ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Joint Strategic Plan on Intellectual Property Enforcement<br />
SECTION 2<br />
ACTION NO. 2.8: Integrate awareness of IP<br />
crime and its illicit proceeds into broader efforts<br />
to combat money laundering and the financing<br />
of transnational organized crime networks. IPEC,<br />
in coordination with relevant members of the<br />
U.S. Interagency Strategy Planning Committees<br />
on IP Enforcement, will engage international<br />
partners to examine opportunities to integrate<br />
awareness of IP crime into broader efforts to<br />
combat money laundering and financing of<br />
criminal networks.<br />
B. IN FUTHERANCE OF A HEALTHY DOMAIN<br />
NAME SYSTEM.<br />
1. Assessing the Enforcement Challenge of<br />
Domain Name Hopping.<br />
For purposes of this section, the Administration has<br />
directed its focus to detailing some of the reported<br />
tactics used by criminal actors in the online environment<br />
and the corresponding enforcement challenges. In<br />
observance of the established global multistakeholder<br />
approaches used to address domain name issues and<br />
the National Telecommunications and Information<br />
Administration’s (NTIA) role as the convener of the U.S.<br />
government’s DNS interagency working group which<br />
establishes U.S. policy positions on domain name issues<br />
broadly and with respect to the Internet Corporation<br />
for Assigned Names and Numbers (ICANN), including<br />
the Governmental Advisory Committee (GAC) and<br />
its working groups, the U.S. Interagency Strategic<br />
Planning Committees on IP Enforcement reaffirms the<br />
principle that the “U.S. Government remains dedicated<br />
to working within the multistakeholder construct at<br />
ICANN and all relevant venues to vigorously defend and<br />
advance U.S. interests.” 34<br />
It has been reported that entities engaged in<br />
online counterfeit sales, the unlawful exploitation of<br />
copyrighted materials, and other large-scale infringing<br />
activity may engage in a combination of “domain<br />
name hopping” and “venue shopping” for perceived<br />
domain name safe havens. 35 These tactics have been<br />
reported within both the gTLD and ccTLD domain<br />
name environments.<br />
Top Level Domains (TLDs) are those strings of<br />
characters that follow the last ‘dot’ in a domain name<br />
– for example “.gov” in www.whitehouse.gov. TLDs<br />
are typically divided into two categories: generic Top<br />
Level Domains (gTLDs) and country code Top-Level<br />
Domains (ccTLDs). gTLDs are those TLDs of three or<br />
more characters, the operators of which typically have<br />
contractual agreements with ICANN. ccTLDs are those<br />
TLDs representing two-letter abbreviations for countries<br />
and territories, such as .us for the United States or<br />
.io for the British Indian Ocean Territory, delegated<br />
under policies developed by the Internet Engineering<br />
Task Force’s Request For Comment (RFC) 1591. 36 The<br />
relationship between any given ccTLD administrator<br />
and its government will differ from case to case and<br />
may depend on complex and sensitive arrangements<br />
particular to the local political climate. Different ccTLD<br />
policies will reflect different approaches with respect<br />
to process for the suspension, transfer, or cancellation<br />
of a domain name registration. Some ccTLDs use the<br />
same dispute resolution mechanism as gTLDs do – the<br />
Uniform Domain Name Dispute Resolution Policy – while<br />
others tailor their own variations of this policy.<br />
While the TLD environment provides Internet users<br />
with a diversity of choice, operators of websites engaged<br />
in illicit IP-based activities exploit this openness. To evade<br />
law enforcement, bad actors will register the same or<br />
different domain name with different registrars. They<br />
then attempt to evade law enforcement by moving from<br />
one registrar to another, thus prolonging the so-called<br />
“whack-a-mole” pursuit. The result of this behavior is to<br />
drive up costs of time and resources spent on protecting<br />
intellectual property rights. 37<br />
By way of illustration (FIG. 37), an operator of a<br />
large file-sharing site found guilty of facilitating criminal<br />
peer-to-peer file sharing of movies, music and games<br />
continued to circumnavigate the globe and exploit the<br />
domain name environment by moving from ccTLD to<br />
ccTLD to evade law enforcement.<br />
In the “Notorious Markets” Out-of-Cycle Review, the<br />
Office of the U.S. Trade Representative lists illustrative<br />
markets facilitating counterfeiting and piracy. In the<br />
lists from 2013-2015, a total of 26 of 54 named sites,<br />
or almost half of named online sites, operate within<br />
the ccTLD environment. 38 Based on the most recent<br />
Notorious Markets lists available prior to issuance of<br />
this plan, ccTLDs comprise roughly half of all named<br />
“notorious” top-level domains. 39 Considering that<br />
ccTLDs are outnumbered by gTLDs in the domain name<br />
base by more than a 2-to-1 ratio, the frequency of bad<br />
68