Intellectual property theft and national security: Agendas and assumptions

2016 ◽  
Vol 32 (4) ◽  
pp. 256-268 ◽  
Author(s):  
Debora Halbert
Author(s):  
H. O. Androshchuk

Ukraine’s healthcare system faces unprecedented national security challenges in the third wave of the COVID-19 pandemic. A particularly acute issue is countering counterfeit pharmaceuticals, preventing drug shortages, joining efforts of the authorities and national manufacturers of drugs and medical supplies. According to the UN, more than 60 % of the population lives below the poverty line in Ukraine. Timely response to these challenges and taking preventive measures will save lives, minimize the volume and consequences of the pandemic. The paper provides an economic and legal analysis, trends, risks and threats to national security of the state and health protection during a pandemic, in order to protect intellectual property rights, adequate coordination of actions at the national and international levels. The impact of counterfeiting on the criminal landscape in the EU, and also business and economy, is shown based on the analysis of studies by the OECD, the EU Intellectual Property Office (EUIPO) and Europol. The foundations of anti-counterfeiting management, measures to implement a standard anti-counterfeiting strategy are proposed.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1987
Author(s):  
Md. Selim Hossain ◽  
Md. Habibur Rahman ◽  
Md. Sazzadur Rahman ◽  
A. S. M. Sanwar Hosen ◽  
Changho Seo ◽  
...  

In this work, we examine the privacy and safety issues of Internet of Things (IoT)-based Precision Agriculture (PA), which could lead to the problem that industry is currently experiencing as a result of Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make a system less secure if a proper security mechanism is not ensured. Shortly, IoT will transform everyday lives with its applications. Intellectual Property (IP) is another important concept of an intelligent farming system. If the IP of a wise farming system leaks, it damages all intellectual ideas like cultivation patterns, plant variety rights, and IoT generated information of IoT-based PA. Thus, we proposed an IoT enabled SDN gateway regulatory system that ensures control of a foreign device without having access to sensitive farm information. Most of the farm uses its devices without the use of its integrated management and memory unit. An SDN-based structure to solve IP theft in precision farming has been proposed. In our proposed concept, a control system integrates with the cloud server, which is called the control hub. This hub will carry out the overall PA monitoring system. By hiring the farm devices in the agricultural system, these devices must be tailored according to our systems. Therefore, our proposed PA is a management system for all controllable inputs. The overall goal is to increase the probability of profit and reduce the likelihood of IPT. It does not only give more information but also improves information securely by enhancing the overall performance of PA. Our proposed PA architecture has been measured based on the throughput, round trip time, jitter, packet error rate, and the cumulative distribution function. Our achieved results reduced around (1.66–6.46)% compared to the previous research. In the future, blockchain will be integrated with this proposed architecture for further implementation.


Author(s):  
Andrea Schoepfer

Studies of white-collar crime have largely focused on the crimes and immoral and unethical actions of adults during the course of their legitimate occupations, yet adults are not the only offenders, and white-collar crimes don’t always require employment. By narrowing the focus to who can offend, we may miss out on a fuller understanding of the phenomenon. The specific category of “white-collar delinquency” has been proposed to address this gap in the research. The original conceptualization of white-collar delinquency focused on crimes of juveniles that are of major financial and social consequence. The concept largely focuses on computer crimes, fraud, and crimes of skill, including piracy, securities fraud, espionage, denial of service attacks, hacking, identity fraud, dissemination of worms and viruses, and other crimes that can result in serious economic harm. Just as juveniles engage in conventional street crime offenses as do adult offenders, they also possess the ability to engage in white-collar offenses as do adult offenders, and there is a need to study the two age groups separately, as motivations, influences, and opportunities may differ. The literature thus far has largely ignored juvenile involvement in white-collar crimes due to the nature of the phenomenon, the reliance on offender-based definitions, and the presumption of opportunities to engage in the actions. Some white-collar offenses that were historically committed exclusively by adults have a place in the juvenile community as well. This “migration” has taken place for a number of reasons, with the majority of them closely tied to the nearly limitless access juveniles currently have to technology. Due to the overwhelming popularity of personal computers in homes and marked advancements in technology, opportunities for hybrid white-collar crimes (e.g., credit card fraud, identity theft, hacking, phishing, general fraud, intellectual property theft, financial/bank fraud) have dramatically increased, yet criminological studies focusing on technology related crimes have, until recently, been relatively sparse, and studies of fraud have predominately focused on characteristics of the victims as opposed to the offenders. As access to computers and the internet grow, so too do opportunities to engage in these types of crimes. Juveniles are able to interact with others from the privacy of their own homes with the benefit of complete anonymity. This anonymity may contribute to the appeal of computer-related delinquency, as such acts involve almost no confrontation and no violence, and are individualistic in nature. These individualistic crimes may attract those who would normally avoid more conventional crimes that involve confrontation. Technology has opened the door for a new type of offender and new types of offending. Although it is difficult to identify an exact dollar amount, financial losses from serious computer crimes such as audio, video, and software piracy; security breaches; and intellectual property theft are likely to exceed the financial losses from conventional crimes, and it is therefore imperative that more attention be given to these types of crimes and perpetrators. Theoretical explanations for this new category of crime have not yet been fully explored for many reasons. First, technology advances much faster than the laws regulating behavior. Second, apprehension and prosecution for crimes of technology are relatively low, and thus little data exists for theory testing with these crimes and offenders. Finally, computer and technology crimes fall into a gray area; they are not necessarily either property crimes or traditional white-collar crimes. In criminology, computer crimes tend to fall into a “hybrid” or “other” category of white-collar crime and as such are often ignored in studies on white-collar crime. Furthermore, juveniles are often overlooked in white-collar crime research due to their status and limited access to opportunity. By proposing the term “white-collar delinquency,” researchers hope to bring more focus to the understudied topic of juveniles engaging in crimes of serious economic consequence.


