20
© 2016 MarkMonitor Inc. All rights reserved. How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor Joshua Hopping Investigative Research Specialist MarkMonitor

How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Embed Size (px)

Citation preview

Page 1: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

© 2016 MarkMonitor Inc. All rights reserved.

How to Identify, Disrupt, and

Dismantle Unauthorized

Product Distribution

Annie Wood Client Service Manager MarkMonitor

Joshua Hopping

Investigative Research Specialist MarkMonitor

Page 2: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Agenda

2

Introductions

How Big is the Problem?

Identifying Networks

Data-driven Decisions

Removing the Threat

Q&A

Page 3: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

How Big is the Problem?

Page 4: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

The Mafia, Camorra, Triads, and the Yakuza have all been linked to counterfeit/unauthorized goods

Counterfeit provides an easier way to launder money for other illicit activities

It also allows criminals to “diversify their crime” according to Europol

A $250 Billion Dollar Problem

4

“Just as the licit market for online sales of goods is increasing, so is the opportunity for the online sale of counterfeit goods by organized crime groups.” – United Nations Office on Drugs & Crime

Source: United Nations Office on Drugs & Crime

Page 5: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

The Anonymity of the Internet According to the IACC, the Internet has enabled counterfeiters to remain anonymous

while operating hundreds of sites.

Website operators can use fake information to register sites, making it more difficult to link them.

Ease of entry into the market is less cost prohibitive.

Networks can have several sites “waiting in the wings” if their main site goes down

As the Internet is largely unregulated, networks can quickly grow and prosper

5

“What was once a cottage industry has now become a highly sophisticated network of organized crime that has the capacity to threaten the very fabric of national economies, endanger safety and frequently kill. It devalues corporate reputations, hinders investment, funds terrorism, and costs hundreds of thousands of people their livelihood every year.”

– International Chamber of Commerce

Page 6: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

6

Could it be networked activity?

Lots of product below your wholesale price

Reports from consumers/affiliates of product that is not consistent with your packaging or brand standards

Product in regions you do not currently sell

Multiple seller names or websites using the same imagery or language to describe products

Sites registered to the same individual or company

Page 7: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Identifying Networks

Page 8: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

8

Multiple Sellers, One Network

Often, multiple sellers are tied to one network, and you need to go after the network, not each seller.

For example, in the graphic to the right, 43% of all Amazon listings were attributed to one network.

22 Amazon Sellers; 18 different registered companies = one individual running the network.

Page 9: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Counterfeit Multi-Level Marketing (MLM) Networks

9

The counterfeiting network recruits affiliates who then use the network’s website templates to setup e-commerce sites.

This provides a layer of anonymity for the true party behind the network.

In this example to the right, the counterfeiting MLM network offered entrepreneurs 30% commission per sale using their distribution network. Our investigation uncovered the true infringer, and provided exact address and phone number to law enforcement.

Page 10: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Using International Shipping Data

10

Online Marketplace To Streets : Tracking The Flow Of

Suspicious Goods

Company XYZ, Inc. promotes and sells suspect counterfeit Client ABC, Inc.

products on Marketplace 123

Suspicious goods are then shipped to buyers around the world

Buyers distributed suspicious goods to customers

We can use shipping data – for example, Chinese export data for destination countries from known brand infringers. This helps identify geographical areas of concern – or provides intelligence for the possibility of new markets for legitimate goods.

In the example to the right, the Chinese shipping data shows ONE Alibaba seller has exported over $104 million worth of goods via 604 shipments to 60 countries

Shipments from known infringer on Alibaba to different countries

Page 11: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Data-Driven Decisions

Page 12: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Prioritize Your Brand’s Pain Points

12

How quickly do we want a resolution?

Can we make an example of the

network?

What’s the cost of

enforcement?

How much damage is being

done?

What damage is being done? (Loss of sales revenue, consumer safety, brand image)

What’s the cost of enforcement?

Do you want (or not want) publicity? (PR issues)

How quickly do you want a resolution?

Page 13: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

What Comes Next?

13

Conduct a targeted and systematic

enforcement campaign

Perform a deeper

investigation

Review international shipping data

Once the infringing network has been identified, what’s next?

Enforcement that is systematic and targeted, placing higher priority on the largest platforms.

Deeper investigation which can be used by follow-up with law enforcement or litigation purposes

Investigation of international shipping patterns, with an effort to shut down demand and ensure partner compliance.

Page 14: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Removing the Threat

Page 15: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

15

15 | Confidential

Enforcing the Law

MarkMonitor works with law enforcement to shut down counterfeit networks.

In the example to the right, these individuals operated a counterfeit software network that operated 35 proxy-owned websites. MarkMonitor provided the brand owner with details about their lifestyle which included expensive real estate and high priced bottles of alcohol.

Page 16: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Identifying the Real Infringers

16

16 | Confidential

Street view picture of Registrant #2 house: Picture courtesy of Google Maps

Often, counterfeiters commit identity theft and register their domains using stolen identities.

MarkMonitor researches registrants through various channels including social media, to ensure clients go after the real criminals, and not those whose identity was stolen.

The example to the right shows 3 innocent people whose identities were stolen and used to register domains that sold counterfeit goods.

Page 17: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Summary

Page 18: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Listen to consumer and affiliate reports for hints at unauthorized product

Investigate, investigate!

Weigh the costs and benefits of the different types of enforcement

Tell your enforcement story to get buy in across internal and/or external stakeholders

Key Points

18

“Consumers from all over the world are using the Internet to purchase every day items, and criminals are taking advantage of this trend.” – INTERPOL’s Director of Organized and Emerging Crime, Roraima Andriani.

Source: INTERPOL

Page 19: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Q&A

Page 20: How to Identify, Disrupt, and Dismantle Unauthorized ... · How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

Thank You!

For information on MarkMonitor solutions, services and complimentary educational events:

Contact via email: [email protected]

Visit our website: www.markmonitor.com

Contact via phone: US: 1 (800) 745 9229 Europe: +44 (0) 203 206 2220

20