AT&T Invents Surveillance Programming Language 119
An anonymous reader writes "AT&T has long been associated with advances in the programming arts as well as communications. They've recently brought those disciplines together to create a powerful datamining language called Hancock. Hancock is a C variant developed to mine gigabytes of the company's telephone and internet records for surveillance purposes. 'The manual for the language includes a Hello World variant that shows you how to write a program that will parse logs of IP addresses and record them into permanent hashes. The program for parsing millions of records as they flow into permanent data farms sounds oddly close to the data mining the NSA performed after 9/11 to find targets for its warrantless spying on American citizens calls and emails."
Re:That's the last thing we need! (Score:5, Interesting)
less inflamitory, later it states:
It seems to have been created with slightly better intent (fraud detection, as well as, unfortunately, marketing - your phone company is spyware!).
A tool may not necessarily be bad, but it can have more bad uses than good, and may be been intended for rathern malevolent purposes. The rack comes to mind (although this language certainly isn't in that league).
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Consider, for instance, a baseball bat. Under normal useage, it's used to play a game. Sure, accidents do happen, sometimes erious, but these are minority cases. For the most part, it's all in fun.
Now consider that baseball bat in the hands of a crazed psychopath who thinks YOUR head is a baseball. See the difference?
Re: (Score:2)
The problem with power is that if it can be abused... It will be.
So it often behooves citizens to keep these tools out of the hands of the government as long as possible.
Not that it will make much difference in the end.
Re: (Score:2)
Anyway - just because it's possible to collect and mine data doesn't mean that the same tools can be used by the "bad" guys too to understand how the technology can be circumvented or made to be misleading.
But a new tool may find new surprising uses too, so there are nothing that can be considered completely bad by this tool.
Hancock.. worst name ever. (Score:5, Funny)
Re:Hancock.. worst name ever. (Score:5, Insightful)
Re: (Score:1)
Re:Hancock.. worst name ever. (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:1)
Is this data warehouse thingy they are using some kind of Memory Hole?
You're almost right (Score:5, Funny)
Re: (Score:2)
~X~
Re: (Score:1)
I agree that your suggestion is more reflective of reality, however.
Re: (Score:2, Funny)
John Hancock (Score:4, Interesting)
Jokes aside, is this related to John Hancock?
John Hancock was an American Revolutionary, one of the signers of the Declaration of Independence. He signed it as largely and boldly as possible, much larger than any of the other signatures on that document, so that the King of England would have NO trouble identifying him in the face of his (and his compatriots) clear act of treason. His name is now synonymous with autograph or signature, as in, "Can I have your John Hancock here, please?"
If the AT&T technical staff called their data mining "language" Hancock, it may have been a poetic choice: AT&T is signaling their actions, and/or the actions of the government agents, are akin to treasonous. Yes, the charge of 'treason' is nearly moot in modern US law, but the fact remains that any sensible reading of the Constitution would not indicate any authority for what the government is doing with our communications.
Re:John Hancock (Score:4, Insightful)
In other words, there would be no doubt as to who was behind the words coming from the machines. An involuntary Hancock as it were.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Has
Anyone
Noticed
COvert
Curveillance
Kode
Okay, it relies on typo's, but it works, sort of.
Ironic Name (Score:1, Insightful)
!constitution (Score:5, Informative)
Oblig. Animal House reference (Score:2)
Re:Ironic Name (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Funnily enough, Jefferson didn't actually "write" the preamble, so much as dictate it, and in his original vision our self-evident truths were: Life, Liberty and the pursuit of a penis. TJ didn't catch the goof in time, and the rest is our nonpenis-pursuing history.
Re: (Score:2)
Re: (Score:1, Offtopic)
Re: (Score:2)
Re: (Score:1, Interesting)
At a glance, it looks like a fairly cool graphing toolkit. Sure the sample apps are for marketing and "tracking terrorists." Seems like there are probalby tons of uses. Just like the bittorrent people always say... just because it's primarily used for breaking the law doesn't mean it doesn't have legit uses.
web server (Score:1, Funny)
Re: (Score:1)
Re: (Score:2)
Heard near Massachusetts... (Score:3, Insightful)
"Hey, what's that whirring sound?"
"It's the founding father [wikipedia.org] this programming language is named after...spinning in his grave..."
