Order in the Warez Scene – Explaining an Underground Virtual Community with the CPR Framework Priyank Chandra University of Michigan Ann Arbor, USA [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

Order in the Warez Scene – Explaining an Underground Virtual Community with the CPR Framework Priyank Chandra University of Michigan Ann Arbor, USA Prch@Umich.Edu Online Behaviors #chi4good, CHI 2016, San Jose, CA, USA Order in the Warez Scene – Explaining an Underground Virtual Community with the CPR Framework Priyank Chandra University of Michigan Ann Arbor, USA [email protected] ABSTRACT have their origins in the scene. As a virtual community, it The paper analyzes the warez scene, an illegal underground consists of a distributed network of individuals working in subculture on the Internet, which specializes in removing groups under pseudonyms - their real world identities copy protection from software and releasing the cracked unknown to each other and activities not limited to any software for free. Despite the lack of economic incentives single geographical location. The groups participating in the and the absence of external laws regulating it, the warez warez scene are committing intellectual property theft and scene has been able to self-govern and self-organize for operating in unarguably illegal spaces. However, even in more than three decades. Through a directed content the face of potential legal sanctions, they have been able to analysis of the subculture’s digital traces, the paper argues successfully sustain the warez scene to bring out goods that that the ludic competition within the warez scene is an do not provide them with economic compensation for more institution of collective action, and can, therefore, be than three decades. approached as a common-pool resource (CPR). Subsequently, the paper uses Ostrom’s framework of long- On December 11, 2001, a 15 months-long investigation led enduring common-pool resource institutions to understand by the United States Customs Service together with the the warez scene’s longevity and ability to govern itself. Department of Justice culminated in Operation Buccaneer, Theoretical and design implications of these findings are the first significant law enforcement operation against these then discussed. warez groups. The raid, conducted in conjunction with international agencies, led to the simultaneous execution of Author Keywords 70 search warrants in 6 countries. Over the next two years, Virtual communities; warez scene; ludic competition; trials and guilty pleas led to around 23 convictions in USA common-pool resources; self-governance and UK along with the extradition of an Australian citizen ACM Classification Keywords [51]. This Operation was regarded to be an important step K.4.3 [Organizational Impacts]: Computer-supported in the fight against copyright piracy, with the United States collaborative work. Deputy Assistant Attorney General (DAAG) of the Criminal Division declaring in 2003 that it “has sent a INTRODUCTION strong deterrent message which continues to resonate The warez scene, or ‘the scene’, is an underground throughout the copyright piracy community” [33]. subculture that acquires legal copies of computer software, removes their copy protection, and subsequently distributes However, within a week of Operation Buccaneer, the warez them for free. It has been around since the early 80s and groups were back distributing cracked copyrighted consists of several independent groups competing with each software. Analysis of their digital traces showed them other on the speed and quantity of copyrighted software that maintaining a live-blog about Operation Buccaneer with they can crack (i.e. remove copy protection) and share regular updates on which groups were temporally amongst themselves. The groups pride themselves on their disbanding and which “will continue to release, but taking ability to release high-quality functional cracked versions of extreme precautions” [58]. By December 16, 2001, warez software (known as warez, hence the name of the group VISPER had released the game “Pocket Tanks subculture), and most pirated software across the world Deluxe Blitwise” with the message - “We’re Back” [53]. Since then there have been many similar raids attempting to Permission to make digital or hard copies of all or part of this work for personal dismantle and disrupt the warez scene. But such police or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice operations have had no effect on the quantity of warez and the full citation on the first page. being released [9] and legal authorities are no closer to Copyrights for components of this work owned by others than the author(s) shutting them down now than they were in 2001. must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific How have the norms and rules evolved to allow competing permission and/or a fee. Request permissions from [email protected]. CHI'16, May 07 - 12, 2016, San Jose, CA, USA groups within the warez scene to (mostly) remain one step Copyright is held by the owner/author(s). Publication rights licensed to ACM. ahead of software companies and legal enforcement ACM 978-1-4503-3362-7/16/05...