Department of Defense Cyber Crime Center

Defense Cyber Crime Center
Agency overview
Formed 1998
Headquarters Linthicum, Maryland
Parent agency Department of Defense
Website www.dc3.mil

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 27,[1] as a Department of Defense (DoD) center of excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2] and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity and Information Assurance (CS/IA) Program.[3] DC3 operates under the Air Force Office of Special Investigations (AFOSI or OSI).[4]

Mission

Deliver superior D/MM forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis for the following DoD mission areas: cybersecurity (CS) and critical infrastructure protection (CIP), law enforcement and counterintelligence (LE/CI), document and media exploitation (DOMEX), and counterterrorism (CT).[4]

Digital & Multimedia Forensics

The DC3 Cyber Forensics Laboratory (DC3/CFL) performs D/MM forensic examinations, device repair, data extraction, and expert testimony for DoD. The lab's robust intrusion and malware analysis capability supports other DC3 lines of business and activities. Lab operations are accredited under ISO 17025 by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB) which guides reliable, repeatable, and valid exam results, subjected to quality control and peer review.[5][6]

Cyber Training

The DC3 Cyber Training Academy provides in-residence and online training to DoD elements that protect DoD information systems from unauthorized use, criminal, fraudulent, and foreign intelligence activities. The Academy's curriculum offers courses organized into specialty areas. Since its founding in 1998, the Academy has recorded more than 19,000 student enrollments in its courses.[7][8]

Technical Solutions

The DC3 Technical Solutions Development (DC3/TSD) Directorate tailors software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. TSD validates commercial off-the-shelf (COTS), government off-the-shelf (GOTS), and in-house developed software/hardware before it can be used in a forensic process. In addition, TSD functions as the DoD repository for cyber counterintelligence (CI) tools.[9]

DIB Cybersecurity

As the operational hub for the DIB CS/IA Program, the DIB Collaborative Information Sharing Environment (DC3/DCISE) assists DIB companies to safeguard DoD content and intellectual property residing on or transiting their unclassified networks. DCISE develops and shares actionable threat products, and performs cyber analysis, diagnostics, and remediation consults for DIB Partners.[10]

Analytical Group

The DC3 Analytical Group (DC3/AG) supports LE/CI agencies, including the Air Force Office of Special Investigations (AFOSI), the Naval Criminal Investigative Services (NCIS), and key mission partners such as the Federal Bureau of Investigation (FBI). As a member agency of the National Cyber Investigative Joint Task Force (NCIJTF), the AG leads a collaborative analytical and technical exchange with subject matter experts from LE/CI, computer network defense (CND), Intelligence Community (IC), and information assurance (IA) agencies to build a threat picture enabling proactive LE/CI cyber operations focuses on nation-state threat actors.[11]

DC3 Digital Forensics Challenge

From 2006 to 2013, DC3 held a free online, international competition consisting of individual progressive-level exercises. Challenges tests included stenography, data carving, data recovery, and detection of malicious software.

In its first year, 140 teams from the U.S. participated in the Challenge. In its final year, the Challenge had grown to include 1,254 teams from 53 countries.

DoD Cyber Crime Conference

DC3 hosted the DoD Cyber Crime Conference from 2003 to 2012.

Published Tools

References

  1. "DoD Computer Forensics Laboratory and Training Program". defense.gov. Archived from the original on 2014-12-19.
  2. http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf
  3. "32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES". gpo.gov.
  4. 1 2 "Archived copy". Archived from the original on 2015-02-06. Retrieved 2015-06-29.
  5. "ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board". ascld-lab.org.
  6. "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29.
  7. "Archived copy". Archived from the original on 2015-05-27. Retrieved 2015-06-30.
  8. "Archived copy". Archived from the original on 2015-03-14. Retrieved 2015-06-29.
  9. "Archived copy". Archived from the original on 2015-02-27. Retrieved 2015-06-30.
  10. "Archived copy". Archived from the original on 2015-02-22. Retrieved 2015-06-29.
  11. http://www.dc3.mil/analytics
  12. amedico. "dc3dd". SourceForge.
  13. "Defense-Cyber-Crime-Center/DC3-MWCP". GitHub.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.