Anda di halaman 1dari 23

Computer Software Piracy Trends and Issues in the United States Summer 2011 Karen Ferguson Toni Garcia

James Dolina (SMT-273614-01-11SU2) Cyber Crime and Computer Forensics Empire State College

Purpose of Study The purpose of our research is to identify the status of computer software piracy primarily on a national level. We wish to identify what the trends in software piracy are, what counter measures are in place, and what cases and tools exist on this topic. Our purpose is to inform a policy maker or general member of the public of the landscape of piracy issues; by providing an analysis and identifying trends, our reader will have the information to knowledgeably discuss the issue. Our audience is not necessarily a technical one, but readers interested in business and ethics.

Opening Statement, Assumptions or Hypothesis Is software piracy a real threat to the US economy? Are the statistics of the cost of piracy in financial and global security realistic? And, what can be done about it?

Discussion of Findings Why do people choose to undertake software piracy? A recent global study by Bagchi and Cerveny searches for the reasons behind global software piracy. It states the 4 most common causes are assumed to be economic factors, regulatory factors, technical factors, and social/cultural factors. The analysis determines that economic factors are not a key factor alone. Internet use growth rate does not predict rises in piracy until after 2003; at this time, the increase in internet growth correlated with an increase in piracy. The concolusion is it is more than money and opportunity that are at work. The explosion of the internet and availability does correlate with increased use and increased piracy. Scorpeccis article also examines what drives digital piracy, and the steps which can be taken to combat it. His article states: Even if consumers involved in digital piracy are generally aware that it is illegal, it is not always perceived as un-ethical, so continued emphasis should be placed on education and consumer awareness to overcome this perception. Industry and some governments have instituted extensive campaigns toward this end, and these actions can be paralleled with enforcement campaigns to reduce the likelihood of piracy.

Software piracy is fundamentally a violation of copyright protection. Program and software developers expect to be compensated for fair use of their intellectual property. Regulatory Background of relevant laws and acts of the US Government

Senate Bill S893

Signed by President Bush in October 1992, the bill elevated software piracy from a misdemeanor to a felony, if 10 or more illegal copies of software are made within a six-month period, and if the copies are worth a total value of over $2,500. The first offense is punishable by five years in prison and a fine of $250,000. The second offense is punishable by up to 10 years in prison.

United States Copyright Act

This act holds someone guilty of illegal reproduction of software subject to civil damages of up to $100,000 per title infringed, and criminal penalties, including fines of as much as $250,000 per title infringed and imprisonment of up to five years.

No Electronic Theft Act

The NET Act made criminal the willful infringement of copyrighted works, specifically by electronic means, even when the infringing party derives no direct financial benefit from the infringement. Through this act, somebody who made copies of software and distributed them through a web site, for example, was now liable for damages. If the copyrighted works copied had a total retail value of over $1,000, the infringing party could be imprisoned for up to to 6 years.

International Agreements

The U.S. government is committed to fighting software piracy abroad as well. In 1991, a Special 301 investigation under the U.S. Trade Act of 1974 found that the Chinese government has been lax in enforcing software copyright laws. In January 1992, a Memorandum of Understanding was signed by China, in which it pledged to strengthen its principal intellectual property laws, and to treat software as

literary work. In 1994, an investigation found that the intellectual property practices in China were especially "onerous and egregious," leading to the United States threatening China with trade sanctions. The United States has taken a firm stance and has made it clear that it will impose trade sanctions against countries which do not take steps to eliminate software piracy.

Digital Millenium Copyright Act

The DMCA is the most comprehensive reform of the copyright law in the U.S. in a generation. One of the highlights of DMCA is to make it a crime to circumvent anti-piracy measures built into most commercial software. The Act also outlaws the manufacture, sale, or distribution of code-cracking devices used to illegally copy software.

Prioritizing Resources and Organization for Intellectual Property Act Public Law 110-403

On October 13, 2008, the President signed the Prioritizing Resources and Organization for Intellectual Property Act into law (Pub. L. 110-403) (the PRO-IP Act). The new statute strengthens the intellectual property laws of the United States in several respects. For example, it amends Section 410 of the Copyright Act to codify the doctrine of fraud on the Copyright Office in the registration process. The law also clarifies that registration is not a prerequisite for a criminal copyright prosecution and makes it unlawful (civilly or criminally) to export unauthorized copies of protected works, including copies of phonorecords, from the United States. In addition, the law amends Section 506 of the Copyright Act to provide for the forfeiture of any property used to commit or facilitate the commission of a criminal offense involving copyrighted works.

The Act creates a new enforcement paradigm for the federal governments efforts to combat counterfeiting and piracy. For example, it creates an Intellectual Property Enforcement Coordinator (IPEC) within the Executive Office of the President. This office would be primarily responsible for developing and implementing a Joint Strategic Plan against counterfeiting and piracy and the coordinator would serve as a principal advisor to the President on domestic and international intellectual property enforcement policy. The Act also provides for improved investigative and forensic resources for

enforcement of laws related to intellectual property crimes and allocates additional funding for resources to investigate and prosecute intellectual property crimes and other criminal activity involving computers.

The History of Software Piracy

In 2001, the US government made large-scale news when it issued over 100 arrest warrants worldwide for piracy, the culminates of 3 operations internationally over the prior years.

The three operations were as follows:

Operation Buccaneer, a one-year investigation by the U.S. Customs Service and the Justice Department's Computer Crime and Intellectual Property section, working in conjunction with the U.S. Attorney for the Eastern District of Virginia. Buccaneer involved the simultaneous execution of 58 search warrants against high-level Warez leadership and members around the world.

Included in the targets is the piracy group called DrinkOrDie, which is made up of about 40 members worldwide. The groups decode antipiracy measures in software and release the code on the Internet before or at the time of a new product's launch, causing losses for software companies. The U.S. worked with authorities in the U.K., Australia, Norway, and Finland in the investigation.

Operation Bandwidth, a two-year effort to identify and prosecute groups and individuals involved with illegal access to computer systems and the piracy of proprietary software using Warez storage sites on the Internet. The investigation involved the Defense Criminal Investigative Service, the Environmental Protection Agency Office of the Inspector General and the Federal Bureau of Investigation.

The groups, along with the Nevada U.S. Attorney's Office, created an undercover Warez site as part of the investigation, which was used to transfer more than 100,000 pirated files, including more than 12,000 separate software programs, movies, and games. More than 200 suspects participated in the piracy efforts at the undercover site. Thousands of copies of pirated software will be removed from circulation because of the sting, as well as computer hardware seized by authorities.

Operation Digital Piratez, a yearlong effort by the FBI and the New Hampshire U.S. Attorney's Office to infiltrate several Warez distribution organizations, including "cracking groups" specifically created for the purpose of pirating software so that it may be distributed over the Internet in violation of U.S. copyright laws.

As noted by Urbas, Operation Buccaneer illustrates the cross-national reach of both Internet-based intellectual property crime and the law enforcement response, as well as some of the complexities that arise in applying jurisdictional concepts such as the double criminality requirement for extradition in this evolving prosecutorial landscape.

Economic impact of piracy

Loss of revenues The Business Software Alliance is at the forefront of fighting global software piracy. It produces an annual report estimating the cost, the most recent of which reports: The commercial value of PC software piracy leapt 14 percent globally in 2010 to $59 billion. This figure has nearly doubled in real terms since 2003. The driving force behind the trend is piracy in the worlds emerging economies, where the personal computer market is growing fastest Although this makes the scope of piracy on the global level alone seem insurmountable, some caution and skepticism should be applied when considering these numbers. The Government Accountability Office completed a report on piracy in 2010 which did note it is of a global impact. This was the first recent US study and it t called into question some of the assertions about the effects of piracy on copyright owners including software manufacturers. The GAO reported, Most experts we spoke with and the literature we reviewed observed that despite significant efforts, it is difficult, if not impossible, to quantify the net effect of counterfeiting and piracy on the economy as a whole." "Three widely cited U.S. government estimates of economic losses resulting from counterfeiting cannot be substantiated due to the absence of underlying studie. The illicit nature of counterfeiting and piracy

makes estimating the economic impact of (intellectual property) infringements extremely difficult, so assumptions must be used to offset the lack of data." The GAO review supported the claim that piracy harms industries and consumers and could slow U.S. economic growth, but the scope of this is almost incalculable. Part of the problem lies in the nature of piracy and illegal goods. One way that copyright owners calculate the value of lost sale is "substitution rates" to indicate how many people who buy pirated merchandise would have otherwise purchased legitimate products had the illegal material not been available. This is impossible to measure per the GAO report but it does offer a counterperspective to the estimates provided by the Business Software Alliance. Links to terrorism funding It seems debatable whether software piracy and terrorism are or have been linked together. Back in 2008, then Attorney General Michael Mukasey made a bold claim that terrorist organizations do indeed sell pirated software as a means of financing their organizations. In a speech presented to the Tech Museum of Innovation he was quoted as saying: Criminal syndicates, and in some cases even terrorist groups, view IP crime as a lucrative business, and see it as a low risk way to fund other activities. Mr. Mukasey then went on to name several instances in which the United States Justice Department had arrested those involved in piracy and even in which countries the department has worked with other countries via investigations. He noted arrests in Florida, China, and named the Russian Mafia as being involved as well. Unfortunately, he never once presented any concrete evidence linking software piracy to terrorism. His motivation in making such a bold, unfounded statement was to convince people of this link in order to push Congress into passing legislation that would increase penalties for intellectual property (IP) infringement, grant police more power, and to create a new agency geared at fighting IP theft. Most people believed that this was just political posturing as a result of pressure from those lobbyists in the electronic media industry.

Fast forward to 2009, when the Motion Picture Association, which is the European equivalent to the Motion Picture Association of America, paid for a study which again claimed that piracy was fostering terrorism. The study, created by the RAND Corp. was a 182 page document entitled Film Piracy, Organized Crime and Terrorism and suggested that the connection between piracy and terrorism may be stronger than previously believed. This study produced 3 case studies which identified a direct link from piracy and terrorism which I will expound on further. The Tri-Border Area(TBA - Latin America) Consisting of the borders of Brazil, Argentina, and Paraguay and widely thought to be a haven for criminal organizations as well terrorist groups most notably, Hezbollah. Rand researches, as well as other experts have concluded that the TBA is one of the most influential financing areas in regards to Islamic terrorism outside of the Middle East. Led by Assad Ahmad Barakat, it is believed that this network used piracy as a means of generating millions of dollars which was funneled to Hezbollah. Barakat was not the first to be implicated though as Lebanese businessman Ali Khalil Mehri who also had close ties to Hezbollah was arrested after searches of his offices yielded a cache of counterfeit CDs, and video games. Mehri apparently took advantage of the weak government system to gain exclusive rights to the products he manufactured including a title to produce Playstation Gaming Systems. Therefore if merchants tried to sell so called registered products they would be subject to extortion which because of the titles he wrongfully received was upheld by the police in that area. Northern Ireland This case involves the Irish Republican Army (IRA) and details the direct connection between counterfeiting and terrorism. It is thought that the groups here have been active in piracy since the days of the home video explosion and their stranglehold only tightened and as the ease and quality of the media duplication increased. By 2004 it was believed that terrorist groups controlled over 80 percent of the film and software piracy in the area. An example of this occurred in 2000 when 3 Irish Customs and Excises officers were searching a suspected fuel-laundering plant just a few feet from the border between the Republic and Northern Ireland. There the officials came upon a van filled with what appeared to be counterfeit DVDs, CDs, and video games along with DVD copying devices. When the police arrived they noted that the van had over 100,000 in pirated media. They had also noted that the van was seen in a

