Courage our network

HIMR Data Mining Research Problem Book

This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The paper also provides a great deal of background information on GCHQ operations and the detailed discussion of network theory demonstrates the power of metadata collection: see the Boing Boing article Doxxing Sherlock, 2 February 2016.

Continue reading


These three slides, taken from a 11 April 2013 NSA presentation show screenshots from a tool called CyberCOP, which appears to monitor botnets and the DDOS attacks they perform: see the article Cyberkrieg: Wie gefährdet ist Deutschland?, 12 January 2015.

Continue reading