SlideShare a Scribd company logo
1 of 38
IP Enforcement Strategies in Thailand Edward J Kelly
Trafficking in Fakes How the Starfish Model Works Against You  and How It Can Work For You By: Edward J Kelly Intellectual PropertyLawyer Chair, SISHA USA (www.sisha.org) JPAA ASEAN SEMINAR September 14-16 2011
The Starfish and the Spider ,[object Object]
Examples: Apache open source software, Wikipedia, Alcoholics Anonymous, eBay, Skype, Facebook, LinkedIn
Sunni Awakening strategy employed by General David Petraeus in Iraq,[object Object]
Traffic in Fake Goods
SE Asia as Trafficking Center – Why?  -   Example of SE Asia  as Trans-shipment hub: vulnerabilities and determining factors Loose visa rules and relaxed “rule of law” Geography: Control of land route from China to Singapore “Indochina” central location between India and China Miles and miles (4863 KM) of open borders between Thailand, Myanmar, Laos, Cambodia and Malaysia- just lines on the map Extensive river networks (Mekong Delta) rife with smuggling Smuggling routes developed over centuries (narcotics, human smuggling, arms, contraband) Close family ties between 2nd and 3rd generation local Chinese businessmen and southern Chinese merchants (Pearl River Delta region) Systemic Corruption Availability of Slave Labor Result: Hub for Moving People and Moving Fakes
Traditional Enforcement Strategies No Unfair Competition Law Trademark – Almost exclusively criminal remedies sought Fastest, Most Cost-Effective Tool Disadvantages: Cannot Settle. Corruption Risk. Scapegoating Patent – Almost exclusively civil remedies sought Exception – design patent (motorcycle example) Anton Pillar Orders – Capture the Evidence Long slow expensive process with many disadvantages Difficult to prove damages. No discovery. Injunction is rare. Copyright – Almost exclusively criminal remedies sought. Software Owners (CAD/CAM) very active. But also “work of applied art” (general purpose engine example) Primary Advantage: Settlement Possible with Great Leverage Arbitration/Mediation in the Thai Culture – the Middle Way  Disadvantage : Infringer Plays Games
Thailand’s Need to Reform  Need to Implement Paris Convention and Enact Unfair Competition Law Trade Dress Needed Make Counterfeiting a Predicate Offense to the Anti-Money Laundering Law Make Counterfeiting a Predicate Offense to the Cybercrime Law Landlord Liability Law Needed Eliminate Scapegoating Injunctive Relief Simplified Damages: Proof, Awards and Collection Deterrent Penalties Imposed on Offenders
“Fear & Loathing”: New Strategy Traditional Strategy: Maintenance. Enforcement. Government Outreach and Training. Public Education. Scaring the Consumer with Messaging about Criminality – Does that Work? Replica Watch/MPAA Example Need to Focus More Resources on Public Education – Educate Consumers on the Social Harm Associated with Fakes -Public Health Hazards/Risks (Fear) -Showing Counterfeiters to be Pariahs (Loathing) - Appeals to Conscience, Personal Responsibility and Social Justice (our Better Angels) -Understanding what Motivates Consumers – Is it “Cool”? Cost/Benefit? Social Utility?
What Does This Mean for You? ,[object Object]
Decentralize yourself- Flatten or be Flattened.
The best opponent for a starfish organization is often another starfish
Change has been so rapid that industries and governments have found themselves employing outdated strategies.
This is a lean approach . . .  In counterfeiting, the large decentralized network of buyers/sellers wreaks havoc on the market. Fight fire with water (not fire)
Small is better. Distribute authority and know how across the neural network. Information and intelligence sharing is key.
Need to be cross-disciplinary and to network in cross-disciplinary way  :
Holistic strategies need to be employed to Starve the Beast of the ability to feed on profit
Starfish organizations create communities of like minded persons – the value is not necessarily in any one person’s skill set or know how. The value is in the peer network!,[object Object]
Customer wants the Bargain – the Appearance of Wealth/Style
Fundamentally an issue of marketing
Focus on Consumer Education – “Shunning”
Industrial Counterfeiting is a Supply Side Problem
Goal is to fool the customer
Fundamentally an issue of product security
Focus on supply chain integrity
Victimless Crime?,[object Object]
13 Case Study Case Study: Auto Parts DaimlerChrysler Mercedes Benz, GM, BMW, Honda and Department of Special Investigation (“DSI”) 50,000 plus goods seized, machinery attached, bank accounts frozen, foreign owner arrested, tax avoidance charges filed (example of piling on to create deterrence) DSI : “largest operation ever discovered in SE Asia”; investigating money laundering, funding for terrorism activities, illegal labor practices, immigration charges
14 Mercedes Benz® Example
Criminal Enforcement Police authorities  Royal Thai Police Economic and Technological Crime Suppression Division, Central Investigation Bureau Metropolitan Police Bureau Provincial Police Bureau 1-9 Department of Special Investigation  18
19 Law Enforcement Department of Special Investigation (“DSI”) Economic Crime Police (“ECOTECH”) Royal Thai Police Crime Suppression (“CSB”)
20 Criminal Raid Action with Assistance from Department of Special Investigation : DSI Established on October 3, 2002  under the jurisdiction of the Ministry of Justice (DSI = US FBI)
21 Design Patent “MOTORCYCLE” issued onDecember 9, 2005
22 Substantial Similarity We can not close our eyes if two designs:             (a) have similar overall forms             (b) have a similar set of components arranged                     in similar locations and             (c) have similar shapes and forms of  		       components AND: The Copy Design is of inferior quality; ,[object Object],[object Object]
24 DSI Raid at Hatyai Factory, Songkla

