Given that Chinese counterfeiting has benefits as well as costs, and considering China's historical resistance to Western pressure, trying to push China to change its approach to intellectual property law is not worth the political and diplomatic capital the United States is spending on it.
Two controversial U.S. anti-piracy bills have spotlighted the growing challenge of how to protect intellectual copyrights, particularly across international borders, without compromising Internet freedom.
A critique of the U.S. Patent and Trademark Office's practice of denying patents for new financial services products unless they are connected to the "technological arts." The article shows that this restriction on patentability has no grounding in U.S. patent law or precedent and does little to address the larger and more important issue of dwindling patent quality.
Reforms of the U.S. patent system have made it too easy to obtain and defend patents and more costly to challenge patent decisions, thereby limiting the competition of ideas, discouraging innovation, and ultimately reducing U.S. competitiveness, argues a new Council Special Report.
U.S. trade is increasingly dependent on high-technology and innovation-intensive goods. Many companies share a reliance on innovation and export and, therefore, an interest in ensuring adequate intellectual property protection for their products worldwide. This report examiens the scourge of piracy, which affects the symbols of U.S. economic strength and greatest hope for the future--modern information-intensive industries.
The U.S. Department of Justice announced the indictment of five Chinese military hackers on May 19, 2014. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui were charged with computer hacking, economic espionage and other offenses directed at Americans in the nuclear power, metals, and solar products industries.
The Supreme Court ruled on June 13, 2013, that Myriad Genetics could not patent human genes they isolated from the bloodstream, because the company "did not create anything," but that synthetic forms of the genes may be eligible for patents.
The Commission on the Theft of American Intellectual Property (The IP Commission), with members from the "private sector and public service in national security and foreign affairs, academe, and politics," released its report on May 22, 2013. The Commission addresses theft by cyber means and pinpoints China as a main concern.
Representatives from U.S. Departments of Commerce, Defense, Homeland Security, Justice, State, Treasury, the Office of the Director of National Intelligence, and the Office of the United States Trade Representative collaborated to create this strategy, addressing threats to the intellectual property and innovation of the U.S. economy.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Koblentz argues that the United States should work with other nuclear-armed states to manage threats to nuclear stability in the near term and establish processes for multilateral arms control efforts over the longer term.
The authors argue that it is essential to begin working now to expand and establish rules and norms governing armed drones, thereby creating standards of behavior that other countries will be more likely to follow.
Learn more about CFR’s mission and its work over the past year in the 2014 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »