ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Joint Strategic Plan on Intellectual Property Enforcement<br />
SECTION 1<br />
25<br />
European Union Intellectual Property Office, “Research on<br />
Online Business Models Infringing Intellectual Property Rights:<br />
Phase 1 - Establishing an Overview of Online Business Models<br />
Infringing Intellectual Property Rights” (July 2016) at p.7 et<br />
seq., accessed from https://euipo.europa.eu/tunnel-web/secure/<br />
webdav/guest/document_library/observatory/resources/Research_<br />
on_Online_Business_Models_IBM/Research_on_Online_Business_<br />
Models_IBM_en.pdf.<br />
26<br />
See, e.g., Europol, “The Internet Organised Crime Threat<br />
Assessment - Overview” (2014) (“Criminals can misuse/abuse<br />
WHOIS data in a number of ways” including “[g]iving false<br />
WHOIS credentials to Registrars to avoid identification, in order<br />
to conduct illegal or harmful Internet activities” and “[u]sing of<br />
the private domain registration (domain names registered via<br />
privacy or proxy services or offshore) to obscure the perpetrator’s<br />
identity”), accessed from https://www.europol.europa.eu/<br />
iocta/2014/chap-4-3-view1.html. See also European Union Intellectual<br />
Property Office, “Research on Online Business Models<br />
Infringing Intellectual Property Rights: Phase 1 - Establishing an<br />
Overview of Online Business Models Infringing Intellectual Property<br />
Rights” (July 2016) at p. 9 (“operators behind the IPR-infringing<br />
activities often either conceal their identities by using privacy<br />
shield services for the registration of their domain names or<br />
provide inadequate, false or otherwise misleading contact details<br />
on the website thus hampering or even precluding enforcement<br />
actions”), accessed from https://euipo.europa.eu/tunnel-web/<br />
secure/webdav/guest/document_library/observatory/resources/<br />
Research_on_Online_Business_Models_IBM/Research_on_Online_Business_Models_IBM_en.pdf.<br />
27<br />
See Europol and Office for Harmonization in the Internal<br />
Market, “2015 Situation Report on Counterfeiting in the European<br />
Union,” (April 2015) at p.33, accessed from https://euipo.<br />
europa.eu/tunnel-web/secure/webdav/guest/document_library/<br />
observatory/documents/publications/2015+Situation+Report+on+Counterfeiting+in+the+EU.pdf.<br />
See also European<br />
Union Intellectual Property Office, “Research on Online<br />
Business Models Infringing Intellectual Property Rights: Phase 1<br />
- Establishing an Overview of Online Business Models Infringing<br />
Intellectual Property Rights,” (July 2016) at p. 9.<br />
28<br />
Both Popcorn Time and The Pirate Bay—entities that have<br />
been included by the Office of the U.S. Trade Representative<br />
as representative “Notorious Markets” in the Out-of-Cycle<br />
Notorious Markets Review—have advertised and promoted<br />
anonymizing services alongside their respective listing of free<br />
movies, music and other content. See Office of the U.S. Trade<br />
Representative, “2014 Out-of-Cycle Review of Notorious<br />
Markets,” (March 5, 2015) at pp. 5 and 17, accessed from<br />
https://ustr.gov/sites/default/files/2014%20Notorious%20<br />
Markets%20List%20-%20Published_0.pdf. See also Robertson,<br />
Adi, “Popcorn Time’s Best-known App Comes Back to Life,”<br />
The Verge (February 26, 2016) (reporting that torrent streaming<br />
application Popcorn Time added “a paid VPN anonymizing<br />
service alongside its free movies”), accessed from http://www.<br />
theverge.com/2016/2/26/11119290/popcorn-time-io-moviestreaming-piracy-back-online.<br />
See also Stone, Jeff. “The Pirate<br />
Bay Pushing Free VPN Amid Blockade, Torrent Site Facing New<br />
International Scrutiny,” International Business Times (October<br />
25, 2014) (“Swedish torrent site Pirate Bay in the past few days<br />
prominently featured advertisements for a free virtual-private<br />
network, or VPN”), accessed from http://www.ibtimes.com/<br />
pirate-bay-pushing-free-vpn-amid-blockade-torrent-site-facingnew-international-scrutiny-1713144.<br />
29<br />
European Union Intellectual Property Office, “Research on<br />
Online Business Models Infringing Intellectual Property Rights:<br />
Phase 1 - Establishing an Overview of Online Business Models Infringing<br />
Intellectual Property Rights” (July 2016) at pp.31-37, accessed<br />
from https://euipo.europa.eu/tunnel-web/secure/webdav/<br />
guest/document_library/observatory/resources/Research_on_Online_Business_Models_IBM/Research_on_Online_Business_Models_IBM_en.pdf.<br />
30<br />
See Section II.<br />
31<br />
In this context, adware is designed to co-opt the consumer’s<br />
computer into advertising fraud schemes. It is highly invasive<br />
software, running the background, designed to make money<br />
by serving pop-ups to the user even when s/he is not browsing,<br />
and by collecting the user’s personal data to identify and target<br />
delivery of the most profitable ads relevant to that user.<br />
32<br />
See Digital Citizens Alliance, “Digital Bait: How Content Theft<br />
Sites and Malware are Exploited by Cybercriminals to Hack<br />
into Internet Users’ Computers and Personal Data,” (December<br />
2015) at p.9 et seq., (“A botnet is a system of connected computers<br />
acting as a group at the command of a ‘Bot controller,’<br />
who directs the enslaved computers to accomplish certain tasks,<br />
such as to carry out spam and phishing campaigns and to fake<br />
advertising traffic”), accessed from https://media.gractions.<br />
com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/0f03<br />
d298-aedf-49a5-84dc-9bf6a27d91ff.pdf.<br />
33<br />
Digital Citizens Alliance, “Digital Bait: How Content Theft<br />
Sites and Malware are Exploited by Cybercriminals to Hack into<br />
Internet Users’ Computers and Personal Data,” (December 2015)<br />
at p.1 (“the cyber security firm RiskIQ found that one out of every<br />
three content theft sites contained malware. The study found<br />
that consumers are 28 times more likely to get malware from a<br />
content theft site than on similarly visited mainstream websites or<br />
licensed content providers”), accessed from https://media.gractions.com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A7<br />
6/0f03d298-aedf-49a5-84dc-9bf6a27d91ff.pdf. See also Federal<br />
Bureau of Investigation, “Consumer Alert: Pirated Software May<br />
Contain Malware,” (August 1, 2013) (“Our collective experience<br />
has shown this to be true, both through the complaints we’ve received<br />
and through our investigations. It’s also been validated by<br />
industry studies, which show that an increasing amount of software<br />
installed on computers around the world—including in the<br />
U.S.—is pirated and that this software often contains malware”),<br />
accessed from https://www.fbi.gov/news/stories/pirated-software-may-contain-malware1;<br />
Ernst & Young, “IAB U.S. Benchmarking<br />
Study: What is an untrustworthy supply costing the<br />
US digital advertising industry?” (November 2015) (finding that<br />
fraudulent impressions, infringed content, and malvertising cost<br />
the U.S. digital marketing, advertising, and media industry $8.2<br />
billion annually), accessed from http://www.iab.com/wp-content/<br />
uploads/2015/11/IAB_EY_Report.pdf; European Union Intellectual<br />
Property Office, “Digital Advertising on Suspected Infringing<br />
Websites,” (January 2016) at pp.23-24 (discussing the relative<br />
prevalence of click generators and malware in “high risk sector”<br />
online advertisements in the EU), accessed from https://euipo.<br />
europa.eu/ohimportal/documents/11370/80606/Digital+Advertising+on+Suspected+Infringing+Websites;<br />
European Union Intellectual<br />
Property Office (EU IPO), “Research on Online Business<br />
Models Infringing Intellectual Property Rights,” (July 2016) at p.4<br />
(“IPR is also being used to disseminate malware, carry out illegal<br />
phishing and simple fraud”), accessed from https://euipo.europa.<br />
eu/tunnel-web/secure/webdav/guest/document_library/observatory/resources/Research_on_Online_Business_Models_IBM/<br />
Research_on_Online_Business_Models_IBM_en.pdf.<br />
34<br />
European Union Intellectual Property Office (EU IPO), “Research<br />
on Online Business Models Infringing Intellectual Property<br />
Rights: Phase 1 - Establishing an Overview of Online Business<br />
Models Intellectual Property Rights” (July 2016) at p.4, accessed<br />
48