12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

«<br />

Office of the Intellectual Property Enforcement Coordinator<br />

Dedicated IPR-infringing websites have widely<br />

promoted torrent VPNs, for example, to anonymize<br />

Internet protocol addresses and fake or hide a web user’s<br />

actual location when accessing libraries of infringing<br />

content in violation of applicable laws. 28 Platform<br />

operators who facilitate business models predicated<br />

on stolen content also develop their business models<br />

specifically to evade arrest or civil liability, increase<br />

enforcement costs, entice illicit traffic, and generate<br />

unreported income for the enterprise and its operators.<br />

For these and other reasons, law enforcement actions are<br />

often focused on the facilitating platform operator.<br />

These unlawful businesses generate income through<br />

a variety of payment methods, including: premium<br />

subscription fees and donations; payments in digital<br />

virtual currencies (such as Bitcoin, which commercialscale<br />

IP infringers often use to hide the proceeds<br />

of crime from the authorities); and revenue from<br />

advertisement and pay-per-click services. 29<br />

Operators of illicit sites deploy additional strategies<br />

to maximize income opportunities and safeguard<br />

revenue streams for those seeking to exploit unlicensed<br />

content on a commercial scale. For example, websites<br />

dedicated to profiting illegally from third-party content<br />

have been reported to generate hundreds of millions<br />

of dollars each year by exploiting payment processing<br />

and advertising network platforms in violation of law,<br />

and in material breach of the service provider’s and<br />

platform’s respective "Terms of Service." 30 A number<br />

of piracy sites are reported to use the stolen content<br />

(such as a hit movie) to lure consumers and then infect<br />

consumers’ computers with malware in order to conduct<br />

FIG. 4: How TOR works.<br />

Fig. 5: The Onion Router<br />

How TOR works<br />

User 1’s TOR<br />

User 1’s TOR<br />

unencrypted.<br />

User 1’s TOR client selects a<br />

unencrypted.<br />

part in its activities. It is also possible for the users to communicate with each other.<br />

other illegal schemes to further augment illicit revenue<br />

from the exploited content. Such other schemes include<br />

24 TRADEMARKS AND THE INTERNET, WIPO document SCT/24/4, 2010, and http://dictionary.reference.com/browse/virtual-environment<br />

spam and phishing campaigns, accessing personally<br />

18 · Research on Online Business Models Infringing Intellectual Property Rights<br />

identifiable data, generation of fake advertising traffic,<br />

and the serving of pop-ups and other ads.<br />

TOR node<br />

TOR node<br />

TOR node<br />

Virtual worlds<br />

Virtual worldsSource: 24 is most frequently EU IPO, used Research as a term that on describes Online the many Business different Models Infringing<br />

types of multiplayer online games and other multiuser Intellectual interactive worlds. Property Usually a Rights (July 2016)<br />

virtual world is 'populated' by avatars that are created by the individual users and<br />

who simultaneously and independently explore the virtual world and who takes<br />

«<br />

FIG. 5: The Financing of a Commercial Piracy Enterprise.<br />

Malicious software designed<br />

to gain unauthorized access,<br />

collect private data, or inflict<br />

damage<br />

Ad Supported Infringement<br />

$$$<br />

A bet controller commands a<br />

distributed system of connected<br />

computers to act as a group to<br />

undertake fake advertising and<br />

spam campaigns<br />

Membership subscription-based piracy<br />

(serviced credit card payments or other methods)<br />

Multiple “shell” accounts opened<br />

at the same or different banks to<br />

avoid detection<br />

SECTION 1<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!