Counterfeit Products, Genuine Harm: How Intellectual Property Theft Fuels Organized Crime While Undermining American Communities

2013 ◽  
Author(s):  
Bruce Levinson
Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1987
Author(s):  
Md. Selim Hossain ◽  
Md. Habibur Rahman ◽  
Md. Sazzadur Rahman ◽  
A. S. M. Sanwar Hosen ◽  
Changho Seo ◽  
...  

In this work, we examine the privacy and safety issues of Internet of Things (IoT)-based Precision Agriculture (PA), which could lead to the problem that industry is currently experiencing as a result of Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make a system less secure if a proper security mechanism is not ensured. Shortly, IoT will transform everyday lives with its applications. Intellectual Property (IP) is another important concept of an intelligent farming system. If the IP of a wise farming system leaks, it damages all intellectual ideas like cultivation patterns, plant variety rights, and IoT generated information of IoT-based PA. Thus, we proposed an IoT enabled SDN gateway regulatory system that ensures control of a foreign device without having access to sensitive farm information. Most of the farm uses its devices without the use of its integrated management and memory unit. An SDN-based structure to solve IP theft in precision farming has been proposed. In our proposed concept, a control system integrates with the cloud server, which is called the control hub. This hub will carry out the overall PA monitoring system. By hiring the farm devices in the agricultural system, these devices must be tailored according to our systems. Therefore, our proposed PA is a management system for all controllable inputs. The overall goal is to increase the probability of profit and reduce the likelihood of IPT. It does not only give more information but also improves information securely by enhancing the overall performance of PA. Our proposed PA architecture has been measured based on the throughput, round trip time, jitter, packet error rate, and the cumulative distribution function. Our achieved results reduced around (1.66–6.46)% compared to the previous research. In the future, blockchain will be integrated with this proposed architecture for further implementation.


Author(s):  
Andrea Schoepfer

Studies of white-collar crime have largely focused on the crimes and immoral and unethical actions of adults during the course of their legitimate occupations, yet adults are not the only offenders, and white-collar crimes don’t always require employment. By narrowing the focus to who can offend, we may miss out on a fuller understanding of the phenomenon. The specific category of “white-collar delinquency” has been proposed to address this gap in the research. The original conceptualization of white-collar delinquency focused on crimes of juveniles that are of major financial and social consequence. The concept largely focuses on computer crimes, fraud, and crimes of skill, including piracy, securities fraud, espionage, denial of service attacks, hacking, identity fraud, dissemination of worms and viruses, and other crimes that can result in serious economic harm. Just as juveniles engage in conventional street crime offenses as do adult offenders, they also possess the ability to engage in white-collar offenses as do adult offenders, and there is a need to study the two age groups separately, as motivations, influences, and opportunities may differ. The literature thus far has largely ignored juvenile involvement in white-collar crimes due to the nature of the phenomenon, the reliance on offender-based definitions, and the presumption of opportunities to engage in the actions. Some white-collar offenses that were historically committed exclusively by adults have a place in the juvenile community as well. This “migration” has taken place for a number of reasons, with the majority of them closely tied to the nearly limitless access juveniles currently have to technology. Due to the overwhelming popularity of personal computers in homes and marked advancements in technology, opportunities for hybrid white-collar crimes (e.g., credit card fraud, identity theft, hacking, phishing, general fraud, intellectual property theft, financial/bank fraud) have dramatically increased, yet criminological studies focusing on technology related crimes have, until recently, been relatively sparse, and studies of fraud have predominately focused on characteristics of the victims as opposed to the offenders. As access to computers and the internet grow, so too do opportunities to engage in these types of crimes. Juveniles are able to interact with others from the privacy of their own homes with the benefit of complete anonymity. This anonymity may contribute to the appeal of computer-related delinquency, as such acts involve almost no confrontation and no violence, and are individualistic in nature. These individualistic crimes may attract those who would normally avoid more conventional crimes that involve confrontation. Technology has opened the door for a new type of offender and new types of offending. Although it is difficult to identify an exact dollar amount, financial losses from serious computer crimes such as audio, video, and software piracy; security breaches; and intellectual property theft are likely to exceed the financial losses from conventional crimes, and it is therefore imperative that more attention be given to these types of crimes and perpetrators. Theoretical explanations for this new category of crime have not yet been fully explored for many reasons. First, technology advances much faster than the laws regulating behavior. Second, apprehension and prosecution for crimes of technology are relatively low, and thus little data exists for theory testing with these crimes and offenders. Finally, computer and technology crimes fall into a gray area; they are not necessarily either property crimes or traditional white-collar crimes. In criminology, computer crimes tend to fall into a “hybrid” or “other” category of white-collar crime and as such are often ignored in studies on white-collar crime. Furthermore, juveniles are often overlooked in white-collar crime research due to their status and limited access to opportunity. By proposing the term “white-collar delinquency,” researchers hope to bring more focus to the understudied topic of juveniles engaging in crimes of serious economic consequence.


