Defense Computer Forensics Laboratory
   HOME

TheInfoList



OR:

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security
Presidential Directive A presidential directive, or executive action, is a written or oral instruction or declaration issued by the president of the United States, which may draw upon the powers vested in the president by the U.S. Constitution, statutory law, or, in cert ...
54/Homeland Security
Presidential Directive A presidential directive, or executive action, is a written or oral instruction or declaration issued by the president of the United States, which may draw upon the powers vested in the president by the U.S. Constitution, statutory law, or, in cert ...
23, as a
Department of Defense Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philippin ...
(DoD)
Center Of Excellence A center of excellence (COE or CoE ), also called excellence center, is a team, a shared facility or an entity that provides leadership, best practices, research, support or training for a focus area. Due to its broad usage and vague legal prec ...
for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the
Defense Industrial Base The term defense industrial base (or DIB), also known as the defense industrial and technological base, is used in political science to refer to a government's industrial assets that are of direct or indirect importance for the production of equip ...
(DIB)
Cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
program. DC3 operates as a
Field Operating Agency This is a list of Field Operating Agencies (FOA) in the United States Department of the Air Force that are active. FOAs report directly to a functional manager in either the Office of the Secretary of the Air Force or the Air Staff (United States) ...
(FOA) under the
Inspector General of the Department of the Air Force The Inspector General of the Department of the Air Force is responsible for conducting investigations and inspections as directed by the Secretary of the Air Force, Chief of Staff of the United States Air Force, and Chief of Space Operations. T ...
.


Mission

Deliver superior digital and multimedia forensic services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas:
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
and
critical infrastructure protection Critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation. The American Presidential directive PDD-63 of May 1998 set up ...
,
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
and
counterintelligence Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or ot ...
, document and media exploitation, and
counterterrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that Government, governments, law enforcement, business, and Intelligence agency, intellig ...
.


Cyber Forensics Laboratory

The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The lab's robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations. "The next day, Midori finds Tsukasa demanding payment from his teammates for having won a bet, laughing about how easy it is to get a 'country girl' to become intimate with him, and speculating that he will continue to do so a few more times before leaving her."The CFL is an accredited lab under ISO 17025 by the ANSI National Accreditation Board, and its operations are subject to strict quality control and peer review. The CFL produces results which are valid and reliable, based on conditions and methods which are repeatable. * Digital and Multimedia (D/MM) forensic examinations * Device Repair * Data Extraction * Expert Testimony for DC3 Customers


Cyber Training Academy

The mission of the DoD Cyber Crime Center – Cyber Training Academy is to design, develop, and deliver the highest possible quality in cyber training to Department of Defense (DoD) personnel. In operation since 1998, the CTA has been instrumental in training Defense Criminal Investigative Organizations (DCIOs), Military Department Counterintelligence Organizations, Cyber Mission Forces (CMFs), Cyber Protection Teams (CPTs), Mission Defense Teams (MDTs), and many other entities across the greater DoD enterprise. "The CTA offers more than 30 unique courses of classroom, online, and Instructor-Led Virtual (ILV) cyber training to both individuals and organizations within the DoD charged with protecting defense information systems from unauthorized use, criminal and fraudulent activities, and foreign intelligence/counterintelligence efforts." —CTA


Technical Solutions Development

Technical Solutions Development (TSD) tailors innovative software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. TSD validates digital forensic tools from commercial off-the-shelf, government off-the-shelf, and open-source domains to ensure relevancy and reproducibility as to expected use. In coordination with its cooperative partners, TSD: * Leads the way by proactively identifying, researching and evaluating relevant new technologies, techniques and tools * Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE) * Shares in-house-developed tools with federal, state, and local law enforcement partners * Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs.


DIB Cybersecurity

DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)—DCISE is the operational hub of the Defense Industrial Base (DIB) Cybersecurity Program of the Department of Defense, focused on protecting intellectual property and safeguarding DoD content residing on, or transiting through, contractor unclassified networks. The public-private cybersecurity partnership provides a collaborative environment for crowd-sourced threat sharing at both unclassified and classified levels. DCISE provides cyber resilience analyses for Cleared Defense Contractor (CDC) companies and offers unmatched Cybersecurity-as-a-Service capabilities. DCISE performs cyber threat analysis and diagnostics, offers mitigation and remediation strategies, provides best practices, and conducts analyst-to-analyst exchanges with DIB participants ranging in size from small to enterprise-sized companies.


