ENFORCEMENT
eop_ipec_jointstrategicplan_hi-res
eop_ipec_jointstrategicplan_hi-res
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TABLE OF CONTENTS<br />
SECTION 1<br />
THE GLOBAL SCALE OF INTELLECTUAL PROPERTY THEFT AND ITS UNLAWFUL EXPLOITATION<br />
BY THIRD PARTIES POSES SERIOUS THREATS TO U.S. NATIONAL INTERESTS......................................17<br />
A. The Economic Scope and Magnitude of Counterfeiting, Commercial Piracy, and Trade<br />
Secret Theft: A Global Perspective...................................................................................................................19<br />
1. Assessments of the Scale and Economic Impact of Counterfeiting and Commercial Piracy........................20<br />
2. Assessments of the Scale and Economic Impact of Trade Secret Theft.......................................................21<br />
B. The Complex and Sophisticated Nature of Commercial Piracy, Counterfeiting and Trade<br />
Secret Theft in the Modern Era..........................................................................................................................21<br />
1. Schemes Employed for the Unlawful Exploitation of Digital Content..........................................................21<br />
2. Schemes Employed to Facilitate Illicit Trade in Counterfeit Goods.............................................................26<br />
3. The Targeting and Theft of Trade Secrets.....................................................................................................31<br />
C. The Theft and Unlawful Exploitation of Intellectual Property as Threats to U.S. National Interests.........32<br />
1. Undermines Principles of Fair Trade in the Global Economy.......................................................................32<br />
2. Threatens Consumer Health and Safety.......................................................................................................33<br />
Example: Counterfeit Personal Care Products.......................................................................................33<br />
Example: Counterfeit Consumer Electronics & Electrical Products........................................................34<br />
Example: Counterfeit Pharmaceuticals...................................................................................................35<br />
Example: Counterfeit Automotive Parts.................................................................................................37<br />
3. Threatens the Environment...........................................................................................................................38<br />
4. Exploits Labor...............................................................................................................................................39<br />
5. Poses Threats to Domestic and International Security.................................................................................40<br />
a. The Integrity of Supply Chains and Critical Infrastructures.................................................................41<br />
b. The Convergence between Intellectual Property-Based Crime<br />
and the Financing of Criminal and Terror Networks...........................................................................42<br />
SECTION 2<br />
HELPING TO PROMOTE A SAFE AND SECURE INTERNET: MINIMIZE COUNTERFEITING<br />
AND INTELLECTUAL PROPERTY-INFRINGING ACTIVITY ONLINE.............................................................61<br />
A. Targeting Financial Support Flowing to Criminals: A “Follow-the-Money” Approach to<br />
Combating Online Commercial Piracy and Counterfeiting............................................................................61<br />
1. Strengthen Payment Processor Networks’ Efforts to Curb Illicit Proceeds...................................................62<br />
2. Strengthen Online Advertising Networks’ Efforts to Curb Flow of Illicit Revenue........................................63<br />
3. Strengthen Foreign Banking Practices to Curb the Financing of Illicit Trade...............................................66