Operation In Our Sites

Operation In Our Sites is an ongoing effort by the National Intellectual Property Rights Coordination Center in the U.S. government, to detect and hinder intellectual property violations on the Internet. Pursuant to this operation, governmental agencies arrest suspects affiliated with the targeted websites and seize their assets including websites' domain names. Web users intending to access targeted websites are directed to the server operated by the U.S. government, and greeted with a graphic bearing the seals of the United States Department of Justice (DOJ), the National Intellectual Property Rights Coordination Center (NIPRCC), and U.S. Immigration and Customs Enforcement (ICE).

National Intellectual Property Rights Coordination Center
Agency overview
Formed2000
JurisdictionUnited States
Employees21 partner agencies including 17 key U.S. federal agencies, INTERPOL, EUROPOL and the governments of Canada and Mexico
Websitewww.iprcenter.gov
Footnotes
NIPRCC leads the Operation in Our Sites initiative

Background

In 2008, the Prioritizing Resources and Organization for Intellectual Property Act of 2008 (PRO-IP Act of 2008, H.R. 4279) was established to increase civil and criminal penalties for trademark, patent and copyright infringement. The civil forfeiture provision of 18 U.S.C. § 2323 amended the PRO-IP Act and provided the legal basis of Operation In Our Sites.[1][2] The provision provides that any property used to commit or facilitate infringement of intellectual property rights would be subject to forfeiture to the United States Government.

Policy background

To protect their intellectual property, major intellectual property owners and their representatives have strengthened U.S. government enforcement of intellectual property rights.[3] According to the Intellectual Property Enforcement Coordinator (IPEC), which was the position at the White House created by the PRO-IP Act through 15 U.S.C. § 8111 to coordinate U.S. governmental agencies that carry out the law's purpose,[4] several policy rationales informed intellectual property enforcement, including:[2][5]

  • Growth of the U.S. economy, creation of jobs for American workers and support for U.S. exports;
  • Promotion of innovation and security of America's comparative advantage in the global economy;
  • Protection of consumer trust and safety;
  • National and economic security; and
  • Validation of rights as protected under U.S. Constitution

NIPRCC also reasoned that Operation In Our Sites would protect consumers' health and safety[6] because Operation In Our Sites targets websites that sell counterfeit medicine.[7]

Domain name seizure process

"Operation In Our Sites was the most aggressive federal enforcement effort ever launched against copyright infringement online...the program would use an unprecedented tactic, site domain seizure, to shut down websites offering copyrighted material."[8]

The domain name seizure process used by Operation In Our Sites was codified in 18 U.S.C. § 981(b)(2), which provides a legal framework for property seizures by the government. Before the seizure, government officials are supposed to investigate suspected websites to find out if they actually purchase or access counterfeit items. The government then contacts the copyright holders to confirm ownership of the intellectual property and suspected infringement. Following the investigation, ICE and NIPRCC officials present the resulting evidence to the U.S. Attorneys, and check the domain name registration.
If the domain name was registered in the U.S., the government petitions a magistrate judge to issue a seizure warrant for the domain name. With the warrant, the domain name's title and rights are transferred to the U.S. government. After the seizure, the government is supposed to send a written notice of the forfeiture deadline to the website operator within 60 days from the seizure date. The website owner can file the claim against the government within 35 days after receiving the notice. If the owner files a claim, the government has 90 days to prove that the property is subject to forfeiture. If the owner does not make a claim against the seizure, or the government successfully proves a valid seizure, the domain name is forfeited to the government.[9][10]

Result of domain name seizure

Notice displayed on domains seized November 2011 by DOJ, NIPRCC and ICE

After the seizure the domain name registry alters registered information about the domain name, including the IP address on its domain name server (DNS), as property of the U.S. government. When a user intends to access the website from a domain that has been seized, DNS servers reply with the government server's IP address. Initially a user who attempts to access the targeted website is directed to the governmental server and faced with the agencies' banner; in March 2014 this changed and users are instead redirected to YouTube in order to watch ICE's campaign video.

