<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>White Bullet News and Updates</title>
    <link>https://www.white-bullet.com</link>
    <description>News, reports, updates and press associated with White Bullet Solutions Limited</description>
    <atom:link href="https://www.white-bullet.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>White Bullet News and Updates</title>
      <url>https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Asset+4.png</url>
      <link>https://www.white-bullet.com</link>
    </image>
    <item>
      <title>White Bullet’s piracy demonetising programmes drastically reduce ad revenues to piracy websites across Europe, analysis finds</title>
      <link>https://www.white-bullet.com/white-bullets-piracy-demonetising-programmes-drastically-reduce-ad-revenues-to-piracy-websites-across-europe-analysis-finds</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Analysis of White Bullet’s demonetisation programmes reveals that 5bn ad impressions were blocked from piracy websites in 2021
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Screenshot+2022-05-20+at+10.53.35.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The body content of your post goes here. To edit this text, click on it and delete this default text and start typing your own or paste your own from a different source.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Screenshot+2022-05-20+at+10.53.35.png" length="221581" type="image/png" />
      <pubDate>Fri, 20 May 2022 09:54:52 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/white-bullets-piracy-demonetising-programmes-drastically-reduce-ad-revenues-to-piracy-websites-across-europe-analysis-finds</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Screenshot+2022-05-20+at+10.53.35.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Screenshot+2022-05-20+at+10.53.35.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Publication by the European Commission of the study on the impact of the MoU on online advertising and intellectual property rights on the online advertising market - 2020 ad monitoring exercise</title>
      <link>https://www.white-bullet.com/publication-by-the-european-commission-of-the-study-on-the-impact-of-the-mou-on-online-advertising-and-intellectual-property-rights-on-the-online-advertising-market-2020-ad-monitoring-exercise</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The publication is now available to view on the European Commission’s website
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           London, UK 5th August 2021:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A large-scale study of the impact of a Memorandum of Understanding (MoU) on online advertising and intellectual property rights on the online advertising market has now been published by the European Commission.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           London, UK 5th August 2021:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A large-scale study of the impact of a Memorandum of Understanding (MoU) on online advertising and intellectual property rights on the online advertising market has now been published by the European Commission.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The European Commission facilitated a MoU on online advertising and intellectual property rights (IPR), which was signed in June 2018. This voluntary agreement between companies and associations from the advertising industry - including advertisers, intermediaries and interested stakeholders, such as IP right holders - seeks to minimise the placement of advertising on websites and mobile applications which infringe copyright or disseminate counterfeit goods by engaging cross-party stakeholders to collaborate and share best practice.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Following the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://op.europa.eu/en/publication-detail/-/publication/4d55743d-dd41-11ea-adf7-01aa75ed71a1/language-en" target="_blank"&gt;&#xD;
      
           first study
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            published in 2020, White Bullet was commissioned by the European Commission to conduct a study for 2020 to evaluate the estimated amount and type of online advertising on IP-infringing websites; to estimate the ad revenues collected by IP-infringing website owners; and to analyse the impact and effectiveness of the MoU on the online advertising market. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The report can now be viewed in full on the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://op.europa.eu/en/publication-detail/-/publication/5f7f9ed7-f0dd-11eb-a71c-01aa75ed71a1/language-en" target="_blank"&gt;&#xD;
      
           dedicated webpage
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            of the website of the Publications Office of the EU. More information is also available on the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://ec.europa.eu/growth/industry/policy/intellectual-property/enforcement/memorandum-of-understanding-online-advertising-ipr_en" target="_blank"&gt;&#xD;
      
           MoU webpage
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Peter Szyszko, Founder and CEO, White Bullet, comments:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We are delighted to provide data and analysis which sheds light on this fast-evolving and often underestimated threat. IP infringement in the EU has a significant impact on economies through lost jobs and tax revenue, impacting innovation and business. It also constitutes serious safety and security threats to consumers who could be targeted with fraudulent advertising, phishing attempts or the dissemination of malware.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s platform looks for IP-infringing content, examines each infringement's context, and determines structural violation on a commercial scale - providing accurate piracy risk scores based on this analysis. It detects piracy across multiple digital ecosystems, remaining up-to-date in real-time, and tracking that all-important advertising and financial impact - with AI and machine learning taking the strain. It has already stopped millions of pounds of ad spend from funding piracy. By connecting rights owners and the advertising industry with real-time data about piracy risk, so all parties can take action, White Bullet’s solutions allow clients to understand the universe of piracy and to stop it from generating revenue. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more information
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Peter Szyszko
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           peter.szyszko@white-bullet.com
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About White Bullet Solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Founded in 2013 by a leadership team of experienced Intellectual Property lawyers from the media and advertising industries, White Bullet offers companies piracy risk data and protection, brand safety solutions and full transparency on their advertising placement and digital supply chains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet works collaboratively with brands, policy makers and the advertising industry to safeguard advertising spend and prevent ad placements from appearing on IP Infringing domains and apps. White Bullet is a certified anti-piracy solutions provider under the advertising industry regulator TAG and is a stakeholder to the Memorandum of Understanding on online advertising and IPR.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet comprises IP experts and dedicated technical engineers who specialise in AI, big data models and predictive machine learning. The team includes highly skilled investigators and data analysts experienced in tackling the funding and distribution of pirated content.  With offices in London, New York and Los Angeles, White Bullet advises policy makers and government bodies on regulatory and compliance programmes globally.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           :
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/eu+commission+pic.PNG" length="180839" type="image/png" />
      <pubDate>Thu, 12 Aug 2021 14:38:30 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/publication-by-the-european-commission-of-the-study-on-the-impact-of-the-mou-on-online-advertising-and-intellectual-property-rights-on-the-online-advertising-market-2020-ad-monitoring-exercise</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/eu+commission+pic.PNG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/eu+commission+pic.PNG">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Advertising Fuels $1.34 Billion Illegal Piracy Market, Report by Digital Citizens Alliance and White Bullet Finds</title>
      <link>https://www.white-bullet.com/advertising-fuels-1-34-billion-illegal-piracy-market-report-by-digital-citizens-alliance-and-white-bullet-finds</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Amazon, Facebook, and Google are Among Recognizable Brands Funding Piracy Websites and Apps
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           WASHINGTON, DC, August 12, 2021 – Online criminals who offer stolen movies, TV shows, games, and live events through websites and apps are reaping $1.34 billion in annual advertising revenues – including from some of the most iconic global companies, according to new research from the Digital Citizens Alliance and White Bullet.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/Breaking-Bads-Report.pdf" target="_blank"&gt;&#xD;
      
           The report – Breaking (B)ads: How Advertiser-Supported Piracy Helps Fuel a Booming Multi-Billion Dollar Illegal Market
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            – details a year-long investigation into how brands and advertising intermediaries help support the operators of illegal piracy websites and apps through the placement of ads. Amazon, Facebook, and Google are among the most prominent companies found to fund piracy operators, even as these criminals offer risky advertising that exposes consumers to fraud and malware.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The combination of piracy, malware, and fraud poses significant risks to Internet safety. Consumers that say they visit pirate websites and apps are two- to three-times more likely to report an issue with malware than those that don’t visit these illicit websites and apps, according to a new research survey.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “For too long, online piracy has been treated as a nuisance and not the multi-billion dollar industry that baits consumers to expose them to fraud and malware, hurts the reputation of brands and the overall advertising ecosystem, harms creators, and poses new challenges for law enforcement,” said Tom Galvin, executive director of Digital Citizens. “It is time for Fortune 100 companies and the legitimate advertising industry to stop funneling tens of millions of dollars to criminals.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The research found that ads for Amazon, Facebook, and Google accounted for 73 percent of all major brands advertising that appeared frequently on piracy apps during the year investigation. However, there is a recent significant decline in Amazon ads showing up on piracy websites and apps. This demonstrates that the issue can be addressed when a brand makes it a priority.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “This report confirms the simple fact that digital advertising funds piracy,” said Peter Szyszko, founder and CEO of White Bullet. “Despite the alarming scale of the problem, today we are fully armed with AI technologies that can both track illegal activity and advance solutions. That underlying data is the evidence needed to drive action and change. We have already stopped millions in ad spend from funding piracy, reducing the profit of Intellectual Property crime, but clearly more has to be done. By connecting rights owners and the advertising industry with real-time data about piracy risk, all parties can take action.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The report details a lucrative and broad illicit ad-supported piracy industry that also poses malware and fraud risks to consumers, businesses and organizations - as well as the major brands themselves:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The top websites that offer stolen content generate $1.08 billion in global annual ad revenue. For the major players, it’s big business: the investigation found that the top five of these websites made an average of $18.3 million in revenue from advertising. Many of these websites are in a constant state of churn, meaning they are changing domains and redirecting to avoid enforcement and bypass advertising blocklists.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The top apps that offer stolen content generate $259 million in global annual ad revenue. Just as with websites, piracy apps and advertising can be quite lucrative: the top five of these apps made an average of $27.6 million in ad revenue. These apps remain a smaller piece of the piracy pie than websites, but they are growing at a more rapid pace.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The brands that place the most digital ads overall, which include many of the Fortune 500 companies (“Major Brands”), are among the key revenue sources for pirate operators. Due in large part to the proliferation of advertising on piracy apps, these Major Brands paid pirate operators roughly $100 million in the last year to advertise on their platforms. One in four ads on piracy apps is from well-known companies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The risks that piracy websites and apps pose to Internet users, businesses and organizations was reinforced by the research. White Bullet reviewed 664 billion ad impressions and found that roughly one in three piracy websites and apps have risky advertising that exposes consumers to fraud and malware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A follow-up research survey also reveals that recognizable companies face reputational risks with piracy. Two out of five Americans reported that they think less of these companies when they see brand advertising appear on piracy websites and apps, according to a July survey of 2,126 respondents. The research also found that Internet users reported that brand advertising make pirate websites and apps seem more credible.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA-Piracy-Poll.pdf" target="_blank"&gt;&#xD;
      
           The survey was conducted 7/28-7/29, 2021.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The full report can be found at:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/Breaking-Bads-Report.pdf" target="_blank"&gt;&#xD;
      
           https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/Breaking-Bads-Report.pdf
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more information, contact: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Josh Zecher,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:josh@vrge.us" target="_blank"&gt;&#xD;
      
           josh@vrge.us
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , 703.930.4941
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Kasey Long, Kasey@thedigitalvoice.co.uk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About Digital Citizens Alliance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Digital Citizens Alliance is a nonprofit, 501(c)(6) organization that is a consumer - oriented coalition focused on educating the public and policymakers on the threats that consumers face on the Internet. Digital Citizens wants to create a dialogue on the importance for Internet stakeholders— individuals, government, and industry—to make the Web a safer place. Based in Washington, DC, the Digital Citizens Alliance counts among its supporters: private citizens, the health, pharmaceutical, and creative industries as well as online safety experts and other communities focused on Internet safety. Visit us at 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.digitalcitizensalliance.org/" target="_blank"&gt;&#xD;
      
           www.digitalcitizensalliance.org
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About White Bullet Solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Founded in 2013 by a leadership team of experienced Intellectual Property lawyers from the media and advertising industries, White Bullet offers companies piracy risk data and protection, brand safety solutions, and full transparency on their advertising placement and digital supply chains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet works collaboratively with brands, policymakers, and the advertising industry to safeguard advertising spend and prevent ad placements from appearing on IP Infringing domains and apps. White Bullet is a certified anti-piracy solutions provider under the advertising industry regulator TAG and is a stakeholder to the EU Commission Memorandum of Understanding on Advertising and IPR.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet comprises IP experts and dedicated technical engineers who specialize in AI, big data models, and predictive machine learning. The team includes highly skilled investigators and data analysts experienced in tackling the funding and distribution of pirated content. With offices in London, New York, and Los Angeles, White Bullet advises policymakers and government bodies on regulatory and compliance programs globally.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Capture.PNG" length="89465" type="image/png" />
      <pubDate>Thu, 12 Aug 2021 13:43:01 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/advertising-fuels-1-34-billion-illegal-piracy-market-report-by-digital-citizens-alliance-and-white-bullet-finds</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/breaking+bad+image-76e8b070.PNG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Capture.PNG">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Premier League launches ‘Boot Out Piracy’ campaign in Hong Kong for a second year</title>
      <link>https://www.white-bullet.com/premier-league-launches-boot-outpiracy-campaign-in-hong-kong-for-asecond-year</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Campaign aims to raise awareness of the dangers of online piracy after research shows a majority of the pirate websites pose considerable risks
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Premier League today launches the second season of its ‘Boot Out Piracy’ campaign in Hong Kong to raise awareness of the dangers of viewing pirate content, as well as the compromised viewing experience offered by illegal streams.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The campaign highlights the risks that
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="null" target="_blank"&gt;&#xD;
      
           fans face by watching Premier League matches via unauthorised websites or streaming devices, including potential exposure to malicious malware or ransomware, which increases their risk of data theft and fraud. Their viewing experience is also likely to be disrupted by broken links, pop-up ads and delays.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The campaign will run across digital platforms, with content featuring some of the Premier League’s top players including Manchester United’s Marcus Rashford, Liverpool’s Mohamed Salah and Tottenham Hotspur’s Son Heung-Min. This is the second time the campaign will run in Hong Kong, having first launched at the start of the 2020/2021 season. Outside of Hong Kong, ‘Boot Out Piracy’ will also run in Malaysia, Indonesia and, for the first time, Singapore.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Premier League General Counsel Kevin Plumb said: “We are launching the ‘Boot Out Piracy’ campaign in Hong Kong for the second year in a row to continue building awareness of the risks involved in watching Premier League matches via illegal streams. We know these sites often contain malicious content and it is important passionate Hong Kong football fans realise that watching Premier League matches through these operators brings security risks and an unreliable viewing experience. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We are working together with our broadcast partners and local authorities in Hong Kong and throughout Asia to protect fans from accessing pirate sites so they can watch our matches in the best and safest way. Educating fans on the dangers of viewing pirated content is a core part of our anti-piracy programme as well as the significant legal actions we undertake such as blocking sites and the prosecution of sellers of illegal streaming devices.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           External research has shown a clear link between watching pirated content – including pirated Premier League content – and cybersecurity issues. According to research findings from intellectual property and data analytics company, White Bullet Solutions, 60 per cent of the most popular pirate websites in Hong Kong for illegally watching Premier League content carried advertisements considered risky, containing either fraud, malware, adult or gambling content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet Solutions founder and chief executive officer Peter Szyszko said: “It is important for people to understand that visiting pirate websites or using pirate apps will greatly increase the risk of falling victim to cybercrime. The type of malware and ransomware we find on pirate websites and apps can be very serious – visiting them can put at risk all sorts of personal or financial information. Our clear message to consumers would be to think twice before taking a big risk and searching for an illegal stream.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Raising awareness among fans of the risks posed by illegal streams is just one part of the Premier League’s comprehensive anti-piracy work in the region. Since the establishment of its Asia-Pacific office more than two years ago, the Premier League has initiated blocking action against illegal websites in Singapore, Malaysia, Indonesia, Vietnam and Thailand, and has worked closely with local authorities to bring criminal action against website operators and suppliers of illicit streaming devices across the region, including in Singapore, Malaysia, Thailand and Vietnam. The League is also a member of the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.casbaa.com/about-us/cap/" target="_blank"&gt;&#xD;
      
           Coalition Against Piracy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            which represents the creative industries across Asia-Pacific.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The ‘Boot Out Piracy’ campaign was developed with creative agency DDB Worldwide. In Hong Kong, the campaign is a collaboration between the Premier League and local broadcast partner, Now TV, the Pay TV Platform under PCCW Media Limited.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Derek Choi, Head of Pay TV, PCCW Media Limited said: “We are very supportive of the Premier League’s anti-piracy work in Hong Kong and the wider region. As the official broadcaster of the Premier League in Hong Kong, we are committed to providing Hong Kong’s community of passionate football fans with a high-quality viewing experience of all 380 Premier League matches on both Now TV and Now E OTT Platform, with selected matches available live in 4K too.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           - ENDS - 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Notes to editors 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Premier League’s anti-piracy programme
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Premier League has one of the most comprehensive anti-piracy programmes in the world, working with broadcast partners and authorities to bring down illegal streams and investigate and prosecute suppliers of illegal streaming services.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recent actions include forcing the world’s largest infringing streaming app Mobdro to cease all operations after a major investigation and criminal referral by the Premier League and the Alliance for Creativity and Entertainment (ACE) resulted in law enforcement action by Spanish police and Europol. Mobdro illegally made available a large catalogue of live TV and video content from around the world – including sports – for use on smart TVs, smartphones, tablets and illicit streaming devices. It was a very popular app across Asia-Pacific including in Hong Kong.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About the Premier League
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Premier League produces some of the most competitive and compelling football in the world. The League and its clubs use the power and popularity of the competition to inspire fans, communities, and partners in the UK and across the world. The Premier League brings people together from all backgrounds. It is a competition for everyone, everywhere and is available to watch in 880 million homes in 188 countries.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About White Bullet Solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="null" target="_blank"&gt;&#xD;
      
