DoD Cyber Crime Center

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Defense Cyber Crime Center
DoD Cyber Crime Center.jpg
Agency overview
Formed 1998
Headquarters Linthicum, Maryland
Parent agency Department of Defense
Website www.dc3.mil

DC3 is designated as a federal cyber center by National Security Presidential Directive 54/Homeland Security Presidential Directive 27,[1] as a Department of Defense (DoD) center of excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2] and serves as the operational focal point for the Defense Industrial Base Cybersecurity and Information Assurance Program.[3] DC3 operates under the Air Force Office of Special Investigations.[4]

Mission[edit]

Deliver superior digital forensics and multimedia lab services, cyber technical training, technical solutions development, and cyber analytics for the following DoD mission areas: cybersecurity (CS) and critical infrastructure protection (CIP), law enforcement and counterintelligence (LE/CI), document and media exploitation (DOMEX), and counterterrorism (CT).[4]

Digital Forensics[edit]

DC3's Defense Computer Forensics Laboratory (DCFL) performs Digital and Multimedia (D/MM) forensic examinations, device repair, data extraction, and expert testimony for DoD. The lab's robust intrusion and malware analysis capability supports other DC3 lines of business and activities. Lab operations are accredited under ISO 17025 by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB) which guides reliable, repeatable, and valid exam results, subjected to quality control and peer review.[5][6]

Cyber Training[edit]

The Defense Cyber Investigations Training academy (DCITA) provides in-residence and online training to DoD elements that protect DoD information systems from unauthorized use, criminal, fraudulent, and foreign intelligence activities. The Academy's curriculum offers courses organized into specialty areas. Since its founding in 1998, the Academy has recorded more than 19,000 student enrollments in its courses.[7][8]

Technical Solutions[edit]

As DC3's technical solutions development capability, the Defense Cyber Crime Institute (DCCI) tailors software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. DCCI validates commercial off-the-shelf (COTS), government off-the-shelf (GOTS), and in-house developed software/hardware before it can be used in a forensic process. In addition, DCCI functions as the DoD repository for cyber counterintelligence (CI) tools.[9]

DIB Cybersecurity[edit]

As the operational hub for the DIB Cybersecurity/Information Assurance Program, The Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE) assists DIB companies to safeguard DoD content and intellectual property residing on or transiting their unclassified networks. DCISE develops and shares actionable threat products, and performs cyber analysis, diagnostics, and remediation consults for DIB Partners.[10]

Analytical Group[edit]

DC3's Analytical Group (AG) supports law enforcement and counterintelligence (LE/CI) agencies, including the Air Force Office of Special Investigations (AFOSI), the Naval Criminal Investigative Services (NCIS), and key mission partners such as the Federal Bureau of Investigation (FBI). As a member agency of the National Cyber Investigative Joint Task Force (NCIJTF), the AG leads a collaborative analytical and technical exchange with subject matter experts from LE/CI, computer network defense (CND), intelligence community (IC), and information assurance (IA) agencies to build a threat picture enabling proactive LE/CI cyber operations focuses on nation-state threat actors.[11]

DC3 Digital Forensics Challenge[edit]

From 2006 to 2013, DC3 held a free online, international competition consisting of individual progressive-level exercises. Challenges tests included stenography, data carving, data recovery, and detection of malicious software.

In its first year, 140 teams from the U.S. participated in the Challenge. In its final year, the Challenge had grown to include 1,254 teams from 53 countries.

DoD Cyber Crime Conference[edit]

DC3 hosted the DoD Cyber Crime Conference from 2003 to 2012.

Published Tools[edit]

References[edit]

  1. ^ "DoD Computer Forensics Laboratory and Training Program". defense.gov. 
  2. ^ http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf
  3. ^ "32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES". gpo.gov. 
  4. ^ a b "Archived copy". Archived from the original on 2015-02-06. Retrieved 2015-06-29. 
  5. ^ "ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board". ascld-lab.org. 
  6. ^ "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29. 
  7. ^ "Archived copy". Archived from the original on 2015-05-27. Retrieved 2015-06-30. 
  8. ^ "Archived copy". Archived from the original on 2015-03-14. Retrieved 2015-06-29. 
  9. ^ "Archived copy". Archived from the original on 2015-02-27. Retrieved 2015-06-30. 
  10. ^ "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29. 
  11. ^ http://www.dc3.mil/analytics
  12. ^ amedico. "dc3dd". SourceForge. 
  13. ^ "Defense-Cyber-Crime-Center/DC3-MWCP". GitHub. 

External links[edit]