Prosecution Of Crimes Involving Cyber Theft Of Intellectual Property

1. Cyber Theft of Intellectual Property: Overview

Cyber theft of intellectual property involves unauthorized access, copying, or distribution of someone else’s protected intellectual property (patents, copyrights, trade secrets, trademarks, or designs) using computers or networks.

Key legal frameworks often invoked include:

Copyright laws – for digital works like software, music, books.

Trade secret laws – for confidential business information.

Computer crime laws – such as hacking and unauthorized access.

International treaties – like the WIPO Copyright Treaty and TRIPS Agreement.

Prosecution challenges include:

Jurisdiction across borders.

Identifying perpetrators behind anonymized networks.

Proving intent to steal or commercially exploit the IP.

Quantifying economic damage.

Prosecution typically relies on:

Evidence of unauthorized access to a computer system.

Evidence of copying, transmitting, or selling IP.

Demonstration that the IP was protected under law.

2. Key Cases on Cyber Theft of Intellectual Property

I will provide more than five cases from different jurisdictions with detailed explanation.

Case 1: United States v. Aaron Swartz (2011)

Facts: Aaron Swartz, an activist and programmer, accessed millions of academic articles from JSTOR through MIT’s network without authorization.

Charges: Under the Computer Fraud and Abuse Act (CFAA) for unauthorized access and downloading.

Legal Issue: Whether automated downloading of copyrighted material constituted criminal access under cybercrime laws.

Outcome: The case was tragically settled when Swartz committed suicide before trial. The case sparked widespread debate about computer law, copyright, and proportional prosecution.

Significance: Highlighted legal tension between access for public interest and unauthorized access; inspired reforms in prosecuting cyber theft of digital intellectual property.

Case 2: United States v. Wang Dong (2009)

Facts: Wang Dong, a Chinese national, hacked into US defense contractor computers and stole software source codes and design plans.

Charges: Economic Espionage Act and CFAA (for trade secrets).

Outcome: Wang was extradited and sentenced for stealing proprietary technology used in weapons systems.

Significance: First major case showing cyber espionage involving trade secrets. Prosecution relied on digital forensics to trace unauthorized access to IP.

Case 3: Oracle v. Rimini Street (2010-2020)

Facts: Rimini Street, a third-party software support company, allegedly copied Oracle’s software and documentation without authorization.

Legal Issue: Alleged copyright infringement and circumvention of licensing agreements.

Outcome: Courts ruled Rimini Street liable for massive copyright infringement, ordering damages exceeding $100 million.

Significance: Demonstrated that software copying, even for commercial support purposes, is prosecutable as cyber theft of IP. Courts relied heavily on digital evidence of copying.

Case 4: Sony Pictures Entertainment Hack (2014)

Facts: Hackers linked to North Korea stole large amounts of intellectual property including unreleased films, employee data, and confidential business info.

Charges: Federal and state cybercrime and intellectual property violations.

Outcome: Federal agencies investigated; though some hackers were never prosecuted due to foreign jurisdiction, civil damages and cyber security measures followed.

Significance: Showed corporate IP theft can have national security implications; cyber theft of IP is treated seriously even if cross-border prosecution is difficult.

Case 5: United States v. Kim Dotcom / Megaupload (2012)

Facts: Kim Dotcom ran Megaupload, a cloud storage platform used to distribute pirated movies, music, and software globally.

Charges: Copyright infringement, criminal copyright violation, money laundering.

Outcome: Dotcom was arrested in New Zealand; legal proceedings continue with extradition attempts.

Significance: Highlighted large-scale commercial IP theft via the internet, showing that hosting platforms can be criminally liable if used for unauthorized distribution.

Case 6: Facebook v. Power Ventures (2010)

Facts: Power Ventures, a startup, allowed users to access multiple social media accounts. It scraped Facebook data without authorization.

Legal Issue: Whether automated scraping violated CFAA and constituted IP theft of proprietary data.

Outcome: Court ruled in favor of Facebook; unauthorized scraping of proprietary data is a form of cyber theft.

Significance: Expanded cyber theft beyond just copyrighted material to proprietary databases and user content.

Case 7: Epic Games v. Apple (2020-2021) – Partially Related to IP

Facts: Epic Games challenged Apple’s App Store policies after Fortnite was removed. Epic also claimed Apple restricted access to IP and developer tools.

Legal Issue: Access to proprietary APIs and developer IP.

Outcome: Court ruled partially for Apple but recognized developer IP rights.

Significance: Shows emerging issues in digital platform IP and proprietary code access; cyber IP theft can involve APIs, SDKs, and developer tools.

3. Prosecution Mechanisms

From these cases, we can see several patterns in prosecuting cyber theft of IP:

Digital Evidence Collection: Logs, source code copies, server records, and network traffic.

Legal Frameworks Used:

CFAA (U.S.)

Economic Espionage Act

Copyright law (domestic & international)

Trade Secret Laws

Challenges in Prosecution:

Jurisdiction over foreign perpetrators.

Proving intent to commercially exploit stolen IP.

Linking anonymous hackers to digital footprints.

Civil Remedies: Large damages are often sought alongside or instead of criminal charges.

Summary

Cyber theft of intellectual property is prosecuted under both criminal statutes (like CFAA or trade secret laws) and civil remedies (copyright infringement, breach of license). Cases like Oracle v. Rimini Street and Megaupload show massive commercial implications, while Aaron Swartz and Facebook v. Power Ventures highlight the legal limits on unauthorized access and scraping.

LEAVE A COMMENT