1126 lines
59 KiB
Plaintext
1126 lines
59 KiB
Plaintext
|
||
|
||
|
||
Software Piracy in the Information Age
|
||
|
||
|
||
|
||
|
||
Index
|
||
|
||
1. Introduction
|
||
2. Software piracy methods
|
||
3. Small scale piracy methods
|
||
4. Large scale piracy methods
|
||
4.1. BBS
|
||
4.2. Internet
|
||
4.3. IRC
|
||
FTP offers
|
||
Trading
|
||
Offerbots
|
||
4.4. Ftp sites
|
||
4.5. Usenet
|
||
4.6. Email
|
||
4.7. WWW
|
||
5. Commercial piracy
|
||
5.1. CDR
|
||
6. Copyprotection
|
||
6.1. Hardware protection
|
||
6.2. Software protection
|
||
Serials
|
||
CD-keys
|
||
Manual check
|
||
Registration
|
||
Limiting installations
|
||
Certificates
|
||
7. Anti-piracy organizations
|
||
7.1. Legal measures
|
||
7.2. Corporate audits
|
||
7.3. Contacting anti-piracy organizations
|
||
7.4. Education
|
||
7.5. Economics
|
||
8. Conclusion
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
1. Introduction
|
||
|
||
In today’s rapidly changing world of advanced technology, computers and the
|
||
software to run them have become integral parts of our society. The relative
|
||
leap in recent technology has contributed to a boom in the sales and general use
|
||
of computers. This is also due in no small part to the birth and growth of the
|
||
Internet. A virtual world of entertainment and technology is now available at
|
||
the fingertips of the average person. Once the domain of programmers and serious
|
||
users, the Internet has opened the door to anyone with the slightest interest.
|
||
The spread of home computing and the parallel growth in the business world has
|
||
resulted in booming software industry. However, along with the spread of
|
||
software has come a significant proliferation of software piracy. The issue of
|
||
software piracy, the illegal copying or duplication of software, is rapidly
|
||
growing in importance. As the software market continues to grow, so does the
|
||
demand for stolen software. The issue of software piracy can be described on two
|
||
levels, akin to the two stages of software: development and the end product. The
|
||
protection of software at the developmental level can be very complex with many
|
||
individual issues. Many of these issues are as yet unresolved and yet to be
|
||
decided in a court of law. We will concentrate on the latter stage of software
|
||
development, the end product. In order to gain a firm grasp on the subject, we
|
||
will first define piracy, including the legal, monetary and ethical issues. We
|
||
will then move on to the methods of software theft breaking them down into small
|
||
and large-scale components. From there we will examine the protection of
|
||
software through both industrial and legal means. Finally, we will deal with the
|
||
social and ethical implications of software piracy in our society.
|
||
|
||
Software piracy, precisely defined, is the unauthorized use, duplication or
|
||
theft of software. In the past decade software theft has become a very serious
|
||
problem. With the exponential increase in the consumer market for computers and
|
||
software, the demand for black market, or stolen software has skyrocketed.
|
||
Conservative analysis conducted by the Software Publisher’s Association
|
||
estimated lost revenue due to software piracy in the U.S. alone came to $1.05
|
||
billion in 1994. This was approximately 25% of a $4.2 billion market. These
|
||
figures only account for the business market. The size of the consumer market
|
||
reached 1.3 billion in that same year. While the exact size of consumer piracy
|
||
is unknown, we can safely assume that it constitutes a large portion of the
|
||
losses to the software industry. These domestic problems pale with comparison to
|
||
those present in international markets, where the estimated piracy rate is close
|
||
to 49% or $8 billion. This economic impact threatens to impede the development
|
||
of new software products and the availability of current ones. This problem
|
||
affects everyone, from the software publishers to the legitimate user. The
|
||
continued loss to the software industry could have harmful implications to the
|
||
future of software development. In order to protect the economic viability of
|
||
the software industry, laws have been enacted to protect software companies and
|
||
their products.
|
||
|
||
The protection of computer software under the law has gone through significant
|
||
changes in recent years. The first attempt to protect software and its
|
||
developers was made in the late 1960’s. Software was officially recognized by
|
||
the United States Copyright Office as a form of literary expression and hence
|
||
protected under copyright laws. The most comprehensive protection legislation in
|
||
this area was made in the Copyright Act of 1976. This act gave a sharper
|
||
definition of software and its development and provided more firm guidelines as
|
||
to its protection. Amendments in 1980 brought this act more in line with
|
||
advances in technology. According to Title 17 of the US code, it is illegal to
|
||
make or distribute copies of copyrighted material without authorization. The
|
||
only exception was made in the user’s right to make a single backup copy for
|
||
archival purposes. In 1990 Congress approved the Software Rental Amendments Act
|
||
which prohibits the commercial rental, leasing, or lending of software without
|
||
the express written permission of the copyright holder. Individuals are allowed
|
||
to possess the original software program and one backup copy for their personal
|
||
use. No other copies are to be made without specific authorization from the
|
||
copyright owner. In late 1992, Congress passed an amendment to Title 18 of US
|
||
code, instituting criminal penalties for copyright infringement of software. The
|
||
penalties include imprisonment of up to five years, fines up to $250,000, or
|
||
both, for unauthorized reproduction or distribution of 10 or more copies of
|
||
software with a total retail value exceeding $2500. As we’ll see below these
|
||
laws these laws, in practice, have relatively little power in the prevention of
|
||
software piracy.
|
||
|
||
In order to understand the ethical implications of software piracy, it is
|
||
necessary to outline the basic principles of ethics that apply to the
|
||
engineering industry. These principles can be separated into six categories: 1.
|
||
Loyalty, 2. Truth, honesty, and trustworthiness, 3. Respect for human life and
|
||
welfare (including posterity), 4. Fair Play, 5. Openness, and 6. Competence. Any
|
||
participation in the illegal duplication of software is in direct contradiction
|
||
to the principles of truth, honesty and trustworthiness. From there it becomes
|
||
more difficult to derive conflicts with the basic ethical principles. The theft
|
||
of software can be said to conflict with the fourth and fifth basic ethical
|
||
principle, fair play and openness, respectively. In purchasing a piece of
|
||
software, you are entering into a tacit agreement with the producer, that you
|
||
will respect the law and his rights. In duplicating that software, you are
|
||
breaking that contract and the confidence of the supplier. Thus, you are
|
||
violating the right of fair play with that person and in turn your openness to
|
||
comply with the agreement. Finally, a farther analogy can be drawn to the
|
||
engineer’s responsibility to respect the community around him. The act of
|
||
breaking the law is indicative of total disregard for the structure of the
|
||
society and the laws that bind it. This in turn shows little regard for the
|
||
individuals within that society. In summary, software piracy has serious ethical
|
||
implications for the engineer that in turn can be extended to the average user.
|
||
|
||
|
||
|
||
2. Software piracy methods
|
||
|
||
The methods by which software is pirated can be small scale and large scale. The
|
||
small-scale methods include user-to-user sharing and user group sharing. The
|
||
large scale methods include software rental and compact disk manufacturing.
