Business alliance tool tracks software pirates
Computerworld - WASHINGTON -- The Business Software Alliance is using a software tool to track copyrighted software distribution, and its detective work has led in some cases to corporate enterprises.
The trade group, which demonstrated its system at a press briefing today, has used it to identify peer-to-peer systems, Web sites, newsgroups and other Internet distribution points for illegal software.
The BSA says business software producers, including alliance members such as Microsoft Corp., Adobe Systems Inc. and Apple Computer Inc., are losing $12 billion a year to piracy worldwide. The price of software lost to piracy ranges from $40 for desktop utilities to $13,000 for computer-aided design programs. Thirty-seven percent of all commercial software is pirated, said trade group officials.
It is "an outrageously high level of software piracy," said Robert Holleyman, BSA president and CEO. "It would be hard to find any other industry that could sustain levels of theft that high."
Most of that loss is due to end-user businesses that have rolled out copies in excess of their licenses. That practice represents the bulk of problem, said Holleyman.
But illegal use of software downloaded from the Internet is a growing concern for the trade group. By 2005, the BSA predicted, two-thirds of all software will be delivered online, up from just more than 10% in 2000.
The BSA today also released a survey of 1,026 adults that found that more than half of the people who have downloaded commercial software seldom or never pay for it. "This is something we really need to correct," Holleyman said.
The BSA said it will step up its educational effort to increase awareness about piracy, but it is also coupling that effort with stronger enforcement.
The trade group is using a system developed by MediaForce Inc. in New York that uses intelligent agents to "crawl" or search the Internet for illegal distributors. The system displays the software being distributed, the address of the distributor and the Internet service provider (ISP).
The system has dramatically improved the efficiency of the BSA's search for software pirates. After a distributor is found, a notice is sent to the ISP alerting it about illegal software distribution. The Internet provider then contacts the account owner and removes the end user from the system.
Last year, the trade group distributed 5,200 notices to ISPs. Within the first three months of using the Web crawler, more than 8,500 notices were sent out.
"We're dealing with a lot of small ISPs that didn't even show up on our radar screen," said Bob Kruger, BSA's vice president of enforcement.
The BSA shared results ofits enforcement actions today, but not the names of those targeted. In a couple of cases, employees at companies were fired for distributing software from their workplace PCs, according to letters received by the trade group. In another incident, a parent wrote that her son was going to be "grounded for a month" for distributing software.
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts