Authentix has been accepted as a new member of The Business Council for International Understanding (BCIU), which promotes international trade through special events and collaborations. BCIU works closely with the U.S. Department of Commerce and maintains good relationships with U.S. Embassies across the world, giving its 150+ member companies access to high-level connections for foreign commercial opportunities. This membership will enable Authentix to expand its global footprint and leverage BCIU’s extensive network to foster new business partnerships. Authentix looks forward to participating in BCIU’s initiatives and contributing to the organization’s mission of enhancing international trade. For more information, visit the BCIU website.
Author: Kathryn Olivier
Authentix® Promotes Noreen Ang to Chief Financial Officer
|Addison, Texas – 10 February 2025 – Authentix, Inc. is pleased to announce the promotion of Noreen Ang to the executive position of Chief Financial Officer. Ms. Ang joined Authentix in 2014 and has held positions of increasing responsibility during her tenure with the most recent title of Vice President, Corporate Controller since 2020. In her role as CFO, Ms. Ang is responsible for integrating business and finance strategy to further expand the global presence of Authentix and drive growth into key markets. She also oversees global finance, treasury, accounting, and taxation activities.
Bringing over twenty years of global financial leadership in the public and private sectors, Ang’s career began in public accounting with PricewaterhouseCoopers, and she has served in multiple senior roles including with NCR Corporation and Overhead Door Corporation, prior to joining Authentix. Ms. Ang holds a Bachelor of Science in Accounting from The University of the Philippines and is a licensed Certified Public Accountant.
About Authentix: As the authority in authentication solutions, Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products.
Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, and Africa serving clients worldwide. Media Contact: Kent Mansfield, Chief Sales and Marketing Officer – kent.mansfield@authentix.com
AI-Generated Visual Content and IP Challenges
|This Authentix article has been published as a part of the Asia Video Industry Association’s Asia Video Report 2025. To learn more, please visit their website.
By Bharat Kapoor, Vice President, Online Brand Protection, Authentix
The creation of AI-generated visual content has profound implications for IP owners, especially in the context of copyright. When AI engines scrape images and videos to create new works, the critical question is whether such processing amounts to “reproduction” under copyright law. There also arises the vexed question of whether an AI-generated visual work is independently entitled to copyright protection. The few disputes that have so far reached courts have left many questions and concerns unaddressed. For example, in Getty Images v Stability AI (2023), Getty Images claimed before the UK High Court that Stability AI scraped millions of its copyrighted images to train its AI engine. While the court allowed the case to proceed to trial (finding that it involved a novel and previously undetermined question of law) it remains to be seen whether the parties decide to settle, thus scuttling the development of judicial guidelines on the subject. In Kneschke v LAION (2024), the Hamburg Regional Court in Germany rejected a similar claim by a stock image photographer against LAION, a non-profit AI company. Somewhat controversially, the court allowed LAION the benefit of an exemption normally reserved for research organizations. If courts begin to lean in this direction globally, copyright owners will struggle to be renumerated fairly. Given the deep links between certain non-profits and major tech companies, such an outcome might even be seen as patently unjust. Meanwhile, in Thaler v. Perlmutter (2023), the US District Court in Columbia upheld the US Copyright Office’s denial of copyright in an image created using AI, ruling that “human authorship” is a necessary ingredient of copyright ownership. But the ruling arguably fails to provide guidance in situations involving human authorship assisted by AI, or the highly creative use of an AI engine where the user goes beyond dictating mundane commands.
Alongside copyright, an overlooked area involves the use of trademarks in the creation of AI-generated visual content. To illustrate, Authentix Online Brand Protection conducted an experiment where multiple AI apps were instructed to create hundreds of images using well-known trademarks in (arguably) dilutionary contexts. The results were mixed. Some engines did not use the specified trademarks, contrary to our commands. Some slightly altered the specified trademarks and then used these versions. And some used all kinds of trademarks uninhibitedly, in contexts that would probably displease trademark owners (such as Ronald McDonald advertising KFC). Depending on context and jurisdiction, such uses might be prohibited as dilution/tarnishment, or permitted under fair use/criticism/parody exceptions.
In the end, AI can make the process of creating high-quality visual content quicker, easier, cheaper, more accessible and more scalable. This can benefit not only novice or low-budget content creators, but also large corporations wishing to expand their reach through social media. However, IP rights owners will likely argue in favor of laws and regulations governing the use of IP by AI engines. Rights owners may also advocate the adoption of licensing regimes (as a possible harbinger, OpenAI has reportedly been offering news organizations between USD 1 to 5 million in licensing fees to train its AI model). In both cases, copyright-related principles will probably be easier to concretize into laws and norms than trademark principles, and also receive higher prioritization. Yet, in all this, a fact that could be missed is that Western nations no longer monopolize the development of AI. AI engines that place IP owners at risk may well emanate from emerging Asian economies, with contrary viewpoints on the boundaries of IP protection. The bigger challenge for IP owners, therefore, may lie in ensuring the global acceptability of IP norms and the consent of governments and AI developers from emerging economies in the framing of such norms.
About Authentix Online Brand Protection
Authentix provides some of the world’s most recognizable brands with sophisticated online brand protection tools and services to address a broad range of online infringement and counterfeit risks. From global online surveillance and enforcement, online investigations and site takedowns, target verification, and even offline investigations, Authentix helps major brands proactively reduce the threat of counterfeit products being sold online. Our online brand protection solutions combine cutting-edge technological tools and expert analysis to reduce infringements for our clients on online marketplaces, social media platforms, and websites by up to 90%.
Want to see what Authentix OBP can do for your company? Our team is committed to working with you, understanding your unique challenges and requirements, and providing tailored solutions that best fit your industry and the unique challenges your brand faces that make a tangible difference to your brand. Schedule a consultation with one of our brand protection experts to learn more.
Bharat Kapoor, Vice President, Online Brand Protection, Authentix
Formerly the CEO of Strategic IP Information Pte, now a part of Authentix, Bharat has been focused on building effective global brand protection programs for over 250 brands across sectors such as fashion, FMCG, pharma, cosmetics, sporting goods wines, and spirits. He has led the development of the best-in-class machine learning-based online brand protection technology and developed effective global teams to investigate counterfeiting and piracy on the ground in China, Asia, and Latin America. Bharat Kapoor has a B.A. Honors from the University of Technology, Sydney. Prior to joining SIPI, he was an Associate Director at Ernst & Young India, where he led the business development and advisory services program for companies operating in the media, e-commerce, and advertising sectors.
Combating illicit trade with tailored, multilayered brand protection strategies
|This Authentix article has been published as a part of World Trademark Review’s Anti-Counterfeiting and Online Brand Enforcement: Global Guide 2024. To learn more, please visit their website.
By Kristi Browne, Authentix
Counterfeiting, smuggling, diversion and infringement – collectively known as illicit trade – are growing global problems for businesses and consumers. With an increasing volume of counterfeit goods being trafficked globally and seeping into supply chains, a well-strategised brand protection programme is more essential than ever to shield what matters most to businesses: customers, brand identity, reputation and revenue.
This growing epidemic of illicit trade extends across a multitude of industries, including food and beverages, pharmaceuticals, health and beauty, apparel and a host of other consumer and commercial products. Its effects translate into financial losses for brand owners and, more importantly, added risks to consumer health and safety. Falsified products manufactured without regard for standards, required ingredients, quality control or government oversight can imperil consumer safety and create a lack of confidence in a trusted brand.
Steps for developing and implementing a brand protection strategy
Creating a brand protection plan for companies means working together across different parts of the company and locations around the world. It also means building relationships with outside groups like Customs, police and government agencies, as well as stores, websites and suppliers.
The following steps are recommended when developing an effective brand protection programme.
1. Early evaluation: Before a company can take advantage of these benefits, it needs to fully understand how serious and widespread the problem of theft can be. The first step is to evaluate the problem. It is also important to evaluate which anti-counterfeiting security methods work best for a company’s product and industry. This will allow the brand owner to get the necessary information on possible security features and packaging design that might be required as part of the final product launch.
2. Risk assessment: When identifying product risk, it is important to develop a risk inventory for the products. The level of risk associated with each product will differ depending upon a multitude of factors, including supply chain complexity, geography in which the product is sold, price points, margins, complexity to copy and total expected demand. The next step is to assess the potential brand damage. With brands being among a company’s most valuable assets, the fragile bond of trust between consumers and products cannot be risked. Any injuries or deaths caused by counterfeits can destroy this relationship. Top management should be aware of this risk and committed to demonstrating leadership on the issue. Brand protection managers and the marketing team should also be involved and participate in assessing the risk of counterfeit attacks and the value of all proposed strategic solutions.
3. Strategy development: At this point, responses to the most pressing threats can be translated into action by organising a method for management, information and technology tools to respond to threats. This is also the time to allocate resources appropriately based on risk areas and to draft a communications plan that covers potential causes of risk, avoidance actions, transference and mitigation actions, and potential impacts and contingency actions.
4. Detection and monitoring: To effectively protect a brand against counterfeiting, businesses must employ comprehensive detection and monitoring strategies that show dedication to enforcing their intellectual property rights and prosecuting violators. This includes implementing a variety of security features on product packaging, conducting educational campaigns for public awareness, enhancing legal penalties for counterfeiting, inserting strict anti-counterfeiting terms in vendor contracts and performing unscheduled audits on distribution partners.
It is also crucial to vigilantly monitor online and physical marketplaces for unauthorised sales, fake profiles and counterfeit listings, and to deploy anti-phishing software. This is essential to detecting threats early and acting swiftly to mitigate brand infringement.
5. Enforcement: Keeping a brand safe means making sure that rules and responsibilities related to intellectual property are properly observed, both online and in the physical world. This task often requires collaborating with the right authorities to handle issues like illicit manufacturing, copyright infringement and counterfeit products being sold, shutting down fake websites, and taking down counterfeit listings.
6. Data analysis, reporting and KPI tracking: Businesses should prioritise thorough reporting and analysis, as well as the tracking of key performance indicators in order to monitor the effectiveness of a brand protection strategy and prevent counterfeit activity as much as possible. This enables them to assess the extent of intellectual property violations and tailor strategies to enhance security measures, moving beyond mere takedown metrics to focus on substantial reduction of infringements. By shifting their perspective on brand protection from a cost to a strategic investment, companies can not only safeguard their assets but also unlock new revenue streams through focused and outcome-oriented actions.
What brand protection solutions are right for my company?
Anti-counterfeiting features may be both overt and covert and can be applied in many ways. These include in-product, on-product in the form of labels and closure seals, on cartons where containers of products are stored, into plastic parts of individual packaging, and even onto metal and glass components of packaging.
Each feature serves a unique purpose. Covert or invisible markings enable trained inspectors to quickly authenticate genuine products in the supply chain, identify the source of diversion, or determine other illicit activities. Overt features allow the end consumer to verify the authenticity of their purchased product. When combined with careful design and production quality controls in authentic product manufacturing, these features raise the bar of complexity for counterfeiters and make the product a less attractive target.
Overt security
Visible security features are valuable to product authentication. Such measures include holograms, colour-shifting inks and security threads that are visible to the naked eye or felt by touch, and that are difficult to reproduce or copy. Other examples include microtext, thermographic ink and even micro-optics (such as the blue lenticular strip found on the current US $100 bill).