local marketplace selling merchandise out of it. When preparing to return to their district with the property two rockets were fired from the Northern Ireland side of the border. Also at that time several vehicles pulled up and masked gunmen appeared demanding the return of everything that was seized. The police did not resist and the men fled with the merchandise. The police were convinced that the men belonged to the Real Irish Republican Army (RIRA). South Asia Originally a crime syndicate, Dawood Ibrahims D-Company organization has been able to create a monopoly controlling the master copies of pirated Bollywood and Hollywood films. First by loan sharking in the film production industry, then moving into film distribution, home video manufacturing and eventually film piracy. The organization became a terrorist one when they conducted the Black Friday Mumbai bombings in which 257 were killed and 713 were injured. They later developed ties with al Qaeda and the Kashmiri terrorist group Lakshar-e-Taiyiba (LeT). This led to Ibrahim being added to the U.S.s terrorist watch list and his assets being frozen. Apparently, Indian officials were well aware of DCompanys piracy operation but did not intervene. It was then in 2005 when U.S. Customs seized a large shipment of counterfeit discs in Virginia and the threat of trade sanctions did their authorities begin cracking down on this pirating outfit. With the tremendous growth in software piracy, comes a corresponding increase in the tools and techniques necessary to catch the wrongdoers. Software piracy can range from using a licensed copy of a program on multiple (sometimes hundreds) computer stations to cracking the security on an eagerly awaited game release, and making it available for download at the same time its being released to retail outlets. The BSA has a website at www.nopiracy.com to enable users to easily report fraud, and maintains the confidentiality of the informant. The company will contact the person to ensure that they get as much information as possible before pursuing the case, and since most informants are disgruntled employees, to make sure that there is a case worth the time and money to pursue:
i

"I was the IT coordinator and questioned higher up why I was installing the same CD on all the computers even though we bought one license," wrote an informant. "[The] response was that [my employer] was too cheap to buy all the licenses." The informant went on to say that "management knew about the issue from Day One and recommended it to save cost. This was

brought up several times among the IT staff and was pushed off, as it was considered no big deal."

The BSA also needs to know the number of computers at the company, and how many software licenses were purchased legally. They will then contact the software vendor to find out if there are, in fact, enough licenses corresponding to the number of PCs. Any documentation the informant may have of meetings, notes and emails regarding the use of the unlicensed software is also used to support the case. Once all the evidence is gathered, a team consisting of employees and attorneys from the BSAs member companies review the case, and decide whether to go forward. The first step is to notify the CEO of the offending company written notice of the allegations, while keeping the informants identity confidential. It requests the company perform an audit of the use of the software in question, and looks to settle out of court, basing the settlement on the retail price of the software. In 2008, the BSA received 2,500 leads, requested 920 audits, went to court in 1 case, and collected $9.5 million in settlements.
ii

Computer games make up a huge part of the pirated software market, and as the hackers or thieves get more sophisticated, law enforcement and developers must find new ways of stopping them. One game developer came up with a unique way of identifying those who are using pirated copies of his game he intentionally inserted an error into the game . Garrys Mod is not a typical game there are no objectives to attain but a game in which the player manipulates and creates objects, called an open world or sandbox physics game. Earlier this year, after one of the game updates, the creator took to Twitter to ask if anyone was unable to shade polygon normals. People responded on Twitter, and on the games forums, saying the game would crash a few seconds after start-up, with the error, Engine Error: Unable to shade polygon normals, followed by a series of numbers in parentheses. What they didnt know was that the error only affected those who were playing pirated copies of the game, and the numbers were used to identify the user accounts and ban them from the game forums.
iii

Obtaining and releasing highly anticipated games in the days before the official release is one of the main goals of software pirates. These suppliers may obtain the software from employees of the software

company, or of the packaging warehouses, by snooping on the companys FTP site, or by obtaining a demo from the company and cracking the demo license & generating a retail license.
iv

A review of

Craigslist postings helped identify a person selling Modern Warfare 2 for Xbox two weeks before the game was to go on sale. The games publisher called in IPCybercrime.com, a firm specializing in online investigations, who contacted the seller and arranged to buy the software. When another Craigslist ad appeared, they were able to use a social networking site to connect the two sellers, who then admitted they had stolen the games from the storage area of a local retail store.
v

Another posting for the game on a piracy forum led investigators to run the email address through Facebook, and got a hit to a profile of a software modder, with a phone number. After several days of negotiation, a deal was made, and the investigators were able to get a business address from the seller. When they looked into the address, it turned out to be a computer business, and the owners teenage son was the prime suspect. The local police department got involved at that point, and set up a sting. The subject was arrested, but not before the game was hacked and leaked on torrent sites.

Microsoft has several labs around the world dedicated to defeating counterfeiters. One of the methods they use to identify the counterfeit software is to match the markings on the rings around the center of the disc with others to trace it back to the source, similar to the way ballistics can match the markings on bullets:
vi

At a crime lab in Dublin, Microsoft's (MSFT) Donal Keating uses a custom-built microscope to take 72 high-resolution images of a counterfeit software disc. Just as police use ballistics to match bullets to a suspect's gun, Keating, the company's senior forensics manager, will use the abrasions and grooves on the stacking ring, a raised ridge around the disc's center, to match it to other fakes. He'll then try to trace the counterfeit disc to the factory and the crime syndicate that produced it. The high-tech probing is part of a campaign by the world's largest software maker to vanquish counterfeiters. Microsoft employs 75 investigators, lawyers, and analystsmany with experience in narcotics and Mafia casesin nine labs around the world. They're armed with maps that help pinpoint where suspect products are bought or seized by law enforcement, software that identifies digital fingerprints on discs, and a program that scours the Web for downloadable fakes. As the worlds largest software producer, Microsoft has lost the largest share of the estimated $10 billion dollars per year in revenue that counterfeiting costs the software industry. By gathering the information on where the fakes originate, they have been able to identify and break up counterfeiting rings worldwide.