           Founded in 2013 by a leadership team of experienced Intellectual Property lawyers from the media and advertising industries, White Bullet offers companies IP risk protection, Brand Safety and full transparency on their advertising placement and digital supply chains.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet works collaboratively with brands, policy makers and the advertising industry to safeguard advertising spend and prevent ad placements from appearing on IP Infringing domains and apps. White Bullet is a Digital Advertising Assurance Provider under the TAG Certified Against Piracy Programme and is a stakeholder to the EU Commission Memorandum of Understanding on Advertising and IPR.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet comprises IP experts with dedicated technical engineers who specialise in AI, big data models and predictive machine learning. The team includes highly skilled investigators and data analysts experienced in tackling the trafficking and distribution of pirated and counterfeit goods. With offices in London, New York and Los Angeles, White Bullet advises policy makers and government bodies on regulatory and compliance programmes globally.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Media Queries Contact
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
             Georgina Mallory
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Sarah Sim
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              georgina.mallory@portland-communications.com
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            sarah.sim@portland-communications.com
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
               +65 9776 2783
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            +65 8817 0711
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Picture1.png" length="529599" type="image/png" />
      <pubDate>Wed, 11 Aug 2021 16:06:14 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/premier-league-launches-boot-outpiracy-campaign-in-hong-kong-for-asecond-year</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Picture1.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Picture1.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet and The European Lotteries announce partnership to fight piracy</title>
      <link>https://www.white-bullet.com/white-bullet-and-the-european-lotteries-announce-partnership-to-fight-piracy</link>
      <description>IP protection company White Bullet and The European Lotteries (EL), announce a collaboration to help fight ad-funded piracy.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    
          New Title
         &#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/European-Lotteries-Logo.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IP protection company White Bullet and The European Lotteries (EL), announce a collaboration to help fight ad-funded piracy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           White Bullet will track advertising on high-risk pirate websites for EL and provide reports throughout the year. By tracking advertising of EL’s Members and providing information about which websites ads appeared on, White Bullet will help EL’s Members to address any advertising related issues and fight piracy. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The European Lotteries (EL) is the European umbrella organisation of national lotteries operating games of chance, including sports betting, in more than 40 European countries. It is the European lottery and gambling sector’s largest and most representative organisation, and it believes in a high level of consumer protection and responsible gaming, whilst promoting a sustainable and sound gaming model for the benefit of society.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s platform looks for IP-infringing content, examines each infringement's context, and determines structural violation on a commercial scale - providing accurate piracy risk scores based on this analysis. It detects piracy across multiple digital ecosystems, remaining up-to-date in real-time, and tracking that all-important advertising and financial impact, with AI and machine learning taking the strain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We are delighted to support the European Lotteries as it helps to ensure a sustainable gaming model and to defund online piracy,”
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            says Peter Szyszko, Founder and CEO, White Bullet.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “EL plays an extremely important role within its sector and this partnership will help legitimate organisations to use and protect their IP.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Arjan van ’t Veer, Secretary General, The European Lotteries, adds: “
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are delighted to partner with White Bullet and have no doubt that its platform and expertise will help us to be successful in our mission to safeguard the interest of our Members and by doing so, protecting their players as well. Brand safety is of paramount importance to us and our Members as we continue to fight illegal offerings. By collaborating with White Bullet, EL  Members will have access to benchmark studies and will be able to maintain their high brand safety standards.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet has already stopped millions of pounds of ad spend from funding piracy by collaborating with brands, advertisers, regulators and rights owners. Its Intellectual Property Infringement Platform (IPIP) - designed to make the job of detecting fraudulent content easier - helps to take the profit out of Intellectual property crime. By connecting rights owners and the advertising industry with real-time data about piracy risk, so all parties can take action, White Bullet’s solutions allow clients to understand the universe of piracy and to stop it from generating revenue.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           For more information:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Peter Szyszko
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           peter.szyszko@white-bullet.com
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Lucy Lenaers – Mathieson
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Lucy.mathieson@european-lotteries.eu 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           About White Bullet Solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Founded in 2013 by a leadership team of experienced Intellectual Property lawyers from the media and advertising industries, White Bullet offers companies IP risk protection, Brand Safety and full transparency on their advertising placement and digital supply chains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet works collaboratively with brands, policy makers and the advertising industry to safeguard advertising spend and prevent ad placements from appearing on IP Infringing domains and apps. White Bullet is a Digital Advertising Assurance Provider under the TAG Certified Against Piracy Programme and is a stakeholder to the EU Commission Memorandum of Understanding on Advertising and IPR.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet comprises IP experts with dedicated technical engineers who specialise in AI, big data models and predictive machine learning. The team includes highly skilled investigators and data analysts experienced in tackling the trafficking and distribution of pirated and counterfeit goods.  With offices in London, New York and Los Angeles, White Bullet advises policy makers and government bodies on regulatory and compliance programmes globally.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About the European Lotteries (EL) 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            EL is the European umbrella organisation of national lotteries operating games of chance for the public benefit. EL has members from more than 40 European countries including all EU Member States. The EU members contribute more than 20 billion EUR p.a. to the state budgets and the funding of sport, culture, social projects, research and causes of general interest. Unlike many commercial online gambling operators, EL members only offer gambling and betting services in the jurisdictions in which they are licensed by the respective national government. Website:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.european-lotteries.org" target="_blank"&gt;&#xD;
      
           www.european-lotteries.org
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , Twitter
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://twitter.com/EuropeLotteries?lang=en" target="_blank"&gt;&#xD;
      
           @EuropeLotteries
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/the-european-lotteries/" target="_blank"&gt;&#xD;
      
           LinkedIn
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/lotteries.png" length="3084362" type="image/png" />
      <pubDate>Tue, 22 Jun 2021 11:28:14 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/white-bullet-and-the-european-lotteries-announce-partnership-to-fight-piracy</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/lotteries.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/lotteries.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet integrates with 4D to enable advertisers to tap into targeted inventory whilst protecting brand reputation</title>
      <link>https://www.white-bullet.com/white-bullet-integrates-with-4d-to-enable-advertisers-to-tap-into-targeted-inventory-whilst-protecting-brand-reputation</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The cybersecurity and IP protection company and the contextual outcomes engine join forces to deliver brand-safe advertising at scale
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/4D+logo.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity and IP protection expert, White Bullet, has integrated with leading self-service contextual outcomes engine, 4D, a division of Silverbullet. The integration, which is now live in 4D, enables advertisers to benefit from targeted inventory at scale, whilst avoiding IP-infringement and preventing ads from going to pirate websites and apps.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Advertisers waste billions of dollars on illegal content and on IP-infringing sites. The partnership between Silverbullet and White Bullet empowers brands and agency marketers to gain transparency into their inventory and reduce the risk of wasting budget due to ads being run on websites promoting or enabling pirated content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4D is a next generation contextual outcomes engine which leverages proven methodologies to drive in-the-moment marketing and brand suitability for digital media buying, with this partnership uniting two companies dedicated to brand suitability for digital advertisers. It delivers products and services designed for the first-party data, post-cookie era; unlocking significant ROI for marketing investments. Through the application of best-in-class technology and expertise, it empowers marketing efforts, enabling brand-safe targeting to drive effective, in-the-moment marketing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           White Bullet offers services to make the job of detecting fraudulent content easier. It helps to combat traditional website piracy and emerging threats, with its IPIP platform leveraging AI and machine learning to uncover and assess IP-infringing content across multiple digital ecosystems. It harvests data from billions of websites and over 50 app stores worldwide, revealing the financial impact of this wide-scale, global problem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Peter Szyszko, CEO, White Bullet says: “With the cookieless era upon us and the increasing importance of first-party data and opt-in marketing approaches, this partnership with 4D, a division of Silverbullet, will enable organisations to drive in-the-moment advertising which - crucially - avoids IP infringing sites. Companies cannot afford to be wasting money on pirated content and by joining forces with 4D, together we are making in-the-moment, brand-safe marketing possible.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Silverbullet CSO and 4D co-founder, Umberto Torrielli, adds: “We are building the first of its kind contextual marketplace and our partnership with WhiteBullet is a big step towards our overall goal. In an industry in which brand equity is always at stake, partnering with White Bullet alleviates the concern of running on pirated content; a constant challenge for advertisers. Now, through the 4D Dimensions Marketplace, marketers can tap into data sources such as White Bullet to build contexts that will ensure brands are not unwillingly funding piracy and drive better performance and holistic outcomes through the 4D outcomes engine.” 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           For more information:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:peter.szyszko@white-bullet.com" target="_blank"&gt;&#xD;
      
           peter.szyszko@white-bullet.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           About White Bullet Solutions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Founded in 2012 by a leadership team of experienced Intellectual Property lawyers from the media and advertising industries, White Bullet offers companies IP risk protection, Brand Safety and full transparency on their advertising placement and digital supply chains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           White Bullet works collaboratively with brands, policy makers and the advertising industry to safeguard advertising spend and prevent ad placements from appearing on IP Infringing domains and apps. White Bullet is a Digital Advertising Assurance Provider under the TAG Certified Against Piracy Programme and is a stakeholder to the EU Commission Memorandum of Understanding on Advertising and IPR.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           White Bullet comprises IP experts with dedicated technical engineers who specialise in AI, big data models and predictive machine learning. The team includes highly skilled investigators and data analysts experienced in tackling the trafficking and distribution of pirated and counterfeit goods.  With offices in London, New York and Los Angeles, White Bullet advises policy makers and government bodies on regulatory and compliance programmes globally.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           About Silverbullet
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Silverbullet is the leading marketing transformation company that helps the world’s biggest brands to improve business outcomes. We reduce the friction across digital marketing, empowering better, faster and smarter marketing decisions. Founded in 2016, the company is headquartered in London, with a team of consultants, product experts, data scientists, and marketing engineers in Milan, Munich, Melbourne and New York.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://wearesilverbullet.com/" target="_blank"&gt;&#xD;
      
           https://wearesilverbullet.com/
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           About 4D: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4D is the leading contextual outcomes engine that enables clients to step into the post-cookie, first-party data future with confidence. We bring together the most advanced machine learning and AI technologies to help you reach your customers at the right place, right time, and in the right moment. 4D is a division of Silverbullet.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/White+Bullet+IP+crime.png" length="3718" type="image/png" />
      <pubDate>Wed, 16 Jun 2021 15:51:01 GMT</pubDate>
      <author>peter.szyszko@white-bullet.com (Peter Szyszko)</author>
      <guid>https://www.white-bullet.com/white-bullet-integrates-with-4d-to-enable-advertisers-to-tap-into-targeted-inventory-whilst-protecting-brand-reputation</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/White+Bullet+IP+crime.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/White+Bullet+IP+crime.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Partners with Peer39 to Help Defund Online Piracy</title>
      <link>https://www.white-bullet.com/white-bullet-partners-with-peer39-to-help-defund-online-piracy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Leading IP protection company White Bullet to enable advertisers to enjoy cutting-edge contextual targeting whilst continuing to deliver brand safe solution
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/Social+Graph+Images_2.jpg" alt="RTB piracy solution from White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Cybersecurity and IP protection company, White Bullet, today announces a partnership with Peer39, the leading global provider of pre-bid keyword, contextual, and brand safety solutions for modern marketers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Peer39’s Contextual Data Marketplace allows advertisers to explore and discover innovative data providers with scalable, cookie-free categories, and is accessible through all buying and selling platforms.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Meanwhile, White Bullet has already stopped millions of pounds of ad spend from funding piracy by collaborating with brands, advertisers, regulators and rights owners. Its recently launched Intellectual Property Infringement Platform (IPIP) – designed to make the job of detecting fraudulent content easier – helps to take the profit out of intellectual property crime. By connecting rights owners and the advertising industry with real-time data about piracy risk, White Bullet’s solutions allow clients to understand the universe of piracy and to stop it from generating revenue.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           This partnership, set within the rapidly shifting landscape of digital marketing, will mean that White Bullet and Peer39 can enable advertisers to reach their desired audiences with precision and scale, safely – unlocking the programmatic ecosystem and giving advertisers direct access to innovative cookie-free data sets from emerging contextual data providers. It will enable clients to elevate media performance whilst defunding pirated content, with White Bullet’s real-time data preventing ads served through Peer39’s integrated partners from going to pirate websites and apps.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           With Peer39 serving as the conduit for advertisers to access and utilise diverse contextual data sets, and White Bullet continuing its efforts to ensure that pirate content is defunded on an even larger scale, the partnership will go live in Q3.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Martech Series link to original post
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           :
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://martechseries.com/analytics/white-bullet-partners-with-peer39-to-help-defund-online-piracy/" target="_blank"&gt;&#xD;
      
                      
           https://martechseries.com/analytics/white-bullet-partners-with-peer39-to-help-defund-online-piracy/
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           “We are delighted to help advertisers reach their audiences in the moments that matter, whilst continuing to help defund online piracy,” says Peter Szyszko, Founder and CEO, White Bullet. “This is critical at a time when marketers are looking to explore cookie-free tactics, whilst moving to a modern, contextual approach. We all know that attention and alignment can dramatically increase ROI, yet the risks of pirated content remain – with unscrupulous players continuously attempting new tactics to undermine legitimate advertising and derail media spend into the pockets of criminals.”
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Alex White, Chief Operating Officer at Peer39 adds: “We are excited about this partnership. With our goal being to make a large market of cookie-free data sets accessible to all advertisers through all buying and selling platforms, we are also extending our core infrastructure and technology – the tools that allow us to process and understand 1.5 billion web pages per day – whilst enabling our marketplace partners to maintain their proprietary models and IP.”
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet’s platform looks for IP-infringing content, examines each infringement’s context, and determines structural violation on a commercial scale – providing accurate piracy risk scores. It detects piracy across multiple digital ecosystems, remaining up-to-date in real-time, and tracking that all-important financial impact, with AI and machine learning taking the strain.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/st-wb-2018-1920x1092.jpg" length="256878" type="image/jpeg" />
      <pubDate>Wed, 26 May 2021 14:36:07 GMT</pubDate>
      <guid>https://www.white-bullet.com/white-bullet-partners-with-peer39-to-help-defund-online-piracy</guid>
      <g-custom:tags type="string">Ad Supported Piracy,Digital Piracy,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/st-wb-2018-1920x1092.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/st-wb-2018-1920x1092.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet partners with World Intellectual Property Organisation (WIPO) to help Prevent Piracy</title>
      <link>https://www.white-bullet.com/white-bullet-partners-with-world-intellectual-property-organisation-wipo-to-help-prevent-piracy</link>
      <description>As a WIPO ALERT member, we are delighted to support this initiative to help defund online piracy,” says Peter Szyszko, Founder and CEO, White Bullet. “WIPO plays an important role by providing a policy forum to shape international IP rules for a changing world, as well as technical infrastructure to connect IP systems and share knowledge, to enable all countries to use IP for economic, social and cultural development.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Cybersecurity and IP protection company, White Bullet, has announced that it is now collaborating with the World Intellectual Property Organisation (WIPO) to help prevent ad-funded piracy.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/WIPO_Seals_WIPO+Alert_all-seals_FINAL-06.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           WIPO is the global forum for intellectual property (IP) services, policy, information and cooperation – a self-funding agency of the United Nations. Its mission is to lead the development of a balanced and effective international IP system that enables innovation and creativity for the benefit of all.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            (This PR release can be read in full:
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://martechseries.com/analytics/data-management-platforms/privacy-and-regulations/white-bullet-partners-world-intellectual-property-organisation-wipo-help-prevent-piracy/" target="_blank"&gt;&#xD;
      
                      
           Martech Series
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://lovelymobile.news/white-bullet-partners-with-world-intellectual-property-organisation-wipo-to-help-prevent-piracy/" target="_blank"&gt;&#xD;
      
                      
           Lovely Mobile News
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://techtodaynewspaper.com/white-bullet-partners-with-world-intellectual-property-organisation-wipo-to-help-prevent-piracy/" target="_blank"&gt;&#xD;
      
                      
           TechTodayNewspaper
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            and
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://brandsjournal.com/white-bullet-partners-with-world-intellectual-property-organisation-wipo-to-help-prevent-piracy/" target="_blank"&gt;&#xD;
      
