ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Office of the Intellectual Property Enforcement Coordinator<br />
counterfeits, meaning that within the HS64 [footwear] category imported<br />
from China by some EU members, the share of counterfeits<br />
was reaching 27% in some years”). Id. at p.67.<br />
15<br />
2016 OECD Report at p.68 (emphasis in original). The Report<br />
explained that “[t]he term ‘as much as’ is crucial in this context as it<br />
refers to the upper boundary of counterfeit trade.”<br />
16<br />
2008 OECD Report at p.13. See also 2009 OECD Report Update<br />
at p.1 (“Based on the framework developed in OECD (2008)<br />
this short report updates the quantitative results of that study by<br />
utilising more recent international trade statistics for the calendar<br />
years 2000 to 2007. This report does not, however, update the<br />
customs interception data on which the original framework was<br />
constructed and relies on the same, aggregated customs interception<br />
data (i.e. for 1999-2005).”).<br />
17<br />
See International Chamber of Commerce, “Estimating the<br />
global economic and social impacts of counterfeiting and piracy”<br />
(February 2011) at pp. 5 (2008 estimates and 2015 projection) and<br />
50 (2015 projection), accessed from http://www.iccwbo.org/Advocacy-Codes-and-Rules/BASCAP/BASCAP-Research/Economic-impact/Global-Impacts-Study/.<br />
18<br />
See, e.g., Office of the National Counterintelligence Executive,<br />
“Foreign Spies Stealing US Economic Secrets in Cyberspace:<br />
Report to Congress on Foreign Economic Collection and Industrial<br />
Espionage, 2009-2011,” (October 2011) at p.3, (“The theft of<br />
trade secrets from US companies by foreign economic rivals<br />
undermines the corporate sector’s ability to create jobs, generate<br />
revenues, foster innovation, and lay the economic foundation for<br />
prosperity and national security”), accessed from https://www.<br />
ncsc.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf.<br />
19<br />
See Rowe, Elizabeth A., “Contributory Negligence, Technology,<br />
and Trade Secrets,” 17 George Mason L. Rev., 1, 5 (2009), accessed<br />
from http://scholarship.law.ufl.edu/cgi/viewcontent.cgi?article=1060&context=facultypub.<br />
https://www.uschamber.com/<br />
sites/default/files/legacy/international/files/Final TPP Trade Secrets<br />
8_0.pdf See also Politico.com, Op-Ed by Senators Orrin Hatch<br />
and Chris Coons, “A Better Way To Protect Trade Secrets” (April 4,<br />
2016), (“According to some estimates, trade secrets are worth $5<br />
trillion to the U.S. economy, on par with patents”), accessed from<br />
http://www.politico.com/agenda/story/2016/04/a-better-way-toprotect-trade-secrets-000081#ixzz4DpHlmVNQ.<br />
20<br />
See The Center for Responsible Enterprise And Trade and<br />
PricewaterhouseCoopers LLP, “Economic Impact of Trade Secret<br />
Theft” (February 2014) at p.3, accessed from https://www.<br />
pwc.com/us/en/forensic-services/publications/assets/economic-impact.pdf.<br />
21<br />
General Keith Alexander (ret.), while Director of the National<br />
Security Agency and Commander of U.S. Cyber Command, estimated<br />
that U.S. companies lose approximately $250 billion per<br />
year due to the theft of their intellectual property. See Rogin,<br />
Josh, “NSA Chief: Cybercrime constitutes the “greatest transfer<br />
of wealth in history,” The Cable (July 9, 2012), accessed from<br />
http://thecable.foreignpolicy.com/posts/2012/07/09/nsa_chief_<br />
cybercrime_constitutes_the_greatest_transfer_of_wealth_in_history.<br />
See also Testimony of Randall C. Coleman, Assistant<br />
Director, Counterintelligence Division, Federal Bureau of Investigation,<br />
Statement Before the Senate Judiciary Committee,<br />