Prosecution: Recent cases In a case that began in 2010 file sharer Jammie Thomas-Rasset became the first defendant in a Recording Industry Association of America lawsuit to go to a jury trial. She was found guilty of downloading 24 songs from the music sharing site Kazaa. The history of this case began in 2007 when a judgment of $222,000 being levied against her. That trial was declared a mistrial when the judge revealed he had incorrectly instructed the jury on the law. The second trial resulted in an award of $1.92 million dollars which was reduced to $54,000. The judge then ordered a new trial to be held if the parties could not agree to that amount or settle. Since Thomas lawyers have said they would appeal any decision that they considered excessive damages, a third trial was held. In that trial, the Minnesota Courts jury awarded the RIAA $1.5 million or roughly $62,500 for each of the illegally downloaded songs. Just last month, U.S. District Judge Michael Davis lowered that verdict to $54,000 much to the dismay of the RIAA who maintain that judges do not have the jurisdiction to reduce jury verdicts when it comes to cases involving the Copyright Act. Under the Copyright Act, damages as much as $150,000 per infraction are allowed. The judge cited fairness as his reasoning for reducing the verdict to a mere $2,250 per illegal download. Im sure this wont be the last we hear of this case as an appeal is likely to occur.

The U.S. Department of Justice puts out the latest press releases on Intellectual Property crimes at http://www.cybercrime.gov/ip.html:
vii

August 15, 2011 - MICHIGAN WOMAN SENTENCED TO TWO YEARS IN PRISON FOR SELLING MORE THAN $400,000 IN COUNTERFEIT BUSINESS SOFTWARE: Jacinda Jones, 31, of Ypsilanti, Mich., also was ordered by U.S. District Court Judge David M. Lawson in Detroit to serve three years of supervised release following her prison term and to pay $441,035 in restitution. Jones pleaded guilty on April 20, 2011, to one count of criminal copyright infringement. According to documents filed in court, Jones grossed more than $400,000 between July 2008 and January 2010 by selling over 7,000 copies of pirated business software at discounted prices through the website www.cheapdl.com. The software had a retail value of more than $2 million and was owned by several companies, including Microsoft, Adobe, Intuit and Symantec. Jones activities came to the attention of the U.S. Immigration and Customs Enforcement (ICE) agents, who made several undercover purchases of the pirated business and viii utility software.

June 7, 2011 - Cincinnati Man Pleads Guilty to Selling More Than $1 Million in Counterfeit Tax Preparation Software:

According to court documents, Davis purchased by downloading or on a CD, Quicken and Turbo Tax software manufactured by Intuit Inc., with accompanying labels and packaging that were protected by copyright. Davis copied the original software multiple times to CDs, without permission, and created counterfeit packaging and labeling for the CDs. According to court documents, Davis sold the counterfeit Intuit software on eBay, received payment and then mailed the counterfeit software to the purchaser via the U.S. Postal Service. Within the packaging, Davis sometimes included a false disclaimer claiming that he was merely acting as a broker for another seller. Davis also falsely represented on the online eBay auctions that he was selling original Intuit software, but instead he sold counterfeit Intuit software, usually at prices below ix manufacturers suggested retail price. May 26, 2011 - TWO INDIVIDUALS CONVICTED OF IMPORTING AND SELLING COUNTERFEIT CISCO COMPUTER NETWORKING EQUIPMENT: Zhao and her associates used a number of sophisticated schemes to defraud U.S.-based purchasers through a Virginia-based company called JDC Networking Inc. JDC Networking Inc. altered Cisco products by using pirated software, and created labels and packaging in order to mislead consumers into believing the products it sold were genuine Cisco products. To evade detection, Zhao used various names and addresses in importation documents, and hid millions of dollars of counterfeit proceeds through a web of bank accounts and real estate held in the names x of her family members in China.

Recommendations

The software manufacturers and developers will need to continue to be vigilant and work on building a better mouse trap to combat software piracy. Its hard to ascertain how much financial damage is done to intellectual property with software piracy. The breadth of the impact from terrorist organizations from this venue is unclear but worthy of ongoing surveillance. The efforts by the US and the anti-pirateers have had some success, but there is likely to be more developments in the future. Conclusion/Summary

Software piracy in the US and the world are an ongoing threat. New media and growth of access to and use of the internet will continue to pose challenges. The current US economic malaise cannot be attributed solely to the impact of intellectual property rights violation. Casual attitudes towards piracy in society are a factor in the widespread use of software piracy. Recent court decisions and prosecutions of the more recent US intellectual property acts will work hand in hand with improved anti-piracy tools to help manage this activity in the future.

REFERENCES-Annotated Bibliography

Group 2: Jury Annotated Bibliography

Eighth Annual BSA 2010 Piracy Study, May 2011. In brief. www.bsa.org/globalstudy 1. BSA Survey: Emerging Markets Boost Software Piracy to $59 Billion in 2010s. (2011, May). Wireless News,***[insert pages]***. Retrieved July 29, 2011, from ABI/INFORM Trade & Industry. (Document ID: 2348656141). This article is an executive level summary that shows the scope of software piracy by nation, region, and financial value. It is a snapshot of economic impact and of trends. It summarizes some of the extensive information available from the BSA (Business Software Alliance) website. Quote: The commercial value of PC software piracy leapt 14 percent globally in 2010 to $59 billion. This figure has nearly doubled in real terms since 2003. The driving force behind the trend is piracy in the worlds emerging economies, where the personal computer market is growing fastest. The intended audience is general, particularly the member software manufacturers and researchers interested in statistics about the breadth of global software piracy.

