Hancock (programming language)

From HandWiki - Reading time: 12 min

Short description: Programming language intended for data mining
AT&T researchers created Hancock in 1998. They used it to write data mining programs that analyzed the company's U.S. long-distance phone call streams.[1]

Hancock is a C-based programming language, first developed by researchers at AT&T Labs in 1998, to analyze data streams.[1] The language was intended by its creators to improve the efficiency and scale of data mining. Hancock works by creating profiles of individuals, utilizing data to provide behavioral and social network information.

The development of Hancock was part of the telecommunications industry's use of data mining processes to detect fraud and to improve marketing. However, following the September 11, 2001 attacks, and the increased government surveillance of individuals, Hancock and similar data mining technologies came into public scrutiny, especially regarding its perceived threat to individual privacy.[2]

Background

Data mining research, including Hancock, grew during the 1990s, as scientific, business, and medical interest in massive data collection, storage, and management increased.[3] During the early 1990s, transactional businesses became increasingly interested in data warehousing, which provided storage, query, and management capabilities for the entirety of recorded transactional data. Data mining research with a focus on databases became focused on creating efficient data structures and algorithms, particularly for data which was located off of main memory storage, on a disk, for example. Padharic Smyth believed that data mining researchers aimed to write algorithms which could scale the massive amounts of data in shorter amounts of time.[3]

Researchers at AT&T Labs, including Corinna Cortes, pioneered the Hancock programming language from 1998 to 2004. Hancock, a C-based domain specific programming language, was intended to make program code for computing signatures from large transactional data streams easier to read and maintain, thus serving as an improvement over the complex data mining programs written in C. Hancock also managed issues of scale for data mining programs.[1]

The data streams Hancock programs analyzed were intended to handle hundreds of millions of signatures daily, ideally suited for transactions like telephone calls, credit card purchases, or website requests.[1] At the time Hancock was developed, this data were usually amassed for billing or security purposes, and increasingly, to analyze how transactors behaved.[1] Data mining can also be useful for identifying atypical patterns in transactor data. In regards to anti-terrorist activities, data mining’s assistance in pattern-finding can help find links between terrorist suspects, through funding or arms transfers, for example.[4]

Data stream applications also include network monitoring, financial monitoring, such as security derivative pricing,[5] prescription drug effect monitoring,[5] and e-commerce.[6] Data mining can be used by firms to find their most profitable consumers or to conduct churn analysis. Data mining can also help firms make credit-lending decisions by designing models which determine a customer’s credit worthiness.[7] These models are intended to minimize risky credit-lending while maximizing sales revenue.[7]

Besides Hancock, other data stream systems in existence by 2003 included Aurora, Gigascope, Niagara, STREAM, Tangram, Tapestry, Telegraph, and Tribeca.[6]

Processes

Databases

Hancock is a language for data stream mining programs. Data streams differ from traditional stored databases in that they experience very high volumes of data and allow analysts to act upon such data in near-real time. Stored databases, on the other hand, involve data being inputted for offline querying.[6] Data warehouses, which store intersectional data from different systems, can be costly to build and lengthy to implement. Simplified data warehouses can take months to build.[5]

The scale of massive data stream mining poses problems to data miners. For example, internet and telephone network data mining might be tasked with finding persistent items, which are items that regularly occur in the stream.[8] However, these items might be buried in a large amount of the network’s transactional data; while the items can eventually be found, data miners aim for increased time efficiency in their search.[8]

In database technology, users do not necessarily know where the data they are searching for is located. These users only have to issue queries for data, which the database management system returns. In a large data set, data can be contained in random-access memory (RAM), which is the primary storage, or disk storage, which is secondary storage. In 2000, Padharic Smyth estimated that, using the most recent technology, data located in RAM could be accessed relatively quickly, “on the order of 10−7-10−8 seconds,” while secondary storage data took significantly longer to access, “on the order of 104-105” seconds.[3]

Data mining

Data mining can be broken down into the processes of input, analysis, and the reporting of results; it uses algorithms to find patterns and relationships among the subjects and has been used by commercial companies to find patterns in client behavior.[9] Data analysts are needed to collect and organize data and train algorithms.[4]

