Turns out it's pretty easy to crash the lunch spread at the American Society for Industrial Security's annual convention. You just walk in, sit down, start munching on salad. I didn't set out to trespass--I only wanted to chat up some corporate dicks, ex G-men, and card-carrying government spooks when their guard was down, beef-tip gravy on their chins. The thing was, when I got busted (halfway through a stale roll), it wasn't by the so-called security specialists with the Efrem Zimbalist Jr. haircuts--it was by one of those superannuated babes with a cotton-candy coif who police the floor of the Las Vegas Convention Center.

And what better locale, by the way, for a convocation of gumshoes, rent-a-cops, drug-sniffing dogs, and keystroke monitors than surveillance-friendly Vegas, the desert home of swivel-mount ceiling cameras and heat-packing casino muscle? If you didn't immediately get the idea that the American Society for Industrial Security is a heavyweight organization to be reckoned with, the Stonehenge-size block letters dominating the lobby of the convention center might have clued you in. Looking about as foreboding as Stanley Kubrick's 2001 obelisk, they spell authority in four giant letters: "A.S.I.S." As in "kick asses." 

Based in Arlington, Virginia, just a brief Beltway jaunt from the Pentagon and CIA central, ASIS is the world's largest and oldest association for security professionals.

It boasts more than 24,000 members worldwide who are dedicated to defending management and company assets from the teeming threats from within and without the modern corporation. ASIS members work for Fortune

500 companies and multinational conglomerates like Coca-Cola, Kodak, Bechtel, Ford, and Disney, and, of course, America's élite law-enforcement agencies and spook hives--from the FBI and Secret Service to the CIA and NSA. According to the latest ASIS figures, more than half of the group's members spend between US$100,000 and $5 million per year on security, much of it to set up access-control systems and TV surveillance. When the FBI needs advice on foreign moles in the workplace, it turns to ASIS "to expand our understanding of industrial espionage," as FBI Director Louis Freeh recently put it. Here in Vegas, over the course of three days, nearly

13,000 crime stoppers, tech shoppers, and amateur gawkers will fan out on the convention floor to swap war stories and hawk amazing gadgets--each more diminutive and diabolically inventive than the gizmos in the previous booth.

Oddly, it's the professionals who cover for me when my gate-crashing fails. My table neighbor, a security-fence salesman from New Jersey (razor wire, barbed wire, electrified wire--your complete line of perimeter defense products), has recovered a wayward ID badge from the floor, and it's stuffed with official meal tickets. Mr. Perimeter Defense peels a coupon off the wad and saves me the embarrassment of ejection from the ASIS gathering. "Even though our business is security," he cracks, "sometimes you gotta break the rules."

Pretty easygoing guys, these latter-day Praetorian guards. Now imagine what would have happened if I had bombed into the cherry-paneled boardroom of one of their Fortune 500 clients, or if I had been an employee hell-bent on sharing a non-reciprocal luncheon engagement with the security-conscious CEO. At best--at best--I might have been wrestled to the ground and "pacified" with pepper mace, taser guns, or hand-held lasers that can "flash blind" perpetrators ("perps") for up to two minutes. After all, business is business. (One of the door prizes in the exhibit hall? A Browning shotgun. Leave your business card in the fishbowl.)

I had come to the ASIS conference not to breach lunch-time security, but to feast on the latest technology guaranteed to repel vengeful employees--the nest-feathering, profit-skimming, paper-clip-pilfering, gold-bricking, shoplifting, ax-grinding, monkey-wrenching malcontents. That's not to say that ASIS is concerned exclusively with bad seeds in the workplace. Judging from seminars with titles like "Radical Fundamentalism: Terrorism of the Future?" and "Sue Yourself: Before Someone Else Does," security professionals are nothing if not diversified in their occupational apprehensions.

But hands down, the favorite statistic traded in the cavernous exhibit hall is this one: "Eighty to ninety percent of your business theft is internal." Among the numerous vendors who might sound this klaxon is Mike Bolte, an engineering whiz at Diamond Electronics Inc., which networks cash registers to a computer server that "looks for unusual keypunching activity" and--when it finds likely monkey business--activates surveillance videocams at many of your Wal-Mart, J.C. Penney, and Eddie Bauer outlets.

As those venerable shamuses at the Pinkerton private-eye agency warn, "$15 to 25 billion a year is lost to employee theft." And those numbers climb to $170 billion a year as soon as you stop ignoring "losses from time theft that include bogus sick days, late arrivals, early departures, and excessive socializing on the job." Richard Heffernan, a member and past chairman of the ASIS committee on safeguarding proprietary information, submits, "Fifty-eight percent of the problem of misappropriation of information involves insiders."

