The ongoing COVID-19 pandemic has resulted in disruptions to everyday life for many with shelter-in-place and other social distancing requirements implemented throughout the United States and around the rest of the world. Even though many supplies, services and leisure activities have slowed down or have come to a screeching halt, the one thing that has remained the same, or even gained momentum – is cyber espionage.
The DoD Cyber Crime Center (DC3) hosted more than 20 students from Glen Burnie High School for an educational visit Feb. 19. The students, grades 9-10, left behind their classrooms in Glen Burnie, Md., for a two-hour exploration of the cybersecurity field and how it relates to the biomedical field they are studying as part of their school’s Science, Technology, Engineering and Mathematics (STEM) Biomedical Magnet (BMAH) program.
Do you want to work with a hacker? While the answer is usually a resounding “no” for many organizations, the Defense Department’s Cyber Crime Center Vulnerability Disclosure Program welcomes hackers and has been partnering with them for nearly four years.
The DoD Cyber Crime Center (DC3) Vulnerability Disclosure Program (VDP) is the recipient of the 2019 DoD Chief Information Officer (CIO) award for Cybersecurity. The VDP is one of four team recipients of the annual award that recognizes accomplishments in areas such as cybersecurity, cloud computing, C3 modernization, Artificial Intelligence, or other areas of information technology modernization.
Modern vehicles contain upwards of 75 computer systems to aid with driver safety and provide conveniences such as remote access, location assistance, Bluetooth and Wi-Fi connectivity. Vehicle computer systems record and store data, and wherever there is data, there is opportunity for digital forensic examiners to locate, extract and analyze it to help determine where, how and by whom a vehicle has been used.
So far during fiscal year 2019, law enforcement and other cyber forensics customers have submitted more than 500 cellphones and other mobile devices to the DoD Cyber Crime Center (DC3) Cyber Forensic Laboratory (CFL) for examination. Despite the challenges associated with extracting data from mobile devices, the CFL has successfully retrieved data from more than 90 percent of the devices received.
The DoD Cyber Crime Center (DC3) recently partnered with the National Security Agency (NSA) by hosting 12 U.S. Army Reserve Officer Training Corps (ROTC) cadets for internships at DC3, July 24 – Aug. 9. DC3’s opportunity to host the cadets, representing 11 universities, was occasioned by an extraordinarily large number of NSA internship participants this year.
Led by Ms. Krystal Covey, the DCISE program is in its 11th year of helping the Defense Industrial Base become knowledgeable and alerted to the cyber threat around them. The need for industry outreach and information sharing support about cyber threats has never been greater given the scale and frequency of intellectual property theft and other sensitive military secrets that seem to keep finding their way from our defense industrial base to our adversaries via cyber attacks.