Feeds

Who'd buy a fake battery?

Booze, tobacco and gadget fakes in police probe

Reducing security risks from open source software

The Intellectual Property Office's IP Crime Group issued its annual report yesterday, and it highlights some jaw-dropping rip-offs.

A gang in Hackney used "high-tech equipment" to crank out 1.3m litres of counterfeit vodka, enough to buy them penthouse apartments. A less ambitious operation churning out hand-rolling tobacco was busted in Glasgow. The tobacco had thirty times the lead content of the genuine product.

Much of the police's IP work looks out for goods with fake trademarks and designs, covering everything from clothes and jewellery to ciggies, computer games, movies, booze and electronics accessories. Prosecutions under either the TMA or CDPA have increased threefold since 2002. Confiscation orders last year recovered £21.57m from the perps. Auction sites vie with outdoor markets as the most popular outlets for IP crime.

Sometimes the dangers aren't obvious. A footnote on Page 39 of the report points out that "‘pharmaceuticals’ also includes toilet products and condoms".

Strangely, fake batteries continue to be popular. 16 per cent of authorities who responded to the IP Crime Survey reported fake batteries. Perhaps this is the premium end of the fake market - replacement batteries for Apple or Lenovo laptops cost more than the average car battery.

Where IP isn't effectively policed, the business soon falls into the hands of the (real) mafia. Not so in the UK: most IP criminals here aren't organised. But 55 per cent of respondents found a link between IP crime and benefit fraud. The lowering cost of production technology, such as printing, makes it more of an opportunistic crime.

We'll have to wait until next year to find out if the easy availability of genuine article on UK high streets this week affects the demand for fakes. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.