1994-12-18 - Re: Processing data, information and knowledge

Header Data

From: “Ian Farquhar” <ianf@sydney.sgi.com>
To: cypherpunks@toad.com
Message Hash: 5594c1c304b509c14cc73676102940b1f6c6cb6f19a53b9d5f823b657faa1285
Message ID: <9412191024.ZM26819@wiley.sydney.sgi.com>
Reply To: <gate.cV7FXc1w165w@dxm.ernet.in>
UTC Datetime: 1994-12-18 23:38:34 UTC
Raw Date: Sun, 18 Dec 94 15:38:34 PST

Raw message

From: "Ian Farquhar" <ianf@sydney.sgi.com>
Date: Sun, 18 Dec 94 15:38:34 PST
To: cypherpunks@toad.com
Subject: Re: Processing data, information and knowledge
In-Reply-To: <gate.cV7FXc1w165w@dxm.ernet.in>
Message-ID: <9412191024.ZM26819@wiley.sydney.sgi.com>
MIME-Version: 1.0
Content-Type: text/plain


On Dec 16,  5:26pm, rishab@dxm.ernet.in wrote:
> The alternative comes strangely enough from the US
> National Security Agency. It has always been suspected
> that the NSA searches through e-mail traffic for
> 'sensitive' material, which for the large volumes involved
> would require considerable help from computers.

I always imagined that the development of the algorithm itself
predated email, and started back with cable and telex traffic.

> Earlier
> this year, the agency began soliciting collaborations from
> business to develop commercial applications of their
> technique. It claimed to be able to quickly search through
> large quantities of text, in any language, for
> similarities to sample documents, and even automatically
> sort documents according to topics that it identifies. A
> similar though independently developed system is available
> from California-based Architext.

Has anyone got any further information about how this algorithm works?
It sounds like Rishab has somewhat better info than was publicly
available months ago when we last discussed this particular NSA
"technology transfer".

							Ian.






Thread