-------------------------------------------------------------------------------------------------------------------------2. PC SOFTWARE PIRACY POSES CHALLENGES TO CYBER SECURITY. (2009). Computer Security Update, 10(6), 3-7. Retrieved from EBSCOhost. The article focuses on the issues concerning increasing computer software piracy which poses challenges to cyber security in the U.S. In the Sixth Annual BSA-IDC Global Software Piracy Study released by the Business Software Alliance (BSA), progress has made in slowing the illegal use of computer software products. However, the progress has declined causing serious challenges to the information technology sector in the U.S. It further states that despite the effort of the U.S. government in battling piracy, its negative impact has gone beyond the software industry as well as in the information technology sector. The United States has the lowest PC software piracy rate in the world, 20 percent. However, it has the largest dollar losses from piracy, $9.1 billion, because it is by far the world's largest software market. Losses have risen steadily in recent years while the piracy rate has hovered around 20-21 percent. Software piracy also increases the risk of cyber crime and security problems. For example, the recent global spread of the Conficker virus has been attributed in part to the lack of automatic security updates for unlicensed software. And in a 2006 study, IDC found that 29 percent of Web sites and 61 percent of peer-to-peer sites offering pirated software tried to infect test computers with "Trojans," spyware, keyloggers, and other tools of identity theft.

Software piracy also lowers tax revenues at a time of increased fiscal pressures on governments worldwide. According to the 2008 IDC study noted above, reducing piracy by 10 points would generate $24 billion in higher government revenues without a tax increase. "The proven 'blueprint' for reducing piracy is a combination of consumer education, strong intellectual property policies, effective law enforcement, and legalization programs by software companies and government agencies," Holleyman said. "The progress seen in so many nations is proof that this anti-piracy strategy works." ----------------------------------------------------------------------------------------------------------------------------- ------3. Bagchi, K., Kirs, P., & Cerveny, R. (2006). GLOBAL SOFTWARE PIRACY: CAN ECONOMIC FACTORS ALONE EXPLAIN THE TREND?. Communications of the ACM, 49(6), 70-75. Retrieved from EBSCOhost. This article searches for the reasons behind global software piracy. It states the 4 most common causes are assumed to be economic factors, regulatory factors, technical factors, and social/cultural factors. The analysis determines that economic factors are not a key factor alone. Internet use growth rate does not predict rises in piracy until after 2003; at this time, the increase in internet growth correlated with an increase in piracy. The implication is that in order for piracy rates to decrease there must not only be a change in economic conditions, but also in societal structure and attitudes. Attitudes about copying also play a major role in piracy. Unlike countries such as the U.S., where copying is generally equated with cheating, copying is often viewed a cultural exercise, not an immoral practice, in many Asian nations. Asian art students are required to diligently copy the work of masters as an exercise in learning. Success is measured by the similarity of the copy to the original. Copyright laws are not well understood or even recognized in many of these nations [10]. Even in developed Western nations, some people believe that pirating software is not wrong. The example of piracy in the music industry is worth noting in this context; many U.S. citizens who could otherwise buy a copy of a popular music CD regularly downloaded pirated music from sites such as Napster and Kaaza [3]. Since the price of a CD is frequently considered exorbitant relative to the cost of producing one, individuals in many uncertainty-embracing nations may feel that the injustices inflicted by the manufacturers justify piracy.

-------------------------------------------------------------------------------------------------------------- ---------------4. Bsa.org The Business Software Alliance (http://www.bsa.org) is the voice of the world's commercial software industry and its hardware partners before governments and in the international marketplace

This web page is a premiere source of information and publishes annual reports on piracy. It offers education and rewards for identifying software pirates.

5. Hess, Gregory M. "Combating Online Software Piracy." Journal of Internet Commerce 2.3 (2003): 3. Business Source Complete. EBSCO. Web. 3 Aug. 2011. To combat software piracy, a three prong approach of 1) monitoring online software activities, 2) preserve evidence and 3) take action.

6. Piracy of Digital Content - Scorpecci, Danny Stryszowski, Piotr

What drives digital piracy, and the steps which can be taken to combat it. Focuses more on the social aspects of piracy, and the attitudes which foster its growth. Even if consumers involved in digital piracy are generally aware that it is illegal, it is not always perceived as un-ethical, so continued emphasis should be placed on education and consumer awareness to overcome this perception. Industry and some governments have instituted extensive campaigns toward this end, and these actions can be paralleled with enforcement campaigns to reduce the likelihood of piracy. Scorpecci, D., & Stryszowski, P. (2009). Piracy of Digital Content. Paris, France: Organisation for Economic Cooperation and Development (OECD).p 12. http://site.ebrary.com/lib/empire/Doc?id=10326185&ppg=14 Copyright 2009. Organisation for Economic Cooperation and Development (OECD). All rights reserved.

7. Microsoft Crosses Swords with Pirates Describes the use of computer forensics by Microsoft to identify counterfeit software discs and the organization responsible for producing them. Bass, D.. (2010, July). Microsoft Crosses Swords with Pirates. Business Week,1. Retrieved August 5, 2011, from ABI/INFORM Global. (Document ID: 2094511861). http://www.businessweek.com/magazine/content/10_31/b4189040984263.htm?chan=magazine+channel _news+-+technology

8. Software Piracy Exposed This book dives into the unique world of software piracy. It explores the personalities and motivations of those behind much of the illegal software distribution on the Internet. Pauls aggressive investigation and reporting of this world allowed him to explore the inner depths of the software piracy scene and gained him exclusive interviews with some of the most notorious individuals in the scene. Throughout the course of his year-long investigation, Paul sought out the individuals behind this highly organized collection of individuals who somehow flew under most of the publics radar. Everyone seems to know about P2P networks, but few are familiar with top sites, couriers, and other aspects of the software piracy scene. Craig, P., & Honick, R. (2005). Software Piracy Exposed. Rockland, MA: Syngress Publishing, Inc.

