12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Joint Strategic Plan on Intellectual Property Enforcement<br />

SECTION 2<br />

ACTION NO. 2.8: Integrate awareness of IP<br />

crime and its illicit proceeds into broader efforts<br />

to combat money laundering and the financing<br />

of transnational organized crime networks. IPEC,<br />

in coordination with relevant members of the<br />

U.S. Interagency Strategy Planning Committees<br />

on IP Enforcement, will engage international<br />

partners to examine opportunities to integrate<br />

awareness of IP crime into broader efforts to<br />

combat money laundering and financing of<br />

criminal networks.<br />

B. IN FUTHERANCE OF A HEALTHY DOMAIN<br />

NAME SYSTEM.<br />

1. Assessing the Enforcement Challenge of<br />

Domain Name Hopping.<br />

For purposes of this section, the Administration has<br />

directed its focus to detailing some of the reported<br />

tactics used by criminal actors in the online environment<br />

and the corresponding enforcement challenges. In<br />

observance of the established global multistakeholder<br />

approaches used to address domain name issues and<br />

the National Telecommunications and Information<br />

Administration’s (NTIA) role as the convener of the U.S.<br />

government’s DNS interagency working group which<br />

establishes U.S. policy positions on domain name issues<br />

broadly and with respect to the Internet Corporation<br />

for Assigned Names and Numbers (ICANN), including<br />

the Governmental Advisory Committee (GAC) and<br />

its working groups, the U.S. Interagency Strategic<br />

Planning Committees on IP Enforcement reaffirms the<br />

principle that the “U.S. Government remains dedicated<br />

to working within the multistakeholder construct at<br />

ICANN and all relevant venues to vigorously defend and<br />

advance U.S. interests.” 34<br />

It has been reported that entities engaged in<br />

online counterfeit sales, the unlawful exploitation of<br />

copyrighted materials, and other large-scale infringing<br />

activity may engage in a combination of “domain<br />

name hopping” and “venue shopping” for perceived<br />

domain name safe havens. 35 These tactics have been<br />

reported within both the gTLD and ccTLD domain<br />

name environments.<br />

Top Level Domains (TLDs) are those strings of<br />

characters that follow the last ‘dot’ in a domain name<br />

– for example “.gov” in www.whitehouse.gov. TLDs<br />

are typically divided into two categories: generic Top<br />

Level Domains (gTLDs) and country code Top-Level<br />

Domains (ccTLDs). gTLDs are those TLDs of three or<br />

more characters, the operators of which typically have<br />

contractual agreements with ICANN. ccTLDs are those<br />

TLDs representing two-letter abbreviations for countries<br />

and territories, such as .us for the United States or<br />

.io for the British Indian Ocean Territory, delegated<br />

under policies developed by the Internet Engineering<br />

Task Force’s Request For Comment (RFC) 1591. 36 The<br />

relationship between any given ccTLD administrator<br />

and its government will differ from case to case and<br />

may depend on complex and sensitive arrangements<br />

particular to the local political climate. Different ccTLD<br />

policies will reflect different approaches with respect<br />

to process for the suspension, transfer, or cancellation<br />

of a domain name registration. Some ccTLDs use the<br />

same dispute resolution mechanism as gTLDs do – the<br />

Uniform Domain Name Dispute Resolution Policy – while<br />

others tailor their own variations of this policy.<br />

While the TLD environment provides Internet users<br />

with a diversity of choice, operators of websites engaged<br />

in illicit IP-based activities exploit this openness. To evade<br />

law enforcement, bad actors will register the same or<br />

different domain name with different registrars. They<br />

then attempt to evade law enforcement by moving from<br />

one registrar to another, thus prolonging the so-called<br />

“whack-a-mole” pursuit. The result of this behavior is to<br />

drive up costs of time and resources spent on protecting<br />

intellectual property rights. 37<br />

By way of illustration (FIG. 37), an operator of a<br />

large file-sharing site found guilty of facilitating criminal<br />

peer-to-peer file sharing of movies, music and games<br />

continued to circumnavigate the globe and exploit the<br />

domain name environment by moving from ccTLD to<br />

ccTLD to evade law enforcement.<br />

In the “Notorious Markets” Out-of-Cycle Review, the<br />

Office of the U.S. Trade Representative lists illustrative<br />

markets facilitating counterfeiting and piracy. In the<br />

lists from 2013-2015, a total of 26 of 54 named sites,<br />

or almost half of named online sites, operate within<br />

the ccTLD environment. 38 Based on the most recent<br />

Notorious Markets lists available prior to issuance of<br />

this plan, ccTLDs comprise roughly half of all named<br />

“notorious” top-level domains. 39 Considering that<br />

ccTLDs are outnumbered by gTLDs in the domain name<br />

base by more than a 2-to-1 ratio, the frequency of bad<br />

68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!