As DC3’s technical solutions component, Information Technology supports DC3 Mission Areas, as well as the DoW Intelligence and Law Enforcement communities.
Information Technology Overview

Information Technology tailors innovative software and system solutions engineered to the specific requirements of digital forensic examiners and cyber intrusion analysts. Information Technology validates digital forensic tools from Commercial off-the-shelf, Government off-the-shelf, and open source domains to ensure relevancy and reproducibility as to expected use in coordination with its cooperative partners, Information Technology:

  • Leads the way by proactively identifying, researching and evaluating relevant new technologies, techniques and tools
  • Actively participates in the development of industry standards, including Structured Threat Information eXpression (STIX) and Cyber-investigation Analysis Standard Expression (CASE) Shares in-house-developed tools with federal, state, and local law enforcement partners
  • Maintains the Counterintelligence Tool Repository (CITR), a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs
Technical Objectives
 
  • Proactively identify, research and evaluate relevant new technologies, techniques and tools
  • Design and develop digital forensic, analytic and enterprise workflow tools
  • Test DC3-developed software to ensure required performance and reliability 
  • ​​Validate digital forensic tools to ensure relevancy and reproducibility as to expected use
Tools & Validations

 

DC3 offers a number of open source and CUI tools and validations. 
Open source tools are available on GitHub and SourceForge.


CUI tools and validations for U.S. DoW, Federal law enforcement, and counterintelligence (LE/CI) official use only. All others should contact: DC3.XTInfo@us.af.mil

 

The Counterintelligence Tool Repository

 

The Counterintelligence Tool Repository (CITR) is a warehouse of classified and unclassified tools that support digital forensics and counterintelligence needs. Whenever possible, the actual tool is provided through the repository portal in the form of a downloadable executable. When a downloadable executable cannot be provided, the repository advises how to obtain the tool from the hosting agency.


All others should contact DC3.XTInfo@us.af.mil 

Information Technology - Communications