Feeds

Pirates, conmen target PlayStation 2 buyers

Even as buyers' bots bring vendor Web sites to their knees

  • alert
  • submit to reddit

The essential guide to IT transformation

Consumers are so desperate to own a PlayStation 2, they're risking log-jamming the Net and - worse - becoming victims of any of a multitude of online scams.

With Sony's next-generation console still in hideously short supply, some would-be PlayStation 2 owners are using intelligent agent software to track down the best prices.

Intelligent agents - also known as robots - were hailed a couple of years back as the solution to Web-induced information overload. Now, they're having the reverse effect: at least two PlayStation 2 vending sites have blamed unscheduled downtime on bot action.

US sites Gohastings.com and BlueLight.com - the latter owned by Kmart - said recent crashes were due to agent software repeatedly polling their servers for the latest PlayStation price data, according to CNet.

"We sat there and watched the site get 80,000 hits in a period of minutes," said a BlueLight.com spokesman. "It's clear to us that there are people using 'bots to scan the site for the PlayStation 2."

Agent software - such as the commonly used PS2finder and InStockBot - can also scan the vast number of online auctions for PlayStation 2s on offer. What they can't do, however, is check whether such offers are legitimate. An increasing number of them aren't, police have warned.

In Los Angeles, for example, police are investigating allegations that one man made nearly $1 million hoodwinking 2500 people into buying PlayStation 2s he didn't actually have to sell.

Earlier this month Web watchdog The Better Business Bureau warned customers against ordering PlayStation 2s from The PlayStation Store, a subsidiary of Canadian-based CIS Networks, after it received complaints citing unfulfilled orders. The PlayStation Store is not a Sony-authorised reseller.

This side of the pond, fears centre on a flood of fake PlayStation 2 game CDs. Last week, Irish police uncovered an illicit disc pressing plant used to churn out pirate games. Profits from the plant were used to fund the Real IRA, the dissident Republican outfit behind the Omagh bombing.

And this week, London Trading Standards officers uncovered stacks of pirate PlayStation 2 CDs when they raided a Soho sex shop. ®

Related Stories

Real IRA gets into computer piracy
PlayStation 2 e-tail warning in US and Canada

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.