Although visible security features are a starting point, counterfeiters are creative. Even if a visible authentication feature is hard to recreate perfectly, a counterfeiter with the right tools and illegal intent only needs to copy it closely enough to confuse a consumer who just glances at a package. Additional measures create layers of security that make it more difficult, even impossible in some cases, to copy or duplicate security features.
Overt security tactics can include:
• optically variable inks;
• nano-optics with 3D vivid motion, depth and colour;
• colour-shifting foils and inks;
• holographic/pictorial foils;
• pearlescent inks;
• gold and silver inks;
• thermographic ink;
• microtext;
• anti-tampering technologies (tamper-evident closures and labels); and
• optical security technologies (holographic seals and labels).
Covert security
High-security covert features can be embedded into labels, closure seals or other features of product packaging. Although these covert markers are invisible to the naked eye, they can be found and measured with specialised handheld instruments using proprietary optics and detection algorithms for rapid, secure field authentication. Additional forensic layers of security can be embedded into materials and confirmed through more extensive laboratory analysis for evidence to further prosecute profiteers.
Covert security tactics can include
• heat-activated inks;
• light-activated inks;
• fugitive inks;
• inks or materials with specialised fluorescing taggants;
• ultraviolet activated inks; and
• machine-readable electro ink.
Semi-covert security
As the name suggests, these are features that might not be noticed until someone closely examines the product or package.
Forensic security
Forensic analysis involves laboratory testing of products via an embedded component or molecule added to a substrate or solution to determine authenticity. Unique product elements are examined so brand owners can generate compelling evidence of counterfeiting for legal proceedings. However, the ability to trace a product back to its origin is not supported unless a unique hidden tracing element is added to the product.
• Chemical and physical markers: These can be hidden from consumers and counterfeiters and can only be seen with specific detectors that are calibrated to a specific wavelength to verify authenticity.
• Tamper-evident packaging: These are labels, stickers or seals that, when opened or tampered with, provide immediate evidence that the product has been compromised.
• Serialisation: In the serialisation process, a company applies individual unique codes and/or signatures at the point of manufacture (giving each product an identifiable attribute) and defines scanning locations where retrieval and association of the unit can be linked to the scanning transaction. These transactions uniquely capture, track and store data from those markings in a managed database that allows authorised personnel to monitor the product journey by unit or larger groups. Most are familiar with this process as it applies to shipping a package overnight, where it is tracked online until it reaches its destination.
• Digital QR codes: Products can be scanned and authenticated without the need for an app, using a smartphone camera that can then further engage consumers by directing them to other web pages where they can register their warranty, learn more about the product, and even suggest other complementary products. As the product travels through the supply chain, the unique number or symbol can be collected in the database and added to its history. This information is available to a credentialed user via a mobile app or localised database. In a track and trace system, for instance, the information flow can be bi-directional, so the collection of the symbol, the scanning event and the unique call to the database can be recorded and appended to the product record for verification purposes.
• Online brand protection: The rise in online sales has unfortunately been accompanied by a rise in counterfeiting on online marketplaces, social media platforms and websites. Online brand protection tools include keyword monitoring, logo detection, image matching and the use of advanced brand protection technology like artificial intelligence and machine learning. Online brand protection allows your company to easily scan web pages and marketplaces, social media platforms, e-commerce apps, messaging apps like WeChat, payment sites and the dark web for infringing content and listings and get them taken down.
Case study 1: Pharmaceuticals
The challenge
Counterfeit copies of a major pharmaceutical brand were turning up in the US market, but the brand had no security measures in place to allow patients or inspectors to tell real products from fake. Consequently, $1 billion worth of product, already in the distribution pipeline, could not be sold until a method of allowing patients and retailers to verify that the medicine is authentic could be implemented.
The solution
The customer’s product was repackaged to include a variety of authentication features that could be identified by patients and inspectors, both in the field and in the laboratory. These included:
• overt, colour-shifting inks that were readily distinguishable by patients;
• covert, machine-readable inks that could be detected in the field by inspection staff with appropriate readers; and
• forensic markers that could only detected under laboratory analysis.
