12.12.2016 Views

ENFORCEMENT

eop_ipec_jointstrategicplan_hi-res

eop_ipec_jointstrategicplan_hi-res

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Joint Strategic Plan on Intellectual Property Enforcement<br />

SECTION 1<br />

25<br />

European Union Intellectual Property Office, “Research on<br />

Online Business Models Infringing Intellectual Property Rights:<br />

Phase 1 - Establishing an Overview of Online Business Models<br />

Infringing Intellectual Property Rights” (July 2016) at p.7 et<br />

seq., accessed from https://euipo.europa.eu/tunnel-web/secure/<br />

webdav/guest/document_library/observatory/resources/Research_<br />

on_Online_Business_Models_IBM/Research_on_Online_Business_<br />

Models_IBM_en.pdf.<br />

26<br />

See, e.g., Europol, “The Internet Organised Crime Threat<br />

Assessment - Overview” (2014) (“Criminals can misuse/abuse<br />

WHOIS data in a number of ways” including “[g]iving false<br />

WHOIS credentials to Registrars to avoid identification, in order<br />

to conduct illegal or harmful Internet activities” and “[u]sing of<br />

the private domain registration (domain names registered via<br />

privacy or proxy services or offshore) to obscure the perpetrator’s<br />

identity”), accessed from https://www.europol.europa.eu/<br />

iocta/2014/chap-4-3-view1.html. See also European Union Intellectual<br />

Property Office, “Research on Online Business Models<br />

Infringing Intellectual Property Rights: Phase 1 - Establishing an<br />

Overview of Online Business Models Infringing Intellectual Property<br />

Rights” (July 2016) at p. 9 (“operators behind the IPR-infringing<br />

activities often either conceal their identities by using privacy<br />

shield services for the registration of their domain names or<br />

provide inadequate, false or otherwise misleading contact details<br />

on the website thus hampering or even precluding enforcement<br />

actions”), accessed from https://euipo.europa.eu/tunnel-web/<br />

secure/webdav/guest/document_library/observatory/resources/<br />

Research_on_Online_Business_Models_IBM/Research_on_Online_Business_Models_IBM_en.pdf.<br />

27<br />

See Europol and Office for Harmonization in the Internal<br />

Market, “2015 Situation Report on Counterfeiting in the European<br />

Union,” (April 2015) at p.33, accessed from https://euipo.<br />

europa.eu/tunnel-web/secure/webdav/guest/document_library/<br />

observatory/documents/publications/2015+Situation+Report+on+Counterfeiting+in+the+EU.pdf.<br />

See also European<br />

Union Intellectual Property Office, “Research on Online<br />

Business Models Infringing Intellectual Property Rights: Phase 1<br />

- Establishing an Overview of Online Business Models Infringing<br />

Intellectual Property Rights,” (July 2016) at p. 9.<br />

28<br />

Both Popcorn Time and The Pirate Bay—entities that have<br />

been included by the Office of the U.S. Trade Representative<br />

as representative “Notorious Markets” in the Out-of-Cycle<br />

Notorious Markets Review—have advertised and promoted<br />

anonymizing services alongside their respective listing of free<br />

movies, music and other content. See Office of the U.S. Trade<br />

Representative, “2014 Out-of-Cycle Review of Notorious<br />

Markets,” (March 5, 2015) at pp. 5 and 17, accessed from<br />

https://ustr.gov/sites/default/files/2014%20Notorious%20<br />

Markets%20List%20-%20Published_0.pdf. See also Robertson,<br />

Adi, “Popcorn Time’s Best-known App Comes Back to Life,”<br />

The Verge (February 26, 2016) (reporting that torrent streaming<br />

application Popcorn Time added “a paid VPN anonymizing<br />

service alongside its free movies”), accessed from http://www.<br />

theverge.com/2016/2/26/11119290/popcorn-time-io-moviestreaming-piracy-back-online.<br />

See also Stone, Jeff. “The Pirate<br />

Bay Pushing Free VPN Amid Blockade, Torrent Site Facing New<br />

International Scrutiny,” International Business Times (October<br />

25, 2014) (“Swedish torrent site Pirate Bay in the past few days<br />

prominently featured advertisements for a free virtual-private<br />

network, or VPN”), accessed from http://www.ibtimes.com/<br />

pirate-bay-pushing-free-vpn-amid-blockade-torrent-site-facingnew-international-scrutiny-1713144.<br />