KianSing Ng and Huan Liu opine that even with straightforward data mining goals, the actual process is still complex. For example, they argue that real-world data mining can be challenged by data fluctuations, which would render prior patterns “partially invalid.” Another complication is that most databases in existence in 2000 were characterized by high dimensionality, which means that they contain data on many attributes. As Ng and Liu note, high dimensionality produces long computing times; this can be solved by data reduction in the pre-processing stage.[10]

Hancock's process is as follows:

  • Hancock programs analyze data as it arrives, in real-time, into data warehouses.[2]
  • Hancock programs computed the signatures, or behavioral profiles, of transactors in the stream.[1]
    • Data stream transactors include telephone numbers or IP addresses.[1]
    • Signatures enable analysts to discover patterns hidden in the data.[1]
  • Telecommunications data streams consist of call-records, which include information on the locations of callers, time of calls, and sometimes include recordings of conversations.[11]
    • Hancock was used to process signatures based on data like the length of phone calls and the amount of calls to a particular area over a specified interval of time.[12]
  • Hancock programs used link analysis to find “communities of interest," which connected signatures based on similarities in behavior. Link analysis require that linkages between data are continually updated, and are used to detect fraud networks.[12]
    • Link analysis, which can be considered a form of association data mining, aims to find connections between relationships.[13] One such relationship is call patterns in telecommunications.[13] Association data mining aims to find relationships between variables. For example, one research paper[13] suggested that a market could use association analysis to find the probability that a customer who purchases coffee also purchases bread; the market could then use that information to influence store layout and promotions.

Because Hancock code performed efficiently, even with large amounts of data, the AT&T researchers claimed that it allowed analysts to create applications "previously thought to be infeasible."[1]

Applications

The AT&T Labs researchers analyzed telecommunications data streams, including the company’s entire long distance stream, which included around 300 million records from 100 million customer accounts daily.[1] By 2004, the entirety of AT&T's long-distance phone call record signatures were written in Hancock and the company used Hancock code to peruse through nine gigabytes of network traffic, nightly.[1][2]

Telecommunications companies share information derived from data mining network traffic for research, security, and regulatory purposes.[14]

Marketing

Hancock programs assisted in AT&T's marketing efforts.[2] In the 1990s, large data stream mining and the increased automation of government public record systems allowed commercial corporations in the United States to personalize marketing.[15] Signature profiles were developed from both transaction records and public record sources.[15] Ng and Liu, for example, applied data mining to customer retention analysis, and found that mining of association rules allowed a firm to predict departures of influential customers and their associates. They argued that such knowledge subsequently empowers the company’s marketing team to target those customers, offering more attractive pitches.[10]

Data mining assisted telecommunications companies in viral marketing, also known as buzz marketing or word-of-mouth marketing, which uses consumer social networks to improve brand awareness and profit.[16] Viral marketing depends on connections between consumers to increase brand advocacy, which can either be explicit, such as friends recommending a product to other friends, or implicit, such as influential consumers purchasing a product.[16] For firms, one of the goals of viral marketing is to find influential consumers who have larger networks. Another method of viral marketing is to target the neighbors of prior consumers, known as “network targeting.”[16] Using Hancock programs, analysts at AT&T were able to find "communities of interest," or interconnected users who featured similar behavioral traits.[12]

One of the issues viral marketing promoters encountered was the large size of marketing data sets, which, in the case of telecommunication companies, can include information on transactors and their descriptive attributes and transactions.[16] Marketing data sets, when amounting in the hundreds of millions, can exceed the memory capacity of statistical analysis software.[16] Hancock programs addressed data scaling issues and allowed analysts to make decisions as the data flowed into the data warehouses.[2]

While the development of wireless communication devices allowed law enforcement to track the location of users, it also allowed companies to improve consumer marketing, such as by sending messages according to wireless user’s proximity to particular businesses.[15] Through cell site location data, Hancock programs were capable of tracking wireless users' movements.[2]

According to academic Alan Westin, the increase of telemarketing during this period also increased consumer annoyance.[15] Statisticians Murray Mackinnon and Ned Glick hypothesized in 1999 that firms hid their use of commercial data mining because of potential consumer backlash for mining customer records.[5] As an example, Mackinnon and Glick cited a June 1999 lawsuit in which the state of Minnesota sued US Bancorp for releasing customer information to a telemarketing firm; Bancorp promptly responded to the lawsuit by restricting its usage of customer data.[5]

