Showing posts with label Trinity Mount Ministries. Show all posts
Showing posts with label Trinity Mount Ministries. Show all posts

Wednesday, November 28, 2012

Bode Technology Partners to Support The National Center for Missing & Exploited Children:


sacbee.com


Bode Technology Partners to Support The National Center for Missing & Exploited Children

Published: Wednesday, Nov. 28, 2012 - 6:11 am

/PRNewswire/ -- The Bode Technology Group, Inc. (Bode), a leading provider of innovative forensic DNA services, and the National Center for Missing & Exploited Children® (NCMEC) announced today their partnership to help the families of missing and unidentified children. Bode will provide pro bono forensic DNA analysis to law enforcement agencies working with NCMEC on missing and unidentified child cases. Local jurisdictions may not have easy access to the most cutting-edge DNA technologies, expedited DNA testing or the ability to test complex crime scene evidence on cases involving long-term missing children.  NCMEC will now be able to work with Bode to provide the DNA expertise needed to help law enforcement solve the most complicated of cases.


"Our mission is to be the nation's resource on the issues of missing and sexually exploited children and help bring resolution to the families involved in these cases," said Bob Lowery, Senior Executive Director of the Missing Children's Division at the National Center for Missing & Exploited Children.  "We are excited for this opportunity to work with Bode to provide their DNA analysis to law enforcement, which enhances the support we are able to offer."
Bode is a recognized world leader in DNA analysis for identification and recently launched its Same-Day DNA Service™ and Rapid DNA Service™ to bring faster DNA results to the forensic and identification community.  Bode's forensic DNA expertise, coupled with NCMEC's vast nationwide network, will enable local law enforcement agencies to have access to resources for complicated cases that they would otherwise not have available.
"Bode is proud to support the National Center for Missing & Exploited Children's mission. DNA analysis has proven to be a critical tool in investigating cases involving missing persons. By providing pro bono DNA analysis services Bode will continue to enhance its decade-long commitment with NCMEC," said Barry Watson, CEO & President of Bode.  "Bode has had great success with complex and older cold cases, some dating back nearly 100 years.  Working with NCMEC we will be able to help law enforcement identify missing or abducted children and bring resolution to searching families."
About the National Center for Missing & Exploited Children The National Center for Missing & Exploited Children is a 501(c)(3) nonprofit organization established in 1984.  Designated by Congress to serve as the nation's clearinghouse on issues related to missing and exploited children, the organization operates the toll-free 24-hour national missing children's hotline which has handled more than 3,670,000 calls.  It has assisted law enforcement in the recovery of more than 180,000 children.  The organization's CyberTipline has handled more than 1,685,700 reports of child sexual exploitation and its Child Victim Identification Program has reviewed and analyzed more than 77,295,300 child pornography images and videos.  The organization works in cooperation with the U.S. Department of Justice's Office of Juvenile Justice and Delinquency Prevention.  To learn more about NCMEC, call its toll-free, 24-hour hotline at 1-800-THE-LOST (1-800-843-5678) or visit its web site at www.missingkids.com.
About The Bode Technology Group, Inc. Bode Technology provides a comprehensive set of state-of-the-art forensic DNA collection products, analysis services, and research services to law enforcement, justice system, and other government agencies around the world.  Operating one of the most internationally respected private DNA laboratories, Bode's forensic DNA experts have assisted in identifying criminals in every state in the United States, and played a key role in the exoneration of numerous individuals. Bode provides immigration and paternity testing worldwide.  Bode has also been instrumental in the identification of victims of natural disasters, war, crime, and terrorism, including the attack on the World Trade Center. 
Bode Technology is one of the three wholly owned subsidiaries of SolutionPoint International, Inc. (www.solutionpoint-intl.com), a leading provider of business intelligence, security, compliance and monitoring, identity assurance, forensics, and situational awareness solutions for the commercial and government sectors on a worldwide basis.  Alongside Bode Technology are Guidepost Solutions, global leader in monitoring, compliance, international investigations, and risk management solutions; and NSM Surveillance, designer and manufacturer of sophisticatedsurveillance systems for law enforcement, the Department of Defense and other government agencies.  
SOURCE The Bode Technology Group, Inc.




Saturday, November 24, 2012

Rise in children missing from Foster Care:


Ofsted has released its first adoption statistics, and fourth annual fostering statistics, revealing thousands of children
went missing from foster care last year. (Click link below for more.)