Re: (Score:2)
Re: (Score:1)
Unfortunately, we wouldn't be able to get a patent on it. Alas, perpetual motion machines are forbidden. (:
And what do facebook use? (Score:2, Interesting)
Variations (Score:5, Funny)
We are already working on:
Re: (Score:2, Funny)
Re: (Score:2)
Also used by NBC to datamine it's viewers.
Re: (Score:3, Funny)
Finally, the Mozilla Foundation has announced a datamining extension for it's popular Web browser called Firecock.
Re: (Score:3, Funny)
Don't forget:
Re: (Score:2)
Too long, people will have to abbreviate it GooCock or gCock.
Re: (Score:2)
Actually, that is YahooHancock and MSHancock. GoogleHancock is the one that absolutely requires a warrent to see the data.
Ummm.... (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Oh... you meant the other type of alien conspiracy. Sorry, AC, can't help you there. As entertaining as they are, the claims are extraordinary and require extraordinary proof, not fuzzy pictures of Halloween costumes.
correction for submission (Score:1, Informative)
Re: (Score:2)
Yup. For anybody curious, here's the (slightly garbled) research abstract for the paper published in 2000:
Hancock: a language for extracting signatures from data streams [ucla.edu]
Massive transaction streams present a number of opportu
nities for data mining techn
Hancock source code (Score:3, Informative)
http://www.research.att.com/~kfisher/hancock/ [att.com]
Conspiracy!
Don't worry! (Score:5, Insightful)
If you haven't done anything wrong, then you have nowhere to hide!
Whoops - I mean nothing. Nothing to hide.
Re: (Score:2)
What the govenrment cosiders wrong is subject to change at any time, without warning or restriction, you milage may very, contents may settle during rendition.
PS: As for your sig, how about "Conservatives: nominate Ron Paul, the ONLY Republican candidate who does not want to preemptivly start a thermonuclear world war III. Liberals: for the love of God, make sure none of those nut cases get into power."
Re: (Score:2)
Hello world (Score:5, Funny)
not a new language (Score:5, Informative)
Re: (Score:2)
A dialect?
Re: (Score:2)
I wonder if this will get some people into trouble when they try to get cute and build logs on government operations.
Damn. I cannot find the site, but there is one that essentially is titled "IP Addresses to NEVER Ping..." if you want to avoid trouble with the law. It contained thousands of addresses, hundreds of class group names, and these are held by universities, BBN, ATT, NSA, CIA, DEA, DIS, NIS, and all sorts of other alphabet soup letters.
Re: (Score:2)
*AFTER* 9-11? (Score:3, Informative)
Bottom line? 9-11 is irrelevant to their intent... 9-11 helped provide some justification in the eyes of some, but the evidence shows that this stuff has been planned WELL in advance of 9-11 and this is not a reaction or over-reaction.
Re: (Score:1)
Also I think after an act of war such as 9-11 the government can act quite fast.
Re: (Score:2)
Re: (Score:1)
Dood!!! While the post to you provides some rather obvious evidence --- have you been living in a cave these past five years???? The evidence - quite a bit of other stuff besides Nacchio's trial docs - has been popping up in the news media ever year. Don't you ever read -- or listen to any news????? This is a harsh criticism --- but please don't cry like a bedwetting Boehner (Senator from PA who only lasted four weeks in Navy bootcamp due to chr
Prior Art (Score:2)
Hello World in Surveillance Language (Score:3, Insightful)
Never has that program name been so fitting.
Re: (Score:2)
Kinda gives a whole new dimension to "Reach out and touch someone", doesn't it?
Proof? We don't need no stinking proof! (Score:2, Troll)
Ok, this is going WAY too far! Could you have at lease included some LINKS to actual PROOF that ANY government agency conducted warrantless spying on US citizens? I mean other than the FUD that the NYT and Democrats spread which also is not based on any actual proof. IIRC the wa
Re: (Score:1)
Re: (Score:2)
If they didn't do it, then why are they asking for immunity with the current legislation?
Re: (Score:1)
Nm. We'll just keep our heads in the sand... (Score:2, Informative)
Either you must be new to this whole inter-tubes thing, or you're a right-wing apologist who's been assigned to
How about you go through the huge mass of stories reference here on Slashdot alone [slashdot.org] before whining about what everyone else is up to speed on, that you personally have been ignoring all this time. That link points to a large number of articles that touch on the subject (and several more showing that sadly, the US isn't the only government attempting to bloom into full-blown fascism
Re: (Score:1)
Dood - you soooo obviously don't read - so please attend to the list below for a minimum of enlightenment!
