This article needs to be updated.(December 2015) |
Operation Buccaneer is an "ongoing international copyright piracy investigation and prosecution" undertaken by the United States federal government.[1] It was part of a crackdown divided into three parts: Operation Bandwidth, Operation Buccaneer and Digital Piratez.[2]
An undercover operation began in October 2000.[3] On December 11, 2001, law enforcement agents in six countries targeted 62 people suspected of violating software copyright, with leads in twenty other countries. U.S. law enforcement agents, led by the United States Customs Service, raided computers in the economics department of the Massachusetts Institute of Technology,[4] the University of California, Los Angeles, an "off-campus location" of the University of Oregon, and dorm rooms at Duke University and Purdue University.[5] Information obtained led to a subsequent raid at the Rochester Institute of Technology,[6] described by "warez gadfly 'ttol'" as one of "the two major hubs for communications between pirate groups" (along with the University of Twente in the Netherlands).[7] However, the universities themselves were not considered targets of the criminal investigation.[8] Several software companies were also raided.[6]
"The Customs Service said it had singled out DrinkOrDie because it was considered one of the most sophisticated of the rings operating within a loose, global network."[5] The DrinkOrDie site, where non-free software could be downloaded for free, was shut down the following day.[5] However, Farhad Manjoo wrote in a Wired magazine article that others were puzzled why the group was targeted; Manjoo characterized them as "small potatoes in the world of software theft", while an anonymous Australian infringer was quoted as saying, "they aren't the first to come to mind when you think to yourself 'who's the big deal in the scene?'"[9]
Around 70[3] search warrants were served and 150[5] computers were seized for analysis. Raids were also conducted in Canada, Britain, Australia, Finland, Norway and Sweden.[4][10] Other groups investigated in the operation were warez groups such as Risciso, Razor 1911, RequestToSend (RTS), ShadowRealm (SRM), WeLoveWarez (WLW) and POPZ.[11][12]
Related law enforcement actions include: Operation Fastlink, Operation Digital Gridlock, Operation D-Elite and Operation Site Down.
urbas
was invoked but never defined (see the help page).OBMain
was invoked but never defined (see the help page).