editorially independent. We may make money when you click on links
to our partners.
Learn More
A Florida woman has been sentenced to 22 months in federal prison for running a years-long scheme that trafficked thousands of illicit Microsoft software activation keys.
Heidi Richards, who operated Trinity Software Distribution, was also ordered to pay a $50,000 fine after pleading guilty to charges tied to the resale of Microsoft Certificate of Authenticity (COA) labels.
“Richards, doing business as Trinity Software Distribution, paid co-conspirators millions of dollars for thousands of genuine, standalone Microsoft COA labels at prices significantly lower than the retail price of the associated software,” said the DOJ in its press release.
Inside the Microsoft COA Key Resale Scheme
The case highlights the broader risks associated with gray-market software licensing — not only for vendors, but also for businesses that may unknowingly purchase unauthorized activation keys.
Certificates of Authenticity (COA) labels are intended to verify legitimate Microsoft software installations, most commonly for Windows operating systems and Microsoft Office products.
These labels are typically affixed to hardware by original equipment manufacturers (OEMs) or distributed within sealed OEM packages that include both the licensed software and its corresponding COA.
Their purpose is to tie a valid product key to a specific device or authorized distribution channel.
How the COA Key Resale Scheme Worked
According to federal court records, Richards and her associates purchased tens of thousands of genuine COA labels from a Texas-based supplier between July 2018 and January 2023.
Over the course of the scheme, more than $5.1 million was reportedly wired to the supplier.
While the labels themselves were authentic, the alleged misconduct centered on how they were handled after purchase.
Rather than reselling them in compliance with Microsoft’s OEM licensing requirements, employees allegedly removed the labels’ product key codes and transcribed them into spreadsheets for bulk resale.
COA labels contain unique product keys used to activate Microsoft software, but the labels have no standalone commercial value outside their intended use.
Federal prosecutors emphasized that the only authorized downstream distribution method for a Windows OEM COA is either affixed to the computer on which the software was installed or included within a sealed OEM package containing the license agreement and corresponding documentation.
Separating the activation key from that compliant distribution framework undermines the licensing structure designed to control software use.
In this case, Richards allegedly directed employees to manually extract and record the activation codes, which were then sold independently to customers around the world.
Those customers were able to activate Microsoft software using valid keys, despite the fact that the keys were no longer associated with authorized hardware or proper license transfer. The operation effectively exploited the activation system’s reliance on legitimate codes without regard for how those codes entered the marketplace.
Why the Scheme Violated Licensing Rules
The legal issue in this case was not counterfeiting — the COA labels themselves were genuine — but unauthorized distribution and trafficking.
By detaching product keys from their required licensing terms and supply chain controls, the scheme allegedly bypassed contractual and copyright protections.
In this instance, the weakness was not in Microsoft’s activation infrastructure, but in the distribution controls surrounding how legitimate keys were sourced and resold.
Managing Software Licensing Supply Chain Risk
Gray-market licensing schemes can expose organizations to financial, operational, and legal risk — even when activation keys appear legitimate.
To reduce that exposure, businesses need stronger procurement oversight, tighter activation controls, and ongoing monitoring of software usage.
- Purchase software only from authorized resellers and verified distribution channels, and validate high-volume or discounted transactions directly with the vendor.
- Implement centralized IT asset management (ITAM) tools to continuously reconcile installed software against purchased entitlements and detect abnormal activation patterns.
- Restrict license procurement and activation privileges to designated roles, enforce least-privilege installation policies, and block unauthorized software deployments.
- Maintain complete documentation of all license purchases and integrate procurement controls into broader third-party and supply chain risk management processes.
- Conduct periodic internal license audits and cross-functional reviews involving IT, finance, and compliance teams to identify gray-market or unauthorized keys.
- Monitor networks and endpoints for anomalous activation behavior, geographic irregularities, or bulk key usage that may indicate diverted or fraudulent licenses.
- Test and update incident response plans to prepare for potential license invalidation, vendor audits, or legal exposure resulting from unauthorized software use.
Together, these controls help organizations strengthen license governance and help reduce supply chain risk tied to unauthorized or diverted software keys.
Software Compliance Risks Beyond Technical Flaws
The case highlights that software compliance issues can arise from gaps in procurement and distribution oversight rather than just technical vulnerabilities.
Even legitimate activation keys can pose risk when they are separated from authorized licensing channels.
For organizations, this underscores the importance of treating license governance as a structured part of supply chain and compliance management, rather than a purely administrative task.
