DC3's Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, device repair, data extraction, and expert testimony for DoD and all allied agencies.
Cyber Forensics Laboratory Overview

The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and extracts otherwise inaccessible data from them, and provides expert testimony in legal proceedings for DC3 customers. The labs robust intrusion and malware analysis capability supports law enforcement, counterintelligence, and Defense Industrial Base activities and operations.

The
Cyber Forensics Laboratory also works with the Defense Cyber Operations Panel (which consists of Defense Criminal Investigative Organizations and Military Department Counterintelligence Organizations) to develop requirements and set standards for digital investigations as new technologies emerge and evolve.

The Cyber Forensics Laboratory is an accredited lab under ISO 17025 by the ANSI National Accreditation Board for its acquisition/extraction and content analysis activities, which are subject to strict quality-control and peer-review procedures. The Cyber Forensics Laboratory produces results that are valid, reliable, and based on conditions and methods that are repeatable and verifiable.



CFL Case Tracking System   CFL News   CFL Capabilities Slick Sheet  

 
Seeking immediate response?
Please indicate what information you require sooner than the end of a final exam on your Service Request form. Please be advised that Quick Look results are not a final report, and do not replace your exhaustive forensic examination. These results are not intended to stand on their own in a judicial process.
Contact Us
Cyber Forensics Laboratory Customer Support & Intake
410-981-0310

DSN: 622-2595

 
Forensic Operations and Services

Cyber Forensics Laboratory's D/MM forensic processes include:

  • Counterterrorism

  • Counterintelligence Matters

  • Crime Against Persons & Property

  • Fraud

  • Embedded Systems & Supply Chain Analysis

  • Network Intrusions

  • Malware Reverse Engineering & Analytics

  • Enhancing Video & Voice Recordings

  • Aircraft Mishaps

  • Damaged Media & Submerged Devices

  • Cell Phones, Tablets & Other Smart Devices

  • Encrypted Media

  • Locked Mobile Devices

  • Vehicle Infotainment/Telematics

  • Internet of Things (IoT) Devices

  • Other Emerging Technologies

How To Submit A Case

If you have any questions, please contact Cyber Forensics Laboratory Customer Support at afosi.dc3.cflintake@us.af.mil.

Step 1

Download 
  • Select and download the appropriate form from the list below.

Step 2

Complete 
  • Please complete the form providing as much information as possible and be sure to sign it. Please contact Cyber Forensics Laboratory Intake for coordination.

Step 3

Print 
  • After completing and signing the form, please print out a copy to include with your evidence submission.

Step 4

Submit 

Forms

Note: If you encounter any issues downloading or viewing the forms below (such as a "Please wait..." page), follow the instructions here to change your browser settings.

Important Information: You may need to right-click the link and select "Save Link As..." to download the file.
For guidance and assistance with forms please contact Cyber Forensics Laboratory Customer Support & Intake at 410-981-0310
or DSN 622-2595 or email afosi.dc3.cflintake@us.af.mil

  Litigation Support Request Form
Damaged Media Recovery Tips

These tips can significantly increase the chances of success in your recovery when submitting items for Damaged Media Recovery

Do not attempt to recover data from a damaged device

Many people have sent Cyber Forensics Laboratory devices that could have been recovered, but their attempts made additional recovery impossible.


Please advise if you plan to perform the examination of the data yourself after recovery

Include a drive for the data when you submit your package.


If device is visibly broken, collect and send all pieces

Even very small pieces may have critical components, or contain information and clues that can be very useful in the repair of the device.


Attempt to prevent the device from further damage and contamination from its surrounding environment

Hard drives that contain platters are extremely sensitive to any kind of particles in the air

If you are sending a hard drive that has a breach exposing the internal cavity of the drive to the outside environment, attempt to stop continued contamination by sealing the drive in an anti-static bag or other means with equal or greater physical and environmental protection.


Submerged Items

Several factors come into play when preparing captured devices for shipment and/or storage if they have been submerged. These factors will determine whether or not the item should remain submerged in its original substance and what other kinds of preparations should be made on the device. If you are unsure about how to send your evidence, contact us for proper handling instructions.