Feeds

Microsoft forgers get jail time in Taiwan

Syndicate controlled '90 per cent' of all fakes

3 Big data security analytics techniques

A counterfeiting operation that Microsoft claims was responsible for 90 per cent of faked Microsoft software has been sent up the river in Taiwan.

If the statistic is to be believed, nearly the entire worldwide distribution of "high-quality" Microsoft forgeries have been destroyed with the sentencing of Huang Jer-sheng and his underlings late last month.

(No word on the less publicized war against low-quality copies such as Microblorft Mindows and Axesell.)

Jer-sheng was the owner of Taipei-based Maximus Technology, an operation fingered for selling pirated software to over 600 cities in 22 countries between 1997 and 2003. Authorities say the software is worth an estimated $900 million.

Jer-sheng was sentenced to four years in prison for making fakes — the longest amount of jail time given for this type of crime in Taiwan's history, according to Microsoft. Three co-defendents in the case received 18 months to three years in jail. Six individuals were originally arrested.

Maximus Technology worked with counterfeiters in both Taiwan and southern China. Two CD replication plants in Taiwan were the main production centers for the forged discs and components. The counterfeiters made at least 21 Microsoft software products in seven languages, pawning the products to unwitting resellers and consumers.

"The criminals behind counterfeit syndicates are organized, resourceful and willing to spend large amounts of money to develop and ship pirated goods to markets all over the world," said John Newton, manager of the intellectual property coppers at INTERPOL. "Piracy is a crime, pure and simple, and it is imperative we coordinate our efforts across the globe to stop these criminal syndicates and this illicit trade."

Microsoft has always been vocal about stamping out counterfeit software operations. The company has aggressively sought prison terms for software fakers in China, Germany, the United Kingdom and the United States. It's also fought an equally venomous war against the so-called 'grey market', where branded goods bought in one country are sold elsewhere at a marked-down price.

In case you're losing sleep over it, you can make sure your software was properly blessed and sanctified at Redmond using Microsoft's handy How To Tell website. ®

SANS - Survey on application security programs

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.