Outcome of the Operation In Our Sites

It is unclear how effective Operation In Our Sites has been in preventing websites that harm the U.S. economy, but agencies have seized a significant amount of funds and counterfeit goods from targeted websites. In April and May 2012, both DOJ and ICE released figures indicating that they had seized more than $896,000 funds and $1,500,000 counterfeit goods on commercial websites as a part of the Operation In Our Sites.[11][12][13][14]

From June 2010 to late January 2014 the government has seized a total of 2,713 domain names[15] and as of December 2013, the ICE government banners on seized domain names have been viewed more than 122 million times.[16]

Project history

Project nameAnnouncement dateNumber of domains seizedLocationReferences
First phase2010-06-309/10US[9] [17][18]
Cyber Monday Crackdown2010-11-2982/83US[9] [17] [18]
Third phase2011-02-0210US[19][9] [17] [18]
Operation Broken Hearted2011-02-1418US[9] [17] [18]
Fifth phase2011-055US[9] [17] [18]
Operation Shoe Clerk2011-0917US[9] [17] [18]
Operation Strike Out2011-10-3158US[9] [17] [18]
Cyber Monday 22011-11-28152/156US[9] [17] [18]
Ninth phase2011-12-0410/12US[9] [18]
Operation Fake Sweep2012-02-02307/385US[20][9] [18]
2012-05-113US[21][9]
Project Copy Cat2012-07-1270US[9] [18]
of which 7Salt Lake City[22][18]
Sustained Effort11US[18]
2012-08-213US[23][9]
Project Bitter Pill2012-10-04686US[9]
Project Cyber Monday 32012-11-26101US[24][9]
Transatlantic I2012-11-2631EU[24]
Project Cyber Monday 32012-12-2089US[25][9]
Operation Red Zone2013-01-31313US[26]
Transatlantic II2013-06-26328EU[27]
Project Cyber Monday IV2013-12-02297US[16] [28]
Transatlantic III2013-12-02393EU[16] [28]
2013-12-0216HK[16]
Transatlantic IV2014-06-20188EU[29]
Transatlantic V2014-12-01292EU[30]
2014-12-0129684US[31]
Transatlantic VI2015-11-30999EU[32]
2015-11-3037479US[33]
Transatlantic VII2016-11-28>4500EU[34]
2016-11-28~15000EU+US[35]
Transatlantic VIII2017-11-2720520EU[36]
2017-11-2729865US[37]
Transatlantic IX2018-11-2633654EU[38]
2018-11-26~1210000US[39]

Criticism and commentary

Effectiveness for protecting intellectual property

Intellectual property owners and their representatives are not surprisingly supportive of Operation In Our Sites to the government,[40][41] but some critics question the effectiveness of the program since the targeted websites are not actually seized or shut down; the program in effect only increases visitor access to agencies' servers. Accused website operators targeted by this program can circumvent Operation In Our Sites by registering a new domain name, one that cannot be regulated by the U.S., and easily resume operation.[42]

Due process critiques

In light of the U.S. Constitution, seizures without any opportunity for a hearing are limited to extraordinary situations,[43] but pursuant to Operation In Our Sites, others have pointed out that the government is allowed to seize a targeted domain name without any prior notice to the owner.[9] Other critics have voiced concern that domain name seizures could be used to circumvent the normal legal process in order to target websites that may prevail in full court.[44] In addition, other critics point that Operation In Our Sites' one-sided process inevitably brings mistakes and overly broad seizures.[42]

Negative impact on free speech

Other critics have argued that seizures of domain through Operation in Our Sites prohibits access to the all content on the allegedly infringing websites, and thus has a negative impact on free speech. Some types of targeted websites contained non-infringing speeches and conversation (ex. discussions in a chat-room, conversations in the comment section of blog posts); since the seizure operation redirects all traffic from the website, effects are felt on all material including the legitimate content that should be protected by the First Amendment of the U.S. Constitution.[9][45]

Moreover, opponents of Operation In Our Sites have criticized ICE for erroneous seizure of non-infringing domain names, and the corresponding violation of the non-infringing domain holder's First Amendment rights. So far, three domain names (dajaz1.com, rojadirecta.com, and rojadirecta.org) have been seized by mistake and returned to their respective owners.

  • Dajaz1.com: Dajaz1.com was a popular hip-hop music blog that provided links to pre-released songs sent to Dajaz1.com by legitimate copyright holders for promotional purposes.[46] In late November 2010, at the suggestion of the Recording Industry Association of America (RIAA), ICE alleged that the links to the songs constituted copyright infringement, and seized the domain name pursuant to a warrant granted by a magistrate judge. After the seizure, the domain name owner filed a claim. Although the regular seizure process affords the government a 90-day period before filing a forfeiture claim, the agencies in this case secretly sought a prolonged time period which they acquired from the court, and in this instance the government held the domain name for a year without providing any notice to the owner. In November 2011, ICE returned the domain name to its owner without providing any explanation.[47][48]
  • In the RojaDirecta case, the government seized the domain name because the website's discussion board included links to copyrighted content.[49] After the seizure, Puerto 80, a Spanish company that operates rojadirecta.com and rojadirecta.org unsuccessfully attempted to appeal government authorities to resolve the domain names dispute without lawsuits.[50] Puerto 80 filed a lawsuit, and in August 2012 the Court ordered the government to return the domain names.[51] As in dajaz1.com, the government was criticized in the rojadirecta case for violating free speech, holding domain names for an extended period, and returning the domain names without any apology to the domain owners.

