More than 4500 domain names that were illegally selling counterfeit products to consumers online have been seized by law enforcement authorities in a joint global operation. Operation In Our Sites (IOS) VII tackled copyright-infringing websites and third-party marketplace listings selling luxury goods, sportswear, spare parts, electronics, pharmaceuticals, toiletries and other fake products.
Law enforcement authorities from 27 countries/administration(1), anti-counterfeiting associations and brand owner representatives participated in this huge action, which was coordinated and facilitated by Europol’s Intellectual Property Crime Coordinated Coalition (IPC³), the US National Intellectual Property Rights Coordination Center(2) and Interpol.
“This year’s operation IOS VII has seen a significant increase in the number of seized domain names compared to last year. This excellent result shows how effective cooperation between law enforcement authorities and private sector partners is vital to ultimately make the internet a safer place for consumers. Through its Intellectual Property Crime Coordinated Coalition (IPC³), Europol will continue to work closely with its partners to strengthen the fight against intellectual property crime online and offline,’’ says Rob Wainwright, Director of Europol.
“The tremendous collaborative efforts between law enforcement and industry prove the internet is not a safe haven for counterfeiters preying on consumers,” said the ICE-led National Intellectual Property Rights Coordination Center Director Bruce Foucart. “Our investigators are committed to bringing online pirates to justice by seizing websites, working with global police authorities and strengthening relationships with industry partners.”
Fighting the trade of counterfeit products online is a challenging and difficult task for law enforcement. To strengthen the fight against counterfeiting and piracy online and offline, Europol and the European Union Intellectual Property Office (EUIPO) joined forces to launch the Intellectual Property Crime Coordinated Coalition (IPC³) in July 2016. With its increased operational capabilities, the IPC³ has successfully supported many high-priority investigations related to online intellectual property infringements such as Operation Student and Operation Fake.
Awareness campaign on online counterfeiting
The internet has become an essential channel for e-commerce, and counterfeiters are increasingly taking advantage of the World Wide Web to deceive, sell and ship fake products directly to unsuspecting consumers. Despite these products looking like a bargain, they can pose serious risks to the health and safety of buyers.
To raise awareness of this growing threat, Europol’s IPC³ today launches the campaign “Don’t F***(ake) Up’’. The campaign aims to inform citizens about the risks of buying fake products online, and provide straightforward advice to help identify illicit websites selling counterfeit goods, as well as other means used by counterfeiters, such as fake social media accounts and fake apps.
1 Albania, Austria, Belgium, Bosnia and Herzegovina, Canada, Colombia, Croatia, Denmark, France, former Yugoslav Republic of Macedonia, Greece, Hungary, Iceland, Hong Kong - China, Peru, Italy, Lithuania, Luxembourg, Moldova, Netherlands, Portugal, Romania, Serbia, Spain, Sweden, United Kingdom and United States.
2 US Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI).
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
View all comments