Rise in children missing from foster care - 11/23/2012 - Community Care

Sunday, August 12, 2012

Facebook Dodges FTC Fines Over Privacy After Google Gets Nailed:


Facebook Dodges FTC Fines Over Privacy After Google Gets Nailed

Facebook Dodges FTC Fines Over Privacy After Google Gets Nailed
A day after handing Google the largest fine it has ever handed to a single company, for allegedly deceiving users over privacy, the FTC has settled another privacy matter with Google’s industry rival Facebook, with no fine at all, provided Facebook complies with its regular privacy audits.
The FTC says Facebook must obtain consumers’ consent before sharing their information beyond established privacy settings, following a public comment period on the proposed settlement. Charges that Facebook deceived consumers by telling them they could keep their info on Facebook private, then allowing it to be shared and made public (repeatedly) have now been resolved.
Facebook is required to obtain biennial privacy audits from an independent third party.
The Commission vote to approve the final order was 3-1-1, with Commissioner J. Thomas Rosch dissenting and Commissioner Maureen K. Ohlhausen not participating.
Following is the FTC’s statement in its entirety (authored by Chairman Jon D. Leibowitz and Commissioners Edith Ramirez and Julie Brill):
The final consent order in In re Facebook, Inc. that we approve today advances the privacy interests of the nearly one billion Facebook users around the world by requiring the company to live up to its promises and submit to privacy audits. Notably, Facebook will be subject to civil penalties of up to $16,000 for each violation of the order. We intend to monitor closely Facebook’s compliance with the order and will not hesitate to seek civil penalties for any violations.
We write to address the arguments raised by our colleague, Commissioner Rosch, who opposes final approval of the order. One of his objections relates to the extent to which the order would reach the activities of third-party “apps” downloaded by consumers while using the Facebook platform. The Order broadly prohibits Facebook from misrepresenting in any manner, expressly or by implication, the extent to which it maintains the privacy or security of any information it collects from or about consumers. For a company whose entire business model rests on collecting, maintaining, and sharing people’s information, this prohibition touches on virtually every aspect of Facebook’s operations. Further, the Order sets forth clear examples of how this broad prohibition would apply in connection with apps, by prohibiting Facebook from misrepresenting the extent to which it makes its users’ information accessible to apps; or the steps it takes to verify the privacy or security protections that apps provide.
A statement from Facebook about an app’s conduct may well amount to a promise that Facebook is taking steps to assure the level of privacy or security that the app provides for consumers’ information.
These provisions make clear that Facebook will be liable for conduct by apps that contradicts Facebook’s promises about the privacy or security practices of these apps. Commissioner Rosch also opposes the consent order because it includes a denial by Facebook of the substantive allegations in the Commission’s complaint.
Based on this denial, Commissioner Rosch asserts that the Commission lacks the requisite “reason to believe” that Facebook violated Section 5 of the Federal Trade Commission Act and a basis to conclude that the settlement is in “the interest of the public.”
We strongly disagree with Commissioner Rosch’s view that if the Commission allows a respondent to deny the complaint’s substantive allegations, or use language that is tantamount to a denial, there is no basis for the Commission to conclude that the respondent engaged in unlawful conduct or that the consent is in the public interest. As Commissioner Rosch is aware, an extensive investigation and detailed staff recommendation has given the Commission a strong—not just a reasonable—basis to issue its complaint in this case and to conclude that both the complaint and the resulting settlement are in the public interest. Here, as in all enforcement cases, it is the evidentiary record developed by FTC staff during the course of its investigation, not any ensuing settlement agreement, that forms the basis for action by the Commission. A respondent’s denial of liability in a consent agreement does not diminish staff’s extensive investigation or the ability of the Commission to find a reasonable basis to finalize a settlement or to enforce an order that results from settlement negotiations. Moreover, express denials of liability are consistent with the Commission’s current Rules of Practice.
We view the final consent order in this matter to be a major step forward for consumer privacy and hereby approve it.
While we do not believe that a respondent’s denial of liability is reason to reject a settlement that is in the public interest, we share Commissioner Rosch’s desire to avoid any possible public misimpression that the Commission obtains settlements when it lacks reason to believe that the alleged conduct occurred. We commend Commissioner Rosch for focusing our attention on the issue; going forward, express denials will be strongly disfavored. We also appreciate Commissioner Rosch’s suggestion that consent order language that the respondent “neither admits nor denies” a complaint’s allegations may very well be a more effective way to ensure that there are no misimpressions about the Commission’s process. Accordingly, we will consider in the coming months whether a modification to the Commission Rules of Practice is warranted.
Do you think this is a fair settlement, or did Facebook get off too easy?
Image from All Things D conference
About Chris Crum
Chris Crum has been a part of the WebProNews team and the iEntry Network of B2B Publications since 2003. Follow Chris on Twitter, on StumbleUpon, on Pinterest and/or on Google: +Chris Crum.

Sunday, August 5, 2012

Controversy Makes Chick-fil-A One Of The Fastest Growing Brands On Facebook:


I probably don’t have to tell you that Chick-fil-A is at the center of a great deal of controversy these days, concerning its open views on gay marriage. These views have led to a seemingly endless debate among Chick-fil-A supporters, opponents, and those who just want to eat some chicken and go on about their business.
One thing is for certain. The whole thing has given the restaurant chain a whole lot of press, and over the past month, the company’s social brand has been on the rise.
Was stating its views on the matter of same-sex marriage a smart decision on Chick-fil-A’s part? Tell us what you think.
Social media ad platform Optimal has released a list of the top performing brands on its Optimal Index for July. As a spokesperson for the firm explains, “The Optimal Index is an independent valuation tool to help determine the relative value of a brand’s current audience on Facebook by combining fan counts, engagement statistics and global fan valuation.”
“Interestingly, amid recent controversial comments made by members of its executive team, Chick-fil-A added 524,238 new fans in July, and more than 550,000 people discussed, liked or commented on the brand in the past week,” the spokesperson said.
Here’s the list. As you can see, Chick-fil-A cracked the top ten:
Chick-Fil-A cracks top ten in social brand growth
Chick-fil-A’s Facebook page currently has over 6 million fans. That’s about a tenth of what rapper Marshall Mathers (the most popular guy on Facebook) has.
These graphs from PageData tell the story pretty well.
PageData stats on Chick-fil-A
The comments from Chick-fil-A took place in the mid-July, and you can see how the Page’s popularity has steadily risen since then, as the discussion continues around the web. Imagine what the monthly numbers would look like if the controversy began at the beginning of the month.
Chick-fil-A President Dan Cathy was quoted as saying that he and the company as a whole are “very much supportive of the family — the biblical definition of the family unit. We are a family-owned business, a family-led business, and we are married to our first wives.”
The company later issued the following statement via its Facebook Page:
The Chick-fil-A culture and service tradition in our restaurants is to treat every person with honor, dignity and respect – regardless of their belief, race, creed, sexual orientation or gender. We will continue this tradition in the over 1,600 Restaurants run by independent Owner/Operators. Going forward, our intent is to leave the policy debate over same-sex marriage to the government and political arena.
Chick-fil-A is a family-owned and family-led company serving the communities in which it operates. From the day Truett Cathy started the company, he began applying biblically-based principles to managing his business. For example, we believe that closing on Sundays, operating debt-free and devoting a percentage of our profits back to our communities are what make us a stronger company and Chick-fil-A family.
Our mission is simple: to serve great food, provide genuine hospitality and have a positive influence on all who come in contact with Chick-fil-A.
Wednesday became known as Chick-fil-A appreciation day, which turned out to be a pretty big hit for the company, with the company claiming a record-setting day. Millions of people turned out to support the restaurant chain, and their beliefs.
Of course, the controversy also led to National Same-Sex Kiss Day At Chick-fil-A on Friday, which in addition to the turn out for beliefs on the opposite side of the equation, has still served to draw more attention to the brand.
There’s no question that Chick-fil-A has alienated a large amount of customers, but even still, the company appears to have put together a pretty loyal audience, and thousands of people (and climbing) they can push their messages (and offers) to on a daily basis, through Facebook alone, not to mention the additional brand awareness the company has managed to spread.
Some analysts have advised against businesses publicizing any political views, as to avoid alienating customers. It’s hard to say what kind of long-term effects this whole thing will have on Chick-fil-A’s brand, and how much it will ultimately affect the company’s bottom line. In the short-term, however, no matter how many people it has turned against it, the whole thing has clearly gotten people more interested in Chick-fil-A, and they’re selling a whole lot of Chicken. From my understanding, that’s their main goal.
Do you think businesses should publicize controversial views and risk alienating customers? Was Chick-fil-A smart to do so? Has the whole thing affected whether or not you will eat at the restaurant? Let us know in the comments.
About Chris Crum
Chris Crum has been a part of the WebProNews team and the iEntry Network of B2B Publications since 2003. Follow Chris on Twitter, on StumbleUpon, on Pinterest and/or on Google: +Chris Crum.