Subcommittee on Crime and Terrorism (May 13, 2014), (“The<br />
Office of the National Counterintelligence Executive, using estimates<br />
from academic literature, has estimated losses from economic<br />
espionage to be in the tens or even hundreds of billions<br />
of dollars annually to the American economy”), accessed from<br />
https://www.fbi.gov/news/testimony/combating-economic-espionage-and-trade-secret-theft;<br />
see also The National Bureau<br />
of Asian Research, “The Report of the Commission on the Theft<br />
of American Intellectual Property,” (May 2013) (“The USITC<br />
reported that in 2009 U.S. firms in the IP-intensive economy lost<br />
roughly $1.1 billion from the misappropriation of trade secrets<br />
to China alone,” citing U.S. International Trade Commission,<br />
“China: Effects of Intellectual Property Infringement and Indigenous<br />
Innovation Policies on the U.S. Economy,” no. 332-519,<br />
USITC Publication 4226 (May 2011) at pp.3-37, accessed from:<br />
https://www.usitc.gov/publications/332/pub4226.pdf), accessed<br />
from http://www.ipcommission.org/report/ip_commission_report_052213.pdf;<br />
see also American Intellectual Property Law<br />
Association, “Response to Request for Public Comments for<br />
‘Trade Secret Theft Strategy Legislative Review’ (78 Fed. Reg.<br />
16875)” (April 22, 2013) at p.1, (“Last year, the National Security<br />
Agency described trade secret theft as the greatest transfer<br />
of wealth in history, estimating the losses of trade secret theft<br />
and cyber breaches to be in excess of $334 billion per year”),<br />
accessed from http://www.aipla.org/advocacy/executive/Documents/AIPLA%20Letter%20to%20IPEC%20on%20Trade%20<br />
Secrets%20-%204.22.13.pdf.<br />
22<br />
See United States Department of Justice, Office of Public Affairs,<br />
“Kolon Industries Inc. Pleads Guilty for Conspiring to Steal<br />
DuPont Trade Secrets Involving Kevlar Technology” (April 30,<br />
2015) (quoting Special Agent in Charge Lee: “each year, billions<br />
of U.S. dollars are lost to foreign competitors who pursue illegal<br />
commercial short cuts by stealing valuable advanced technologies.<br />
This case demonstrates the FBI’s ability to penetrate these<br />
highly sophisticated criminal schemes and bring their perpetrators<br />
to justice. Its outcome should send a clear message to<br />
foreign commercial actors who seek to illegally exploit American<br />
companies and steal our nation’s innovation and technology.”),<br />
accessed from https://www.justice.gov/opa/pr/kolon-industriesinc-pleads-guilty-conspiring-steal-dupont-trade-secrets-involving-kevlar.<br />
23<br />
See, Deloitte, “Beneath the Surface of a Cyberattack – A<br />
Deeper Look at Business Impacts” (2016) at p.2, (“The costs<br />
commonly associated with data breaches are only the most<br />
widely understood impacts, the damage seen above the surface.<br />
But theft of PII is not always an attacker’s objective. Rarely<br />
brought into full view are cases of intellectual property (IP) theft,<br />
espionage, data destruction, attacks on core operations, or<br />
attempts to disable critical infrastructure. Beneath the surface,<br />
these attacks can have a much more significant impact on organizations.<br />
But the tolls they take are not broadly understood<br />
and are much more difficult to quantify”), accessed from https://<br />
www2.deloitte.com/content/dam/Deloitte/global/Documents/<br />
Risk/gx-risk-gra-beneath-the-surface.pdf.<br />
24<br />
See International Chamber of Commerce, “Enhancing Intellectual<br />
Property Management and Appropriation by Innovative<br />
SMEs,” (October 2013) at pp.14–15, accessed from http://www.<br />
iccwbo.org/Advocacy-Codes-and-Rules/Areas-of-work/Intellectual-Property/Innovation-and-intellectual-property/.<br />
SECTION 1<br />
47