Business alliance tool tracks software pirates
Computerworld - WASHINGTON -- The Business Software Alliance is using a software tool to track copyrighted software distribution, and its detective work has led in some cases to corporate enterprises.
The trade group, which demonstrated its system at a press briefing today, has used it to identify peer-to-peer systems, Web sites, newsgroups and other Internet distribution points for illegal software.
The BSA says business software producers, including alliance members such as Microsoft Corp., Adobe Systems Inc. and Apple Computer Inc., are losing $12 billion a year to piracy worldwide. The price of software lost to piracy ranges from $40 for desktop utilities to $13,000 for computer-aided design programs. Thirty-seven percent of all commercial software is pirated, said trade group officials.
It is "an outrageously high level of software piracy," said Robert Holleyman, BSA president and CEO. "It would be hard to find any other industry that could sustain levels of theft that high."
Most of that loss is due to end-user businesses that have rolled out copies in excess of their licenses. That practice represents the bulk of problem, said Holleyman.
But illegal use of software downloaded from the Internet is a growing concern for the trade group. By 2005, the BSA predicted, two-thirds of all software will be delivered online, up from just more than 10% in 2000.
The BSA today also released a survey of 1,026 adults that found that more than half of the people who have downloaded commercial software seldom or never pay for it. "This is something we really need to correct," Holleyman said.
The BSA said it will step up its educational effort to increase awareness about piracy, but it is also coupling that effort with stronger enforcement.
The trade group is using a system developed by MediaForce Inc. in New York that uses intelligent agents to "crawl" or search the Internet for illegal distributors. The system displays the software being distributed, the address of the distributor and the Internet service provider (ISP).
The system has dramatically improved the efficiency of the BSA's search for software pirates. After a distributor is found, a notice is sent to the ISP alerting it about illegal software distribution. The Internet provider then contacts the account owner and removes the end user from the system.
Last year, the trade group distributed 5,200 notices to ISPs. Within the first three months of using the Web crawler, more than 8,500 notices were sent out.
"We're dealing with a lot of small ISPs that didn't even show up on our radar screen," said Bob Kruger, BSA's vice president of enforcement.
The BSA shared results ofits enforcement actions today, but not the names of those targeted. In a couple of cases, employees at companies were fired for distributing software from their workplace PCs, according to letters received by the trade group. In another incident, a parent wrote that her son was going to be "grounded for a month" for distributing software.
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Cybercrime and Hacking White Papers | Webcasts