2005 ◽  
Vol 15 (4) ◽  
pp. 595-613 ◽  
Author(s):  
Patricia H. Werhane ◽  
Michael Gorman

Abstract:Although the idea of intellectual property (IP) rights—proprietary rights to what one invents, writes, paints, composes or creates—is firmly embedded in Western thinking, these rights are now being challenged across the globe in a number of areas. This paper will focus on one of these challenges: government-sanctioned copying of patented drugs without permission or license of the patent owner in the name of national security, in health emergencies, or life-threatening epidemics. After discussing standard rights-based and utilitarian arguments defending intellectual property we will present another model. IP is almost always a result of a long history of scientific or technological development and numbers of networks of creativity, not the act of a single person or a group of people at one moment in time. Thus thinking about and evaluating IP requires thinking about IP as shared rights. A network approach to IP challenges a traditional model of IP. It follows that the owner of those rights has some obligations to share that information or its outcomes. If that conclusion is applied to the distribution of antiretroviral drugs, what pharmaceutical companies are ethically required to do to increase access to these medicines in the developing world will have to be reanalyzed from a more systemic perspective.


Author(s):  
Abhrajit Sengupta ◽  
Nimisha Limaye ◽  
Ozgur Sinanoglu

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues.


Author(s):  
Oleksandr Zaikivskyi ◽  
Oleksandr Onistrat

Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined. Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.


Author(s):  
Олександр Зайківський ◽  
Олександр Оністрат

The state policy on the management of objects of intellectual property right in the sphere of national security and defense is considered.Under the current conditions, national security is unconceivable without solving the problematic issues of intellectual property management and creating the necessary preconditions for the development of intellectual potential and its use for national security.At present, the concept of national security is being expanded to include more and more spheres of public life. New security settings related to the scientific and technological revolution have started to play an important role.Nowadays, issues of the formation of an effective state policy for ensuring national security in all its spheres and manifestations are of great importance. An important component of the mechanism for the formation and implementation of state policy in the field of national security should be the provision of intellectual property management.However, national security legislation does not provide for the development of a strategy or other programmatic document on scientific and technical security, which would envisage measures to ensure the protection of the scientific and intellectual potential of the state, competitive technologies available in the country.The question at issue is the fact that the state has not yet developed a national strategy for the protection of intellectual property, which would provide the protection of interests and rights of all subjects of intellectual property rights, and especially the state. Although the attempts to develop such a strategy were carried out repeatedly. The state system of intellectual property protection and the effectiveness of providingnational interests with its structural elements, in particular in the field of national security and defense, are investigated. Current problems in this area are explored and suggestions are made to resolve them.There exists a necessity for creation of the central executive authority, the main task of which should be the formation and implementation of the state policy on the protection and management of intellectual property, as well as the state body, which, on behalf of the state and in its interests, will execute the ownership rights of the objects of intellectual property rights that are in state property.


Sign in / Sign up

Export Citation Format

Share Document