|
||
|
||
|
||
|
||
3. Small scale piracy
|
||
|
||
Small-scale piracy can be defined as piracy without financial motives. The
|
||
people and organizations that are involved in small-scale piracy are usually
|
||
trying to get software for personal use, or are looking for fame by distributing
|
||
software faster than others. There are many methods involved in distributing
|
||
software without profit. These include user-to-user copying and user group
|
||
sharing, and each of those can be performed in a variety of ways.
|
||
|
||
Perhaps the most common way that people copy software is by sharing it with
|
||
those around them. A friend or coworker tells you "Oh, I got such a great
|
||
program yesterday". You’re intrigued, and ask for a copy. He then gives you the
|
||
floppy disks, you install the program and return it the next day. Simple, quick,
|
||
no harm done you don’t see a problem with this. What you don’t realize is that
|
||
what you’ve done was in fact copyright infringement, and the software company
|
||
can now sue you and your friend for damages.
|
||
|
||
Borrowing diskettes or CD-ROMs is not the only way that people can share
|
||
commercial software. Making copies and mailing it to your friend, posting a copy
|
||
of the disks on your private FTP site, emailing an archived file all are ways
|
||
that you can make that great program reach your friend, relative, coworker,
|
||
boss. Perhaps you are doing this as a personal favor, or perhaps you feel that
|
||
they won’t afford it, or you’re doing this to show off your assets. Either way,
|
||
you’re breaking the law.
|
||
|
||
User-to-user copying has some other implications, the most important of which is
|
||
economic. Say that you purchase some software and let five of your friends copy
|
||
it. Each of them, in turn, will let five of their friends copy the software as
|
||
well. After only three such cycles, over 125 people have this software. This is
|
||
incredible exponential growth. Consider the impact on the software developers of
|
||
only one such pirated program. In our scenario, the company receives only
|
||
1/125th of their expected profits.
|
||
|
||
An original software purchaser has to consider many issues. First, although
|
||
there was no intent to defraud the software company, it is an inevitable result.
|
||
Second, the copy that these other people now have on their computers usually has
|
||
the purchaser’s name and/or serial number. Thus, if any of those people are
|
||
caught pirating software, it will be traced back to the original purchaser.
|
||
|
||
|
||
|
||
4. Large scale piracy
|
||
|
||
A much more serious type of piracy is called User Group Sharing. Here, there
|
||
exists an organized method for distributing commercial software to many people
|
||
at once. Some of these methods include Bulletin Board System Distribution, the
|
||
Internet, Internet Relay Chat, File Transfer Protocol, Newsgroups, electronic
|
||
mail, and the World Wide Web.
|
||
|
||
|
||
|
||
4.1. BBS
|
||
|
||
A Bulletin Board System (BBS) is a small-scale electronic online service that is
|
||
run from a personal computer. Anyone with a Personal Computer and a modem can
|
||
connect to a BBS and participate in the services that it offers. Even though
|
||
BBSs were much more popular before the acceptance of the Internet as a mass
|
||
communication tool, there are still about 50,000 of them in operation. Most
|
||
software and hardware companies keep their own BBSs to permit people from around
|
||
the world to download software updates of fixes or to get the latest drivers.
|
||
The majority of Bulletin Boards are, however, user-run and located on someone’s
|
||
home personal computers.
|
||
|
||
The personal BBS are easy to setup and maintain, and are not financially
|
||
unbearable. Most of them require a dedicated computer system running special BBS
|
||
software, several modems, and a few phone lines. The person who operates a
|
||
Bulletin Board is often called the Sysop (short for System Operator). BBSs
|
||
differ in many areas. Some offer membership on a fee-based basis, others are
|
||
free for everyone, still others are by invitation only. The personal BBSs
|
||
usually pick a central theme around which they tailor most of their services.
|
||
Examples include music-oriented systems, systems dedicated to the Creation
|
||
theory of biological development, or systems computer programming. Some Sysops
|
||
decide to allow for, or center their BBSs around piracy.
|
||
|
||
The pirate BBSs (or "elite" systems, as they are often known as in the pirate
|
||
community) range from those that are casually "elite" to those that specialize
|
||
in pirated software. The casually "elite" systems are those where the Sysop is
|
||
(by negligence or on purpose) indifferent to the contents of files being
|
||
exchanged in the "file transfer" area of the system. These systems usually
|
||
specialize in other subjects, and piracy remains one of their unmentioned
|
||
features.
|
||
|
||
The specifically-pirate BBSs usually specialize even further. There are
|
||
general-purpose systems, where users are encouraged to upload any commercial
|
||
software that they might have access to. Other systems are more selective, and
|
||
require that the software has to be new (within three months of its release,
|
||
within a month, a week, two days, or sometimes even before release) or that the
|
||
software has to be of a certain type (games, application software, productivity
|
||
utilities, etc.). These BBSs usually require some sort of referral or
|
||
authentication before they will accept a user. This consists of new user
|
||
passwords (which must be received personally from current members), referrals
|
||
(where when applying for membership, one must tell the Sysop names of some other
|
||
current members who will vouch the new user), and payment of memberships. Most
|
||
of these safeguards are in place to serve two purposes to keep software
|
||
"quality" high, and to prevent detection.
|
||
|
||
People on these "elite" Bulletin Boards range from people looking for software
|
||
to download, to those who are seeking to promote their piracy group by uploading
|
||
the greatest number of files. Most of the people on these systems know well what
|
||
they’re doing is illegal, and most Sysops take great care to warn all users
|
||
about potential FBI crackdowns. These are always expected, even though they
|
||
happen very rarely. Most claims that "such-and-such BBS got shutdown" often
|
||
heard on elite BBSs are invalid. Over time, Sysops have come up with preventive
|
||
measures designed to clear the Sysop of responsibility in case of a crackdown.
|
||
These usually consist of short warnings stating that copying commercial software
|
||
is illegal, and that the user is breaking the law by downloading a file. Another
|
||
attempt is to masquerade as non-profit libraries and make use of special
|
||
exemptions that are allocated to these libraries. Carefully-worded notices warn
|
||
users that they may "rent" the software from a BBS for a period of 24 hours (or
|
||
some similar period of time), after which they must destroy the copy. This has
|
||
the appearance of a legal operation (to be discussed separately later), however
|
||
BBSs most often do not have a state-recognized non-profit operations license and
|
||
are thus not non-profit libraries. The checkout warnings are nothing but ways to
|
||
make users feel that they are participating in a legitimate activity and protect
|
||
the Sysops.
|
||
|
||
The law and pirate Bulletin Boards have rarely met. The combination of laws used
|
||
to persecute Sysops allows for loopholes for Sysops who do not charge for access
|
||
to the BBSs. The 1994 case of USA vs. David LaMacchia set a precedent, which has
|
||
not so far been challenged. In the case, an undergraduate student at the
|
||
Massachusetts Institute of Technology (MIT) set up and operated an open
|
||
Internet-based BBS for the period of over a month. The court ruled, however,
|
||
that under current laws, it was impossible to prosecute the defendant. The judge
|
||
stated that the government’s "interpretation of the wire fraud statute would
|
||
serve to criminalize the conduct of not only persons like LaMacchia, but also
|
||
the myriad of home computer users who succumb to the temptation to copy even a
|
||
single software program for private use"
|
||
[http://swissnet.ai.mit.edu/dldf/dismiss-order.html]. As a side note, the judge
|
||
noted that he hoped for stricter laws, which would permit persecution of
|
||
non-profit system operators. The decision for this case was based partially on
|
||
an earlier interstate mail fraud case, which was not connected to software in
|
||
any way.
