Operation Buccaneer

Last updated

Operation Buccaneer is an "ongoing international copyright piracy investigation and prosecution" undertaken by the United States federal government. [1] It was part of a crackdown divided into three parts: Operation Bandwidth, Operation Buccaneer and Digital Piratez. [2]

Contents

An undercover operation began in October 2000. [3] On December 11, 2001, law enforcement agents in six countries targeted 62 people suspected of violating software copyright, with leads in twenty other countries. U.S. law enforcement agents, led by the United States Customs Service, raided computers in the economics department of the Massachusetts Institute of Technology, [4] the University of California, Los Angeles, an "off-campus location" of the University of Oregon, and dorm rooms at Duke University and Purdue University. [5] Information obtained led to a subsequent raid at the Rochester Institute of Technology, [6] described by "warez gadfly 'ttol'" as one of "the two major hubs for communications between pirate groups" (along with the University of Twente). [7] However, the universities themselves were not considered targets of the criminal investigation. [8] Several software companies were also raided. [6]

"The Customs Service said it had singled out DrinkOrDie because it was considered one of the most sophisticated of the rings operating within a loose, global network." [5] The DrinkOrDie site, where non-free software could be downloaded for free, was shut down the following day. [5] However, Farhad Manjoo wrote in a Wired magazine article that others were puzzled why the group was targeted; Manjoo characterized them as "small potatoes in the world of software theft", while an anonymous Australian infringer was quoted as saying, "they aren't the first to come to mind when you think to yourself 'who's the big deal in the scene?'" [9]

Around 70 [3] search warrants were served and 150 [5] computers were seized for analysis. Raids were also conducted in Canada, Britain, Australia, Finland, Norway and Sweden. [4] [10] Other groups investigated in the operation were warez groups such as RiSC, RAZOR1911, RequestToSend (RTS), ShadowRealm (SRM), WeLoveWarez (WLW) and POPZ. [11] [12]

Related law enforcement actions include: Operation Fastlink, Operation Digital Gridlock, Operation D-Elite and Operation Site Down.

Quotations

"This investigation underscores the severity and scope of a multibillion-dollar software swindle over the Internet, as well as the vulnerabilities of this technology to outside attack."
Robert C. Bonner, commissioner of the Customs Service
"Our targets are not your stereotypical teenage hacker."
Customs assistant commissioner John Varrone
"This is not a sport. This is a serious crime. These people should do some hard time." [13]
Commerce undersecretary Phil Bond
"Software piracy undermines the stability of the burgeoning e-commerce industry and it is a direct threat to innovative companies that help strengthen the U.S. economy."
Deputy U.S. Treasury Secretary Kenneth Dam
"This investigation only assist the multibillion-dollar companies to swindle you, the avid consumer, as well as the vulnerable people that deem information should be free, sure we would like people to buy the games they test play, but it doesn't happen because people have to pay #$ a gallon for gas and shit. Technology is to be used for the good of all, not some fat ass company man who doesn't know the first thing from a rar to a iso...... Gravy is awful good."
buj, Member of razor 1911

Felony convictions

As of October 2002, 17 [14] people have been convicted of felonies in the United States, with 13 given federal prison terms of up to 46 months. [1] In addition, Australian resident Hew Raymond Griffiths, the self-admitted leader of DrinkorDie, [15] fought extradition to the United States for almost three years, but eventually lost and was sentenced to 51 months, though he was credited for the time served in an Australian jail.

In the United Kingdom, six were formally charged. [16] In May 2005, some DrinkorDie members were the first to be sentenced in the United Kingdom as a result of Operation Buccaneer. [17]

Convictions in the United States [11]
NameScenenameConviction dateOffenseSentence
Berry, RichardFloodApril 29, 2002Conspiracy
Buchanan, AnthonyspaceaceAugust 19, 2002Criminal copyright infringement
Clardy, AndrewDoodadApril 4, 2002Criminal copyright infringement
Aiding and abetting
Cole, Myront3rminalJuly 10, 2002Criminal copyright infringement
Eiser, DerekPsychodJune 21, 2002Criminal copyright infringement
Erickson, BarryRadslMay 2, 2002Conspiracy
Grimes, David A.ChevelleMarch 4, 2002Conspiracy
Gross, RoberttargetpracticeMay 22, 2002Criminal copyright infringement
Hunt, NathanAzideApril 3, 2002Conspiracy
Kartadinata, KentTenkukenJanuary 31, 2002Conspiracy
Kelly, MichaelEruptApril 10, 2002Conspiracy
Nawara, StaceyAvecMarch 19, 2002Conspiracy
Nguyen, MikeHackratJanuary 31, 2002Conspiracy
Pattanayek, SabujBujApril 11, 2002Conspiracy41 months [16]
Riffe, JohnblueMay 9, 2002Criminal copyright infringement
Sankus, John Jr.eriFlleHFebruary 27, 2002Conspiracy46 months [18]
Tresco, ChristopherBigRarMay 28, 2002Conspiracy33 months [19]

Raid locations

CountriesUnited States cities

See also

Related Research Articles

<span class="mw-page-title-main">Warez</span> Movies, software or music distributed in violation of copyright

Warez is a common computing and broader cultural term referring to pirated software that is distributed via the Internet. Warez is used most commonly as a noun, a plural form of ware, and is intended to be pronounced like the word wares. The circumvention of copy protection (cracking) is an essential step in generating warez, and based on this common mechanism, the software-focused definition has been extended to include other copyright-protected materials, including movies and games. The global array of warez groups has been referred to as "The Scene", deriving from its earlier description as "the warez scene". Distribution and trade of copyrighted works without payment of fees or royalties generally violates national and international copyright laws and agreements. The term warez covers supported as well as unsupported (abandonware) items, and legal prohibitions governing creation and distribution of warez cover both profit-driven and "enthusiast" generators and distributors of such items.

<span class="mw-page-title-main">Fairlight (group)</span> Swedish demo group

FairLight (FLT) is a warez and demo group initially involved in the Commodore demoscene, and in cracking to illegally release games for free, since 1987. In addition to the C64, FairLight has also migrated towards the Amiga, Super NES and later the PC. FairLight was founded during the Easter holiday in 1987 by Strider and Black Shadow, both ex-members of West Coast Crackers (WCC). This "West Coast" was the west coast of Sweden, so FairLight was initially a Swedish group, which later became internationalized. The name was taken from the Fairlight CMI synthesizer which Strider saw Jean-Michel Jarre use on some of his records.

Topsite is a term used by the warez scene to refer to underground, highly secretive, high-speed FTP servers used by release groups and couriers for distribution, storage and archiving of warez releases. Topsites have very high-bandwidth Internet connections, commonly supporting transfer speeds of hundreds to thousands of megabits per second; enough to transfer a full Blu-ray in seconds. Topsites also have very high storage capacity; a total of many terabytes is typical. Early on these warez sites were mainly distributing software such as games and applications after the release groups removed any protections. Now they are also a source of other copyright protected works such as movies and music. It is strictly prohibited for sites to charge for access to the content, due to decreased security, and sites found doing so are shunned by the topsite community.

A warez group is a tightly organised group of people involved in creating and/or distributing warez such as movies, music or software ("warez") in The Scene. There are different types of these groups in the Scene: release groups and courier groups. Groups often compete, as being the first to bring out a new quality release can bring status and respect – a type of "vanity contest". The warez groups care about the image others have of them.

Operation Fastlink is a coordination of four separate, simultaneous undercover investigations by the Federal Bureau of Investigation (FBI) Cyber Division, the Department of Justice, the Computer Crimes and Intellectual Property Section (CCIPS) of the Criminal Division and Interpol. The four different investigations have not been publicly enumerated, but the U.S. Department of Justice has said in at least one press release that "Operation Higher Education" is the largest component, with participation from twelve nations. Mention has also been made of an investigation into pre-release music groups led by FBI agents from the Washington Field Office. As of March 6, 2009, the FBI states that Operation Fastlink has yielded 60 convictions. The raids occurred in similar fashion to those from Operation Buccaneer and Operation Site Down. Other somewhat-related law enforcement actions include Operation Gridlock and Operation D-Elite.

CLASS (CLS) was a notorious and prolific warez group that existed between January 1, 1997, and January 9, 2004. The group was the target of federal raids such as Operation Fastlink. They specialized in cracked games, and sometimes had elaborate art in the cracktro or release. They were a global group and had many members worldwide. Class used their group abbreviation, CLS, as a suffix at the end of the files they released.

Echelon is a warez group which specializes in the illegal release and distribution of copyrighted console games, such as Dreamcast and PlayStation 2 ISO images. They also created demos on both platforms.

