- 14,922
- 28
In reality, people have to enter the data, and other people have to interpret what the computer spits out.
The data has already been entered. E.G. the credit card companies have all ready entered your credit card info, the hospitals have all ready entered your medical records, et cetera.
AFAIK, what the computer actually spits out hasn't been decided. Sure it could be "Jane Doe is a terrorist. Kill her", but then again all it might do is e-mail police stations and give them a list of things that may constitute probable cause for which the police could then confirm and submit to a judge to get a warrant issued.
And one of the big issues the TIA project is planning to research is to vastly strengthen the ability to track accesses, so improper use could be detected (possibly automatically).
Hurkyl