Threat Intelligence
3/1/2017
02:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

District Attorney, Cal Poly, Cal Guard Partner to Combat California Cyber Crime

The Central Coast Cyber Forensics Lab (CCCFL) and the California Cyber Training Complex (CCTC) will provide Learn by Doing opportunities for students, law enforcement, and military to combat increasing cybersecurity threat.

SAN LUIS OBISPO, Calif. — With an eye toward training current and future cybercrime investigators, Cal Poly has worked with the San Luis Obispo County District Attorney’s Office, the California National Guard and other statewide partners to develop the California Cyber Training Complex (CCTC), a new cyber education center and collaboration space at the California National Guard’s Camp San Luis Obispo.

The first active facility at the CCTC, the Central Coast Cyber Forensics Lab (CCCFL), was unveiled this morning at a ribbon-cutting ceremony attended by District Attorney Dan Dow and other members of local law enforcement, along with Cal Poly President Jeffrey D. Armstrong, CSU Chancellor Timothy P. White and California National Guard Maj. Gen. David S. Baldwin.

Under the District Attorney’s management, CCCFL will provide participating law enforcement agencies with access to high-tech evidence collection capabilities. This will allow investigators to collect cyber evidence in a way that’s legally compliant with the California Electronic Communications Privacy Act, so it can be admitted into court by prosecutors.

“The landscape of collecting, preserving, investigating and prosecuting both cybercrime and conventional crime involving mobile computing has dramatically changed during the past five years,” said Lee Cunningham, assistant district attorney for San Luis Obispo County. “We need access to cyber training across the full spectrum of first responders, investigators and prosecutors to keep up with the bad guys and to effectively communicate cyber evidence to judges and juries.”

In addition to the forensics lab, the CCTC also houses an academic training facility and a cyber test range with an experimental laboratory. The complex will serve as a statewide hub, providing a crucial training ground and collaboration space for current and future cyber defenders in California. The central location at Camp San Luis Obispo allows for law enforcement specialists and military personnel to have access to the latest tools, technical support, training, and superior bandwidth, all in a protected environment.

“The CCTC is a joint initiative between the California National Guard and Cal Poly to train law enforcement and military cyber security personnel across the state,” said Maj. Gen. David S. Baldwin, adjutant general of the California National Guard. “A key component in our cybersecurity effort is the California National Guard’s newest Cyber Protection Team. Based at Camp San Luis Obispo, it will work closely with the CCTC to defend the cyber security of our state and nation.”

As an extension of Cal Poly’s Cybersecurity Center, the CCTC also aims to educate the next generation cyber workforce and provide faculty and students with a new, hands-on research and learning environment.

“We are thrilled to work with the District Attorney’s Office, the California National Guard and our other partners to create a place where Cal Poly students can work closely with experts at the leading edge of the battle against cybercrime and develop the skills to be tomorrow’s industry leaders,” President Armstrong said.

For Cal Poly, which has been increasingly focused on cybersecurity education, the complex’s location is an ideal fit. Located just five miles from campus, the top-notch facility is readily available to the university.

“The CCTC is an extended Learn by Doing space,” said Cal Poly Cybersecurity Center Director William J. “Bill” Britton. “It offers Cal Poly students the opportunity to train and test tactics side by side with cyber forensics experts and explore new cyber technologies, enabling Cal Poly to develop cyber-ready graduates.”

Last November, the CCTC hosted its first training class, “Cyber Forensics for First Responders,” which included participants from 13 Central Coast law enforcement agencies. Another training was held for local law enforcement in January. Cal Poly developed the curriculum for both, which included the basics of digital evidence collection and preservation, insight into new legislation impacting the legal aspects of digital evidence and collection tools. During its first full year of operations, the program is expected to train 1,000 first-responders at Camp San Luis Obispo.

For more information, visit cctc.calpoly.edu.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.