|
||
|
||
In March of 1995, the US District Court for Massachusetts sentenced a BBS Sysop
|
||
Richard Kenadek to 24 months probation with 6 months home confinement. Kenadek
|
||
was an operator of the "Davy Jones Locker" bulletin board from his private
|
||
residence. After an FBI raid, he pleaded guilty to criminal copyright
|
||
infringement for using his BBS for the "unauthorized distribution of copyrighted
|
||
software for financial gain." The key in this plea is the phrase "for financial
|
||
gain". As soon as money changes hands, the activity can be considered criminal
|
||
and judged accordingly. This case was the first time that a bulletin board
|
||
operator was charged under the criminal statute of the copyright law, according
|
||
to Sandra A. Sellers, the SPA director of Litigation.
|
||
|
||
Bulletin Board Systems, though rapidly losing popularity, continue to be
|
||
significant sources of piracy. The relative inexpensiveness of running a BBS
|
||
combined with the ease of electronic software transport quickly breed piracy.
|
||
Anti-piracy efforts are hindered by the system operators’ altruistic way of
|
||
running these bulletin boards. US laws currently only apply to for-profit
|
||
ventures. Still, efforts in curbing BBS piracy are expanding, and as new laws
|
||
are created more lawsuits will begin to appear where system operators become
|
||
responsible for their systems’ contents.
|
||
|
||
|
||
|
||
4.2. Internet
|
||
|
||
The Internet became a major channel for illegally distributing copyrighted
|
||
software only in the last decade. Five main methods for Internet distribution
|
||
that will be examined are the Internet Relay Chat (IRC), File Transfer Protocol
|
||
(FTP), Internet newsgroups (USENET), Electronic messaging (Email), and the World
|
||
Wide Web (WWW). Each of the four has different characteristics, and involves a
|
||
different method for transmitting the software from the distributor to the user.
|
||
|
||
Of all the methods for obtaining large amounts of pirated software, the Internet
|
||
Relay Chat is the most reliable and quickest; although it is harder to use.
|
||
Interestingly, this is one of the least-investigated sides of the Internet, and
|
||
is arguably the hardest medium for enforcing the rules.
|
||
|
||
Internet Relay Chat (IRC) is a computer teleconferencing system which has
|
||
recently gained widespread popularity. Designed in 1988 by Jarkko Oikarinen as a
|
||
replacement to the UNIX talk program, it allows for users from all over the
|
||
world to connect to a server that’s part of the IRC network and chat with anyone
|
||
on any other server on that network. On a typical night, there are anywhere from
|
||
5000 to 15000 people chatting with each other. Actual numbers depend on time of
|
||
the day, day of the week, and network stability.
|
||
|
||
As a chatting system, IRC has some alternatives. Using IRC, people may engage in
|
||
"private" chats, where they can send messages that only the intended recipient
|
||
can read. People can create and join special discussion channels, where their
|
||
messages will be shown to everybody. They may also use special DCC (Direct
|
||
Client-to-Client) capabilities that allow for chatting and file transfer. By
|
||
design the system is very flexible e.g. as upon not locating a certain
|
||
discussion channel, a user may just create one.
|
||
|
||
The IRC system also allows for control. The person who creates the channel is
|
||
considered its operator. The operator can invite other users to join this
|
||
channel, allow and disallow a user to join (on a temporary or even a permanent
|
||
basis), punt people from the channel if necessary, and can grant operator
|
||
privileges to others. On certain channels, operators play almost no role and
|
||
utilize their positions to control excessive flooding (which occurs when a user
|
||
sends so much information in a row that it, in the opinion of the operator,
|
||
seriously interferes with the conversation).
|
||
|
||
IRC uses a very simple system for differentiating between users who are
|
||
currently connected to it. Each user picks a nickname based on his or her own
|
||
preference, and logs into an IRC server. The IRC server either accepts the
|
||
nickname or tells the user that the nickname is already in use and waits for a
|
||
new one. The user can also optionally produce an email address that the server
|
||
keeps in the database of current users. Other IRC users can then look up
|
||
someone’s information based on their nickname.
|
||
|
||
The inherent problem is that a user is not bound to reveal his or her identity
|
||
in any way. The nickname can be unrelated, and the email address can be a fake.
|
||
In fact, the only knowledge that someone has about some other IRC user is where
|
||
this user is logging in from. This lack of information about users, coupled with
|
||
the extensible system and a live presence of other humans at the same time as
|
||
you’re there is an opportunity which pirates could not pass by. On the three
|
||
major IRC networks there are currently dozens of round-the-clock channels which
|
||
specialize in ways to illegally obtain software. The technical aspects of IRC
|
||
file exchange are even more inhibiting to investigations.
|
||
|
||
On one typical evening, there were over 11,000 people connected to EFnet (Eris
|
||
Free network, the largest of the three worldwide IRC networks). These people
|
||
were dispersed over a range of more than 3,000 different channels. Some of the
|
||
channels had up to 100 people while others had just one. (For a channel to
|
||
exist, at least one person must be in it.)
|
||
|
||
The piracy channels, most of which start with or contain the word "warez" (which
|
||
is pirate jargon for illegally obtained commercial copyrighted software), number
|
||
over 85. On the sample evening, there were 931 instances of people logged in to
|
||
the "warez" channels (note that a person may be on more than one channel at
|
||
once, but keeping track of more than four at the same time is a rare occurrence
|
||
on IRC).
|
||
|
||
|
||
|
||
4.3. IRC
|
||
|
||
FTP site offers
|
||
|
||
Piracy takes different forms on IRC. Some channels offer "FTP sites", others
|
||
advertise other people’s public offers, and yet others are discussion-style
|
||
channels where people request software that they need. The "FTP site" channels
|
||
usually have an automated moderator. Channel users find FTP sites that currently
|
||
carry pirated material and submit the Internet addresses to the automatic
|
||
moderator (also known on IRC as a "bot", from the word robot). The moderators
|
||
will then broadcast the site’s coordinate to others in the same channel. A
|
||
variation is a channel where people post Internet addresses themselves. These
|
||
addresses usually consist of the 4-digit Internet Protocol (IP) number, the
|
||
user-name and password that are needed for logging into the system. Sometimes,
|
||
the posters also mention a "ratio" of, for example, 4-to-1. This means that the
|
||
operators of this FTP site are requesting that users upload at least one fourth
|
||
of the megabytes that they download. This will be discussed a bit later. Below
|
||
are some of the messages that may be posted in FTP site channels:
|
||
|
||
|
||
RaiNMaNP9 Get da warez at 207.33.217.17 use the name warez and the password is
|
||
you email address ! this ftp sucks someone told me lastnight!and he's down by
|
||
the river!
|
||
|
||
trade_it has a site up at 205.219.156.88. Come get your warez here!