Fraud detection

AT&T researchers, including Cortes, showed that Hancock-related data mining programs could be used for finding telecommunications fraud.[14]

Telecommunications fraud detection includes subscription fraud, unauthorized calling card usage, and PBX fraud.[17] It is similar to mobile communications and credit card fraud: in all three, firms must process large amounts of data in order to obtain information; they must deal with the unpredictability of human behavior, which makes finding patterns in the data difficult; and their algorithms must be trained to spot the relatively rare cases of fraud among the many legitimate transactions.[17] According to Daskalaki et al., in 1998, telecommunications fraud incurred billions of dollars in annual losses globally.[17]

Because fraud cases were relatively few compared to the hundreds of millions of daily telephone transactions that occurred, algorithms for data mining of telecommunication records need to provide results quickly and efficiently.[12] The researchers showed that communities of interest could identify fraudsters since data nodes from fraudulent accounts are typically located closer to each other than to a node from a legitimate account.[14]

Through social network analyses and link analysis, they also found that the set of numbers that were targeted by fraudulent accounts, which were then disconnected, were often called on by fraudsters from different numbers; such connections could be used to identify fraudulent accounts. Link analysis methods are based on the assumption that fraudsters rarely deviate from their calling habits.[12]

Relation to surveillance

In 2007, Wired magazine published an online article claiming that Hancock was created by AT&T researchers for "surveillance purposes." The article highlighted research papers written by Cortes et al., particularly the researchers' concept of "communities of interest." The article connected Hancock's concept with the recent public findings that the Federal Bureau of Investigation (FBI) had been making warrantless requests for records of "communities of interest" from telecommunication companies under the USA PATRIOT Act.[2]

The article claims that AT&T "invented the concept and the technology" of creating "community of interest" records, citing the company's ownership of related data mining patents. Finally, the article noted how AT&T, along with Verizon, was, at the time, being sued in federal court for providing the National Security Agency (NSA) with access to billions of telephone records belonging to Americans. The NSA, the article claims, obtained such data with the intention of data mining it to find suspected terrorists and warrantless wiretapping targets.[2]

FBI telecommunication records surveillance

Federal telecommunications surveillance is not a recent historical development in the United States. According to academic Colin Agur, telephone surveillance by law enforcement in the United States became more common in the 1920s.[18] Particularly, telephone wiretapping became a prevalent form of evidence collection by law enforcement officials, especially federal agents, during Prohibition.[18] Agur argues that the Communications Act of 1934, which established the Federal Communications Commission, reigned in law enforcement abuse of telephone surveillance.[18] Under the act, telecommunications companies could keep records and report to the FCC illegal telecommunications interception requests. After the Federal Wiretap Act of 1968 and the Supreme Court's decision in Katz v. United States, both of which extended Fourth Amendment protections to telephone communications, federal telecommunications surveillance required warrants.[18]

he FBI was first authorized to obtain national security letters (NSLs) for communication billings records, including those from telephone services, after Congress passed the Electronic Communications Privacy Act of 1986. The letters forced telephone companies to provide the FBI with customer information, such as names, addresses, and long-distance call records. Congress would eventually expand NSL authority to include warrants for local-distance call records as well.[19]

After the September 11, 2001 attacks, Congress passed the USA PATRIOT Act, which made it easier for investigators at the FBI to be issued national security letters for terrorism investigations (NSLs). Academics William Bendix and Paul Quirk contend that the PATRIOT Act allowed the FBI to access and collect the private data of many citizens, without the approval of a judge. The FBI was allowed to keep a collection of records, with no time limit for possession. It could also force NSL recipients to remain silent through the use of gag orders.[19]

The Wired article claimed that the FBI began making warrantless requests to telecommunication companies for "communities of interest" records of suspects under the USA PATRIOT Act. The article claimed that law enforcement discovered the existence of such records based on research by Hancock's creators.[2]

In 2005, government leaks revealed the FBI’s abuse of NSLs. In 2006, when the PATRIOT Act was renewed, it included provisions that required the Justice Department’s inspector general to annually review NSL usage. The first inspector general report found that 140,000 NSL requests, on nearly 24,000 U.S. persons, were granted to FBI agents from 2003 to 2005. The data was then added to databanks available to thousands of agents.[19]