<span class="mw-page-title-main">Pirates with Attitudes</span> Former warez organization

Pirates With Attitudes (PWA) was a major international warez release group between 1992 and 2000. The group was established by two former International Network of Crackers members known by the pseudonyms Orion and BarManager. PWA was also very well known during the tail end of the BBS-era for their development of modifications and enhancements ("mods") for the PCBoard BBS software.

Hew Raymond Griffiths has been accused by the United States of being a ring leader of DrinkOrDie or DOD, an underground software infringement network, using the online identity of "Bandido". Griffiths was living in Berkeley Vale in the Central Coast Region of NSW, Australia before he was placed on remand at Silverwater Correctional Centre. After fighting extradition for almost 3 years, Griffiths was finally extradited from Australia to the United States and on 20 February 2007, he appeared before Magistrate Judge Barry R. Portez of the U.S. District Court in Alexandria, Virginia. On 20 April, it was announced by the U.S. Department of Justice that Griffiths had entered a plea of guilty.

Kalisto is a console warez group established in March 1998, a subsidiary of Fairlight, which specializes in the release and distribution of PlayStation (PS1) and PlayStation 2 (PS2) ISO images, briefly moonlighting on the Dreamcast platform in mid to late 2000.

<span class="mw-page-title-main">Operation D-Elite</span> Federal operation against torrent tracker site

Operation D-Elite was an operation by agents of the United States' Federal Bureau of Investigation and Immigration and Customs Enforcement agency against leading members of EliteTorrents, a BitTorrent tracker site, resulting in five months of prison, five months of home arrest, and a $3,000 fine against Grant T. Stanley on October 17, 2006. Another administrator of the site, Scott McCausland, received the same sentence on December 19, 2006.

Operation Safehaven was a fifteen-month investigation conducted by the United States Immigration and Customs Enforcement ("ICE") in conjunction with the U.S. Attorney's Office for the District of Connecticut and the Department of Justice against those affiliated with the warez scene.

Apocalypse Production Crew was a major MP3 warez organization founded by two individuals known under the pseudonyms acid^rain and Viper in May 1997. aPC operated well into the mid-2000s and was subject to raid during Operation Fastlink—a coordination of four separate simultaneous undercover investigations by the FBI, the FBI Cyber Division, the U.S. Department of Justice, the Computer Crimes and Intellectual Property Section (CCIPS) of the Criminal Division and Interpol. aPC was known to many as the first organized group to put mp3s onto the internet. Their efforts predated the scene and started with composing MIDI versions of popular songs.

RISC-ISO was an online warez group, founded in approximately 1993, dedicated to distributing newly released copyrighted software, games and movies. The acronym "RISC" stood for Rise in Superior Couriering, and "ISO" referred to a file format commonly used for the storage and transfer of disc images although the group RISC and RiSCiSO were two completely separate groups. The organization operated until the Operation Site Down raids in the summer of 2005. American authorities are still searching for the organization's ring leader Sean Patrick O'Toole, after he failed to appear in an American court in February 2006. He placed a call to his friend and group leader Sandy Fury, wishing her a happy birthday and an apology and then disappeared at Heathrow Airport.

Myth was a warez group, focused on cracking and ripping PC games. Besides ripped games, the group also released trainers and cracked updates for games. Myth's slogan, "Myth, always ahead of the Class", was referring to the rival group class that existed from 1997 to 2004.

Operation Site Down is the umbrella name for a law enforcement initiative conducted by the United States' FBI and law enforcement agents from ten other countries which resulted in a raid on targets on June 29, 2005. Three separate undercover investigations were involved, based in Chicago, Charlotte and San Jose. The raid consisted of approximately 70 searches in the U.S. and approximately 20 others in ten other countries in an effort to disrupt and dismantle many of the leading Warez groups which distribute and trade in copyrighted software, movies, music and games on the Internet.

<span class="mw-page-title-main">DrinkOrDie</span> Software piracy organization

DrinkOrDie (DoD) was one of the most prestigious underground software piracy group and warez trading network during the 1990s. On 11 December 2001 a major law enforcement raid - known as Operation Buccaneer - forced it to close under criminal charges of infringement. DoD, as a rule, received no financial profit for their activities. The DoD network - which primarily consisted of university undergraduates - was also supported by software company employees, who leaked copies of software and other digital media. DoD was also actively involved in illicit file-trading with other networks.