$15.00 agencies for the last three decades? More importantly, why DOI: http://dx.doi.org/10.1145/2858036.2858341 do warez groups contribute to an online (albeit illegal) 372 Online Behaviors #chi4good, CHI 2016, San Jose, CA, USA collective in the absence of financial incentives and how are enforced formalized bureaucratic structures. Similar they able to coordinate and sustain the scene in the absence informal institutions have also been found in online of formalized organizational structures? This study seeks to communities such as Usenet [27] and Slashdot [30]. answer these questions and to do so will argue that the ludic The current study bridges the study of offline self- competition between groups in the warez scene is an governing communities and underground virtual institution for collective action, and can, therefore, be communities. Specifically, it studies how collective approached as a common-pool resource (CPR). management of reputation can become a means by which Subsequently, the study uses economist Elinor Ostrom’s order is maintained in virtual communities, which by choice [38] framework of long-enduring common-pool resource or necessity, cannot rely on laws or centralized authority. institutions to understand how the warez scene has Subsequently, through describing how non-hierarchical sustained itself and been successful in self-organization and informal interactions between warez groups have led to self-governance. complex institutions, the study will show the plausibility of RELATED WORK non-legal forms of social control in successfully sustaining Order without Law and governing robust virtual communities. Research on how communities govern themselves in the Research on the Warez Scene absence of external laws has precedence in legal and In spite of the impact of the warez scene on the software economic studies. In Ellickson’s [11] seminal work “Order industry, its secretive nature has meant that research on its without Law”, ranchers in Shasta County, USA enforced organizational structure is limited. Most research has order through an informal network of social sanctions and focused on the end-users, i.e. the demand side of pirated gossip. Here, the enforcement was outside the parameters of goods [22]. Studies on the prevalence of malware in anti- the county’s official property laws and was spontaneously copyright protection mechanisms have focused on the generated through informal interactions. Around the world, intermediate distribution steps between warez groups and social order has often been a result of local community end-users [10]. institutions rather than through external legal enforcements – communities are able to use informal mechanisms such as Hetu et al. [10] attempted to understand the online social norms to organize themselves and function smoothly community of the warez scene as a crime behavior system. in the absence of external regulation [6]. This is especially Analyzing inter-group interactions in the digital traces of true for communities that engage in illegal activity such as warez groups they establish that while most groups have the organized criminal firms [34] or pirates at sea [32]. short lifespans, the groups with high reputation are those Here, private enforcement becomes the primary tool to which have consistently provided high-quality releases to handle conflict resolutions because breaches are not the scene over extended periods. Through a social network enforceable in a court of law. Similar examples throughout analysis, they conclude that the network is relatively history have seen merchant communities using informal dispersed with no groups at its core with some local clusters reputation mechanisms to drive cooperation and enforce of groups. These findings reconfirm the nature of the warez collective punishments [15]. Robust institutions of self- scene as a distributed network with no central authority and governance that have historically been able to cope with suggest a relationship between longevity and reputation. external and internal pressures have also been observed in The only comprehensive ethnographic study of this the successful collective management of common pool community by Rehn [41] describes it as a “hypermodern resources such as forests and fisheries [38]. gift economy” on the lines of the potlatch practiced by Studies on virtual communities have looked at the role of Native Americans, where the competitive ‘giving’ of warez norms, trust, and reciprocity along with more formalized releases
Recommended publications
  • PD7040/98 Philips Portable DVD Player
    Philips Portable DVD Player 18cm/ 7" LCD 5-hr playtime PD7040 Longer movies enjoyment on the go with USB for digital media playback Enjoy your movies anytime, anyplace! The PD7040 portable DVD player features 7”/ 18cm LCD swivel screen for your great viewing experience. You can indulge in up to 5 hours of DVD/DivX®/MPEG movies, MP3-CD/CD music and JPEG photos on the go. Play your movies, music and photos on the go • DVD, DVD+/-R, DVD+/-RW, (S)VCD, CD compatible • DivX Certified for standard DivX video playback • MP3-CD, CD and CD-RW playback • View JPEG images from picture disc Enrich your AV entertainment experience • 7" swivel color LCD panel for improved viewing flexibility • Enjoy movies in 16:9 widescreen format • Built-in stereo speakers Extra touches for your convenience • Up to 5-hour playback with a built-in battery* • USB Direct for music and photo playback • Car mount pouch included for easy in-car use • Full Resume on Power Loss • AC adaptor, car adaptor and AV cable included Portable DVD Player PD7040/98 18cm/ 7" LCD 5-hr playtime Highlights MP3-CD, CD and CD-RW playback USB Direct where you have stopped the movie last time just by reloading the disc. Making your life a lot easier! MP3 is a revolutionary compression Simply plug in your USB device on the system technology by which large digital music files can and share your stored digital music and photos be made up to 10 times smaller without with your family and friends. radically degrading their audio quality.
    [Show full text]
  • A History of Video Game Consoles Introduction the First Generation
    A History of Video Game Consoles By Terry Amick – Gerald Long – James Schell – Gregory Shehan Introduction Today video games are a multibillion dollar industry. They are in practically all American households. They are a major driving force in electronic innovation and development. Though, you would hardly guess this from their modest beginning. The first video games were played on mainframe computers in the 1950s through the 1960s (Winter, n.d.). Arcade games would be the first glimpse for the general public of video games. Magnavox would produce the first home video game console featuring the popular arcade game Pong for the 1972 Christmas Season, released as Tele-Games Pong (Ellis, n.d.). The First Generation Magnavox Odyssey Rushed into production the original game did not even have a microprocessor. Games were selected by using toggle switches. At first sales were poor because people mistakenly believed you needed a Magnavox TV to play the game (GameSpy, n.d., para. 11). By 1975 annual sales had reached 300,000 units (Gamester81, 2012). Other manufacturers copied Pong and began producing their own game consoles, which promptly got them sued for copyright infringement (Barton, & Loguidice, n.d.). The Second Generation Atari 2600 Atari released the 2600 in 1977. Although not the first, the Atari 2600 popularized the use of a microprocessor and game cartridges in video game consoles. The original device had an 8-bit 1.19MHz 6507 microprocessor (“The Atari”, n.d.), two joy sticks, a paddle controller, and two game cartridges. Combat and Pac Man were included with the console. In 2007 the Atari 2600 was inducted into the National Toy Hall of Fame (“National Toy”, n.d.).
    [Show full text]
  • Computer Game Mods, Modders, Modding, and the Mod Scene
    Computer Game Mods, Modders, Modding, and the Mod Scene Walt Scacchi Institute for Software Research and Center for Computer Games and Virtual Worlds University of California, Irvine 92697-3455 USA March 2010 Abstract Computer games have increasingly been the focus of user-led innovations in the form of game mods. This paper examines how different kinds of socio-technical affordances serve to organize the actions of the people who develop and share their game mods. The affordances examined include customization and tailoring mechanisms, software and content copyright licenses, game software infrastructure and development tools, career contingencies and organizational practices of mod teams, and social worlds intersecting the mod scene. Numerous examples will be used to ground this review and highlight how such affordances can organize, facilitate or constrain what can be done. Overall, this study helps to provide a deeper understanding of how a web of associated affordances collectively serve to govern what mods get made, how modding practices emerge and flourish, and how modders and the game industry serve each others' interests, though not always in equivocal terms. Introduction Computer game mods are a leading form of user-led innovation in game design and game play experience. But modded games are not standalone systems, as they require the user to have an originally acquired or authorized copy of the unmodded game. Thus, there are questions of not only who creates what and who owns such modified games, but also whether or how the practice of game modding is controlled or governed by external parties to ultimately exploit the efforts of game modders.
