Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
GRIMPLATE
First Steps Toward Identifying
Network Operations Center
Adversarial Use of BitTorrent
NSA/R4
Agenda
• Motivation
• DHT overview
• Pilot implementation
• Collaboration
CONFIDENTIAL
TOP SECRET//COMINT//REL FVEY
GRIMPLATE Motivation
• UDP
– Used to exchange routing messages
• Who should I ask for file pieces?
BitTorrent DHT
• Nodes: clients participating in DHT
• Approach:
– spray find_node messages across DHT and store responses
– query for peers of info_hashes of interest
SIGINT Lag
Next Steps
• Enhanced analytics
– Community discovery
• Distributed crawler
• Peer pre-fetch
Prior Work
GCHQ - SEBACIUM
POC:
Prototype analytics
POC:
PACKAGEGOODS connection
POC:
GRIMPLATE Collaboration
CES - Digital Network Exploitation Applications
NTOC
“go grimplate”
CONFIDENTIAL
UNCLASSIFIED
Questions
Why am I
grim?
UNCLASSIFIED