                      
           BrandsJournal
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           )
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           “As a WIPO ALERT member, we are delighted to support this initiative to help defund online piracy,” says Peter Szyszko, Founder and CEO, White Bullet. “WIPO plays an important role by providing a policy forum to shape international IP rules for a changing world, as well as technical infrastructure to connect IP systems and share knowledge, to enable all countries to use IP for economic, social and cultural development.”
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet has already stopped millions of pounds of ad spend from funding piracy by collaborating with brands, advertisers, regulators and rights owners. Its recently launched Intellectual Property Infringement Platform (IPIP) – designed to make the job of detecting fraudulent content easier – helps to take the profit out of Intellectual property crime.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Meanwhile, WIPO ALERT is a secure, online platform to which authorised bodies in WIPO member states can upload details of websites or apps which have been determined to infringe copyright according to national rules. Combined with the millions of infringing web and app pages tracked by White Bullet, partners can be assured of security when blocking ads to pirate services.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           By connecting rights owners and the advertising industry with real-time data about piracy risk, so all parties can take action, White Bullet’s solutions allow clients to understand the universe of piracy and to stop it from generating revenue.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet’s platform looks for IP-infringing content, examines each infringement’s context, and determines structural violation on a commercial scale – providing accurate piracy risk scores based on this analysis. It detects piracy across multiple digital ecosystems, remaining up-to-date in real-time, and tracking that all-important financial impact. AI and machine learning takes the strain.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg" length="237524" type="image/jpeg" />
      <pubDate>Wed, 05 May 2021 14:32:22 GMT</pubDate>
      <guid>https://www.white-bullet.com/white-bullet-partners-with-world-intellectual-property-organisation-wipo-to-help-prevent-piracy</guid>
      <g-custom:tags type="string">Ad Supported Piracy,Digital Piracy,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Streaming pirates and broadcasters have a lot in common – with one big difference</title>
      <link>https://www.white-bullet.com/streaming-pirates-and-broadcasters-have-a-lot-in-common-with-one-big-difference</link>
      <description>Crime pays, but it does so with money that, in the proper hands, could have done a lot of good. We might never entirely stop it, but we can all stop supporting it, and some of us will keep on doing our best to fight it.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Contrary to the popular saying, crime does sometimes pay.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Based on our own research, the top pirate web domains – the ones people turn to when they don’t want to pay to watch the football, the boxing, the new Hollywood film – earn around $7 million in ad revenue annually.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So there’s money in crime, but that doesn’t mean crime is necessarily easy. Just like legitimate operators, pirates have a business to run, and it’s clear they are committed to their work. They hook their sites up to programmatic ad channels to generate revenue. They promote their product through search and social media – building a brand, acquiring an audience. Some even sell subscriptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Then there is the more technical side: they develop apps, create mirror sites to evade blocking orders, and constantly obscure and relaunch their activities to stay ahead of the authorities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In other words, give or take a few wrong-side-of-the-law contingencies, pirates have a lot of the same operational challenges as legal broadcasters, and many of the same tools at their disposal to market and monetise their channels. You might almost admire their style.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But the glaring difference between the legitimate broadcasters and the illegal streaming companies is that the outlaws don’t pay a penny for the content they distribute. That’s a big item off the balance sheet, and it’s the reason why they thrive, and why their success does so much harm. When you are stealing and re-selling someone else’s product, fees, royalties and regulation don’t mean a great deal to you.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Given the popularity of illegal streaming, it’s tempting to conclude that those things don’t mean a great deal to many viewers either. What could we possibly steal from the billionaire football clubs, the multi-millionaire promoters and the broadcasting conglomerates that they couldn’t afford to lose?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But the fact is, IP doesn’t only benefit the rich. It bankrolls the creation of all sport, all art, and pays both big salaries and small ones. The criminal operators who siphon off their own ill-gotten share of the proceeds may look like Robin Hood figures, liberating content from the hands of those who would charge for it, but they owe their entire existence to the legitimate channels whose content they are hijacking.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It’s
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/feed/hashtag/?keywords=worldipday" target="_blank"&gt;&#xD;
      
           World Intellectual Property Day
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today (April 26), shining an annual light on the role intellectual property plays in the global economy and the work it does in protecting the interests of customers, culture, SMEs – even the environment and indigenous communities. If nothing else, it offers a reminder of how broad the benefits of IP actually are.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Perhaps it’s too much to expect a fan streaming a Champions League match to think very hard about the economy such activities disrupt at all levels. But like the recent European Super League proposal so many fans hated, this kind of IP infringement reduces the amount of money that trickles down through sport to smaller teams and grass-roots initiatives. And like the football agents of whom so many disapprove, it drains enormous sums from the game without conspicuously putting anything in.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           And that’s just football. The unfortunate fact is, all industries show a similar pattern of revenue disruption when pirates get their claws in.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As a company that devotes huge time and expertise to tracking and monitoring the ever-shifting sprawl of copyright-infringing content on the internet, we get to see it for what it is: a systematic criminal enterprise that leeches vast, quantifiable sums from IP owners all over the world, and the industries, wages and ongoing innovations that depend on them. The fact that these pirates are organised, even professional, shouldn’t obscure their negative impact.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So, on behalf of rights owners, authorities and right-thinking companies in the ad chain, we continue to work to attack the basis of their business, de-indexing pirates from search engines, demonetising them by cutting off their ad supply. And because we survey the entire landscape, we can do much of this in real time, cutting the revenue lines and marketing channels on which they depend, often within hours of detecting illegal activity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Crime pays, but it does so with money that, in the proper hands, could have done a lot of good. We might never entirely stop it, but we can all stop supporting it, and some of us will keep on doing our best to fight it.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/photo-1569025708622-8c9c95a090f1-147b8f71.jpg" length="1969796" type="image/png" />
      <pubDate>Tue, 27 Apr 2021 13:40:35 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/streaming-pirates-and-broadcasters-have-a-lot-in-common-with-one-big-difference</guid>
      <g-custom:tags type="string">Ad Supported Piracy,Programmatic Advertising,Advertising Networks,Digital Piracy,IPIP,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1569025708622-8c9c95a090f1.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/aaf260d6/dms3rep/multi/photo-1569025708622-8c9c95a090f1-147b8f71.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Real-Time Piracy Enforcement: The Answer to Sports Broadcasters’ Vengeful Prayers</title>
      <link>https://www.white-bullet.com/real-time-piracy-enforcement-the-answer-to-sports-broadcasters-vengeful-prayers</link>
      <description>On behalf of broadcasters, we can tackle a real-time pirate event on two fronts, through a strategy of demonetization and de-indexing that uses all the intelligence we pick up from watching the pirates come and go.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The window of opportunity in elite sport is incredibly narrow, in every sense: careers are short; entire matches turn on split-second incidents; and mass content piracy surges up around a particular event and then disappears again like smoke.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Those first two facts of sporting life, however cruel, are part of the fabric of any game. But the third – the everyday household piracy that drains vast subscription, pay-per-view and advertising revenue from professional sport – is a blight on the business, and it is something we can tackle.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Time, of course, is of the essence. Every time a sporting event takes place that is worthy of being broadcast, there is an online smash and grab. One or many pirate sites prepare to pirate the stream; they publicize it via sites such as Reddit from around 48 hours ahead and share the spectacle in real-time with many thousands of people.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Then it all vanishes until the next time – ghost sites that materialize for the duration of the match and then evaporate, or sometimes shape-shift back into apparently respectable domains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Like so much on the internet, this activity imagines it is covert, but it actually takes place in plain sight – if you know where to look. A company like ours is able to monitor these pirate feeds: we know where they are, how many people are watching them, who operates them and how they make their money – usually through programmatic advertising, typically from careless legitimate brands whose ads have washed up on the internet’s wilder shores.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In their vengeful fantasies, broadcasters picture themselves simply cutting these streams dead, turning off the spectacle in mid-flow. It seems like a tall order – pirates are clever, and the internet is less controllable than that – but it is an increasingly realistic prospect.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On behalf of broadcasters, we can tackle a real-time pirate event on two fronts, through a strategy of demonetization and de-indexing that uses all the intelligence we pick up from watching the pirates come and go.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://aithority.com/technology/martech/real-time-piracy-enforcement-the-answer-to-sports-broadcasters-vengeful-prayers/" target="_blank"&gt;&#xD;
      
           AIAuthority
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1597649475360-955f18d9d277.jpg" length="95471" type="image/jpeg" />
      <pubDate>Mon, 15 Mar 2021 10:12:30 GMT</pubDate>
      <guid>https://www.white-bullet.com/real-time-piracy-enforcement-the-answer-to-sports-broadcasters-vengeful-prayers</guid>
      <g-custom:tags type="string">Sport Piracy,Ad Supported Piracy,Programmatic Advertising,Streaming Piracy,Advertising Networks,Digital Piracy,IPIP,Brand Safety,Press,Stream Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1597649475360-955f18d9d277.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/unsplash/dms3rep/multi/photo-1597649475360-955f18d9d277.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why brands must wake up to the evolving world of online piracy</title>
      <link>https://www.white-bullet.com/why-brands-must-wake-up-to-the-evolving-world-of-online-piracy</link>
      <description>Digital piracy is now happening on a scale like never before.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.marketingdonut.co.uk/blog/21/02/why-brands-must-wake-up-to-evolving-world-of-online-piracy" target="_blank"&gt;&#xD;
      
           Marketing Donut
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Digital piracy is now happening on a scale like never before.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With close to a billion dollars in advertising revenue found to be going to pirate websites each year, brand marketers need to understand the risk of associating with piracy and get wise to the tactics used by these online fraudsters.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ads from household-name brands are alarmingly common on pirate websites, pouring millions of dollars into this illegal ecosystem. On top of this, premium brands are increasingly advertising with pirate mobile platforms, including over-the-top media streaming (OTT) and connected TV. Ads from premium brands are up to four times more prevalent in the mobile space.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1468436139062-f60a71c5c892.jpg" length="149770" type="image/jpeg" />
      <pubDate>Fri, 12 Mar 2021 10:23:17 GMT</pubDate>
      <guid>https://www.white-bullet.com/why-brands-must-wake-up-to-the-evolving-world-of-online-piracy</guid>
      <g-custom:tags type="string">Ad Supported Piracy,Programmatic Advertising,Advertising Networks,Digital Piracy,IPIP,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1468436139062-f60a71c5c892.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1468436139062-f60a71c5c892.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Over 3000 Brands Protected by White Bullet’s Newly Launched Platform</title>
      <link>https://www.white-bullet.com/over-3000-brands-protected-by-white-bullets-newly-launched-platform</link>
      <description>This represents the first time that the industry can put aside static lists of pirate websites. The web does not stand still, and neither do pirates. But now it is easier than ever to locate them and stop them in their tracks.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://martechseries.com/video/brand-safety/3000-brands-protected-white-bullets-newly-launched-platform/" target="_blank"&gt;&#xD;
      
           Martech Series
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Take-up of the new solution IPIP reflects the fact that dynamic piracy detection remains an urgent issue for brands and rights owners
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet announces that it has already helped to stop 44 million dollars of ad spend from funding online piracy by collaborating with brands, advertisers, regulators and rights owners. Its recently launched Intellectual Property Infringement Platform (IPIP) – designed to make the job of detecting digital piracy more straightforward – is now being used by clients such as the City of London Police, Hollywood studios and real-time bidding advertising platforms.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/lala-azizli-qANvvc543Tg-unsplash.jpg" length="147084" type="image/jpeg" />
      <pubDate>Fri, 19 Feb 2021 11:36:39 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/over-3000-brands-protected-by-white-bullets-newly-launched-platform</guid>
      <g-custom:tags type="string">Sport Piracy,Ad Supported Piracy,Programmatic Advertising,Streaming Piracy,Advertising Networks,Digital Piracy,IPIP,Brand Safety,Press,Stream Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/lala-azizli-qANvvc543Tg-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/lala-azizli-qANvvc543Tg-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Launches Intellectual Property Infringement Platform to Help Combat Piracy</title>
      <link>https://www.white-bullet.com/white-bullet-launches-intellectual-property-infringement-platform-to-help-combat-piracy</link>
      <description>For the first time, IPIP’s users can track the financial impact of their efforts against piracy by viewing the revenues held back from pirate services. This combines with popularity and live status updates of domains and applications with which users have engaged.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.exchangewire.com/blog/2020/12/15/white-bullet-launches-intellectual-property-infringement-platform-to-help-combat-piracy/" target="_blank"&gt;&#xD;
      
           ExchangeWire
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet has already stopped millions of dollars of ad spend from funding piracy by collaborating with brands, advertisers, regulators and rights owners. It has now launched the Intellectual Property Infringement Platform (IPIP) as its flagship anti-piracy service, designed to make the job of detecting fraudulent content easier.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Peter Szyszko, CEO, White Bullet, explains: “IPIP is a tool that can be used by regulators and online intermediaries as well as IP rights owners. Companies in the programmatic ad supply chain can now seamlessly filter out infringing publishers by deciding piracy thresholds and drawing real-time data from IPIP via their APIs.
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.exchangewire.com/blog/2020/12/15/white-bullet-launches-intellectual-property-infringement-platform-to-help-combat-piracy/" target="_blank"&gt;&#xD;
      
           ExchangeWire
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/whiteBULLET-Client-UI+%281%29.png" length="86310" type="image/png" />
      <pubDate>Fri, 01 Jan 2021 11:26:07 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-launches-intellectual-property-infringement-platform-to-help-combat-piracy</guid>
      <g-custom:tags type="string">Sport Piracy,Ad Supported Piracy,Programmatic Advertising,Streaming Piracy,Free Sports Streaming,Advertising Networks,Digital Piracy,IPIP,Press,Stream Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/whiteBULLET-Client-UI+%281%29.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/whiteBULLET-Client-UI+%281%29.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Ad Disruption is the Key to Disrupting the Mother of all Black Markets</title>
      <link>https://www.white-bullet.com/ad-disruption-is-the-key-to-disrupting-the-mother-of-all-black-markets</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/profile/the-digital-voice/news/ad-disruption-is-the-key-to-disrupting-the-mother-of-all-black-markets"&gt;&#xD;
      
           The Drum
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Live sport is the mother of all black markets, accounting for thousands of highly illegal but user-friendly domains and apps worldwide - some of them offered on a subscription basis, but very many moving stealthily towards a revenue model driven by big-brand advertising.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Western sports leagues, whose content is in particularly great demand all over the world, wrestle constantly with the global appeal of their pirated content. Given the boom in live streaming through mobile devices, app piracy is the growing threat. So content owners’ understandable impulse is to identify the apps infringing their copyrights and insist the relevant app stores take them down. Problem solved.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/profile/the-digital-voice/news/ad-disruption-is-the-key-to-disrupting-the-mother-of-all-black-markets"&gt;&#xD;
      
           The Drum
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_56716934.jpeg" length="185687" type="image/jpeg" />
      <pubDate>Mon, 23 Nov 2020 10:20:11 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/ad-disruption-is-the-key-to-disrupting-the-mother-of-all-black-markets</guid>
      <g-custom:tags type="string">Sport Piracy,Ad Supported Piracy,Programmatic Advertising,Streaming Piracy,Free Football Streams,Free Sports Streaming,Advertising Networks,Digital Piracy,Press,Stream Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_56716934.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_56716934.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How ads fund football piracy</title>
      <link>https://www.white-bullet.com/how-ads-fund-football-piracy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/news/2020/10/07/how-ads-fund-football-piracy-and-how-counter-it"&gt;&#xD;
      
           The Drum
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How ads fund football piracy – and how to counter it
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Widespread football piracy threatens the business of football – the role of advertisers in fuelling piracy has gone unexamined. The Drum looks at how football piracy is kept alive, and what can be done to tame it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Football piracy is rife. A third of adult English Premier League (EPL) fans (and two thirds of young ones) say they watch an illegal football stream at least once a month; you'd fill Wembley Stadium (capacity 90,000) around 79 times with the average pirate audience of an EPL game. Meanwhile, some games are being leaked as part of a geopolitical proxy war. And illegal streaming will continue as long as advertisers continue paying for pirate attention.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/news/2020/10/07/how-ads-fund-football-piracy-and-how-counter-it"&gt;&#xD;
      
