Difference between pages "DoD Cyber Crime Center" and "DC3 Digital Forensics Challenge"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(New page: The '''DC3 Digital Forensics Challenge''' is an annual forensics contest sponsored by the Defense Cybercrime Center. == 2007 == At the 2007 DoD Cybercrime conference, the DC3 staff ...)
 
Line 1: Line 1:
The '''DoD Cyber Crime Center''', or '''DC3''', is a Department of Defense organization run by the [[Air Force Office of Special Investigations]]. The center consists of four divisions:
+
The '''DC3 Digital Forensics Challenge''' is an annual forensics contest sponsored by the [[Defense Cybercrime Center]].  
  
* [[Defense Computer Forensics Lab]] (DCFL)
+
== 2007 ==
* [[Defense Computer Investigations Training Academy]] (DCITA)
+
* [[Defense Cyber Crime Institute]] (DCCI)
+
* Futures Exploration (FX)
+
  
== Events ==
+
At the 2007 DoD Cybercrime conference, the DC3 staff said there would be another challenge in 2007 and gave a timetable for it. As of 25 Feb 2007 no new details have been announced.
  
The DC3 sponsors an annual [[Conferences|conference]], the DoD Cyber Crime Conference. They also run an annual forensics contest, the [[DC3 Digital Forensics Challenge]]. The winner of the challenge receives a free trip to the DoD Cyber Crime Conference.
 
  
== History ==
+
== 2006 ==
 +
 
 +
The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.
 +
 
 +
One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was [[Access Data]]. They won a free trip to the [[Defense Cybercrime Center|DC3's]] annual [[Conferences|conference]] in St. Louis, MO in January 2007. They presented a complete solution at the conference.
 +
 
 +
Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not elligble to win.
  
The DC3 was formed in 2001 when the newly created DCCI was merged with the existing DCFL and DCITA (at the time called the Defense Computer Investigations Training Program (DCITP).
 
  
 
== External Links ==
 
== External Links ==
* [http://dc3.mil/ Official website]
 
* [http://www.dodcybercrime.com/ DoD Cyber Crime Conference website]
 
  
[[Category: Federal investigative agency]]
+
* [http://www.dc3.mil/challenge/ Official web site]

Revision as of 16:15, 25 February 2007

The DC3 Digital Forensics Challenge is an annual forensics contest sponsored by the Defense Cybercrime Center.

2007

At the 2007 DoD Cybercrime conference, the DC3 staff said there would be another challenge in 2007 and gave a timetable for it. As of 25 Feb 2007 no new details have been announced.


2006

The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.

One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was Access Data. They won a free trip to the DC3's annual conference in St. Louis, MO in January 2007. They presented a complete solution at the conference.

Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not elligble to win.


External Links