Taking Action Against a Global Counterfeiting Syndicate: the Microsoft experience in China 09/15/2008 WIPO - Geneva Laurent Masson EMEA Director-Anti-Piracy.

Slides:



Advertisements
Similar presentations
1 The Changing Fortunes of the EUs Energy Market Antony Froggatt.
Advertisements

1 Digital Media Distribution Channels ©OverDrive, Inc DRM Challenges in Digital Media Distribution Channels Steve Potash May.
Future of Video Games September 2008 Shana Fisher Senior Vice President, Mergers & Acquisitions, Strategy IAC/InterActiveCorp.
Facts and Figures Asia Pacific 2010
External Trade 1 5th Global Congress Combating Counterfeiting and Piracy Global and Regional IPR Enforcement Initiatives Luc-Pierre Devigne Head of Intellectual.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Fifth Global Congress Cancun 2009 Martin Lerigo – Head of Strategic.
Making Anti- Counterfeiting Laws and Enforcement Work: A Case Study from China David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting.
U.S. Government Coordinated Approach to IPR Protection and Enforcement 4 th Global Congress on Combating Counterfeiting & Piracy February 3-5, 2008 Wayne.
Rightsrouter and DOI Presentation to IDF Members Meeting 22nd June 2004 Gordon Rintoul - Director of Operations.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1 Post-1949 Chinese Local Gazetteers: Digitization and Collaborative Collection Susan Xue Electronic Resources Librarian University of California at Berkeley.
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
Presentation by: Virus Annihilator Template by:
Intent MediaWorks, Inc. Atlanta, New York Atlanta, New York P2P Summit The Future of Distribution 1.
1 National Center for the Training of Bank Personnel of Ukraine.
Kristīne Pabērza Ministry of Culture State Agency Culture Information Systems Latvia Member States' Expert Group on Digitization and Digital Preservation.
Combating Counterfeit Drugs in China Chen Xu Ph.D. Director of Division of Drug Supervision and Inspection Department of Drug Market.
Anti- Piracy Unit (APU) REPUBLIC OF MAURITIUS 1. MAURITIUS 2.
Innovation and Technology Transfer Innovation and Technology Transfer LIU Jian International Cooperation Department The State Intellectual Property Office.
IP education and training course in Korea Using IP Panorama Baek, Jae-hong, Deputy director of KIPO.
Support program for SME IP activity in Japan Naohiko YOKOSHIMA WIPO forum on intellectual property and small and medium-sized enterprises 13 September.
Intellectual Property Strategy for SMEs
1 THE ENFORCEMENT OF IP RIGHTS IN THE SPANISH PATENT AND TRADEMARK OFFICE Javier Moreno Ramos, Director of Department of Legal Coordination and International.
1 1  1 =.
Feasibility and Business Planning
CSPP European University Institute, Florence THE POLITICAL IMPLICATIONS OF INTERNET DIFFUSION Professor Richard Rose Director, Centre for the Study of.
£1 Million £500,000 £250,000 £125,000 £64,000 £32,000 £16,000 £8,000 £4,000 £2,000 £1,000 £500 £300 £200 £100 Welcome.
KIPO’s Policies on IP Marketplace Choongjae Lee Intellectual Property Promotion Division KIPO (Korean Intellectual Property Office)
National Center for Construction Education & Research Affiliated with the University of Florida Greening the Workforce.
Joint SA-SEAP Ozone Officers Network Meeting Pattaya, Thailand October 2012 CHALLENGES FOR HCFC PHASE-OUT IN AIR CONDITIONING.
PLIVA, a Member of the Teva Group Tihomir Oreskovic
Best Practices in IP enforcement for International Organizations Presentation by Kristiina Kangaspunta Executive Officer of the United Nations Interregional.
Broadband and content as a driver for promotion Broadband Promotion IRG-FSR workshop Fiesole, 16th of November.
Bent u klaar voor China? Antwerpen, 29 maart 2006 Bescherming van uw intellectuele eigendommen Practical Aspects of Software Protection in China Mr. Aubin.
AXIS Communications - a world of intelligent networks CEO Peter Ragnarsson.
The European Lighting Industry Position on How to Maximise the Potential Benefits of European Policy on Energy Efficiency in Lighting January 2008.
New-Product Development and Product Life-Cycle Strategies
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Doc.: IEEE /0149r0 Submission Jan 2008 Andrew Myles (Cisco)Slide 1 Liaison report from the Wi-Fi Alliance to WG Date: Authors:
WHICH TO CHOOSE RIGHT SERVER FOR THE RIGHT JOB. Today’s business environment demands that small and midsize businesses do more with less. The large majority.
Which would you choose? Filled with air. Possibly filled with air.
Fujitsu Siemens Computers at a glance Georgios Nikolopoulos Sales Manager November 2008.
Chapter 11Copyright ©2008 by South-Western, a division of Thomson Learning. All rights reserved 1 MKTG Designed by Amy McGuire, B-books, Ltd. Prepared.
McGraw-Hill/Irwin Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. Global Business and Accounting Chapter 15.
Installing Windows XP Professional Using Attended Installation Slide 1 of 30Session 8 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Links Between East Asian Markets And Russian Salmon Fisheries R. C. Kirkpatrick Regional Director TRAFFIC East Asia based on a study by Shelley Clarke.
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Copyright © 2009 The Nielsen Company An Introduction to The Nielsen Company.
MBA Compliance Essentials Ability to Repay-Qualified Mortgage Rule Web Course Webinar Presentation June 19, 2014 Ken Markison, Esq. MBA Vice President.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Mr. Weiss China and Intellectual Property What do we mean by “intellectual property”??
Brand Protection: In the face of mounting counterfeiting, diversion & other infringements Jim Mentone | Director, Consumer Global Brand Protection.
! Doing Battle With Counterfeiters In China There Is a Way!! Ross Epstein TechLaw LLP October 17, 2011 Licensing Executive Society.
How to guard against dealing in pirated or unlicensed software Tony Chow.
Piracy In Bangladesh. What is Software Piracy By far, the biggest legal problem affecting the computer industry today is software piracy, which is the.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
RBAP Confidential and Proprietary 1 Microsoft Licensing Know your options Eric Rivas Business Development Manager November 9, 2004.
Tackling the Illicit Trade – JTI’s Approach Sofia, June
Developing Anti-Counterfeiting Strategies for a Global Environment Peggy Chaudhry Assistant Professor of International Business Villanova University –
1 Intellectual Property Rights Investigations Office of Investigations U.S. Immigration and Customs Enforcement Department of Homeland Security.
Which would you choose? It seems obvious, right? With something so important, you need to know what you are getting. Surprisingly, many of your customers.
Legal and Ethical Issues in Computer Security Csilla Farkas
Piracy and Counterfeiting as Obstacles to Development Jeffrey Hardee Vice President & Regional Director Business Software Alliance October 25, 2004.
USPTO Coordination of IP Policy Protection, Policy, Enforcement and Training Robert L. Stoll United States Patent and Trademark Office.
Microsoft Windows Technical Support Setup,Install,Activate
IPR Border Enforcement in the United States
Presentation transcript:

