Feeds

Hey, is that CSI: Hackers on TV? Oh, it's Microsoft's Cybercrime Center

If in doubt, get the flashy, expensive 20ft video wall out

High performance access to file storage

Microsoft has built a new home for its Digital Crimes Unit on its Redmond campus to bring together geeks, lawyers, forensic specialists, and law enforcement in tracking down online crooks around the world.

Microsoft Cybercrime Center

No fighting in the war room please

"The Microsoft Cybercrime Center is where our experts come together with customers and partners to focus on one thing: keeping people safe online," said David Finn, associate general counsel of the Microsoft DCU in a statement. "By combining sophisticated tools and technology with the right skills and new perspectives, we can make the Internet safer for everyone."

The 100-person team will be augmented by third-party companies and police who will be able to use the facilities for investigations into crime on a 24/7 basis. While the bulk of the investigations going on will be chasing criminals attacking Microsoft products or customers, the center has a wider remit to work with Interpol and other law enforcement operations on global threats.

Microsoft forensics center

Microsoft's forensic center team at work

"In the fight against cybercrime the public sector significantly benefits from private sector expertise, such as provided by Microsoft," Noboru Nakatani, executive director of the Interpol Global Complex for Innovation said.

"The security community needs to build on its coordinated responses to keep pace with today's cybercriminals. The Microsoft Cybercrime Center will be an important hub in accomplishing that task more effectively and proactively."

Included in the new center is a digital forensics laboratory for examining clues in software and hardware, a secure evidence room, a dedicated anti-malware research center, office space for visiting cops and specialists, and a control center containing a wall of touch-screens showing new attacks as they pop up. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.