Written by Abigail Garner and Samir Nassar

Buying original computer programs directly from the manufacturer is a significant expense. Meanwhile, the computer shop in your neighborhood is selling copies for just a few dollars. The disc from the local computer store looks different—it is plain with only the name of the program scribbled on it with a permanent marker. But besides lacking the official logo of the manufacturer, if you buy a copy from your local shop, it’s not different from the original program, right? Wrong!

Those cheap computer program discs distributed by small vendors in many parts of the world—including the Middle East—are unlicensed and unregulated. A common term for this practice is “pirated” software. For activists who are organizing around human rights for LGBTQI people—especially in countries where homosexuality is criminalized—pirated software is a dangerous gamble that jeopardizes the safety and freedom of everyone in their networks.

Inviting Trouble

When you compare the cost of original software to the pirated copies you can buy at the local shop, paying 10 times more for the original feels like the foolish choice. Why pay more? Here’s why: the people who profit from selling pirated software are part of a system that compromises the integrity of the computer programs in every way possible. Such compromises are necessary in order to get unlicensed copies down to a low price while still remaining profitable to the unauthorized sellers. When we, as consumers, focus only on the price, we’re not thinking about the extra malicious programs we don’t want that could be installed automatically along with the program we do want.

One particularly serious example of destruction is pirated operating systems (such as Windows) or pirated anti-virus software that actually contain malware. Simply by inserting the disc into your device, you are unknowingly installing malware on the deepest levels of your system—and in a way that disguises the malware so well that it is not easily removable, even by most technical experts.

Weighing the Costs

Even when people are aware of these risks, it’s easy to believe such damage won’t happen to your system. It is rather normal to minimize these serious risks, considering that unlicensed software is so ubiquitous in many Middle East cities where it a normal practice for even established organizations to purchase pirated software on equipment used by employees as a cost-savings measure. The motivation to stretch an organization’s budget is even greater when—as is the case within LGBTQI communities—the organization is working outside of traditional social systems and has little to no financial resources.

If your organization thinks that saving money is the top priority, think about “cost” in a different way when acquiring new computer programs:

  • What is the value of all of your data? What would it cost to your organization if malware were installed on your network, and all of your documents, photos, and databases disappeared permanently?
  • What is the value of your community’s privacy? What might happen if your email correspondence or your membership database was stolen and publicized?

The responsible alternatives to pirated software are paying the real price for licensed software, or using free, open source software downloaded directly from reputable open-source developers.

The ubiquitous, unregulated industry of pirated software will continue to tempt computer users, especially when financial resources are low. But when you are working with sensitive data, the real cost of installing pirated software is a high risk you cannot afford.

Abigail Garner is an independent editor, and author of the non-fiction book, Families Like Mine. She is currently a fellow at the Centre for Internet and Human Rights.

 

This blog post was written for Arab Foundation for Freedoms and Equality as part of their Security Blog. This post may not be republished before 1 January 2017. Original: Pirated Software: Cheap, Ubiquitous, and Dangerous Published: 25.07.2016

Next Post Previous Post