Snowden Archive
——
The SIDtoday
Files
Browse the Archive

Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE)

SUMMARY

Explanation of the differences between Digital Network Exploitation, Digital Network Intelligence, and Computer Network Exploitation: DNE is extracting intelligence from a device on the global network; DNI is the intelligence produced by DNE; and CNE is hacking end-point devices (mentions “subtly weakening encryption”). Article acknowledges that “our targets communications are increasingly buried by millions of non-target communications.”

DOCUMENT’S DATE

Jul 16, 2003

PUBLICLY AVAILABLE

Mar 12, 2018

1/2
Download
Page 1 from Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE)
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE) FROM: Deputy Director for Data Acquisition Run Date: 07/16/2003 (U//FOUO) DNE, DNI and CNE are interrelated acronyms used extensively in SIGINT that are often confused: (S) Digital Network Exploitation (DNE) - Extracting target intelligence that requires processing multiple layers of computer protocols that contain multiple types of digitally represented information (voice, fax, video, images, documents, formatted data, emails, messages, etc.) from any device on the digital global network. (S) Digital Network Intelligence (DNI) - Encompasses the set of facts, inferences and relationships that describe target intelligence extracted from communications residing on the digital global network. DNI is the resultant intelligence that DNE produces. (TS//SI) Computer Network Exploitation (CNE) - Active or "end-point" collection, which involves the surreptitious infiltration and mastery of computers and other network components. Once a device or network has been infiltrated, data of interest can be extracted directly or the targeted system's operation can be modified to facilitate mid-point collection (for instance, by covertly tagging data of interest, rerouting data along accessible links, subtly weakening encryption, etc.). (TS//SI) DNE is independent of the type of access: the collection can either be end-point or mid-point, active or passive, may (or may not) use CNE methods/techniques. Collection is not limited to a computer; it can be against any system or device in the digital environment. (S//SI) As our targets continue to migrate toward communications that use the digital global network, DNE increasingly becomes the center of our SIGINT business. This is evidenced by approximately half of our current SID Strategic Objectives directly addressing our need to improve DNE. The 3 V's (volume, velocity, variety) present tremendous challenges in DNE. Our targets are moving from fixed narrowband transmissions to shared, re-routable, extremely wideband, multiplexed, multi-formatted transmissions. Each day, new types of protocols and application formats appear in our targets' communications. Finally, our targets communications are increasingly buried by millions of non-target communications. (TS//SI) The primary focus of SID's recent transformation efforts is to improve our DNE. Fortunately, the business of DNE has some great opportunities for improvement. The fact there is a global network allows the concept of CNE collection. This allows us to actively hunt the target instead of sifting through the chaff. Also, most communications on the global network include some set of labels about the source, destination and path of the information. SERIES: (U//FOUO) Data Acquisition 1. Welcome to SID's Data Acquisition Directorate 2. The Collection Strategies and Requirements Center 3. Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE) 4. The Evolution of HF 5. The New Meade Operations Center
Page 2 from Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE)
This labeling supports new SIGINT development methodology. Using DNE, with the improved labeling, we can quickly map the social, logical and physical networks of our target space. Finally, the continued growth of standards and their widespread use in the global network will allow us to use Commercial-Off-The-Shelf (COTS) tools to portray the communications exactly the same way the target sees it. (S) In conclusion, DNE is an on-going challenge that has already produced extremely valuable intelligence with great continued promise. Through the coming months and years, we will accelerate our exploitation of DNI and track targets through their migration onto the global network. "(U//FOUO) SIDtoday articles may not be republished or reposted outside NSANet without the consent of S0121 (DL sid comms)." DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL DERIVED FROM: NSA/CSSM 1-52, DATED 08 JAN 2007 DECLASSIFY ON: 20320108