12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TABLE OF CONTENTS<br />

SECTION 1<br />

THE GLOBAL SCALE OF INTELLECTUAL PROPERTY THEFT AND ITS UNLAWFUL EXPLOITATION<br />

BY THIRD PARTIES POSES SERIOUS THREATS TO U.S. NATIONAL INTERESTS......................................17<br />

A. The Economic Scope and Magnitude of Counterfeiting, Commercial Piracy, and Trade<br />

Secret Theft: A Global Perspective...................................................................................................................19<br />

1. Assessments of the Scale and Economic Impact of Counterfeiting and Commercial Piracy........................20<br />

2. Assessments of the Scale and Economic Impact of Trade Secret Theft.......................................................21<br />

B. The Complex and Sophisticated Nature of Commercial Piracy, Counterfeiting and Trade<br />

Secret Theft in the Modern Era..........................................................................................................................21<br />

1. Schemes Employed for the Unlawful Exploitation of Digital Content..........................................................21<br />

2. Schemes Employed to Facilitate Illicit Trade in Counterfeit Goods.............................................................26<br />

3. The Targeting and Theft of Trade Secrets.....................................................................................................31<br />

C. The Theft and Unlawful Exploitation of Intellectual Property as Threats to U.S. National Interests.........32<br />

1. Undermines Principles of Fair Trade in the Global Economy.......................................................................32<br />

2. Threatens Consumer Health and Safety.......................................................................................................33<br />

Example: Counterfeit Personal Care Products.......................................................................................33<br />

Example: Counterfeit Consumer Electronics & Electrical Products........................................................34<br />

Example: Counterfeit Pharmaceuticals...................................................................................................35<br />

Example: Counterfeit Automotive Parts.................................................................................................37<br />

3. Threatens the Environment...........................................................................................................................38<br />

4. Exploits Labor...............................................................................................................................................39<br />

5. Poses Threats to Domestic and International Security.................................................................................40<br />

a. The Integrity of Supply Chains and Critical Infrastructures.................................................................41<br />

b. The Convergence between Intellectual Property-Based Crime<br />

and the Financing of Criminal and Terror Networks...........................................................................42<br />

SECTION 2<br />

HELPING TO PROMOTE A SAFE AND SECURE INTERNET: MINIMIZE COUNTERFEITING<br />

AND INTELLECTUAL PROPERTY-INFRINGING ACTIVITY ONLINE.............................................................61<br />

A. Targeting Financial Support Flowing to Criminals: A “Follow-the-Money” Approach to<br />

Combating Online Commercial Piracy and Counterfeiting............................................................................61<br />

1. Strengthen Payment Processor Networks’ Efforts to Curb Illicit Proceeds...................................................62<br />

2. Strengthen Online Advertising Networks’ Efforts to Curb Flow of Illicit Revenue........................................63<br />

3. Strengthen Foreign Banking Practices to Curb the Financing of Illicit Trade...............................................66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!