12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Office of the Intellectual Property Enforcement Coordinator<br />

FIG. 17: Example of Website Spoofing Associated with Sale of Counterfeit Goods Online.<br />

REAL | beatsbydre.com<br />

FAKE | originalbeatsbydre.co<br />

FIG. 18: Example of Multidimensional Industry Enforcement<br />

Dilemma.<br />

<strong>ENFORCEMENT</strong> WITHIN<br />

THE DOMAIN NAME SYSTEM<br />

Need to address cybersquatting<br />

and other misuses of the DNS<br />

BRICK AND MORTAR<br />

<strong>ENFORCEMENT</strong><br />

Need to address counterfeits<br />

found in retail supply chains,<br />

including big-box stores<br />

GLOBAL SCOPE<br />

Need to address counterfeits<br />

manufactured in China, shipped<br />

through multiple countries, and<br />

sold across multiple continents<br />

E-COMMERCE<br />

<strong>ENFORCEMENT</strong><br />

Need to address counterfeits<br />

found across numerous<br />

e-commerce sites<br />

SOCIAL MEDIA CHANNELS<br />

Need to address the advertisements<br />

of counterfeits via social media sites<br />

The fronts on which the rights holder is fighting the<br />

illicit trade war are many and varied. A U.S. rights holder<br />

whose rights are infringed faces a complex, global<br />

enforcement scenario subject to a number of challenges<br />

(FIG.18). These challenges typically include the need to<br />

stem the manufacturing and flow of illicit products from<br />

provenance economies with inadequate enforcement<br />

mechanisms; to coordinate customs authorities across<br />

one or more continents to share information that may<br />

aid in the interdiction and seizure of counterfeit goods;<br />

Source: EUROPOL IP Crime Coordinated Coalition<br />

to curb cybersquatting and other fraudulent tactics<br />

employed to move illicit content via the Internet; and to<br />

safeguard legitimate supply chains from infiltration by<br />

counterfeits. Once illicit products have entered supply<br />

chains, the products are sold to consumers who think<br />

they are buying legitimate products, either through wellknown<br />

e-commerce sites or established brick-and-mortar<br />

businesses, compounding the economic loss to the rights<br />

holder with the potential for reputational loss through<br />

dissemination of defective and substandard products.<br />

3. The Targeting and Theft of Trade Secrets.<br />

Today, with technology enabling convenient global<br />

access to and instantaneous transmission of information,<br />

a malicious actor need not rely on physical access to a<br />

document to steal it, copy it, or photograph it. 65 Trade<br />

secrets exist in multiple forms and there are a myriad<br />

of ways in which they can be stolen, including through<br />

cyber infiltration and employee misappropriation. 66<br />

Critically, the targeting of U.S. trade secrets for<br />

commercial gain, when directed by nation-state actors,<br />

has emerged as an especially serious threat to the U.S.<br />

economy. 67 U.S.-based businesses, academic institutions,<br />

defense contractors, service providers such as law<br />

firms, and other entities are purposefully targeted for<br />

economic espionage and theft of trade secrets by statesponsored<br />

foreign entities for commercial gain because<br />

these entities are “leader[s] in the development of new<br />

SECTION 1<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!