    [Show full text]
  • Online Software Copyright Infringement and Criminal Enforcement
    Online Software Copyright Infringement and Criminal Enforcement Submitted: May 14, 2005 Randy K. Baldwin American University Washington College of Law What are Warez and Who Trades Them? This paper will discuss infringement of software copyrights with a focus on criminal ‘warez trading‘ of copyrighted software on the Internet. Warez are infringing electronic, digital copies of copyrighted works whose copy protection measures have been removed.1 Warez are most often ‘cracked’ software programs whose digital rights management (DRM) and copy control measures have been circumvented. Once DRM controls have been disabled, warez are subsequently distributed and traded on the Internet, usually without any direct financial gain to the distributors and traders.2 Distribution of warez usually starts as small-scale deployments from password- protected file transfer protocol (FTP) servers and encrypted and/or password-protected web sites run by warez groups. Warez are then traded on the Internet among broader groups via direct peer-to-peer (P2P) connections, and encrypted emails with warez attachments. Trading and downloading of warez is coordinated via closed, invite-only Internet Relay Chat (IRC) channels, Pretty Good Privacy (PGP) encrypted email, Instant Messaging (IM), private chat rooms, direct connect P2P networks, and messages posted to Usenet groups under pseudonyms.3 Servers and sites hosting warez and communications means used by warez traders are designed to avoid detection and identification by law enforcement.4 File and directory names are intentionally 1 Goldman, Eric, A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement. 82 Or. L. Rev. 369, 370-371 (2003). [hereinafter Road to No Warez], available at http://ssrn.com/abstract=520122 (last visited May 9, 2005) (on file with author) (Defines warez and warez trading.
    [Show full text]
  • Forensic Analysis of the Nintendo 3DS NAND
    Edith Cowan University Research Online ECU Publications Post 2013 2019 Forensic Analysis of the Nintendo 3DS NAND Gus Pessolano Huw O. L. Read Iain Sutherland Edith Cowan University Konstantinos Xynos Follow this and additional works at: https://ro.ecu.edu.au/ecuworkspost2013 Part of the Physical Sciences and Mathematics Commons 10.1016/j.diin.2019.04.015 Pessolano, G., Read, H. O., Sutherland, I., & Xynos, K. (2019). Forensic analysis of the Nintendo 3DS NAND. Digital Investigation, 29, S61-S70. Available here This Journal Article is posted at Research Online. https://ro.ecu.edu.au/ecuworkspost2013/6459 Digital Investigation 29 (2019) S61eS70 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2019 USA e Proceedings of the Nineteenth Annual DFRWS USA Forensic Analysis of the Nintendo 3DS NAND * Gus Pessolano a, Huw O.L. Read a, b, , Iain Sutherland b, c, Konstantinos Xynos b, d a Norwich University, Northfield, VT, USA b Noroff University College, 4608 Kristiansand S., Vest Agder, Norway c Security Research Institute, Edith Cowan University, Perth, Australia d Mycenx Consultancy Services, Germany article info abstract Article history: Games consoles present a particular challenge to the forensics investigator due to the nature of the hardware and the inaccessibility of the file system. Many protection measures are put in place to make it deliberately difficult to access raw data in order to protect intellectual property, enhance digital rights Keywords: management of software and, ultimately, to protect against piracy. History has shown that many such Nintendo 3DS protections on game consoles are circumvented with exploits leading to jailbreaking/rooting and Games console allowing unauthorized software to be launched on the games system.
