File1, 2, & 3 for lramos:


INFO300

File1:

The Department of Defense Cyber Crime Center (DC3)
is designated as a Federal Cyber Center by National Security Presidential
Directive 54/ Homeland Security Presidential Directive 23,[1] as a
Department of Defense (DoD) center of excellence for
Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E,[2]
and serves as the operational focal point for the
Defense Industrial Base (DIB) Cybersecurity and Information Assurance (CS/IA)
Program.[3] DC3 operates under the Air Force Office of
Special Investigations (AFOSI or OSI).

Mission
Deliver superior D/MM forensic services, cyber technical training,
vulnerability sharing, technical solutions development,
and cyber analysis for the following DoD mission areas: cybersecurity (CS)
and critical infrastructure protection (CIP), law enforcement
and counterintelligence (LE/CI), document and media exploitation (DOMEX),
and counterterrorism (CT)

Digital & Multimedia Forensics
The DC3 Cyber Forensics Laboratory (DC3/CFL) performs D/MM forensic
examinations, device repair, data extraction, and expert testimony for DoD.
The lab's robust intrusion and malware analysis capability supports
other DC3 lines of business and activities. Lab operations are accredited
under ISO 17025 by the American Society of Crime Laboratory
Directors/Laboratory Accreditation Board (ASCLD/LAB) which guides reliable,
repeatable, and valid exam results, subjected to quality control and
peer review.


File2:

Cyber Training

The DC3 Cyber Forensics Laboratory (DC3/CFL) performs D/MM forensic
examinations, device repair, data extraction, and expert testimony for DoD.
The lab's robust intrusion and malware analysis capability supports other
DC3 lines of business and activities. Lab operations are accredited under
ISO 17025 by the American Society of Crime Laboratory Directors/Laboratory
Accreditation Board (ASCLD/LAB) which guides reliable, repeatable,
and valid exam results, subjected to quality control and peer review.

Technical Solutions
The DC3 Technical Solutions Development (DC3/TSD) Directorate tailors
software and system solutions engineered to the specific requirements of
digital forensic examiners and cyber intrusion analysts. TSD validates
commercial off-the-shelf (COTS), government off-the-shelf (GOTS),
and in-house developed software/hardware before it can be used in a
forensic process. In addition, TSD functions as the DoD repository
for cyber counterintelligence (CI) tools.

DIB Cyber Security
As the operational hub for the DIB CS/IA Program, the DIB Collaborative
Information Sharing Environment (DC3/DCISE) assists DIB companies to
safeguard DoD content and intellectual property residing on or transiting
their unclassified networks. DCISE develops and shares actionable
threat products, and performs cyber analysis, diagnostics, and
remediation consults for DIB Partners.


File3:

Analytical Group

The DC3 Analytical Group (DC3/AG) supports LE/CI agencies, including
the Air Force Office of Special Investigations (AFOSI),
the Naval Criminal Investigative Services (NCIS), and key mission
partners such as the Federal Bureau of Investigation (FBI).
As a member agency of the National Cyber Investigative
Joint Task Force (NCIJTF), the AG leads a collaborative
analytical and technical exchange with subject matter experts
from LE/CI, computer network defense (CND), Intelligence Community (IC),
and information assurance (IA) agencies to build a threat picture
enabling proactive LE/CI cyber operations focuses on nation-state threat actors

Vulnerability Disclosures

The DoD Vulnerability Disclosure Program (VDP) leverages the experience
and knowledge of ethical hackers from around the world to improve network
defenses and enhance mission assurance. DC3 was assigned by the
Secretary of Defense to be the DoD focal point for receiving
vulnerability reports and interacting with researchers consistent with
DC3's existing information sharing responsibilities as a
Federal Cybersecurity Center.

Purpose

This policy is intended to give security researchers clear guidelines for
conducting vulnerability discovery activities directed at
Department of Defense (DoD) web properties, and submitting discovered
vulnerabilities to DoD.

No lines are longer than 80 characters, TYVM. Other specified properties aren't being scored automatically at this time so this is not necessarily good news...