|
||
l/p: warez 1:3
|
||
|
||
<CryoFlame> Come to my FTP 199.69.76.123 l:warez p:warez 1:5 ratio
|
||
|
||
<Maximus> Go to 165.91.2.150 \ Login & Pass: warez \ Change port to
|
||
PORT:80 \ Upload:Download rate is 1:4 \ Most of yer warez files yer looking for
|
||
(i.e. MS Office Pro 97 \ Visual Basic 4.0 \ Hellbender \ MS Pub97 \ WinNT 4.0
|
||
and server \ Adobe Photoshop 4.0 Beta list goes on and on!!!
|
||
|
||
<Wronski> 206.29.242.29 l&p:warez 1:3
|
||
|
||
Another type of a channel is one where people simply type a message stating what
|
||
they’re looking for (or what software they have for others to pirate). Other IRC
|
||
users then read the messages, and can enter private chat with the person who
|
||
posted the message. These channels are usually the most popular ones, as anyone
|
||
who desires a certain software package can go and see what the other dozens of
|
||
people offer on the channel. Most pirates on these channels deal in trades (as
|
||
in, they only send software if the other user has some other software to send
|
||
back). Below are a few examples of messages from this type of a channel:
|
||
|
||
|
||
|
||
Trading
|
||
|
||
[Gordon] will trade for Police Quest 1: vga.. msg me
|
||
|
||
_triax_ wonders if anyone know if Leisure Suit Larry 7 been released yet....
|
||
|
||
|StompeR| is looking for a site with the NEWEST Visual Basic /msg me
|
||
|
||
AoS is looking for Diskeeper, Mathematica, and Microsoft Assembler (MASM). /msg
|
||
me for trade
|
||
|
||
Blaspheri is looking for need 4 speed.../msg me
|
||
|
||
boy20co is looking for a aol acct, or generator, will give perm ftp site away.X)
|
||
|
||
butthead is looking for Speed Haste full, PLEAZ /MSG ME IF U HAVE IT!! PERM
|
||
ACCOUNT ON FTP SITE!!!
|
||
|
||
cf wonders is anyone knows if leisure suit larry 7 has been released yet...
|
||
|
||
Chia_Pet is looking for Marathon2...Ne1 have it?
|
||
|
||
Jeff just wants lemmings paintball
|
||
|
||
jussa looking for REalms of Arkania disks1,6-9 and Daggerfall disks47-53 pls
|
||
/msg for trade :)
|
||
|
||
Milo looking for reg number of discplay 3.3
|
||
|
||
Monte needs a ppp dailer for MSDOS. /msg me if you have one. Thanks.
|
||
|
||
NailBomb needs sites for: Uninstaller 4.0, and Adobe Type Manager Deluxe..../msg
|
||
me...thanks......
|
||
|
||
<KriS1> ne1 diablo site /msg 4 trade
|
||
|
||
<lizards> i need a photoshop site
|
||
|
||
<lucy4> i know how to crack eudora pro 3.0 upgrade but i didn't finish d/ling
|
||
the intall.exe file from qualcomms site and now they took it off... if anyone
|
||
has the file please let me know
|
||
|
||
<MaSTaWaR> SprWalker: I have flight sim 97
|
||
|
||
<Nelson> ne1 has osr3, any Koei games or settlers 2. Plz msg me.
|
||
|
||
<RaSun> looking for links386 can anyone help
|
||
|
||
<sector6> looking for death rally (for free) Help a newbie!!!
|
||
|
||
<Smallnuts> I needz Pixar's Renderman and Mesh Paint 3D, msg me.
|
||
|
||
<Spawn27> does ne1 know were I can get abuse
|
||
|
||
<Spawn27> I looking for abuse can ne help????
|
||
|
||
<SprWalker> anyone have Ms FlightSim 5.1? /msg for trade...
|
||
|
||
<Sraiser> how many more disk of office 97 to go? i need it all d/l by 9 am in
|
||
the morning
|
||
|
||
<Sraiser> ncognito your one in a million now is 20 disk all so i can d/l it for
|
||
work tomorrow and also have it on my new pc
|
||
|
||
<Sraiser> ne1 have wordperfect latest vers
|
||
|
||
<tanfold> i need crescent internet toolpak msg me 4 trade
|
||
|
||
<Tembler> Does anyone have MS flightsim 95!??! please msg me for trade!!!
|
||
|
||
<Tembler> I have some pretty good warez to trade for that game
|
||
|
||
<Tembler> make it msflightsim95
|
||
|
||
<True__> looking for Death Rally../msg
|
||
|
||
|
||
|
||
Offerbots
|
||
|
||
Finally, the third major type of a "warez" channel on IRC is one where users
|
||
compile a special software listing, and send a message to the automatic channel
|
||
moderator notifying it of this software. The "bot" then automatically posts all
|
||
such listings in a similarly formatted way. Here is a short sample of output
|
||
from such a channel:
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: KfZ-DcC ) _#4_ 39x [2.8M] [ETN]Arena Designer Pro
|
||
v2.5[10-27]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NVC-AADCC ) _#1_ 79x [9.7M] Radin Fighter 2 [10/25]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-AADCC ) _#2_ 21x [6.2M] Hot Dog web editor - da
|
||
best one of am all [10/26]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#1_ 0x [4.8M] [10/24] MS Money 97 Retail
|
||
[RAGE]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#2_ 2x [9.7M] [10/24] Raiden Fighter 2
|
||
[EPI]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#3_ 0x [166k] [10/25] Diablo DEMO Hack
|
||
Pack [NVC]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#4_ 1x [7.4M] [10/25] Fighter Duel:
|
||
SPECIAL EDITION [PSG]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#5_ 1x [7.0M] [10/25] GemStorm c
|
||
Malachite Games [RFX]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#6_ 3x [6.5M] [10/27] Amok c GT
|
||
Interactive [RZR]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#7_ 1x [7.3M] [10/27] Gray Stone Saga 2
|
||
c Hwaei Co Chinese [KYL]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#8_ 1x [5.2M] [10/27] VocalTec4s IPhone
|
||
4.5.0.3 [MNC]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#9_ 1x [7.0M] [10/27] ULT Soccer Manager
|
||
2 c SIERRA [HYB]
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: PMODE-DCC ) _#1_ 24x [142k] PMODE/W v1.30 - DOS
|
||
Extender For WATCOM C/C++
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#1_ 313x [ 29k] Key Gen. for Quake
|
||
Shareware CD
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#2_ 86x [1.0M] WinPGP ver 5.0
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#3_ 900x [5.3M] Eudora PRO ver 3.0 Final
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#4_ 50x [1.7M] Agent 99F 16 Bit cracked
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#5_ 301x [1.5M] Agent 99F 32 Bit cracked
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#6_ 279x [7.9M] CleanSweep ver 3 beta3
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#7_ 28x [1.1M] NetTerm 3.2.3 32Bit
|
||
*cracked*
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#8_ 15x [1.5M] WARFTPD ver 1.52 Final
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#1_ 47x [2.4M] Quake Track 2 by NiN
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#2_ 28x [4.4M] Fell on Black Days by
|
||
Soundgarden
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#3_ 38x [4.8M] Never Leave Me Alone by
|
||
Nate Dogg
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#4_ 24x [5.5M] Days of our livez by Bone
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#5_ 49x [2.3M] Mario 64 Main Theme
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#1 _ 57x [539k] [SAM] [1021] The collector
|
||
v1.13
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#10_ 82x [666k] [SAM] [1026] BookIt! PRO
|
||
Win 95/NT
|
||
|
||
<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#11_ 192x [267k] [SAM] [1026]
|
||
DomainSearcher Win 95/NT
|
||
|
||
|
||
|
||
During a sample one-hour period, over 289 megabytes of files were offered
|
||
through this "EtC-ReLaY" bot. Since a file may be downloaded by as many as 20
|
||
people at the same time, the total volume of files transferred with the help of
|
||
EtC-ReLaY is amazing. Moreover, EtC-ReLaY is not the only service that offers
|
||
this kind of a feature. On EFnet, one might find well over 10 such free offer
|
||
channels.
