Business alliance tool tracks software pirates
Computerworld - WASHINGTON -- The Business Software Alliance is using a software tool to track copyrighted software distribution, and its detective work has led in some cases to corporate enterprises.
The trade group, which demonstrated its system at a press briefing today, has used it to identify peer-to-peer systems, Web sites, newsgroups and other Internet distribution points for illegal software.
The BSA says business software producers, including alliance members such as Microsoft Corp., Adobe Systems Inc. and Apple Computer Inc., are losing $12 billion a year to piracy worldwide. The price of software lost to piracy ranges from $40 for desktop utilities to $13,000 for computer-aided design programs. Thirty-seven percent of all commercial software is pirated, said trade group officials.
It is "an outrageously high level of software piracy," said Robert Holleyman, BSA president and CEO. "It would be hard to find any other industry that could sustain levels of theft that high."
Most of that loss is due to end-user businesses that have rolled out copies in excess of their licenses. That practice represents the bulk of problem, said Holleyman.
But illegal use of software downloaded from the Internet is a growing concern for the trade group. By 2005, the BSA predicted, two-thirds of all software will be delivered online, up from just more than 10% in 2000.
The BSA today also released a survey of 1,026 adults that found that more than half of the people who have downloaded commercial software seldom or never pay for it. "This is something we really need to correct," Holleyman said.
The BSA said it will step up its educational effort to increase awareness about piracy, but it is also coupling that effort with stronger enforcement.
The trade group is using a system developed by MediaForce Inc. in New York that uses intelligent agents to "crawl" or search the Internet for illegal distributors. The system displays the software being distributed, the address of the distributor and the Internet service provider (ISP).
The system has dramatically improved the efficiency of the BSA's search for software pirates. After a distributor is found, a notice is sent to the ISP alerting it about illegal software distribution. The Internet provider then contacts the account owner and removes the end user from the system.
Last year, the trade group distributed 5,200 notices to ISPs. Within the first three months of using the Web crawler, more than 8,500 notices were sent out.
"We're dealing with a lot of small ISPs that didn't even show up on our radar screen," said Bob Kruger, BSA's vice president of enforcement.
The BSA shared results ofits enforcement actions today, but not the names of those targeted. In a couple of cases, employees at companies were fired for distributing software from their workplace PCs, according to letters received by the trade group. In another incident, a parent wrote that her son was going to be "grounded for a month" for distributing software.
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel... All Cybercrime and Hacking White Papers | Webcasts