Feeds

Hampshire cops caught using counterfeit MS software

MS and reseller use installation as case study

  • alert
  • submit to reddit

Reducing security risks from open source software

Updated Microsoft has set the law on the coppers of Hampshire after it discovered the force was using counterfeit copies of Microsoft Office Pro 97.

Officers from the City of London arrested four men yesterday in connection with the crime, reports The Sun. Three of the men work for Protocol Solutions, the integrators who set up the Hampshire force's IT system. The fourth man was an ex-employee of Protocol.

One of the men arrested was a former superintendent of Hampshire. All four have been released without charge.

The police also raided Protocol's offices in Fareham.

According to a Microsoft case study Hampshire Constabulary's system comprises '2,000 desktop personal computers running on 40 Windows NT Server-based server machines.'

The volume price for the Open License Pack of Microsoft Office Professional 97, according to MS' web site, is $412.00.

City of London cops were brought in as independent investigators and because of their expertise in complicated fraud crimes.

Happily Protocol has also used the Hampshire Constabulary deal as a case study. The site doesn't seem to be working that well but the company seems a bit busy trying to compile an official statement about the situation.

Protocol is a Microsoft Certified Solutions Partner, as well as a reseller of IBM, Compaq, Citrix and Sun kit.

The Microsoft case study has quotes "David Walker, IT Project Manager for Hampshire Constabulary, explaining the value of Microsoft Systems Management Server."

"Firstly it performs a regular hardware and software audit of systems connected to the network." It also allows "the management of application licenses, through which savings can be made..." Good stuff that Microsoft SMS.

On a happy note the Hampshire force may be elligible for full authorised versions of the software via Microsoft's latest anti-piracy initiative. This allows resellers and punters to send in their dodgy disks, along with receipts, and then provide full information on how they got the software. They then hope for the merciful Microsoft to rule they've been genuinely stitched up and so deserve replacement CDs. ®

Related Links

Microsoft's case study
Protocol's case study

Related Stories

Insiders help Windows code leak to warez sites, claims 'finder'
Make MS happy: send in your hooky software
Swap your fakes for genuwine software

Eight steps to building an HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.