Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Intellectual Property Theft as Blood Sport

By Joel Liebesfeld
March 1, 2008
Stealing everything from patents to patent leather handbags, intellectual property thefts are extremely well organized and some may have terror group connection.


The escalation of physical, Internet and computing hardware and software has not put a dent in the thefts of intellectual property (IP) [1].

Although the referenced document stated that there was a 20 percent increase in the number of civil cases from 1994 to 2002, the alarming statistic is that, “Suspects with copyright violation as the lead charge comprised more than half (52 percent) of the IP referrals in 2002.”  These cases are handled in both Civil and Federal courts.  It may not be common knowledge, but IP “rights are rooted in copyright and patent protections in the U.S. Constitution” [2].

TRADEMARKS, TRADE SECRETS GO MISSING

Within the arena of crime is the theft of trademarks, trade secrets and copyrights.

This pattern of theft has more recently spilled over into the Internet and other forms of electronic theft.  The newspapers are rife with articles about software infringement and the unauthorized recording of music, etc.  Recently there was a TV episode of Law and Order where the downtown of Manhattan was sighted as being the place to buy counterfeit high-end handbags. Many reports have suggested that counterfeit merchandise, may be assisting in the funding of terrorist activities.  Table 1 on the link of the first citation showed that in 2002 Pakistan had $1,041,000,000 of mostly apparel imports seized.  Apparel comprised up to 62 percent of Pakistan’s seized imports.

How much was not seized? 

IP theft is an international problem that is affecting many nations and the relationship between nations.  In an article in America.gov, Victoria Espinel, the principal U.S. trade negotiator on intellectual property rights (IPR) stated that, “Russia has made little progress in permanently closing down illegal production plants and bringing offenders to justice” [3].

INTERNATIONAL LEADERS IN IT THEFT

China and Russia are leaders in IP theft.  Russia has been noted as having huge capacity to replicate CDs and DVDs.  Eric Schwartz, vice president and special counsel to the International Intellectual Property Alliance, stated that “U.S. Industry lost over $1.7 billion last year alone to copyright piracy in Russia, and over $8 billion in the last five years.”  These numbers came from 2005 research.  It is also noteworthy that the numbers that suggest the loss of royalties do not refer to the lost tax dollars that could have gone into the U.S. Treasury. 

It is important to realize that this is an organized assault, in that it takes extensive resources to orchestrate intellectual property theft.  Clearly, it is improbable that the heads of states are colluding to perform these acts.  More likely is the possibility that sympathetic criminal cells of different countries may be cooperating.  Considering that IP theft requires money, knowledge, organization, equipment, distribution, transportation, credentials, designers, laborers, etc., it would suggest that groups or individuals with power are behind these illicit activities.

GOVERNMENT, TERROR LINKS?

The countries or more specifically the government officials of countries that have IP theft going on at grander scales are seemingly either permissive or complicit with respect to these acts.  The actual amount of dollars involved in IP theft has grown so large that it is attracting the worst elements of many countries.  USINFO.STATE.GOV stated that, “piracy, counterfeits can be linked to organized crime” [4].    

These matters have tremendous significance that is meshed into the fiber of U.S. corporate security and its economic health.

The outsourcing of American jobs is controversial, as is its impact on the U.S. economy and citizenry as a whole, but clearly having foreign countries illegally make our IP goods with overseas workers, in overseas factories, collecting U.S. dollars for unknown purposes foretells of an ominous outcome.  With the U.S. economy faltering and vast amounts of money leaving our shores for unknown purposes, American industry has a duty to step up to the plate and call those to task who are charged with defending our borders.

This analysis would become a dilemma of monumental proportions if one of the recipients of monies derived from IP theft used the proceeds to purchase or develop a dirty bomb or some equally horrific weapon and send it to our shores.

References

  1. Motivans, Mark, Ph.D., Bureau of Justice Statistics, Intellectual Property Theft, 2002.  Internet site http://www.ojp.usdoj.gov/bjs/pub/ipt02.pdf visited 01/22/08.
  2. Article 1, Sec. 8, cl. 8.
  3. Thomas, Jeffrey, Intellectual Property Theft in Russia Increasing Dramatically, 18 May 2005.  Internet site http://www.america.gov/st/washfile-english/2005/May/200505181657201CjsamohT0.9698755.html visited on 01/22/08.
  4. G8 Vows To Increase Fight Against Intellectual Property Theft, 2005.  Internet site http://usinfo.state.gov/ei/Archive/2005/Jul/08-989233.html visited on 1/23/08.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Liebesfeld, MA, MAS, is chief executive officer with CounterMeasureSecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • DoJ Forms Intellectual Property Task Force as it Toughens Economic and Crime Responses

    See More
  • Hand holding lightbulb

    Safeguarding Intellectual Property: A Strategic Imperative for Organizations

    See More
  • While Snowdon Grabs Headlines, Chinese Grab $800 Million in Intellectual Property

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing