Language Selection

English French German Italian Portuguese Spanish

Video game pirate headed to slammer

Filed under

A Maryland man has been sentenced to four months behind bars for helping to organize a software and hardware piracy scheme out of a chain of video game stores.

Hitesh Patel, one of a group of employees and managers from the three-store Pandora's Cube chain in Maryland, pled guilty and was sentenced to four months in prison, said Rick Hirsch, senior vice president for intellectual property enforcement at the Entertainment Software Association. According to the ESA, Patel was charged with conspiracy to commit felony copyright infringement and for violating the Digital Millennium Copyright Act.

Hirsch said that Patel and several colleagues, including Pandora's Cube owner Biren Amin, had been selling modified Xboxes that let players use pirated console games. Hirsch said Pandora's Cube was also selling modified Xboxes preloaded with pirated games.

Amin, who was also convicted and faces his own sentencing in the coming weeks, would not comment about his case or Patel's.

But a clerk for the U.S. District Court for the District of Maryland confirmed that Patel had been sentenced on July 19, though the judge in the case, Peter Messitte, had yet to formally put through the sentencing papers.

Hirsch said the ESA, a Washington, D.C.-based group that lobbies for the video game industry, complained about the piracy to the U.S. Bureau of Immigration and Customs Enforcement agency. That agency, along with the U.S. Department of Justice's Computer Crimes and Intellectual Property Section, or CCIPS, then conducted a months-long investigation for raiding Pandora's Cube stores in December, Hirsch said.

A CCIPS employee contacted on Wednesday declined to comment on the case.

Hirsch said he wasn't surprised that Patel had pleaded guilty.

"They pretty much were caught red-handed," he said. "I don't think there was any dispute of the facts of what they were doing."

Hirsch said that the Pandora's Cube defendants were hardly the only ones in the United States selling Xboxes modified to allow the storage or playing of pirated games.

"I think there are a number of similar operations around the country, most of them doing it on a more covert basis than Pandora's Cube," he said. "But I think this creates a message for people engaged in these operations who think they are not really vulnerable to having anybody do anything about this."

By Daniel Terdiman

More in Tux Machines

New KNOPPIX Release, LibreOffice 5.1.6, Rosa Down

In Linux news today KNOPPIX 7.7.1 was released to the public based on Debian with GNOME 3.22, KDE 5.7.2, and "Everything 3D." The Rosa project is experiencing network issues and folks may experience problems trying to connect to their services the next few days. LibreOffice 5.1.6 was announced today by The Document Foundation, the sixth update to the Still branch for stable users, and a new vulnerability was disclosed in GNU Tar. Read more

FOSS Security

  • European Parliament votes to extend Free Software security audits
    Remember how I raised €1 million to demonstrate security and freedom aren’t opposites? Well here’s what happened next and how we are going to move forward with this. In 2014, two major security vulnerabilities, Heartbleed and Shellshock, were discovered. Both concerned Free Software projects that are widely used throughout the Internet, on computers, tablets, and smartphones alike. My colleague Max Andersson from the Swedish Greens and I proposed a so-called “pilot project”, the Free and Open Source Software Audit (FOSSA).
  • Princeton Upskills U on Open Source Security
    During Wednesday's Upskill U course, lecturer Gary Sockrider, principal security technologist for Arbor Networks , explained the history of DDoS attacks, case studies of recent attacks, and the business impact of these security threats. DDoS attacks not only raise operational expenses, but can also negatively affect an organization's brand, and result in loss of revenue and customers. (Listen to Security: Tackling DDoS.) "Having visibility is key, you can't stop something you can't see. Having good visibility across your own network is vital in finding and stopping these attacks," said Sockrider. "You can leverage common tools and technology that are already available on the network equipment you own today such as flow technologies, looking at SIP logs … Obviously you'll want to get to some specific intelligent DDoS mitigation in the end."

Android Leftovers

Linux Mint 18.1 Slated to Launch Later This Year, Will Be Codenamed “Serena”

Just a few minutes ago, Linux Mint project leader Clement Lefebvre announced the codename of the next Linux Mint release, versioned 18.1, along with a bit of information regarding its release date and upgrade possibility from previous versions. Read more