Retailers and manufacturers are using teams of undercover agents to find products being sold on the Web illegally. On a typical night, some 20,000 violations are discovered.
Somewhere in Arizonathey insist that their exact location be kept secret so that e-commerce bandits wont recognize their addresssits a team of 18 Internet experts who hunt down people and companies that are either selling products illegally or are violating copyrights.
But the real work is done overnight, where a suite of homegrown applications crawls literally millions of Internet e-commerce locations, including Web sites, RSS feeds, Usenet newsgroups, private discussion groups (such as Yahoos), IRC chat rooms, mailing lists and spam.
Although financed by manufacturers (including JVC, Delphi, Pioneer, Kenwood, Alpine and Harmon) and being evaluated by a few retailers (including Circuit City and Best Buy), the effort is the project of a company called Net Enforcers, said company President Joe Loomis.
The company is searching for two kinds of problems: people or companies selling a particular vendors products who are not listed on that vendors list of authorized distributors, and anybody selling products at prices that the vendor considers suspiciously low.
What is a fraudsters worst retail fear? Ironically, its self-checkout. To read more, click here.
"For example, Best Buy is an authorized retailer of HP [Hewlett-Packard Co.] products, but it competes against every guy on eBay selling HP," Loomis said. Sometimes, illegal distributors will deliberately price merchandise super-lowat or near costbut then make their money on inflated shipping costs, he said.
That is a direct violation of a manufacturers MAP, or Minimum Advertised Pricing, rule.
But Loomis goal is not to find some small fry looking to make $10 on an inflated shipping charge. Hes looking for the sources behind them, either a truly authorized (for the moment, at least) reseller who is unloading merchandise to unauthorized channels (black market) or a much larger illegal mass distributor.
"We want the dealers instead of the pushers. But we have get to the pushers to get at the major dealers," he said. "We might effectively get rid of 15 [bad] Web sites by getting rid of one bad dealer."
So, how does Net Enforcers take the next step and find the evil distributors behind the small fry they catch? Retailer and manufacturer clients give them a budget that they use to purchase selected samples of the bad merchandise, and the rest is a matter of tracking serial numbers. A typical month might see between 100 and 200 products purchased, Loomis said. Dealers who cheat by the supply chain die by the supply chain.
What Net Enforcers does is rely on its homegrown software suitea lot of custom code sitting atop Microsoft SQL Server and open-source MySQLto run all night and spider its way through as many Internet places as it can, identifying any suspects.
Microsoft has rolled out the second beta of SQL Server. To read about what its in it, click here.
The software is called NetForce and was crafted from ColdFusion (for most of the interfaces) and a lot of Java (for the search spiders), said Adam Cohen, vice president for business development at Net Enforcers. It all runs on 20 Dell servers, running a combination of Windows 2000 and 2003 plus FreeBSD and Red Hat Linux.
After the spiders complete their data collection, the software assigns all discoveries a "threat level," which is pretty much the softwares statistical opinion of how likely it is that this suspect is truly doing bad things, Cohen said.
That software triage is essential because "on any given night, we literally see many tens of thousands" of suspect sites identified, Cohen said. But the software factors in prior discoveries, such as whether the identified site "is one weve flagged before 50 times."
Next Page: Those spiders are looking in most unusual places.