HEADLINE PART 1
HEADLINE PART 2
Sub-headline Arial 18pt white




                                     Optional Name Arial 13pt italic white
                                              Venue Arial 13pt italic white
                                Date of Presentation Arial 13pt italic white
Anti-piracy enforcement
    on the internet




Deze presentatie is              Niels Mulder
  beschikbaar op
legalbusinessday.nl      Alexander Tsoutsanis
                          Christian Prickaerts
The Underground


 http://www.youtube.com/watch?v=dFsgggsxw6Q&feature=relmfu




Legal Business Day 2012                            20 september 2012   3
4 Examples of Cybercrime Inc.




                             File
         Phishing
                           sharing

                   Ad
                            Fakes
                  Fraud
Legal Business Day 2012         20 september 2012   4
An example: fake banking site
Evasive action



 www.ingbank.nl.edilokqx.eu                  89.76.246.68    --> Polen
                                              92.115.218.172 --> Moldova
                                              118.218.159.237 --> Korea
                                              121.113.153.135 --> Japan
 Spam sent from IP: 189.63.205.123           122.35.196.49 --> Korea
                                              125.186.131.73 --> Korea
                                              189.110.214.93 --> Uruguay
                                              190.136.187.88 --> Argentina
 Malicious website hosted on 15 webservers   218.101.146.170 --> Korea
                                              218.171.106.208 --> Taiwan
  hosted around the globe.                    220.139.51.66 --> Taiwan
                                              58.8.245.251    --> Thailand
                                              61.85.35.53     --> Korea
                                              79.117.18.154 --> Roemenie
 Different countries                         88.247.239.23 --> Turkije
 Different timezones
 Differences in legislation and
  notice and takedown procedures
Using content of the original site
Phishing – game plan


Key: quick action.
1. Alert consumers.
2. Get the (forensic) evidence.
3. Report with Police, who may escalate to
   High Tech Crime Unit and Eurojust.
4. In case of prosecution: join proceedings
   to claim damages.


Legal Business Day 2012             20 september 2012   8
# 2: File sharing




                            File
         Phishing
                          sharing

                   Ad
                          Fakes
                  Fraud
Legal Business Day 2012        20 september 2012   9
USENET


              Downloader                   Downloader




     news.upc.nl                           news.eweka.nl




Distributer                news.ziggo.nl
                                              Downloader
Legal Business Day 2012   20 september 2012   11
 Plaatje met verschillende partijen




Legal Business Day 2012                20 september 2012   12
Legal Business Day 2012   20 september 2012   13
Header information




Legal Business Day 2012   20 september 2012   14
The parties involved



               News server
                                Spotter




                             Downloading




            Uploading


Legal Business Day 2012                    20 september 2012   15
Yesterday, today and tomorrow




Legal Business Day 2012         20 september 2012   16
Copying is not stealing




Legal Business Day 2012   20 september 2012   17
File-sharing: legal status




                                     Facilitating
         Upload           Download
                                      Platform




Legal Business Day 2012                  20 september 2012   18
Range of legal options


 Sue platform for (facilitating) copyright
  infringement.
      TRO within 24 hrs.
      Ask for specific filter obligation as damage control?
 Take website down by targeting hosting
  providers of platform
 Block access to website by targeting access
  providers of users



Legal Business Day 2012                          20 september 2012   19
File sharing: game plan


 To what they do: join forces.
 Focus on the internet platform / ISP's /
  Infrastructure.
 Investigate: secure evidence.
 Overall trend in NL: courts are willing to crack
  down on internet piracy (TPB, FTD, Brein v
  Ziggo, GeenStijl).
 Be realistic on monetary relief: cost-efficiency is
  therefore key: good teamwork, get organized.

Legal Business Day 2012                      20 september 2012   20
# 3: Ad Fraud




                            File
         Phishing
                          sharing

                  Ad
                          Fakes
                 Fraud
Legal Business Day 2012        20 september 2012   21
# 3. Ad Fraud: background




   Merchant               Network   Affiliate      Customer




Legal Business Day 2012                         20 september 2012   22
How it should normally work




                              5 maart 2012
The non-suspecting visitor sees




Legal Business Day 2012           20 september 2012   24
Behind the scenes



 With the visit of ResearchingChildren, several other webpages
  are requested in the background


 These website are depicted in a 1 pixel size screen


 The advertising party registers seemingly official website visits


 http://www.researchingchildren.org/help/?campaignID=34
  6&materialID=12073&affiliateID=1414


Legal Business Day 2012                                20 september 2012   25
Adhijacking


 Use the brand term of the merchants as keyword in for
  example a Google Adwords advertisement and copy the
  original ad text.


Goal:
 Replace the original merchant campaigns with the hijackers
  campaigns, to get a commission pay-out on good-converting
  brand terms.