Monday, October 3, 2011

FBI - Protecting our Children with Technology:

Man at computer silhouette

Protecting our Children
Technology, Partnerships Work Hand in Hand
10/03/11
Investigators dedicated to rescuing child victims of sexual abuse and arresting those who traffic in child pornography are often faced with the difficult and time-consuming task of analyzing hundreds of thousands of illicit images traded online.

Cyber month banner
For the eighth year in a row, October has been designated National Cyber Security Awareness Month. The goal: to reinforce the importance of protecting the cyber networks that are so much a part of our daily lives. The theme of the observance, which is sponsored by the Department of Homeland Security, is “Our Shared Responsibility." Over the course of the month we will be posting additional stories and information about cyber crimes and security. Read more
That painstaking work is critical to identifying victims and their abusers, however, and members of our Digital Analysis and Research Center (DARC)—part of the FBI’s Innocent Images National Initiative—use a mix of sophisticated computer tools and domestic and international partnerships to get the job done.
DARC personnel, who analyze digital evidence in the most significant online child exploitation cases, are currently testing a software tool called the Child Exploitation Tracking System (CETS). The CETS program—already in use in several locations around the world—is designed to streamline investigations and integrate with other CETS operations so that law enforcement agencies can enhance their cooperation and efficiently move their cases forward.
“CETS has tremendous potential for the FBI,” said Special Agent Barbara Cordero, a veteran cyber investigator who manages research, development, and training for the Innocent Images National Initiative. “Eventually, when everyone is plugged into CETS, it will allow law enforcement everywhere to share key information.”
“If I’m in a small police department in Iowa, I might not know that another department in Maryland is investigating the same subject I am investigating,” Cordero explained. “CETS will tell me that, along with other important information.”

Innocent Images

The FBI established the Innocent Images National Initiative in 1995 to address the proliferation of child pornography and child exploitation facilitated by the Internet. A component of the Bureau’s cyber crimes program, the Innocent Images initiative takes a proactive, multi-agency, investigative approach that relies on strong domestic and international law enforcement partnerships.
 The initiative prioritizes several investigative areas, including:
- Online organizations and enterprises that exploit children for profit or personal gain;
- Major distributors and producers of child pornography;
- Individuals who travel—or are willing to travel—for the purpose of engaging in sexual activity with a minor; and
- Possessors of child pornography.
Essentially, CETS is a repository that can be filled with records pertaining to child pornography and child exploitation cases. The system can contain images, case information, identities of known offenders along with information about their Internet addresses, and other related material. The program can analyze millions of pornographic images, helping law enforcement personnel avoid duplication of effort. The program can also perform in-depth analyses, establishing links in cases that investigators might not have seen by themselves.
“CETS has the ability to put the same information in one place and make it available in a unified standard for everyone,” said Special Agent Charles Wilder, who heads DARC. “That’s important because the Internet has removed all geographic boundaries in these types of crimes.”
The CETS program was created by Microsoft at the request of the Royal Canadian Mounted Police National Child Exploitation Coordination Center—investigators there wanted a system designed specifically for child exploitation cases. The program is now being used in Canada and Australia—and Interpol, the international police organization, is working with several of its member countries to integrate CETS into its existing systems.
The ultimate goal is to expand the number of CETS users and to one day integrate all the operations so investigators can share information in a truly global way. “Right now,” Cordero said, “the immediate benefit for the FBI is that CETS saves us a tremendous amount of time in the image review process. Bad guys who trade pornographic images have massive collections,” she said. “We regularly seize hundreds of thousands of images. CETS makes the review process extremely efficient.”
She added, “The FBI has terrific partnerships with cyber investigators in the U.S. and around the world. As we move forward, CETS will allow us to strengthen those partnerships by sharing more and more critical information. This type of technology is a model for the future.”
Resources:
- Innocent Images National Initiative
- National Cyber Security Awareness Month



Wednesday, September 28, 2011

Porch Patrol - A Family Values Social Media Site:


www.youtube.com
Porch Patrol. Donna Norris (the mother of Amber of the Amber Alert) and Angie Camp have created a social network site:

Porchpatrol.com is more than a social media site. It’s a gathering place for people with strong family values. A place where people can connect and experience that sense of community and friendship that we have lost in recent years. 

