Feeds

Enron emails inspire GCHQ spooks

Software to nanny for cagey corporate cops

3 Big data security analytics techniques

Geeks at GCHQ (Government Communications Headquarters), the UK's spook-infested listening station, are using the infamous Enron email trail to develop software that will monitor people's emails and stop them sending incriminating or confidential messages.

The first findings from the research will be presented in August by Neil Cooke, a techie from the Communications Electronics Services Group (CESG), the arm of GCHQ that makes sure other government departments don't leave stinking great security holes in their data networks, along with colleagues from Surrey University.

Dr Lee Gillam, research fellow at the Surrey University School of Computing, said his team would be processing the 500,000 emails in corpus Enron with the help of a computer the school just acquired with a £250,000 government grant.

"We've got the capability to leak out all our organisation's secrets through email. So how can you stop that happening?" asked Gillam. The approach GCHQ and Surrey are investigating is "intervention".

"In order to work out if someone is sending out what they shouldn't it's better to intervene than pick up the traces - before they've even sent it out," said Gillam.

"We're looking at the emails that came out of Enron: what people do to abuse email policies; whether people say things they should be more careful about; whether it's possible for a machine to tell what Enron did wrong from looking at the several hundred megabytes of emails," he said

The Enron mails have become a rich seam for researchers to work with, with their record of "dick jokes, spam and internet porn", paranoia, corporate guff, political buffoonery, and incriminating evidence.

One reason the Surrey team needed a computer to do the job was because corpus Enron was filled with so much of the detritus that clutters everday corporate life. That's also what makes it a good test bed for learning to spot the signs of industrial espionage and the like.

The team tried processing their trials on a single computer, but blew the memory, said Gillam. The system is now being run on 32 IBM HS21 high-density, dual-processor, dual core Blade Servers, which gives it 68 processors and 128 cores supplied by OCF, a specialist UK integrator.

It's a modest set-up, as high performance computers go. The fastest in the world, the US Livermore national research laboratory (an offshoot of its nuclear programme), boasts 131,072 processors. The world's 20th most powerful computer at Cambridge University has 2,340 processors.

"It will eventually feature in the list of top supercomputers around the world," said Gillam. "It just depends how far down the list you go."

It is also being put to more prosaic uses. The university is working with CD02, a supplier of specialist financial software, to model market characteristics such as prices and risk. The DTI has supplied £108,000 in funding to cover the cost of a university place at the firm.

The system will also be used for neural network simulations and other intelligent computing projects, digital water marks for rights management, and some "commercially sensitive" private and government work.

The Surrey team is due to present its first Enron-inspired findings - on protecting intellectual property secrets - at the Assurance Security Symposium in Manchester at the end of August. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.