Counterfeiting and Organized Crime

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Certification Industry Against Counterfeiting
EUFJE BRUSSELS CONFERENCE 19 Octobre 2010 Joint meeting EUFJE – public prosecutors,
Globalisation and Transnational Crime Each slide can be advanced using a mouse click. Alternatively, moving the cursor to the: Right Hand edge of the.
Tobacco fraud media strategy Jonathan Hall, HM Revenue & Customs press office.
Chapter 14 Crime and Justice in the New Millennium
Financial intelligence centre REPUBLIC OF SOUTH AFRICA Presentation to the Portfolio Committee on Trade and Industry on the Report prepared by the Gambling.
Online Services Chapter 9.
Enforcement of Intellectual Property Rights in the Republic of Macedonia State Office of Industrial Property of the Republic of Macedonia ______________________________.
Ministerstwo Gospodarki Counterfeiting and other problems in plant protection products marketing (presentation of ) Zbigniew Barszcz Department.
Chapter 1 Globalization of markets and competition.
The emergence of an Enforcement Agenda Intellectual Property Rights and Access to Essential Medicines: Challenges and Opportunities in Free Trade Agreement.
National IPR Coordination Center National Intellectual Property Rights Coordination Center IPR Center’s Focus The IPR Center is a collaborative effort.
1 How organised is crime in Southern Africa? Briefing on the state of trans-national organised crime in Southern Africa ISS Conference.
CYBER CRIME: EFFECTS ON IMPORTING & EXPORTING SUFFOLK COUNTY POLICE DEPARTMENT PRESENTED BY: DEPUTY INSPECTOR, GERARD X. MCCARTHY COMMANDING OFFICER SPECIAL.
Anti-counterfeiting Activities by the Korean Intellectual Property Office June 2006 KIPO The Korean Intellectual Property Office.
Project Jackal for Businesses and Financial Institutions
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
Lithuania Protection of Intellectual Property Rights Protection of Intellectual Property Rights Belgrad 2011.
Cyber Security Nevada Businesses Overview June, 2014.
Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
For use only with Perreault and McCarthy texts. © The McGraw-Hill Companies, Inc., 2000 Irwin/McGraw-Hill Chapter 4: Evaluating Opportunities in the Changing.
For use only with Perreault and McCarthy texts. © The McGraw-Hill Companies, Inc., 1999 Irwin/McGraw-Hill Chapter 4: Evaluating Opportunities in the Changing.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Chapter 4: Evaluating Opportunities in the Changing Marketing Environment.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
For Innovation. ‘Counterfeiting and Piracy’ What has this to do with the UK Patent Office? We are not enforcers, but we have had a role for sometime Seat.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
IPR Enforcement in the United Kingdom Kenny Wright Danish Patent and Trademark Office.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
GLOBALIZATION Lecture 01. Introduction 2 The effects of this trend can be seen in the cars people drive in the food people eat in the jobs where people.
IPR 2 WUHAN 29 JULY 2009 TACKLING THE IPR PROBLEM THREATS AND OPPORTUNITIES.
Online Marketing Bluefield College November 23, 2010.
The activities of the state tax authorities
Maritime Security as an Integral Part of an
Economics and the Global Economy
Chapter 9 e-Commerce Systems.
Intro to Intellectual Property 3.0
2nd GLOBAL CONFERENCE on BUSINESS, ECONOMICS, MANAGEMENT and
Advanced Income Tax Law
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Online Retailing The consumer is not primarily price-driven when shopping on the Internet but instead considers brand name, trust, reliability, delivery.
Gangs.
Levels of Police in Canada
ETHICS AND CORPORATE SOCIAL RESPONSIBILITY IN A GLOBAL CONTEXT
8.1 Levels of Police in Canada/Starting a Police Investigation
Introduction to asset recovery in Poland and Wielkopolska region, along with the presentation of the invited guests and discussion of thematic areas presented.
FINANCIAL INTELLIGENCE CENTRE
Manchester City Council Trading Standards & Manchester Markets
POWER POINT PRESENTATION ON
Types of information systems in organizations and its characteristics
Chapter 2: Introduction to Electronic Commerce
APPLICATION OF E-COMMERCE IN DIRECT MARKETING
Marketing in the Digital Age: Making New Customer Connections
Anti-Money Laundering Guidelines
LT: Explain the roles government plays in our free enterprise system
Cyber Trends and Market Update
Trafficking in Persons (TIP)
LT: Explain the roles government plays in our free enterprise system
Identify the roles government plays in our free enterprise system
The role of Supreme Audit Institutions in fragile situations: initial findings Research by David Goldsworthy and Silvia Stefanoni of Development Action.
Identify the roles government plays in our free enterprise system
List and Identify the different types of businesses
Tobacco fraud media strategy
Stakeholder Engagement Meeting
IPR Border Enforcement in the United States
Presentation transcript:

Counterfeiting and Organized Crime II International Forum on Combating Counterfeiting and Piracy April 19, 2017

IPR Center: 23 U.S. Federal and International Agencies The IPR Center Mission: To promote national security by protecting the public’s health and safety, U.S. economy, military, and to stop predatory and unfair trade practices that threaten the U.S. and global economy. The IPR Center Agencies Include: Immigration and Customs Enforcement U.S. Customs & Border Protection Federal Bureau of Investigation U.S. Postal Inspection Service U.S. Food & Drug Administration Department of Commerce Naval Criminal Investigative Service Defense Criminal Investigative Service Army Criminal Investigation Command, Major Procurement Fraud Unit Defense Logistics Agency, Office of the Inspector General Air Force Office of Special Investigations U.S. Patent & Trademark Office U.S. General Services Administration Consumer Product Safety Commission National Aeronautics and Space Administration, Office of Inspector General Nuclear Regulatory Commission Department of State, Office of International IP Enforcement Federal Maritime Commission (FMC) The U.S. Postal Service Office of Inspector General (USPS OIG) Interpol Europol Royal Canadian Mounted Police Mexican Revenue Service For prosecution, investigations are coordinated with the U.S. Department of Justice Computer Crimes & Intellectual Property Section.

Challenges: Increasing Counterfeits Global counterfeits trade surpassed $461 billion In 2013, international trade in counterfeit and pirated products represented 2.5% of world trade, totaling $461 billion USD. This represents a significant potential economic loss for rights holders, governments, and the global economy. Criminal networks behind the illicit trade derive significant revenues from their activities. Since the early 1990s, trade in counterfeits has grown at 8 times the rate of legitimate trade. Sources- The Organisation for Economic Co-operation and Development (OECD) and European Union Intellectual Property Office (EUIPO).  (April 18, 2016), Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact, OECD Publishing, Paris. U.N. Office on Drugs and Crime. International Monetary Fund.

Challenges: Online Sales Increasing In 2016, 1 in 12 retail dollars was spent online in the U.S. In 2020, 1 in 8 retail dollars is projected In 2020, it is projected that 1 in 8 retail dollars spent in the U.S. will be online. In 2016, 1 in 12 retail dollars was spent online in the U.S. Source- U.S. Census Bureau *Excludes gas/fuel sales

“Traditional” Organized Criminal Enterprises Organized Crime’s Transformation “Traditional” Organized Criminal Enterprises Based on ethnicity or families Geographic or community territories Physical, real-world presence Hierarchical leadership Established social norms New Threat Actors Loosely affiliated networks Face-to-face interaction less common Varying forms of leadership and hierarchy Not bound by geography