Tuesday, September 27, 2011

Is Facebook Tracking Everywhere You Go Online?


Logging out doesn't seem to help, says one writer:
by Josh Wolford | September 26, 2011 @ 4:06pm

Is it possible that Facebook is tracking your web browsing activity, even when you are logged out?

According to Australian hacker and writer Nik Cubrilovic, Facebook could know that you are reading this article, simply because we, like most sites nowadays, have a Facebook share button.

Cubrilovic ran a little test involving cookies and found that logging out of Facebook does not mean that Facebook can’t still know every page you visit on the same browser.

Is it possible to be both private and social? Is privacy a long lost cause because of social networking like Facebook? Let us know what you think.

On his blog post on Sunday, he shows what cookies are sent during a logged-in Facebook user’s visit to Facebook.com compared to a logged-out user’s visit to Facebook.com. Logging out is apparently supposed to prompt the deletion of certain identifiers, but that doesn’t happen, says Cubrilovic.

    The primary cookies that identify me as a user are still there (act is my account number), even though I am looking at a logged out page. Logged out requests still send nine different cookies, including the most important cookies that identify you as a user

    This is not what ‘logout’ is supposed to mean – Facebook are only altering the state of the cookies instead of removing all of them when a user logs out.

This means that whenever you visit a page online that has a Facebook share button, like button or any other related widget, all of this pertinent information is being sent to Facebook. That’s how they can know where you are going on the web.

This shouldn’t be news to anyone. It’s right there in the Facebook Privacy terms -

    We receive data whenever you visit a game, application, or website that uses Facebook Platform or visit a site with a Facebook feature (such as a social plugin). This may include the date and time you visit the site; the web address, or URL, you’re on; technical information about the IP address, browser and the operating system you use; and, if you are logged in to Facebook, your User ID.

But the revelation here is that this information is available even when you are logged out, as the cookie experiment notes. And people might wonder what all of this data does for Facebook -

    The advice is to log out of Facebook. But logging out of Facebook only de-authorizes your browser from the web application, a number of cookies (including your account number) are still sent along to all requests to facebook.com. Even if you are logged out, Facebook still knows and can track every page you visit. The only solution is to delete every Facebook cookie in your browser, or to use a separate browser for Facebook interactions.

Apparently, Cubrilovic has been sitting on this information for a while, and has reached out to Facebook without any substantial response. He says that he was prompted to share this information due to the renewed privacy discussions happening across the internet regarding all of Facebook’s upcoming Open Graph changes and “frictionless sharing.”

That “frictionless sharing” phrase is one that Mark Zuckerberg used quite a bit in his f8 keynote. He explained that it meant users can share their activities across the web to Facebook without having to really think about it. The melding of Facebook and everything else, per say.

Some have privacy concerns, fearing that since applications will be allowed to post things to Facebook regarding your actions without explicit opt-in authorization, users might share stuff on Facebook that they really don’t want to share.

ZDNet has obtained a response from Facebook. They explicitly state that Facebook does not track users’ web activity. They also explain the purpose of logged out cookies -


    Facebook does not track users across the web. Instead, we use cookies on social plugins to personalize content (e.g. Show you what your friends liked), to help maintain and improve what we do (e.g. Measure click-through rate), or for safety and security (e.g. Keeping underage kids from trying to signup with a different age). No information we receive when you see a social plugins is used to target ads, we delete or anonymize this information within 90 days, and we never sell your information.

    Specific to logged out cookies, they are used for safety and protection, including identifying spammers and phishers, detecting when somebody unauthorized is trying to access your account, helping you get back into your account if you get hacked, disabling registration for a under-age users who try to re-register with a different birthdate, powering account security features such as 2nd factor login approvals and notification, and identifying shared computers to discourage the use of ‘keep me logged in’.

Facebook has responded in an additional way as well. As of today, the so called “a_user” cookie, the one which contains the user’s ID, is now destroyed upon logging out. Facebook said that “there is a bug where a_user was not cleared on logout, we will be fixing that today.”

