SlideShare a Scribd company logo
1 of 2
Download to read offline
Meet the Microsoft Digital Crimes Unit. 
The Microsoft Digital Crimes Unit (DCU) consists of legal and technical experts 
who work with law enforcement agencies—including Europol, the FBI, and 
Interpol—academia, global governmental agencies, and nongovernmental 
organizations. The Cybercrime Center is a working lab that showcases Microsoft’s 
approach to cybersecurity and how we engage in the fight against cybercrime. 
Our job is to stop cybercrime, refer criminals to law enforcement, and create 
a safe digital world. Throughout the process, Microsoft is committed to 
trustworthy computing, customers’ privacy, and protection of their data. 
DCU focuses on three specific areas: 
We Opened 
The Cybercrime 
Center 
to shut down cybercriminals. 
DISRUPTING 
MALWARE 
TARGETING 
INTELLECTUAL 
PROPERTY CRIMES 
PROTECTING 
VULNERABLE 
POPULATIONS
We’re not just crime stoppers. 
We target global criminal organizations 
that are looking to profit from IP crimes, 
malicious software code, and botnets. We 
do this by using Microsoft technology— 
including Microsoft Office 365, Microsoft 
SQL Server, and Microsoft Azure. 
Through our malware operations, and 
our partnership with global Computer 
Emergency Response Teams (CERTs), we’ve 
successfully cleaned millions of infected 
devices. In addition, we protect customers 
by embedding this intelligence back 
into Microsoft’s platform and services. 
We also partner with local law 
enforcement to help us execute 
our cybercrime operations and to 
protect unsuspecting consumers and 
businesses from these crimes. 
And we’ve developed state-of-the-art 
ways to detect global cybercrime. 
Our cyberforensics team tracks the 
spread of counterfeit software and 
provides a visual representation of 
this data, including locations of where 
the criminal activity is originating. 
Beyond disrupting malware and targeting 
intellectual property crimes, we also 
focus on protecting the most vulnerable 
among us, including children and the 
elderly. Microsoft and Dartmouth College 
collaborated to develop PhotoDNA, a 
technology that helps detect and stop 
online exploitation of children by creating 
unique fingerprint-like signatures of 
images. PhotoDNA is now considered the 
industry standard and we provide it to 
more than 50 other organizations, including 
Google, Facebook, LinkedIn, and Twitter, 
and law enforcement agencies worldwide. 
Cybercrimes cost billions. 
Cybercrime is impacting millions of people 
around the world. A recent study by IDC 
reported that malware in pirated software 
is costing consumers and businesses 
billions of dollars every year. Criminal 
organizations are creating malware with 
illegal financial gain, data theft, espionage, 
or other mayhem in mind.3 To protect 
themselves from counterfeit software and 
malware, consumers and organizations 
need to purchase from authorized resellers. 
This type of safe practice complements 
DCU’s mission to end cybercrime. 
Our plan is to keep playing offense 
by helping law enforcement agencies 
and our customers. We’ve stopped 
everyone from violent narcotics cartels 
to software pirates. We’re constantly 
innovating so we can stay one step ahead. 
That way, we can keep tracking and 
shutting down these cybercriminals. 
3The Link between Pirated Software and Cybersecurity Breaches, IDC white 
paper 2014 
The Facts 
1The Norton Report, 2013 
2Bloomberg Businessweek, “Cybercrime Costing Business Hundreds of Billions” 
Find out more: 
Microsoft.com/DCU 
Technet.Microsoft.com/security 
Microsoft.com/security/cybersecurity 
Facebook.com/MicrosoftDCU 
Twitter.com/MicrosoftDCU 
DCUcybercrime@microsoft.com 
Cybercrime costs the 
consumer roughly 
of online users were 
cybercrime victims 
in the past year.1 
people are victims of cybercrime every day.1 
dollars a year.2 BILLION 
“Microsoft is the leader in 
taking the fight directly to 
cybercriminals to disrupt and 
dismantle their operations.” 
–Rich Sauer 
CVP & Deputy General Counsel, Microsoft

More Related Content

Viewers also liked

Bye VFM, Hello BYP
Bye VFM, Hello BYPBye VFM, Hello BYP
Bye VFM, Hello BYPPaul Askew
 
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสาน
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสานHis ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสาน
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสานMontira Hokjaroen
 
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...Microsoft
 
Task 3 script
Task 3  scriptTask 3  script
Task 3 scriptchloea2
 
Padleguide Sunnhordland
Padleguide SunnhordlandPadleguide Sunnhordland
Padleguide SunnhordlandMarie Melhagen
 
[Scup] Hurricane Sandy in 40 images
[Scup] Hurricane Sandy in 40 images[Scup] Hurricane Sandy in 40 images
[Scup] Hurricane Sandy in 40 imagesScup
 
Der Neuanfang im Osten
Der Neuanfang im OstenDer Neuanfang im Osten
Der Neuanfang im OstenClaus Artz
 
5 things overwhelmed working mums need to learn webinar
5 things overwhelmed working mums need to learn webinar5 things overwhelmed working mums need to learn webinar
5 things overwhelmed working mums need to learn webinarJulia Harris
 

Viewers also liked (17)

Q6 presenting
Q6 presentingQ6 presenting
Q6 presenting
 
Bimby
BimbyBimby
Bimby
 
portfolio
portfolioportfolio
portfolio
 
Dicionario apresentacao da organicao
Dicionario apresentacao da organicaoDicionario apresentacao da organicao
Dicionario apresentacao da organicao
 