|
||
|
||
The mechanism for physically sending and receiving files through IRC is very
|
||
simple even for beginners to use. If a person wants send a file to another user,
|
||
all that needs to be typed by the sender in is a command, the name of the user,
|
||
and a filename. To receive a file that is listed in a channel by a bot like
|
||
EtC-ReLaY (see above), the target user executes a command, and the offerer’s
|
||
system will automatically initiate the transfer.
|
||
|
||
|
||
|
||
4.4. FTP sites
|
||
|
||
A fourth form of user group sharing is File Transfer Protocol (FTP) is a method
|
||
to transfer files over the Internet. Created in the early 1970s at MIT, it has
|
||
become a standard feature of many operating systems. FTP is probably the most
|
||
convenient way to send files over the Internet. It is also very easy to detect
|
||
the location of an FTP site, which is a reason why many of these sites are
|
||
active for only a day or two. They are brought down by their operators to escape
|
||
detection.
|
||
|
||
The basics of FTP are simple. A server computer is chosen, and FTP server
|
||
software is set up on it. At that point, anyone on the Internet who has the
|
||
address of the computer and user information needed to log into the system can
|
||
access files in the server machine’s storage. The addresses and user information
|
||
can be distributed in person, or over the Internet via the World Wide Web, IRC
|
||
or USENET newsgroups.
|
||
|
||
Using FTP is very simple. There are many well-written FTP client programs that
|
||
will let a user get and put files using the FTP Internet protocol. Pirates have
|
||
also come up with their own FTP client called "WarezFTP" which has special
|
||
features that certain pirates might want to use. For example, WarezFTP will
|
||
detect and display names of hidden directories which are often created on FTP
|
||
sites. If you are not using a program like WarezFTP, you will not know that a
|
||
directory exists, but a pirate will be able to enter it and trade files.
|
||
|
||
The motive behind putting up FTP sites (which is a very risky enterprise, since
|
||
Internet Service Providers usually notify the SPA and sometimes even the FBI
|
||
when they suspect illegal activity) is not commercial gain. In fact, most
|
||
pirates lose money by paying excessive Internet connection fees. Sometimes a
|
||
pirate may spend even more money while paying a hacker for a cracking job the
|
||
hacker removes any copyright protection that might be embedded in the software.
|
||
Usually cracking is done for free, but on some occasions where the pirates
|
||
desire speed and accuracy, the cracker is paid large sums. The reasons why
|
||
pirates put up FTP sites are to distribute any software that they have in hopes
|
||
of getting something in return from other pirates, or to spread the popularity
|
||
of a piracy group of which they might be members.
|
||
|
||
Monitoring activity on FTP sites is harder than doing that on Bulletin Board
|
||
Systems. Whereas on a BBS one can usually see the list of last few users and one
|
||
usually has a full list of members; it is always easy to get in touch with
|
||
someone who has recently logged on to the system. With FTP sites, there is
|
||
almost no identification anywhere except for the FTP log file, which is usually
|
||
stored on the server computer. The FTP log contains Internet addresses of all
|
||
log-ins.
|
||
|
||
|
||
|
||
4.5. Usenet
|
||
|
||
Another method of user group sharing is through Newsgroups. Newsgroups on the
|
||
Internet (USENET) are results of an early attempt to create a thread-based
|
||
virtual conversation medium. Not unlike a bulletin board system, users can post
|
||
messages to a specialized "forum". However, unlike a BBS, USENET is a network
|
||
consisting of many servers. A post made to one server is then sent across the
|
||
whole USENET network in hopes that it gets everywhere. There are over 20,000
|
||
different newsgroups, with topics ranging from Fans of Bill Gates to technical
|
||
discussions relating to the operation of a blender. Internet newsgroups are
|
||
distinguished by a specialized naming structure. For example, a newsgroup which
|
||
concerns itself with humorous posts is called rec.humor (rec. stands for
|
||
recreation), newsgroups with pornographic material start with
|
||
alt.binaries.pictures.erotica (alt. is short for alternative) and a computer
|
||
newsgroup announcing new products for Microsoft Windows may be called
|
||
comp.os.ms-windows.announce (comp. is short for computer). Not surprisingly,
|
||
also, the newsgroups that pirates frequent are called alt.binaries.warez and
|
||
alt.warez.ibm-pc.
|
||
|
||
Piracy on newsgroups is an option that many have considered and tried, but due
|
||
to technical problems that are now noticeable in the structure of USENET, is
|
||
very impractical. What some pirates do is they locate a service which will post
|
||
any message (including data information which could be an illegally obtained
|
||
piece of software) without specifying the poster’s name. The technical problems
|
||
surface when the post first occurs. Due to the nature of USENET, most messages
|
||
have to be encoded in a special way to be compatible with old USENET servers.
|
||
This scheme actually expands the size of the posted file. Also, if the posted
|
||
file is too big and has been split up into several parts (as is often the case),
|
||
not all parts are necessarily replicated to other servers. So for example,
|
||
someone may post a 5-megabyte software package to USENET. Due to encoding and
|
||
part size, it turns into 20 parts. Only 10 or 15 of those make it to most
|
||
servers, and since all parts are needed to re-assemble the program, the posting
|
||
was useless. Due to the relatively low volume of files being transferred over
|
||
USENET, it has not been even a minor focus in the software companies’ recent
|
||
efforts to curtail piracy
|
||
|
||
|
||
|
||
4.6. Email
|
||
|
||
Email, by far the most popular feature of the Internet, is also the first method
|
||
that was invented for Internet communications. A recent standard for Multimedia
|
||
Internet Mail Extensions (MIME), has indirectly aided the spread of email-based
|
||
piracy by permitting email software to correctly encode files for transmission
|
||
over global networks. Using email, a user may "attach" any file to an email
|
||
message. If the addressee’s email inbox will allow large messages, pirates will
|
||
trade huge files using this relatively private method. Fortunately, most
|
||
people’s inboxes have a set maximum size of 1 to 5 megabytes, which is barely
|
||
enough for even the smallest commercial application program. Thus, email has not
|
||
been a major method for pirate file exchange.
|
||
|
||
|
||
|
||
WWW
|
||
|
||
The World Wide Web (WWW), an extremely popular Internet communications medium,
|
||
is one of the most recent advances in Internet technologies. Invented in 1991 by
|
||
a few scientists at the CERN physics laboratories in Switzerland, the World Wide
|
||
Web is a one-way TV-like medium where content providers may post any information
|
||
they desire.