The outcome
The solution to the customer’s counterfeiting problem provided a secure way to instantly differentiate authentic from counterfeit medicines. The benefits were immediate and significant:
• $1 billion worth of product frozen within the supply chain was released for sale;
• the expense of a full product recall was averted;
• the customer was able to mitigate the risk of potential lawsuits; and, most importantly,
• confidence in the brand was restored among physicians, pharmacists and patients.
Implementing a multilayered approach: How brand protection works
The reality today is that one level of security is rarely sufficient. Counterfeiting technology is constantly evolving, so a simple one-dimensional technology to combat illicit trade isn’t enough. An effective multilayered approach in which overt, covert, and forensic features are applied is the most effective long-term solution.
These features can be incorporated into labels, closure seals, storage cartons, plastic, metal and glass packaging at very reasonable costs. Each type of feature serves a unique purpose, from colour-shifting inks that allow end-users to quickly identify a branded product as genuine to covert markings that enable an inspector to identify many factors involved with the source of authenticity.
Multilayered security options include:
• overt;
• covert;
• forensic;
• online monitoring;
• analysis – data collection and insight; and
• intellectual property and trademark enforcement.
Since any trademarked product can be counterfeited, it is imperative to have a brand protection strategy in place.
An effective brand protection programme spans many company departments, including marketing, legal, production, design, supply chain and logistics. That is a lot of moving parts to manage internally while companies are already busy making and selling the best products possible. The time these departments can dedicate to brand protection can be severely limited.
Having an external brand protection partner allows companies to have an entire team of experts in their corner, providing custom brand protection solutions built for each company’s unique situation using the most advanced technology paired with expert analysis.
A brand protection partner will also be able to share valuable insights and analytics to make further recommendations for what next steps the company can take to combat counterfeits. Brand protection partners can work with external teams, including law enforcement, border authorities, and investigators, to tackle counterfeit products at the source.
Case study 2: Wine and spirits
The challenge
A spirits brand based in South America needed help addressing counterfeiting and adulteration. It was losing millions in sales and experiencing a 30–40 per cent counterfeit rate, which put public safety and brand reputation at risk. An authentication solution was needed to make it easier for law enforcement and health agencies to distinguish authentic from counterfeit products in the field.
The solution
Multilayered security options were implemented throughout the programme, including a combination of in-product, on-package marking, and distribution channel monitoring. For on-package authentication purposes, an overt feature was added as tamper evidence for consumers and a covert feature was added for official retail inspectors to detect via handheld field verification readers and test kits. In addition, covert features were incorporated into the spirit itself for field and forensic lab verification.
The outcome
• Within the first year of the programme, 75 million litres of spirits were protected (approximately 100 million bottles).
• More than 1,300 inspectors in 28 states inspected more than 300 retail outlets.
• Of these, 10 per cent were found to contain counterfeits; five retail outlets were investigated, resulting in arrests.
• The brand owner experienced a 25 per cent increase in sales over the same period.
Conclusion
Employing an effective brand protection solution brings a wide range of benefits to businesses. Improving sales and revenue is always important in any industry. By eliminating infringements and counterfeits, a company can increase revenue and market share.
Having a brand protection partner that manages detecting, monitoring and taking down counterfeiters allows businesses to save valuable time and focus on producing and selling instead of worrying about bad actors. Customers will also notice a rise in brand standards once the lower-quality infringing products are removed from the market. This generates goodwill and improves brand reputation.
Eliminating low-quality, counterfeit products not only saves businesses from financial drain but also solidifies their reputation among consumers and partners alike. This newfound trust translates into lasting customer loyalty and gives businesses a competitive edge. Additionally, brand protection strategies reduce legal risks and provide actionable insights by having greater supply chain visibility and data, setting the company up for even greater success.
