DC3 News Articles


New DoD vulnerability effort launched

DC3 and HackerOne launched the 12-month Defense Industrial Base Vulnerability Disclosure (DIB-VDP) pilot program April 5, to share vulnerability data and boost digital hygiene within the DIB.  


Insecure Wheels: Police turn to car data to destroy suspects' alibis

Digital forensics examiners retrieve data from a vehicle’s telematics system and help law enforcement detectives investigating a homicide, by identifying a suspect who was at the scene of the crime. Telematics and infotainment systems in cars can be used much like a black box found in airplanes to recover data.


Cyber Criminals Don’t Brake for Pandemics

The ongoing COVID-19 pandemic has resulted in disruptions to everyday life for many with shelter-in-place and other social distancing requirements implemented throughout the United States and around the rest of the world. Even though many supplies, services and leisure activities have slowed down or have come to a screeching halt, the one thing that has remained the same, or even gained momentum – is cyber espionage.
 

High School Students Explore Cybersecurity at DC3

The DoD Cyber Crime Center (DC3) hosted more than 20 students from Glen Burnie High School for an educational visit Feb. 19. The students, grades 9-10, left behind their classrooms in Glen Burnie, Md., for a two-hour exploration of the cybersecurity field and how it relates to the biomedical field they are studying as part of their school’s Science, Technology, Engineering and Mathematics (STEM) Biomedical Magnet (BMAH) program.
 

Who Wants to Work With a Hacker?

Do you want to work with a hacker? While the answer is usually a resounding “no” for many organizations, the Defense Department’s Cyber Crime Center Vulnerability Disclosure Program welcomes hackers and has been partnering with them for nearly four years.
 

VDP Selected for 2019 DoD Chief Information Officer Award

The DoD Cyber Crime Center (DC3) Vulnerability Disclosure Program (VDP) is the recipient of the 2019 DoD Chief Information Officer (CIO) award for Cybersecurity. The VDP is one of four team recipients of the annual award that recognizes accomplishments in areas such as cybersecurity, cloud computing, C3 modernization, Artificial Intelligence, or other areas of information technology modernization.
 

Vehicle Conveniences Drive Criminals to Prison

Modern vehicles contain upwards of 75 computer systems to aid with driver safety and provide conveniences such as remote access, location assistance, Bluetooth and Wi-Fi connectivity. Vehicle computer systems record and store data, and wherever there is data, there is opportunity for digital forensic examiners to locate, extract and analyze it to help determine where, how and by whom a vehicle has been used.
 

CFL Conquers Mobile Device Barriers

So far during fiscal year 2019, law enforcement and other cyber forensics customers have submitted more than 500 cellphones and other mobile devices to the DoD Cyber Crime Center (DC3) Cyber Forensic Laboratory (CFL) for examination. Despite the challenges associated with extracting data from mobile devices, the CFL has successfully retrieved data from more than 90 percent of the devices received.
 

DC3 Partners with NSA, Hosts ROTC Cadets for Summer Internships

The DoD Cyber Crime Center (DC3) recently partnered with the National Security Agency (NSA) by hosting 12 U.S. Army Reserve Officer Training Corps (ROTC) cadets for internships at DC3, July 24 – Aug. 9. DC3’s opportunity to host the cadets, representing 11 universities, was occasioned by an extraordinarily large number of NSA internship participants this year.
 

ActiveCyber.net Spotlight Interview: Krystal Covey of DCISE Discusses the DoD-DIB Threat Information Sharing Program with Active Cyber

Led by Ms. Krystal Covey, the DCISE program is in its 11th year of helping the Defense Industrial Base become knowledgeable and alerted to the cyber threat around them. The need for industry outreach and information sharing support about cyber threats has never been greater given the scale and frequency of intellectual property theft and other sensitive military secrets that seem to keep finding their way from our defense industrial base to our adversaries via cyber attacks.