9. No Electronic Theft act (NET) was first used in the 1990s against the pirate warez group Pirates With Attitude (PWA). P 186-88 and the Operation Buccaneer are some of the early federal cases against pirates, followed by Operation Fastlink. Politics. Inter@ctive Week [serial online]. November 2, 1998;5(43):52. Available from: Academic Search Complete, Ipswich, MA. Accessed August 6, 2011. President Clinton last week signed into law a bill designed to protect copyrighted material from the increased threat of piracy posed by advances in digital technology. Called tile Digital Millennium Copyright Act, the bill is based on treaties by the World Intellectual Property Organization (www.wipo.org). Thirteen people have been arrested and more were expected to be arrested in the breakup of an Internet child pornography ring that reached across two oceans. Participants called themselves "faculty members" at "Pedo University" and used nicknames in trading information, pictures and videos of children 13 and younger engaged in sexual activity, said New York State Attorney General Dennis Vacco and State Police Chief James McMahon. The U.S. Securities and Exchange Commission (www.sec.gov) charged 44 stock promoters with Internet securities fraud in 23 cases, the federal regulator said last week. The crackdown hit authors of spare, or junk e-mail, online newsletters, message-board postings and Web site operators. Clinton W. Executive Order 13103--computer software piracy. Weekly Compilation of Presidential Documents [serial online]. October 5, 1998;34(40):1941. Available from: Academic Search Complete, Ipswich, MA. Accessed August 6, 2011. The United States Government is the world's largest purchaser of computer-related services and equipment, purchasing more than $20 billion annually. At a time when a critical component in discussions with our international trading partners concerns their efforts to combat piracy of computer software and other intellectual property, it is incumbent on the United States to ensure that its own practices as a purchaser and user of computer software are beyond reproach. Accordingly, by the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1. Policy. It shall be the policy of the United States Government that each executive agency shall work diligently to prevent and combat computer software piracy in order to give effect to copyrights associated with computer software by observing the relevant provisions of international agreements in effect in the United States, including applicable provisions of the World Trade Organization Agreement on Trade-Related Aspects of Intellectual Property Rights, the Berne Convention for the Protection of Literary and Artistic Works, and relevant provisions of Federal law, including the Copyright Act. (a) Each agency shall adopt procedures to ensure that the agency does not acquire, re produce, distribute, or transmit computer software in violation of applicable copyright laws. (b) Each agency shall establish procedures to ensure that the agency has present on its computers and uses only computer software not in violation of applicable copyright laws. These procedures may include: (1) preparing agency inventories of the software present on its computers; (2) determining what computer software the agency has the authorization to use; and

(3) developing and maintaining adequate recordkeeping systems. (c) Contractors and recipients of Federal financial assistance, including recipients of grants and loan guarantee assistance, should have appropriate systems and controls in place to ensure that Federal funds are not used to acquire, operate, or maintain computer software in violation of applicable copyright laws. If agencies become aware that contractors or recipients are using Federal funds to acquire, operate, or maintain computer software in violation of copyright laws and determine that such actions of the contractors or recipients may affect the integrity of the agency's contracting and Federal financial assistance processes, agencies shall take such measures, including the use of certifications or written assurances, as the agency head deems appropriate and consistent with the requirements of law. (d) Executive agencies shall cooperate fully in implementing this order and shall share information as appropriate that may be useful in combating the use of compute software in violation of applicable copyright laws. -----------10. Burke L. THE UNITED STATES TAKES CENTER STAGE IN THE INTERNATIONAL FIGHT AGAINST ONLINE PIRACY & COUNTERFEITING. Houston Journal of International Law [serial online]. Fall2010 2010;33(1):227-233. Available from: Academic Search Complete, Ipswich, MA. Accessed August 6, 2011. -------------------http://www-cs-faculty.stanford.edu/~eroberts/cs181/projects/software-piracy/government.html Partly due to the lobbying of major software producers, like Microsoft and Adobe, the government has began cracking down on software piracy. The Clinton/Gore administration, in particular, has been very adamant about protecting the rights of software manufacturers and distributors, and have enacted laws that proscribe harsh penalties for those who infringe on software copyrights. Senate Bill S893 Signed by President Bush in October 1992, the bill elevated software piracy from a misdemeanor to a felony, if 10 or more illegal copies of software are made within a six-month period, and if the copies are worth a total value of over $2,500. The first offense is punishable by five years in prison and a fine of $250,000. The second offense is punishable by up to 10 years in prison. United States Copyright Act Holds someone guilty of illegal reproduction of software subject to civil damages of up to $100,000 per title infringed, and criminal penalties, including fines of as much as $250,000 per title infringed and imprisonment of up to five years. No Electronic Theft Act The NET Act made criminal the willful infringement of copyrighted works, specifically by electronic means, even when the infringing party derives no direct financial benefit from the infringement. Through this act, somebody who made copies of software and distributed them through a web site, for example, was now liable for damages. If the copyrighted works copied had a total retail value of over $1,000, the infringing party could be imprisoned for up to to 6 years. International Agreements

The U.S. government is committed to fighting software piracy abroad as well. In 1991, a Special 301 investigation under the U.S. Trade Act of 1974 found that the Chinese government has been lax in enforcing software copyright laws. In January 1992, a Memorandum of Understanding was signed by China, in which it pledged to strengthen its principal intellectual property laws, and to treat software as literary work. In 1994, an investigation found that the intellectual property practices in China were especially "onerous and egregious," leading to the United States threatening China with trade sanctions. The United States has taken a firm stance and has made it clear that it will impose trade sanctions against countries which do not take steps to eliminate software piracy. Digital Millenium Copyright Act The DMCA is the most comprehensive reform of the copyright law in the U.S. in a generation. One of the highlights of DMCA is to make it a crime to circumvent anti-piracy measures built into most commercial software. The Act also outlaws the manufacture, sale, or distribution of code-cracking devices used to illegally copy software. http://www.copyright.gov/newsnet/2008/354.html Prioritizing Resources and Organization for Intellectual Property Act Becomes Public Law 110-403 On October 13, 2008, the President signed the Prioritizing Resources and Organization for Intellectual Property Act into law (Pub. L. 110-403) (the PRO-IP Act). The new statute strengthens the intellectual property laws of the United States in several respects. For example, it amends Section 410 of the Copyright Act to codify the doctrine of fraud on the Copyright Office in the registration process. The law also clarifies that registration is not a prerequisite for a criminal copyright prosecution and makes it unlawful (civilly or criminally) to export unauthorized copies of protected works, including copies of phonorecords, from the United States. In addition, the law amends Section 506 of the Copyright Act to provide for the forfeiture of any property used to commit or facilitate the commission of a criminal offense involving copyrighted works. The Act creates a new enforcement paradigm for the federal governments efforts to combat counterfeiting and piracy. For example, it creates an Intellectual Property Enforcement Coordinator (IPEC) within the Executive Office of the President. This office would be primarily responsible for developing and implementing a Joint Strategic Plan against counterfeiting and piracy and the coordinator would serve as a principal advisor to the President on domestic and international intellectual property enforcement policy. The Act also provides for improved investigative and forensic resources for enforcement of laws related to intellectual property crimes and allocates additional funding for resources to investigate and prosecute intellectual property crimes and other criminal activity involving computers. 11. Feds Crack Software Piracy Rings Two-year probe targeted international groups illegally distributing software, games, and movies online. By Todd R. Weiss, Computerworld Dec 13, 2001 10:00 am

