SEC.. DEFENSE CYBER CRIME CENTER: AUTHORITY TO ADMIT PRIVATE SECTOR CIVILIANS TO CYBER SECURITY COURSES.



Similar documents
Department of Defense DIRECTIVE

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

DoD CIO UNCLASSIFIED. DIB CS Program Value-Added

ABCs of the FBI Training Academy What it costs to train a Special Agent. March 16, 2011

FINANCIAL INFORMATION. 1. Criminal Justice and Security Administration 2. Medical Biller Specialist 3. Accounting Cost Per. Tuition and Fees 1

U.S. Department of Energy Washington, D.C.

DEPARTMENT OF DEFENSE FORENSIC CAPABILITIES. Larry C. Chelko Director U.S. Army Criminal Investigation Laboratory (USACIL)

Big Data Analytics Best Practices

Department of Defense DIRECTIVE

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Frequently Asked Questions related to admission to the ECC Nursing program

Department of Defense DIRECTIVE

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

Billing Code: Guidance Concerning the National Security Review Conducted by the Committee

Legislative Language

No. 33 February 19, The President

One Hundred Twelfth Congress of the United States of America

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

REQUEST FOR TECHNICAL CHANGE. Criminal Justice Education and Training Standards Commission

Counterintelligence Awareness Glossary

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

ADDRESSES SYSTEM LOCATION

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Information Security & Intelligence

Be it enacted by the People of the State of Illinois,

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Council of College and Military Education Webinar 17 August 2011

DIVISION N CYBERSECURITY ACT OF 2015

Department of Urban Affairs, Social Science, and Social Work

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Gaming System Monitoring and Analysis Effort

SEC.. AUTHORITY TO TRANSFER UNUSED EDUCATION BENEFITS TO FAMILY MEMBERS FOR CAREER SERVICE MEMBERS.

EXECUTIVE ORDER REVIEW AND DISPOSITION OF INDIVIDUALS DETAINED AT THE GUANTÁNAMO BAY NAVAL BASE AND CLOSURE OF DETENTION FACILITIES

Monday, November 17, 2014 to Monday, December 8, 2014

ACTION: Direct final rule with request for comments. SUMMARY: Defense Logistics Agency (DLA) is exempting records

PRACTICAL NURSING PROGRAM

Master of Cyber Security

DIVISION N CYBERSECURITY ACT OF 2015

Public Law th Congress An Act

BIOTERRORISM RISK ASSESSMENT GROUP (BRAG) FEDERAL BUREAU OF INVESTIGATION CRIMINAL JUSTICE INFORMATION SERVICES DIVISION CLARKSBURG, WEST VIRGINIA

v. 03/03/2015 Page ii

13 FAM 800 ACADEMIC DEGREE TRAINING

FBI AND CYBER SECURITY

HOUSE BILL NO. HB0192. Representative(s) Brechtel and Lockhart and Senator(s) Perkins A BILL. for

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION

TRICARE SENIOR PRIME ENROLLMENT APPLICATION

The Need to Share: The U.S. Intelligence Community and Law Enforcement

IC ARTICLE 37. CAREER AND TECHNICAL EDUCATION. IC Chapter 1. Cooperative Career and Technical Education Departments

Defense Budget Programs That Provide Assistance To Foreign Countries

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

What do parents need to know about

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax #

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Public Law th Congress An Act

INTELLIGENCE AND ANALYSIS

Department of Defense INSTRUCTION

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Middle Class Economics: Cybersecurity Updated August 7, 2015

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60]

Cyber Defense Operations Graduate Certificate

Department of Defense INSTRUCTION

Introduced by Representatives Lippert of Hinesburg, Conquest of2newbury, Weston, Grad of Moretown, Marek of Newfane, Sweaney 4 of

INFORMATION SECURITY POLICY

Department of Defense INSTRUCTION. SUBJECT: Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program (IEP)

CYBERCRIME LAWS OF THE UNITED STATES

Total Credits Required for Graduation

The Department of Homeland Security The Department of Justice

Note: This compilation of the National Security Act of 1947 reflects amendments enacted into law through Public Law (August 3, 2007).

Nottingham Trent University Course Specification

AMERICAN INTERCONTINENTAL UNIVERSITY ONLINE

Notice of Privacy Practices

Ch. 338 INTERIM STANDARDS FOR COLLEGE PROG CHAPTER 338. INTERIM STANDARDS FOR TECHNICAL COLLEGE PROGRAMS

An Overview of Large US Military Cybersecurity Organizations

Department of Defense DIRECTIVE. SUBJECT: Policy and Program for Immunizations to Protect the Health of Service Members and Military Beneficiaries

Updated Administration Proposal: Law Enforcement Provisions

SP0337, LD 1020, item 2, 123rd Maine State Legislature

UNM Information Assurance Scholarship for Service (SFS) Program

Distance Education Network

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release June 24, 2015 EXECUTIVE ORDER HOSTAGE RECOVERY ACTIVITIES

Espionage and Intelligence. Debra A. Miller, Book Editor

THE PEOPLE OF THE STATE OF MICHIGAN ENACT:

Temple University Police Academy

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

University of Maryland University College. American Military University. Henley-Putnam University

2. APPLICABILITY AND SCOPE

CYBER AWARENESS TRAINING REQUIREMENTS

Senate Bill No CHAPTER 864

II. DESCRIPTION OF PROGRAMS

SUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009.

