Jump to content

Department of Defense Cyber Crime Center: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Tags: Reverted extraneous markup
AnomieBOT (talk | contribs)
m Dating maintenance tags: {{What}}
 
(20 intermediate revisions by 15 users not shown)
Line 1: Line 1:
{{Short description|United States defense organization}}
{{advert|date=January 2018}}
{{advert|date=January 2018}}
{{Use American English|date=March 2024}}
{{Use dmy dates|date=March 2024}}
{{Infobox government agency
{{Infobox government agency
|agency_name = DoD Cyber Crime Center
|agency_name = DoD Cyber Crime Center
Line 11: Line 14:
}}
}}


The '''Department of Defense Cyber Crime Center''' ('''DC3''') is designated as a Federal Cyber Center by National Security [[Presidential directive|Presidential Directive]] 54/Homeland Security [[Presidential directive|Presidential Directive]] 23,<ref>{{cite web|url=http://www.defense.gov/dodreform/drids/drid27.htm|title=DoD Computer Forensics Laboratory and Training Program|work=defense.gov|url-status=dead|archiveurl=https://web.archive.org/web/20141219235652/http://www.defense.gov/dodreform/drids/drid27.htm|archivedate=2014-12-19}}</ref> as a [[United States Department of Defense|Department of Defense]] (DoD) [[center of excellence|Center Of Excellence]] for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,<ref>{{Cite web |url=http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf |title=Archived copy |access-date=2015-06-30 |archive-date=2011-10-26 |archive-url=https://web.archive.org/web/20111026062557/http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf |url-status=dead }}</ref> and serves as the operational focal point for the [[defense industrial base|Defense Industrial Base]] (DIB) [[Cybersecurity]] program.<ref>{{cite web|url=http://www.gpo.gov/fdsys/granule/CFR-2013-title32-vol2/CFR-2013-title32-vol2-part236|title=32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES|work=gpo.gov}}</ref> DC3 operates as a [[Field Operating Agency]] (FOA) under the [[Inspector General of the Department of the Air Force]].<ref name="dc3.mil">{{cite web |url=http://www.dc3.mil/index/about-dc3 |title=About DC3 < Defense Cyber Crime Center (DC3) |accessdate=2015-06-29 |url-status=dead |archiveurl=https://web.archive.org/web/20150206071903/http://www.dc3.mil/index/about-dc3 |archivedate=2015-02-06 }}</ref>
The '''Department of Defense Cyber Crime Center''' ('''DC3''') is designated as a Federal Cyber Center by National Security [[Presidential directive|Presidential Directive]] 54/Homeland Security [[Presidential directive|Presidential Directive]] 23,<ref>{{cite web|url=http://www.defense.gov/dodreform/drids/drid27.htm|title=DoD Computer Forensics Laboratory and Training Program|work=defense.gov|archive-url=https://web.archive.org/web/20141219235652/http://www.defense.gov/dodreform/drids/drid27.htm|archive-date=2014-12-19}}</ref> as a [[United States Department of Defense|Department of Defense]] (DoD) [[center of excellence|Center Of Excellence]] for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,<ref>{{Cite web |url=http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf |title=Archived copy |access-date=2015-06-30 |archive-date=2011-10-26 |archive-url=https://web.archive.org/web/20111026062557/http://www.dtic.mil/whs/directives/corres/pdf/550513E.pdf }}</ref> and serves as the operational focal point for the [[defense industrial base|Defense Industrial Base]] (DIB) [[Cybersecurity]] program.<ref>{{cite web|url=http://www.gpo.gov/fdsys/granule/CFR-2013-title32-vol2/CFR-2013-title32-vol2-part236|title=32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES|work=gpo.gov}}</ref> DC3 operates as a [[Field Operating Agency]] (FOA) under the [[Inspector General of the Department of the Air Force]].<ref name="dc3.mil">{{cite web |url=http://www.dc3.mil/index/about-dc3 |title=About DC3 < Defense Cyber Crime Center (DC3) |access-date=2015-06-29 |archive-url=https://web.archive.org/web/20150206071903/http://www.dc3.mil/index/about-dc3 |archive-date=2015-02-06 }}</ref>


== Mission ==
== Mission ==


Deliver superior [[digital and multimedia forensic]] services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: [[Cyber-security|cybersecurity]] and [[critical infrastructure protection]] , [[law enforcement]] and [[counterintelligence]] , document and media exploitation , and [[Counter-terrorism|counterterrorism]] .<ref name="dc3.mil"/><ref>{cite web |url=https://www.dc3.mil/About-DC3/DC3-Leadership/Mission-and-Vision/</ref>
Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: [[Cyber-security|cybersecurity]] and [[critical infrastructure protection]], [[law enforcement]] and [[counterintelligence]], document and media exploitation, and [[Counter-terrorism|counterterrorism]].<ref name="dc3.mil"/><ref>{{cite web |url=https://www.dc3.mil/About-DC3/DC3-Leadership/Mission-and-Vision/|title=Department of Defense Cyber Crime Center (DC3) > About DC3 > DC3 Leadership > Mission and Vision }}</ref>


== Cyber Forensics Laboratory ==
== Cyber Forensics Laboratory ==


The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) [[forensic examinations]], repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The lab’s robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations. The CFL also works with the Defense Cyber Operations Panel (which consists of Defense Criminal Investigative Organizations and Military Department Counterintelligence Organizations) to develop requirements and set standards for digital investigations as new technologies emerge and evolve. The CFL is an accredited lab under ISO 17025 by the ANSI National Accreditation Board, and its operations are subject to strict quality control and peer review. The CFL produces results which are valid and reliable, based on conditions and methods which are repeatable.
The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) [[forensic examinations]], repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The lab's robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations. The CFL also works with the Defense Cyber Operations Panel (which consists of Defense Criminal Investigative Organizations and Military Department Counterintelligence Organizations) to develop requirements and set standards for digital investigations as new technologies emerge and evolve. The CFL is an accredited lab under ISO 17025 by the ANSI National Accreditation Board, and its operations are subject to strict quality control and peer review. The CFL produces results which are valid and reliable, based on conditions and methods which are repeatable.


Digital and Multimedia (D/MM) forensic examinations
* Digital and Multimedia (D/MM) forensic examinations
Device Repair
* Device Repair
Data Extraction
* Data Extraction
Expert Testimony for DC3 Customers
* Expert Testimony for DC3 Customers


<ref>{{cite web|url=http://www.ascld-lab.org/|title=ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board|work=ascld-lab.org}}</ref><ref>{{cite web |url=https://www.dc3.mil/Missions/Digital-Forensics/Cyber-Forensics-Laboratory-CFL/ |title=CFL < Defense Cyber Crime Center (DC3) |accessdate=2022-10-2911 |url-status=active }}</ref>
<ref>{{cite web|url=http://www.ascld-lab.org/|title=ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board|work=ascld-lab.org}}</ref><ref>{{cite web |url=https://www.dc3.mil/Missions/Digital-Forensics/Cyber-Forensics-Laboratory-CFL/ |title=CFL Overview |website=Defense Cyber Crime Center (DC3) |access-date=2022-10-11 |archive-date=2023-03-21 |archive-url=https://web.archive.org/web/20230321010623/https://www.dc3.mil/Missions/Digital-Forensics/Cyber-Forensics-Laboratory-CFL/ |url-status=dead }}</ref>


== Cyber Training Academy==
== Cyber Training Academy==


The mission of the DoD Cyber Crime Center – Cyber Training Academy is to design, develop, and deliver the highest possible quality in cyber training to Department of Defense (DoD) personnel. In operation since 1998, the CTA has been instrumental in training Defense Criminal Investigative Organizations (DCIOs), Military Department Counterintelligence Organizations, Cyber Mission Forces (CMFs), Cyber Protection Teams (CPTs), Mission Defense Teams (MDTs), and many other entities across the greater DoD enterprise. “The CTA offers more than 30 unique courses of classroom, online, and Instructor-Led Virtual (ILV) cyber training to both individuals and organizations within the DoD charged with protecting defense information systems from unauthorized use, criminal and fraudulent activities, and foreign intelligence/counterintelligence efforts. —CTA<ref>{{cite web|url=https://www.dc3.mil/Missions/Cyber-Training/DC3-Cyber-Training-Academy-CTA/ |title=CTA |accessdate=2022-10-11 |url-status=active }}</ref>
The DoD Cyber Crime Center – Cyber Training Academy has been active since 1998, providing cyber training for Department of Defense (DoD) personnel. Over the years, the academy has played a role in training various defense entities, including Defense Criminal Investigative Organizations (DCIOs), Military Department Counterintelligence Organizations, Cyber Mission Forces (CMFs), Cyber Protection Teams (CPTs), Mission Defense Teams (MDTs), and others within the broader DoD enterprise. "The CTA offers more than 30 unique courses of classroom, online, and Instructor-Led Virtual (ILV) cyber training to both individuals and organizations within the DoD charged with protecting defense information systems from unauthorized use, criminal and fraudulent activities, and foreign intelligence/counterintelligence efforts." —CTA<ref>{{cite web |url=https://www.dc3.mil/Missions/Cyber-Training/DC3-Cyber-Training-Academy-CTA/ |title=CTA Overview |website=Defense Cyber Crime Center (DC3) |access-date=2022-10-11 |archive-date=2023-03-21 |archive-url=https://web.archive.org/web/20230321002715/https://www.dc3.mil/Missions/Cyber-Training/DC3-Cyber-Training-Academy-CTA/ |url-status=dead }}</ref>