For a more complete guide to brand protection- why it is necessary, how infringement harms brands and customers, how to develop and implement an effective program, and insights into the brand protection strategies of the future – download our Complete Brand Protection Guide.
About Authentix
As the authority in authentication solutions, Authentix can help brands create a customized plan to tackle counterfeit products from every angle, collect actionable data, and protect brands and consumers. Authentix works with each company to determine which brand protection solutions are right for their situation.
Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products. Through a proven partnership model and sector expertise, clients experience custom solution design, rapid implementation, consumer engagement, and complete program management to ensure product safety, revenue protection, and consumer trust for the best known global brands on the market. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, and Africa serving clients worldwide.
How to Protect Your Critical Documents From Counterfeiting and Fraud
|Discover the importance of secure document protection in preventing fraud when printing certificates, tax stamps, visas, and brand protection labels. Advanced technologies and security solutions, including complex personalized artwork, and anti-counterfeiting techniques allow you to add multiple layers of security to your documents. Watch the video to learn more about the latest secure printing solutions.
Can a Company Be Truly Sustainable Without Preventing Counterfeits?
|Discover how sustainability and anti-counterfeiting solutions work together to protect brands and the environment. Watch this video to learn how preventing counterfeits can reduce pollution and exploitative labor practices.
Want to learn more about what brand protection solutions are right for you? Schedule a consultation with our team today.
The Global Problem of Fake Food
|By Ryne Ambrose, Brand Protection Sales Manager, Authentix
In recent years, the food industry has faced a growing challenge: food fraud. This issue has been exacerbated by the rise of e-commerce, where consumers increasingly shop for groceries online. While this shift offers convenience, it also opens the door for bad actors to sell counterfeit products, misleading consumers and posing significant risks to both health and brand reputation.
Understanding Food Fraud
Food fraud encompasses various deceptive practices including substitution, tampering, and counterfeiting. Substitution involves mixing lower-quality materials with products to increase profit margins. Tampering involves the addition of non-approved ingredients that may be dangerous or toxic. Counterfeiting is passing off an illegitimate product to mimic the genuine for ill-gotten profits or gain. These practices not only attempt to deceive consumers but also can pose serious health risks as well. For instance, a study by the University of California found that 69% of store-bought extra virgin olive oils in the U.S. were likely fake, failing to meet international standards.
The Impact on Consumers and Brands
The consequences of food fraud are far-reaching. For consumers, the risks include exposure to unidentified allergens or hazardous ingredients. As awareness of these risks grows, many consumers are becoming more vigilant about food safety. For well-known brands, the stakes are equally as high. Food fraud can severely damage the brand’s reputation and erode consumer trust. This underscores the importance of companies taking proactive measures to protect their investment in a premium brand as well as their consumers health and trust.
Preventing Food Fraud
There is no single solution to prevent food fraud; instead, an effective prevention program should include a combination of approaches. One key strategy is conducting supplier risk and vulnerability assessments. By identifying partners and assessing the level of vulnerability associated with the fulfillment of these orders, brands can often determine where to focus monitoring efforts and implement security measures. Building strong supplier relationships is crucial, as effective supplier management is essential for maintaining oversight on supply chain risk.
Another important tool is the Hazard Analysis & Critical Control Point (HACCP) concept, which has been extensively used to control food safety risks in the food industry for decades. Investing in technology to proactively remove fraudulent online listings is also vital. The right technology can detect fakes across various online channels and enforce intellectual property efficiently.
Brand Protection for the Food Industry
Brand protection for the food industry should involve a multifaceted approach that safeguards a brand’s unique identity, quality, and intellectual property. This involves a blend of strategies and legal tools designed to protect everything that makes a food brand special, from its name, logo, and packaging to its secret recipes and distinctive flavors. Effective brand protection ensures that every product bearing the brand’s mark meets consumer expectations, preserving the brand’s reputation and authenticity.
