ICE Seized 150 Websites that were Illegally Selling, Distributing Counterfeit Merchandise

To mark the official beginning of the online holiday shopping season, known as Cyber Monday, U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI), the National Intellectual Property Rights Coordination Center (IPR Center), the Department of Justice and the FBI Washington Field Office have seized 150 website domain names that were illegally selling and distributing counterfeit merchandise.

"For most, the holidays represent a season of good will and giving, but for these criminals, it's the season to lure in unsuspecting holiday shoppers," said ICE Director John Morton. "More and more Americans are doing their holiday shopping online, and they may not realize that purchasing counterfeit goods results in American jobs lost, American business profits stolen and American consumers receiving substandard products. And the ramifications can be even greater because the illicit profits made from these types of illegal ventures often fuel other kinds of organized crime."

"Through this operation we are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs," said Attorney General Eric Holder. "Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability, and today we have sent a clear message that the Department will remain ever vigilant in protecting the public's economic welfare and public safety through robust intellectual property enforcement."

This operation is the eighth phase of Operation In Our Sites, a sustained law enforcement initiative to protect consumers by targeting counterfeit and piracy on the Internet, and the second year it has coincided with Cyber Monday. These 150 domain name seizures represent a more than 80 percent increase over the 82 websites that were seized during last year's Cyber Monday-related operation.

The 150 seized domains are in the custody of the federal government. Visitors to these websites will now find a seizure banner that notifies them that the domain name has been seized by federal authorities and educates them that willful copyright infringement is a federal crime.

During this operation, federal law enforcement agents made undercover purchases of a host of products, including professional sports jerseys, golf equipment, DVD sets, footwear, handbags and sunglasses, representing a variety of trademarks from online retailers who were suspected of selling counterfeit products. In most cases, the goods were shipped directly into the United States from suppliers in other countries. If the trademark holders confirmed that the purchased products were counterfeit or otherwise illegal, seizure orders for the domain names of the websites that sold the goods were obtained from federal magistrate judges.

Since the operation's June 2010 launch, the IPR Center has seized a total of 350 domain names, and the seizure banner has received more than 77 million individual views.

Of the 350 domain names seized, 116 have now been forfeited to the U.S. government. The federal forfeiture process affords individuals who have an interest in the seized domain names a period of time after the "Notice of Seizure" to file a petition with a federal court and additional time after the "Notice of Forfeiture" to contest the forfeiture. If no petitions or claims are filed, the domain names become property of the U.S. government.

Additionally, a public service announcement (PSA), launched in April 2011, appears on each of the 114 forfeited domain names. This video educates the public about the economic impact of trademark counterfeiting and copyright infringement.

Previous website seizures include:

The operation was spearheaded by the IPR Center in coordination with the FBI's Washington Field Office, the Computer Crime and Intellectual Property Section of the Justice Department's Criminal Division and eight U.S. Attorneys' Offices, including the Southern District of Texas, Western District of Texas, District of Minnesota, Eastern District of Michigan, Eastern District of Louisiana, District of Maryland and the District of Colorado.

The IPR Center is one of the U.S. government's key weapons in the fight against criminal counterfeiting and piracy. The IPR Center uses the expertise of its 19 member agencies to share information, develop initiatives, coordinate enforcement actions, and conduct investigations related to IP theft. Through this strategic interagency partnership, the IPR Center protects the public's health and safety, the U.S. economy and the war fighters.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3