Operations Enablement

Operations Enablement Directorate (OED) The mission and principal focus of the OED is to amplify the effects of DoD-wide law enforcement and counterintelligence (LE/CI) investigations and operations, and by extension, the effects of the U.S. Intelligence Community at large. That charge encompasses: # Conducting expert technical and all-source analysis (resulting in more than 493 products released in FY21) focused on countering foreign intelligence threats to DoD and the U.S. government as a whole # Integrating disparate and emerging technologies to enhance collaboration, interoperability, and the collective capabilities of DoD and Federal LE/CI, cybersecurity, and acquisition communities # Providing focused oversight and integration with the LE/CI and intelligence communities through liaison officers and embeds with: #* Air Force Life Cycle Management Center (AFLCMC) #* Army Military Intelligence #* U.S. Cyber Command #* Defense Counterintelligence and Security Agency (DCSA) #* FBI #* National Cyber Investigative Task Force (NCIJTF)


Vulnerability Disclosure

The mission of the DoD VDP is to function as the single focal point for receiving vulnerability reports and interacting with crowd-sourced cybersecurity researchers supporting the DoDIN.1 This improves network defenses and enhances mission assurance by embracing a previously overlooked, yet indispensable, resource: private-sector white hat researchers. In January 2021, the DoD VDP scope was officially expanded from public-facing websites to all publicly accessible information systems throughout the DoD. This broadens the protection for the DoD attack surface and offers a safe harbor for researchers while providing more asset and technology security. The success of the program relies solely on the expertise and support of the security researcher community, and the program's success contributes to the overall security of the DoD.


See also

Department of the Air Force *
Inspector General of the Department of the Air Force The Inspector General of the Department of the Air Force is responsible for conducting investigations and inspections as directed by the Secretary of the Air Force, Chief of Staff of the United States Air Force, and Chief of Space Operations. T ...
*
List of United States Air Force Field Operating Agencies This is a list of Field Operating Agencies (FOA) in the United States Department of the Air Force The United States Department of the Air Force (DAF) is one of the three military departments within the United States Department of Defense, Depart ...
Military Criminal Investigative Organizations *
Air Force Office of Special Investigations The Department of the Air Force Office of Special Investigations (OSI) is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative ...
(AFOSI) *
United States Army Criminal Investigation Command The United States Army Criminal Investigation Division (USACID), previously known as the United States Army Criminal Investigation Command (USACIDC) is the primary federal law enforcement agency of the United States Department of the Army. Its p ...
(USACIDC or CID) *
United States Army Counterintelligence United States Army Counterintelligence (ACI) is the component of United States Army Military Intelligence which conducts counterintelligence activities to detect, identify, assess, counter, exploit and/or neutralize adversarial, foreign intellige ...
(USAI or CI) *
Naval Criminal Investigative Service The United States Naval Criminal Investigative Service (NCIS) is the primary law enforcement agency of the U.S. Department of the Navy. Its primary function is to investigate criminal activities involving the Navy and Marine Corps, though its ...
(NCIS) *
Defense Criminal Investigative Service The Defense Criminal Investigative Service is the criminal investigative arm of the Office of Inspector General, U.S. Department of Defense. DCIS protects military personnel by investigating cases of fraud, bribery, and corruption; preventing ...
(DCIS) *
Coast Guard Investigative Service The Coast Guard Investigative Service (CGIS) is a division of the United States Coast Guard that investigates crimes where the U.S. Coast Guard has an interest. It is composed of civilian ( GS-1811), active duty, reserve enlisted, and warrant offic ...
(CGIS) Federal law enforcement *
Federal Law Enforcement Training Centers The Federal Law Enforcement Training Centers (FLETC) serves as an interagency law enforcement training body for 105 United States government federal law enforcement agencies. The stated mission of FLETC is to "...train those who protect our home ...
*
Criminal Investigation Task Force The Criminal Investigation Task Force (CITF) is an organization created in early 2002 by the United States Department of Defense to conduct investigations of detainees captured in the War on Terrorism. It was envisioned that certain captured indi ...
(CITF) *
Internet Crimes Against Children Internet Crimes Against Children (ICAC Task Force) is a task force started by the United States Department of Justice's Office of Juvenile Justice and Delinquency Prevention (OJJDP) in 1998. The ICAC program is a national network of 61 coordina ...
(ICAC) Task Force


References

*


External links


DC3
Official webpage
USAF IG
Official webpage {{authority control Information Systems Agency United States Air Force Office of Special Investigations Naval Criminal Investigative Service Cybercrime Computer security organizations Universities and colleges accredited by the Council on Occupational Education