Methods for Brand Protection
Several methods can be employed to protect food brands from threats. Trademark registration provides legal defense against infringement and counterfeiting. Securing patents for unique food processing methods or recipes and maintaining trade secrets with confidentiality agreements can protect innovative products and production techniques. Implementing rigorous quality control measures and obtaining certifications like ISO or HACCP can assure consumers of product quality and safety.
Supply chain management is another critical aspect, as establishing a transparent and secure supply chain with trusted suppliers and distributors helps prevent the introduction of counterfeit products. Utilizing covert and/or overt anti-counterfeiting technologies and tamper-evident packaging can also help consumers and company inspectors alike to help identify authentic products. Monitoring the internet and social media for unauthorized use of the brand and employing digital watermarking and tracking technology for product traceability can also be an effective tool today’s digital age.
Conclusion
Proper risk assessment, supply chain analysis, and deploying brand protection technology in the food industry is essential for ensuring product integrity, consumer trust, and long-term success. By leveraging a combination of food regulation, innovative technologies, and digital solutions, companies can effectively protect their brands, detect and combat food fraud and maintain their standards. A robust brand protection strategy is indispensable in the digital age, safeguarding the culinary experience that consumers expect and trust.
Contact Authentix today to learn more about how our brand protection strategies can help maintain your brand’s integrity in the global marketplace.
About Authentix
As the authority in authentication solutions, Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products. Through a proven partnership model and sector expertise, clients experience custom solution design, rapid implementation, consumer engagement, and complete program management to ensure product safety, revenue protection, and consumer trust for the best known global brands on the market. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, Australia and Africa serving clients worldwide.
Ryne Ambrose, Brand Protection Sales Manager, Authentix
With a decade of dedicated service in the brand protection and supply chain industry, Ryne Ambrose is a seasoned expert in safeguarding brand integrity and optimizing supply chain operations. Ryne is well-versed in implementing cutting-edge brand protection strategies. He has a proven track record of identifying and mitigating counterfeit products, trademark infringements, and unauthorized distribution channels. He also possesses a deep understanding of supply chain dynamics. He has consistently contributed to streamlining operations, reducing costs, and enhancing efficiency within distribution centers.
To learn more about Authentix’s brand protection solutions or have general questions around your brand and supply chain, please email ryne.ambrose@authentix.com.
Banknote Technology Report Features Authentix
|Authentix was recently featured in the 2024 Banknote Technology Report Anniversary Edition published by Banknote Industry News which provides valuable insights from leading banknote suppliers regarding technological advancements, innovations and trends in banknote production.
In the report, Authentix shares how we’re redefining banknote security with next generation nano optic overt technology, level 3 covert solutions, and high-speed fitness sensors for cash processing.
Read the Authentix articles here.
To download a copy of the full report, visit: https://www.banknote-industry-news.com/btr10
The Art and History of Intaglio Printing
|Intaglio printing is a laborious and expensive process that combines historical craftsmanship with modern technology. Learn about the intricate details of this printing technique, its applications in security printing, and the evolution of the process from traditional engraving to computer-controlled laser etching.
Does the Arrest of Telegram Founder-CEO Pavel Durov have any Implications for IP Owners?
|By Bharat Kapoor, Vice President, Online Brand Protection, Authentix
The arrest of Pavel Durov, the founder-CEO of Telegram, has sparked off a wave of criticism and conspiracy theories. An official press release reveals that Pavel (now out on bail) was arrested for the purpose of questioning, as part of a judicial investigation. The judicial investigation followed a preliminary enquiry by the Public Prosecutor Office, National Jurisdiction against Organised Crime (JUNALCO), and was opened against unnamed persons on various charges. These charges included complicity in connection with multiple criminal offences, namely the possession and distribution of child pornography, the sale of narcotics, the sale and distribution of hacking tools, and “organised fraud”; money laundering; offering cryptology services without prior declaration; and non-cooperation with authorities seeking to intercept communications.

