J. and J. RUBENSTEIN (1978) “Fact, fancy and organized crime." Public Interest: 45-67.

RULE, J., D. McADAM, L. STEARNS, and D. UGLOW (1980) The Politics of Privacy. New York: New American Library.

SELZNICK, P. (1948) “Foundations of the theory of organization." Amer. Soc. Rev. 13.

SILBEY, S. and E. BITTNER (1982) *The availability of law." Law and Policy Q. 4: 399-434.

SKOLNICK, J. and J. WOODWORTH (1967) “Bureaucracy, information and social control: a study of a morals detail,” pp. 99-136 in D. Bordua (ed.) The Police. New York: John Wiley.

SPITZER, S. (1979) “The rationalization of crime control in capitalist society." Contemporary Crises 2, 3: 187-206.

452 AMERICAN BEHAVIORAL SCIENTIST

STINCHCOMBE, A. (1963) “Institutions of privacy in the determination of police administrative practice." Amer. J. of Sociology 69: 150-160.

Technology Review (1983) “When computers track criminals.” April: 75-76. U.S. Department of Health and Human Services. Office of the Inspector General (1981) Annual Report. Washington, DC: Government Printing Office.

U.S. General Accounting Office (1982) IRS Can Do More to Identify Tax Return Processing Problems and Reduce Processing Costs. Washington, DC: Government Printing Office.

U.S. Senate, Committee on Governmental Affairs, Subcommittee on Oversight of Government Management (1982) Oversight of Computer Matching to Detect Fraud and Mismanagement in Government Programs. Washington, DC: Government Printing Office.

U.S. v. Harrison (1982) 667 F2d 1158, Fourth Circuit Court of Appeals. VAUGHAN, D. (1980) “Crime between organizations: implications for victimology," pp.77-97 in G. Geis and E. Stotland (eds.) White Collar Crime: Theory and Research. Beverly Hills, CA: Sage.

WESTIN, A. and M. BAKER (1972) Databanks in a Free Society: Computers, Record-Keeping and Privacy. New York: Quadrangle.

WHITESIDE, T. (1978) Computer Capers. New York: New American Library.

[blocks in formation]

You recently requested that the Department of Justice provide you with information concerning the prosecution of alleged Selective Service nonregistrants. The information provided below is current to March 18, 1984.

First, you asked how many names the Selective Service System referred to the Department of Justice and requested that such information be broken down by year.

In 1981, the Selective Service made 183 referrals. In 1982, the Service made 292 referrals. In 1983, the Service made three referrals of computer tapes containing information on possible nonregistrants. The first tape contained information concerning 5,151 possible nonregistrants; the second, information concerning 76,529 possible nonregistrants; and the third, information concerning 118,346 possible nonregistrants. 1/

Second, you asked how many of the referred names came from

a computer match performed by Selective Service.

The 1983 referrals overwhelmingly resulted from Selective Service's matching of registration records with state departments of motor vehicles records. However, such referrals also contain a relatively small number of names of persons who reported themselves as nonregistrants and of persons who were reported by others.

1/ The information on the tapes cannot be added together to determine the total number of nonregistrants since subsequent tapes contain the identities of possible nonregistrants from former tapes. Similarly, the final tape does not represent the entire universe of referred possible nonregistrants since it excludes previously referred persons who registered, were determined not to be within the registration class, or were previously selected by the Department of Justice for investigation and possible prosecution.

« السابقةمتابعة »