Courage our network

Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE)

This post from internal NSA newsletter SIDToday dated 16 July 2003 explains the differences between different modes of collection and the terms the agency uses to decribe them. The article also notes that the sheer amount of information the agency collects is an issue – “our targets communications are increasingly buried by millions of non-target communications”: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.

Continue reading

HIMR Data Mining Research Problem Book

This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The paper also provides a great deal of background information on GCHQ operations and the detailed discussion of network theory demonstrates the power of metadata collection: see the Boing Boing article Doxxing Sherlock, 2 February 2016.

Continue reading