SKYNET: Applying Advanced



Similar documents
Summary of DNR and DNI Co-Travel Analytics

Content Extraction Enhancements For Target Analytics:

Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My

The Big Data Paradigm Shift. Insight Through Automation

AFGHANISTAN REHABILITATION ORGANIZATION (ARO)

Summary of DNR and DNI Co-Travel Analytics

GeoMatrix. Positioning of Mobile Phones System

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

How Using Big Data in Security Helps (and Hurts) Us

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)

Critical Security Controls

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

THE EVOLUTION OF SIEM

RSA Security Analytics

What s New in Security Analytics Be the Hunter.. Not the Hunted

How To Make Data Streaming A Real Time Intelligence

Cyber Situational Awareness - Big Data Solution

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen

Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Locating Mobile Phones using Signalling System #7. Tobias Engel

An Example of Mobile Forensics

Big Data Governance Certification Self-Study Kit Bundle

DATA MANAGEMENT FOR THE INTERNET OF THINGS

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

NTI Law Enforcement Systems and Services

Click to edit Master title style

CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc.

The Future of Business Analytics is Now! 2013 IBM Corporation

How To Manage Security On A Networked Computer System

Big Data Governance Certification Self-Study Kit Bundle

How To Apply For A College Online

Agilent Network Monitoring Content Intercept Manager

The Role of Automation Systems in Management of Change

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS

The Analytics Value Chain Key to Delivering Value in IoT

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014

Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos

Cisco Dynamic Workload Scaling Solution

IVR (Interactive Voice Response) Operation Manual. Copyright 2012 Agile Networks, Inc. All Rights Reserved.

Global System for Mobile Communication Technology

Best Practices in Improving Lead Generation Guidelines for improving lead generation

How telcos can benefit from streaming big data analytics

Group Life Insurance-FAQs

Mobile Communications

Big Data Architect Certification Self-Study Kit Bundle

SMS SS7 Fraud February 2005

THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20

Intelligence Driven Security

Safe Harbor Statement

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group

MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN

Network Security Deployment (NSD)

Worldwide attacks on SS7 network

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

WAP PUSH, UP.NOTIFY, AND SMS Features and Benefits Comparison

IoT Analytics: Four Key Essentials and Four Target Industries

TORNADO Solution for Telecom Vertical

Know Your Foe. Threat Infrastructure Analysis Pitfalls

Opening a Bank Account

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT

Processing and Analyzing Streams. CDRs in Real Time

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS

Dealing with Big Data in Cyber Intelligence

Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO

Network Analytics Accelerator

The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

Innovations in London s transport: Big Data for a better customer experience

Airline Disruption Management

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist

New Technology Capabilities

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Attunity Better Data Movement For The Internet Of Things

HTTP Data Logging Protocol

Active Response: Automated Risk Reduction or Manual Action?

LAYMAN S GUIDE TO USING SSIM

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Transcription:

TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL?M1 h e SKYNET: Applying Advanced,bfl mm p* iii^bm I IV flhsmp DA U 0 ' a.. *: wm : ^MMMIMWai» 11 by S2I, R6, T12, T14, - Presenters: pres, S2I51, R66F T: J.f-fc V..-. TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL..V ivv I" ". Zi v*r ' ' -. -. : ff/if^. ' QeWttfftorii: NSA/CSSM 1-52 1» M l. Dated: 20070108 Wh \Z Declassify Oh: 20370401 /

UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO

Collaborative cloud research effort between 5 different organizations crossing 3 NSA Directorates: - Signals Intelligence: S2I, S22, SSG - Research: R6 - Technology: T12, T14 Partnerships - TMAC/FASTSCOPE - MIT Lincoln Labs & Harvard SKYNET applies complex combinations of geospatial, geotemporal, pattern-of-life, and travel analytics to bulk DNR data to identify patterns of suspect activity

CTMMC T0PSEdî N S A/CSS Counterterrorism Mission Management Center Bag hi in ' Mtfiaud-E Etacfl P -van C hank or I.twJ.i Sh ata > O Kabul \ f.v»h nr Lam Tuesday/Friday Asad bad Peshawar Rough outline of courier path as described by the targets Snn ag ar : Gardez Id am it> ad» Rawalpindi Sunday Waziristan s Courier/ Probably Faisalabad F a sal abad Lahore U Sunday/Monday Cimi TOP SECRET//COMINT//REL TO USA/AUS, CAN, GBR, NZL

TOP SECRET//COMINT//ORCON/REL- TO USA, AUS, CAN, GBR. NZl. SKYNET Analytic Questions Who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives? Who else is seen in the area when the traveler arrives, and who seen leaving the area shortly afterward? Who travels to/from Peshawar every other Sunday and "somewhere else" on a weekly basis? Who visits Akora Khattak periodically and also travels between Peshawar and Lahore? Who fits the above travel profiles and also possesses unusual behavior: One or two hops from other suspects or known tasked selectors Frequent handset swapping or powering down

TOP SECRET//COMINT//REL TO USA. A4JS. CAN. GBR. ISJZll ' «s U DEMONSPIT DEMONSPIT is a new dataflow for bulk Call Data Records (CDRs) from Pakistan - CDRs are being acquired from major PK Telecom providers Data is normalized through TUSKATTIRE, like all other Call Data Records DEMONSPIT data is forwarded by TUSKATTIRE to several Clouds: - GMHalo/DPS Promotes records to FASCIA and feeds the SEDB Tower QFD - GMPIace& Cloud 14 Ingests DEMONSPIT into Sortinglead summaries to support SKYNET Analytics Ingests DEMONSPIT into a Perishable QFD which will be available to analysts via JEMA and CINEPLEX - Bulldozer/MDR2 All of the clouds receiving DEMONSPIT data also receive all FASCIA data TOP SECRET//COMINT//REL TO USA, AUS, ; CAN, GBR,,N.Z,L

