Palantir Technologies – VAST09 Team
Brandon Wright, Palantir Technologies, bwright@palantirtech.com
Jason Payne, Palantir Technologies
Matt Steckman, Palantir Technologies
Overview: Palantir is a platform for collaborative, all-source analysis and operations, enabling geospatial, social-network, temporal, statistical, and structured and unstructured analysis. Palantir provides flexible tools to import and model data, intuitive constructs to search against this data, and powerful techniques to iteratively define and test hypotheses. Our platform is most highly valued for:
Background: Palantir is operational today at many of the most prestigious intelligence, defense, law enforcement, and regulation/oversight organizations in the world. Palantir was put together by the founders of PayPal, capitalizing on the lessons learned by their anti-fraud department. Facing highly coordinated cyber attacks in order to commit payment fraud and exploit sensitive consumer information, an entirely new approach was required. Existing technology was poorly suited to dealing with sparse, cyber-specific data. To defeat the international fraud rings, high level conceptual access to the data was required. The analyst-driven intelligence analysis tools that eventually became the Palantir platform were a direct outgrowth of this effort.
Company Web site:
http://www.palantirtech.com
Check out our Analysis Blog to see more analysis using Palantir: http://www.palantirtech.com/government/analysis-blog
MC1.1: Identify which computer(s) the employee most likely used to send information to his contact in a tab-delimited table which contains for each computer identified: when the information was sent, how much information was sent and where that information was sent.
MC1.2: Characterize the patterns of behavior of suspicious computer use.
Based on analysis of the MC1 data in the Palantir platform, we believe embassy employee 30 most likely is the malicious insider who transmitted embassy data to the outside criminal organization. We identified 18 probable instances of 30 using 12 different embassy computers to make unauthorized Data Transmissions to IP address 100.59.151.133. These data transmissions, all over port 8080, involved very large payload requests and occurred one to three times per day every Tuesday and Thursday over a four week period on computers in vacant offices.
We spent about three hours preparing and running the automated data import into Palantir, and the analysis and completion of the following workflows took about one and a half hours.
Prior to analyzing the three MC1 datasets in Palantir, we first prepared the platform and data for import. To begin, we used Palantir’s Dynamic Ontology Manager to build an ontology to accurately model the MC1 data. For instance, we created proximity badge events and added a number of properties to Data Transmission event objects, such as payload request and response size. Next we imported the classified space prox-in/prox-out timestamps paired together so the “Prox-event Classified” events would have a duration of the entire time the associated employee was in the classified space.
In Palantir, the data import process is quite simple. The user adds a file or database to the import wizard, which allows the user to map columns in the data file to properties based on the chosen object type. The import wizard then automatically imports the data, creating objects with their respective properties, linking objects as specified, and resolving duplicate objects based on customizable resolution rules.
Employee 30 had suspicious pattern of multiple piggybacking events where he did not prox-in to the classified space but did prox-out on the mornings of January 10, 17, and 24. Based on this suspicious behavior, we investigated his officemate's computer for unauthorized Data Transmissions. Viewing all of the officemate’s Data Transmission and prox events in the timeline, we indeed found a Data Transmission that occurred while the employee was in the classified space. Highlighting that event in the Timeline, we can find it on the Graph and see in the Selection Helper that the Data Transmission is to IP address 100.59.151.133.
We then used Palantir’s Search Around application, which searches for specified target objects by property or link type based on an initial object selection, to search for other embassy computers that connected with the suspicious IP address. We found 18 Data Transmissions from 12 different embassy computers.
Working from these 18 Data Transmissions, we devised workflows to answer the following questions:
Finally, we created temporal filters for all 18 Data Transmissions and searched for all overlapping Prox-event Classified events, which we then linked to the associated employees in order to exclude them as possible suspects. Based on this search, we were left with 30 as our prime suspect. While verifying these suspicious transmissions, we were also able to see that there were no other unauthorized transmissions on these individuals’ computers.
Viewing the 18 transmissions in the Time Wheel helper, we can see that they occur on one to three times per day on Tuesdays and Thursdays over a four week period. We also see that the 18 transmissions used port 8080, were among the largest payload requests during the month, and that the 18 transmissions had the largest payload requests of all port 8080 network traffic. Although 30 had some Data Transmissions in close proximity to the unauthorized transmission, we feel that the evidence points to employee 30 as the malicious insider.