More Related Content

Similar to Japan Patent Atty Assoc ASEAN IP Seminar Tokyo

Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Eddie Kelly
 
Information Security from Risk Management and Design
Information Security from Risk Management and DesignInformation Security from Risk Management and Design
Information Security from Risk Management and DesignAlbert Hui
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
 
H030101043047
H030101043047H030101043047
H030101043047theijes
 
Ethics & corruption in the global marketplace.1
Ethics & corruption in the global marketplace.1Ethics & corruption in the global marketplace.1
Ethics & corruption in the global marketplace.1May Farrah Detuya - Vidal
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Peter Lilley
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 

Similar to Japan Patent Atty Assoc ASEAN IP Seminar Tokyo (20)

Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09
 
Ipctoolkit shared by absoluteproducers
Ipctoolkit shared by absoluteproducersIpctoolkit shared by absoluteproducers
Ipctoolkit shared by absoluteproducers
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
Information Security from Risk Management and Design
Information Security from Risk Management and DesignInformation Security from Risk Management and Design
Information Security from Risk Management and Design
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
ΕΛΙΣΜΕ MSAG 20181107 Φώτης Σοφρώνης ‘Cyber Security στο Θαλάσσιο Περιβάλλον’
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
H030101043047
H030101043047H030101043047
H030101043047
 
Ethics & corruption in the global marketplace.1
Ethics & corruption in the global marketplace.1Ethics & corruption in the global marketplace.1
Ethics & corruption in the global marketplace.1
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 

