Feeds

MS Counterfeit gang gets ten years in jail

Big league pirates

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Three people have been jailed for a total of 10 years for their involvement in a multi-million pound software counterfeiting ring.

The trio, who were convicted on March 16 for conspiracy to defraud Microsoft, sat impassively in the dock as Her Honour Judge Pearlman, passed stiff sentences which reflected their involvement in a fraud that netted them an estimated £1.5 million.

"This was a conspiracy aggravated by the clever devices you used to deceive and the fact you continued the operation after being arrested," Judge Pearlman said. "You were all playing for high stakes."

The Judge sentenced the gang to sentences which she said reflected the serious nature of the offence, as well as acting as a deterrent to others. She also suggested that companies who suffered loses due to the counterfeit operation were likely to lose staff as a result. Among the gang's victims were St Albans City District Council in Hertfordshire which unwittingly bought thousands of pounds of software from the counterfeiters.

The gang's mastermind, married father-of-three Sikander Qureshi, 55, of Stanmore, north London was sentenced to 4 1/2 years in prison for conspiracy to defraud. Zafar Ahmed, 40, from East Ham in east London was sentenced to two-and-a-half years for the same offence, with half his sentence suspended.

Shaheen Parveen, 42, from Kingsbury, north west London received a four year jail term for fraud with 3 months to be served concurrently for attempting to pervert the course of justice. Her brother Babar Manzoor, 25, jumped bail before fleeing to his native Pakistan.

Investigators stumbled onto the gang's activities after Customs officers at Heathrow got a lucky break and intercepted a package full of fake MS software, sent from a business address in Thailand to Qureshi's accountancy firm in Shoreditch High Street, London.

The parcel was sent to Qureshi but when it arrived Hackney trading standards team swooped and grabbed counterfeit software CDs, and a shrink-wrapping machine. The National Crime Squad joined in the investigation and caught the team on CCTV camera visiting their lock-up.

Raids on the Ahmed's and Parveen's homes and the storage units revealed an Aladdin's cave of counterfeiting material. Thousands of counterfeit CDs, various packaging material and Microsoft authenticity certificates - which had been stolen by armed raiders from a printing factory in Scotland, were recovered.

Various companies had been set up by the gang to market and sell the fake software, but these not be linked to the operation's ringleader Qureshi, who claimed in court to be a good friend of the husband of Pakistan's deposed leader Benazir Bhutto (Asif Ali Zardari). His wife appears on the Asian TV station ZTV.

Even after the gang was first arrested at the end of 1998 they still tried to carry on their illegal operation but this only resulted in them been arrested again and the confiscation of more evidence by police.

Qureshi and Parveen had been held in custody after breaking bail restrictions. Police caught them hiding in a wardrobe at Parveen's house.

Bank records suggest the gang made more than £1.5 million in profits but only £96,000 in cash was ever recovered. ®

Related stories:
Major UK software pirates found guilty

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.