2012 DoD Cyber Crime Conference Opening Video

Uploaded by DoDCyberCrimeCenter on 22.02.2012

>> VOICE OVER: In today's world we no longer function as disparate groups or individuals;
we are all connected.
The way we behave in society, as well as in warfare, is profoundly changing as tools such
as satellite technology, robotics, and unmanned vehicle systems become commonplace, and the
ways we communicate, through mediums such as social media, collaborative and enterprise
systems, and cloud computing have leveled the playing field in ways we could never have
imagined a decade ago.
As we become even more connected and interdependent, adversaries are banding together across the
globe and targeting the United States' critical infrastructure.
In the past, attacks were targeted and could be traced, but attackers in cyber space cannot
be tracked down easily.
The boundaries between tactics of warfare are blurring, and no longer fit into clearly
defined categories.
Engaging in strategic partnerships for interagency cooperation and capabilities is no longer
an option; it is imperative.
The digital landscape has created an alternate domain where the systems developed to store
and protect sensitive information intersect.
The United States needs stewards to protect this critical infrastructure, which is so
vital to our economy and national security.
To strengthen our security we must work together to prevent cyber attacks from all possible
paths, as well as disengage and prosecute the perpetrators of these crimes.
Sharing information, collaborating, and developing a capable workforce are the keys to getting
ahead of cyber criminals. Cyber crime is a global issue that cannot be defended solely
on a local level.
The DoD Cyber Crime Center (DC3) is heeding the call to action.
The DC3 Digital Forensics Challenge, a founding member of the U.S. Cyber Challenge, is a worldwide
event established as a call to the digital forensics community.
The challenge strives to address the shortage of cyber professionals, establish relationships
within the Digital Forensics Community, and resolve issues by pioneering new investigative
tools, techniques, and methodologies.
While today's defenders assume their important roles in mitigating threats, we must look
to the future.
The National Centers of Digital Forensics Academic Excellence (CDFAE) provides college
accreditation to ensure consistent standards exist for training in the cyber crime field.
CDFAE accreditation benefits students, education providers, and employers by ensuring that
students graduate with the necessary skills and awareness of current issues facing digital
forensics investigators and examiners.
Through CDFAE, education providers gain access to advanced digital forensic resources and
can help students tap into unique internship and employment opportunities.
Employers who hire graduates from CDFAE-accredited programs know they are hiring individuals
with validated skillsets who can hit the ground running on day one.
In addition to proper training, resources such as the CI Tool Repository and the National
Repository of Digital Forensics Information on DFI Link are vital to our fight against
cyber crime.
These have been put in place to facilitate and encourage the sharing of tools and information
for the Law Enforcement and Counterintelligence communities.
In addition, events such as the DoD Cyber Crime Conference are important because they
bring together personnel from the Digital Forensics communities in an open forum to
network with one another, and they facilitate information sharing and team building on issues
facing both defenders and law enforcement responders.
We must keep in mind that a team is only as strong as its weakest member, and it takes
diligence and teamwork to stay ahead of the criminals who are threatening our country's
By Teaming for Dominance, each of us as individuals must commit to being fully trained and prepared
at all times.
Only then can we be confident we are doing everything possible to make our team strong,
effective, and ready for our adversary’s' next move.