OwlTail

Cover image of Jim Christy

Jim Christy

5 Podcast Episodes

Latest 9 Oct 2021 | Updated Daily

Weekly hand curated podcast episodes for learning

Episode artwork

‘Rough Road to the North: A Vagabond on the Great Northern Highway’ by Jim Christy

Book Talk

"What is it about the desolate far North American wilderness that calls the intrepid traveler to uncover its sanctifying and deadly secrets? From Jack London to Christopher McCandless, souls have found solace in the silent, frozen northern kingdom at the top of the world, the Ultima Thule.Book art and author headshot provided by the author’s representative.00:00 - Show Opening01:10 - Luckiest Hippie Alive - Tobias Berblinger01:26 - Episode Intro03:15 - Luckiest Hippie Alive (Cont’d) - Tobias Berblinger05:42 - Interview with Jim Christy, Part 124:00 - Medicine Water - Tobias Berblinger27:13 - Interview with Jim Christy, Part 239:59 - My Boots Have Been Drinking - Tobias Berblinger40:19 - Episode Outro41:50 - My Boots Have Been Drinking (Cont’d) - Tobias Berblinger44:29 - Finish"

44mins

26 Mar 2020

Episode artwork

Jim Christy: The Defense Cyber Crime Center

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

This talk will cover the Defense Cyber Crime Center (DC3), our mission and capabilities. The DC3 is one-stop shopping for cyber crime related support. We have approximately 160 people assigned in 3 main organizations: * The Defense Computer Forensics Lab - probably the largest digital forensics lab in the world and the leader in handling large datasets. One case averages 75 terabytes. * The Defense Computer Investigations Training Program - the most high-tech classrooms in the world, training all of the DoD criminal and counterintelligence agents on the techniques to investigate cyber crime. FBI, Secret Service and Department of State, Diplomatic Security Service actually buy our courses for their agents due to the quality. * The Defense Cyber Crime Institute - my organization, responsible for research and development of new digital forensics tools as well as the validation, test and evaluation of these tools. Since crime labs now are moving to accreditation so that their evidence will be admissible in court, all of the tools used in a crime lab must first be independently tested and validated. You can't download the latest and greatest tool from the Internet or purchase it and use it without validating it first.Digital forensics is now a recognized forensic discipline just like, ballistic, serology, DNA, handwriting analysis, and finger print analysis. As such, there are best practices that must be adhered to. The discipline is on the cusp, moving from adhoc to certified professionals. The institute would like to be the consumer reports for digital forensics tools someday. Check out our website, www.dc3.gov.

1hr 4mins

4 Jun 2006

Similar People

Episode artwork

Jim Christy: The Defense Cyber Crime Center

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

This talk will cover the Defense Cyber Crime Center (DC3), our mission and capabilities. The DC3 is one-stop shopping for cyber crime related support. We have approximately 160 people assigned in 3 main organizations: * The Defense Computer Forensics Lab - probably the largest digital forensics lab in the world and the leader in handling large datasets. One case averages 75 terabytes. * The Defense Computer Investigations Training Program - the most high-tech classrooms in the world, training all of the DoD criminal and counterintelligence agents on the techniques to investigate cyber crime. FBI, Secret Service and Department of State, Diplomatic Security Service actually buy our courses for their agents due to the quality. * The Defense Cyber Crime Institute - my organization, responsible for research and development of new digital forensics tools as well as the validation, test and evaluation of these tools. Since crime labs now are moving to accreditation so that their evidence will be admissible in court, all of the tools used in a crime lab must first be independently tested and validated. You can't download the latest and greatest tool from the Internet or purchase it and use it without validating it first.Digital forensics is now a recognized forensic discipline just like, ballistic, serology, DNA, handwriting analysis, and finger print analysis. As such, there are best practices that must be adhered to. The discipline is on the cusp, moving from adhoc to certified professionals. The institute would like to be the consumer reports for digital forensics tools someday. Check out our website, www.dc3.gov.

1hr 4mins

4 Jun 2006

Episode artwork

Jim Christy: Meet the Feds

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Discussion of the power of Digital Forensics today and the real-world challenges. Also discuss the Defense Cyber Crime Center (DC3) and the triad of organizations that comprise DC3; The Defense Computer Forensics Lab, the Defense Cyber Crime Institute, and the Defense Cyber Investigations Training Academy. The evolving discipline of cyber crime investigations and the critical role law enforcement plays in a Network Centric Warfare environment. The accreditation process for a cyber forensics lab, the forensic processes, and capabilities. This year, there will be two separate panels: IA Panel: Information assurance, CERTS, first responders organizations from agencies including DC3, DHS, SOCOM, NSA, OSD, NDU, and GAO LE Panel: Law enforcement, counterintelligence agencies including DC3, FBI, IRS, NCIS, NASA, DoJ, NWC3, US Postal IG, FLETC, and RCMP Jim Christy is a recently (1 Dec 2006) retired special agent that specialized in cyber crime investigations and digital evidence for over 20 years and 35 years of federal service. Jim is currently the Director of Futures Exploration for the Defense Cyber Crime Center (DC3) and was profiled in Wired Magazine in January 2007. * Dir of Futures Exploration * Dir the Defense Cyber Crime Institute * R&D of digital forensic tools and processes * T&Validation of tools both Hardware & software used in an accredited digital forensics lab * Dir of Ops for Defense Computer Forensics Lab * LE/CI Liaison to OSD IA * DoD Rep to Presidents Infrastructure Protection Task Force * US Senate Investigator Perm Sub of Invest * 11 years Dir of AF OSI Computer Crime Investigations

1hr 13mins

9 Jan 2006

Most Popular

Episode artwork

Jim Christy: Meet the Feds

Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

Discussion of the power of Digital Forensics today and the real-world challenges. Also discuss the Defense Cyber Crime Center (DC3) and the triad of organizations that comprise DC3; The Defense Computer Forensics Lab, the Defense Cyber Crime Institute, and the Defense Cyber Investigations Training Academy. The evolving discipline of cyber crime investigations and the critical role law enforcement plays in a Network Centric Warfare environment. The accreditation process for a cyber forensics lab, the forensic processes, and capabilities. This year, there will be two separate panels: IA Panel: Information assurance, CERTS, first responders organizations from agencies including DC3, DHS, SOCOM, NSA, OSD, NDU, and GAO LE Panel: Law enforcement, counterintelligence agencies including DC3, FBI, IRS, NCIS, NASA, DoJ, NWC3, US Postal IG, FLETC, and RCMP Jim Christy is a recently (1 Dec 2006) retired special agent that specialized in cyber crime investigations and digital evidence for over 20 years and 35 years of federal service. Jim is currently the Director of Futures Exploration for the Defense Cyber Crime Center (DC3) and was profiled in Wired Magazine in January 2007. * Dir of Futures Exploration * Dir the Defense Cyber Crime Institute * R&D of digital forensic tools and processes * T&Validation of tools both Hardware & software used in an accredited digital forensics lab * Dir of Ops for Defense Computer Forensics Lab * LE/CI Liaison to OSD IA * DoD Rep to Presidents Infrastructure Protection Task Force * US Senate Investigator Perm Sub of Invest * 11 years Dir of AF OSI Computer Crime Investigations

1hr 13mins

9 Jan 2006