Feeds

Enron emails inspire GCHQ spooks

Software to nanny for cagey corporate cops

Application security programs and practises

Geeks at GCHQ (Government Communications Headquarters), the UK's spook-infested listening station, are using the infamous Enron email trail to develop software that will monitor people's emails and stop them sending incriminating or confidential messages.

The first findings from the research will be presented in August by Neil Cooke, a techie from the Communications Electronics Services Group (CESG), the arm of GCHQ that makes sure other government departments don't leave stinking great security holes in their data networks, along with colleagues from Surrey University.

Dr Lee Gillam, research fellow at the Surrey University School of Computing, said his team would be processing the 500,000 emails in corpus Enron with the help of a computer the school just acquired with a £250,000 government grant.

"We've got the capability to leak out all our organisation's secrets through email. So how can you stop that happening?" asked Gillam. The approach GCHQ and Surrey are investigating is "intervention".

"In order to work out if someone is sending out what they shouldn't it's better to intervene than pick up the traces - before they've even sent it out," said Gillam.

"We're looking at the emails that came out of Enron: what people do to abuse email policies; whether people say things they should be more careful about; whether it's possible for a machine to tell what Enron did wrong from looking at the several hundred megabytes of emails," he said

The Enron mails have become a rich seam for researchers to work with, with their record of "dick jokes, spam and internet porn", paranoia, corporate guff, political buffoonery, and incriminating evidence.

One reason the Surrey team needed a computer to do the job was because corpus Enron was filled with so much of the detritus that clutters everday corporate life. That's also what makes it a good test bed for learning to spot the signs of industrial espionage and the like.

The team tried processing their trials on a single computer, but blew the memory, said Gillam. The system is now being run on 32 IBM HS21 high-density, dual-processor, dual core Blade Servers, which gives it 68 processors and 128 cores supplied by OCF, a specialist UK integrator.

It's a modest set-up, as high performance computers go. The fastest in the world, the US Livermore national research laboratory (an offshoot of its nuclear programme), boasts 131,072 processors. The world's 20th most powerful computer at Cambridge University has 2,340 processors.

"It will eventually feature in the list of top supercomputers around the world," said Gillam. "It just depends how far down the list you go."

It is also being put to more prosaic uses. The university is working with CD02, a supplier of specialist financial software, to model market characteristics such as prices and risk. The DTI has supplied £108,000 in funding to cover the cost of a university place at the firm.

The system will also be used for neural network simulations and other intelligent computing projects, digital water marks for rights management, and some "commercially sensitive" private and government work.

The Surrey team is due to present its first Enron-inspired findings - on protecting intellectual property secrets - at the Assurance Security Symposium in Manchester at the end of August. ®

Application security programs and practises

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.