{"id":2457,"date":"2025-08-28T10:00:00","date_gmt":"2025-08-28T17:00:00","guid":{"rendered":"https:\/\/celacampaindev.wpenginepowered.com\/?p=2457"},"modified":"2026-01-28T14:51:50","modified_gmt":"2026-01-28T22:51:50","slug":"dcu-law-fighting-cybercrime","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/","title":{"rendered":"Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Microsoft&rsquo;s Digital Crimes Unit (DCU) is an interdisciplinary group that pioneered the use of legal strategies to disrupt cybercrime. Richard Boscovich, a former assistant US attorney, is the DCU&rsquo;s Assistant General Counsel and leads the team&rsquo;s legal litigation and disruption strategy. Here, Boscovich (affectionately known as &ldquo;Bosco&rdquo; to his colleagues) explains the team&rsquo;s unique strategy of disrupting malware by adapting legal precedent to the lawless world of cybercrime.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">At a high-level, how do you define the DCU&rsquo;s hybrid technical and legal strategy for disruption?<\/h2><p class=\"wp-block-paragraph\">Ultimately, our main goal is to protect victims. The first thing we need to do when we identify a threat is stop the spread of malware. We do that by identifying the &ldquo;farming medium&rdquo;&mdash;the command-and-control structure that propagates the malware&mdash;and working with the courts to take it down. By targeting the source, we&rsquo;re able to help service providers identify victims who have already been infected and clean their computers.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">What were some early legal innovations at the DCU?<\/h2><p class=\"wp-block-paragraph\">We first brought together the multidisciplinary group that&rsquo;s now the DCU in 2008. At that time, the biggest malware threats were domain-based. That means the criminals register a domain and use it as the &ldquo;farming medium&rdquo; to infect victims. I believed that we could make a legal case for seizing domains from threat actors by looking at precedents around asset forfeiture. When you register a domain, you&rsquo;re basically leasing a piece of property. If you&rsquo;re acting maliciously with that property, we can file a civil action to seize it, which enables us to cut off communication between a registered domain and the computers it has infected with malware. And if we can show the courts that the crime meets the conditions of an emergency, we can do it on an expedited ex-parte basis, which means we can act without notifying the perpetrators&mdash;that&rsquo;s key, because if they get notice, they&rsquo;ll just move everything off the domain.<\/p><p class=\"wp-block-paragraph\">We collaborated with a cross-industry, public-private group to use this strategy to take down some of the biggest malware threats at that time, including&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2011\/03\/17\/taking-down-botnets-microsoft-and-the-rustock-botnet\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Rustock\">Rustock<\/a>, which was a spam botnet that was sending billions of emails a day. The reduction in global email traffic was so drastic that Treehugger magazine actually calculated the drop in CO2 emissions as a result of the reduced electricity consumption. The DCU today is built on that model of applying laws in unique ways and partnering with law enforcement and government agencies, as well as other private companies, to take action.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">What was the next big inflection point in the development of the DCU&rsquo;s strategy?<\/h2><p class=\"wp-block-paragraph\">We started to partner with Microsoft Threat Intelligence Center (MSTIC) to disrupt nation-state actors with the Russian infiltration of the Democratic National Convention in 2016. Our approach was to distort their business model by forcing them to harden their infrastructure, which increases the cost and complexity of their operations. Nation-state actors are much more sophisticated and difficult to identify. They want to blend into traffic, and there are very few victims. We had to devise new investigative techniques, as well as adapt our legal techniques.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">How did you change your approach to disrupt nation-state threats?<\/h2><p class=\"wp-block-paragraph\">At that time, nation-state actors were using domain-based malware like cybercriminals were, but they&rsquo;d register a domain and keep it silent for several years. Then, all of a sudden, they would pop up. But our investigators learned that those domains would always have a specific type of malware that was unique to each attack. We would search for that malware, or at least bits and pieces of it, in a domain. When we found it, that would allow us to legally substantiate our need to take the domain down. But they would come up with new domains all the time, and each time we&rsquo;d have to go back to the court for additional orders. That&rsquo;s much too slow when you&rsquo;re dealing with a nation-state threat.