Re: Traffic Analysis in the New York Times

2005-05-24 Thread Adam Shostack
On Mon, May 23, 2005 at 02:49:03PM -0400, Adam Shostack wrote:
| On Mon, May 23, 2005 at 11:46:25AM -0400, Perry E. Metzger wrote:
| | 
| | The original article has some nice diagrams, but unfortunately,
| | because of the NY Times' policies, the article won't be online in a
| | few days.
| 
| The times is trying to address this for RSS readers.  Aaron Swartz has
| some code http://nytimes.blogspace.com/genlink
| 
| This link should last:
| 
http://www.nytimes.com/2005/05/22/weekinreview/22kola.html?ex=1274414400&en=9ff3763213102706&ei=5090&partner=rssuserland&emc=rss
| 

Speaking of which, in the star graph, it seems there are lots of "cut
off" or stub lines.  Does anyone understand what the graph is supposed
to be showing?  Its very pretty and all..

Adam


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Traffic Analysis in the New York Times

2005-05-24 Thread Adam Shostack
On Mon, May 23, 2005 at 11:46:25AM -0400, Perry E. Metzger wrote:
| 
| The original article has some nice diagrams, but unfortunately,
| because of the NY Times' policies, the article won't be online in a
| few days.

The times is trying to address this for RSS readers.  Aaron Swartz has
some code http://nytimes.blogspace.com/genlink

This link should last:
http://www.nytimes.com/2005/05/22/weekinreview/22kola.html?ex=1274414400&en=9ff3763213102706&ei=5090&partner=rssuserland&emc=rss

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Traffic Analysis in the New York Times

2005-05-23 Thread Perry E. Metzger

Sunday's New York Times "Week in Review" section had an interesting
article on traffic analysis, although the term doesn't appear once in
the entire article.

A large corpus of Enron internal electronic mail was made available
some time ago, and apparently a number of groups have been using it to
refine statistical traffic analysis techniques.

The original article has some nice diagrams, but unfortunately,
because of the NY Times' policies, the article won't be online in a
few days.

Perry

--
http://www.nytimes.com/2005/05/22/weekinreview/22kola.html

Enron Offers an Unlikely Boost to E-Mail Surveillance


By GINA KOLATA
Published: May 22, 2005

AS an object of modern surveillance, e-mail is both reassuring and
troubling. It is a potential treasure trove for investigators
monitoring suspected terrorists and other criminals, but it also
creates the potential for abuse, by giving businesses and government
agencies an efficient means of monitoring the attitudes and activities
of employees and citizens.


Now the science of e-mail tracking and analysis has been given a
unlikely boost by a bitter chapter in the history of corporate
malfeasance - the Enron scandal.

In 2003, the Federal Energy Regulatory Commission posted the company's
e-mail on its Web site, about 1.5 million messages. After duplicates
were weeded out, a half-million e-mails were left from about 150
accounts, including those of the company's top executives. Most were
sent from 1999 to 2001, a period when Enron executives were
manipulating financial data, making false public statements, engaging
in insider trading, and the company was coming under scrutiny by
regulators.

Because of privacy concerns, large e-mail collections had not
previously been made publicly available, so this marked the first time
scientists had a sizable e-mail network to experiment with.

"While it's sad for the people at Enron that this happened, it's a
gold mine for researchers," said Dr. David Skillicorn, a computer
scientist at Queen's University in Canada.

Scientists had long theorized that tracking the e-mailing and word
usage patterns within a group over time - without ever actually
reading a single e-mail - could reveal a lot about what that group was
up to. The Enron material gave Mr. Skillicorn's group and a handful of
others a chance to test that theory, by seeing, first of all, if they
could spot sudden changes.

For example, would they be able to find the moment when someone's
memos, which were routinely read by a long list of people who never
responded, suddenly began generating private responses from some
recipients? Could they spot when a new person entered a communications
chain, or if old ones were suddenly shut out, and correlate it with
something significant?

There may be commercial uses for the same techniques. For example,
they may enable advertisers to do word searches on individual e-mail
accounts and direct pitches based on word frequency.

"Will you let your e-mail be mined so some car dealer can send
information to you on car deals because you are talking to your
friends about cars?" asks Dr. Michael Berry, a computer scientist at
the University of Tennessee who has been analyzing the data.

Working with the Enron e-mail messages, about a half-dozen research
groups can report that after just a few months of study they have
already learned that they can glean telling information and are
refining their ability to sort and analyze it.

Dr. Kathleen Carley, a professor of computer science at Carnegie
Mellon University, has been trying to figure out who were the
important people at Enron by the patterns of who e-mailed whom, and
when and whether these people began changing their e-mail
communications when the company was being investigated.

Companies have organizational charts, but they reveal little about how
things really work, Dr. Carley said. Companies actually operate
through informal networks, which can be revealed by analyzing "who
spends time talking to whom, who are the power brokers, who are the
hidden individuals who have to know what's going on," she said.

With the Enron data, Dr. Carley continued, "what you see is that prior
to the investigation there is this surge in activity among the people
at the top of the corporate ladder." But she adds, "as soon as the
investigation starts, they stop communicating with each other and
start communicating with lawyers." It showed, she says, "that they
were becoming very nervous."

The analyses also found someone so junior she did not show up on
organization charts but who, whichever way the e-mail data was mined,
"shows up as a person of interest," Dr. Skillicorn said, in the
language of intelligence analysts. In the investigation of a terror
network, pinpointing such a person could be of enormous significance.

Dr. Berry said the e-mail traffic patterns tracked major events, like
the manipulation of California energy prices.