           The Drum
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1560272564-c83b66b1ad12-e8af5aa9.jpg" length="4572429" type="image/png" />
      <pubDate>Thu, 08 Oct 2020 14:21:39 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/how-ads-fund-football-piracy</guid>
      <g-custom:tags type="string">Sport Piracy,Ad Supported Piracy,Programmatic Advertising,Streaming Piracy,Free Football Streams,Free Sports Streaming,Advertising Networks,Digital Piracy,Press,Stream Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1560272564-c83b66b1ad12.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1560272564-c83b66b1ad12-e8af5aa9.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>In-housing programmatic? Don’t forget about internet safety</title>
      <link>https://www.white-bullet.com/in-housing-programmatic-dont-forget-about-internet-safety</link>
      <description>Online advertisers that do not monitor their digital supply chains for unsafe sites and ad misplacement not only risk PR damage, they also unwittingly fund the criminal and fraudulent enterprises behind those sites.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.adhugger.net/2020/10/05/peter-szyszko-white-bullet-in-housing-programmatic-dont-forget-about-internet-safety/"&gt;&#xD;
      
           Adhugger
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Content piracy, and the ads that fund it, should be a major issue for brands taking digital advertising in-house. When advertising goes astray, it can bankroll organised crime, tarnish a brand, even bring the police to the door.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In-housing the buying and planning of programmatic advertising has been among the top priorities for many brands over the past year or two, says Peter Szyszko, founder and CEO White Bullet.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the full post @
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.adhugger.net/2020/10/05/peter-szyszko-white-bullet-in-housing-programmatic-dont-forget-about-internet-safety/"&gt;&#xD;
      
           Adhugger
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_279957470.jpeg" length="231836" type="image/jpeg" />
      <pubDate>Wed, 07 Oct 2020 08:55:31 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/in-housing-programmatic-dont-forget-about-internet-safety</guid>
      <g-custom:tags type="string">Brand Reputation,Ad Supported Piracy,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_279957470.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_279957470.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Pirate apps funded by brand advertising</title>
      <link>https://www.white-bullet.com/pirate-apps-funded-by-brand-advertising</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1480694313141-fce5e697ee25.jpg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           On mobile and other connected devices, legitimate applications are critical to the success of IP rights owners and streamed content companies across the world. They allow for an unprecedented level of flexibility as well as higher resolutions and better interactivity than that offered by even smart TV.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           But streamed in-app content piracy is already a huge problem. As we’ve seen, for anyone with the will to do so, pirate apps are very easy to get hold of, their stolen content invariably funded by unsuspecting advertisers who assume their programmatic ads are going to law-abiding, IP-respecting publishers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Read the full article over at
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://mobilemarketingmagazine.com/the-piracy-that-lurks-in-the-app-stores"&gt;&#xD;
      
                      
           Mobile Marketing Magazine
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Connect with us on LinkedIn.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/whitebullet-solutions-limited"&gt;&#xD;
      
                      
           https://www.linkedin.com/company/whitebullet-solutions-limited
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1480694313141-fce5e697ee25.jpg" length="160154" type="image/jpeg" />
      <pubDate>Tue, 29 Sep 2020 13:52:01 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/pirate-apps-funded-by-brand-advertising</guid>
      <g-custom:tags type="string">Brand Reputation,Mobile Advertising,Advertising Networks,Digital Piracy,Mobile,Apps,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1480694313141-fce5e697ee25.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1480694313141-fce5e697ee25.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Piracy in your pocket – the brave new world of in-app content</title>
      <link>https://www.white-bullet.com/piracy-in-your-pocket-the-brave-new-world-of-in-app-content</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1567581935884-3349723552ca-54bf0b32.jpg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Read the full post @
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://mobilemarketingmagazine.com/piracy-in-your-pocket-the-brave-new-world-of-in-app-content"&gt;&#xD;
      
                      
           Mobile Marketing Magazine
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Peter Szyszko, Founder and CEO of White Bullet, says that with ads from big-name brands regularly detected in apps carrying pirated sport and entertainment content, brands need to keep a close eye on exactly where their in-app ads appear.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Digital technology is invariably sold to us as a clean, gleaming thing. Look at our phones, our smart TVs, our set-top gadgets and premium content hubs. What could be shinier or more reassuring?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           But as a technology and data analytics company that tracks the astonishingly dynamic online piracy landscape, we see a far dirtier side of digital, characterised by stolen content, dodgy sites, big-time fraud and the pervasive influence of organised crime.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Read the full post @
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://mobilemarketingmagazine.com/piracy-in-your-pocket-the-brave-new-world-of-in-app-content" target="_blank"&gt;&#xD;
      
                      
           Mobile Marketing Magazine
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1567581935884-3349723552ca.jpg" length="71011" type="image/jpeg" />
      <pubDate>Thu, 10 Sep 2020 16:36:24 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/piracy-in-your-pocket-the-brave-new-world-of-in-app-content</guid>
      <g-custom:tags type="string">Brand Reputation,Programmatic Advertising,Advertising Networks,Digital Piracy,Mobile,Apps,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1567581935884-3349723552ca.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1567581935884-3349723552ca.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why brand safety requires human and technological investment</title>
      <link>https://www.white-bullet.com/why-brand-safety-requires-human-and-technological-investment</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_254086175.jpeg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            By Peter Szyszko, CEO at
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
                      
           White Bullet Solutions
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            - Read the full post @
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://newdigitalage.co/2020/08/27/why-brand-safety-requires-human-and-technological-investment/" target="_blank"&gt;&#xD;
      
                      
           New Digital Age
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The great thing about AI is that it tackles issues on a scale that lies beyond human capability. Certainly, mere mortals cannot detect, nor stop, the millions of pirate web pages created daily nor the billions of ads funding them.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           This growing problem sits at the intersection of IP protection, brand safety and advertising transparency – and it can only be tackled using AI.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           This is why our company has developed solutions using machine learning so we can address a global problem, assess billions of data points simultaneously and rapidly scale. We have brought on board a new team of machine learning experts in recent months to grow even faster. The fact is, highly dynamic pirated digital content is created at tremendous scale and funded by algorithms serving ads as fast as visitors load web pages. So unless you have a global army of people, AI needs to play its part.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Read the full post @
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://newdigitalage.co/2020/08/27/why-brand-safety-requires-human-and-technological-investment/"&gt;&#xD;
      
                      
           New Digital Age
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_254086175.jpeg" length="140633" type="image/jpeg" />
      <pubDate>Tue, 08 Sep 2020 16:09:53 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/why-brand-safety-requires-human-and-technological-investment</guid>
      <g-custom:tags type="string">Brand Reputation,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_254086175.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_254086175.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Ad-Supported Piracy Is Thriving, Thanks To Programmatic Ad Tech</title>
      <link>https://www.white-bullet.com/ad-supported-piracy-is-thriving-thanks-to-programmatic-ad-tech</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash-3c3a6729.jpg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Original article posted on
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.forbes.com/sites/augustinefou/2020/09/02/ad-supported-piracy-is-thriving-thanks-to-programmatic-ad-tech/#25edc5fa8cab"&gt;&#xD;
      
                      
           Forbes
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           "Thanks to programmatic ad tech, piracy sites are thriving and making more ad revenue than ever before. In 2013, this study from Digital Citizens Alliance documented that “Piracy Websites Roped In $227 Million in Ad Revenues.” That was right before programmatic ad exchanges took off in earnest; and digital ad spending in the U.S. was only $43 billion. Since that time, digital ad spend has tripled to $125 billion in 2020 and piracy sites are more easily able to scale their revenue operations. Programmatic ad tech automated the buying and selling of digital ads across vast numbers of sites; it also enabled a larger variety of advertisers to buy and place ads. This means piracy sites are now able to sell even more ad impressions to more unsuspecting advertisers."
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             ﻿
            
                        &#xD;
        &lt;/span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            Read the full article
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.forbes.com/sites/augustinefou/2020/09/02/ad-supported-piracy-is-thriving-thanks-to-programmatic-ad-tech/#25edc5fa8cab"&gt;&#xD;
      
                      
           here on Forbes
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg" length="230571" type="image/jpeg" />
      <pubDate>Thu, 03 Sep 2020 14:50:46 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/ad-supported-piracy-is-thriving-thanks-to-programmatic-ad-tech</guid>
      <g-custom:tags type="string">Brand Reputation,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Don’t let internet safety sink your in-house programmatic ambitions</title>
      <link>https://www.white-bullet.com/dont-let-internet-safety-sink-your-in-house-programmatic-ambitions</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_313223377.jpeg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           In-housing programmatic has been among the top priorities for many brands over the past 12 months, and the trend is still quietly gaining traction.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://go.forrester.com/blogs/predictions-2020-marketing-strategy/"&gt;&#xD;
      
                      
           Forrester
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            has predicted that in 2020, a third of in-house agencies will include media operations that control large amounts of their paid media budget. Why do it? For the savings; for transparency and peace of mind in a time of dwindling client-agency trust; for the sake of data control and integration of marketing and advertising.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Many of the
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/opinion/2019/09/06/should-brands-house-programmatic"&gt;&#xD;
      
                      
           challenges of going in-house
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            are widely known - building the team, the platform, the strategy, the data governance. But we need to add another less-mentioned deal-breaker that all brands should bear in mind: the challenge of advertising safely online. We’ll break down what in-housers need, in three steps:
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A dynamic list of IP-infringing, age-inappropriate and sexually explicit websites and publishers. This is to filter inventory and keep ads away from risky websites. Note the ‘dynamic’ part. Static lists won’t help, because these guys move around constantly to intercept your ad budgets.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A post-bid monitoring solution. See where ads landed and establish which partner, affiliate or agent was responsible.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Complementary brand safety tools for ad partners. Most brands aren’t going to be fully in-house. They need their partners to be taking the same precautions that they are.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            These are major issues for brands taking digital advertising in-house. When advertising goes astray, it can fund crime, tarnish a brand, even bring the police to the door. Linguistic brand-safety tools aren’t enough to keep you safe.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           Talk to White Bullet
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            about how to build online defences that really work.
            
                        &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_313223377.jpeg" length="150240" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 14:16:48 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/dont-let-internet-safety-sink-your-in-house-programmatic-ambitions</guid>
      <g-custom:tags type="string">Brand Reputation,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_313223377.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_313223377.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet's programme with the EU Commission is moving the dial to success.</title>
      <link>https://www.white-bullet.com/our-programme-with-the-eu-commission-is-moving-the-dial-to-success</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/White+Bullet+IP+Infinging+ads.jpg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Lessons learned from a year of working with the
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           EU Commission under the Memorandum of Understanding on Online Advertising and Intellectual Property Rights on the Online Advertising Market
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           The MOU (
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://ec.europa.eu/growth/industry/policy/intellectual-property/enforcement/memorandum-of-understanding-online-advertising-ipr_en" target="_blank"&gt;&#xD;
      
                      
           signed in 2018
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ) marked a rare opportunity to build a cooperation program between advertising intermediaries, advertisers, technology providers, and industry associations to prevent ad placement on IP infringing websites and apps.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            Ads placed on IP infringing websites and apps
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           directly fund piracy
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The issue is something that brands should be acutely aware of as often their advertisers and supply chain partners are a big part of the problem.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Misplaced Ads:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             Give unwarranted credibility to pirate and IP infringing websites and apps - this confuses
            
                        &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            consumers
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            , who may mistakenly believe that such websites or apps provide access to legal content, goods or services, and erodes their confidence.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Damage the reputation of legitimate
           
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
            brands
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            , which are often unaware of where their ads end up.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Damage the status, and undermine the value of, the
           
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
            advertising
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             industry.
            
                        &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The first year of this ongoing programme, targeted at brands and advertisers operating in the EU, has already seen success.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Our data shows there was a substantial decrease in the proportion of ads collected from premium household name brands (Major Brands) that are based or headquartered in the EU, falling from 93% to 75% in the first six months of 2019.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           As the process evolves and expands, we are continuing to see positive results in our piracy landscape analytics. All thanks to the changing habits of advertisers, brands and those intermediaries in the supply chain that are on board with us and taking advantage of our AI-driven IP infringement focused technology.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           We are delivering transparency and shedding light on the complexity of the piracy landscape, thus allowing regulation and compliance efforts around IP infringement to become more productive. 
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           However, to get the most significant impact, more intermediaries and stakeholders need to get on board. It's a considerable effort and a multi-targeted "clean up" job that needs breadth and support to succeed to its full potential.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           What the EU Commission has put together is laudable, it is working, and we are proud to be able to support as a technology partner.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           We hope that governments around the world are taking note of the success of the EU Commission's programme so far. What works here can work anywhere.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            The
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://op.europa.eu/en/publication-detail/-/publication/4d55743d-dd41-11ea-adf7-01aa75ed71a1/language-en" target="_blank"&gt;&#xD;
      
                      
           2019 Study
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            on the Impact of the Memorandum of Understanding on Online Advertising and Intellectual Property Rights on the Online Advertising Market is now available and free to download.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            For more information about White Bullet's work, our technology, the study and the MOU, please
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           contact us
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/White+Bullet+IP+Infinging+ads.jpg" length="72359" type="image/jpeg" />
      <pubDate>Mon, 24 Aug 2020 10:54:58 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/our-programme-with-the-eu-commission-is-moving-the-dial-to-success</guid>
      <g-custom:tags type="string">Brand Reputation,CTV,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,OTT</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/White+Bullet+IP+Infinging+ads.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/White+Bullet+IP+Infinging+ads.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet works with the EU Commission to produce study</title>
      <link>https://www.white-bullet.com/white-bullet-works-with-the-eu-commission-to-produce-study</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_99000821.jpeg" alt="White Bullet"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            White Bullet is proud to have worked with the EU Commission to produce the
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           2019
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Study on the Impact of the Memorandum of Understanding on Online Advertising and Intellectual Property Rights on the Online Advertising Market
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           The MOU (signed in 2018) seeks to build cooperation between advertising intermediaries, advertisers, technology providers and industry associations to prevent ads being placed on IP infringing websites and apps.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Digital advertising:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Gives undue credibility to such websites and apps - this confuses consumers, who may mistakenly believe that such websites or apps provide access to legal content, goods or services, and erodes their confidence.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Damages the reputation of legitimate brands, which are often unaware of where their ads end up.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Damages the reputation, and undermines the value of, the advertising industry.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           The first year of this ongoing programme has already seen traction, with engagement from a range of stakeholders. As this program evolves and expands, we expect to see the impact of the MOU develop.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            Due to our leading AI driven IP infringement focused technology, our work with advertisers, brands and intermediaries
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           and
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            our partnerships with industry and government bodies, we are gaining ground in producing transparency and shedding light on the complexity of the piracy landscape. Thus allowing regulation and compliance efforts around IP infringement to become more effective.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            For more information about the study and the MOU, please visit the
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://op.europa.eu/en/publication-detail/-/publication/4d55743d-dd41-11ea-adf7-01aa75ed71a1/language-en" target="_blank"&gt;&#xD;
      
                      
           study page
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            on the Publication Office website or download the study below.﻿
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_99000821.jpeg" length="136134" type="image/jpeg" />
      <pubDate>Mon, 17 Aug 2020 16:22:21 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-works-with-the-eu-commission-to-produce-study</guid>
      <g-custom:tags type="string">Brand Reputation,CTV,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,OTT</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_99000821.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_99000821.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brands beware Connected TV and OTT - the booming new frontier of ad-funded piracy</title>
      <link>https://www.white-bullet.com/brands-beware-connected-tv-and-ott-the-booming-new-frontier-of-ad-funded-piracy</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_187752449.jpeg" alt="OTT CTV"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Marketers are increasingly alert to the threat of misplaced advertising funding pirate content on the web. But ads from household-name brands are up to five times more common on pirate content streamed through Connected TV and Over-The-Top devices, according to research by content piracy experts White Bullet that identifies TV apps as a very real new threat to the safety of premium brands.
           