Author(s):  
Abhrajit Sengupta ◽  
Nimisha Limaye ◽  
Ozgur Sinanoglu

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues.


Author(s):  
Mark Vladimirovich Shugurov

The subject of this research is the legal policy of the European Union against counterfeiting in the conditions of functioning of the Digital Single Market. The goal is to determine the content and patterns of development of this policy from the perspective of combining traditional and innovative measures and initiatives aimed at prevention of trafficking of counterfeit goods in the digital environment. Special attention is given to the analysis of the key factors of formation formation of this policy, taking into account the implementation of the Strategy of the Digital Single Market. The author analyzes the dynamics of application of the organizational-legal mechanisms for combating counterfeiting, and the multi-stakeholder approach that lies beneath them. Separate section of the article is dedicated to establishment of the principles of using voluntary measures on prevention and suppression of the trafficking of counterfeit goods in the digital environment. The conclusion is made that the theoretical provisions indicating that the EU anti-counterfeit policy is aimed the development of supranational block of legal instruments related to the sphere of intellectual property law and customs regulation, and represents a system of comprehensive actions, each of which is implemented depending on the thematic agenda reflecting the strategic intentions for action. The author’s special contribution lies in determination of the patterns of transition towards the regime of responsibility of online platforms that allow posting the offers of counterfeit products. The novelty of this article consists in demonstrating the effective combination of non-legislative and legislative measures used on the supranational level for protecting intellectual property in the conditions of the development of digital environment.


Industrija ◽  
2021 ◽  
Vol 49 (1) ◽  
pp. 7-23
Author(s):  
Branko Radulović ◽  
Miljan Savić

The paper represents the first step in quantifying the categories of goods with the highest risk of being counterfeit during import into Serbia. Firstly, we present a methodology for quantifying the level of counterfeiting, its advantages, and its limitations. Secondly, we determine the product categories most likely to contain counterfeit products. Likewise, by using the OECD methodology, the GTRIC-p indicator for Serbia was formed, enabling comparison with OECD member countries. Based on the results, Serbia does not significantly differ from EU countries in terms of structure and product categories most at risk. The negative effects of imports of counterfeit products are borne mainly by the foreign intellectual property rights holders whose counterfeit products are imported into Serbia. In this context, despite the legal framework in place, incentives for its proper implementation are questionable.


2020 ◽  
Vol 72 (3) ◽  
pp. 748-771 ◽  
Author(s):  
Michael A Klein

Abstract I examine the relationship between public enforcement of intellectual property (IP) rights and firm strategies to influence entry of non-deceptive counterfeit products: illegal copies of authentic goods purchased consciously by consumers. I assume that private enforcement investment determines the probability that a counterfeit entrant will be detected, while public investment determines the efficacy of the legal institutions responsible for enforcing IP law. Private and public enforcement serve distinct complementary roles, which combine to determine total IP protection in the economy. I show that differences in the investment incentives of the two entities that control enforcement lead to inefficiently low public investment in equilibrium. In this context, international efforts to impose stricter legal penalties against counterfeiters can be counterproductive: further reducing public enforcement and increasing counterfeit prevalence. In contrast, minimum quality standards can be implemented to better align incentives, encourage higher public enforcement, and reduce inefficiency.


Sign in / Sign up

Export Citation Format

Share Document