- Read RSS content and store the full text and images from the RSS feeds long term
- Same goes with Facebook and Twitter, users can delete it but we want an artifact copy
- Using strings and keywords we want to search data to find relevant information as fast as possible
- Customized dashboards for our security analyst
- The ability to tag data and feeds so be able to create categories that would be of interest to analyst
- Take user suggestions and make them a reality
Today we have landed somewhere in the middle. While we utilize Hadoop to search content for keywords and build relational data most of what we do it based on our category tagging. Only one of our products is proprietary. 95% of the software we use is either open source or commercial software that we have purchased or licensed for a particular purpose. All of our intelligence software is open source. How we process that is the proprietary portion of the equation. Utilizing a string library that we wrote in house we are able to do some really interesting things such as archiving chat logs, following users on IRC and finding relevant terms from a manually generated hit list in several sources of data to include Facebook, RSS and other Internet locations. You see most of the information required in building an intelligence system is out there you just have to list out your requirements and find open source libraries that provide that functionality and make a process flow that utilizes the products to their potential. Most of the software that we use was not originally developed to do what we are using it for, and that's OK. We will modify the software to do what we want it to do.
It doesn't matter where the information comes from at all. What matters is how you analyze that data for information and connect it to other information in your data store. If you can't connect the dots the data is nothing more than a checkpoint in time. If you can't pull out keywords and terms you don't know how to classify the artifact. If you can't build links through matching terms you can't figure out what artifacts are related to other artifacts. This is data science at it's best. What about the metadata in files. I can't tell you the number of times that we were able to get a computer name out of dumped password disclosures or to actually find similarities in different leaks due to dialect and other specific detail that allowed us to connect the data to a group or individual.
Honestly in the security analysis field the research is all about the vectors and metadata. Use these clues to connect the dots. You may be surprised at what you find.