[IP] Reading Saddam's e-mail
Begin forwarded message:
From: h_bray@xxxxxxxxx
Date: January 30, 2006 2:37:40 PM EST
To: dave@xxxxxxxxxx
Subject: Reading Saddam's e-mail
http://weeklystandard.com/Content/Public/Articles/
000/000/006/652zozfg.asp
A veteran intelligence guy fills us in on why so little of the captured
Iraqi data have been analyzed so far. It's a fascinating overview of
how
intelligence analysis is supposed to work
Excerpts:
The process of exploitation begins with the recognition that neither
human
intelligence nor signals intelligence is the be-all and end-all. Human
sources can lie. They can hide parts of the truth. Unwitting dupes in a
deception scheme can honestly tell you what they think is the truth.
Intercepted signals generally reveal only part of the intelligence
picture.
In a complex web of bad guys, tapping the phones of one or two leaves
a lot
of gaps, especially when your adversary is a whole network of webs.
Digital media, on the other hand, are less prone to be a means of
deception, and even one node of a network can reveal a significant
amount
about the entire network. Think about the data that you keep on your
computers at work and at home. Unless you write fiction for a living,
these
are the most accurate and factual data that can be obtained about you
(short of reading your mind). The memos and letters you write, the
financial information you calculate, the websites you visit, and the
people
you email or instant-message--all this is a gold mine for anyone
looking to
know who you are, what you do, and with whom you cavort. Now imagine
having
access to the same data about your adversary.
<snip>
...when data come without any meaningful context, we have to re-
create it
after the fact. We begin to do this by building lists of keywords,
phrases,
personalities, and other data that pertain to the topics of interest
to our
intelligence services. These lists can easily include tens of
thousands of
terms, names, figures, and data formats.
The next step is to create a forensically sound process to spin off the
more meaningful pieces of data (user-created documents, emails,
spreadsheets, etc.) while leaving behind data that have less utility
(files
associated with the operating system and software applications).
Let's call
this our forensic centrifuge.
Ideally our centrifuge will be built out of a cluster of computers:
dozens
of cheap processors networked together and scaled to rival a
supercomputer
in power. Cluster computers have been used by academia and the
government
for years, notably in places like NASA and the Department of Energy.
Computer programs written to take advantage of the multiprocessor
capabilities of the centrifuge will extract the easy-to-obtain data
files,
recover deleted files and those that have been obfuscated by various
means,
and find the data stored in web browsers, email software, and other
programs. There are commercial applications that do this, but our
applications will have to be custom-made.
Hiawatha Bray
-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/