A two-year federal investigation into international software piracy over the Internet culminated earlier this week in the serving of more than 100 search warrants against suspects allegedly involved in piracy syndicates. In an announcement, the U.S. Department of Justice says three separate federal investigations over the past two years had targeted international groups that illegally distributed pirated

software, games, and movies, as well as individuals and groups who had illegal access to computer systems and distribution networks. "Today, U.S. law enforcement initiated the most aggressive enforcement action to date against illegal software piracy," says Attorney General John Ashcroft, in the statement. "Many of these individuals and groups believed the digital age and the Internet allowed them to operate without fear of detection or criminal sanction. Today, law enforcement in the U.S. and around the world proved them wrong." The targets of the three operations included both individuals and organizations known as "Warez" groups that operate in the U.S. and around the world. Warez groups specialize in the illegal distribution over the Internet of copyrighted software programs, computer games, and movies. Additional suspects are expected to be identified and targeted, the government says. Bob Kruger, vice president of enforcement for the Business Software Alliance, a Washington, D.C.-based antipiracy industry watchdog group, says the federal actions marked a "banner day" in the fight against software theft. "We do view this as probably the most extensive and aggressive law enforcement action to date against software piracy," Kruger says. Three Campaigns The three operations were as follows: Operation Buccaneer, a one-year investigation by the U.S. Customs Service and the Justice Department's Computer Crime and Intellectual Property section, working in conjunction with the U.S. Attorney for the Eastern District of Virginia. Buccaneer involved the simultaneous execution of 58 search warrants against high-level Warez leadership and members around the world. Included in the targets is the piracy group called DrinkOrDie, which is made up of about 40 members worldwide. The groups decode antipiracy measures in software and release the code on the Internet before or at the time of a new product's launch, causing losses for software companies. The U.S. worked with authorities in the U.K., Australia, Norway, and Finland in the investigation. Operation Bandwidth, a two-year effort to identify and prosecute groups and individuals involved with illegal access to computer systems and the piracy of proprietary software using Warez storage sites on the Internet. The investigation involved the Defense Criminal Investigative Service, the Environmental Protection Agency Office of the Inspector General and the Federal Bureau of Investigation. The groups, along with the Nevada U.S. Attorney's Office, created an undercover Warez site as part of the investigation, which was used to transfer more than 100,000 pirated files, including more than 12,000 separate software programs, movies, and games. More than 200 suspects participated in the piracy efforts at the undercover site. Thousands of copies of pirated software will be removed from circulation because of the sting, as well as computer hardware seized by authorities. Operation Digital Piratez, a yearlong effort by the FBI and the New Hampshire U.S. Attorney's Office to infiltrate several Warez distribution organizations, including "cracking groups" specifically created for the purpose of pirating software so that it may be distributed over the Internet in violation of U.S. copyright laws. http://www.whitehouse.gov/blog/2011/06/20/fighting-worldwide-counterfeiting-requires-internationalcooperation

As part of the U.S. Governments efforts to create jobs for American workers and increase U.S. exports to overseas markets, I recently travelled to Europe to press for greater cooperation in fighting intellectual property theft overseas, which hurts innovators and brands here in America. Counterfeiting and piracy is a global crime, and it requires a global solution. At the World Copyright Congress in Brussels, I spoke about the need to work with foreign governments and the private sector to stop criminals who attempt to evade intellectual property laws by operating overseas. In Brussels, I met with members of the European Commission and European Parliament, as well as American businesses. In London, I met with members of UKs Parliament and the UK IP Crime Group, a group of enforcement agencies and industry groups which seek a collaborative approach to fighting intellectual property crime. This collaborative approach, working with the private sector, is something that my office has been engaged in here in the U.S. Over the last several months, my office has been working closely with Internet Service Providers, advertisers, credit card companies, payment processors, search engines, domain name registrars and registries taking voluntary action against online piracy. These private-sector companies, as well as foreign governments, recognize that we all have a stake in maintaining a safe and secure global marketplace. I welcome their cooperation and will continue to engage with them as we fight worldwide counterfeiting together. Victoria Espinel is the U.S. Intellectual Property Enforcement Coordinator. ------------12. Cass S. Patrolling the Web for Pirated Content. Technology Review [serial online]. January 2010;113(1):63. Available from: MasterFILE Premier, Ipswich, MA. Accessed August 6, 2011. Case Study with company Attributor and the MDCA. Attributor was founded in 2005 to find unauthorized uses of the clients copyrighted works on the internet, so that the work can be taken down or properly attributed. 13. Gregor Urbas. (2006). Cross-national investigation and prosecution of intellectual property crimes: the example of "Operation Buccaneer". Crime, Law and Social Change, 46(4-5), 207-221. Retrieved August 6, 2011, from Law Module. (Document ID: 1255296681). Operation Buccaneer was the name given to a law enforcement operation against DrinkOrDie, a highly organised but globally dispersed Internet-based software piracy group. The concerted enforcement action, led by the US Customs Service and Department of Justice, extended to several European countries and Australia. This paper contrasts the legal consequences that flowed, with numerous suspects pleading guilty in the United States, some contested prosecutions in the United Kingdom, and a sole Australian suspect facing extradition to the United States to face charges. Operation Buccaneer illustrates the cross-national reach of both Internet-based intellectual property crime and the law enforcement response, as well as some of the complexities that arise in applying jurisdictional concepts such as the double criminality requirement for extradition in this evolving prosecutorial landscape. 14. RIAA - Recording Industry Association of America - April 10, 2011, http://www.riaa.com/ The RIAA is the industry that is most concerned and vocal when it comes to piracy in the music industry. The RIAA website details the effects and consequences with regards to piracy. Contained within this article are the statistics of how piracy negatively impacts the recording industry. This website is relevant in my research because it contains the facts of information that will help me prove the effects of piracy in the music industry.

