Jim Christy
   HOME
*





Jim Christy
Jim Christy (born 1951) is an American government employee, who retired from his position as the Director of Futures Exploration (FX) for the Department of Defense Cyber Crime Center in 2013. FX was in charge of establishing strategic relationships between the US Government and private agencies and academia. Christy was the Director of the Defense Cyber Crime Institute from 2003 to 2006, and Director of Operations of the Defense Computer Forensics Laboratory from 2001 to 2003. Christy was chief of the Air Force Office of Special Investigations (AFOSI) computer crime investigations unit from 1989 to 1996. As the founder of the world's largest digital forensics shop, he is notable for his involvement in high priority government computer security. Christy joined the Air Force when he was 19. He later became a computer operator at the Pentagon, and got a job as a computer crime investigator at AFOSI in 1986. In 1986 Christy investigated the notorious Hanover Hackers, a band of W ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Air Force Office Of Special Investigations
The Department of the Air Force Office of Special Investigations (OSI) is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative guidance and oversight of the Inspector General of the Department of the Air Force. By federal statute, OSI provides independent criminal investigative, counterintelligence and protective service operations worldwide and outside of the traditional military chain of command. Proactively, OSI identifies, investigates, and neutralizes serious criminal, terrorist, and espionage threats to personnel and resources of the Air Force, Space Force, and the U.S. Department of Defense, thereby protecting the national security of the United States. Overview The Office of Special Investigations capabilities: * Protect critical technologies and information * Detect and mitigate threats * Provide global specialized services * Conduct major criminal in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Department Of Defense Cyber Crime Center
The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force. Mission Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism. Cyber Forensics Laboratory The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Defense Cyber Crime Institute
The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force. Mission Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism. Cyber Forensics Laboratory The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Defense Computer Forensics Laboratory
The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force. Mission Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism. Cyber Forensics Laboratory The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Air Force
The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part of the United States Army Signal Corps, the USAF was established as a separate branch of the United States Armed Forces in 1947 with the enactment of the National Security Act of 1947. It is the second youngest branch of the United States Armed Forces and the fourth in order of precedence. The United States Air Force articulates its core missions as air supremacy, global integrated intelligence, surveillance and reconnaissance, rapid global mobility, global strike, and command and control. The United States Air Force is a military service branch organized within the Department of the Air Force, one of the three military departments of the Department of Defense. The Air Force through the Department of the Air Force is headed by the civilian Secretary of the Air Force ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Pentagon
The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a metonym for the Department of Defense and its leadership. Located in Arlington County, Virginia, across the Potomac River from Washington, D.C., the building was designed by American architect George Bergstrom and built by contractor John McShain. Ground was broken on 11 September 1941, and the building was dedicated on 15 January 1943. General Brehon Somervell provided the major impetus to gain Congressional approval for the project; Colonel Leslie Groves was responsible for overseeing the project for the U.S. Army Corps of Engineers, which supervised it. The Pentagon is the world's largest office building, with about of floor space, of which are used as offices. Some 23,000 military and civilian employees, and another 3,000 non-defense sup ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hanover Hackers
Hanover (; german: Hannover ; nds, Hannober) is the capital and largest city of the German state of Lower Saxony. Its 535,932 (2021) inhabitants make it the 13th-largest city in Germany as well as the fourth-largest city in Northern Germany after Berlin, Hamburg and Bremen. Hanover's urban area comprises the towns of Garbsen, Langenhagen and Laatzen and has a population of about 791,000 (2018). The Hanover Region has approximately 1.16 million inhabitants (2019). The city lies at the confluence of the River Leine and its tributary the Ihme, in the south of the North German Plain, and is the largest city in the Hannover–Braunschweig–Göttingen–Wolfsburg Metropolitan Region. It is the fifth-largest city in the Low German dialect area after Hamburg, Dortmund, Essen and Bremen. Before it became the capital of Lower Saxony in 1946, Hannover was the capital of the Principality of Calenberg (1636–1692), the Electorate of Hanover (1692–1814), the Kingdom of Hannover (1814†...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE