Chinese seller of pirated software sentenced to 12 years in US prison
Li Xiang was arrested after US agents lured him to a meeting in Saipan in June 2011
IDG News Service - The operator of a website that sold more than US$100 million worth of pirated software to customers worldwide was sentenced Tuesday to 12 years in a U.S. federal prison.
Li Xiang, a 36-year old resident of Chengdu, China, was convicted of conspiracy to commit wire fraud and criminal copyright infringement for operating the website crack99.com, according to a U.S. Immigration and Customs Enforcement (ICE) statement.
He was arrested in June 2011 by U.S. agents when they lured him to a meeting in Saipan where he believed he was delivering 20 gigabytes of data to the representatives of U.S. businessmen. Saipan, an island in the middle of the Pacific Ocean, is part of the Commonwealth of the Northern Mariana Islands and like the Atlantic island of Puerto Rico is a commonwealth of the U.S., giving American authorities jurisdiction.
Li's website specialized in offering copies of industrial software which had the access control or licensing files removed or circumvented.
The specific software titles sold by Li were not detailed in the statement but characterized as those for aerospace simulation and design, defense, electronics, energy, engineering, explosives simulation, intelligence gathering, manufacturing, mining, space exploration, mathematics, storm water management and manufacturing plant design.
In other words, they were considerably more specialized than the typical cracked software fare of Windows 7 and Photoshop.
The $100 million in revenue was achieved with 700 transactions to just 400 customers -- an average sale price of over $140,000 per transaction.
Some of his customers were in countries under U.S trade embargo for such software products while others were agents of foreign governments and U.S. government contractors holding security clearances. The use of cracked software for classified projects can be particularly problematic because of the possibility that software back doors were introduced to the products when they were cracked. Typically, they also won't receive necessary security patches.
Among Li's customers named by the U.S. ICE were a NASA electronics engineer who used the software on a NASA network to work on a side project designing a thermal simulation for Chinese communications manufacturer Huawei Technologies and a freelance contractor who used it to design components for Patriot missiles and the radar systems on the Marine One and Black Hawk helicopters.
The ICE net started tightening around Li when agents began making a series of purchases in January 2010. A year and a half later, they suggested the Saipan meeting to collect pirated software and data and to discuss a plan to distribute software to businesses in the U.S. Li was arrested in a Saipan hotel after he delivered the software and was flown to Delaware.
While Li operated the crack99.com site and distributed the software, ICE agents believe he was part of a larger network of Chinese and Russian hackers that crack and trade in software.
U.S. Immigration and Customs Enforcement said his sentencing represented "one of the most significant cases of copyright infringement ever uncovered and dismantled."
Li will be extradited to China after serving his jail sentence.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- The Six Main Steps To Structured Analogy
- The role of structured analogy software is to automate the data extraction and processing work, provide visualization of the historical context forjudgments and... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.