PARIS â April 20, 2010 â Say the word âcounterfeitsâ and most people think of cheap knock-offs offered at flea markets or low-quality fake designer goods sold out of someoneâs car trunk. These images are at odds with the real story behind software piracy. That story involves highly organized criminals operating sophisticated manufacturing plants to create near-exact replicas of genuine software.
These counterfeits are intended to deceive consumers into thinking they are buying the genuine article and are often sold at prices that are nearly the same as genuine software. However, while the counterfeit discs and packaging appear the same as legitimate software, the counterfeit software code itself can contain malware or viruses, or be stripped of critical security features that protect customersâ information and technology systems. This faulty code leaves consumers vulnerable to system failures and, even worse, to cybercriminals who roam the Internet for potential victims.
Combatting these counterfeits and the criminals behind them is the role of Microsoftâs David Finn and his team of piracy experts. They use cutting-edge intelligence and forensic techniques to track down global criminal counterfeiting syndicates and support law enforcement in more than 70 countries throughout the world. Whatâs more, says Finn, who heads the companyâs anti-piracy investigations through its worldwide Legal and Corporate Affairs department: âWe are increasingly collaborating with our own customers, who are providing critical information to help us identify software pirates, and addressing their concerns about the risks of using counterfeit software.â
This week the story gains international attention through a new counterfeiting exhibition at the CitĂ© des Sciences et de lâIndustrie (French Science and Industry Museum) in Paris. Microsoft will be part of this broader exhibit that showcases how different industries are affected by piracy, as well as the risks that consumers face. The company will represent the software industry with a video documentary about how partnering with law enforcement across several continents led to prosecution of a Chinese criminal syndicate in what became the largest counterfeit case in history. In addition, a number of genuine and counterfeit Microsoft products will be displayed to help consumers distinguish genuine software from counterfeit. Also on display will be the companyâs latest technology used to identify and track down software pirates.
Says Blandine Savrda, commissioner at the Cite des Sciences et de lâIndustrie: âThis exhibition represents one of the largest combined efforts of government and industry coming together to speak out on the threats consumers face because of counterfeiting. If not for the collaboration of governments and private industry, the illegal trade of pirated products would continue to increase at an even higher rate.â
The software piracy world today, says Finn, is a vast web of large and small criminal enterprises, seeking to profit in a variety of ways. Consumers are increasingly the victims of pirated software riddled with malware, viruses and malicious code produced by counterfeiters who are happy to take their money without regard to the quality and integrity of the product they are passing off as the real thing.
One key study by IDC in 2006* showed that one in four Web sites offering counterfeit software attempted to install unwanted or malicious code upon downloading. This rate is rising, as found by Media Surveillance, an anti-piracy solutions company based in Germany, when it recently downloaded several hundred pirated copies of Windows and hacks and found that 32 percent contained malicious code.
The impact of harmful counterfeit software can be dramatic. Companies using pirated software are 73 percent more likely to experience a loss of data and 43 percent more likely to have computer failures lasting 24 hours or longer, accordingly to a Harrison Group study. âWe are telling this story in order to underscore the fact that counterfeit products can be much more expensive than people think, putting peopleâs business and financial information at risk. And to make sure people understand that we are talking about criminal gangs â like the massive syndicate involved in the China case â who are behind the global manufacture and distribution of counterfeit software,â says Finn.
Unraveling Counterfeit Organizations
Donal Keating, Microsoft worldwide senior forensics manager, has devoted his career at Microsoft to developing technologies that uncover counterfeit software. Keatingâs work has helped to unravel the mystery behind the worldâs largest software counterfeiting crime syndicates and has helped lead to arrests, product seizures and convictions all over the world.
âAs a rule, the software counterfeiting business is much like many legal big businesses in their level of organization, manufacturing expertise and sophistication,â says Keating. âThe difference is that these organizations also employ many of the same tactics commonly used by criminal rings, such as the use of violence and child labor, and the involvement in other types of crimes.â
Keating has traveled the world providing his expertise to law enforcement at counterfeit production sites under investigation by the police. âSeeing where counterfeit discs are manufactured has helped me see behind the curtain of what the crime syndicates are doing, which in turn has enabled us to develop innovative forensic systems and tools to develop evidence that helps bring them to justice,â he says.
âBallisticâ Forensics for Discs
In the early days, even if Microsoft was able to identify the counterfeiters, it was sometimes difficult to prove with certainty that a particular disc was counterfeit. Beyond that, it was quite difficult to prove the full extent of the criminal activity. These challenges motivated Finn and his team to develop more sophisticated forensic methods of analyzing counterfeit evidence. Microsoft also responded by developing more robust optical disc and print security features such as interactive holograms and embedded threads. âWe are now able to match counterfeit discs to the machines that produced them through what I call ballistic forensics, much like police do with markings on bullets,â says Keating. âWe are also able to âconnect the dotsâ between pieces of counterfeit to establish the distribution patterns of the crime rings.â These technology innovations led to the dismantling of the largest counterfeit ring in history in a case known as âOperation China Online.â
The China Syndicate
In a landmark case, Microsoft assisted Chinaâs Public Security Bureau and the U.S. Federal Bureau of Investigation in an investigation that led to raids in Southern China of a criminal syndicate believed to have produced more than $2 billion worth of counterfeit Microsoft software. Along with the use of forensic technologies, customers were a critical element in the investigation of this ring as more than 1,000 customers submitted counterfeit copies of their software to Microsoft, which Keating and his team were able to forensically link to the counterfeit syndicate. The counterfeit software came from 36 different countries and included 19 different versions of Microsoft products in 11 languages. Based in significant part on this powerful forensic evidence, a Chinese court convicted 11 members of the ring and sentenced them to the longest prison terms ever handed down in a software counterfeiting case in China. This case made international headlines and will be featured at the CitĂ© des Sciences et de lâIndustrie beginning today.
âThis case marked a milestone in the fight against software piracy, showcasing how governments, law enforcement and private companies can work together across borders to bring counterfeiters to justice,â said FBI Agent Jason Smolanoff. âUnfortunately, software counterfeiting is a global, illegal business without borders. Criminals may be on the other side of the globe and may not even speak the same language, but they prey upon consumers all over the world.â
* âThe Risks of Obtaining and Using Pirated Software,â IDC white paper sponsored by Microsoft, Doc # WP1006GRO, October 2006