NSA telecommunication records surveillance

The public-private relationship of telecommunication companies extends into the homeland security domain. Telecommunication companies, including AT&T, Verizon, and BellSouth, cooperated with NSA requests for access to transactional records.[20] Telecommunications companies, including AT&T, have maintained partnerships with government agencies, like the Department of Homeland Security, to collaborate on sharing information and solving national cybersecurity issues.[21] AT&T representatives sit on the board of the National Cyber Security Alliance (NCSA), which promotes cybersecurity awareness and computer user protection.[21]

Analysts at the NSA, under authority of the secret Terrorist Surveillance Program, also used data mining to find terrorist suspects and sympathizers. In this search, the NSA intercepted communications, including telephone calls, leaving and entering the United States. Agents screened the information for possible links to terrorism, such as the desire to learn to fly planes or specific locations of the communication’s recipients, like Pakistan.[20]

In 2005, The New York Times reported on the existence of the program, which the Bush administration defended as necessary in its counterterrorism efforts and limited to terrorist suspects and associates.[20]

However, in 2007, the Wired article noted how AT&T and Verizon were being sued in federal court for providing the NSA with access to billions of telephone records belonging to Americans for anti-terrorism activities, such as using data mining to locate suspected terrorists and warrantless wiretapping targets.[2]

In 2013, following the Snowden leaks, it was revealed that the program had also mined the communications of not just terrorist suspects, but also millions of American citizens. A 2014 independent audit by the Privacy and Civil Liberties Oversight Board found that the program had limited counterterrorism benefits.[20]