<\/p><p class=\"wp-block-paragraph\">We did something very unique, which was to use what&rsquo;s called a &ldquo;special master&rdquo; or &ldquo;court monitor,&rdquo; which is primarily used in divorce proceedings. It&rsquo;s a process in both federal and state law that allows you to ask the court to appoint a monitor to keep watching the case after it&rsquo;s closed. This allows you to act quickly on problems that arise over and over again without having to go back to court every time. If we find a domain that fits a set of predetermined criteria, we can have a phone hearing with the court monitor within 24 to 48 hours and take it down. Being able to accelerate the process was a real evolution in our legal and technical strategy.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">What have been some more recent innovations in your strategy?<\/h2><p class=\"wp-block-paragraph\">We developed a tactic we call&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/06\/04\/microsoft-launches-new-european-security-program\/#:~:text=To%20accelerate%20future%20takedowns%2C%20we,them%20to%20operate%20at%20scale.\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Statutory Automated Disruption (SAD)\">Statutory Automated Disruption (SAD)<\/a>&nbsp;that uses copyright law. In the 2021 case of Google vs. Oracle, the US courts ruled that application programming interfaces (APIs) are copyrightable. That gave us an idea: we started reverse engineering malware to see if threat actors were using Microsoft&rsquo;s APIs. Very often, they were. We have copyright rules in the terms of use for our APIs, so now we can very quickly disrupt cybercriminals by showing violation of our copyright due to illegal use.<\/p><p class=\"wp-block-paragraph\">In the US, the Digital Millennium Copyright Act (DMCA) allows you to send a legal request to a service provider to take down content that&rsquo;s violating your copyright. Companies send DMCA notices all the time to take down things like pirated movies. But we&rsquo;re using the same strategy to take down cybercriminals&rsquo; command-and-control infrastructure. The built-in penalties in the statute are very high, so providers have to take down the malware immediately. No one&rsquo;s ever done this before, and it makes disruption much more efficient and effective.<\/p><p class=\"wp-block-paragraph\">The DMCA doesn&rsquo;t apply in other countries, so we can&rsquo;t compel foreign entities to comply, but there are a few ways we use SAD tactics internationally. We share our DMCA notices with international registries to help law enforcement build cases against cybercriminals. We also work with private-sector cybersecurity partners around the world, and for many security companies, copyright violation constitutes a breach of contract. Sharing our DMCA notices frequently gives these companies all the proof they need to force a cybercriminal to take down malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Richard Boscovich, Assistant General Counsel with Microsoft&rsquo;s Digital Crimes Unit (DCU), explains his team&rsquo;s unique approach to disrupting malware threats by wielding the power of the law.<\/p>\n","protected":false},"author":23,"featured_media":2458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_microsoft_sidebar_content":"<!-- wp:group {\"metadata\":{\"name\":\"Social Share\"},\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|sm\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"05xlfuiuy\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-05xlfuiuy\" data-microsoft-breakpoint-id=\"05xlfuiuy\"><!-- wp:paragraph {\"style\":{\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"6px\"}},\"fontSize\":\"body-sm\"} -->\n<p class=\"has-body-sm-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:microsoft-social-share\/social-share {\"show_facebook\":false,\"order_share\":2,\"order_facebook\":3,\"order_x\":1,\"order_linkedin\":0,\"backgroundColor\":\"#291817\",\"globalUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\",\"xUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"8vxt56kk0\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-8vxt56kk0\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"8vxt56kk0\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/08\/20\/post-quantum-resilience-building-secure-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Post-quantum resilience: building secure foundations&nbsp;<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/08\/20\/post-quantum-resilience-building-secure-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the article<img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"p54x47jm6\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-p54x47jm6\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"p54x47jm6\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">Microsoft Digital Defense Report 2025&nbsp;<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the report <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:quote {\"className\":\"is-style-framed\",\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]}} -->\n<blockquote class=\"wp-block-quote is-style-framed\"><!-- wp:paragraph -->\n<p>We are working to help civil society, governments, \u2028and technology makers come together to discuss what responsible computing means in the quantum era&nbsp;so we can safely use these technologies for societally beneficial&nbsp;\u2028purposes.