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
            ﻿
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Up to 25% of ads detected in apps carrying pirated sport and entertainment content come from big-name brands, compared to just 5% of the ads on web-based pirate streaming sites, White Bullet has found. But in spite of massive and accelerating consumer uptake of streaming content online, most brands and ad networks are entirely unaware that their advertising is bankrolling illegal content in the OTT / CTV space. Overall, around 60% of advertising in-app bears a brand of some kind, the rest being sponsored articles, porn or fraud and malware. 
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           This picture of the previously undiagnosed TV app piracy problem comes as White Bullet offers its in-app ad-tracking service to first movers - the first of its kind and a lifeline to brands and ad providers who have previously been oblivious to the galloping levels of ad-funded piracy already detectable in the CTV / OTT ecosystem.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           TV apps sign up with ad networks to draw advertising in the same way websites do, but the complexity of tracking CTV / OTT advertising means that, until now, there has been no way to tell whether or not ad-funded apps were streaming legitimate, legal content.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           “We can clearly see a shift taking place towards a different avenue of piracy,” says White Bullet product director Dana Neale. “There is a lot more branded advertising in app, and that is because there is almost no transparency in the ad supply chain, and unlike web piracy there are no law-enforcement programmes to tackle pirate connected TV.”
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
                    
          ﻿
          
                    &#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            To find out how you can protect your brand in In-App / OTT / CTV, please
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           get in touch
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_187752449.jpeg" length="115166" type="image/jpeg" />
      <pubDate>Thu, 06 Aug 2020 11:09:02 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/brands-beware-connected-tv-and-ott-the-booming-new-frontier-of-ad-funded-piracy</guid>
      <g-custom:tags type="string">Brand Reputation,CTV,Programmatic Advertising,Advertising Networks,Digital Piracy,Brand Safety,OTT</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_187752449.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_187752449.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brands will guard their own supply chain if ad networks don’t</title>
      <link>https://www.white-bullet.com/brands-will-guard-their-own-supply-chain-if-ad-networks-dont</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_319054508.jpeg" alt="sad doggo"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We recently spoke about a
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://digiday.com/media/180-degrees-from-the-intent-why-marketers-are-living-in-constant-fear-of-the-screenshot/" target="_blank"&gt;&#xD;
      
                      
           piece in Digiday
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            that put its finger on marketers’ dread of the inappropriate screenshot capturing their brand up close against something awful. This has been preying on our mind, especially in the context of the rising trend of
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.thedrum.com/news/2019/11/25/housing-programmatic-the-role-trust-and-transparency-key" target="_blank"&gt;&#xD;
      
                      
           brands taking their programmatic activity in-house
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            . 
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           “Marketers have let someone else spend their money for far too long,” said ad fraud researcher and consultant Augustine Fou in the Digiday piece. “They need to learn how to look at the data and do their own due diligence.”
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Many brands are contemplating doing exactly this, which prompts two thoughts. One is that ad exchanges clearly need to give brands better protection and transparency if they don’t want those clients to take programmatic matters into their own hands.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           With real-time buying comes the need for real-time verification of publishers. If exchanges do not have accurate and dynamic risk assessments about the publishers to which they serve ads, then both their advertisers and their own place in the supply chain will suffer.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           And the second thought is directed to those brands that do turn to in-housing to take ownership of their ad supply chain, and it is this: the internet poses a constantly shifting array of risks to brands, and it takes great vigilance to monitor them all. Both go-it-alone brands and ad networks have a need for technology like ours, which uses AI to crawl the web night and day, maintaining dynamic lists of the web’s unsafe publishers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            If either of those descriptions applies to you, we’d love to talk to you about how we can provide the trust and transparency you are looking for.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           Get in touch
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           !
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_319054508.jpeg" length="355261" type="image/jpeg" />
      <pubDate>Tue, 28 Jul 2020 14:22:56 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/brands-will-guard-their-own-supply-chain-if-ad-networks-dont</guid>
      <g-custom:tags type="string">Brand Reputation,PPC,Programmatic Advertising,Advertising Networks,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_319054508.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/AdobeStock_319054508.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Is your brand safety vendor letting you down on piracy?</title>
      <link>https://www.white-bullet.com/is-your-brand-safety-vendor-letting-you-down-on-piracy</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1518020382113-a7e8fc38eac9-a8e6457f.jpg" alt="sad doggo"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A recent
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://digiday.com/media/180-degrees-from-the-intent-why-marketers-are-living-in-constant-fear-of-the-screenshot" target="_blank"&gt;&#xD;
      
                      
           Digiday
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            piece talked about marketers ‘living in constant fear of the screenshot’ - the juxtaposition of their brand with undesirable content. “Marketers clearly care about this brand safety problem,” said Danny Rogers, chief technology officer for disinformation watchdog Global Disinformation Index. “But the tools they are sold are so inadequate and their understanding of the open web is so limited that the outcome of it all is 180 degrees from the intent.”
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
            ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            They don’t have the highly dynamic tracking or legal knowledge to spot high-risk websites running pirate or fraudulent content. As long as their keyword search checks out, they will still put a brand’s advertising on an illegal and dangerous domain. Every day, we see numerous examples of ads on pirate websites that brand safety companies have waved through, including sites showcasing stolen Premier League streams and bogus blogs and e-commerce domains set up as fronts for pirate activity.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Keyword blocking can easily find fault with respectable and trustworthy publishers and content, depriving an advertiser of valuable opportunities and millions of eyeballs.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
            ﻿
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Even brands who are satisfied with their brand safety companies in other respects need extra eyes on the piracy problem. This kind of brand threat is astonishingly dynamic and requires both constant, highly specialised internet vigilance and legal analysis.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Pirates are ingenious and devious, and this is an increasingly substantial criminal business
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            .
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Unlike the companies that depend solely on contextual word analysis to spot trouble, White Bullet uses AI to crawl the web night and day, maintains dynamic lists of the web’s unsafe publishers and draws on vast legal experience, with vastly more robust results. 
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ﻿
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Brands shouldn’t depend on inadequate brand safety tools to protect themselves online. Get in touch to understand the real risks of online piracy and the real remedies.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1518020382113-a7e8fc38eac9.jpg" length="487477" type="image/jpeg" />
      <pubDate>Thu, 16 Jul 2020 12:32:31 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/is-your-brand-safety-vendor-letting-you-down-on-piracy</guid>
      <g-custom:tags type="string">Brand Reputation,Digital Piracy,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1518020382113-a7e8fc38eac9.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1518020382113-a7e8fc38eac9.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>UK Gambling regulator fines gambling brand which failed to manage third party websites on which it advertised</title>
      <link>https://www.white-bullet.com/uk-gambling-regulator-has-fined-gambling-brands-which-fail-to-manage-third-party-websites-on-which-they-advertise</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Earlier this month of May, the UK Gambling Commission fined the gambling company FSB £600,000 for responsibility failures surrounding its advertising in the UK, including misplacing ads on pirate websites.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Read more here:
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://bit.ly/2zGIg8P" target="_blank"&gt;&#xD;
      
                      
           https://bit.ly/2zGIg8P
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Gambling ads are often placed on pirate publishers due to (poor) algorithmic decision-making that associates pirate sports streaming with broader (legitimate) sports betting. The problem arises when technology fails to filter out risky publishers like pirate streaming websites. Until brands have complete transparency over their advertising supply chains, this issue will continue.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           However, on a positive note, although historically, gambling has been the top ad sector by impression volume placing ads on pirate websites, this is changing. In April 2020, ads from the gambling sector represented less than 2% of all advertising on high risk pirate websites in the UK, a drastic reduction from previous years.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Top+5+April+2020.png" alt="White Bullet stats"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Advertising impression volume by branded ad sector, across high risk pirate websites in UK during April 2020
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Regulatory efforts such, as those adopted by the UK Gambling Commission, together with increased internal action by brands’ own advertising teams, means progress is being made. Of course, the current health situation may have had a temporary impact on sports betting advertising helping to reduce figures. However, the changes we see are consistent with an overall decline in gambling ads on pirate websites.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Many major gambling companies are taking positive steps to better understand the websites where they advertise, putting in place transparency tools, including our own
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/ad-bullet"&gt;&#xD;
      
                      
           ad tracking analytics suite
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            , to monitor and assess their advertising compliance. Moving towards safer websites and better contextual content targeting, means brands protect themselves as well as reduce the ad revenue driving damage from IP infringement.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Inadvertent ad funding of online piracy is likely to continue, but the tide is changing in this sector where brands and regulators collaborate effectively.
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          ---
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          We have been actively working with many major gambling brands to help deliver their compliance programmes with great success. 
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          For more information about how we can help with ad placement transparency please contact us here -
          
                    &#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           https://www.white-bullet.com/contact
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            .
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1539683255143-73a6b838b106.jpg" length="486369" type="image/jpeg" />
      <pubDate>Fri, 29 May 2020 10:19:49 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/uk-gambling-regulator-has-fined-gambling-brands-which-fail-to-manage-third-party-websites-on-which-they-advertise</guid>
      <g-custom:tags type="string">Gambling Brands,Brand Compliance,Ad Supported Piracy,Advertising Compliance,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1539683255143-73a6b838b106.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1539683255143-73a6b838b106.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Is your brand safe online?</title>
      <link>https://www.white-bullet.com/is-your-brand-safe-online</link>
      <description>More ads and more premium ads to pirate sites suggesting ads are finding their way anywhere in order to boost brand visibility even if that is at odds with brand safety obligations.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The trend continues. More ads and more premium ads to pirate sites suggesting ads are finding their way anywhere in order to boost brand visibility even if that is at odds with brand safety obligations. 
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/May+15th+infographic.png" alt="57 percent"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            For help with the above data or to check if your brand is impacted,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           contact us here
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1516534775068-ba3e7458af70.jpg" length="267236" type="image/jpeg" />
      <pubDate>Fri, 15 May 2020 13:44:33 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/is-your-brand-safe-online</guid>
      <g-custom:tags type="string">Brand Reputation,Advertising Compliance</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1516534775068-ba3e7458af70.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1516534775068-ba3e7458af70.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brands contacted in Q1 2020 continue to fund piracy despite being given clear evidence of misplacement</title>
      <link>https://www.white-bullet.com/brands-contacted-in-q12020-continue-to-fund-piracy-despite-being-given-clear-evidence-of-misplacement</link>
      <description>We set up White Bullet with a vision to provide more transparency to advertisers around online intellectual property infringement.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet’s mission is to demonetise online piracy. We set up White Bullet with a vision to provide more transparency to advertisers around online intellectual property infringement: for them to find out when and how their ads appear on high risk infringing publishers, and to make it easier for their ad partners to filter out pirate publishers with dynamic feeds of pirate websites.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           An easy to integrate AI-driven technological solution, to remove any sense of confusion that may arise from static inaccurate lists. Not only does this support the industry’s moral duty to stop ad revenue to criminals but directly help brands achieve campaign safety and provides stronger opportunities to improve ROI by accessing legitimate paying audiences.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           However, it is harder to fix this problem of ad funded piracy when brands and their advertising companies refuse to adopt effective measures and continue to misplace ads. In many cases ad placement partners state their clients – the brands – don’t acknowledge the problem of piracy as serious enough to merit action.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet, along with regulators like TAG, continues to reach out to brands and agencies to raise awareness when brands’ ads appear on pirate publishers. Systematic outreach has been ongoing through 2019 and stepped up in Q1 2020 with more direct outreach by enforcement agencies like the UK IP Office.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           When brands are aware of the problem and consequences it is more likely they will take responsibility and demand their ad partners take long-overdue action for their business safety, as well as that of their consumers. Naturally, most brands are concerned when they first hear their online ads fund piracy and seek further evidence, but despite this many don’t take steps to resolve the problem. Significantly, despite outreach over several months, branded ads on pirate websites remains as high as before outreach began in 2019 – representing around 40% of all advertising on the top pirate publishers globally.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Worryingly, 57% of premium brands contacted in Q1 2020 continue to fund piracy despite being given clear evidence of misplacement. Of those, 7% refused to engage at all, saying they had more important matters to deal with than piracy – and many of these are the top supporters of pirate websites by ad volume.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Only 3% of premium brands contacted positively engaged and took various forms of action, with no further ads placed on pirate publishers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           These percentages must be turned around to stop piracy and protect brands.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/May+week+1+graphics.png" alt="57 percent"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           With the current pandemic, businesses do have other issues to manage, but putting brand reputation at risk during a crisis when consumers are looking for leadership, seems to make no sense. When marketing budgets are being slashed across the board, stopping precious ad budget going to criminals should also be a priority for advertisers’ CFOs. The suitability of a webpage is key to advertising ROI and of course brand safety, but when a website is infringing the law, none of its webpages should ever be deemed suitable.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           3 practical steps that brands can take to protect themselves and stop funding piracy:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Check where your ads are going - seek full ad placement auditing data including on your ad partners own partners.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Ensure your ad partners filter out pirate websites - demand up to date dynamic pirate list feeds.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Monitor your ad partners remain compliant - protect your brand at all stages and across all digital ad campaigns
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            For help with the above data or to check if your brand is impacted,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           contact us here
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg" length="230571" type="image/jpeg" />
      <pubDate>Tue, 05 May 2020 13:37:04 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/brands-contacted-in-q12020-continue-to-fund-piracy-despite-being-given-clear-evidence-of-misplacement</guid>
      <g-custom:tags type="string">Advertising Compliance,Brand Complinace,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What does it take to stop brands funding piracy?</title>
      <link>https://www.white-bullet.com/what-does-it-take-to-stop-brands-funding-piracy</link>
      <description>Following on from our recent analyses , which showed a significant increase in advertising impressions on pirate websites.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Following on from our
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.white-bullet.com/brands-are-paying-their-advertising-partners-to-put-their-brand-reputation-at-risk"&gt;&#xD;
      
           recent analyses
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , which showed a significant increase in advertising impressions on pirate websites (Q4 2019 to Q1 2020), we have delved deeper into the geographies, ad types and companies funding these illegal publishers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          We looked at the top
          &#xD;
    &lt;a href="https://www.white-bullet.com/ip-bullet"&gt;&#xD;
      
           5,000 highest risk pirate websites
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            from the top six countries by ad spend. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          Ad impressions on these pirate websites are up 43% on average across the six markets since Q4 2019, representing 4.3 billion ad impressions in Q1 2020. The largest increases are in France (85%) and the US (52%). 
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           AD IMPRESSIONS ON PIRATE PUBLISHERS - TOP 6 AD MARKETS 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We then drilled into the type of advertising leading the increases between quarters on these websites. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Generic clickbait grew 113% and ads associated with fraud/malware grew 37%, indicating the risky end of the ad industry is jumping to capitalise on unwitting consumers who are spending more time online. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Despite news that brands are currently cutting spend on digital advertising, unexpectedly - and worryingly - ads from premium brands have also increased by a huge 30%. It seems brands, like malware providers, continue to target consumers no matter what the context of the publisher page. This lack of diligence by brands’ ad partners towards properly assessing publisher suitability and safety for their clients, is putting brands at risk, due to their funding criminals, and damaging their clients’ reputations in the eyes of consumers. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It may be easy to guess the ad sectors driving this increase in premium brands on pirate websites. Reflecting the current climate of shopping from home, ads in this sector grew by a phenomenal 96% to become by far the largest sector in Q1 2020 (second largest sector in Q4). 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The second largest sector by ad impression volume in Q1 2020 is Arts &amp;amp; Entertainment (including streaming and gaming), which increased by 76%. Automotive, Travel (including holiday deals) and Personal Finance related ads also each grew significantly although with fewer overall ads (2176%, 407% and 622% respectively). It is perhaps understandable that many brands in these sectors have sought to target a broader audience given they have been hit the hardest by the pandemic. However, senior management should seriously consider whether a desperate attempt to spread ads to illegal websites is a smart strategy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Request data about your brand:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           Contact Us
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TOP 5 AD SECTORS ON PIRATE PUBLISHERS – TOP 6 AD MARKETS 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Our mission here at White Bullet is to demonetise piracy by raising awareness with brands and their ad partners about ad misplacement. Expanding the collaboration between White Bullet, advertisers, IP owners and regulators will create a safer online environment for brands and consumers, stop funding crime and grow the legitimate IP market. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Armed with the most accurate and up to date information means brands can take control of their ad spend and digital brand safety.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For real time brand specific data and to compare against competitors, contact
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           Contact Us
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protecting advertisers and brands from digital piracy.
           &#xD;
      &lt;div&gt;&#xD;
        &lt;a href="/contact"&gt;&#xD;
          
