ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Office of the Intellectual Property Enforcement Coordinator<br />
FIG. 17: Example of Website Spoofing Associated with Sale of Counterfeit Goods Online.<br />
REAL | beatsbydre.com<br />
FAKE | originalbeatsbydre.co<br />
FIG. 18: Example of Multidimensional Industry Enforcement<br />
Dilemma.<br />
<strong>ENFORCEMENT</strong> WITHIN<br />
THE DOMAIN NAME SYSTEM<br />
Need to address cybersquatting<br />
and other misuses of the DNS<br />
BRICK AND MORTAR<br />
<strong>ENFORCEMENT</strong><br />
Need to address counterfeits<br />
found in retail supply chains,<br />
including big-box stores<br />
GLOBAL SCOPE<br />
Need to address counterfeits<br />
manufactured in China, shipped<br />
through multiple countries, and<br />
sold across multiple continents<br />
E-COMMERCE<br />
<strong>ENFORCEMENT</strong><br />
Need to address counterfeits<br />
found across numerous<br />
e-commerce sites<br />
SOCIAL MEDIA CHANNELS<br />
Need to address the advertisements<br />
of counterfeits via social media sites<br />
The fronts on which the rights holder is fighting the<br />
illicit trade war are many and varied. A U.S. rights holder<br />
whose rights are infringed faces a complex, global<br />
enforcement scenario subject to a number of challenges<br />
(FIG.18). These challenges typically include the need to<br />
stem the manufacturing and flow of illicit products from<br />
provenance economies with inadequate enforcement<br />
mechanisms; to coordinate customs authorities across<br />
one or more continents to share information that may<br />
aid in the interdiction and seizure of counterfeit goods;<br />
Source: EUROPOL IP Crime Coordinated Coalition<br />
to curb cybersquatting and other fraudulent tactics<br />
employed to move illicit content via the Internet; and to<br />
safeguard legitimate supply chains from infiltration by<br />
counterfeits. Once illicit products have entered supply<br />
chains, the products are sold to consumers who think<br />
they are buying legitimate products, either through wellknown<br />
e-commerce sites or established brick-and-mortar<br />
businesses, compounding the economic loss to the rights<br />
holder with the potential for reputational loss through<br />
dissemination of defective and substandard products.<br />
3. The Targeting and Theft of Trade Secrets.<br />
Today, with technology enabling convenient global<br />
access to and instantaneous transmission of information,<br />
a malicious actor need not rely on physical access to a<br />
document to steal it, copy it, or photograph it. 65 Trade<br />
secrets exist in multiple forms and there are a myriad<br />
of ways in which they can be stolen, including through<br />
cyber infiltration and employee misappropriation. 66<br />
Critically, the targeting of U.S. trade secrets for<br />
commercial gain, when directed by nation-state actors,<br />
has emerged as an especially serious threat to the U.S.<br />
economy. 67 U.S.-based businesses, academic institutions,<br />
defense contractors, service providers such as law<br />
firms, and other entities are purposefully targeted for<br />
economic espionage and theft of trade secrets by statesponsored<br />
foreign entities for commercial gain because<br />
these entities are “leader[s] in the development of new<br />
SECTION 1<br />
31