15. Pruitt, Scarlet. MPAA: Movie Piracy is the New Plague. PC World. 9 July 2004. 1 April 2011. <http://www.pcworld.com/article/116842/mpaa_movie_piracy_is_the_new_plague.html> This article outlines the increasing trend in peoples use of the internet or other options in order to illegally watch movies. It contrasts the effect of rising ticket prices on the consumers that actually go to the movies and spend the money versus going on the internet and downloading or streaming movies. It identifies the worrying trends that the movie industry is facing and the estimated effects that these trends will have on movies. 16. Sandoval, Greg. Feds raise questions about big medias piracy claims. C-Net News. 12 April 2010. 1 April 2011. <http://news.cnet.com/8301-31001_3-20002304-261.html>. The purpose of this article details the government study of piracy and compares it to claims that were made by the various media regarding the actual effects of piracy in terms of costs and damages. The finding by the Government Accountability Office questions how the media actually came up with the costs and damages that piracy has on the industry. The Government Accountability Office had also stated that there was a possibility that piracy did not effect to the economy as badly as thought by media industry and the consensus is that more investigation is needed as more questions needed to be addressed. 17. James D. Torr. "Introduction." At Issue: Internet Piracy. Ed. James D. Torr. San Diego: Greenhaven Press, 2005. August 2004. 2 April 2011. <http://www.enotes.com/internet-piracyarticle/54083>. This article examines piracy and the media including its history and how piracy of media became about, beginning with VHS and tapes. It also does a good job of defining piracy in all its form as well as gives a look in the evolution of piracy software programs on the internet and their effects. It looks at how the ways the MPAA and RIAA are trying to fight piracy as well as what those individuals who copy media are using as their rationale when it comes to the court systems and prosecution. Sources: Treverton, G.F., & Matthies, C., & Cunningham, K.J., & Goulka, J., & Ridgeway, G., & Wong, A. (2009) Film Piracy, Organized Crime, and Terrorism. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG742.pdf Kavets, D. (2009 March 3). Hollywood-Funded Study Concludes Piracy Fosters Terrorism. [Supplemental Material] Wired.com. Retrieved from http://www.wired.com/threatlevel/2009/03/hollywood-funde/ Gralla, P. (2008, April 2). Seeing through windows [Web log post]. Retrieved from http://blogs.computerworld.com/feds_lie_about_link_between_software_piracy_and_terrorism Kravets, D. (2011, July 22). RIAA Litigation [Web log post]. Retrieved from http://www.wired.com/threatlevel/category/riaa-litigation/ Sources:

King, J. (2009, September 14). Gotcha! Pursuing software pirates. Retrieved August 20, 2011, from Computerworld: http://www.computerworld.com/s/article/print/342035/Gotcha_Pursuing_software_pirates?
ii

King, J. (2009, September 14). Gotcha! Pursuing software pirates. Retrieved August 20, 2011, from Computerworld: http://www.computerworld.com/s/article/print/342035/Gotcha_Pursuing_software_pirates?
iii

Garrys Mod catches pirates the fun way. (2011, April 12). Retrieved August 20, 2011, from www.gamepron.com: http://www.gamepron.com/news/2011/04/12/garrys-mod-catches-pirates-the-fun-way/

iv

Craig, P., Honick, R., & Burnett, M. (2005). Software Piracy Exposed. Rockland, MA: Syngress Publishing, Inc.

Takahashi, D. (2009, November 6). How investigators tracked down a Modern Warfare 2 cyber pirate. Retrieved August 20, 2011, from Venturebeat.com: http://venturebeat.com/2009/11/06/how-investigators-tracked-down-amodern-warfare-2-cyber-thief/
vi

Bass, D. (2010, July 22). Microsoft Crosses Swords with Pirates. Retrieved August 20, 2011, from Bloomberg Businessweek: http://www.businessweek.com/magazine/content/10_31/b4189040984263.htm
vii

U.S. Department of Justice. (n.d.). Computer Crime & Intellectual Property Section. Retrieved August 23, 2011, from United States Department of Justice: http://www.cybercrime.gov/ip.html
viii

U.S. Department of Justice. (2011, August 15). http://www.cybercrime.gov/jonesSent.pdf. Retrieved August 23, 2011, from Cybercrime.gov: http://www.cybercrime.gov/jonesSent.pdf
ix

The United States Attorney's Office. (2011, June 7). http://www.cybercrime.gov/davisPlea.pdf. Retrieved August 23, 2011, from Cybercrime.gov: http://www.cybercrime.gov/davisPlea.pdf
x

The United States Attorney's Office. (2011, May 26). http://www.cybercrime.gov/zhaoConvicted.pdf. Retrieved August 23, 2011, from Cybercrime.gov: http://www.cybercrime.gov/zhaoConvicted.pdf

Anda mungkin juga menyukai