A federal court in Florida has concluded one of the most unusual cases in recent memory, where a woman was found guilty of trafficking in stolen Windows 10 and Microsoft Office product activation codes—not through hacking or piracy, but by reselling physical Certificate of Authenticity (COA) stickers. The operation lasted nearly six years and involved millions in transactions, yet it relied on a legal technicality that allowed the scheme to persist undetected.

The case centers on Heidi Richards, who ran Trinity Software Distribution out of Brandon, Florida. Prosecutors allege that her company purchased COA stickers—small adhesive labels containing product keys—at prices far below their intended market value. These stickers are meant to be affixed to genuine Microsoft hardware or software packaging, but Richards and her team instead extracted the embedded codes, repackaged them, and sold them in bulk to customers who used them to activate legitimate-looking copies of Windows 10 and Office without the accompanying physical media.

COA stickers are not illegal to possess. What was alleged to be criminal was the trafficking of these labels for activation purposes outside their intended use. Federal law prohibits selling or distributing COA labels separately from the licensed software or hardware they accompany, but the line between resale and theft has historically been thin—especially in an era where digital keys are often less protected than physical packaging.

Operation Sticker: How a Florida Scheme Exposed Microsoft's License Loophole

The operation reportedly moved nearly $5 million to a supplier in Texas over five and a half years. Investigators say Richards’ team manually transcribed tens of thousands of product key codes from the stickers, storing them in Excel files before redistributing them in bulk. This manual process was both labor-intensive and risky—each sticker contained a unique 25-character alphanumeric code, valid for activation on one device at a time.

What makes this case notable is not just the scale, but the method: it exploited a loophole rather than breached security. While Microsoft has long warned against third-party key sellers and maintains that COA labels should only be used with original equipment manufacturer (OEM) software or hardware, enforcement has been inconsistent. The scheme worked because the stickers themselves were legitimate—just repurposed beyond their intended lifecycle.

The sentencing of Richards to 22 months in federal prison and a $50,000 fine marks the end of an operation that, for years, blurred the boundary between gray-market resale and outright fraud. It also serves as a rare public exposure of how product keys—once printed on shrink-wrap or affixed to boxes—can still be exploited when digital authentication lags behind physical distribution.

For Microsoft and other software providers, the case raises broader questions about license security in an era where physical media is increasingly rare. As long as COA stickers can be bought, sold, and repackaged without clear tracking or revocation mechanisms, similar schemes may persist—just under different names and with more sophisticated methods.