We focus on the hard to reach, non-compliant, and notorious DMCA and Trademark violators.
Leveraging our expertise in hosting, project management, intelligence, and cyber investigations, we are able to completely un-mask violator identities, expose their entire operation, create effective shutdown strategies, and coordinate joint efforts.
Our assertive action plans are designed to comprehensively and continually interrupt every aspect of a violator’s business.
A typical shutdown campaign will consist of the following phases:
Utilize repurposed intelligence tools and techniques to un-mask human identities, reveal physical locations, expose hidden infrastructure, and catalog vulnerabilities.
Create a comprehensive strategy that simultaneously and continually disrupts the violator’s ability to react and operate.
Support the law firms that are engaged in our shutdown campaign.
Provide continual change support throughout the campaign.
After action report to Rightsholder and continual campaign optimization.
violators we target
Movie, music, and ebook type sites which link to offsite content.
File Sharing Sites
File upload and sharing sites, primarily those which are established for the purpose of video hosting.
Any torrent index site, trackers, and the service providers which facilitate their operations.
Fakes - Brand Infringement
Replica stores and phishing sites which misrepresent their identity or products and infringe on brands and trademarks.
Notorious Service Providers
Offshore hosting, network, and proxy providers which do not comply with DMCA take-down requests.
The advertising platforms which specifically service infringing web sites and monetize DMCA violations.
shutdown campaign deliverables
Campaign deliverables can be customized to meet Rightsholder objectives and differ slightly based on the violator being targeted. The overall goal for any campaign is to permanently end the violations, and our deliverables are scaled in detail and complexity to meet this purpose. Typically, a campaign will include:
We expose and document every server, IP address, and location used to host the violators operations.
We catalog the service providers, including hosting companies, network providers, and CDN and proxy services.
We un-mask the real human identities of the violators.
Accurate, up-to-date physical locations, including human and infrastructure.
Enforcement strategy built upon the intelligence we gathered.
Advise, customize, or produce the demand letters used by law firms.
Start to finish coordination and management of the shutdown campaign.
We increase the pressure until the Rightsholder’s objectives are met.