See also

References

  1. 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 Cortes, Corinna; Fisher, Kathleen; Pregibon, Daryl; Rogers, Anne; Smith, Frederick (2004-03-01). "Hancock: A language for analyzing transactional data streams" (in en). ACM Transactions on Programming Languages and Systems 26 (2): 301–338. doi:10.1145/973097.973100. ISSN 0164-0925. 
  2. 2.0 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Singel, Ryan (2007-10-29). "AT&T Invents Programming Language for Mass Surveillance". Wired. https://www.wired.com/2007/10/att-invents-pro/. Retrieved 2020-11-08. 
  3. 3.0 3.1 3.2 Smyth, P. (2000-08-01). "Data mining: data analysis on a grand scale?". Statistical Methods in Medical Research 9 (4): 309–327. doi:10.1191/096228000701555181. PMID 11084711. 
  4. 4.0 4.1 Kim, Won (2005). "On U.S. Homeland Security and Database Technology". Journal of Database Management 16 (1): 1–17. doi:10.4018/jdm.2005010101. https://www.igi-global.com/gateway/article/3323. 
  5. 5.0 5.1 5.2 5.3 5.4 Mackinnon, Murray J.; Glick, Ned (Sep 1999). "Data Mining and Knowledge Discovery in Databases – An Overview". Australian New Zealand Journal of Statistics 41 (3): 255–275. doi:10.1111/1467-842X.00081. 
  6. 6.0 6.1 6.2 Babcock, Brian; Babu, Shivnath; Datar, Mayur; Motwani, Rajeev; Thomas, Dilys (2004-12-01). "Operator Scheduling in Data Stream Systems". The VLDB Journal 13 (4): 333–53. doi:10.1007/s00778-004-0132-6. 
  7. 7.0 7.1 Sarantopoulos, Georgios (2003). "Data mining in retail credit". Operational Research 3 (2): 99–122. doi:10.1007/BF02940280. https://link.springer.com/article/10.1007/BF02940280. 
  8. 8.0 8.1 Lahiri, Bibudh; Tirthapura, Srikanta; Chandrashekar, Jaideep (2014). "Space-Efficient Tracking of Persistent Items in a Massive Data Stream". Statistical Analysis and Data Mining: The ASA Data Science Journal 7 (1): 70–92. doi:10.1002/sam.11214. 
  9. Guzik, Keith (2009-10-13). "Discrimination by Design: predictive data mining as security practice in the United States' 'war on terrorism'" (in en-US). Surveillance & Society 7 (1): 3–20. doi:10.24908/ss.v7i1.3304. ISSN 1477-7487. https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3304. 
  10. 10.0 10.1 Ng, KianSing; Liu, Huan (2000-12-01). "Customer Retention via Data Mining" (in en). Artificial Intelligence Review 14 (6): 569–590. doi:10.1023/A:1006676015154. ISSN 1573-7462. https://doi.org/10.1023/A:1006676015154. 
  11. Clarke, Roger (2001-01-01). "Person location and person tracking ‐ Technologies, risks and policy implications". Information Technology & People 14 (2): 206–231. doi:10.1108/09593840110695767. ISSN 0959-3845. https://doi.org/10.1108/09593840110695767. 
  12. 12.0 12.1 12.2 12.3 12.4 Bolton, Richard J.; Hand, David J. (2002). "Statistical Fraud Detection: A Review" (in en). Statistical Science 17 (3): 235–255. doi:10.1214/ss/1042727940. ISSN 0883-4237. https://projecteuclid.org/euclid.ss/1042727940. 
  13. 13.0 13.1 13.2 Chye, Koh Hian; Gerry, Chan Kin Leong (2002-07-01). "Data mining and customer relationship marketing in the banking industry" (in en). Singapore Management Review 24 (2): 1–28. https://go.gale.com/ps/i.do?p=AONE&sw=w&issn=01295977&v=2.1&it=r&id=GALE%7CA87703083&sid=googleScholar&linkaccess=abs. 
  14. 14.0 14.1 14.2 Bonchi, Francesco; Castillo, Carlos; Gionis, Aristides; Jaimes, Alejandro (2011-05-06). "Social Network Analysis and Mining for Business Applications". ACM Transactions on Intelligent Systems and Technology 2 (3): 22:1–22:37. doi:10.1145/1961189.1961194. ISSN 2157-6904. https://doi.org/10.1145/1961189.1961194. 
  15. 15.0 15.1 15.2 15.3 Westin, Alan F. (2003). "Social and Political Dimensions of Privacy: Social and Political". Journal of Social Issues 59 (2): 431–453. doi:10.1111/1540-4560.00072. 
  16. 16.0 16.1 16.2 16.3 16.4 Hill, Shawndra; Provost, Foster; Volinsky, Chris (2006). "Network-Based Marketing: Identifying Likely Adopters via Consumer Networks". Statistical Science 21 (2): 256–276. doi:10.1214/088342306000000222. ISSN 0883-4237. https://www.jstor.org/stable/27645754. 
  17. 17.0 17.1 17.2 Daskalaki, S.; Kopanas, I.; Goudara, M.; Avouris, N. (2003-03-01). "Data mining for decision support on customer insolvency in telecommunications business" (in en). European Journal of Operational Research 145 (2): 239–255. doi:10.1016/S0377-2217(02)00532-5. ISSN 0377-2217. http://www.sciencedirect.com/science/article/pii/S0377221702005325. 
  18. 18.0 18.1 18.2 18.3 Agur, Colin (2013). "Negotiated Order: The Fourth Amendment, Telephone Surveillance, and Social Interactions, 1878-1968". Information & Culture 48 (4): 419–447. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2485457. 
  19. 19.0 19.1 19.2 Bendix, William; Quirk, Paul J. (2016). "Deliberating Surveillance Policy: Congress, the FBI, and the Abuse of National Security Letters" (in en). Journal of Policy History 28 (3): 447–469. doi:10.1017/S0898030616000178. ISSN 0898-0306. https://www.cambridge.org/core/journals/journal-of-policy-history/article/abs/deliberating-surveillance-policy-congress-the-fbi-and-the-abuse-of-national-security-letters/58484F2C1F5194891109319A878CF76F. 
  20. 20.0 20.1 20.2 20.3 Theoharis, Athan (2016). "Expanding U.S. Surveillance Powers: The Costs of Secrecy" (in en). Journal of Policy History 28 (3): 515–534. doi:10.1017/S0898030616000208. ISSN 0898-0306. https://www.cambridge.org/core/journals/journal-of-policy-history/article/abs/expanding-us-surveillance-powers-the-costs-of-secrecy/7069F04E880A4911B8423E6209DA8627. 
  21. 21.0 21.1 Busch, Nathan E.; Givens, Austen D. (2012). "Public-private partnerships in homeland security: Opportunities and challenges". Homeland Security Affairs 8 (1): 1–25. 





Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/Hancock_(programming_language)
15 views | Status: cached on July 31 2024 00:41:13
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF