To counterfeit means to imitate something. Counterfeit products are fakes or unauthorised replicas of the real product. Counterfeit products are often produced with the intent to take advantage of the superior value of the imitated product. The word counterfeit frequently describes both the forgeries of currency and documents, as well as the imitations of clothing, handbags, shoes, pharmaceuticals, aviation and automobile parts, watches, electronics (both parts and finished products), software, works of art, toys, movies and any other type of products such as those. Counterfeit products tend to have fake company logos and brands. In the case of goods, it results in patent infringement and/or trademark infringement. Counterfeit consumer products have a reputation for being lower quality (sometimes not working at all) and may even include toxic elements. This has resulted in the deaths of hundreds of thousands of people, due to automobile and aviation accidents, poisoning, or ceasing to take essential compounds (e.g. in the case a person takes non-working medicine).
The counterfeiting of money is usually attacked aggressively by governments worldwide. Paper money is the most popular product counterfeited.
Forgery of money or government bonds
|This section needs expansion. You can help by adding to it. (December 2009)|
Counterfeit money is currency that is produced without the legal sanction of the state or government and in deliberate violation of that country's laws.
The United States Secret Service, mostly known for its guarding-of-officials task, was initially organized primarily to combat the counterfeiting of American money. Counterfeit government bonds are public debt instruments that are produced without legal sanction, with the intention of "cashing them in" for authentic currency or using them as collateral to secure legitimate loans or lines of credit.
Counterfeiting of documents
Forgery is the process of making or adapting documents with the intention to deceive. It is a form of fraud, and is often a key technique in the execution of identity theft. Uttering and publishing is a term in United States law for the forgery of non-official documents, such as a trucking company's time and weight logs.
Questioned document examination is a scientific process for investigating many aspects of various documents, and is often used to examine the provenance and verity of a suspected forgery. Security printing is a printing industry specialty, focused on creating legal documents which are difficult to forge.
Counterfeiting of consumer goods
The spread of counterfeit goods (commonly called "knockoffs") has become global in recent years and the range of goods subject to infringement has increased significantly. Apparel and accessories accounted for over 50 percent of the counterfeit goods seized by U.S Customs and Border Control. According to the study of Counterfeiting Intelligence Bureau (CIB) of the International Chamber of Commerce (ICC), counterfeit goods make up 5 to 7% of World Trade, however these figures cannot be substantiated due to the secretive nature of the industry. A report by the Organisation for Economic Co-operation and Development indicates that up to US$200 Billion of international trade could have been in counterfeit and illegally copied goods in 2005. In November 2009, the OECD updated these estimates, concluding that the share of counterfeit and illegitimate goods in world trade had increased from 1.85% in 2000 to 1.95% in 2007. That represents an increase to US$250 billion worldwide.
In a detailed breakdown of the counterfeit goods industry, the total loss faced by countries around the world is $600 billion, with the United States facing the most economic impact. When calculating counterfeit products, current estimates place the global losses at $400 billion. On November 29, 2010, the Department of Homeland Security seized and shut down 82 websites as part of a U.S. crackdown of websites that sell counterfeit goods, and was timed to coincide with "Cyber Monday," the start of the holiday online shopping season.
Some see the rise in counterfeiting of goods as being related to globalization. As more and more companies, in an effort to increase profits, move manufacturing to the cheaper labour markets of the third world, areas with weaker labour laws or environmental regulations, they give the means of production to foreign workers. These new managers of production have little or no loyalty to the original corporation. They see that profits are being made by the global brand for doing little (other than advertising) and see the possibilities of removing the middle men (i.e. the parent corporation) and marketing directly to the consumer. This can result in counterfeit products being virtually indistinguishable from original products, as they are being produced in the same company, and in damage to the parent corporation due to copyright infringement.
Certain consumer goods, especially very expensive or desirable brands or those that are easy to reproduce cheaply, have become frequent and common targets of counterfeiting. The counterfeiters either attempt to deceive the consumer into thinking they are purchasing a legitimate item, or convince the consumer that they could deceive others with the imitation. An item which makes no attempt to deceive, such as a copy of a DVD with missing or different cover art, is often called a "bootleg" or a "pirated copy" instead.
Most counterfeit goods are produced and manufactured in China, making it the counterfeit capital of the world. In fact, the counterfeiting industry accounts for 8% of China's GDP. Joining China are North Korea and Taiwan. Some counterfeits are produced in the same factory that produces the original, authentic product, using inferior materials. Another strange new trend in counterfeiting, especially seen in consumer electronics, is the manufacture of entirely novel products using poor quality materials or, more often, incorporating desirable features not present in a brand's authentic product line and then including prominent and fake brand names and logotypes to profit from brand recognition or brand image. An example would be imitation "Nokia" and "iPhone" cellular phones with features like dual SIM slots or analog TV, which are unavailable in authentic originals, or cosmetically-identical clones of high-end smartphones such as those from Hong Kong-based Goophone, using off the shelf system-on-chips from MediaTek and the Android operating system, often with user interfaces made to resemble the devices they imitate. Another example would be imitation "iPod" MP3 players whose power cells or batteries are removable and replaceable, whereas in authentic originals the power cells or batteries are permanently installed.
In the United States, a federal crackdown on counterfeit imports is driving an increase in domestic output of fake merchandise, according to investigators and industry executives. Raids carried out in New York City resulted in the seizure of an estimated $200 Million in counterfeit apparel, bearing the logos of brands such as "The North Face," "Polo," "Izod Lacoste," "Rocawear," "Seven for all Mankind," and "Fubu." One of the largest seizures was a joint operation in Arizona, Texas and California that seized seventy-seven containers of fake "Nike Air Jordan" shoes and a container of "Abercrombie & Fitch" clothing, valued at $69.5 million. Another current method of attacking counterfeits is at the retail level. Fendi sued the Sam's Club division of Walmart for selling fake "Fendi" bags and leather goods in five states. Sam's Club agreed to pay Fendi a confidential amount to settle the dispute and dismiss the action. In the case Tiffany v. eBay, Tiffany & Co. sued auction site eBay for allowing the sale of counterfeit items, but lost on all claims. Gucci filed suit against thirty websites in the United States and is currently[when?] in the process of suing one hundred more.
A number of companies involved in the development of anti-counterfeiting and brand protection solutions have come together to form special industry-wide and global organisations dedicated to combating the so-called "brand pirates" such as the International Hologram Manufacturers Association. Other companies and organizations have established web-based communities that provide a framework for crowd-sourced solutions to counterfeiting. One such free community, Collectors Proof enables manufacturers and users alike to associate unique identification numbers to virtually any item so that each new owner can update its chain of custody. Because quality counterfeit items are often difficult to discern from authentic goods, this approach enables potential customers to access an item's current and previous owners – its provenance – prior to purchase.
To combat counterfeiting, companies may have the various parts of an item manufactured in independent factories and then limit the supply of certain distinguishing parts to the factory that performs the final assembly to the exact number required for the number of items to be assembled (or as near to that number as is practicable) and/or may require the factory to account for every part used and to return any unused, faulty or damaged parts. To help distinguish the originals from the counterfeits, the copyright holder may also employ the use of serial numbers and/or holograms etc., which may be attached to the product in another factory still.
- "Physical Unclonable Functions in Theory and Practice", p. 46, by Christoph Böhm, Maximilian Hofer
- Counterfeit culture documentary
- Ahi, Kiarash (2015-05-13). "Terahertz characterization of electronic components and comparison of terahertz imaging with X-ray imaging techniques". SPIE Sensing Technology+ Applications: 94830K-94830K-15. doi:10.1117/12.2183128.
- ICC Counterfeiting Intelligence Bureau (1997), Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights, United Kingdom.
- "The Economic Effect of Counterfeiting and Piracy, Executive Summary" (PDF). OECD, Paris. 2007. Retrieved November 15, 2016.
- "Magnitude of counterfeiting and piracy of tangible products – November 2009 update" (PDF). OECD, Paris. 2009. Retrieved November 15, 2016.
- "Havocscope Counterfeit and Piracy Markets by Countries". Retrieved April 14, 2010.
- "Havocscope Counterfeit and Piracy Markets by Products". Retrieved April 14, 2010.
- "U.S. Shutters 82 Sites in Crackdown on Downloads, Counterfeit Goods" Wired magazine, November 29, 2010
- Schmidle, Nicholas (19 August 2010). "Inside the Knockoff-Tennis-Shoe Factory". The New York Times Magazine. Retrieved 27 March 2015.
- "Intellectual Property Rights" (PDF). Retrieved 15 May 2010.
- "MIT CIS: Publications: Foreign Policy Index". Retrieved 15 May 2010.
- "Shanzhai ji: All you need to know about fake phones - Mobile Phones". CNET. Retrieved 5 August 2013.
- "Dual SIM review: Mobiles go two-in-one - page 2". GSM Arena. 3 August 2007. Retrieved 27 April 2014.
- Fingas, Jon (5 August 2013). "GooPhone and LG to offer first tri-SIM smartphones using MediaTek chips". Engadget. Retrieved 9 March 2015.
- Esposito, Dom (24 July 2014). "Hands-on with a functional 4.7-inch iPhone 6 clone w/ heavily detailed, skinned version of Android (Video)". 9to5Google. Retrieved 9 March 2015.
- Chase, Brendon; Derek Fung (8 October 2009). "Fake iPod versus the real thing". CNET. Retrieved 9 March 2015.
- Humphries, Matthew (8 February 2011). "L.A. police seize $10 million worth of counterfeit iPhones & iPods". Geek.com. Retrieved 9 March 2015.
- "Collectors Proof". Retrieved July 16, 2012.
||This remainder of this section includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (August 2011) (Learn how and when to remove this template message)|
- Counterfeit Goods Data and Statistics Havocscope Black Markets
- Anti-counterfeit news and features at SecuringIndustry.com
- Beware of Pirates! How to Avoid Bootleg Blu-rays and DVDs article at Brenton Film
- Detecting the Truth: Fakes, Forgeries and Trickery virtual museum exhibition at Library and Archives Canada
Media related to counterfeit objects at Wikimedia Commons