Cubrilovic has updated his blog to discuss this change. He still warns about privacy, saying that the remaining post-logout cookies will still be there, and as a Facebook user, you just have to trust that they are using them for what they say they are using them for (see above).

    Facebook has changed as much as they can change with the logout issue. They want to retain the ability to track browsers after logout for safety and spam purposes, and they want to be able to log page requests for performance reasons etc. I would still recommend that users clear cookies or use a separate browser, though. I believe Facebook when they describe what these cookies are used for, but that is not a reason to be complacent on privacy issues and to take initiative in remaining safe.

In a nutshell, Facebook still has access to information about you when you logout. They give their specific reasons for keeping specific cookies active – mainly security and protection. I guess it’s up to Facebook users to decide if this explanation is understandable, or if measures like Cubrilovic suggests need to be taken – specifically wiping all cookies or using different browsers.

Privacy concerns and Facebook are the peanut butter and jelly of the social networking world, but it sure doesn’t seem to be hurting business.

What do you think? Is Facebook’s explanation satisfactory? Do you worry about your privacy as a Facebook user? Let us know in the comments.

WebProNews
WebProNews on Facebook

Trinity Mount Ministries
Trinity Mount Ministries on Facebook

Assistant Attorney General Lanny Breuer Speaks on the Importance of IP Crime Enforcement:


Assistant Attorney General Lanny Breuer Speaks on the Importance of IP Crime Enforcement
September 27th, 2011 Posted by Tracy Russo
 
Earlier this month, Assistant Attorney General Lanny A. Breuer of the Criminal Division represented the U.S Department of Justice as a keynote speaker at the 5th International Law Enforcement Intellectual Property (IP) Crime Conference in Madrid, hosted by INTERPOL, EUROPOL, and the Cuerpo Nacional de Policia. Breuer joined China, Ghana, Nigeria, Canada, Chile, Sweden and other countries to discuss solution-driven proposals to IP crime enforcement at the conference, which brought together more than 400 law enforcement and customs personnel from more than 50 countries.

Criminals manufacture and distribute counterfeit and pirated goods across the globe. While advances in technology bring our world closer together, those same advances allow those who would commit intellectual property crimes to operate globally without ever needing to leave their homes.

Assistant Attorney General Breuer spoke about the importance of devoting time and effort toward IP crime and raising global awareness about its harmful consequences:
“Counterfeit pharmaceuticals, counterfeit automotive and defense-industry parts, and other counterfeit consumer products can cause serious harm to people and endanger their lives; and . . . companies whose trade secrets are stolen or whose goods are counterfeited may be forced to downsize or go out of business, costing individuals their jobs. Nevertheless, the public perception at times persists that IP crime is victimless. It is therefore one of our important duties here this week to spread the message about the significant, and very real, costs of IP crime.”
The conference emphasized the importance of an organized and collaborative international strategy. International cooperation to disrupt the distribution of counterfeit goods improves the quality and safety of goods being sold and distributed to citizens in all countries. IP crime is an international problem and economic road block for businesses, both large and small. Coordinating with our foreign law enforcement partners enables our partners all over the world to address and work toward eliminating IP crimes happening beyond our borders.

For instance, German authorities provided vital assistance that led to the indictment of a Dow AgroSciences LLC research scientist on economic espionage charges for his alleged misappropriation and transportation of company trade secrets to China and Germany. Elsewhere, because of the Israeli government’s help and cooperation, a Massachusetts individual pleaded guilty to economic espionage after providing company trade secrets to an undercover agent posing as an Israeli intelligence officer.

In addition to cooperating on law enforcement matters, the department works to build partnerships through international training programs. In the last six years, the Justice Department has participated in IP enforcement training and education programs for more than 12,000 prosecutors, investigators, judicial officers, and other officials from more than 30 countries.

We also send prosecutors overseas to take the lead on our IP protection efforts in key spots around the globe through the Department’s Intellectual Property Law Enforcement Coordinator, or IPLEC, program.

We know IP crime is a serious threat. It jeopardizes the health and safety of consumers. It stifles innovation and creativity. And it has negative effects on the global economy. The Justice Department will continue to vigorously enforce our criminal IP statutes, and bring trade secret thieves, counterfeiters, intellectual property pirates, and others to justice.
To learn more about our efforts, visit the website of the IP Task Force