can someone summarize this up for me?

Question by : can someone summarize this up for me?
Individuals acting alone or with friends have completed most computer “piracy” (stealing data or hijacking systems) in the past decade. But in recent years, organized software piracy and distribution centers have been on the rise. Cybercriminals generally allege that they are allowed to make copies under “fair use” provisions, but companies owning the Intellectual Property Rights (IPR) argue that the creators of the goods are losing large amounts of royalties. One cyber pirate who made news headlines is Joseph D. Konopka of Wisconsin, a one-time computer system administrator. In 2002, he was charged on a 13-count indictment involving trafficking in pirated goods (namely, Electronic Arts gaming software), an offense punishable by 10 years in prison and a $ 2 million fine. He was also charged with causing damage in excess of $ 5,000 to a protected computer owned by an Internet service provider known as Ultimate Fun World 2. This crime alone was punishable by 5 years in prison and a $ 250,000 fine. Konopka’s exploits also fell into the cyberterrorist category. Between 1998 and 2001 he attacked Wisconsin power grids with help from individuals he recruited on the Internet. Konopka also set fires, disrupted transmission towers, and disabled air traffic control software. He eventually pled guilty to six federal charges and is now in prison. Konopka is believed to be the leader of an organized band of cyber vandals known as “The Realm of Chaos.” The protection of IPR from attack by cybercriminals for many companies is critical. In recent years, a number of legal court cases have stemmed from alleged violations of the U.S. Digital Millennium Copyright Act (DMCA), enacted in October 1998. The purpose of this Act was to implement certain worldwide copyright laws to cope with emerging digital technologies. By protecting against the bypassing of encryption, the DMCA allows owners of copyrighted materials like songs or movies to make them available on the Internet in a digital format without too much concern about unauthorized copying of those works. The DMCA also maintains that anyone attempting to disable an encrypted, or protected, device should be liable for the harm caused to the tampered or stolen creative property belonging to others. In simple terms, copyright infringement is theft—taking what does not belong to them and depriving the copyright owners of royalties for the sale of their products.

Today the term “software piracy” covers a number of activities, including illegal copying of programs, counterfeiting and distributing software, installing software on more computers than one has licenses for, and informal sharing of copyrighted programs or songs with friends who do not pay for them. Often, piracy involves purchasing one legitimate piece of software or DVD and then illegally copying it a number of times and distributing it to others. “Internet piracy,” in particular, refers to using the Internet for illegally copying or distributing unauthorized software, often through vehicles such as Napster or Kazaa. Companies can stand to lose a great deal of money if they lose control of their technologies; some may even go under as a result. Worldwide, it is estimated that about 40% of all software in use has been illegally copied, and about one-fourth of the software used in businesses across the United States has been obtained illegally. Moreover, the Intellectual Property (IP) industry and law enforcement officials in the United States claim that U.S. companies lose up to $ 250 billion annually because of Internet pirates who swap digital copies of films, musical CDs, and video games.

But the owners of the product royalties are often not the only losers with cybercrime violations of this nature. A 2003 study found that over 60% of the software sold through Internet auction sites is counterfeit (i.e., pirated), and more than 90% is sold in violation of the publisher’s license agreement. Consumers getting counterfeit software often receive untested software that may have been copied hundreds or thousands of times. It may seriously infect their computer hard drives with destructive viruses or worms. Moreover, when unlicensed software is shared, consumers receive no technical support and no warranty protection with the pirated software.

Best answer:

Answer by AJ
Sure, here you go.

Individuals acting alone or with friends have completed most computer “piracy” (stealing data or hijacking systems) in the past decade. But in recent years, organized software piracy and distribution centers have been on the rise.
Today the term “software piracy” covers a number of activities, including illegal copying of programs, counterfeiting and distributing software, installing software on more computers than one has licenses for, and informal sharing of copyrighted programs or songs with friends who do not pay for them.
But the owners of the product royalties are often not the only losers with cybercrime violations of this nature. When unlicensed software is shared, consumers receive no technical support and no warranty protection with the pirated software.

AJ

Give your answer to this question below!

Get the book now