|
||
|
||
In the beginnings of the World Wide Web, most pirates were very uncomfortable
|
||
with posting their file collections in such a public way. Anyone on the Internet
|
||
may access the publicly posted information, and there is virtually no way to
|
||
restrict investigation by proper authorities. Lately however, as the Web grew in
|
||
size and became less manageable, more and more pirates are putting up their
|
||
information online. They no longer feel threatened. The only way to take this
|
||
information down is to persuade the Internet Service Provider (ISP) to shut off
|
||
the pirate’s service. Since most ISPs realize that by cutting off someone’s
|
||
service they will be viewed as Internet censors which usually leads to loss of
|
||
customers they are reluctant to block anyone’s service.
|
||
|
||
|
||
|
||
5. Commercial piracy
|
||
|
||
While the methods above involve an active pirating population, the profitable
|
||
distribution of stolen software defines another side of the market on a larger
|
||
scale. This market involves the sale of illegally duplicated software in large
|
||
quantities. These large-scale pirates work only for the profit involved in the
|
||
redistribution of illegal software. The two major components of large scale
|
||
piracy are software rental and compact disk manufacturing.
|
||
|
||
While it has always been illegal to rent unauthorized copies of software, until
|
||
1990 it was legal to rent the original versions. Loss of revenues that was
|
||
associated with these rentals prompted the US Congress to pass the Computer
|
||
Software Rental Amendments Act of 1990. This act makes it possible for software
|
||
publishers to explicitly prohibit rental in the license agreement.
|
||
Interestingly, an exception to the law was created specifically for non-profit
|
||
libraries. These could rent original software without express permission from
|
||
the publisher.
|
||
|
||
|
||
|
||
5.1. CDR
|
||
|
||
The second major component of large scale piracy is the duplication of computer
|
||
compact disks. The advent of software distribution via compact disks offered
|
||
developers a level of protection unavailable with conventional floppy disks. The
|
||
ability to duplicate these disks was limited by the expense of CD-R’s, or
|
||
compact disk writers. However, with advances in technology, the prices of these
|
||
CD copiers have come down considerably. Current CD-R’s can be purchased for
|
||
around $500 dollars. This has lead to a considerable growth in the availability
|
||
of pirated software on CD’s. The large volume of storage available on a CD had
|
||
also previously limited copying by potential pirates. These limitations are no
|
||
longer an issue with the ability to copy directly to another CD. The production
|
||
of counterfeit CD’s has become a considerable part of illegal pirating of
|
||
software.
|
||
|
||
The distribution of counterfeit CD’s can take two forms. These CD’s can be
|
||
explicitly marked as illegal copies or can be cleverly disguised as the
|
||
original. The former is the most common form of distribution. With explicit
|
||
markings or simply no disguise at all, the purchaser is generally aware of the
|
||
illegal nature of the product. However, with duplicate packaging of the some
|
||
stolen software, the ability of the user to distinguish between the legitimate
|
||
and not becomes very difficult.
|
||
|
||
The volume of pirated software has also grown with the advent of CD copying.
|
||
With the large available storage on one CD, numerous programs can be copied and
|
||
stored on a single disk. This has significantly eased the difficulties of
|
||
distributing these stolen programs. The growth of CD duplication is evidenced by
|
||
the influx of counterfeit CD software from the foreign market. These copies are
|
||
distributed rapidly and efficiently to a large market. In summary, the
|
||
production of CD software has become a significant component of the pirating
|
||
industry.
|
||
|
||
|
||
|
||
6. Copyprotection
|
||
|
||
In light of the many effective methods of software piracy, the protection of
|
||
software programs has become increasingly difficult. The battle to protect the
|
||
software industry is a never-ending struggle, as pirates continually find new
|
||
ways to illegally copy and distribute software. (With software piracy so
|
||
prevalent, what can software developers do to protect their intellectual
|
||
property?) The software industry has invested a serious amount of time into the
|
||
development of new forms of protection. Alongside the industry, many Anti-Piracy
|
||
Organizations and campaigns have arisen to combat the flood of illegal software.
|
||
The first and most important component of the software protection is that
|
||
engineered by the industry itself. We will explore what approaches have been
|
||
taken in the past, what approaches are currently being used and other methods
|
||
software developers have used to fight this growing problem. We will look in
|
||
depth at each of these approaches and see their successes and at what cost.
|
||
|
||
|
||
|
||
6.1. Hardware protection
|
||
|
||
Let us first start with hardware solutions to the software piracy issue. The
|
||
best known methods are dongles. Dongles are hardware "keys" which allow
|
||
applications to be run on PCs and servers. This hardware "key" must be purchased
|
||
separately from the application. Therefore the software developers configure the
|
||
software to require the dongle. This is an extremely successful approach,
|
||
however, at great cost. It costs approximately $30 per dongle. This means that
|
||
for a $30 application the cost is now double. This fact has made this solution
|
||
very limited. It is used almost only on very high-end applications because of
|
||
its cost. Dongles have been the only real approach employed by software
|
||
developers that uses hardware to help fight piracy.
|
||
|
||
|
||
|
||
6.2. Software protection
|
||
|
||
The most common approach for fighting software piracy has been with software.
|
||
Among the approaches used have been serial numbers, CD-keys, encryption, manual
|
||
references, registration requirements, and installation restrictions. We will
|
||
take a look at each of these in depth.
|
||
|
||
|
||
|
||
Serials
|
||
|
||
The use of serial numbers requires that the user enter a serial number before
|
||
they can install application. Many applications use this method including such
|
||
prominent titles as Fauve Matisse, Janna Contact, Abode Photoshop, etc. When
|
||
installing one of these applications you are required to enter a serial number
|
||
usually found in the software manual before you can successfully complete the
|
||
installation. The idea behind this is that it requires the user not only to have
|
||
the software but also the manual.
|
||
|
||
However, this approach has been easily defeated. Many of the very popular
|
||
software titles have their serial numbers available on the World Wide Web. This
|
||
limits the effectiveness of serial numbers! Another problem with serial numbers
|
||
is that there are serial number crackers. These crackers are applications that
|
||
are designed to find the necessary serial number to get past the serial number
|
||
check.
|
||
|
||
|
||
|
||
CD-keys
|
||
|
||
Microsoft offers a similar strategy with their software titles. It is called the
|
||
CD-Key. It is a "serial number" located on the back of the CD case. It is a
|
||
ten-digit number and is required to complete the installation of a Microsoft
|
||
software product.
|
||
|
||
As with serial numbers there are ways to defeat this check. First all of the
|
||
CD-KEYs uses the same scheme (xxx-xxxxxxx). If a person finds the scheme used to
|
||
create the CD-KEY then they can use all Microsoft products.
|
||
|
||
Another technique is a specialized form of a serial number check. It is called
|
||
the Certificate of Authenticity (COA) and is a way for end-users to be assured
|
||
that their OEM (Original Equipment Manufacturer) is authentic. The COA is a 20
|
||
digit alphanumeric number that must be entered before the end-user can use the
|
||
Microsoft operating system that came their OEM computer. With a large range of
|
||
possible combinations, the difficulty is relatively high for cracking these
|
||
serial numbers.
