12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Joint Strategic Plan on Intellectual Property Enforcement<br />

Statement on the Executive Order Entitled<br />

“Imposing Additional Sanctions with Respect to North Korea”<br />

“We take seriously North Korea’s attack that aimed to create destructive financial effects on a U.S. company and<br />

to threaten artists and other individuals with the goal of restricting their right to free expression.”<br />

The White House (Jan. 2, 2015)<br />

SECTION 1<br />

bags and cigarettes; the Revolutionary Armed Forces<br />

of Colombia (the FARC), which reportedly found the<br />

sale of pirated discs more profitable than the ransom<br />

kidnappings for which it is more notorious; and across<br />

the tribal belt of Pakistan, it is reported that Taliban<br />

militias collect money from cigarette smugglers in<br />

exchange for allowing counterfeit and illicit tobacco<br />

into Afghanistan and China. 140,141<br />

The convergence of intellectual property crime<br />

and illicit actors is not just limited to TOC or terroristaffiliated<br />

groups, but also extends to nation-state<br />

actors. For example, it was widely reported that North<br />

Korea facilitated the distribution of large volumes<br />

of counterfeit pharmaceuticals and cigarettes as a<br />

means to generate hard currency due to the state of<br />

sanctions; the country was also identified as sponsoring<br />

the crippling cyber-attacks against Sony Pictures<br />

Entertainment in 2014—an attack that deleted files from<br />

corporate hard drives, uploaded several unreleased<br />

films to the Internet, and leaked sensitive personal<br />

information regarding thousands of Sony employees. 142<br />

When state-sponsored malicious cyber actors target<br />

confidential business information and proprietary<br />

works and technologies for commercial gain, they put<br />

businesses and our national interests at risk. Similarly,<br />

when counterfeit goods such as fake computer and<br />

networking devices infiltrate global supply chains,<br />

they place the reliability of our communications and<br />

transportation networks at risk and introduce threats<br />

and vulnerabilities that could impact national security,<br />

while fake pharmaceuticals, electrical components,<br />

aircraft and automobile parts and other goods<br />

undermine public safety and other National interests. 143<br />

At this time, interested stakeholders such as industry<br />

associations, international organiza tions, news media,<br />

public interest groups, and academia may not be in a<br />

position to assess how widespread the convergence<br />

may be between intellectual property crime and TOC<br />

and/or terror-supporting entities. As a result, there is<br />

an opportunity to systematically collect and make more<br />

of this type of information available, in an appropriate<br />

manner, in order to raise awareness and understanding<br />

of IP crime and its links to serious crime and terror<br />

organizations, and to facilitate and improve the<br />

exchange of information and intelligence on IP crimes<br />

such as counterfeiting and piracy between the public<br />

and private sectors. See the Call for Research at the end<br />

of Section IV of this Strategic Plan for further discussion<br />

of related data and research needs.<br />

The convergence between intellectual propertybased<br />

crimes, transnational organized crime, and<br />

terrorist financing undermines the strength and security<br />

of democratic regimes by allowing illicit actors, for<br />

example, to forge alliances with corrupt foreign<br />

government officials, or otherwise destabilize political,<br />

financial, and security institutions in fragile states.<br />

Terrorists and insurgents increasingly turn to these<br />

criminal networks to generate funding and acquire<br />

logistical support. 144 Put simply, the exploitation of<br />

intellectual property rights by criminal syndicates<br />

appears to be posing an increasing threat to National<br />

and global security interests.<br />

This Strategic Plan addresses the issues discussed<br />

above by proposing improvements to the enforcement<br />

of domestic IP rights, cooperation with foreign<br />

governments, use of trade tools, and voluntary privatesector<br />

best practices (consistent with the antitrust laws),<br />

to name a few, while being mindful that these issues<br />

are complex and ever-changing. The following sections<br />

seek to build on what already has been accomplished,<br />

while continuing to look ahead. Now, more than ever, it<br />

is important that the public, law enforcement officials,<br />

policy makers, and all other stakeholders remain<br />

vigilant against the mounting threats from entities<br />

that seek to unlawfully misappropriate and exploit the<br />

intellectual property interests belonging to others.<br />

44

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!