SECRET//C0M1NT//REL TO USA, AUS, CAN, GBR; NZL Analysts' View of DEMONSPIT TUSKATTIRE Original wcdrs Access to ALL DEMONSPIT Data TOWER QFD ROLLERCOASTER Original fccdrs JEMA MAINWAY/SIGNAV CINEPLEX Access to CDRs, Analyst Queries, & Results of SKYNET Analytics CDR Summaries SMARTTRACKER SO RUN G LEAD Analyst Promoted CDRs Access to DEMONSPIT FASCIA Promoted Data FASCIA ASSOCIATION BANYAN SKYNET & Analyst Promoted CDRs SECRET//COMINT//REL TO USA, AUS, : CÄN, GBR; NZU

UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO

TOP SECRET//SI//REL TO USA, FVEY Cloud Analytic Building Blocks Travel Patterns - Travel phrases (Locations visited in given timeframe) - Regular/repeated visits to locations of interest Behavior-Based Analytics - Low use, incoming calls only - Excessive SIM or Handset swapping - Frequent Detach/Power-down - Courier machine learning models Other Enrichments Travel on particular days of the week Co-travelers Similar travel patterns Common contacts Visits to airports Other countries Overnight trips Permanent move TOP SECRET//SI//REL TO USA; FVEY

TOP SECRET//SI//REL TO USA, FVEY Sample Travel Report: Haqqani Network tasked- selector^ contact- swapping associated^ other_ seed-contacts count _num selectors visits_regularly countries phrase 3 lashkargah_city nowbahar IR helmand kandaharaf PK fa rah AF bala_bulk farah masow farah masow nowbahar masow 3 BA AE ghazni AF sharan urgon AF khost_airport kajir_kalay - m JF TOP SECRET//SI//REL TO USA; FVEY

TOP SECRET//SI//REL TO USA, FYEY. * *. * ' What Suspicious Selectors Were Seen Traveling Between Peshawar and Lahore? J VJ SoecifmBehavioral Cloud Analytics Peshawar-Lahore Travel 1-4 NOV 2011 ì J TASKED NUM_SELECTOR ASSOCIATED, ACTIVITY, TRAVEL PHRASE DOW MSISDN IMSI CONTACTS.SWAPPING SELECTORS CATEGORIES torkham AF PK peshawar lahore FRI 2 PK peshawar lahore THU behsud AF jalalabad jalal_abad jalalabad behsud rodat bati_kot mohmand_darah peshawar PK WED 4 7 gtrd PK nowshera gulbahar peshawar sanda kalan lahore THU jamrud PK peshawar lahore TUE 10 PK peshawar lahore THU TOP SECRET//SI//REL JO USA; FVEY. \ ; 5-or-f ewercontacts, smsand-zeroduration-callsonly, low-use

UNCLASSIFIED//FOUO Outline What isskynet? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic triage -SMARTTRACKER - RT-RG -JEMA UNCLASSIFIED//F.OÜO

TOP SECRET//SI//REL TO USA, FVEY Selectors of Interest from Cloud Travel Analytic (tasked) IMSIs: Handsets. I V. M'HAäS TOP SECRET//SI//REL TO USA: FVEY

TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Travel View 31 October - 23 November * Location: UCell JDl (11/14/2011 04:27:47) * Location: UCefl ID 1/70/7011 17:59:04) «fta KHATTAk SUSPECT TERRORIST FACILITY 001 (11/20/201112:59:04) * Location: UCell ID] (11/14/201102:19:16) Location: UCellJD 410.006.00403.20393 (11/23/201114:23:55) (11/21/201114:55:37) Location: UCell '11/20 2011 18:34:15) (11/20/2011 19:34:15) 31 '292.7713" N. 75*13'45.1982* E

TOP SECRET//SI//REL TO USA, FVEY. Examine travel patterns for common routes and meeting locations - Run cell soaks on all common meeting locations during meeting timeframe Analyze selectors for common contacts Analyze selectors for handset sharing behavior Repeat procedure with resulting selectors Correlate with other known and suspected selectors r TOP SECRET//SI//REL TO USA; FVEY:

TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Coincidence Report W+ Si Sets with 2 targets ' ' ' '* i Select Select 31 at 12 locations 24 at 11 locations Af.ft.r. t Select 1 at 1 location Select 1 at 1 location Select 1 at 1 location u

^ 77 TOP SECRET//SI//REL TO USA, FVEY RT-RG Analytics mm m ^awiwffà am Meetings - who is at the same ucellid at the same time as the potential courier at the destination city?...multiple times. Sidekicks - is there a pair traveling together to the destination city? TOP SECRET//SI//REL TO USA; FVEY

TOP SECRET//SI//REL TO USA, F VE Y '' : / JEM A: Pulling It All Together sfcçug/tp Start/end points Dates Destination Cities Movement Irregularity Travel Reports Human in the loop to analyze travel reports. Evaluate, add value, prioritize Meetings Are selectors seen meeting at destination consistently? 10 Sidekicks Does Sidekick selector have call events?