== Technical Solutions Development ==
== Technical Solutions Development ==


Technical Solutions Development (TSD) tailors innovative software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. TSD validates digital forensic tools from commercial off-the-shelf, government off-the-shelf, and open source domains to ensure relevancy and reproducibility as to expected use. In coordination with its cooperative partners, TSD:
Technical Solutions Development (TSD) tailors software to the requirements of digital forensic examiners and cyber intrusion analysts. TSD validates digital forensic tools from commercial off-the-shelf, government off-the-shelf, and open-source domains to ensure relevancy and reproducibility as to expected use. In coordination with its cooperative partners, TSD:

Leads the way by proactively identifying, researching and evaluating relevant new technologies, techniques and tools
* Leads the way{{what|date=August 2024}} by proactively identifying, researching and evaluating relevant new technologies, techniques and tools
Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE)
* Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE)
Shares in-house-developed tools with federal, state, and local law enforcement partners
* Shares in-house-developed tools with federal, state, and local law enforcement partners
Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs/<ref>{{cite web |url=http://https://www.dc3.mil/Missions/Technical-Solutions/Technical-Solutions-Development-TSD/ |title=About TSD < Defense Cyber Crime Center (DC3) |accessdate=2022-10-11 |url-status=active }}</ref>
* Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs.<ref>{{cite web |url=https://www.dc3.mil/Missions/Technical-Solutions/Technical-Solutions-Development-TSD/ |title=TSD Overview |website=Defense Cyber Crime Center (DC3) |access-date=2022-10-11 |archive-date=2023-03-21 |archive-url=https://web.archive.org/web/20230321004823/https://www.dc3.mil/Missions/Technical-Solutions/Technical-Solutions-Development-TSD/ |url-status=dead }}</ref>


== DIB Cybersecurity ==
== DIB Cybersecurity ==


DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)—DCISE is the operational hub of the Defense Industrial Base (DIB) Cybersecurity Program of the Department of Defense, focused on protecting intellectual property and safeguarding DoD content residing on, or transiting through, contractor unclassified networks. The public-private cybersecurity partnership provides a collaborative environment for crowd-sourced threat sharing at both unclassified and classified levels. DCISE provides cyber resilience analyses for Cleared Defense Contractor (CDC) companies, and offers unmatched Cybersecurity-as-a-Service capabilities. DCISE performs cyber threat analysis and diagnostics, offers mitigation and remediation strategies, provides best practices, and conducts analyst-to-analyst exchanges with DIB participants ranging in size from small to enterprise-sized companies.<ref>{{cite web |url=https://www.dc3.mil/Missions/DIB-Cybersecurity/DIB-Cybersecurity-DCISE/ |title=DCISE < Defense Cyber Crime Center (DC3) |accessdate=2022-10-11 |url-status=active }}</ref>
DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)—DCISE is the operational hub of the Defense Industrial Base (DIB) Cybersecurity Program of the Department of Defense, focused on protecting intellectual property and safeguarding DoD content residing on, or transiting through, contractor unclassified networks. The public-private cybersecurity partnership provides a collaborative environment for crowd-sourced threat sharing at both unclassified and classified levels. DCISE provides cyber resilience analyses for Cleared Defense Contractor (CDC) companies and offers unmatched Cybersecurity-as-a-Service capabilities. DCISE performs cyber threat analysis and diagnostics, offers mitigation and remediation strategies, provides best practices, and conducts analyst-to-analyst exchanges with DIB participants ranging in size from small to enterprise-sized companies.<ref>{{cite web |url=https://www.dc3.mil/Missions/DIB-Cybersecurity/DIB-Cybersecurity-DCISE/ |title=DCISE Overview |website=Defense Cyber Crime Center (DC3) |access-date=2022-10-11}}</ref>


== Analytical Group ==
== Operations Enablement ==


Operations Enablement Directorate (OED) The mission and principal focus of the OED is to amplify the effects of DoD-wide law enforcement and counterintelligence (LE/CI) investigations and operations, and by extension, the effects of the U.S. Intelligence Community at large. That charge encompasses:
The DC3 Analytical Group (DC3/AG) supports LE/CI agencies, including the [[Air Force Office of Special Investigations]] (OSI), the [[Naval Criminal Investigative Services]] (NCIS), and key mission partners such as the [[Federal Bureau of Investigation]] (FBI). As a member agency of the [[National Cyber Investigative Joint Task Force]] (NCIJTF), the AG leads a collaborative analytical and technical exchange with subject matter experts from LE/CI, [[Computer Network Defense|computer network defense]] (CND), [[United States Intelligence Community|Intelligence Community]] (IC), and [[information assurance]] (IA) agencies to build a threat picture enabling proactive LE/CI cyber operations focuses on nation-state [[threat actor]]s.<ref>{{Cite web |url=http://www.dc3.mil/analytics |title=DC3 ANALYTICS < Defense Cyber Crime Center (DC3) |access-date=2015-06-29 |archive-date=2015-03-16 |archive-url=https://web.archive.org/web/20150316230825/http://www.dc3.mil/analytics |url-status=dead }}</ref>


# Conducting expert technical and all-source analysis (resulting in more than 493 products released in FY21) focused on countering foreign intelligence threats to DoD and the U.S. government as a whole
<ref></ref>== Vulnerability Disclosure ==
# Integrating disparate and emerging technologies to enhance collaboration, interoperability, and the collective capabilities of DoD and Federal LE/CI, cybersecurity, and acquisition communities
# Providing focused oversight and integration with the LE/CI and intelligence communities through liaison officers and embeds with:
#* Air Force Life Cycle Management Center (AFLCMC)
#* Army Military Intelligence
#* U.S. Cyber Command
#* Defense Counterintelligence and Security Agency (DCSA)
#* FBI
#* National Cyber Investigative Task Force (NCIJTF)<ref>{{Cite web |url=https://www.dc3.mil/Missions/Operations-Enablement/Operations-Enablement-OED/ |title=OED Overview |website=Defense Cyber Crime Center (DC3) |access-date=2022-10-11 |archive-date=2023-03-21 |archive-url=https://web.archive.org/web/20230321020433/https://www.dc3.mil/Missions/Operations-Enablement/Operations-Enablement-OED/ |url-status=dead }}</ref>


== Vulnerability Disclosure ==
The mission of the DoD VDP is to function as the single focal point for receiving vulnerability reports and interacting with crowd-sourced cybersecurity researchers supporting the DoDIN.1 This improves network defenses and enhances mission assurance by embracing a previously overlooked, yet indispensable, resource: private-sector white hat researchers. In January 2021, the DoD VDP scope was officially expanded from public-facing websites to all publicly accessible information systems throughout the DoD. This broadens the protection for the DoD attack surface and offers a safe harbor for researchers while providing more asset and technology security. The success of the program relies solely on the expertise and support of the security researcher community, and the program’s success contributes to the overall security of the DoD.<ref>{{cite web |url=https://www.dc3.mil/Missions/Vulnerability-Disclosure/Vulnerability-Disclosure-Program-VDP/ |title=VDP < Defense Cyber Crime Center (DC3) |accessdate=2022-10-11 |url-status=active }}</ref>

The mission of the DoD VDP is to function as the single focal point for receiving vulnerability reports and interacting with crowd-sourced cybersecurity researchers supporting the DoDIN.1 This improves network defenses and enhances mission assurance by embracing a previously overlooked, yet indispensable, resource: private-sector white hat researchers. In January 2021, the DoD VDP scope was officially expanded from public-facing websites to all publicly accessible information systems throughout the DoD. This broadens the protection for the DoD attack surface and offers a safe harbor for researchers while providing more asset and technology security. The success of the program relies solely on the expertise and support of the security researcher community, and the program's success contributes to the overall security of the DoD.<ref>{{cite web |url=https://www.dc3.mil/Missions/Vulnerability-Disclosure/Vulnerability-Disclosure-Program-VDP/ |title=VDP Overview |website=Defense Cyber Crime Center (DC3) }}</ref>


==See also==
==See also==
Line 59: Line 73:
'''Military Criminal Investigative Organizations'''
'''Military Criminal Investigative Organizations'''
*[[Air Force Office of Special Investigations]] (AFOSI)
*[[Air Force Office of Special Investigations]] (AFOSI)
*[[United States Army Criminal Investigation Command]] (USACIDC or CID)
*[[United States Army Criminal Investigation Division]] (USACIDC or CID)
*[[United States Army Counterintelligence]] (USAI or CI)
*[[United States Army Counterintelligence]] (USAI or CI)
*[[Naval Criminal Investigative Service]] (NCIS)
*[[Naval Criminal Investigative Service]] (NCIS)
Line 68: Line 82:
*[[Federal Law Enforcement Training Centers]]
*[[Federal Law Enforcement Training Centers]]
*[[Criminal Investigation Task Force]] (CITF)
*[[Criminal Investigation Task Force]] (CITF)
*[[Internet Crimes Against Children]] (ICAC) Task Force
*[[Internet Crimes Against Children Task Force]] (ICAC Task Force)


== References ==
== References ==
{{reflist}}
{{reflist}}
* {{cite web |url= https://fas.org/irp/offdocs/nspd/nspd-54.pdf |title= Cybersecurity Policy |series= National Security Presidential Directive (NSPD), Homeland Security Presidential Directive (HSPD) |id= NSPD-54, HSPD-23 |date= Jan 8, 2008 |pages= 15 |website= [[Federation of American Scientists]] (FAS) }}
* {{cite web |url= https://fas.org/irp/offdocs/nspd/nspd-54.pdf |title= Cybersecurity Policy |series= National Security Presidential Directive (NSPD), Homeland Security Presidential Directive (HSPD) |id= NSPD-54, HSPD-23 |date= 8 Jan 2008 |pages= 15 |website= [[Federation of American Scientists]] (FAS) }}

==External links==
* [http://www.dc3.mil DC3] Official webpage
* [http://www.af.mil/InspectorGeneralComplaints.aspx USAF IG] Official webpage


{{authority control}}
{{authority control}}

Latest revision as of 18:49, 27 August 2024

DoD Cyber Crime Center
Agency overview
Formed1998
HeadquartersLinthicum, Maryland
Parent agencyDepartment of Defense
Websitewww.dc3.mil

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23,[1] as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2] and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program.[3] DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force.[4]

Mission

[edit]

Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism.[4][5]

Cyber Forensics Laboratory

[edit]

The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The lab's robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations. The CFL also works with the Defense Cyber Operations Panel (which consists of Defense Criminal Investigative Organizations and Military Department Counterintelligence Organizations) to develop requirements and set standards for digital investigations as new technologies emerge and evolve. The CFL is an accredited lab under ISO 17025 by the ANSI National Accreditation Board, and its operations are subject to strict quality control and peer review. The CFL produces results which are valid and reliable, based on conditions and methods which are repeatable.

  • Digital and Multimedia (D/MM) forensic examinations
  • Device Repair
  • Data Extraction
  • Expert Testimony for DC3 Customers

[6][7]

Cyber Training Academy

[edit]

The DoD Cyber Crime Center – Cyber Training Academy has been active since 1998, providing cyber training for Department of Defense (DoD) personnel. Over the years, the academy has played a role in training various defense entities, including Defense Criminal Investigative Organizations (DCIOs), Military Department Counterintelligence Organizations, Cyber Mission Forces (CMFs), Cyber Protection Teams (CPTs), Mission Defense Teams (MDTs), and others within the broader DoD enterprise. "The CTA offers more than 30 unique courses of classroom, online, and Instructor-Led Virtual (ILV) cyber training to both individuals and organizations within the DoD charged with protecting defense information systems from unauthorized use, criminal and fraudulent activities, and foreign intelligence/counterintelligence efforts." —CTA[8]

Technical Solutions Development

[edit]

Technical Solutions Development (TSD) tailors software to the requirements of digital forensic examiners and cyber intrusion analysts. TSD validates digital forensic tools from commercial off-the-shelf, government off-the-shelf, and open-source domains to ensure relevancy and reproducibility as to expected use. In coordination with its cooperative partners, TSD:

  • Leads the way[clarification needed] by proactively identifying, researching and evaluating relevant new technologies, techniques and tools
  • Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE)
  • Shares in-house-developed tools with federal, state, and local law enforcement partners
  • Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs.[9]

DIB Cybersecurity

[edit]

DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)—DCISE is the operational hub of the Defense Industrial Base (DIB) Cybersecurity Program of the Department of Defense, focused on protecting intellectual property and safeguarding DoD content residing on, or transiting through, contractor unclassified networks. The public-private cybersecurity partnership provides a collaborative environment for crowd-sourced threat sharing at both unclassified and classified levels. DCISE provides cyber resilience analyses for Cleared Defense Contractor (CDC) companies and offers unmatched Cybersecurity-as-a-Service capabilities. DCISE performs cyber threat analysis and diagnostics, offers mitigation and remediation strategies, provides best practices, and conducts analyst-to-analyst exchanges with DIB participants ranging in size from small to enterprise-sized companies.[10]

Operations Enablement

[edit]

Operations Enablement Directorate (OED) The mission and principal focus of the OED is to amplify the effects of DoD-wide law enforcement and counterintelligence (LE/CI) investigations and operations, and by extension, the effects of the U.S. Intelligence Community at large. That charge encompasses:

  1. Conducting expert technical and all-source analysis (resulting in more than 493 products released in FY21) focused on countering foreign intelligence threats to DoD and the U.S. government as a whole
  2. Integrating disparate and emerging technologies to enhance collaboration, interoperability, and the collective capabilities of DoD and Federal LE/CI, cybersecurity, and acquisition communities
  3. Providing focused oversight and integration with the LE/CI and intelligence communities through liaison officers and embeds with:
    • Air Force Life Cycle Management Center (AFLCMC)
    • Army Military Intelligence
    • U.S. Cyber Command
    • Defense Counterintelligence and Security Agency (DCSA)
    • FBI
    • National Cyber Investigative Task Force (NCIJTF)[11]

Vulnerability Disclosure

[edit]

The mission of the DoD VDP is to function as the single focal point for receiving vulnerability reports and interacting with crowd-sourced cybersecurity researchers supporting the DoDIN.1 This improves network defenses and enhances mission assurance by embracing a previously overlooked, yet indispensable, resource: private-sector white hat researchers. In January 2021, the DoD VDP scope was officially expanded from public-facing websites to all publicly accessible information systems throughout the DoD. This broadens the protection for the DoD attack surface and offers a safe harbor for researchers while providing more asset and technology security. The success of the program relies solely on the expertise and support of the security researcher community, and the program's success contributes to the overall security of the DoD.[12]

See also

[edit]

Department of the Air Force

Military Criminal Investigative Organizations

Federal law enforcement

References

[edit]
  1. ^ "DoD Computer Forensics Laboratory and Training Program". defense.gov. Archived from the original on 19 December 2014.
  2. ^ "Archived copy" (PDF). Archived from the original (PDF) on 26 October 2011. Retrieved 30 June 2015.{{cite web}}: CS1 maint: archived copy as title (link)
  3. ^ "32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES". gpo.gov.
  4. ^ a b "About DC3 < Defense Cyber Crime Center (DC3)". Archived from the original on 6 February 2015. Retrieved 29 June 2015.
  5. ^ "Department of Defense Cyber Crime Center (DC3) > About DC3 > DC3 Leadership > Mission and Vision".
  6. ^ "ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board". ascld-lab.org.
  7. ^ "CFL Overview". Defense Cyber Crime Center (DC3). Archived from the original on 21 March 2023. Retrieved 11 October 2022.
  8. ^ "CTA Overview". Defense Cyber Crime Center (DC3). Archived from the original on 21 March 2023. Retrieved 11 October 2022.
  9. ^ "TSD Overview". Defense Cyber Crime Center (DC3). Archived from the original on 21 March 2023. Retrieved 11 October 2022.
  10. ^ "DCISE Overview". Defense Cyber Crime Center (DC3). Retrieved 11 October 2022.
  11. ^ "OED Overview". Defense Cyber Crime Center (DC3). Archived from the original on 21 March 2023. Retrieved 11 October 2022.
  12. ^ "VDP Overview". Defense Cyber Crime Center (DC3).