21st Century Reading List:
The Bush Agenda by Antonia Juhasz, American Dynasty by Kevin Phillips, Blood Money by T. Christian Miller, Hostile Takeover by David Sirota, Armed Madhouse by Greg Palast, Brothers by David Talbot, Other People's Money by Nomi Prins, Confessions of an Economic Hitman by John Perkins, No Place To Hide by Robert O'Harrow, Screwed: The Undec
I sense a new meme! (Score:1, Funny)
Oh lord... (Score:2)
Hancock (Score:2)
I thought many of these ISP and ISP parent companies had stated officially that they had issues with excessive data retention (storage space, processing of the enormous data sets, legal issues, etc...). Now, this, from one company that is probably going to make some enemies.
What good (other than government surveillance and corporate marke
Did anyone read up on the language? (Score:4, Informative)
Also, it was created in 2000.
Its intent, as some have mentioned, was marketing.
Basically it does what Google Analytics or WebTrends does for the web.
It actually seems like a nice language, for those who want to quickly run through gigs of data.
I see nothing evil about the language itself.
It, like C, perl, PHP, or any other language you chose to use - Can be used for whatever purpose the programmer chooses.
Its intent was marketing, and almost every company in existence wants to know more about their customers.
Re: (Score:1)
Its basically just C with some generic structures thrown on top of it.
Also, it was created in 2000. Its intent, as some have mentioned, was marketing. Basically it does what Google Analytics or WebTrends does for the web.
It actually seems like a nice language, for those who want to quickly run through gigs of data.
I see nothing evil about the language itself. It, like C, perl, PHP, or any other language you chose to use - Can be used for whatever purpose the programmer chooses. Its intent was marketing, and almost every company in existence wants to know more about their customers.
Ok, let me enlighten you: there is a blue pill, and there is a red pill... oh, you've already taken one... nevermind
Hancock Written Before 2001 (Score:4, Insightful)
The US Government uses Linux, so are we to presume that Linus Torvalds is an agent of George Bush and the broad conspiracy to spy on you?
Re: (Score:1)
Hash indeed... (Score:2)
Sure, I can just imagine what the hash function is, based on AT&T's recent history:
AT&T may not have invented it entirely.... (Score:3, Interesting)
If you look here [findlaw.com] and research the case a bit, you'll find that a Maryland company may have actually been more responsible for ATT's abilities than ATT would like to admit. That company is now defunct, unfortunately, and so it's now safe for ATT to pretend that they've done work in the area without answering to more law suits.
It was a very technically challenging job. We helped to index records for these guys [lexisnexis.com] until mid-2005. We did it in effectively O(n) time - the cool factor was higher than the say-nothing factor.
And yes - I know that academia will claim that it's not possible, that data correlation must be O(n^2). For the decade that we did it, we were sure glad that academia held to that position.
Enough reminiscing.
A "new" concept? (Score:1)
Great Name!! (Score:2)
Ellen Hancock? (Score:1, Interesting)
http://en.wikipedia.org/wiki/Clipper_chip [wikipedia.org]
Wasn't Hancock the name of the academic stooge that was pushed front and center by the feds to shill for this thing, claiming that we could trust Bill & Algore with the key escrow? I seem to remember a fawining article in the ACM Communications pimping for the clipper chip.
I wanna say Ellen Hancock, former IBM and Apple exec, but her bio makes n
Hancock's Half Hour (Score:1)
Re: (Score:1)
Oh I love it. (Score:1, Interesting)
The system was built in the late 1990s to develop marketing leads, and as a security tool to see if new customers called the same numbers as previously cut-off fraudsters -- something the paper refers to as "guilt by association."
When I was hacking and phreaking back in 1980 to 1987 me and some friends were writing War Dialers for PC's, Apple II and C64's. We had something like 2000 people running our software round the clock, all working on finding long distance codes.
I started to notice patterns on how people would get busted.
Kid A finds a valid code.
Kid A calls his buddy Kid B using the code, and gives him the code.
Kid B then calls Kid A back using the code.
From there the dispersion of this code goes out exponentially for 2 week
What's the license? (Score:2)
The license clearly isn't BSD, but it could, conceivably, be GPL...depending on what the article writer translated into "Hancock's source code and binaries (now up to version 2.0) are available free to noncommercial users from an AT&T Research website. " (In the article t
Obligatory (Score:2)
Good one... (Score:1)
Alternate method for accessing the internet (Score:1)