"HNC Developing New Air Security Software"

Paul E. Robichaux paul at robichaux.net
Sun Oct 7 17:58:45 PDT 2001


HNC made their nut selling neural networks to a variety of friendly
neighborhood TLAs and credit-card issuers. I suspect that their "new"
software is just a neural network trained with surveillance and ticketing
data. Hardly new.

-----Original Message-----
From: James B. DiGriz [mailto:jbdigriz at dragonsweb.org] 
Sent: Friday, October 05, 2001 4:11 PM
To: cypherpunks at einstein.ssz.com
Subject: "HNC Developing New Air Security Software"


Xeni Jardin wrote:

> The Reuters story follows, and the HNC corporate press release 
> announcing the project is here:
> 
> <http://www.hnc.com/hnc/PressReleases/index.cfm?PressID=112&attributes
> .f
> useaction=ShowRelease>
> 
> press release excerpt:
> 
> <<By detecting and scoring anomalous patterns in millions of 
> reservation records and other related data, the predictive software 
> could identify suspicious transactions. Flagged information can be 
> immediately investigated by experts to increase security and travel 
> efficiency.... With the ability to instantly analyze all available 
> structured data and unstructured data, airlines could proactively take 
> critical action related to passenger safety.
> 
> "By using high-end risk analytics and decisioning engines, we can help 
> airlines, airports and law enforcement agencies identify patterns that 
> warrant further investigation - without intrusive security measures," 
> explained John Mutch, chief executive officer of HNC. "Much of HNC's 
> technology research has been funded over the years by defense and 
> intelligence organizations. We're delighted to put this technology to 
> use to increase traveler safety."
> 
> HNC's Critical Action software, which uses anonymous mathematical 
> algorithms that cannot be reverse engineered, identifies patterns in 
> data that would not be noticed using any other method. HNC's 
> technology can scan structured and unstructured data, detect patterns, 
> categorize, prioritize and automatically route information to relevant 
> security agency personnel.>>
> 
> --XJ
> 

I'm dubious about the "anonymous mathematical algorithms that cannot be

reverse engineered" part, and I'm skeptical about the "we're gonna cork

up the mind of God and bottle it for those worthy/rich enough to afford

it" aspect. Sounds like snake oil to me.

Data mining, pattern-recognition, AI, ubiquitous surveillance, etc. are

just tools. The biggest danger, beyond flawed premises in the code, such 

as, for instance, ignoring second-order and higher observer loop effects,

or  beyond willful misuse, is GIGO. The central issues are still 

political, anyway. None of this matters if I'm not bothering you and you

come fuck with me, in other words. And, hey, two can play the same game. 

Thank you, Mr. Felsenstein, et al.

Choate, feel free to forward to psychohistory.

jbdigirz





More information about the cypherpunks-legacy mailing list