The DoD Cyber Crime Center (DC3) Vulnerability Disclosure Program (VDP) uses a White Hat researcher to expose a high risk vulnerability in the DoD secure filing system, which was reported to the department through the Pentagon's HackerOne vulnerability disclosure page.
The DoD Cyber Crime Center (DC3) Technical Solutions Development (TSD) launched an upgraded version of its “Missing Links” software in January. Missing Links, among other features, aids field law enforcement agents and others who seize or discover digital devices, such as cellphones, while conducting investigations by helping them to quickly identify other digital devices to which the seized/discovered devices had been connected.
The flag-waving crowd of nearly 100 people cheered loudly as the airline passengers began making their way out of the jet bridge and into the Concourse B terminal at BWI Thurgood Marshall Airport. This was not your typical scene at BWI, but this was also not a typical group of passengers.
The Department of Defense Cyber Crime Center (DC3) stood up its Vulnerability Disclosure Program (VDP) in November 2016, by direction of former Secretary of Defense Ashton Carter. The VDP was tasked as DODs focal point for crowd-sourced vulnerability reporting and interacting with private citizen cybersecurity researchers, popularly referred to as "hackers."
The Air Force Office of Special Investigations, Inspector General’s (AFOSI/IG) Office with assistance from the Air Force Inspection Agency (AFIA) conducted a Continuing Evaluation (CE) Inspection of the DoD Cyber Crime Center (DC3) March 25.
The DoD Cyber Crime Center (DC3) DoD-Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE) hosted their March 2019 Technical Exchange (TECHEX) at Boeing Regional Headquarters in Arlington, Va., March 13-14.
Air Force Office of Special Investigations personnel, along with 28 digital forensic examiners from the DoD-Cyber Crime Center (DC3) Cyber Forensics Laboratory (CFL), filed into the courtroom at Ft. George G. Meade, Md., Feb 11.
February is Black History Month, and the Department of Defense Cyber Crime Center (DC3) had the honor of having Captain Tasya Y. Lacy, Commanding Officer, Navy Operational Support Center, Baltimore, MD speak at its commemorative event.
Sending the DC3 team to conferences is a great idea for idea-sharing and information transfer, but becomes even better when our top performers get to show their stuff. Congratulations to Dan and Chris —keep up the good work!.
HQ Air Force selected Department of Defense Cyber Crime Center (DC3) Information Technology Division assignee TSgt Benjamin Barnhill as a semi-finalist for the Air Force’s “Spark Tank” competition.
Michelle Valdez, senior director of cybersecurity resilience and strategy, Capitol One
Enlisted troops from the Department of Defense Cyber Crime Center give back in a meaningful way.
The Department of Defense Cyber Crime Center (DC3) hosts B-1B Bomber Pilot Lt Col Frank A. Biancardi II to discuss one very important examination.
In 2008, the Department of Defense Cyber Crime Center (DC3) invited 16 companies to discuss information sharing and collaboration. Today, DC3 partners with 400 companies to share information.
The Department of Defense (DoD) is undertaking a continuing review of the operational systems that ensure cybersecurity is spearheaded by the offices charged with maintaining information superiority.
The University of Maryland University College is commending DC3's Executive Director's team-first leadership style with its Leadership Award in Cybersecurity. Since 2011, at two year intervals UMUC has conferred the Leadership and Pioneer Awards in Cybersecurity.
The Defense Cyber Crime Center (DC3) released the DC3 Malware Configuration Parser (DC3-MWCP) framework to the open source community on May 6, 2015.