UMUC FED Program. Online Open House July 22, 2015

GAO MILITARY EDUCATION. DOD Needs to Enhance Performance Goals and Measures to Improve Oversight of Military Academies

Review of Graduate Certificates

Department of Defense DIRECTIVE

Transcription:

SEC.. DEFENSE CYBER CRIME CENTER: AUTHORITY TO ADMIT PRIVATE SECTOR CIVILIANS TO CYBER SECURITY COURSES. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 (a) AUTHORITY FOR ADMISSION. The Secretary of Defense may permit eligible private sector employees to receive instruction at the Defense Cyber Investigations Training Academy operating under the direction of the Defense Cyber Crime Center. No more than the equivalent of 200 full-time student positions may be filled at any one time by private sector employees enrolled under this section, on a yearly basis. Upon successful completion of the course of instruction in which enrolled, any such private sector employee may be awarded an appropriate certification or diploma. (b) ELIGIBLE PRIVATE SECTOR EMPLOYEES. For purposes of this section, an eligible private sector employee is an individual employed by a private firm that is engaged in providing to the Department of Defense or other Government departments or agencies significant and substantial defense-related systems, products, or services, or whose work product is relevant to national security policy or strategy. A private sector employee remains eligible for such instruction only so long as that person remains employed by an eligible private sector firm. (c) PROGRAM REQUIREMENTS. The Secretary of Defense shall ensure that (1) the curriculum in which private sector employees may be enrolled under this section is not readily available through other schools; and (2) the course offerings at the Defense Cyber Investigations Training Academy continue to be determined solely by the needs of the Department of Defense. (d) TUITION. The Defense Cyber Investigations Training Academy shall charge students enrolled under this section a rate that is at least the rate charged for employees of the United States, including overhead.

1 2 3 4 5 6 7 8 9 10 (e) STANDARDS OF CONDUCT. While receiving instruction at the Defense Cyber Investigations Training Academy, students enrolled under this section, to the extent practicable, are subject to the same regulations governing academic performance, attendance, norms of behavior, and enrollment as apply to Government civilian employees receiving instruction at the academy. (f) USE OF FUNDS. Notwithstanding section 3302 of title 31, United States Code, or any other provision of law, amounts received by the Defense Cyber Investigations Training Academy for instruction of students enrolled under this section shall be retained by the academy to defray the costs of such instruction. The source, and the disposition, of such funds shall be specifically identified in records of the academy. Section-by-Section Analysis This section would authorize the Secretary of Defense to permit eligible private sector employees to receive instruction at the Defense Cyber Investigations Training Academy operating under the direction of the Defense Cyber Crime Center. The Defense Cyber Crime Center (DC3) was established on October 1, 2001, incorporating the newly-created Defense Cyber Crime Institute with the existing Defense Computer Investigations Training Program and the Defense Computer Forensics Lab. DC3 is the Department of Defense (DoD) center of excellence to efficiently organize, equip, train, and employ scarce resources to more effectively address the proliferation of computer crimes affecting the DoD. DC3 is responsible for providing digital evidence processing, analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect, enhance, or recover digital media (including audio and video). Such investigations include criminal, counterintelligence, counterterrorism, and fraud investigations of Defense criminal investigative organizations and DoD counterintelligence activities. Through the Defense Cyber Investigations Training Academy, DC3 provides computer investigation training to forensic examiners, investigators, system administrators, or any other DoD members who must ensure Defense information systems are secure from unauthorized use, criminal and fraudulent activities, and foreign intelligence service exploitation. The Department maintains strong government-to-industry relations through collaboration on cyber/network security through bilateral agreements in the DoD-Defense Industrial Base Cyber Security/Information Assurance Program. This program works with Defense Industrial

Base partners to improve cyber security and to secure information systems from unauthorized use, counterintelligence and criminal and fraudulent activities, on unclassified systems owned or operated by these partners, and on which defense-related unclassified information resides. Defense Industrial Base partners provide products, services and capabilities of significant and substantial importance to the Department of Defense and other Government departments and agencies (e.g., aeronautics, armaments, biological and chemical technologies, electronics, information technology systems and services, telecom systems and services, nuclear components and capabilities, space systems, energy systems, strategic analysis capabilities, weapons, etc.). In order for this cyber security/information assurance effort to be truly effective, the Department should make available training to industry partners in the areas of computer investigation techniques and procedures This legislative language is modeled after 10 U.S.C. 2167, which authorizes private sector civilians who work in organizations relevant to national security to receive instruction at the National Defense University on a reimbursable basis. Changes to Existing Law: This proposal would not make any changes to existing law.