Jump to content

Department of Defense Cyber Crime Center

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Rondaswann-brunton (talk | contribs) at 21:28, 11 October 2022 (Technical Solutions). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

DoD Cyber Crime Center
Agency overview
Formed1998
HeadquartersLinthicum, Maryland
Parent agencyDepartment of Defense
Websitewww.dc3.mil

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23,[1] as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2] and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program.[3] DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force.[4]

Mission

Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection , law enforcement and counterintelligence , document and media exploitation , and counterterrorism .[4][5]

Cyber Forensics Laboratory

The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The lab’s robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations. The CFL also works with the Defense Cyber Operations Panel (which consists of Defense Criminal Investigative Organizations and Military Department Counterintelligence Organizations) to develop requirements and set standards for digital investigations as new technologies emerge and evolve. The CFL is an accredited lab under ISO 17025 by the ANSI National Accreditation Board, and its operations are subject to strict quality control and peer review. The CFL produces results which are valid and reliable, based on conditions and methods which are repeatable.

• Digital and Multimedia (D/MM) forensic examinations • Device Repair • Data Extraction • Expert Testimony for DC3 Customers

[6][7]

Cyber Training Academy

The mission of the DoD Cyber Crime Center – Cyber Training Academy is to design, develop, and deliver the highest possible quality in cyber training to Department of Defense (DoD) personnel. In operation since 1998, the CTA has been instrumental in training Defense Criminal Investigative Organizations (DCIOs), Military Department Counterintelligence Organizations, Cyber Mission Forces (CMFs), Cyber Protection Teams (CPTs), Mission Defense Teams (MDTs), and many other entities across the greater DoD enterprise. “The CTA offers more than 30 unique courses of classroom, online, and Instructor-Led Virtual (ILV) cyber training to both individuals and organizations within the DoD charged with protecting defense information systems from unauthorized use, criminal and fraudulent activities, and foreign intelligence/counterintelligence efforts.” —CTA[8]

Technical Solutions Development

Technical Solutions Development (TSD) tailors innovative software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. TSD validates digital forensic tools from commercial off-the-shelf, government off-the-shelf, and open source domains to ensure relevancy and reproducibility as to expected use. In coordination with its cooperative partners, TSD: • Leads the way by proactively identifying, researching and evaluating relevant new technologies, techniques and tools • Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE) • Shares in-house-developed tools with federal, state, and local law enforcement partners • Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs/[9]

DIB Cybersecurity

As the operational hub for the DIB CS/IA Program, the DIB Collaborative Information Sharing Environment (DC3/DCISE) assists DIB companies to safeguard DoD content and intellectual property residing on or transiting their unclassified networks. DCISE develops and shares actionable threat products, and performs cyber analysis, diagnostics, and remediation consults for DIB Partners.[10]

Analytical Group

The DC3 Analytical Group (DC3/AG) supports LE/CI agencies, including the Air Force Office of Special Investigations (OSI), the Naval Criminal Investigative Services (NCIS), and key mission partners such as the Federal Bureau of Investigation (FBI). As a member agency of the National Cyber Investigative Joint Task Force (NCIJTF), the AG leads a collaborative analytical and technical exchange with subject matter experts from LE/CI, computer network defense (CND), Intelligence Community (IC), and information assurance (IA) agencies to build a threat picture enabling proactive LE/CI cyber operations focuses on nation-state threat actors.[11]

Vulnerability Disclosure

The DoD Vulnerability Disclosure Program (VDP) leverages the experience and knowledge of ethical hackers from around the world to improve network defenses and enhance mission assurance. DC3 was assigned by the Secretary of Defense to be the DoD focal point for receiving vulnerability reports and interacting with researchers consistent with DC3's existing information sharing responsibilities as a Federal Cybersecurity Center.

See also

Department of the Air Force

Military Criminal Investigative Organizations

Federal law enforcement

References

  1. ^ "DoD Computer Forensics Laboratory and Training Program". defense.gov. Archived from the original on 2014-12-19.
  2. ^ "Archived copy" (PDF). Archived from the original (PDF) on 2011-10-26. Retrieved 2015-06-30.{{cite web}}: CS1 maint: archived copy as title (link)
  3. ^ "32 CFR 236 - DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES". gpo.gov.
  4. ^ a b "About DC3 < Defense Cyber Crime Center (DC3)". Archived from the original on 2015-02-06. Retrieved 2015-06-29.
  5. ^ {cite web |url=https://www.dc3.mil/About-DC3/DC3-Leadership/Mission-and-Vision/
  6. ^ "ASCLD/LAB - American Society of Crime Laboratory Directors / Laboratory Accreditation Board". ascld-lab.org.
  7. ^ "CFL < Defense Cyber Crime Center (DC3)". Retrieved 2022-10-2911. {{cite web}}: Check date values in: |accessdate= (help); Invalid |url-status=active (help)
  8. ^ "CTA". Retrieved 2022-10-11. {{cite web}}: Invalid |url-status=active (help)
  9. ^ "About TSD < Defense Cyber Crime Center (DC3)". Retrieved 2022-10-11. {{cite web}}: Check |url= value (help); Invalid |url-status=active (help)
  10. ^ "About DCISE < Defense Cyber Crime Center (DC3)". Archived from the original on 2015-02-22. Retrieved 2015-06-29.
  11. ^ "DC3 ANALYTICS < Defense Cyber Crime Center (DC3)". Archived from the original on 2015-03-16. Retrieved 2015-06-29.