Traditional vs. Non-Traditional Organized Criminal Enterprises Leader Enforcer $$$ Seller Counsel $$$ Spammer Carder Site Admin Product Coder Organized crime groups exist on a spectrum, dependent upon their level of organization. Criminal enterprises vary in whether their activity is purely aimed at online targets, how they use online tools to enable crimes in the “real” world, and how they mix online and offline targets. There are three types of more organized crime groups today—traditional, hybrid, and new. The traditional, or offline, organized criminal enterprise is hierarchal, demonstrated by the organized crime model on the left. This traditional structure is often thought of in relation to crime families or ethnicity, and members often follow clear-cut social norms. The operational advantage of this type of structure is that grey areas exist in defining some activities as crimes. Nation states or established crime families may be viewed as “above the law.” This structure’s operational weakness is that there is usually a high level of police knowledge or awareness about these groups. Many face reputational damage if their activities are exposed. There are two types of organized criminal groups operating online—the extended hybrid and the hub. For law-enforcement agencies, some of the more concerning developments are the evidence of the hybrid organizations, which combine on and offline offenses, and where new and old forms of criminality converge. This is seen when the traditional organized crime groups move into the online world, creating the extended hybrid organization. New and unpredictable opportunities for crime are opening up as a result. The hybrid model is less defined than the centralized/organized groups. They tend to lack obvious central focus but still associate with multifarious and highly-complex flows of criminal activity. An operational disadvantage is the hybrid’s activities appear disassociated; however, a degree of coordination is necessary for the offending to succeed. For law enforcement to disrupt them, interventions must be directed at the hybrid’s sub-groups (affiliate network). On the right we see an example of a non-traditional, or online, organized crime network, or the new threat actors as we might refer to them. These groups conduct directed, purposeful criminal online criminal activity, and involve core groups of members linked to a wider periphery of criminal associates. Central hubs can be difficult to penetrate and they use codes and symbols to avoid detection; however they have a clear command structure and key individuals for law enforcement to focus on. Traditional Non-Traditional

Organized Crime’s Involvement in Counterfeit Pharmaceutical Trade Traditional Organized Criminal Enterprises Heavily involved in street sales of counterfeit pharmaceuticals One part of larger smuggling operations and black-market activity for many groups worldwide Asian Organized Crime Middle-Eastern Criminal Enterprises African Organized Crime La Cosa Nostra For organized criminal groups, the counterfeit trade is all about “low risk, high reward.” For actors engaged in traditional organized crime, selling a counterfeit pill (depending on the type of drug) is far more lucrative and far less risky (in terms of fines, jail time and occupational hazards) than selling “real” illicit narcotics.

Organized Crime’s Involvement in Counterfeit Pharmaceutical Trade Non-Traditional Organized Crime Loosely inter-related affiliates Varying specialties Limited knowledge of full scope of operation Frequently global in scope of operation Dominate online counterfeit pharmaceutical sales Organized criminal enterprises, with varying roles in the manufacture, advertising, transaction handling and financial processing all play a large part in dominating the online sales of counterfeit pharmaceuticals. One part of this affiliate model involved in counterfeit pharmaceuticals sales—spam-based advertisers—by one measure, accounted for over 80 percent of all spam messages sent in 2010.

Trends and Characteristics Organized Criminal Enterprises often involved in many criminal activities to manufacture, advertise and sell counterfeit pharmaceuticals Money laundering Human trafficking Identity theft / financial institution fraud Computer intrusions Threat finance Extortion Public corruption Counterfeiting is not just about trafficking in infringing product. In order to facilitate this trade, organized crime typically engages in a number of other criminal activities.

Trends and Characteristics Rapid adaptation to enforcement efforts Dark search engine optimization Rapid domain name switching Rapid financial flows Bulletproof hosting services Rogue payment service providers Instead of “giving up” due to enforcement efforts, traffickers try to out-maneuver law enforcement. Groups that advertise their illicit goods through search engine terms (think of the ads section that appears on Google, Yahoo! or Bing search results) are frequently shut down through rights-holder notification. As a result, these groups have adapted by compromising legitimate web pages to re-index their sites in search engine results, a process known as Dark Search Engine Optimization or Dark SEO. Groups engage in creating hundreds of new domain names, new payment service provider accounts, new credit card accounts; all in an effort to rapidly shift from a site or account taken down through law enforcement, to a new site advertising the same counterfeit product. To prevent law enforcement from unraveling networks trafficking counterfeits through the issue of legal process, such as subpoenas or search warrants, organized criminal enterprises have turned to internet service providers (ISPs) who specialize in not responding to law enforcement requests. These ISP’s, referred to as “bulletproof” for their contempt of enforcement efforts, typically reside in places beyond the jurisdictional and diplomatic reach of investigators. Organized criminals have also begun to cut out “legitimate” services in favor of illicit service providers who cater specifically to criminal clientele—in the last several years, there has been the emergence of rogue payment service providers, who almost exclusively move money for criminal actors engaged in illicit online trade.

Thank You www.IPRCenter.gov