             Get in touch now
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg" length="528199" type="image/jpeg" />
      <pubDate>Wed, 29 Apr 2020 09:44:06 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/what-does-it-take-to-stop-brands-funding-piracy</guid>
      <g-custom:tags type="string">Advertising Compliance,ad funded piracy,Brand Complinace,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brands are paying their advertising partners to put their brand reputation at risk</title>
      <link>https://www.white-bullet.com/brands-are-paying-their-advertising-partners-to-put-their-brand-reputation-at-risk</link>
      <description>More people are taking to living life on the web and that means the Internet pirates are benefitting. White Bullet's Q1 2020 data shows a 50% traffic increase to the top pirate websites since the last quarter in the US and UK alone.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As offices, pubs, gyms and shops close in the thousands, the world has moved indoors and online. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            More people are taking to living life on the web and that means the Internet pirates are benefitting. White Bullet's Q1 2020 data shows a
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           50% traffic increase
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to the top pirate websites since the last quarter in the US and UK alone. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Much of this is due to consumers looking for more available free content. More pageviews equates to more advertising displayed to those new website visitors, and more eyeballs means more money to the pirates and the ad companies placing those ads. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There have been more than 6 billion ad impressions on pirate websites since lockdown in Q1 alone. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Find out if your advertising partners are placing your ads on pirate websites –
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           email us
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for a FREE digital HealthCheck for your brand. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Branded ads on high-risk pirate websites have gone up by 163%
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            since December 2019 before lockdowns began. This is despite loud and clear calls from the advertising industry for ad companies to treat pirate websites as they treat other publishers of illegal and inappropriate content and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           stop serving them ads
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            White Bullet has been measuring the rise of ads belonging to or representing premium household name brands, and it’s a cause for concern.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Premium brand ads increased by 150% on high-risk websites
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            in that same period. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ad companies are not going to stop placing premium brand ads on pirate websites voluntarily. Why would they? These ad companies get paid for
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           all
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ad impressions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The only way ad-funded piracy will stop
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is for brands to lean heavily on the partners within their ad supply chain and tell them to
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           prevent ads on pirate websites
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . Ad companies will listen to their clients, the brands that ultimately pay them. The problem is that
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           brands do not have transparency
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            regarding their adverts on pirate websites.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Get transparency on the high-risk websites where your ads have been found and who placed them –
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           email us
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for a FREE digital HealthCheck for your brand.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            White Bullet already provides this data to brands to help them
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           identify such instances of non-compliance
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            by their ad partners. This is important to help promote self-regulation. Otherwise regulators are threatening to step in. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Regulators seek to stop ad funding to websites run by cybercriminals
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . These websites
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           hurt vulnerable consumers
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            as the websites carry data miners, browser hijackers, phishing campaigns and malware. White Bullet's latest data shows
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           20% of pirate websites carry malware designed to steal private information
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Trustworthy Accountability Group (TAG)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           UK Intellectual Property Office (IPO)
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , amongst others, already track non-compliant brands and their ad partners that continue to support pirate websites. They have launched recent
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           enforcement programmes to address persistently non-compliant companies targeting them for outreach and action
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Find out if your brand is at risk –
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           email us
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           for a FREE digital HealthCheck for your brand.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brands
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           must
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            demand compliance from their digital ad partners to specifically
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           stop ad placement on pirate websites
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . Failure to do so
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           harms their reputation
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            with consumers and
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           risks scrutiny from regulators
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            To protect their reputation, brands
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           must
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            track their ad partners’ compliance via transparency data and evidence when their ads appear on pirate websites.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protecting advertisers and brands from digital piracy.
           &#xD;
      &lt;div&gt;&#xD;
        &lt;a href="/contact"&gt;&#xD;
          
             Get in touch now
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1560169897-fc0cdbdfa4d5.jpg" length="102824" type="image/jpeg" />
      <pubDate>Fri, 27 Mar 2020 10:41:04 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/brands-are-paying-their-advertising-partners-to-put-their-brand-reputation-at-risk</guid>
      <g-custom:tags type="string">Brand Reputation,Brand Compliance,Advertising Compliance,Ad Supply Chain</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1560169897-fc0cdbdfa4d5.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1560169897-fc0cdbdfa4d5.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Operation Creative prevents millions of pounds ending up in the hands of criminals</title>
      <link>https://www.white-bullet.com/operation-creative-prevents-millions-of-pounds-ending-up-in-the-hands-of-criminals</link>
      <description>In October 2016, the Gambling Commission made placing digital adverts responsibly a licensing condition for all gambling operators targeting consumers in Great Britain.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    
                    
          Research shows that there has been an 87% drop in adverts for licensed gambling operators being displayed on illegal sites that infringe copyright in the last twelve months.  (Posted 13 Jun 2017 - read
          
                    &#xD;
    &lt;a href="http://news.cityoflondon.police.uk/r/842/operation_creative_prevents_millions_of_pounds_en" target="_blank"&gt;&#xD;
      
                      
           original article
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
           here)
         
                  &#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1454165804606-c3d57bc86b40.jpg" alt="bet365"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          A ground-breaking police operation, run by the City of London Police’s Intellectual Property Crime Unit (
          
                    &#xD;
    &lt;a href="https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/pipcu/Pages/default.aspx" target="_blank"&gt;&#xD;
      
                      
           PIPCU
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          ), that disrupts illegal websites providing pirated access to films, TV, books, music and games has seen major success.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Action was taken to help stop licensed gambling operators inadvertently providing revenue to those committing crime online, which runs counter to their licensing objective under the Gambling Act 2005 to “keep crime out of gambling”. Through the Infringing Website List (IWL), gambling operators are provided with an up-to-date list of copyright infringing sites, allowing them to stop advert placement on these illegal websites. 
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The research was carried out by
          
                    &#xD;
    &lt;a href="https://www.white-bullet.com/" target="_blank"&gt;&#xD;
      
                      
           White Bullet
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          ; a global data company that specialise in brand safety solutions and provide transparency on digital advertising on IP infringing websites.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          In October 2016, the
          
                    &#xD;
    &lt;a href="http://www.gamblingcommission.gov.uk/home.aspx" target="_blank"&gt;&#xD;
      
                      
           Gambling Commission
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          made placing digital adverts responsibly a licensing condition for all gambling operators targeting consumers in Great Britain. This condition means that licensees must not place adverts on illegal websites and must take all reasonable steps to ensure that third parties under contract with them take the same approach. These illegal websites harm not only the UK’s creative industries but also the UK consumer.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Data was gathered on 40 gambling operators who hold a Gambling Commission licence and are current members of the IWL. The results are positive for these gambling companies whose aim is to stop their advertising budgets ending up with criminals.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The Gambling Commission has been working with industry to raise awareness of the new condition and requirements and has already taken targeted interventions to ensure compliance.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          PIPCU launched Operation Creative and the IWL in 2013 to tackle the funding of illegal streaming websites that adversely impact on the UK’s creative industries. This is a police endorsed list of websites which host copyright infringing content and is used by advertisers and advertising networks to avoid placing adverts on them and therefore passing revenue to them.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Research carried out earlier this year by White Bullet showed that there has been a
          
                    &#xD;
    &lt;a href="https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/pipcu/pipcu-news/Pages/Operation-Creative-sees-64-per-cent-drop-in-UK-advertising-.aspx" target="_blank"&gt;&#xD;
      
                      
           64% decrease in advertising
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          from the UK’s top ad spending companies on copyright infringing websites.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
                      
           Acting Detective Superintendent Peter Ratcliffe, Head of the Police Intellectual Property Crime Unit (PIPCU), said:
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “The success of a strong relationship built between PIPCU and The Gambling Commission can be seen by these figures. This is a fantastic example of a joint working initiative between police and an industry regulator.
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “We commend the 40 gambling companies who are already using the Infringing Website List and encourage others to sign up.
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “We will continue to encourage all UK advertisers to become a member of the Infringing Website List to ensure they’re not inadvertently funding criminal websites”
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
            
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
                      
           Tim Moss, CEO of the UK Intellectual Property Office, said:
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “Partnership work is clearly having a major impact on IP crime across the UK. PIPCU and the Gambling Commission have cut off yet another illicit revenue stream for unscrupulous IP thieves.
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “The government and its partners will continue to fight IP crime in all its forms. Those wishing to profit from the hard work of others will not have an easy ride.”
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
                      
           Paul Hope, Gambling Commission programme director said:
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “The Gambling Commission is committed to ensuring gambling is free from crime. This is why we brought in a requirement that all operators must not place digital advertisements on websites providing unauthorised access to copyrighted content.
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “The result of this latest initiative speaks for itself, and we are delighted with these figures.”
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font&gt;&#xD;
      
                      
           Peter Szyszko, CEO of White Bullet said:
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “White Bullet’s research and analysis shows just how much progress can be made when the industry comes together. Many gambling companies now recognise the damage to brand equity associated with advertising on illegal websites and don’t want their ad budget supporting criminals.
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
           
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
           “The most significant progress has been made where brands work with the IWL and use White Bullet’s data to identify ad networks and affiliates that repeatedly put their brands at risk. Brands and ad companies now have tools to protect themselves and consumers.”
          
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Protecting advertisers and brands from digital piracy.
           
                      &#xD;
      &lt;div&gt;&#xD;
        &lt;a href="/contact"&gt;&#xD;
          
                          
             Get in touch now
            
                        &#xD;
        &lt;/a&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1454165804606-c3d57bc86b40.jpg" length="346237" type="image/jpeg" />
      <pubDate>Thu, 12 Mar 2020 14:37:46 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/operation-creative-prevents-millions-of-pounds-ending-up-in-the-hands-of-criminals</guid>
      <g-custom:tags type="string">Press,press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1454165804606-c3d57bc86b40.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1454165804606-c3d57bc86b40.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Follow the money to defund piracy and protect the public online</title>
      <link>https://www.white-bullet.com/follow-the-money-to-defund-piracy-and-protect-the-public-online</link>
      <description>IP infringement is a major prohibitor to business growth. Find out how White Bullet Solutions is taking the battle to digital pirates on behalf of the business community</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IP infringement is a major prohibitor to business growth. Find out how White Bullet Solutions is taking the battle to digital pirates on behalf of the business community
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;a href="https://www.telegraph.co.uk/business/connecting-for-growth/protecting-advertisers-from-digital-piracy/" target="_blank"&gt;&#xD;
    
          Connecting for Growth
         &#xD;
  &lt;/a&gt;&#xD;
  
         interviewed
         &#xD;
  &lt;a href="https://www.linkedin.com/in/peterszyszko/" target="_blank"&gt;&#xD;
    
          Peter Szyszko
         &#xD;
  &lt;/a&gt;&#xD;
  
         , Founder of White Bullet Solutions, as part of the Connecting for Growth campaign, which is putting a spotlight on some of the world’s most promising business ideas. Look out for more insights from top entrepreneurs in the coming weeks.
         &#xD;
  &lt;div&gt;&#xD;
    
          Read the full post on the
          &#xD;
    &lt;a href="https://www.telegraph.co.uk/business/connecting-for-growth/protecting-advertisers-from-digital-piracy/" target="_blank"&gt;&#xD;
      
           Telegraph
          &#xD;
    &lt;/a&gt;&#xD;
    
          website.
         &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protecting advertisers and brands from digital piracy.
           &#xD;
      &lt;div&gt;&#xD;
        &lt;a href="/contact"&gt;&#xD;
          
             Get in touch now
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg" length="238460" type="image/jpeg" />
      <pubDate>Wed, 26 Feb 2020 16:48:28 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/follow-the-money-to-defund-piracy-and-protect-the-public-online</guid>
      <g-custom:tags type="string">Press,press,telegraph,follow the money,white bullet,piracy,ad funded piracy,Home Page</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Working with bet365 to gain affiliate transparency</title>
      <link>https://www.white-bullet.com/white-bullet-work-with-bet365-to-gain-affiliate-transparency</link>
      <description>bet365 has renewed its longstanding partnership with White Bullet to protect against misplaced advertising on high risk publishers.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    
                    
          bet365 has renewed its longstanding partnership with White Bullet to protect against misplaced advertising on high risk publishers.
         
                  &#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bet365.png" alt="bet365"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         The partnership targets multiple ecosystems and enhanced promotion compliance in tune with increased industry regulation.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          bet365’s highly proactive approach to compliance utilises White Bullet’s risk scoring technology to minimise advertising the brand on high risk IP infringing websites.
          
                    &#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           Using White Bullet’s brand protection and compliance tool, bet365 continues to have full transparency on affiliate partner programmes across all ecosystems and multiple risk segments including IP infringing, Sexually Explicit and Age Inappropriate content.
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           This will help bet365 to ensure its advertising and promotions are legally compliant, prioritise the action required to deliver Positive Customer Engagement, Brand and Customer Safety and uphold internal standards.
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           White Bullet’s proprietary software uses AI to analyse publisher content, advertising and promotions in real time, providing unique and dynamic risks scores as to the compliance and safety of each.
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           White Bullet’s technology not only provides full transparency on where ads and promotions are placed by partners and ad brokers, but also screenshot evidence and risk scores making it faster and easier for compliance teams to prioritise and manage safety programmes accurately.
          
                    &#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Protecting advertisers and brands from digital piracy.
           
                      &#xD;
      &lt;div&gt;&#xD;
        &lt;a href="/contact"&gt;&#xD;
          
                          
             Get in touch now
            
                        &#xD;
        &lt;/a&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488474739786-757973c2dff6.jpg" length="517792" type="image/jpeg" />
      <pubDate>Mon, 24 Feb 2020 15:12:42 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-work-with-bet365-to-gain-affiliate-transparency</guid>
      <g-custom:tags type="string">Case Study,bet365,white bullet,brand protection,gambling,gambling sector,Home Page</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488474739786-757973c2dff6.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1488474739786-757973c2dff6.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet: IPA Bellwether Report and the impact on our industry</title>
      <link>https://www.white-bullet.com/white-bullet-share-thoughts-on-the-positive-ad-spend-report-from-ipa-bellwether-and-the-impact-on-our-industry-in-exchangewire</link>
      <description>The IPA Bellwether Q4 2019 Report, released today 15th January 2020, has revealed a 4% overall increase in marketing budgets, the first such increase since the first quarter of the year.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;p&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The IPA Bellwether Q4 2019 Report, released today 15th January 2020, has revealed a 4% overall increase in marketing budgets, the first such increase since the first quarter of the year. Growth is anticipated to accelerate through 2020 as the business cycle recovers from its current soft spell.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/p&gt;&#xD;
      &lt;p&gt;&#xD;
      &lt;/p&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      
           "The IPA Bellwether Report’s finding of renewed growth in marketing budgets, and particularly those allocated to internet marketing, offers a welcome shot of positivity for a UK economy that has been subdued by uncertainty for three years. But as advertisers finally begin to release the handbrake on their marketing investments, they should remember that opportunists thrive in busy markets. Illegal domains, misplaced ads and IP infringement boom when advertising is strong, and as marketing activity increases, so does the risk to brands. For any advertiser, the gearing up of online marketing requires a parallel investment in safety and compliance, to ensure ads, campaigns and brands do not fall prey to the hidden dangers of a high-risk publisher landscape.”
          &#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      
           Peter Szyszko, CEO and founder,
           &#xD;
      &lt;a href="/home-old"&gt;&#xD;
        
            White Bullet Solutions
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      
           Read full article on
           &#xD;
      &lt;a href="https://www.exchangewire.com/blog/2020/01/15/ipa-bellwether-report-q4-2019-return-to-marketing-budget-growth/" target="_blank"&gt;&#xD;
        
            Exchangewire
           &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Thu, 16 Jan 2020 09:35:10 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-share-thoughts-on-the-positive-ad-spend-report-from-ipa-bellwether-and-the-impact-on-our-industry-in-exchangewire</guid>
      <g-custom:tags type="string">Press,Home Page</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brands may not realise that their ads are being placed on IP infringing sites</title>
      <link>https://www.white-bullet.com/brands-may-not-realise-that-their-ads-are-being-placed-on-ip-infringing-sites</link>
      <description>Peter Szyszko from whiteBullet Solutions alerts about the risks that many EU companies face when setting up digital ad campaigns on third-party websites.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         Are you running a digital ad campaign for your company? IP expert Peter Szyszko explains the risks of advertising on third-party websites
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Peter Szyszko from White Bullet Solutions alerts about the risks that many EU companies face when setting up digital ad campaigns on third-party websites.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Untitled+design+%282%29.png" length="97184" type="image/png" />
      <pubDate>Tue, 07 Jan 2020 15:33:38 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/brands-may-not-realise-that-their-ads-are-being-placed-on-ip-infringing-sites</guid>
      <g-custom:tags type="string">Press,Video</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Untitled+design+%282%29.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Untitled+design+%282%29.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Premier League clubs still taking money from blacklisted online betting firm</title>
      <link>https://www.white-bullet.com/premier-league-clubs-still-taking-money-from-blacklisted-online-betting-firm</link>
      <description>Chelsea, Liverpool and Tottenham Hotspur football clubs have been accused of “sanitising” the reputation of a betting firm whose UK operations were suspended this weekend after a Sunday Times investigation.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         www.thetimes.co.uk
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Chelsea, Liverpool and Tottenham Hotspur football clubs have been accused of “sanitising” the reputation of a betting firm whose UK operations were suspended this weekend after a Sunday Times investigation.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.thetimes.co.uk/article/fe660d04-bba1-11e9-8b18-4403ae03f399#" target="_blank"&gt;&#xD;
      
           Continue Reading
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1556056504-5c7696c4c28d.jpg" length="462870" type="image/jpeg" />
      <pubDate>Tue, 07 Jan 2020 11:41:32 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/premier-league-clubs-still-taking-money-from-blacklisted-online-betting-firm</guid>
      <g-custom:tags type="string">Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1556056504-5c7696c4c28d.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1556056504-5c7696c4c28d.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>1XBET ads appeared on 1,200 ‘pirate’ sites in past six months</title>
      <link>https://www.white-bullet.com/1xbet-ads-appeared-on-1-200-pirate-sites-in-past-six-months</link>
      <description>As pressure builds on several Premiership clubs to stop doing business with 1XBET, the scale of the company's advertising on 'pirate' sites has been revealed. According to brand protection company White Bullet, 1XBET ads appeared on 1,200 'pirate' platforms in the past six months, of which 13% were "high risk sites" involved in unlicensed sports streaming.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         Torrentfreak.com
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          As pressure builds on several Premiership clubs to stop doing business with 1XBET, the scale of the company's advertising on 'pirate' sites has been revealed. According to brand protection company White Bullet, 1XBET ads appeared on 1,200 'pirate' platforms in the past six months, of which 13% were "high risk sites" involved in unlicensed sports streaming.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://torrentfreak.com/1xbet-ads-appeared-on-1200-pirate-sites-in-past-six-months-190906/" target="_blank"&gt;&#xD;
      
           Continue Reading
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg" length="205875" type="image/jpeg" />
      <pubDate>Tue, 07 Jan 2020 11:36:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/1xbet-ads-appeared-on-1-200-pirate-sites-in-past-six-months</guid>
      <g-custom:tags type="string">Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Predictions 2020: Industry experts have their say</title>
      <link>https://www.white-bullet.com/predictions-2020-industry-experts-have-their-say</link>
      <description>If 2020 is really going to be the year in which we truly put consumers first, the industry has to take active steps to stop funding  ID theft, data miners, key-loggers, browser hijackers and profile builders.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         A worryingly high percentage of high risk websites and apps host malware
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          It has been a year of ‘will we, won’t we’ with a nervous waiting game on whether we leave the EU. This has had a knock on effect on business confidence and trading, including ad trading in the digital advertising industry has been affected. We have seen a year of relative stagnation in terms of ad spend as marketers have held back budgets in light of a nervous economy. The good news has been that innovation has not remained static. We have seen strong product launches, new start ups bringing fresh ideas to the market and we have finally seen the industry unite together on one common goal: to put the consumer at the heart of the conversation. It is now time to look forward to next year and to hear from leading experts from all sides of the industry to give their thoughts on what to expect from 2020:
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="http://www.adhugger.net/2019/11/29/predictions-2020-industry-experts-have-their-say/" target="_blank"&gt;&#xD;
      
           Continue Reading
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1449157291145-7efd050a4d0e.jpg" length="446736" type="image/jpeg" />
      <pubDate>Mon, 06 Jan 2020 15:59:50 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/predictions-2020-industry-experts-have-their-say</guid>
      <g-custom:tags type="string">Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1449157291145-7efd050a4d0e.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1449157291145-7efd050a4d0e.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Predictions 2020: Transparency</title>
      <link>https://www.white-bullet.com/predictions-2020-transparency</link>
      <description>White Bullet weighs in on predictions for 2020. In 2020 the message needs to be loud and clear: stop advertising on unsafe domains. We know that criminals use malware to steal personal information, send spam, and commit fraud.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         Stop advertising on unsafe domains
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         As the decade draws to a close, ExchangeWire has invited thought leaders from across the industry to share their predictions and insight into what 2020 will hold for the ad tech and martech industries. Under the spotlight today is transparency, with exploration of how supply-side optimisation, anti-fraud measures, and audience acceptance of ads, are all set to evolve over the coming year.
         &#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://www.exchangewire.com/blog/2019/12/05/predictions-2020-transparency/" target="_blank"&gt;&#xD;
      
           Continue Reading
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513530534585-c7b1394c6d51.jpg" length="167929" type="image/jpeg" />
      <pubDate>Mon, 06 Jan 2020 15:46:50 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/predictions-2020-transparency</guid>
      <g-custom:tags type="string">Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513530534585-c7b1394c6d51.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513530534585-c7b1394c6d51.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet provide tools to combat ad funded piracy</title>
      <link>https://www.white-bullet.com/tools-to-combat-ad-funded-piracy</link>
      <description />
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
         We gather and provide access to the world's most accurate and up to date digital advertising risk data.
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         White Bullet
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Our founders are experienced intellectual property lawyers with long tenure in the media and advertising industries. We are IP experts and no other company or system has such a laser focus on IP risk protection.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Our dedicated technical engineers specialise in AI, big data models and predictive machine learning. 
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Our highly skilled investigators and data analysts are experienced in tackling the trafficking and distribution of pirated and counterfeit goods.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Our team operates out of London, New York and Los Angeles.
          
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  &lt;font color="#ffffff"&gt;&#xD;
    
                    
          What we do
         
                  &#xD;
  &lt;/font&gt;&#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We gather and provide access to the world's most accurate and up to date digital advertising risk data.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We are currently the only company that offers real-time intelligence that is used by intellectual property rights holders, advertising networks, brands, brand agencies, governments and advisory bodies.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We provide insights, advice and support to make sure brands don’t advertise on high risk websites and applications that host and stream illegal content.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We attribute advertising impression data to high risk websites and applications to give brands an understanding of how much money they spend on funding cybercriminals.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We help IP rights holders to take action against suppliers of stolen content as well as aiding regulatory organisations and governmental bodies to demonetise cybercrime.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         How we do it
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Independent web crawling.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Our always-learning engine identifies, analyses and scores websites and applications, categorising them as low, medium or high risk and tracks the advertising on them.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           Digital advertising expertise.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           IP legal expertise.
          
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Why we do it
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           To protect brand reputation by making sure their ads do not appear on high risk websites and applications.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           To help brands stay compliant under industry and governmental regulation and avoid penalties such as helping the regulated gambling sector.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           To make sure IP rights owners have a powerful toolbox to combat IP theft.
          
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
           To demonetise piracy, cybercrime and to curtail the spread of malware that is nearly always embedded in high risk websites and applications.
          
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Who do we do it for?
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            IP rights holders.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Advertising networks.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Brands and brand agencies.
           
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
            Governments and advisory bodies.
            
                        &#xD;
        &lt;a href="https://www.white-bullet.com/how-we-work-with-the-european-union"&gt;&#xD;
          
                          
             Read EU case study
            
                        &#xD;
        &lt;/a&gt;&#xD;
        
                        
            .
           
                      &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg" length="205875" type="image/jpeg" />
      <pubDate>Thu, 19 Dec 2019 14:50:30 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/tools-to-combat-ad-funded-piracy</guid>
      <g-custom:tags type="string">Case Study</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/rodion-kutsaev-0VGG7cqTwCo-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How we work with the European Union</title>
      <link>https://www.white-bullet.com/how-we-work-with-the-european-union</link>
      <description>90% of IP infringing services rely on some form of ad revenue to exist, with some individual operators making millions of dollars in ad revenue annually.</description>
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
         90% of IP infringing services rely on some form of ad revenue to exist, with some individual operators making millions of dollars in ad revenue annually.
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Our Client
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         The European Commission is the independent executive branch of the European Union. White Bullet works with the European Commission’s DG Grow department which, amongst other responsibilities, is tasked with generating policy on the protection and enforcement of IPRs in the European Union.
        
                &#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  &lt;font&gt;&#xD;
    
                    
          The Challenge
         
                  &#xD;
  &lt;/font&gt;&#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;font color="#ffffff"&gt;&#xD;
    
                    
          To monitor the effectiveness of the 2018 MoU on online advertising and intellectual property rights IPRs facilitated by the European Commission as part of their “follow the money” IPR enforcement policy.
         
                  &#xD;
  &lt;/font&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#ffffff"&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#ffffff"&gt;&#xD;
      
                      
           The MoU is a voluntary agreement between stakeholders in the advertising and creative industries to minimise the placement of digital advertising on IP infringing websites.
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#ffffff"&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;font color="#ffffff"&gt;&#xD;
      
                      
           To measure the effectiveness of the MoU, smart and scalable technology is required to identify the top IP infringing websites in the European market and provide dynamic and sophisticated data on their advertising profiles.
          
                    &#xD;
    &lt;/font&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         The Challenge Continued
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Digital IP infringement causes the creative industries to lose billions of dollars in revenue and provides the operators of IP infringing services with a market where they can prosper through digital advertising revenue.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Traditional IPR enforcement solutions, such as targeting individual IP infringing services or consumers, are too narrow and slow to address this commercial profiteering through digital advertising.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          This has led many organisations – such as the European Commission – to adopt the “follow the money” approach to IPR enforcement through initiatives such as the 2018 MoU. This approach focusses on demonetising digital IP infringement by cutting off the primary source of income – advertising revenue.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          90% of IP infringing services rely on some form of ad revenue to exist, with some individual operators making millions of dollars in ad revenue annually.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          To monitor the effectiveness of the MoU, next-generation technology is required to identify the vast and ever-changing pool of IP infringing services available and to detect the types of ads funding these services to identify key trends in the advertising landscape.
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         The Solution
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         White Bullet's proprietary solution identifies, scores and monitors IP infringing services and the advertising supporting them.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           Our IPI Index is a vast global database of actionable intelligence including millions of URLs visited and tracked daily. By staying on top of the fast-evolving landscape, accounting for redirects, domain hopping and mirroring our technology addresses the dynamism of digital IP infringement.
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           White Bullet’s intelligent and scalable ad harvesting software classifies ads with a brand name, industry sector and ad type. Data is accessible through our analytics tool or via our API, providing clients with the ability to identify key trends overtime, pull landscape reports and better inform policy.
          
                    &#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/div&gt;&#xD;
    &lt;div&gt;&#xD;
      
                      
           White Bullet also provides expert and professional advice and guidance in tandem with advertising data, enabling clients to better understand the position of ad-funded digital IP infringement and what it means for future policy and industry-level best practices.
          
                    &#xD;
    &lt;/div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg" length="432873" type="image/jpeg" />
      <pubDate>Thu, 19 Dec 2019 11:41:32 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/how-we-work-with-the-european-union</guid>
      <g-custom:tags type="string">Case Study</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet tackles illegal sports streaming</title>
      <link>https://www.white-bullet.com/white-bullet-tackles-illegal-sports-streaming</link>
      <description>Sports streaming makes up a huge proportion of online piracy and attracts household name advertising campaigns.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/wade-austin-ellis-1232401-unsplash-5058x3613.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Sports streaming makes up a huge proportion of online piracy and attracts household name advertising campaigns.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           It is estimated that the Deontay Wilder VS Tyson Fury heavyweight boxing match held on the 1st of December 2018 attracted 325,000 pay per views, whereas illegally streamed versions of the fight pulled in around 1.9 million U.S. viewers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           According to Alexa and supporting metrics, many IP infringing sports streaming websites are more prevalent in terms of traffic than their official brand counterparts including The Premier League (
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.premierleague.com/" target="_blank"&gt;&#xD;
      
                      
           www.premierleague.com
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ), NBC Sports (
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.nbcsports.com/" target="_blank"&gt;&#xD;
      
                      
           www.nbcsports.com
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ) and Major League Baseball (
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.mlb.com%29/" target="_blank"&gt;&#xD;
      
                      
           www.mlb.com)
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           .
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           That’s a lot of people watching for free as compared to paying customers.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Apart from lost revenue to companies that produce and distribute paid streaming content and the inherent damage to the sporting industry, the individuals and organisations that hijack IP infringing streams are making vast sums of money via the mechanics of digital advertising and the placement of premium brand ads.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Digital advertising works on a simple premise, in the same way, that traditional advertising does. More traffic provides more ad impressions and more click-throughs. More Money.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Follow the money
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The EU Commission's "follow the money" approach has been well documented (
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://bit.ly/2RWghF9" target="_blank"&gt;&#xD;
      
                      
           https://bit.ly/2RWghF9
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ), and with White Bullet’s unique insights, authorities like the Commission have been able to proceed with statistically driven evidence to support them.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           For example, the stats regarding advertising on IP Infringing sports streaming destinations are a growing cause for concern:
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           20% of the most popular pirate sites are engaged in sports streaming.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Branded advertising (including premium household names) makes up 96% of all advertising on illegal sports streaming websites. Compared to 22% on illegal websites displaying other content.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Sports streaming makes up a huge proportion of online piracy and attracts the most premium advertising campaigns.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Coupled with millions of unique monthly page views, these pirates are generating millions in advertising revenue from illegal distribution of popular content.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Paid advertising is funding criminal activity online, and this is a real problem. Brands are supporting IP infringement. Also a real problem.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           How does illegal sport streaming work, and how to people know where to find it?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Streaming is easy. The internet has made it easier and continues to make it so. A pay per view ticket or paid subscription is all that is needed to share the stream across multiple websites, domains and applications. Pretty much any destination with an IP address. Now add advertising to that destination, and you are ready to go, providing you don't mind a hefty fine, confiscation of all of your IT materials and perhaps a prison sentence.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           The trick is to keep the stream a secret until the moment it is needed; otherwise there's a good chance the site will be shut down before the sporting event kicks off.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Burners and Cloakers
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Sounds like something out of a fantasy novel, but it's the best way to describe the sophisticated methods that illegal streaming destination sites are using to avoid detection. White Bullet is witnessing a rise in destinations that pop up for the duration of the streamed event and disappear again afterwards. These are "burners", websites to be disposed of after the event has been and gone and the ad impressions and CTR have been "counted up".
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           "Cloakers" are really something. They appear to the world as an innocuous lifestyle blog or similar with the relevant advertising already in situ. For the most part, these destinations don't get much traffic and nothing much really happens with them until it's time to host a streamed event illegally. Then the feed appears in a content block for the duration before leaving again once the event is over. The site and the advertising stays where it is, and no-one would suspect anything. There would be a massive spike in direct and referral traffic, however, and a whole lot of ad impressions.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Money has been made. Brands have supported IP infringing streams.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/0_OjqRkE0TxSqaIG4nw9ZA-982x441-982x441.jpg" alt="A cloaked site serving an illegal sport stream"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/evidence-2720x1102-2720x1102.png" alt="Ad supported piracy in action"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           How do people find these destinations and view illegally streamed sports media?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The answer is logical and straightforward; social networks and forums and are the primary providers. Links are shared around open social networks like Reddit and closed social networks like Discord. Quality premium shared content is the lifeblood of the social web, and it's near impossible to stop links being shared.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet's solution
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            DETECT
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            White Bullet actively detects websites, applications, communities and systems that stream premium content illegally.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            These online destinations are continually monitored for infringement and assigned a risk score. This score is flexible, updating its status as the destination becomes more or less of a risk, "de-cloaks" or vanishes altogether.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            White Bullet also detects the advertising displayed on pirate destinations.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            The advertising data provides a unique profile into how these destinations make money and who is funding them.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            DEMONETISE
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            Dynamic risk scores are applied to online risk destinations (websites, applications etc.) forming the basis of an always relevant toolset. This intelligence allows brands, agencies and other organisations to take preventative measures in real time and to avoid advertising on high-risk online destinations - saving brands money and protecting their integrity.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            The internet moves faster than the time it takes to create and curate static lists, so the only way to stay on top of the issue is to have a solution that compiles data and reports in real-time.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            In addition to destinations to avoid and proof of illegal activity, White Bullet supplies information regarding advertising on those sites and who placed it there. This provides transparency for our clients to take action within their digital supply chain.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            White Bullet Solutions are pioneers and tech leaders in this space working with an ever-growing roster of clients and IP rights owners that advocate our expertise, data insights to minimise risk and protect intellectual property.
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            White Bullet works with policymakers and authorities including the EU Commission, UK IPO (Intellectual Property Office) and PIPCU (The Police Intellectual Property Crime Unit) to enhance strategies and coordinate with stakeholders.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1541299777008-043857a47f07.jpg" length="283661" type="image/jpeg" />
      <pubDate>Fri, 26 Apr 2019 11:41:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-tackles-illegal-sports-streaming</guid>
      <g-custom:tags type="string">Illegal Sports Streaming,Ad Supported Piracy,Advertising Compliance,Ad Supply Chain,Advertising Networks</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1541299777008-043857a47f07.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1541299777008-043857a47f07.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Q4 2018 Report: 10% of All Ads on Popular IP Infringing Websites in Europe are From Major Brands</title>
      <link>https://www.white-bullet.com/q4-2018-report-10-of-all-ads-on-popular-ip-infringing-websites-in-europe-are-from-major-brands</link>
      <description>Major brands continue to appear on IP infringing websites in significant volumes</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Major brands continue to appear on IP infringing websites in significant volumes
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  White Bullet’s quarterly report tracks advertising data from the top 5000+ IP infringing websites from North America, South America, Europe and Asia-Pacific.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White%20Bullet%20Q4%202018%20Report_39V9oX0ETJiemEWiD1K6-960x1280.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;                                  White Bullet’s Q4 2018 report shows brands continue to play a major role in funding digital IP infringement through ad misplacement. White Bullet found that 40% of all ads on IP infringing websites in Q4 2018 were from branded campaigns, with 10% of all ads coming from major brands.
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;a href="https://www.tagtoday.net/pressreleases/project_brand_integrity" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
      Project Brand Integrity
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     – a joint initiative between White Bullet and TAG launched in February 2019 – looks to address the levels of major branded advertising appearing on IP infringing websites in Europe by advising advertisers about their presence on high risk pirate websites. Raising awareness by alerting brands at risk is important in the European market as major brands are appearing on high risk websites in significant volume, making up 10% of all ads found. Europe is second only to South America (13% of all ads) in prevalence of major branded ads.
      