It is, of course, rare for owners and operators of online platforms to face such criminal action — as opposed to users on the platform engaged in criminal activity. The few examples one can think of would only encompass outrightly rogue platforms whose primary intent was to facilitate illicit commerce, with the active approval and encouragement of its operators. Two notable cases that come to mind are Ross Ulbricht of the Silk Road marketplace (convicted by a Manhattan federal court and sentenced to life imprisonment) or Kim Dotcom of Megaupload (whose extradition order to the US was signed by New Zealand’s Justice minister in August). An interesting facet of those two cases is the role of IP infringement. In the former case, Ulbricht was convicted on seven counts (concerning drug trafficking, trafficking in fraudulent documents, computer hacking services and malware, money laundering and “continuing criminal enterprise”). However, a statement from the prosecutor’s office mentioned that Silk Road was also involved in disseminating “pirated media content”. In the case of Mega Upload, the case against Dotcom was almost entirely centered around copyright piracy, and the Court of Appeal in New Zealand found that Kim Dotcom could be extradited on that basis.
It is no one’s case that Durov and Telegram fall in the same class as the charges raised against Ulbricht/Silk Road and Dotcom/Mega Upload. In fact, Telegram does have a mechanism through which one can report illicit activity, however, the platform has been non-compliant to takedown requests placed by IP owners. In comparison, other social media platforms are known to have more accessible channels to address the concerns of IP owners. Since the French authorities still found it worth investigating Telegram and arresting Durov, it must be asked why IP infringement was missing from the list of allegations, given the alleged high frequency of pirated content on Telegram, as well as the reported presence of counterfeit sellers. In recent experience, about 20 percent of IP complaints that Authentix has filed with Telegram have been taken down. Even there, the response time has been slower than other platforms, which vitiates the ultimate goal of reducing counterfeit traffic. Further, unlike many other marketplaces, Telegram lacks a separate channel to fast-track complaints involving particularly blatant violations — such as outright counterfeits, or cases where an IP assessment is not warranted to determine if a sale is illegal, such as public sales of restricted goods like prescription medicines, alcohol and certain types of chemicals.
Objectively, there have been examples, notably in India, where Telegram has shared the details of users engaged in copyright piracy which was beneficial to investigation and enforcement. Yet, many of these instances only took place after a court order, and after Telegram had contested such claims on grounds of privacy and jurisdiction. Further, a system was introduced where one could open a Telegram account without a SIM card — which pirates and counterfeiters and other rogue actors are allegedly using to seek anonymity. In the end, what we believe Telegram should do is institute a formal, transparent pro-active mechanism through which IP infringements can be addressed; a similar mechanism through which sales involving public policy violations (independent of IP) can be addressed; and a system through which ads (often the first point of contact between a counterfeiter and a user) can be better monitored.
Looking ahead, it is likely that French authorities will continue and try to pressure Telegram to improve its compliance mechanisms, rather than determinedly seek to prosecute Durov personally, with the goal that Telegram will relent and agree to make these changes. Intriguingly, Telegram just recently changed the language on its FAQ page, from “All Telegram chats and group chats are private amongst their participants. We do not process any requests related to them” to now read “All Telegram apps have ‘Report’ buttons that let you flag illegal content for our moderators — in just a few taps.” Yet, if IP infringement continues to lag and Telegram does not make a serious effort to improve compliance, copyright and brand owners will feel justified in feeling hard done by.
About Authentix Online Brand Protection
Authentix provides some of the world’s most recognizable brands with sophisticated online brand protection tools and services to address a broad range of online infringement and counterfeit risks. From global online surveillance and enforcement, online investigations and site takedowns, target verification, and even offline investigations, Authentix helps major brands proactively reduce the threat of counterfeit products being sold online. Our online brand protection solutions combine cutting-edge technological tools and expert analysis to reduce infringements for our clients on online marketplaces, social media platforms, and websites by up to 90%.
* Image from artist Nick Lubushko