Taking Action Against a Global Counterfeiting Syndicate: the Microsoft experience in China 09/15/2008 WIPO - Geneva Laurent Masson EMEA Director-Anti-Piracy & Internet Safety

Introduction Worldwide counterfeiting rates Counterfeiting & Software Piracy The Chine Syndicate case Case Summary Building the case MS Team The July 2007 Actions PR Coverage

Worldwide Counterfeiting And Software Piracy Rates Tier 1 - Piracy Rate Below 50% Tier 2 - Piracy Rate 50% to 80% Tier 1 - Piracy Rate Above 80% California is Center of U.S. Counterfeiting Industry Guandong Center of China Counterfeiting Industry

MS Strategy and approach Intelligence Enforcement Internal/External PR Awareness and Education Governement outreach

Software protection and IPRs Copyright Patent Trademark Know-how Secret and confidentiality

Counterfeiting & Software Piracy The Most Common Types of Piracy END USER COPYING MISCHANNELING HARD-DISK LOADING INTERNET PIRACY (CDs/DVDs and digital downloads) COUNTERFEITING (low quality / high quality)

Syndicates Manufacturing and Distribution Model Asia Asia LatAm Centralized in Taiwan Singapore & Hong Kong Worldwide Many Organizers/ Financiers Counterfeit Manufacturers Exporters and Brokers Distributors Resellers End Customers

Case Summary The most significant crackdown on software piracy according to industry executives Microsofts LCA investigative team has been tracking the syndicate since 1999 and is the largest operation ever investigated First identified after influx of Win 98 and Office 2000 counterfeits bearing a legitimate Security features appeared in the market Various enforcement actions over the years took out some key players but never completely dismantled the organization 2003 organization move from Taiwan to S. China increased complexity of case Investigators and forensic experts continued target surveillance and evidence gathering in hopes of convincing law enforcement to accept case In 2006, MS Investigators and attorneys presented case to the US Dept. of Justice resulting in subsequent high level meetings between FBI and Chinese authorities

Resulting in Major Action A June 2007 meeting between FBI Los Angeles and Chinese authorities resulted in swift action against Syndicate targets Actions took place July 6 to July searches in 3 cities 25 arrests Seizure of $500 M of counterfeit software and components including: 22 master replication disks 70K units of counterfeit Vista, Windows XP and Office K counterfeit Certificate of Authenticity labels (COAs) 60K units of user guides, product cases and security labels Counterfeit production equipment and other raw materials