Undercutting the DMCA

Many domains targeted by Operation in Our Sites, including RojaDirecta[49][50][51] and Dajaz1.com,[47][48] were seized because they provided hyperlinks ("linked") to allegedly infringing material. Critics argue that use of government intervention to prevent websites from linking[52] to infringing materials undercuts the Digital Millennium Copyright Act by eliminating the copyright holders' incentive for interacting cooperatively with OSPs through the DMCA established notice and takedown system. Prior to Operation in Our Sites, copyright holders had to submit takedown notices[53] to OSPs if they wished to have links to copyright protected material removed. OSPs that complied with the takedown notices and the safe-harbor provisions outlined in the Online Copyright Infringement Liability Limitation Act received relief from the financial burden of legal fees, and damages associated with claims of secondary liability for copyright infringement.[54][55][56][57][58] If copyright holders forgo the notice and takedown provisions outlined in the DMCA and instead elect for direct government intervention through organizations like ICE, then the government may end up with sole responsibility for policing websites that link to copyright protected material. Furthermore, website owners will no longer have the ability to correct and improved wrongs without potentially facing criminal proceedings.[59]

Website owner lack of awareness

Hana Beshara, the public face and co-founder of NinjaVideo, was familiar with the Digital Millennium Copyright Act and expected that her NinjaVideo website would be subjected to DMCA takedown notices from copyright holders in response to infringing links on NinjaVideo; she was shocked when her house was raided by Immigration and Customs Enforcement Officers. Following the raid Beshara pleaded guilty to criminal copyright infringement and was sentenced to 22 months in prison, 2 years of probation and a hefty fine.[60]

Lobbying by the media industry

In an article published in the bimonthly political magazine The American Prospect, the author proposes that lobbying efforts on behalf of the media industry played a critical role in the adoption and implementation of Operation in Our Sites. The article further asserts that in the year prior to inception of Operation In Our Sites, large media conglomerates began providing ICE agents with lists of potential targets for the first round of raids.[8] ICE was for some time responsible for regulating and eliminating sales of counterfeit merchandise, but pressure from the entertainment industry, through lobbying and other efforts, expanded the agency's function to include enforcement against piracy.[8] Lobbying spending by the TV, music and movie industry did in fact increase dramatically from 2004 to 2010; it peaked at $123 million in 2011, then dropped to around $118 million where it stayed from 2012 to 2013.[61]

See also

References

  1. Masnick, Mike (2012-06-11). "Tell The White House To Stop Illegally Seizing & Shutting Down Websites". techdirt. Retrieved 24 February 2014.
  2. "IPEC 2010 ANNUAL REPORT" (PDF). Executive Office of the President. Retrieved 20 March 2014.
  3. McSherry, Corynne; Zimmerman, Matthew (2011). "Amici Curiae brief of Electronic Frontier Foundation, Center for Democracy and Technology, and Public Knowledge in Support of Puerto 80'S Petition for Release of Seized Property" (PDF). Electronic Frontier Foundation. p. 22. Retrieved 2 February 2014.
  4. "About IPEC". The Office of the U.S. Intellectual Property Enforcement Coordinator. Retrieved 24 February 2014.
  5. "2010 Joint Strategic Plan on Intellectual Property Enforcement" (PDF). Executive Office of the President of the United States. 2010. Retrieved 24 February 2014.
  6. "Operation In Our Sites". National Intellectual Property Rights Coordination Center. Retrieved 24 February 2014.
  7. "HSI seizes 686 websites selling counterfeit medicine to unsuspecting consumers" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-10-04. Retrieved 2014-02-24.
  8. Fischer, Rob (15 December 2011). "A Ninja in Our Sites". The American Prospect. Retrieved 20 March 2014.
  9. Kopel, Karen (2013-09-16). "Operation Seizing Our Sites: How the federal government is taking domain names without prior notice". Berkeley Technology Law Journal. Number AR. 28, 2013. doi:10.15779/Z384Q3M. Retrieved 6 May 2019.
  10. Masnick, Mike (2011-12-08). "Breaking News: Feds Falsely Censor Popular Blog For Over A Year, Deny All Due Process, Hide All Details..." Techdirt. Techdirt. Retrieved 4 March 2014.
  11. "Department of Justice Seizes More Than $896,000 in Proceeds From the Online Sale of Counterfeit Sports Apparel Manufactured in China" (Press release). U.S. Attorney's Office District of Columbia. U.S. Attorney's Office District of Columbia. 2012-04-10. Retrieved 2014-03-01.
  12. "More than $896,000 in proceeds seized from the online sale of counterfeit sports apparel manufactured in China" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-04-10. Retrieved 2014-03-01.
  13. "Department of Justice Seizes More Than $1.5 Million in Proceeds From the Online Sale of Counterfeit Sports Apparel Manufactured in China -Action Comes After Earlier Seizures of Another $896,000 in Proceeds" (Press release). U.S. Attorney's Office District of Columbia. U.S. Attorney's Office District of Columbia. 2012-05-11. Retrieved 2014-03-01.
  14. "More than $1.5M in proceeds seized from online sale of counterfeit sports apparel manufactured in China" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-05-11. Retrieved 2014-03-01.
  15. "Federal agencies seize more than $21.6 million in fake NFL merchandise during 'Operation Team Player': Over 50 people arrested; 5,000-plus websites seized in coordination with NFL" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2014-01-30. Retrieved 2014-03-01.
  16. "ICE, international law enforcement agencies seize 706 domain names selling counterfeit merchandise" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2013-12-02. Retrieved 2014-03-01.
  17. "Operation In Our Sites protects American online shoppers, cracks down on counterfeiters" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2011-11-27. Retrieved 2019-06-20.
  18. "ICE-led IPR Center seizes 70 websites duping consumers into buying counterfeit merchandise" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-07-12. Retrieved 2019-06-20.
  19. "New York investigators seize 10 websites that illegally streamed copyrighted sporting and pay-per-view events" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2011-02-02. Retrieved 2019-06-20.
  20. "Agents and officers seize more than $4.8 million in fake NFL merchandise and seize 307 websites during 'Operation Fake Sweep'" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-02-02. Retrieved 2019-06-20.
  21. "Department of Justice Seizes More Than $1.5 Million in Proceeds from the Online Sale of Counterfeit Sports Apparel Manufactured in China" (Press release). Department of Justice. Department of Justice. 2012-05-11. Retrieved 2019-06-20.
  22. Dennis Romboy (2012-07-13). "Feds crackdown on websites allegedly selling fake NFL jerseys". Deseret News.
  23. "Federal Courts Order Seizure of Three Website Domains Involved in Distributing Pirated Android Cell Phone Apps" (Press release). Department of Justice. Department of Justice. 2012-08-21. Retrieved 2019-06-20.
  24. "ICE, European law enforcement agencies and Europol seize 132 domain names selling counterfeit merchandise in 'Project Cyber Monday 3' and 'Project Transatlantic' operations" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-11-26. Retrieved 2019-06-20.
  25. "Houston HSI seizes 89 websites selling counterfeit goods" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2012-12-20. Retrieved 2019-06-20.
  26. "ICE, CBP, USPIS seize more than $13.6 million in fake NFL merchandise during 'Operation Red Zone'" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2013-01-31. Retrieved 2019-06-20.
