Department of Defense Cyber Crime Center

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23,[1] as a Department of Defense (DoD) center of excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2] and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity and Information Assurance (CS/IA) Program.[3] DC3 operates under the Air Force Office of Special Investigations (AFOSI or OSI).[4]

DoD Cyber Crime Center
Agency overview
Formed1998
HeadquartersLinthicum, Maryland
Parent agencyDepartment of Defense
Websitewww.dc3.mil

Mission

Deliver superior D/MM forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis for the following DoD mission areas: cybersecurity (CS) and critical infrastructure protection (CIP), law enforcement and counterintelligence (LE/CI), document and media exploitation (DOMEX), and counterterrorism (CT).[4]

Digital & Multimedia Forensics

The DC3 Cyber Forensics Laboratory (DC3/CFL) performs D/MM forensic examinations, device repair, data extraction, and expert testimony for DoD. The lab's robust intrusion and malware analysis capability supports other DC3 lines of business and activities. Lab operations are accredited under ISO 17025 by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB) which guides reliable, repeatable, and valid exam results, subjected to quality control and peer review.[5][6]

Cyber Training

The DC3 Cyber Training Academy, formerly DCITA (The Defense Cyber Investigations Training Academy), provides in-residence and online training to DoD elements that protect DoD information systems from unauthorized use, criminal, fraudulent, and foreign intelligence activities. The Academy's curriculum offers courses organized into specialty areas. Since its founding in 1998, the Academy has recorded more than 35,000 student enrollments in its courses.[7][8]

Technical Solutions

The DC3 Technical Solutions Development (DC3/TSD) Directorate tailors software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. TSD validates commercial off-the-shelf (COTS), government off-the-shelf (GOTS), and in-house developed software/hardware before it can be used in a forensic process. In addition, TSD functions as the DoD repository for cyber counterintelligence (CI) tools.[9]

DIB Cybersecurity

As the operational hub for the DIB CS/IA Program, the DIB Collaborative Information Sharing Environment (DC3/DCISE) assists DIB companies to safeguard DoD content and intellectual property residing on or transiting their unclassified networks. DCISE develops and shares actionable threat products, and performs cyber analysis, diagnostics, and remediation consults for DIB Partners.[10]

Analytical Group

The DC3 Analytical Group (DC3/AG) supports LE/CI agencies, including the Air Force Office of Special Investigations (AFOSI), the Naval Criminal Investigative Services (NCIS), and key mission partners such as the Federal Bureau of Investigation (FBI). As a member agency of the National Cyber Investigative Joint Task Force (NCIJTF), the AG leads a collaborative analytical and technical exchange with subject matter experts from LE/CI, computer network defense (CND), Intelligence Community (IC), and information assurance (IA) agencies to build a threat picture enabling proactive LE/CI cyber operations focuses on nation-state threat actors.[11]

Vulnerability Disclosure

The DoD Vulnerability Disclosure Program (VDP) leverages the experience and knowledge of ethical hackers from around the world to improve network defenses and enhance mission assurance. DC3 was assigned by the Secretary of Defense to be the DoD focal point for receiving vulnerability reports and interacting with researchers consistent with DC3's existing information sharing responsibilities as a Federal Cybersecurity Center.

gollark: What are they?
gollark: Okay, what should the builtins and stuff be?
gollark: Ugh, I am going to need to totally rewrite the actual Soviet Forth language at this rate.
gollark: ++smite edgy
gollark: ++remind 1m derail conversation!

See also

Military Criminal Investigative Organizations

Federal law enforcement

References

  1. "DoD Computer Forensics Laboratory and Training Program". defense.gov. Archived from the original on 2014-12-19.
  2. http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf
  3. "32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES". gpo.gov.
  4. "Archived copy". Archived from the original on 2015-02-06. Retrieved 2015-06-29.CS1 maint: archived copy as title (link)
  5. "ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board". ascld-lab.org.
  6. "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29.CS1 maint: archived copy as title (link)
  7. "Archived copy". Archived from the original on 2015-05-27. Retrieved 2015-06-30.CS1 maint: archived copy as title (link)
  8. "Archived copy". Archived from the original on 2015-03-14. Retrieved 2015-06-29.CS1 maint: archived copy as title (link)
  9. "Archived copy". Archived from the original on 2015-02-27. Retrieved 2015-06-30.CS1 maint: archived copy as title (link)
  10. "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29.CS1 maint: archived copy as title (link)
  11. http://www.dc3.mil/analytics
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.