 Enduring cost and taking over
    business


Legal Business Day 2012                           20 september 2012   26
Google Ad Words




Legal Business Day 2012   20 september 2012   27
Adhijacking




              5 maart 2012
There is nothing to see here....




       Hijacked adds shown




          Your HQ




   Hijacked ads shown




                                   5 maart 2012
Lucrative business


 Price per click for a common search term (Google): €25


 The click fraud process is getting more and more an
  automated process.




Legal Business Day 2012                            20 september 2012   30
Ad Fraud: game plan


                          • Do the math. Check click quality
evidence                  • If it stinks: investigate + forensics

                          • Focus on affiliate.
  focus                   • In ad hijacking: also target competitor.

                          • Enrichment, fraud, tort.
grounds                   • Copyright infringement.


Legal Business Day 2012                                    20 september 2012   31
Legal Business Day 2012   20 september 2012   32
# 4: Fakes




                            File
         Phishing
                          sharing

                   Ad     Fakes
                  Fraud
Legal Business Day 2012        20 september 2012   33
SEO: Influencing Google ranking




Legal Business Day 2012           20 september 2012   34
Legal Business Day 2012   20 september 2012   35
Site hosted in the USA




Legal Business Day 2012   20 september 2012   36
Other sites hosted on same server




Legal Business Day 2012             20 september 2012   37
Registration shielded using GoDaddy




Legal Business Day 2012               20 september 2012   38
Reverse Flip




Legal Business Day 2012   20 september 2012   39
Fakes - gameplan


                      • Focus on your customer.
  focus               • Understand their game plan.


        • Trade mark infringement
grounds • Tort


                      • Class action
 action               • Hijackdomains. Blocking prime placement.



Legal Business Day 2012                                20 september 2012   40
Take away: organizational aspects




                                   KPI



                          Policy


                                     Team up



Legal Business Day 2012                        20 september 2012   41
Take away: key enforcement angles




                      evidence v. evidence

                          bang v. buck

                     NL has solid remedies

Legal Business Day 2012                  20 september 2012   42
And more to come in 1 Jan. 2013…..




Legal Business Day 2012              20 september 2012   43
Contact




                                                 E: niels.mulder@dlapiper.com
                          Niels Mulder           T: 020 5419 838




                                                 E: alexander.tsoutsanis@dlapiper.com
                          Alexander Tsoutsanis T: 020 5419 994




                          Christian Prickaerts   E: prickaerts@fox-it.com
                                                 T: 015 2847 999




Legal Business Day 2012                                                  20 september 2012   44