The second most popular factoid bandied about by the merchants of corporate defense is no less worrisome: computer-data trashing and other economic sabotage is on the rise because of employee resentment in the era of corporate "downsizing."

As one lecturer puts it, "The so-called American dream--I don't think we have that anymore in most companies." What we have instead are disgruntled ex-employees and soon-to-be-ex-employees who will "steal, vandalize, spread rumors, tamper with products, screw with your computers, and urinate in the coffee pot," he warns.

Kvetch about Big Brother in the workplace to these guys and they'll call your attention to the thin blue line protecting innocent employees like you from the thin yellow line, better known as the ol' Sanka chamber pot. "That has happened twice," our lecturer dutifully adds, "as far as I'm aware." At least twice, judging from the mileage coffee-pot crime is getting as a conversational icebreaker. That's hot factoid Number Three, in fact, and to be sure, it was a hidden surveillance camera that exposed one such culprit in the heinous act. This, in case you missed it, was broadcast to the world on Hard Copy, or so several conventioneers feel compelled to tell me.

What kind of person would stoop to such abomination? "There are 2 million schizophrenic people in this country," our vigilant lecturer states, resuming his theme after digressing briefly into the realms of caffeine and purity of essence. "Not every one of them is extreme, but you've got to be prepared."

Roboboss

Like most everything else, industrial security is feeling the tidal pull of the information age. Whereas wary employers formerly hired platoons of human watchdogs, today a whole panoply of surveillance technology can handle the business of workplace monitoring at a fraction of the cost. Thanks to high-speed modems, cell phones, and ISDN lines, the boss can now tune into surveillance video from the office on his home PC or in his car. Digital "smart-card" keys "remember" which gateways employees have swiped their cards through. Is Homer Simpson malingering with the doughnuts in the break room again? Doh! Yes, according to this handy computerized audit trail of his peregrinations throughout the building.

"You can track how long employees are in any given area," explains Sandra Wagner, a salesperson for Advantor Corp., manufacturer of one such system. You can monitor them even at their computer workstations if you have them log in with their card key. If you really want to get fancy, in a Tom Clancy kind of way, there are proximity readers that can vet your ID cards up to 8 feet away, and a whole line of "biometric" devices that can scan your retina or iris, the length of your fingers, and even your weight, to make sure an impostor doesn't suddenly take up residence in your cubicle.

Many modern factories now require workers to log in at their heavy equipment "to see how long they use it," offers Wagner's colleague, Kevin Brooks. But doesn't that fuel the kind of employee resentment that can lead to stealing, rumor spreading, screwing with computers, java tampering, the whole nine yards? I ask. "You gotta do a little PR to the employees," Brooks explains. "Tell them it's for their protection. Say you don't want outsiders hitting the vending machines in the employee lounge." Brooks is no slouch when it comes to PR. "A lot of managers don't want to install video monitors," he explains. "I tell them, 'Why don't you tell your employees it's for their protection?'"

Says Richard J. Heffernan, who runs a security consulting firm in Branford, Connecticut: "Competitive advantage--that's how you sell security to the Roseanne crowd. You tell them that if they want to have a job down the road," they'd better be prepared to accept workplace security measures, including monitoring.

But why don't you just hire trustworthy people in the first place, the kind who don't require management by high-tech stakeouts? Well, it turns out that the security professionals have got that angle covered, too. There are dozens of consultants eager to hit the infobahn and run down crucial data on a prospective employee's past record--workers' comp claims, health insurance status, criminal rap sheets, proclivity to pocket

Post-it notes, general bad attitudes, you name it. Applicants can submit computerized evaluations via phone.

Though most "reputable" security firms shun legally sticky psychological surveys like the classic Minnesota Multiphasic Personal Inventory (which asks privacy-invading true/false questions such as whether applicants are strongly attracted to members of their own sex), they nonetheless promise to weed out the kleptos, schizos, nutsos, "time thieves," and general chip-embedded-on-shoulder types. A series of rapid-fire questions about a candidate's work history gives the prospective prevaricator little time to trump up answers.

Talk about your high-octane paranoia. There's enough of it on the show floor to keep the adrenal glands of G. Gordon Liddy, H. Ross Perot, and Oliver Stone throbbing for weeks. You'd think that the proletarian rabble was about to face the guillotine first thing Monday morning--well, make that Monday afternoon, after late arrivals and excessive socializing on the job.