|
||
|
||
|
||
|
||
Manual check
|
||
|
||
Manual references are another of the approaches that software developers employ
|
||
to fight software piracy. This is used mainly on games. Every time the game is
|
||
launched a code (usually in the form of a unique word) is required before the
|
||
game can be played. A prime example is the games Stunts by Brøderbund. Every
|
||
time you launch the game it specifies a page, paragraph, and word to enter from
|
||
the manual. The idea is that you must have the manual to play the game so that
|
||
you cannot just get a copy of the game and start playing.
|
||
|
||
This method has two major drawbacks. The first is that it is a hassle for paying
|
||
customer to go through every time he wants to play the game. The second is that
|
||
there are ways around this manual reference. You could photocopy the manual or
|
||
write down a few of the unique words and then just keep launching the game until
|
||
one of them shows up.
|
||
|
||
|
||
|
||
Registration
|
||
|
||
A very different approach to software piracy protection has been to force
|
||
registration in various ways. Registration might require payment (most cases) or
|
||
simply just registering your name and address etc. Some software developers use
|
||
the method of encryption to protect their software. They lock the software with
|
||
a "software key" and the software will only work if the user gets the "key" from
|
||
software developer. The software developer can then force the user to register
|
||
before he releases the key. Using this approach, the developer can create a
|
||
unique key for every user. Some developers did not like the idea of forcing
|
||
registration and have instead shipped the software key with the application.
|
||
This second method is not as effective as the first. Both approaches have a
|
||
distinct use for applications that are distributed via electronic and on-line
|
||
distribution.
|
||
|
||
Other software developers force registration by creating some limit for the use
|
||
of an application prior to registration. For example, limiting the number of
|
||
launches before registration. This approach is used primarily in shareware,
|
||
freeware, and demos. An example of this approach is employed in Quicken SE by
|
||
Intuit.
|
||
|
||
Another common approach instead of the number of launches is to limit the number
|
||
of days that the application will run before registration is required. This is
|
||
used particularly in shareware, freeware, and demos. An example of this is
|
||
Netscape Navigator beta applications, which limit the use of the application to
|
||
30 days. Once again, when you register the application this limit is removed.
|
||
|
||
|
||
|
||
Limiting installations
|
||
|
||
In a radical attempt at a new method Microsoft proposed limiting the number of
|
||
installations of Office 97 to a total of 3. This technique was soon abandoned as
|
||
many people complained to Microsoft. Obviously Public Relations have a priority
|
||
over piracy concerns.
|
||
|
||
|
||
|
||
Certificates
|
||
|
||
All of the previous approaches are ways to protect the software from being
|
||
pirated after it is purchased. Some manufacturers like Microsoft have gone a
|
||
step further. Microsoft decided to fight software piracy from the retail store.
|
||
To do this they placed a Certificate of Authenticity (COA) on the side of the
|
||
box. This COA contains 3 hidden, and non-reproducible watermarks making it
|
||
nearly impossible for pirates to copy the box . Therefore, when a user sees a
|
||
box without this COA it is safe for him to assume that it is a pirated version
|
||
of the Microsoft software.
|
||
|
||
|
||
|
||
7. Anti-Piracy Organizations
|
||
|
||
The second component of the protection of software comes from the numerous
|
||
organizations that have been formed to combat software piracy. These
|
||
organizations use advertisements and legal action to fight against the rising
|
||
tide in the illegal duplication of software.
|
||
|
||
Though there are many organizations which are fighting against software piracy,
|
||
the largest and most active of these are The Software Publishers Association
|
||
(SPA) and The Business Software Alliance (BSA). Both are international
|
||
organizations whose members include software developers, distributors,
|
||
retailers, consultants, and essentially any other groups which are concerned
|
||
with the industry’s growth. Through cooperative work with the government, the
|
||
SPA and BSA enforce anti-piracy laws through active measures such as filing
|
||
lawsuits, conducting raids, and undertaking audit programs.
|
||
|
||
|
||
|
||
7.1. Legal measures
|
||
|
||
Over a thousand lawsuits, against both large groups and individuals, have been
|
||
filed by the SPA and BSA. The penalty for software piracy is high for the
|
||
violator - up to $100,000 per copyright infringement and a maximum 5-year prison
|
||
term. On March 1, of this year, SPA filed a lawsuit against a junior college
|
||
located in Florida for using illegal copies of software on its computers. The
|
||
settlement reached by the plaintiff and defendant resulted in a fine of $135,000
|
||
along with removal of the illegal copies and repurchase of new ones. On July 4,
|
||
1996, BSA successfully prosecuted two Hong Kong citizens with prison terms under
|
||
the new Copyright (Amendment) Ordinance. Yip Chi Hung, the owner of a software
|
||
shop in Hong Kong was sentenced to 6 months in jail plus a fine of HK$51,000.
|
||
Kwok Po, Yip’s supplier of wholesale pirated CD-ROMs, was sentenced a total of
|
||
16 months in jail and fined HK$308,000. Just recently, this past October 10, SPA
|
||
filed 5 civil lawsuits for software piracy on behalf of the software
|
||
corporations Adobe Systems, Inc., Claris Corp., Corel Corp., Datastorm
|
||
Technologies Inc., and Novel Inc. Three were against Internet service providers
|
||
(ISPs), and two were against individual violators. The three ISPs Community
|
||
ConneXion, Inc., GeoCities, Inc., and Tripod Inc. had pirated software,
|
||
unauthorized serial numbers, links to ftp "warez" sites, and cracker/hacker
|
||
utilities posted on their webpages. With the help of the ISPs, two individuals
|
||
were tracked down as the responsible posters of the copyright infringing
|
||
material. Though it is certain that software copyright laws are being violated
|
||
in this case, there is controversy over whether or not the ISPs, which offer
|
||
free space for individuals to design their own Web pages, should be responsible
|
||
for the material that is posted by their users. Internet analyst Chris Stevens
|
||
voiced his opinion, stating "They need to go after the people who post pirated
|
||
software, not the host. That’s like suing the phone company for receiving
|
||
obscene phone calls." As an illustration showing that nobody is above the laws
|
||
of copyright protection, a hospital in Chicago, Illinois was fined $161,000 for
|
||
using illicit copies of software. In fact, with the increase of computerization
|
||
in hospitals, these institutions should be given increased special scrutiny,
|
||
according to Bob Kruger, Vice President of Enforcement for BSA.
|
||
|
||
|
||
|
||
7.2. Corporate audits
|
||
|
||
An alternative to litigation, is conducting what are called corporate audits. If
|
||
investigators report a corporation as having violated copyright laws, SPA will
|
||
often ask the corporation to allow an audit of its software in place of taking
|
||
the matter to court. During an audit, the contents of each computer are compared
|
||
with the company’s purchase receipts of software. If any illegal copies are
|
||
found, the company will agree to pay the retail price for each copy, destroy
|
||
these illegal copies, and replace them with legitimate ones. For the most part,
|
||
these audits have been met with cooperation by the company who would much rather
|
||
settle the issue in a confidential, private matter than dragging everything to
|
||
court. If the company does refuse to submit to an audit, SPA will then file a
|
||
lawsuit against them.
