12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TABLE OF CONTENTS<br />

SECTION 1<br />

THE GLOBAL SCALE OF INTELLECTUAL PROPERTY THEFT AND ITS UNLAWFUL EXPLOITATION<br />

BY THIRD PARTIES POSES SERIOUS THREATS TO U.S. NATIONAL INTERESTS......................................17<br />

A. The Economic Scope and Magnitude of Counterfeiting, Commercial Piracy, and Trade<br />

Secret Theft: A Global Perspective...................................................................................................................19<br />

1. Assessments of the Scale and Economic Impact of Counterfeiting and Commercial Piracy........................20<br />

2. Assessments of the Scale and Economic Impact of Trade Secret Theft.......................................................21<br />

B. The Complex and Sophisticated Nature of Commercial Piracy, Counterfeiting and Trade<br />

Secret Theft in the Modern Era..........................................................................................................................21<br />

1. Schemes Employed for the Unlawful Exploitation of Digital Content..........................................................21<br />

2. Schemes Employed to Facilitate Illicit Trade in Counterfeit Goods.............................................................26<br />

3. The Targeting and Theft of Trade Secrets.....................................................................................................31<br />

C. The Theft and Unlawful Exploitation of Intellectual Property as Threats to U.S. National Interests.........32<br />

1. Undermines Principles of Fair Trade in the Global Economy.......................................................................32<br />

2. Threatens Consumer Health and Safety.......................................................................................................33<br />

Example: Counterfeit Personal Care Products.......................................................................................33<br />

Example: Counterfeit Consumer Electronics & Electrical Products........................................................34<br />

Example: Counterfeit Pharmaceuticals...................................................................................................35<br />

Example: Counterfeit Automotive Parts.................................................................................................37<br />

3. Threatens the Environment...........................................................................................................................38<br />

4. Exploits Labor...............................................................................................................................................39<br />

5. Poses Threats to Domestic and International Security.................................................................................40<br />

a. The Integrity of Supply Chains and Critical Infrastructures.................................................................41<br />

b. The Convergence between Intellectual Property-Based Crime<br />

and the Financing of Criminal and Terror Networks...........................................................................42<br />

SECTION 2<br />

HELPING TO PROMOTE A SAFE AND SECURE INTERNET: MINIMIZE COUNTERFEITING<br />

AND INTELLECTUAL PROPERTY-INFRINGING ACTIVITY ONLINE.............................................................61<br />

A. Targeting Financial Support Flowing to Criminals: A “Follow-the-Money” Approach to<br />

Combating Online Commercial Piracy and Counterfeiting............................................................................61<br />

1. Strengthen Payment Processor Networks’ Efforts to Curb Illicit Proceeds...................................................62<br />

2. Strengthen Online Advertising Networks’ Efforts to Curb Flow of Illicit Revenue........................................63<br />

3. Strengthen Foreign Banking Practices to Curb the Financing of Illicit Trade...............................................66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!