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"fontSize\":\"body\",\"fontFamily\":\"segoe-sans\"} -->\n<p class=\"has-segoe-sans-font-family has-body-font-size\">Emily Violi&nbsp;Benjamin,<br>Senior Program Manager,<br>Quantum Legal and Policy<\/p>\n<!-- \/wp:paragraph --><\/blockquote>\n<!-- \/wp:quote -->","_microsoft_bottom_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|xl-fluid\"}},\"layout\":{\"type\":\"grid\",\"minimumColumnWidth\":\"19rem\"},\"microsoftBreakpointId\":\"vg97ktoc2\"} -->\n<div class=\"wp-block-group alignwide microsoft-breakpoint-id-vg97ktoc2\" data-microsoft-breakpoint-id=\"vg97ktoc2\"><!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"c3k6krrm9\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-c3k6krrm9\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"c3k6krrm9\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2459,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Article-1-Star-Blizzard-DCU-Disruption-Blog_Header_1200x675.webp\" alt=\"Conference room with people sitting in front computer screens while two women are seen standing in front of a digital globe with red markers over different areas.\" class=\"wp-image-2459\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">5 things you need to know about tracking today\u2019s nation-state threats<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">\n    <span class=\"screen-reader-text\">\n      Read \u201c5 things threat analysts wish you knew\u201d\n    <\/span>\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"8be6w7sk1\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-8be6w7sk1\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"8be6w7sk1\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2460,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/news.microsoft.com\/source\/features\/ai\/how-microsoft-is-taking-down-ai-hackers-who-create-harmful-images-of-celebrities-and-others\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/Article-2-HeaderVisual_DCUStory.webp\" alt=\"Abstract digital art of a woman's image fragmented into squares with numbers and arrows, set against a cloudy sky background.\" class=\"wp-image-2460\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/news.microsoft.com\/source\/features\/ai\/how-microsoft-is-taking-down-ai-hackers-who-create-harmful-images-of-celebrities-and-others\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Microsoft is taking down AI hackers who create harmful images of celebrities and others<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">\n    \n    <span class=\"screen-reader-text\">\n      Read \u201cProtecting NGOs from cyberattacks\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"s37ipnuw6\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-s37ipnuw6\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"s37ipnuw6\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2469,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/11\/CLO22_SecOps_006-1-1024x683.jpg\" alt=\"Security blog post: Starting your journey to becoming quantum-safe\" class=\"wp-image-2469\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Starting your journey to becoming quantum-safe<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/01\/starting-your-journey-to-become-quantum-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">\n\n    <span class=\"screen-reader-text\">\n      Read \u201cStarting your journey to become quantum-safe\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group --><\/div>\n<!-- \/wp:group -->","_microsoft_story_hero_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"0\"},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"0.15em\",\"lineHeight\":\"1\"}},\"fontSize\":\"body-xs\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"zmxsh4o4w\"} -->\n<div class=\"wp-block-group alignwide has-body-xs-font-size microsoft-breakpoint-id-zmxsh4o4w\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"zmxsh4o4w\"><!-- wp:tenup\/post-primary-term {\"isLink\":false,\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|xs\",\"bottom\":\"var:preset|spacing|xs\",\"left\":\"var:preset|spacing|xs\",\"right\":\"var:preset|spacing|xs\"}},\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|clear-blue\"}}}},\"backgroundColor\":\"brown-black\",\"textColor\":\"clear-blue\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"align\":\"wide\",\"className\":\"is-style-post-header\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"wrap\",\"justifyContent\":\"space-between\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"3xxgrttak\"} -->\n<div class=\"wp-block-group alignwide is-style-post-header microsoft-breakpoint-id-3xxgrttak\" data-microsoft-breakpoint-id=\"3xxgrttak\"><!-- wp:group {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}},\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"kgbedb7qx\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-kgbedb7qx\" data-microsoft-breakpoint-id=\"kgbedb7qx\"><!-- wp:post-title {\"level\":1,\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-4-xl-fluid\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:post-excerpt {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_prefix_content":"<!-- wp:group {\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"right\",\"orientation\":\"horizontal\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"78xaub60h\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-78xaub60h\" data-microsoft-breakpoint-id=\"78xaub60h\"><!-- wp:post-date {\"format\":\"M j, Y\"} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_suffix_content":"<!-- wp:paragraph {\"placeholder\":\"Add content to this area...\"} -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"clear-blue","footnotes":""},"categories":[13,3],"tags":[],"topic":[48],"class_list":["post-2457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-law-enforcement","topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The DCU helps the law move at the speed of cybercrime | Microsoft<\/title>\n<meta name=\"description\" content=\"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The DCU helps the law move at the speed of cybercrime | Microsoft\" \/>\n<meta property=\"og:description\" content=\"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T22:51:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"377\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CELA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CELA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/\"},\"author\":{\"name\":\"CELA\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\"},\"headline\":\"Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime\",\"datePublished\":\"2025-08-28T17:00:00+00:00\",\"dateModified\":\"2026-01-28T22:51:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/\"},\"wordCount\":1077,\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\",\"articleSection\":[\"Cybersecurity\",\"Law Enforcement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\",\"name\":\"The DCU helps the law move at the speed of cybercrime | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\",\"datePublished\":\"2025-08-28T17:00:00+00:00\",\"dateModified\":\"2026-01-28T22:51:50+00:00\",\"description\":\"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg\",\"width\":800,\"height\":377,\"caption\":\"Richard Boscovich, assistant general counsel, DCU, in conversation during a meeting.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\",\"name\":\"CELA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"caption\":\"CELA\"},\"sameAs\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The DCU helps the law move at the speed of cybercrime | Microsoft","description":"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"The DCU helps the law move at the speed of cybercrime | Microsoft","og_description":"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/","og_site_name":"Microsoft Corporate Responsibility","article_published_time":"2025-08-28T17:00:00+00:00","article_modified_time":"2026-01-28T22:51:50+00:00","og_image":[{"width":800,"height":377,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg","type":"image\/jpeg"}],"author":"CELA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CELA","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#article","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/"},"author":{"name":"CELA","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0"},"headline":"Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime","datePublished":"2025-08-28T17:00:00+00:00","dateModified":"2026-01-28T22:51:50+00:00","mainEntityOfPage":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/"},"wordCount":1077,"publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg","articleSection":["Cybersecurity","Law Enforcement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/dcu-law-fighting-cybercrime\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/","name":"The DCU helps the law move at the speed of cybercrime | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg","datePublished":"2025-08-28T17:00:00+00:00","dateModified":"2026-01-28T22:51:50+00:00","description":"Microsoft\u2019s Digital Crimes Unit (DCU) combines legal and technical methods to combat cybercrime by disrupting malware operations and protecting victims.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU_Meeting_17591-2-1-e1765310591281.jpg","width":800,"height":377,"caption":"Richard Boscovich, assistant general counsel, DCU, in conversation during a meeting."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/DCU-law-fighting-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0","name":"CELA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","caption":"CELA"},"sameAs":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/"]}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=2457"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2457\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/2458"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=2457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/categories?post=2457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/tags?post=2457"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/topic?post=2457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}