Courage our network

HIMR Data Mining Research Problem Book

This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The paper also provides a great deal of background information on GCHQ operations and the detailed discussion of network theory demonstrates the power of metadata collection: see the Boing Boing article Doxxing Sherlock, 2 February 2016.

Continue reading

Collection, Processing and Dissemination of Allied Communications

Extracts from a 2005 draft directive from the NSA’s director of signals intelligence reveal that, contrary to the “common understanding” that the a no-spying agreement existed between members of the ‘Five Eyes’ intelligence alliance (comprising the UK, US, Canada, Australia and New Zealand), the NSA reserved the right to target allies unilaterally in certain circumstances: see the Guardian article US and UK struck secret deal to allow NSA to ‘unmask’ Britons’ personal data, 20 November 2013.

Continue reading