To be fair, though, not everyone here is obsessed with Joe Lunchbox as the crime wave of the future. There are plenty of legitimate security wares that any large employer would be smart to look into--for example, revolving door "mantraps" equipped with metal detectors, essentially a Roach Motel for gun-toting loners. (A squad of South American corporate-security jocks was especially intrigued by this technology.) Then there are the shredders and disintegrators "approved for top-secret destruction," which have a certain harmless utility. There are also sensible bulletproof plexiglass shields-cum-teleprompters just like the ones Bill Clinton uses, semiautomatic pistols small enough to holster inside a Slurpee cup, and the latest in motion-sensing alarms.

For those extra-sensitive security concerns, George Wackenhut is on hand. Wackenhut is the founder of --not a fast-food franchise, as the name might imply, but the global-security concern that has been described as the CIA's favorite dirty tricks subcontractor. In 1992, a Department of Energy investigation into the illegal use of eavesdropping equipment at plants operated by Westinghouse and other nuclear energy contractors rooted up 147 electronic surveillance devices. One of the devices could listen in on 200 company phones simultaneously. The company responsible for planting many of the bugs? Wackenhut, of course, a firm with a reputation for leaning on employee whistle-blowers.

Grand theft tempo

But we're back to employee monitoring again. All secured roads seem to lead there, even when the concern isn't grand larceny but those management bugaboos: "long breaks, lack of productivity ... time theft." Which is why I'm surprised to find neither hide nor hair of electronic-mail letter openers, keystroke-monitoring programs, or other spying paraphernalia that are becoming so commonplace in the discipline gingerly referred to as "personnel tracking." Apparently, these tech tools are not exotic enough for licensed gumshoes.

But that's just the point! The fact that these technologies have become so routine means that any manager who purchases network-operating software is probably getting built-in snoop features. In an office hardwired with a server-based local area network managed by software such as Microsoft LAN Manager, a technically inclined boss or network administrator can turn any employee workstation into a covert surveillance post. So there's no need to call in the big guns from Wackenhut.

A recent ad for Norton-Lambert's Close-Up/LAN software package tempted managers to "look in on Sue's computer screen.... Sue doesn't even know you're there!" Often, however, software makers don't even need to advertise these "remote monitoring" capabilities, which allow network administrators to peek at an employee's screen in real time, scan data files and e-mail at will, tabulate keystroke speed and accuracy, overwrite passwords, and even seize control of a remote workstation, if they find it necessary. Products like Dynamics Corp.'s Peak & Spy; Microcom Inc.'s LANlord; Novell Inc.'s NetWare; and Neon Software's NetMinder not only improve communications and productivity, they turn employees' cubicles into covert listening stations. Other software applications count the number of per minute, the employee's error rate, the time it takes a worker to complete each task, and the time a person spends away from the computer.

Not surprisingly, the Orwellian potential of such technology has privacy advocates and working stiffs a bit paranoid. But are concerns about employee monitoring irrational? Remote monitoring certainly happens more frequently and routinely than we tend to think. In 1993, Macworld magazine conducted a study of CEOs and computer-systems directors and turned up some rather unsettling statistics. Twenty-two percent of the polled business leaders admitted to searching employee voicemail, computer files, and electronic mail. The larger the company, the more the snooping. Extrapolating to the workplace at large, Macworld estimated that as many as 20 million Americans "may be subject to electronic monitoring through their computers (not including telephones) on the job."

 

Potholes on the surveillance highway

As is often the case, the patchwork of regulations and laws addressing such new socio-technological wrinkles aren't exactly models of clarity. Although the US Constitution addresses privacy in the First, Third, Fourth, Fifth, and Fourteenth amendments, there's no amendment specifically guaranteeing it. While the courts have ruled that employers cannot monitor their workers' personal calls, the Electronic Communications Privacy Act of 1986 grants bosses a "business-use exception," which allows supervisory and quality-control monitoring. Practically speaking, that leaves a loophole big enough to fly a Stealth bomber through.

In 1993, the Computer Systems Laboratory of the National Institute of Standards and Technology issued a bulletin titled "Guidance on the Legality of Keystroke Monitoring." The report stated that the US Justice Department "advises that if system administrators are conducting keystroke monitoring or anticipate the need for such monitoring--even for the purposes of detecting intruders--they should ensure that all system users, authorized and unauthorized, are notified that such monitoring may be undertaken."

Still, ambiguity reigns, for the courts have yet to set a clear precedent on the legality of keystroke monitoring.