    [Show full text]
  • Online Software Piracy of the Last Millennium.Sxw
    Online Software Piracy of the Last Millennium By Ben Garrett aka Ipggi Ever since there has been the ability to store data on a personal computer and commercial software for sale, there has been the existence of pirating. Pirating, cracking and even pirate scenes go all the way back to the late seventies, and maybe even earlier. By the early eighties some machines (such as the BBC Macro in Europe) where so riddled with pirates that the programming companies gave up. They discontinued producing and porting software for the affected computers because there was simply no money to be made. This article has been written with only the PC scene in mind. Table of Contents 1. The IBM PC Scene Beginnings Page 1 2. Bulletin Board Systems And Couriers 2 3. The Death of the Bulletin Board System and the Rise of the Internet 4 4. Software Suppliers 5 5. Text Files 5 6. Scene Art 6 7. The Emergence of Europe 6 8. The Death of the Floppy Disk 6 9. Evolution to the ISO scene 7 10.Bibliography 8 1. The IBM PC Scene Beginnings With the large amount of 8-bit computers around during the early eighties, otherwise known as the Golden Age. And then with the subsequence scenes that followed, most people will agree that the Commodore 64 scene was the greatest at the time. But the Commodore 64 1 wasn't the first computer system to have an organised international pirate scene. It was probably the Apple II users in the very late seventies 2 that can be credited with creating the first remnant of a pirate scene that would be familiar in todays internet warez world.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • Two Defendants Plead Guilty in Internet Music Piracy Crackdown
    ________________________________________________________________________ FOR IMMEDIATE RELEASE CRM FRIDAY, APRIL 20, 2007 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 TWO DEFENDANTS PLEAD GUILTY IN INTERNET MUSIC PIRACY CRACKDOWN WASHINGTON – Two defendants pleaded guilty to conspiracy to unlawfully reproduce and distribute copyrighted music over the Internet, Assistant Attorney General Alice S. Fisher of the Criminal Division and U.S. Attorney Chuck Rosenberg of the Eastern District of Virginia announced today. Arthur Gomez, 25, of La Habra, Calif., pleaded guilty before U.S. District Judge Leonie M. Brinkema. His sentencing has been scheduled for July 13, 2007 at 9:00 a.m. Sergey Ribiakost, 21, of Bardonia, N.Y., pleaded guilty on April 17, 2007, before U.S. District Judge James C. Cacheris. His sentencing is scheduled for July 10, 2007, at 1:00 p.m. Both defendants pleaded guilty to one count of conspiracy to commit copyright infringement and face up to five years in prison, a fine of $250,000, and three years of supervised release. Gomez and Ribiakost were leading members in the illegal software, game, movie and music trade online, commonly referred to as the warez scene. The defendants were active members of the pre-release music group Apocalypse Crew (APC), one of a handful of organized online criminal groups that acted as “first-providers” of much of the pirated music available on the Internet. As a pre-release music group, APC sought to acquire digital copies of songs and albums before their commercial release in the United States. The supply of such pre-release music was often provided by music industry insiders, such as radio DJs, employees of music magazine publishers, or workers at compact disc manufacturing plants, who frequently receive advance copies of songs prior to their commercial release.
