Enron emails inspire GCHQ spooks
Software to nanny for cagey corporate cops
Geeks at GCHQ (Government Communications Headquarters), the UK's spook-infested listening station, are using the infamous Enron email trail to develop software that will monitor people's emails and stop them sending incriminating or confidential messages.
The first findings from the research will be presented in August by Neil Cooke, a techie from the Communications Electronics Services Group (CESG), the arm of GCHQ that makes sure other government departments don't leave stinking great security holes in their data networks, along with colleagues from Surrey University.
Dr Lee Gillam, research fellow at the Surrey University School of Computing, said his team would be processing the 500,000 emails in corpus Enron with the help of a computer the school just acquired with a £250,000 government grant.
"We've got the capability to leak out all our organisation's secrets through email. So how can you stop that happening?" asked Gillam. The approach GCHQ and Surrey are investigating is "intervention".
"In order to work out if someone is sending out what they shouldn't it's better to intervene than pick up the traces - before they've even sent it out," said Gillam.
"We're looking at the emails that came out of Enron: what people do to abuse email policies; whether people say things they should be more careful about; whether it's possible for a machine to tell what Enron did wrong from looking at the several hundred megabytes of emails," he said
The Enron mails have become a rich seam for researchers to work with, with their record of "dick jokes, spam and internet porn", paranoia, corporate guff, political buffoonery, and incriminating evidence.
One reason the Surrey team needed a computer to do the job was because corpus Enron was filled with so much of the detritus that clutters everday corporate life. That's also what makes it a good test bed for learning to spot the signs of industrial espionage and the like.
The team tried processing their trials on a single computer, but blew the memory, said Gillam. The system is now being run on 32 IBM HS21 high-density, dual-processor, dual core Blade Servers, which gives it 68 processors and 128 cores supplied by OCF, a specialist UK integrator.
It's a modest set-up, as high performance computers go. The fastest in the world, the US Livermore national research laboratory (an offshoot of its nuclear programme), boasts 131,072 processors. The world's 20th most powerful computer at Cambridge University has 2,340 processors.
"It will eventually feature in the list of top supercomputers around the world," said Gillam. "It just depends how far down the list you go."
It is also being put to more prosaic uses. The university is working with CD02, a supplier of specialist financial software, to model market characteristics such as prices and risk. The DTI has supplied £108,000 in funding to cover the cost of a university place at the firm.
The system will also be used for neural network simulations and other intelligent computing projects, digital water marks for rights management, and some "commercially sensitive" private and government work.
The Surrey team is due to present its first Enron-inspired findings - on protecting intellectual property secrets - at the Assurance Security Symposium in Manchester at the end of August. ®
Sponsored: Network DDoS protection