Anti-piracy enforcement on the internet

  • 1.
    HEADLINE PART 1 HEADLINEPART 2 Sub-headline Arial 18pt white Optional Name Arial 13pt italic white Venue Arial 13pt italic white Date of Presentation Arial 13pt italic white
  • 2.
    Anti-piracy enforcement on the internet Deze presentatie is Niels Mulder beschikbaar op legalbusinessday.nl Alexander Tsoutsanis Christian Prickaerts
  • 3.
  • 4.
    4 Examples ofCybercrime Inc. File Phishing sharing Ad Fakes Fraud Legal Business Day 2012 20 september 2012 4
  • 5.
    An example: fakebanking site
  • 6.
    Evasive action  www.ingbank.nl.edilokqx.eu 89.76.246.68 --> Polen 92.115.218.172 --> Moldova 118.218.159.237 --> Korea 121.113.153.135 --> Japan  Spam sent from IP: 189.63.205.123 122.35.196.49 --> Korea 125.186.131.73 --> Korea 189.110.214.93 --> Uruguay 190.136.187.88 --> Argentina  Malicious website hosted on 15 webservers 218.101.146.170 --> Korea 218.171.106.208 --> Taiwan hosted around the globe. 220.139.51.66 --> Taiwan 58.8.245.251 --> Thailand 61.85.35.53 --> Korea 79.117.18.154 --> Roemenie  Different countries 88.247.239.23 --> Turkije  Different timezones  Differences in legislation and notice and takedown procedures
  • 7.
    Using content ofthe original site
  • 8.
    Phishing – gameplan Key: quick action. 1. Alert consumers. 2. Get the (forensic) evidence. 3. Report with Police, who may escalate to High Tech Crime Unit and Eurojust. 4. In case of prosecution: join proceedings to claim damages. Legal Business Day 2012 20 september 2012 8
  • 9.
    # 2: Filesharing File Phishing sharing Ad Fakes Fraud Legal Business Day 2012 20 september 2012 9
  • 10.
    USENET Downloader Downloader news.upc.nl news.eweka.nl Distributer news.ziggo.nl Downloader
  • 11.
    Legal Business Day2012 20 september 2012 11
  • 12.
     Plaatje metverschillende partijen Legal Business Day 2012 20 september 2012 12
  • 13.
    Legal Business Day2012 20 september 2012 13
  • 14.
    Header information Legal BusinessDay 2012 20 september 2012 14
  • 15.
    The parties involved News server Spotter Downloading Uploading Legal Business Day 2012 20 september 2012 15
  • 16.
    Yesterday, today andtomorrow Legal Business Day 2012 20 september 2012 16
  • 17.
    Copying is notstealing Legal Business Day 2012 20 september 2012 17
  • 18.
    File-sharing: legal status Facilitating Upload Download Platform Legal Business Day 2012 20 september 2012 18
  • 19.
    Range of legaloptions  Sue platform for (facilitating) copyright infringement. TRO within 24 hrs. Ask for specific filter obligation as damage control?  Take website down by targeting hosting providers of platform  Block access to website by targeting access providers of users Legal Business Day 2012 20 september 2012 19
  • 20.
    File sharing: gameplan  To what they do: join forces.  Focus on the internet platform / ISP's / Infrastructure.  Investigate: secure evidence.  Overall trend in NL: courts are willing to crack down on internet piracy (TPB, FTD, Brein v Ziggo, GeenStijl).  Be realistic on monetary relief: cost-efficiency is therefore key: good teamwork, get organized. Legal Business Day 2012 20 september 2012 20
  • 21.
    # 3: AdFraud File Phishing sharing Ad Fakes Fraud Legal Business Day 2012 20 september 2012 21
  • 22.
    # 3. AdFraud: background Merchant Network Affiliate Customer Legal Business Day 2012 20 september 2012 22
  • 23.
    How it shouldnormally work 5 maart 2012
  • 24.
    The non-suspecting visitorsees Legal Business Day 2012 20 september 2012 24
  • 25.
    Behind the scenes With the visit of ResearchingChildren, several other webpages are requested in the background  These website are depicted in a 1 pixel size screen  The advertising party registers seemingly official website visits  http://www.researchingchildren.org/help/?campaignID=34 6&materialID=12073&affiliateID=1414 Legal Business Day 2012 20 september 2012 25
  • 26.
    Adhijacking  Use thebrand term of the merchants as keyword in for example a Google Adwords advertisement and copy the original ad text. Goal:  Replace the original merchant campaigns with the hijackers campaigns, to get a commission pay-out on good-converting brand terms.  Enduring cost and taking over business Legal Business Day 2012 20 september 2012 26
  • 27.
    Google Ad Words LegalBusiness Day 2012 20 september 2012 27
  • 28.
    Adhijacking 5 maart 2012
  • 29.
    There is nothingto see here.... Hijacked adds shown Your HQ Hijacked ads shown 5 maart 2012
  • 30.
    Lucrative business  Priceper click for a common search term (Google): €25  The click fraud process is getting more and more an automated process. Legal Business Day 2012 20 september 2012 30
  • 31.
    Ad Fraud: gameplan • Do the math. Check click quality evidence • If it stinks: investigate + forensics • Focus on affiliate. focus • In ad hijacking: also target competitor. • Enrichment, fraud, tort. grounds • Copyright infringement. Legal Business Day 2012 20 september 2012 31
  • 32.
    Legal Business Day2012 20 september 2012 32
  • 33.
    # 4: Fakes File Phishing sharing Ad Fakes Fraud Legal Business Day 2012 20 september 2012 33
  • 34.
    SEO: Influencing Googleranking Legal Business Day 2012 20 september 2012 34
  • 35.
    Legal Business Day2012 20 september 2012 35
  • 36.
    Site hosted inthe USA Legal Business Day 2012 20 september 2012 36
  • 37.
    Other sites hostedon same server Legal Business Day 2012 20 september 2012 37
  • 38.
    Registration shielded usingGoDaddy Legal Business Day 2012 20 september 2012 38
  • 39.
    Reverse Flip Legal BusinessDay 2012 20 september 2012 39
  • 40.
    Fakes - gameplan • Focus on your customer. focus • Understand their game plan. • Trade mark infringement grounds • Tort • Class action action • Hijackdomains. Blocking prime placement. Legal Business Day 2012 20 september 2012 40
  • 41.
    Take away: organizationalaspects KPI Policy Team up Legal Business Day 2012 20 september 2012 41
  • 42.
    Take away: keyenforcement angles evidence v. evidence bang v. buck NL has solid remedies Legal Business Day 2012 20 september 2012 42
  • 43.
    And more tocome in 1 Jan. 2013….. Legal Business Day 2012 20 september 2012 43
  • 44.
    Contact E: niels.mulder@dlapiper.com Niels Mulder T: 020 5419 838 E: alexander.tsoutsanis@dlapiper.com Alexander Tsoutsanis T: 020 5419 994 Christian Prickaerts E: prickaerts@fox-it.com T: 015 2847 999 Legal Business Day 2012 20 september 2012 44