dave@mimsy.UUCP (02/15/87)
Yes, rather than discuss policy of application, and a whole lot of unsubstantiated assumptions, let's discuss the technical details of effective implementation of this supposed activity. I consulted on a project for Western Union some time ago. The project imagined a central facility which profiled 12 news wire feeds for 100,000 WU customers each allowed 100 profiler keywords. We "what if'd" the problem, solution, and cost. Does anybody KNOW how many telephone circuits cross U.S. borders? Does anybody KNOW how much data traffic crosses U.S. borders on these circuits? Does anybody KNOW what kind of computational power is required to accompliish the supposed activity? The fundamental problem with the application of sci.crypt content to real-world problems (apart from ignorance and flaming bs) is that the content is proffered by bright people with academic awareness of theoretic problems. The real-world problems, it is my estimation, are actually very much different from the theoretic ones discussed here. So, let's define the problem of this supposed keyword scanning activity and analyse its feasibility and implementation. Dave Stoffel Amber Research Group, Inc.