|
||
|
||
|
||
|
||
7.3. Contacting anti-piracy organizations
|
||
|
||
To help them in their search for copyright criminals, the SPA, BSA and software
|
||
giant Microsoft have established a hot-line (1-800 toll free number) which
|
||
people can call in to report suspicions of software piracy. The numbers are
|
||
1-800-388-7478 for SPA, 1-800-688-BSA1 for BSA and 1-800-RULEGIT for Microsoft.
|
||
Most investigations start off with a tip through this hot-line. Everyday, 30 to
|
||
40 calls are received, mostly from employees and consultants for software firms.
|
||
Together with law enforcement officers from the government, the anti-piracy
|
||
organizations will pursue these leads and often arrest the violator through a
|
||
sting operation. Besides calling in to give tips on copyright violators, the
|
||
public can also call in to receive information about preventing software piracy.
|
||
|
||
|
||
|
||
7.4. Education
|
||
|
||
In addition to playing cops and robbers with software pirates all over the
|
||
world, the SPA and BSA are also committed to teaching the public the degrading
|
||
effects of software piracy using propagandistic methods, and helping companies
|
||
prevent copyright violations through educational courses and software utilities.
|
||
|
||
Noticing the prevalence of software piracy everywhere, the anti-piracy
|
||
organizations are trying to change the cultural view that copying and buying
|
||
illegal versions of software is okay. The SPA, especially, has undergone
|
||
extensive efforts to make the public aware of the illegality of software piracy.
|
||
Free brochures for the general public with titles such as "Software Use and the
|
||
Law" and "Is it Okay to Copy My Colleague’s Software?" contain information about
|
||
copyright laws and demonstrate the legal extent of using software. "It Could
|
||
Have Been So Easy" is a seven minute video intended for companies, showing what
|
||
can happen if one is found guilty of copyright infringement, and also giving
|
||
advice on maintaining an efficient software management program. Another video
|
||
called "Don’t Copy That Floppy" is a rap/hip-hop music video attracting the
|
||
younger generation that educates them in ethical problems with pirating
|
||
software. Both these videos can be purchased for $20 and $15 dollars
|
||
respectively.
|
||
|
||
In addition to distributing brochures and videos which educate the public on the
|
||
legal and ethical ramifications of software piracy, the SPA offers a free
|
||
software tool called the Self-Audit Kit that allows companies to maintain an
|
||
inventory of all the software on their systems. This way any accidental use of
|
||
pirated software can be detected and quickly remedied. The software comes in 6
|
||
different languages and is also available for the Macintosh. A more effective
|
||
tool of education is the SPA Certified Software Manager Course (CSM). This
|
||
course gives computer professionals the skills needed to organize a software
|
||
management program for their company. They are also taught the legal aspects of
|
||
software use and how to "optimize the legal use of software." This course is
|
||
currently taught in the USA, England, France, Germany and Singapore and will
|
||
soon extend to China, India and several Latin American countries.
|
||
|
||
|
||
7.5. Economics
|
||
|
||
Software piracy is an economic and legal problem that impacts every community.
|
||
Software piracy is something very new to many people. A lot people don’t know
|
||
about it and others don’t think it is illegal when they copy software from the
|
||
floppy disk. "Many people don’t see a harm in it," says Robert Holleyman,
|
||
president of the Business Software Alliance (BSA). "Business owners would never
|
||
think of asking their employees to steal computers, but many of those same
|
||
business people don’t think twice about buying one or two programs and
|
||
duplicating them for all the PCs in their office." Many people convicted of
|
||
copyright violations are simply naive or ignorant of the law. For example, "A
|
||
misguided computer technician had take an application intended for five bean
|
||
counters and install it every where in the operation department." Another
|
||
example is a mother, "Miki Casalino, in whose house Novell found the ‘Planet
|
||
Gallifrey BBS’ which she admitted was run by her son, though she only learned of
|
||
the alleged illegal software after it was too late." The problem is that all of
|
||
them are "innocent" but on the other hand, they are violating the copyright of
|
||
the software. We must concede that copying software, like drinking and driving,
|
||
is something that everybody disapproves of, yet most people do at least one. "Of
|
||
300 PC-using managers questioned earlier this year by MORI, a market-research
|
||
group, 55% admitted to copying software illegally."
|
||
|
||
A contribution to the seduction of computer users is the fact that using the
|
||
pirated software is as good as using the legal software but the prices are
|
||
better. In addition, it has been said that " From the user’s standpoint there’s
|
||
virtually no risk to using pirated software." And it is not hard to copy
|
||
software. All that is needed is a computer, the empty diskettes, and of course
|
||
the software program you want to have.
|
||
|
||
Finally, the fact is that few people are actually prosecuted each year for
|
||
software copyright infringement, and most offenses don’t warrant maximum fines
|
||
or jail time. Human nature being what it is, software piracy persists.
|
||
|
||
Most people know that copying the software is illegal, but they still do it. The
|
||
reason is very simple. They can make a lot of money from doing it and the
|
||
consequences are nil or avoidable. According to Iritani "It was a check forgery
|
||
case that led deputies to the quiet Rowland Heights cull-de-sac. But they found
|
||
at the home of Ming Chin Jin and his wife, Pifen Lo, was $400,000 worth of
|
||
counterfeit copies of Microsoft’s Encarta’s 95 CD-ROM encyclopedia and 48,000
|
||
fake holograms from China." Indeed, high profits and minimal penalties make this
|
||
form of high-tech crime a criminal’s dream and a police officer’s nightmare.
|
||
Iritani wrote, "most cases are not prosecuted for the lack of evidence or end up
|
||
in civil court, where monetary penalties have proven to be ineffective." The
|
||
making of a counterfeiting lab are very easy to acquire and relative
|
||
inexpensive. According to Iritani, all they need are "a computer, a disk or
|
||
CD-ROM duplication machine, a laser printer, a shrink-wrap machine and someone
|
||
willing to produce the labels and packaging."
|
||
|
||
|
||
|
||
8. Conclusion
|
||
|
||
Software piracy exists. We covered the basic definition of software piracy, the
|
||
methods involved, the potential solutions, and the social implications. In
|
||
conclusion, let us address two questions
|
||
|
||
The first question is "What can you do avoid piracy and pirated software?" Your
|
||
options as a user are to purchase authentic software and to report violations.
|
||
In this way you protect yourself and the software industry from the damages of
|
||
software piracy. As mentioned before there are numerous ways to assure you are
|
||
purchasing authentic software. Be aware of words and warnings, such as "warez"
|
||
that are "red flags" of pirated software. Remember that there are hotlines
|
||
available to report software piracy and report any suspicious sites.
|
||
|
||
The second question one should address is "Why shouldn’t you pirate?" Reasons
|
||
for not pirating software include the legal consequences as well as ethical and
|
||
moral issues. The legal consequences can include fines or jail time while the
|
||
ethical issues can effect your reputation and standing in the professional and
|
||
personal community. Piracy won’t be eliminated until users determine as a
|
||
community that it is wrong and take a united stand to eliminate it.
|
||
|
||
--Original author: Ilya
|
||
--Reformatting, Subtitles, Index: Mr.F |