Building the Case 6 Years of investigation…

Microsofts Involvement prior to the raids in China The Chinese syndicate is the largest operation Microsoft has ever investigated Microsofts 75-member antipiracy team had been tracking the syndicate since May 2001 Prior to the July 2007 raids, Microsoft obtained nearly 290K copies of counterfeit software from test purchases, seizures by law enforcement and customs and submissions made by customers and partners Acquisitions from 27 countries, 13 titles, 8 languages Forensic examination revealed at least 30 unique production lines Estimated value of counterfeit Microsoft software produced by this syndicate is $2 billion Microsoft provided intelligence and evidence to law enforcement and supported their efforts to take legal steps against the syndicate

Proliferation of Syndicates Counterfeits Units by Country 100,000 to 400,000 10,000 to 99,999 1,000 to 9, to to 99

OCO Products 2 Product Types 40% full packaged product E2E and IMBH only versions 60% stand alone COA labels Old TDRL pink imbedded thread 3M clear-de-cyan DLR Porthole Porky and retail 19 Product Lines 75% Windows OS 22% Office 3% Windows Server 11 Languages Although English made up the majority of finds an ever expanding range of languages was being identified. Counterfeit Title % of WW Acquisitions Windows XP Professional37% Windows 98 SE20% Windows 2000 Professional10% Office 2003 Professional7% Office 2007 Professional7% Office 2000 Professional4% Windows 2003 Server3% Office 2003 SBE2% Windows XP Home2% Windows Vista Business2% Windows XP Professional x641% Windows Me1% Windows Vista Ultimate<1% Office 2000 SBE<1% Windows 98 (Original)<1% Office 2000 Premium<1% Windows 2003 Small Business Server<1% Windows 2000 Advanced Server<1% Windows 2000 Server<1%

Auction Sites used as distribution vehicle by syndicate MS investigated 21,568 units of software from 2,033 auctions originating from 17 countries – 86 % counterfeit/infringing software. – 38% of all counterfeit software from China Syndicate Dramatic increase YOY in the number of OCO counterfeit software auctions as syndicate attempts to access developed markets through domestic online auctioneers.

High Quality Syndicate responsible for the manufacture and distribution of the highest quality counterfeits on the market Significant investment made by syndicate to simulate Microsofts anti-piracy security features including: Holograms Imbedded threads Product activation Most customers did not realize they have been duped until they failed the Validation process Prices were very similar to genuine product by the time product got to final market destination.

Range of Products and Components

Extensive investigations by Microsoft identified the major targets 17 Mr BIG

Taking action Microsoft Team 12 employees dedicated Combination of expertise : Business analysts, forensic experts, investigators, attorneys….in several countries Key points : product identification and tracing; understanding of the distribution channels; coordination with LE in the US and in China.

The Raids in China

July 2007 Action in China A June 2007 meeting between FBI Los Angeles and Chinese authorities resulted in swift action against Syndicate targets Actions took place July 6 to July searches in 3 cities 25 arrests Seizure of $500 M of counterfeit software and components including: 22 master replication disks 70K units of counterfeit Vista, Windows XP and Office K counterfeit Certificate of Authenticity labels (COAs) 60K units of user guides, product cases and security labels Counterfeit production equipment and other raw materials

Raid uncovered massive stocks of components ready for assembly. Microsoft Investigators analyze and inventory seized product Security Thread for new COAs1000s of mylar E2E labels Security thread for old COAs Counterfeit COAs

Deceiving the Customer: Mylar Label The use of the Mylar label is what distinguishes these counterfeits for all other counterfeit producers The simulated Mylar label is very deceptive to end-users and law enforcement agents Components seized on raid showed how syndicate had continued to improve manufacturing process Scratch off version Peelable label w/ lip Spindle of counterfeit Win XP Pro

Deceiving the Customer: COA w/ Thread Simulated security thread to high level Port-hole security feature adequately simulated; good enough to fool customer

Deceiving the Customer: Product Activation Keys found on Windows XP Pro COAs are typically keygen VL keys created using illicit tools on the internet. These keys will bypass activation but will fail validation. The first Office 2003 Pro COA keys were Windows XP Home keys that customers used in a phantom or fake activation – the actual key used is a leaked volume license key that was baked into bits by the counterfeiters. This product will bypass activation and since the leaked key is NOT blocked, will also pass validation Keys found on Windows XP Home COA are authentic royalty OEM keys – this one traces to ACER. These keys will generally pass both activation and validation. These Vista COA keys are actually Windows XP Pro keygen VL keys. They will not work for Vista and the customer will fail both activation and validation after 30 days. The counterfeiters tried to provide users access to a server that would allow for activation and validation, but this server has been removed and will not work. (No keygen Vista keys available due to implementation of SPP) The second version of Office 2003 COA used keygen VL keys. These keys will bypass activation but will fail validation Keys found on Office 2007 COAs are also keygen VL keys. Office did not create a stronger product key like Vista so keygen keys for 2007 were immediately available to the counterfeiters. They will bypass activation but fail validation.

A joint success by Chinese and US police

Thank You for your Attention!