29<br />

European Union Intellectual Property Office, “Research on<br />

Online Business Models Infringing Intellectual Property Rights:<br />

Phase 1 - Establishing an Overview of Online Business Models Infringing<br />

Intellectual Property Rights” (July 2016) at pp.31-37, accessed<br />

from https://euipo.europa.eu/tunnel-web/secure/webdav/<br />

guest/document_library/observatory/resources/Research_on_Online_Business_Models_IBM/Research_on_Online_Business_Models_IBM_en.pdf.<br />

30<br />

See Section II.<br />

31<br />

In this context, adware is designed to co-opt the consumer’s<br />

computer into advertising fraud schemes. It is highly invasive<br />

software, running the background, designed to make money<br />

by serving pop-ups to the user even when s/he is not browsing,<br />

and by collecting the user’s personal data to identify and target<br />

delivery of the most profitable ads relevant to that user.<br />

32<br />

See Digital Citizens Alliance, “Digital Bait: How Content Theft<br />

Sites and Malware are Exploited by Cybercriminals to Hack<br />

into Internet Users’ Computers and Personal Data,” (December<br />

2015) at p.9 et seq., (“A botnet is a system of connected computers<br />

acting as a group at the command of a ‘Bot controller,’<br />

who directs the enslaved computers to accomplish certain tasks,<br />

such as to carry out spam and phishing campaigns and to fake<br />

advertising traffic”), accessed from https://media.gractions.<br />

com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/0f03<br />

d298-aedf-49a5-84dc-9bf6a27d91ff.pdf.<br />

33<br />

Digital Citizens Alliance, “Digital Bait: How Content Theft<br />

Sites and Malware are Exploited by Cybercriminals to Hack into<br />

Internet Users’ Computers and Personal Data,” (December 2015)<br />

at p.1 (“the cyber security firm RiskIQ found that one out of every<br />

three content theft sites contained malware. The study found<br />

that consumers are 28 times more likely to get malware from a<br />

content theft site than on similarly visited mainstream websites or<br />

licensed content providers”), accessed from https://media.gractions.com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A7<br />

6/0f03d298-aedf-49a5-84dc-9bf6a27d91ff.pdf. See also Federal<br />

Bureau of Investigation, “Consumer Alert: Pirated Software May<br />

Contain Malware,” (August 1, 2013) (“Our collective experience<br />

has shown this to be true, both through the complaints we’ve received<br />

and through our investigations. It’s also been validated by<br />

industry studies, which show that an increasing amount of software<br />

installed on computers around the world—including in the<br />

U.S.—is pirated and that this software often contains malware”),<br />

accessed from https://www.fbi.gov/news/stories/pirated-software-may-contain-malware1;<br />

Ernst & Young, “IAB U.S. Benchmarking<br />

Study: What is an untrustworthy supply costing the<br />

US digital advertising industry?” (November 2015) (finding that<br />

fraudulent impressions, infringed content, and malvertising cost<br />

the U.S. digital marketing, advertising, and media industry $8.2<br />

billion annually), accessed from http://www.iab.com/wp-content/<br />

uploads/2015/11/IAB_EY_Report.pdf; European Union Intellectual<br />

Property Office, “Digital Advertising on Suspected Infringing<br />

Websites,” (January 2016) at pp.23-24 (discussing the relative<br />

prevalence of click generators and malware in “high risk sector”<br />

online advertisements in the EU), accessed from https://euipo.<br />

europa.eu/ohimportal/documents/11370/80606/Digital+Advertising+on+Suspected+Infringing+Websites;<br />

European Union Intellectual<br />

Property Office (EU IPO), “Research on Online Business<br />

Models Infringing Intellectual Property Rights,” (July 2016) at p.4<br />

(“IPR is also being used to disseminate malware, carry out illegal<br />

phishing and simple fraud”), accessed from https://euipo.europa.<br />

eu/tunnel-web/secure/webdav/guest/document_library/observatory/resources/Research_on_Online_Business_Models_IBM/<br />

Research_on_Online_Business_Models_IBM_en.pdf.<br />

34<br />

European Union Intellectual Property Office (EU IPO), “Research<br />

on Online Business Models Infringing Intellectual Property<br />

Rights: Phase 1 - Establishing an Overview of Online Business<br />

Models Intellectual Property Rights” (July 2016) at p.4, accessed<br />

48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!