Bye VFM, Hello BYP
Bye VFM, Hello BYPBye VFM, Hello BYP
Bye VFM, Hello BYP
 
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสาน
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสานHis ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสาน
His ค่ายผู้นำเยาวชน สี่สังฆมณฑลอีสาน
 
571 415 itp_2009_2
571 415 itp_2009_2571 415 itp_2009_2
571 415 itp_2009_2
 
Servicios CREU BLANCA
Servicios CREU BLANCAServicios CREU BLANCA
Servicios CREU BLANCA
 
Ciber
CiberCiber
Ciber
 
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
Microsoft Next 2014 - Cloud Platform session 2 - Lolland kommune får styr på ...
 
Adv 10
Adv 10Adv 10
Adv 10
 
Task 3 script
Task 3  scriptTask 3  script
Task 3 script
 
Padleguide Sunnhordland
Padleguide SunnhordlandPadleguide Sunnhordland
Padleguide Sunnhordland
 
[Scup] Hurricane Sandy in 40 images
[Scup] Hurricane Sandy in 40 images[Scup] Hurricane Sandy in 40 images
[Scup] Hurricane Sandy in 40 images
 
Der Neuanfang im Osten
Der Neuanfang im OstenDer Neuanfang im Osten
Der Neuanfang im Osten
 
Come To The Banquet!
Come To The Banquet!Come To The Banquet!
Come To The Banquet!
 
5 things overwhelmed working mums need to learn webinar
5 things overwhelmed working mums need to learn webinar5 things overwhelmed working mums need to learn webinar
5 things overwhelmed working mums need to learn webinar
 

Recently uploaded

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Cyber Security Conference - Foundational Cyber Security – Microsoft’s Digital Crimes Unit, By Digital Crime Unit Lead Juan Hardoy – Microsoft EMEA

  • 1. Meet the Microsoft Digital Crimes Unit. The Microsoft Digital Crimes Unit (DCU) consists of legal and technical experts who work with law enforcement agencies—including Europol, the FBI, and Interpol—academia, global governmental agencies, and nongovernmental organizations. The Cybercrime Center is a working lab that showcases Microsoft’s approach to cybersecurity and how we engage in the fight against cybercrime. Our job is to stop cybercrime, refer criminals to law enforcement, and create a safe digital world. Throughout the process, Microsoft is committed to trustworthy computing, customers’ privacy, and protection of their data. DCU focuses on three specific areas: We Opened The Cybercrime Center to shut down cybercriminals. DISRUPTING MALWARE TARGETING INTELLECTUAL PROPERTY CRIMES PROTECTING VULNERABLE POPULATIONS
  • 2. We’re not just crime stoppers. We target global criminal organizations that are looking to profit from IP crimes, malicious software code, and botnets. We do this by using Microsoft technology— including Microsoft Office 365, Microsoft SQL Server, and Microsoft Azure. Through our malware operations, and our partnership with global Computer Emergency Response Teams (CERTs), we’ve successfully cleaned millions of infected devices. In addition, we protect customers by embedding this intelligence back into Microsoft’s platform and services. We also partner with local law enforcement to help us execute our cybercrime operations and to protect unsuspecting consumers and businesses from these crimes. And we’ve developed state-of-the-art ways to detect global cybercrime. Our cyberforensics team tracks the spread of counterfeit software and provides a visual representation of this data, including locations of where the criminal activity is originating. Beyond disrupting malware and targeting intellectual property crimes, we also focus on protecting the most vulnerable among us, including children and the elderly. Microsoft and Dartmouth College collaborated to develop PhotoDNA, a technology that helps detect and stop online exploitation of children by creating unique fingerprint-like signatures of images. PhotoDNA is now considered the industry standard and we provide it to more than 50 other organizations, including Google, Facebook, LinkedIn, and Twitter, and law enforcement agencies worldwide. Cybercrimes cost billions. Cybercrime is impacting millions of people around the world. A recent study by IDC reported that malware in pirated software is costing consumers and businesses billions of dollars every year. Criminal organizations are creating malware with illegal financial gain, data theft, espionage, or other mayhem in mind.3 To protect themselves from counterfeit software and malware, consumers and organizations need to purchase from authorized resellers. This type of safe practice complements DCU’s mission to end cybercrime. Our plan is to keep playing offense by helping law enforcement agencies and our customers. We’ve stopped everyone from violent narcotics cartels to software pirates. We’re constantly innovating so we can stay one step ahead. That way, we can keep tracking and shutting down these cybercriminals. 3The Link between Pirated Software and Cybersecurity Breaches, IDC white paper 2014 The Facts 1The Norton Report, 2013 2Bloomberg Businessweek, “Cybercrime Costing Business Hundreds of Billions” Find out more: Microsoft.com/DCU Technet.Microsoft.com/security Microsoft.com/security/cybersecurity Facebook.com/MicrosoftDCU Twitter.com/MicrosoftDCU DCUcybercrime@microsoft.com Cybercrime costs the consumer roughly of online users were cybercrime victims in the past year.1 people are victims of cybercrime every day.1 dollars a year.2 BILLION “Microsoft is the leader in taking the fight directly to cybercriminals to disrupt and dismantle their operations.” –Rich Sauer CVP & Deputy General Counsel, Microsoft