  27. "328 internet domains selling counterfeit products targeted by law enforcement" (Press release). Europol. Europol. 2013-06-26. Retrieved 2019-06-20.
  28. "690 internet domain names seized because of fraudulent practices" (Press release). Europol. Europol. 2013-12-02. Retrieved 2019-06-20.
  29. "188 internet domain names seized for selling counterfeit products" (Press release). Europol. Europol. 2014-06-20. Retrieved 2019-06-20.
  30. "292 internet domain names seized for selling counterfeit products" (Press release). Europol. Europol. 2014-12-01. Retrieved 2019-06-20.
  31. "ICE collaborates with industry and international law enforcement agencies to shutdown domain names selling counterfeit merchandise" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2014-12-01. Retrieved 2019-06-20.
  32. "Operation In-Our-Sites (IOS) takes down 999 websites selling counterfeit goods" (Press release). Europol. Europol. 2015-11-30. Retrieved 2019-06-20.
  33. "Illegal websites seized in global operation" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2015-11-30. Retrieved 2019-06-20.
  34. "Over 4500 illicit domain names seized for selling counterfeit products" (Press release). Europol. Europol. 2016-11-28. Retrieved 2019-06-20.
  35. "'Operation In Our Sites' keeps Internet clear of fakes" (Press release). U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2016-11-28. Retrieved 2019-06-20.
  36. "Biggest hit against online piracy: Over 20 520 internet domain names seized for selling counterfeits" (Press release). Europol. Europol. 2017-11-27. Retrieved 2019-06-20.
  37. "ICE targets fake websites on Cyber Monday" (Press release). Washington: U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2017-11-27. Retrieved 2019-06-20.
  38. "Operation takes down over 33 600 internet domains selling counterfeits goods" (Press release). Europol. Europol. 2018-11-26. Retrieved 2019-06-20.
  39. "Over a million websites seized in global operation" (Press release). Washington: U.S. Immigration and Customs Enforcement. U.S. Immigration and Customs Enforcement. 2018-11-26. Retrieved 2019-06-20.
  40. "Attorney General, ICE Announce Sweeping Anti-Piracy Initiative" (Press release). RIAA. 2010-11-29. Retrieved 2014-02-24.
  41. "Entertainment Industry Coalition Sends Letter to All Members of Congress Strongly Supporting Efforts by ICE to Combat Digital Theft and Counterfeiting of Movies, TV and other Products" (PDF) (Press release). AFTRA, Deluxe Entertainment Services Group Inc., DGA, IFTA, IATSE, MPAA, NATO, News Corporation, SAG, Sony Pictures Entertainment Inc., Universal City Studios LLC, Viacom, Walt Disney Studios Motion Pictures, and Warner Bros. Entertainment Inc. 2011-03-30. Archived from the original (PDF) on March 4, 2014. Retrieved 2014-02-24.
  42. Sohn, David (2011-02-04). "Serious Questions about Domain Name Seizures". Center for Democracy and Technology. Retrieved 3 March 2014.
  43. Fuentes v. Shevin, 407 U.S. 67 (1972).
  44. Wyden, Ronald (2011-02-02). "Letter from Sen. Ron Wyden to John Morton". Retrieved 3 March 2014.
  45. Corynne McSherry; Matt Zimmerman (2011-09-23). "Government Violates Free Speech Rights with Domain Name Seizure" (Press release). Electronic Frontier Foundation. Electronic Frontier Foundation. Retrieved 2014-03-01.
  46. Sisario, Ben (2010-12-19). "Music Web Sites Dispute Legality of Their Closing". The New York Times. Retrieved 3 March 2014.
  47. Timothy B. Lee (2011-12-08). "ICE admits year-long seizure of music blog was a mistake". ars technica. Retrieved 3 March 2014.
  48. Cindy Cohn; Corynne McSherry (2012-05-03). "Unsealed Court Records Confirm that RIAA Delays Were Behind Year-Long Seizure of Hip Hop Music Blog". Electronic Frontier Foundation. Retrieved 3 March 2014.
  49. Singel, Ryan (2012-08-29). "Oops! Copyright Cops Return Seized RojaDirecta Domain Names – 19 Months Later". Wired.com. Retrieved 3 March 2014.
  50. "Puerto 80 v. US". Electronic Frontier Foundation. Retrieved 3 March 2014.
  51. United States of America v. rojadirecta.org and rojadirecta,com (U.S. District Court Southern District of New York 2012-08-29).Text
  52. "Home About Our Work Deeplinks Blog Press Room Take Action Shop In the Matter of the Seizure of the Internet Domain Name "DAJAZ1.COM"". Application and affidavit for seizure warrant. Electronic Frontier Foundation. Retrieved 20 March 2014.
  53. Perfect 10, Inc. v. CCBill, LLC, 488 F.3d 1102, 1113 (9th Cir. 2007).
  54. 17 U.S.C. § (512(c)(3)(A)(i-vi))
  55. 17 U.S.C. § 512(c)(3)(B)(ii)
  56. 17 U.S.C. § 512(g)(2)(A)
  57. "Linking to infringing content is probably illegal in the US". WebTVWire. 2006-09-12. Retrieved 2006-10-12.
  58. 17 U.S.C. § 512(c)(1)(C)
  59. Sellars, Andrew. "Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names". SSRN 1835604. Cite journal requires |journal= (help)
  60. "NinjaVideo Admin Phara Gets 22 Months In Jail, 500 Hours Of Community Service & Has To Pay MPAA $210k". Techdirt. 2012-01-06. Retrieved 2012-11-22.
  61. OpenSecrets.Org. "Annual Lobbying on TV/Music/Movies". Center for Responsive Politics. Retrieved 20 March 2014.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.