    [Show full text]
  • 79385 AMA Conference Cover:Mppcover2
    79385_AMA_conference Cover:MPPCover2 4/17/08 4:53 PM Page 1 2008 MARKETING and 2008 PUBLIC POLICY Conference Proceedings MARKETING VOLUME 18 and EDITORS PUBLIC POLICY John Kozup Charles R. Taylor Ronald Paul Hill Conference Proceedings May 29–May 31, 2008 Loews Hotel Philadelphia, Pennsylvania VOLUME 18 Life, Liberty, and the Pursuit of Sound Policy: Research at the Birthplace of Our Democracy Marketing and Public Policy Conference Proceedings 2008 “Life, Liberty, and the Pursuit of Sound Policy: Research at the Birthplace of Our Democracy” May 29–31, 2008 Loews Hotel Philadelphia, Pennsylvannia Editors: John Kozup Charles R. Taylor Ronald Paul Hill Volume 18 311 South Wacker Drive, Suite 58 • Chicago, Illinois 60606 PROGRAM COMMITTEE Natalie Adkins, Creighton University Gregory T. Gundlach, University of North Florida Kathryn Aikin, Food and Drug Administration Jane Hoek, Massey University Alan Andreasen, Georgetown University Jeanne Hogarth, Federal Reserve Board J. Craig Andrews, Marquette University Pauline Ippolito, Federal Trade Commission Lauren Block, Baruch College/CUNY Alan Levy, Food and Drug Administration Paul N. Bloom, Duke University Ingrid M. Martin, California State Univ. Long Beach Scot Burton, University of Arkansas Rob Mayer, University of Utah Jack Calfee, American Enterprise Institute Michael Mazis, American University Les Carlson, Clemson University Julie Ozanne, Virginia Polytechnic Institute Mary Culnan, Bentley College Janis K. Pappalardo, Federal Trade Commission Pam Scholder Ellen, Georgia State University Connie Pechman, University of California, Irvine Gary Ford, American University Ross Petty, Babson College Copyright © 2008, American Marketing Association Printed in the United States of America Composition by Marie Steinhoff, Southeast Missouri State University Cover design by Jeanne Nemcek ISBN: 0-87757-332-8 All rights reserved.
    [Show full text]
  • Oil Wells Seized in ICE Money Laundering Case
    Oil Wells Seized In ICE Money Laundering Case n ICE investigation into a drug Amoney laundering scheme resulted 3 Red Flag Indicators in the January 25 seizure of an Arizona • Frequent or unusual use of trust funds in oil company and 43 oil wells in business transactions or financial activity. northwest Pennsylvania. • Financial transactions to countries known to be tax havens. A number of the company’s trusts and • Frequent use of nominee business owners acting bank accounts in Europe were also seized as representatives in transactions. as a result of the investigation, which stemmed from the 1981 drug smuggling The seized company, Shaboom Oil Inc., conviction of Paul Hindelang. headquartered in Phoenix, Arizona, owned numerous operating wells and Safeguarding America Through “Like no other case in recent memory, this held the mineral rights to approximately Financial And Trade Investigations investigation demonstrates our perseverance in tracking down the ill-gotten gains of 1,100 acres of land in the Allegheny Volume II: No. 1 • February 2005 international crime lords,” said Jesus Torres, National Forest in northwest Pennsylvania. ICE’s Special Agent-in-Charge for Miami. In addition, ICE seized all ownership Inside this Issue shares of Shaboom Investments Inc., In the 1970s, Hindelang headed one of the a holding company based in Panama Cornerstone Investigations Updates: country’s biggest marijuana smuggling that owns the oil company. Selected Recent Cases . 2 enterprises, operating out of Florida. He Industry Alert: Stopping The Flow pled guilty to importing roughly 250 tons The oil company and associated assets seized Of Counterfeit Drugs . 3 of marijuana into the United States and in January were valued at $6.5 million— conspiring to import an additional bringing the total seized from Hindelang’s ICE Agents Honored For illicit investments to more than $70 mil- Intellectual Property Protection .
    [Show full text]
  • Piracy Landscape Study
    Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy Prepared for the U.S. Patent and Trademark Office Solicitation Number: 1333BJ19Q00142004 Brett Danaher Michael D. Smith Rahul Telang Chapman University Carnegie Mellon University Carnegie Mellon University This Version: March 20, 2020 Table of Contents Executive Summary ...................................................................................................................... 3 1. The Piracy Ecosystem........................................................................................................... 4 1.1 Piracy of Physical Goods................................................................................................ 6 1.1.1 Manufacturing......................................................................................................... 7 1.1.2 Discovery ................................................................................................................ 7 1.1.3 Distribution ............................................................................................................. 8 1.1.4 Communication, Payment Processing and Fulfillment ......................................... 11 1.2 Piracy of Digital Goods ................................................................................................ 11 1.2.1 Sources.................................................................................................................. 12 1.2.2
    [Show full text]