Video game piracy is the unauthorized copying and distributing of video game software, and is a form of copyright infringement. It is often cited as a major problem that video game publishers face when distributing their products, due to the ease of being able to distribute games for free, via torrenting or websites offering direct download links. Right holders generally attempt to counter piracy of their products by enforcing the Digital Millennium Copyright Act, though this has never been totally successful. Digital distribution of pirated games has historically occurred on bulletin board systems (BBS), and more recently via decentralized peer-to-peer torrenting. In terms of physical distribution, Taiwan, China and Malaysia are known for major manufacturing and distribution centers for pirated game copies, while Hong Kong and Singapore are major importers.

<span class="mw-page-title-main">Razor 1911</span> Norwegian warez and demogroup

Razor 1911 (RZR) is a warez and demogroup founded in Norway, 1986. It was the first ever such group to be initially founded exclusively as a demogroup, before moving into warez in 1987. According to the US Justice Department, Razor 1911 is the oldest software cracking group that is still active on the internet. Razor 1911 ran the diskmag 'Propaganda' until 1995.

References

  1. 1 2 "Operation Buccaneer: Overview". Computer Crime & Intellectual Property Section, United States Department of Justice. Archived from the original on December 30, 2011. Retrieved January 1, 2012.
  2. Wilson P. Dizard, III (2002-01-21). "Software piracy probe slowed by evidence glut: Prosecutors are reviewing 50T of data, plus leads from pirates who are cooperating with them, in a global 'warez' crackdown. (Law Enforcement)". Government Computer News. 1105 Media, Inc. 21 (2).
  3. 1 2 "Operation Buccaneer: The Investigation". Computer Crime & Intellectual Property Section, United States Department of Justice. Archived from the original on April 16, 2009. Retrieved January 1, 2012.
  4. 1 2 "MIT cooperating in six-nation computer piracy raid". MIT News. December 12, 2001. Retrieved January 2, 2012.
  5. 1 2 3 4 Philip Shenon (December 12, 2001). "Internet Piracy Is Suspected as U.S. Agents Raid Campuses". The New York Times .
  6. 1 2 Philip Shenon (December 19, 2001). "U.S. Expands Investigation Into Piracy of Software". The New York Times.
  7. Robert Lemos (December 19, 2001). "FBI raids cripple software pirates". CNET . Retrieved January 5, 2012.
  8. Greg Farrell (December 12, 2001). "U.S. seizes computers in software piracy raids". USA Today .
  9. Farhad Manjoo (December 13, 2001). "Were DrinkOrDie Raids Overkill?". Wired magazine. Retrieved January 5, 2012.
  10. Jasper Koning (December 20, 2001). "Dutch university targeted in piracy raids". CNET . Retrieved January 2, 2012.
  11. 1 2 Urbas, G. (2007). "Cross-national investigation and prosecution of intellectual property crimes: The example of "Operation Buccaneer"". Crime, Law and Social Change. 46 (4–5): 207–221. doi:10.1007/s10611-007-9060-x. S2CID   145094409.
  12. US Department of Justice. "Operation Buccaneer". Archived from the original on 2011-07-22.
  13. "Feds Zero In on Piracy Ring". Associated Press. December 11, 2001. Retrieved January 5, 2012.
  14. "Operation Buccaneer: Defendants". Computer Crime & Intellectual Property Section, United States Department of Justice. Archived from the original on February 4, 2012. Retrieved January 1, 2012.
  15. "Elder of internet piracy talks to Lateline". Australian Broadcasting Corporation. April 29, 2008. Retrieved January 2, 2012.
  16. 1 2 "Member of "DrinkOrDie" Warez Group Sentenced to 41 Months". United States Attorney (Eastern District of Virginia) Paul J. McNultey, U.S. Department of Justice. July 2, 2002. Archived from the original on February 4, 2012. Retrieved January 1, 2012.
  17. Peter Sommer (May 19, 2005). "Cybercrime fight under-funded as millions 'wasted' on software piracy convictions". Computer Weekly. Retrieved January 2, 2012.
  18. "Warez Leader Sentenced to 46 Months". United States Attorney (Eastern District of Virginia) Paul J. McNultey, U.S. Department of Justice. May 17, 2002. Archived from the original on December 9, 2011. Retrieved January 2, 2012.
  19. "Software piracy group member gets 33 months in prison". Computer Weekly magazine. August 21, 2002. Retrieved January 2, 2012.