"It gets even trickier when you look at e-mail privacy," says Marc Rotenberg of the Electronic Privacy Information Center in Washington, DC. I dialed Rotenberg up several days after the Las Vegas convention. "Employees often think that they should have privacy in their personal electronic-mail communications," he explains. "But in practice, there really is no legal safeguard within the organization."

Several years ago, e-mail privacy advocates lost an important test case when a California judge ruled against Alana Shoars, a former e-mail administrator at Epson America Inc. Shoars alleged that her supervisor had printed out and read messages that employees had been assured were private. After she discovered the managerial snooping, Shoars was fired for insubordination, she said. The judge dismissed the case on the grounds that state privacy statutes make no mention of e-mail or the workplace.

The ruling has left civil libertarians glum about the future of e-mail privacy at work. Says Lewis Maltby, who runs the ACLU's workplace rights project, "We had the perfect set of circumstances: we had a wonderful plaintiff, we were in California of all places, and we had a great attorney. We lost. I don't think you're going to see any more e-mail litigation. If we can't win that case in California, we can't win it anywhere."

Telephone communications and e-mail have some protections under the Electronic Communications Privacy Act, but only insofar as they are carried out through a telco common carrier or commercial system such as CompuServe or MCI Mail. Internal electronic mail in the workplace is considered company property.

Stress under surveillance

Assorted studies have found links between employee monitoring and stress--both physical and psychological. A 1990 survey of telecommunications workers conducted by the University of Wisconsin and the Communications Workers of America found that 43 percent of monitored employees said they suffered a loss of feeling in their fingers or wrists, while only 27 percent of unmonitored workers had those symptoms. More than 83 percent of monitored employees complained about high tension as opposed to 67 percent of unmonitored workers. An earlier report by the Office of Technology Assessment also concluded that monitoring "contributes to stress and stress-related illness."

These studies are hardly news on Capitol Hill, where privacy advocates and employee unions have been pushing for fair-monitoring legislation since the mid-1980s. The latest attempt (1993's Privacy for Consumers and Workers Act) expired in Washington gridlock, a victim of the legislative coma brought on by the prospect of health-care reform (but also dinged by the manufacturing lobby). Privacy advocates say the bill will be back this session. It would require employers to tell new hires that they may be monitored via phone, computer, or e-mail. It would also force managers to notify workers when they are being surveyed--possibly by a beep tone or red light--and to explain how the data will be used.

"Employees have the right to dignity," submits Lawrence Fineran of the National Association of Manufacturers, the front-line foe of the bill. "But," he says, "the employer certainly has a right to any kind of data generated by an employee on an employer's time and on an employer's equipment."

"There need to be limits on how that kind of technology is used," counters Erica Foldy, former executive director of the Massachusetts Coalition on New Office Technology.

"We shouldn't re-create the company town," says Gary Marx, a sociologist at the University of Colorado who has written extensively on technologies "that can extract personal information" and threaten privacy. Marx argues that intrusive monitoring not only invites managerial abuse--providing cover for illegal attempts to thwart unionizing efforts, for example--it also elevates inequity in the workplace.

"This stuff often increases the gap between managers and workers," he says. "If managers really believe in monitoring, let's apply it in a more universal way and require managers to be monitored electronically." The economic "damage that can be done by a few corrupt or unprofessional executives is really far greater than somebody taking a little too long on a coffee break," he adds.

According to Marx, extractive technologies have upset another fundamental balance in the workplace. "Traditionally, on an assembly line, there would be a supervisor who would walk by," he explains, "and you knew who that person was. You also knew when he or she was there. That may have generated some anxiety, but in fact, you could gear your behavior accordingly. But now with the mediated and potentially unseen nature of this, it creates a sense of fear and stress, because employees really never know when they are being watched."

In other words, Big Bro could be tuning in any time.

Panopticon redux?

The prospect of total and constant surveillance may sound a bit like science fictional overkill, but the prototype of tomorrow's monitoring has the potential to do just that. You can find it--or more accurately, it can find you--at Xerox PARC in Palo Alto, California. Security is tight at "the PARC," where, after all, the latest edgy tech is conceived and test driven. Yet the security here is rather primitive, and the visitor's badge I'm wearing is, well, positively antique. It's handwritten on paper--and this in the proving ground of the paperless office. As I'm pondering this anachronism, I'm greeted in the lobby by Roy Want, a pleasant chap of 33 years whose boyish features and arched eyebrows suggest a certain capacity for mischief.

It's more than slightly ironic that Want hails from England, the former empire that gave the world Jeremy Bentham, philosopher of utilitarianism and author of Panopticon, or The Inspection House. Published in 1791, Bentham's treatise described a polygonal prison workhouse that placed the penal/industrial overseers in a central tower with glass-walled cells radiating outward. Mirrors placed around the central tower allowed the guards to peer into each cell while remaining invisible to the prisoners--a concept Bentham referred to as "universal transparency." Knowing that they were under surveillance--but not knowing for sure whether they were being watched at any given moment--prisoners would theoretically be on their best behavior at all times.

More than 200 years later, Want, a computer engineer, has essentially reinvented the Panopticon. More accurately, his brainchild, known as the would have made Bentham proud. Want's active badge, worn by some 50 researchers and staffers in Xerox PARC's Computer Science Lab, is about a quarter of an inch thick and 2 inches by 2 inches square. Clipped to a shirt pocket or belt and powered by a lithium battery, the black box emits an infrared signal--just like a TV remote--every 15 seconds. Throughout the computer lab at the PARC, infrared detectors are velcro-mounted to the ceiling and networked into a Sun workstation. Because each employee's badge emits a unique signal, Any other staffer can access that information on his or her personal computer.

Want explains to me that he developed the hardware while working at the Olivetti Cambridge research laboratory in England. His initial idea was to build smart telephones that forwarded calls automatically to the phone extension nearest a staffer at any given moment. But since defecting to Xerox PARC and working with a team to develop the system's "Birddog" software, he's discovered sundry new uses for the technology, he says. While privacy tribunes see active badges as an ominous new development in the brave new workplace, Want and his colleagues see them as "a double-edged sword," with the potential for both benign and malignant uses. "If you can build the system correctly with the appropriate privacy, encryption, and access safeguards, then I think you've built an acceptable system." At the PARC, management and staff have an agreement that the technology will not be used as an authoritarian carrot and stick. The badges are intended as tools to help staffers locate their "friends," as one researcher puts it.

Want is eager to stress the technology's limitations and the ease with which anyone can thwart its abuse. "At any point in time, you can take your badge off and leave it on your desk and go shopping if you want. You can also put it in your desk drawer."

Potential misuse of the technology is more than an academic concern now, for Olivetti is going commercial with the badges, marketing the gizmos to insurance companies, hospitals, and other large institutions with an interest in the whereabouts of key personnel or patients. About 70 researchers at two of Digital Equipment Corporation's research labs have also given Want's badges a trial run. Dave Redell, a researcher who has been outspoken about the badges, has mixed thoughts. "There's a strong feeling around a place like this that we're all colleagues," he says, "as opposed to having a rigid management hierarchy. Use of the badge is completely voluntary. In other kinds of workplaces, though, the potential for oppression is far greater. Even in a situation where you have an official policy saying that this is completely voluntary, it would be much easier for there to be a lot of pressure to wear these things at all times." Others, including the ACLU's Maltby, see active badges in more monochrome tones. "Like rats in a maze," Maltby mutters when I call him for a comment. "They want a pager that you can't refuse to answer."

Ubiquitous computing über alles?

PARC researchers are understandably excited about some of the more benign applications. As a companion piece to the badges, Want has developed a personal digital assistant he calls the PARCTab. About half the size of an Apple Newton, Want's palm-held PDA sends and receives wireless data signals to another network of infrared detectors salted throughout the building. It's part of Xerox PARC's "ubiquitous computing" project, an attempt to banish paper from the workplace. Want can program his personal assistant to trade e-mail and other files with his workstation, and he can access the Internet through his PDA anywhere in the building (except in the bathroom).

Want sees the tabs getting thinner and lighter. Each of us would have dozens scattered around the office, in the car, and at home. Detector "cells will start appearing in public places or the home," he says. "The device will tell you where you are, wherever you are."

Of course, it might also tell them where you are. Surely, that's a concept that's hardly foreign to wired world citizens. Cell phones made it possible for LA's finest to triangulate on O.J. Simpson during his slo-mo odyssey along the Disneyland freeway. And any time you use a credit card or make a long-distance phone call, you're essentially leaving a trail of virtual bread crumbs for the telcos, Visa, and law enforcers.

"There are always these trade-offs between what's useful and what could be done to us," says Want from the belly of the kinder, gentler Panopticon. "The benefits to be had are so great; we just have to be sure that the people who are in control respect our privacy."

I keep thinking of what the block-shouldered gumshoe from one of the major security firms told me in Vegas. Are there certain technologies and techniques that you guys aren't showing me? I asked. "Some things," he said, shaking his head at the naïveté of my query, "we aren't gonna broadcast here in public."