Japan Patent Atty Assoc ASEAN IP Seminar Tokyo

  • 1. IP Enforcement Strategies in Thailand Edward J Kelly
  • 2. Trafficking in Fakes How the Starfish Model Works Against You and How It Can Work For You By: Edward J Kelly Intellectual PropertyLawyer Chair, SISHA USA (www.sisha.org) JPAA ASEAN SEMINAR September 14-16 2011
  • 3.
  • 4. Examples: Apache open source software, Wikipedia, Alcoholics Anonymous, eBay, Skype, Facebook, LinkedIn
  • 5.
  • 7. SE Asia as Trafficking Center – Why? - Example of SE Asia as Trans-shipment hub: vulnerabilities and determining factors Loose visa rules and relaxed “rule of law” Geography: Control of land route from China to Singapore “Indochina” central location between India and China Miles and miles (4863 KM) of open borders between Thailand, Myanmar, Laos, Cambodia and Malaysia- just lines on the map Extensive river networks (Mekong Delta) rife with smuggling Smuggling routes developed over centuries (narcotics, human smuggling, arms, contraband) Close family ties between 2nd and 3rd generation local Chinese businessmen and southern Chinese merchants (Pearl River Delta region) Systemic Corruption Availability of Slave Labor Result: Hub for Moving People and Moving Fakes
  • 8. Traditional Enforcement Strategies No Unfair Competition Law Trademark – Almost exclusively criminal remedies sought Fastest, Most Cost-Effective Tool Disadvantages: Cannot Settle. Corruption Risk. Scapegoating Patent – Almost exclusively civil remedies sought Exception – design patent (motorcycle example) Anton Pillar Orders – Capture the Evidence Long slow expensive process with many disadvantages Difficult to prove damages. No discovery. Injunction is rare. Copyright – Almost exclusively criminal remedies sought. Software Owners (CAD/CAM) very active. But also “work of applied art” (general purpose engine example) Primary Advantage: Settlement Possible with Great Leverage Arbitration/Mediation in the Thai Culture – the Middle Way Disadvantage : Infringer Plays Games
  • 9. Thailand’s Need to Reform Need to Implement Paris Convention and Enact Unfair Competition Law Trade Dress Needed Make Counterfeiting a Predicate Offense to the Anti-Money Laundering Law Make Counterfeiting a Predicate Offense to the Cybercrime Law Landlord Liability Law Needed Eliminate Scapegoating Injunctive Relief Simplified Damages: Proof, Awards and Collection Deterrent Penalties Imposed on Offenders
  • 10. “Fear & Loathing”: New Strategy Traditional Strategy: Maintenance. Enforcement. Government Outreach and Training. Public Education. Scaring the Consumer with Messaging about Criminality – Does that Work? Replica Watch/MPAA Example Need to Focus More Resources on Public Education – Educate Consumers on the Social Harm Associated with Fakes -Public Health Hazards/Risks (Fear) -Showing Counterfeiters to be Pariahs (Loathing) - Appeals to Conscience, Personal Responsibility and Social Justice (our Better Angels) -Understanding what Motivates Consumers – Is it “Cool”? Cost/Benefit? Social Utility?
  • 11.
  • 12. Decentralize yourself- Flatten or be Flattened.
  • 13. The best opponent for a starfish organization is often another starfish
  • 14. Change has been so rapid that industries and governments have found themselves employing outdated strategies.
  • 15. This is a lean approach . . . In counterfeiting, the large decentralized network of buyers/sellers wreaks havoc on the market. Fight fire with water (not fire)
  • 16. Small is better. Distribute authority and know how across the neural network. Information and intelligence sharing is key.
  • 17. Need to be cross-disciplinary and to network in cross-disciplinary way :
  • 18. Holistic strategies need to be employed to Starve the Beast of the ability to feed on profit
  • 19.
  • 20. Customer wants the Bargain – the Appearance of Wealth/Style
  • 21. Fundamentally an issue of marketing
  • 22. Focus on Consumer Education – “Shunning”
  • 23. Industrial Counterfeiting is a Supply Side Problem
  • 24. Goal is to fool the customer
  • 25. Fundamentally an issue of product security
  • 26. Focus on supply chain integrity
  • 27.
  • 28. 13 Case Study Case Study: Auto Parts DaimlerChrysler Mercedes Benz, GM, BMW, Honda and Department of Special Investigation (“DSI”) 50,000 plus goods seized, machinery attached, bank accounts frozen, foreign owner arrested, tax avoidance charges filed (example of piling on to create deterrence) DSI : “largest operation ever discovered in SE Asia”; investigating money laundering, funding for terrorism activities, illegal labor practices, immigration charges
  • 30.
  • 31.
  • 32.
  • 33. Criminal Enforcement Police authorities Royal Thai Police Economic and Technological Crime Suppression Division, Central Investigation Bureau Metropolitan Police Bureau Provincial Police Bureau 1-9 Department of Special Investigation 18
  • 34. 19 Law Enforcement Department of Special Investigation (“DSI”) Economic Crime Police (“ECOTECH”) Royal Thai Police Crime Suppression (“CSB”)
  • 35. 20 Criminal Raid Action with Assistance from Department of Special Investigation : DSI Established on October 3, 2002 under the jurisdiction of the Ministry of Justice (DSI = US FBI)
  • 36. 21 Design Patent “MOTORCYCLE” issued onDecember 9, 2005
  • 37.
  • 38. 24 DSI Raid at Hatyai Factory, Songkla
  • 39. 25
  • 40. 26
  • 41. 27
  • 42. 28 DSI - Bureau of IP Crime Commander YongyootDirector DSI
  • 43. 29 Royal Thai Customs Watch List Ex-officio action Fines for violations imposed by Customs Authority are higher (4X value of seized goods) than the fines imposed by the Courts for TM Act violations (Maximum 400,000 Baht) Cost-effective (no need for private investigation) Shipping documents can generate leads in source or destination countries (better intel) Seizures can lead to civil actions against importers, generating compensation to fund additional anti-counterfeiting measures
  • 44.
  • 45.
  • 46.
  • 48.
  • 49. Awareness: Trafficked Labor is the Backbone of a Counterfeiting Operation 35
  • 51. Modern Day Slave Trade 37
  • 52.
  • 56.