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
      
  Sponsored content boxes also continue to represent a considerable proportion of the advertising found, making up 30% of all ads in Q4. Sponsored content boxes are advertising campaigns consisting of native advertising placed within content boxes and include multiple advertorials in a single inventory slot. The stakeholders within the digital advertising industry need to raise awareness of the extent to which these native networks increasingly fund digital IP infringement.
      
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
      
  Adult and Fraud &amp;amp; Malware 
    
                    
    
      
    
      
                      &#xD;
      &lt;i&gt;&#xD;
      &lt;/i&gt;&#xD;
      
                      
      
    
      
    
                    
    campaigns – known as high risk campaigns - are at comparable levels to Q3 2018, comprising 25% of all ads. Interestingly this figure is down from 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/q1-2017-perspective" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
      43% in Q1 2017
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    , demonstrating that IP infringing operators have been able to shift from lower-paying high risk ad campaigns to more branded and sponsored content campaigns, which often pay more.
      
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
      
  This pivot to higher paying advertising is quite likely due to an increase in use of 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/infringing-website-lists-iwls-as-france-looks-to-follow-the-lead-of-others-smart-blocklist-technology-is-needed-to-defeat-iwl-evasion-techniques" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
      blocklist evasion techniques
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    . These dynamic techniques, such as domain hopping and mirroring, enable IP infringing operators to receive higher paying advertising by moving their operations from domains on static blocklists to clean domains that are not known to the ad industry.
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
        
      
        
      
                      
      info@white-bullet.com
    
                    
    
      
    
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Thu, 28 Mar 2019 16:07:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q4-2018-report-10-of-all-ads-on-popular-ip-infringing-websites-in-europe-are-from-major-brands</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Trustworthy Accountability Group launches 'Project Brand Integrity' in partnership with White Bullet.</title>
      <link>https://www.white-bullet.com/the-trustworthy-accountability-group-launches-project-brand-integrity-in-partnership-with-white-bullet</link>
      <description>The Trustworthy Accountability Group launches 'Project Brand Integrity' in partnership with White Bullet.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Trustworthy Accountability Group launches 'Project Brand Integrity' in partnership with White Bullet.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Project Brand Integrity has been designed primarily to protect European brands from association with illegal stolen content by alerting advertisers or their agencies to ads running on pirate sites in Europe.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/photo-1508780709619-79562169bc64.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
      
    
      
    
                    Project Brand Integrity has been designed primarily to protect European brands from association with illegal stolen content by alerting advertisers or their agencies to ads running on pirate sites in Europe.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Ads appearing on these websites are harmful to brands in two distinct ways:
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;ol&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
        
      
        
      
                      
      They waste companies' digital advertising spend.
    
                    
    
      
    
      
                      &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
                        
        
      
        
      
                      
      They compromise the integrity of the brand, and by extension the integrity of the agency that placed  the adverts on their behalf.
      
                      
      
        
      
        
                        &#xD;
        &lt;br/&gt;&#xD;
      &lt;/li&gt;&#xD;
    &lt;/ol&gt;&#xD;
    
                    
    
  
    
  
                  
  Both of these parties will benefit from Project Brand Integrity.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  Recognised experts in online IP risk protection, White Bullet Solutions Limited is in a unique position to partner in this important initiative with TAG in Europe.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  White Bullet actively collaborates with the European Commission and is also a signatory of the European Commission's 'Memorandum of Understanding on online advertising and IPR'. ( 
  
                  
  
    
  
    
                    &#xD;
    &lt;a href="https://bit.ly/2RWghF9"&gt;&#xD;
      
                      
      
    
      
    
                    
    https://bit.ly/2RWghF9
  
                  
  
    
  
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    
  
    
  
                  
   )
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  The data supplied to Project Brand Integrity originates from White Bullet's IPI Index™ : a growing, dynamic database of IP infringing websites and advertising. White Bullet's proprietary technology continuously learns about the techniques practised by those that run and monetise IP infringing sites.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  It's essential that the data comes from a dynamic source because the technology and strategies that drive IP infringing sites are continually evolving. Sites spin up and spin down rapidly, and no static list of sites is going to deal with the real-time nature of digital advertising. As soon as a list has been used to update a database, the data is already old.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  “Piracy is now a highly dynamic ecosystem, relying heavily on advertising revenue and continuing to damage the creative industries. We are delighted to be working with TAG on this new programme. It is an essential tool to raise awareness amongst brands and ad agencies so they can take steps to reduce the placement of advertising on IP infringing websites, so tackling the revenue of piracy and
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  protecting the brands” said Peter Szyszko CEO of White Bullet.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  To read more about the specifics of Project Brand Integrity, head over here. 
  
                  
  
    
  
    
                    &#xD;
    &lt;a href="https://bit.ly/2SrSNgf"&gt;&#xD;
      
                      
      
    
      
    
                    
    https://bit.ly/2SrSNgf
  
                  
  
    
  
    
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
    
  
    
  
                  
  If you are a brand guardian, owner or agency, you are welcome to talk to White Bullet about your brand's safety online anytime. [ info@white-bullet.com ]
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      
    
      
    
                    
    #detectanddemonetise
  
                  
  
    
  
    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg" length="528199" type="image/jpeg" />
      <pubDate>Tue, 12 Feb 2019 16:55:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/the-trustworthy-accountability-group-launches-project-brand-integrity-in-partnership-with-white-bullet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1540959733332-eab4deabeeaf.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How social media is being exploited to distribute illegal content</title>
      <link>https://www.white-bullet.com/how-social-media-is-being-exploited-to-distribute-illegal-content</link>
      <description>Social Media and the Distribution of Illegal Content</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
         “Cloaking”,
as outlined in our previous
article, is
a technique increasingly used by pirates to drive higher quality advertising to
their services by deceiving traditional ad industry brand safety tools. But let’s
examine how pirates are driving traffic to cloaking sites and what solutions
are needed to address the problem.
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0cm;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;      &lt;!--StartFragment--&gt;      &lt;a href="https://www.white-bullet.com/the-rise-of-cloaking-how-pirates-circumvent-traditional-brand-safety-tools-and-drive-advertising-revenue1" target="_top"&gt;&#xD;
        
            Cloaking
           &#xD;
      &lt;/a&gt;&#xD;
      
           is a technique by which
pirates create or otherwise manipulate a website with an innocent-sounding
domain name and non-infringing content to facilitate unauthorised live streams
of copyrighted content.Pirates will temporarily inject certain
webpages on cloaking websites with unauthorised live streams, which can only be
accessed via a direct link and will return to being non-infringing once the
live stream has finished. This deceives traditional ad industry brand safety
tools, enabling pirates to drive higher quality advertising to their services,
which often pays more per impression.However, the temporary and
direct-linking nature of cloaking websites creates a key problem for the operators of
cloaking websites: how do you drive users to these infringing links that will
only be active for a couple of hours?The answer: social media.The operators of cloaking websites
are exploiting the vast usership of social media to drive traffic to
temporarily infringing webpages on cloaking websites, and it just one way in
which the social media piracy ecosystem is growing.Facebook
           &#xD;
      &lt;u&gt;&#xD;
        &lt;a href="https://transparency.facebook.com/intellectual-property"&gt;&#xD;
          
             removed nearly 3
million posts that hosted or linked to pirated content in the first half of
2018
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/u&gt;&#xD;
      
           – a 20% increase from the first half of 2017.Specifically for the sports industry,
over
           &#xD;
      &lt;u&gt;&#xD;
        &lt;a href="https://www.viaccess-orca.com/blog/social-media-piracy-fight-back"&gt;&#xD;
          
             10,000
links to illegal live streams of last summer’s World Cup
            &#xD;
        &lt;/a&gt;&#xD;
      &lt;/u&gt;&#xD;
      
           were
found on the three most popular social media networks, accounting for a
viewership of over 40 million – an increase of 100% compared to the 2014 World
Cup.Groups and forums dedicated to
distributing links to pirated content frequently number more than 500,000+
members or subscribers, with rightsholders often critical of the response time
of social media networks to their take-down requests.The entertainment industry is most affected by cloaking
websites popularised through social media, as cloaking is oriented towards
time-sensitive live streams such as sports, fashion, TV content. The damage
done to the entertainment industry is alarming. Digital TV research estimate
           &#xD;
      &lt;a href="https://www.broadbandtvnews.com/2017/10/30/online-tv-movie-piracy-losses-to-soar-to-52-billion/"&gt;&#xD;
        
            over
$52 billion in revenue will be lost to the TV and film industry alone by 2022,
           &#xD;
      &lt;/a&gt;&#xD;
      
           with social media platforms playing a significant role in the growth of digital
piracy.Social media platforms are unlikely to know which webpages
pose IP infringement risk in the short window that these links are active.Only real-time scoring technology can accurately identify which
webpages infringe IP in the time schedules required to combat cloaking ,White Bullet’s IPI Index™ continually scores webpages
for IP infringement risk in real time, giving social media companies instant
and dynamic ability to assess which links on their networks lead to IP
infringing content.
           &#xD;
      &lt;i&gt;&#xD;
        
            For more information
on cloaking, advertising safety and IP infringement please contact
            &#xD;
        &lt;a href="http://mailto:info@white-bullet.com/"&gt;&#xD;
          
             info@white-bullet.com
            &#xD;
        &lt;/a&gt;&#xD;
        
            or
visit
            &#xD;
        &lt;a href="http://www.white-bullet.com/"&gt;&#xD;
          
             www.white-bullet.com
            &#xD;
        &lt;/a&gt;&#xD;
        
            .
           &#xD;
      &lt;/i&gt;&#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1519944518895-f08a12d6dfd5.jpg" length="259384" type="image/jpeg" />
      <pubDate>Sun, 09 Dec 2018 17:13:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/how-social-media-is-being-exploited-to-distribute-illegal-content</guid>
      <g-custom:tags type="string">Brand Reputation,Social Media,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1519944518895-f08a12d6dfd5.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1519944518895-f08a12d6dfd5.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>AppNexus integrates White Bullet’s IPI Index™ to reduce ad placement on IP infringing services</title>
      <link>https://www.white-bullet.com/appnexus-integrates-white-bullets-ipi-index-to-reduce-ad-placement-on-ip-infringing-services</link>
      <description>White Bullet and AppNexus Collaborate to Filter out High Risk IP Infringing Publishers</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           White Bullet and AppNexus Collaborate to Filter out High Risk IP Infringing Publishers
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:RelyOnVML&gt;&lt;/o:RelyOnVML&gt;
  &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0cm;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;
	mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;      &lt;!--StartFragment--&gt;                                       White Bullet is delighted to
announce this ground-breaking collaboration with
           
                      &#xD;
      &lt;a href="https://www.appnexus.com/"&gt;&#xD;
        
                        
            AppNexus
           
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
           as a major step forward in
preventing ad funding of IP infringing websites and apps.Xandr owned AppNexus is the first
digital ad exchange to fully integrate the IPI Index™ into its platform. This marks
an innovative and pioneering step from a leading programmatic ad exchange to
remove notorious IP infringing websites and apps from the digital ad ecosystem.Through this new initiative,
AppNexus will protect the reputation of advertisers and demonetise infringing
services by calling on White Bullet’s IPI Index™ to filter out high-risk
services on a continuous basis. The programme will keep up with the dynamic
nature of IP infringing services, by removing high risk redirects and masked
domains as well as static domains.White Bullet’s IPI Index™
is a vast and dynamic global database of websites and apps each continually scored
for digital IP infringement risk. It gathers data about domains and apps,
assesses IP infringements and uses predictive machine learning to dynamically
score each domain or application in real-time, making it the preferred tool
that can cope with the evolving digital piracy ecosystem.“
           
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
            By filtering out IP infringing services from the dynamic programmatic
ecosystem, AppNexus is taking a serious and effective step to eliminate
ad-funded IP infringement and properly protect brands
           
                      &#xD;
      &lt;/i&gt;&#xD;
      
                      
           ” said Peter Szyszko,
CEO of White Bullet. “
           
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
            This shows real
innovation from both AppNexus and White Bullet to use technology to help
advertisers and IP owners alike
           
                      &#xD;
      &lt;/i&gt;&#xD;
      
                      
           ”.The partnership between AppNexus
and White Bullet will now go further to develop pre-bid filtering in the
AppNexus data marketplace, scoring individual URLs in real-time.For more information contact
info@white-bullet.com.

                      &#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg" length="230571" type="image/jpeg" />
      <pubDate>Fri, 07 Dec 2018 14:12:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/appnexus-integrates-white-bullets-ipi-index-to-reduce-ad-placement-on-ip-infringing-services</guid>
      <g-custom:tags type="string">Case Study</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/bert-sz-rhNff6hB41s-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The rise of cloaking: how pirates circumvent traditional brand safety tools and drive advertising revenue</title>
      <link>https://www.white-bullet.com/the-rise-of-cloaking-how-pirates-circumvent-traditional-brand-safety-tools-and-drive-advertising-revenue1</link>
      <description>How pirates are using cloaking to deceive traditional brand safety tools</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How pirates are using cloaking to deceive traditional brand safety tools
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            “Cloaking” is an increasingly prevalent technique used by pirate websites to avoid being flagged as high risk.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Traditional brand safety tools, used by the ad industry to check if a website is safe for ad placement, cannot keep up with the dynamism of this phenomenon, highlighting the importance of scoring publisher websites for IP infringement risk in real-time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s real-time scoring system for IP infringement is using advanced technology to address this problem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/0_OjqRkE0TxSqaIG4nw9ZA-982x441.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloaking is a technique by which pirates set up or interact with a website with an innocent-sounding domain name and non-IP infringing content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, just before a popular sporting (or other live stream) event begins, an unauthorised stream is injected into the previously non-infringing URL, either by the website itself or through manipulation of the website by external pirates.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Links to the infringing content are then posted in social media networks minutes before the stream goes live.After the live event ends, the unauthorised streams are removed, and the webpage reverts to the original “brand safe” content. This circumvents traditional “lazy” keyword-based flagging for IP infringing websites, avoids any form of “static” blocklist, and frustrates weak techniques that classify only on website type, demography or overall content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In essence, only specific webpages temporarily become IP infringing during certain specific times of the week.This means advertising flows and funds the website both when it has non-infringing content presented, and during the distribution of illegal or unauthorised content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A prime example of a website manipulated by cloaking is
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.healthfirstnews.com/"&gt;&#xD;
      
           healthfirstnews.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           which appears to be safe from IP infringement for much of the time and has no IP infringing streams or indeed any streaming content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, White Bullet’s dynamic scoring technique analysed that website during play time for recent Premier League football matches and found
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           healthfirstnews.com
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           hosted many illegal streams of those matches as they were being played live. In all cases, premium advertising was being placed against, and therefore funding, those infringing streams.White Bullet found
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           healthfirstnews.com
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           is one of the hundreds of cloaking websites used by pirates to enable and monetise illegal live streaming.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloaking should not be confused with URL masking, where the URL appears to be brand safe in name but consistently displays unsafe content on the webpage. Cloaking will see the IP infringing URL return to non-infringing content once the live stream has ended.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The practice of cloaking is deceiving traditional ad industry brand safety tools into evaluating IP infringing websites as non-infringing, and therefore brand safe, in two key ways. Firstly, as cloaking websites only infringe intellectual property for a few hours each week and at irregular intervals, many traditional brand safety tools currently deployed by the digital advertising industry evaluate these websites statically as non-infringing. Secondly, the use of cloaking websites is highly dynamic, with pirates deploying multiple and ever-changing cloaking domains to hide their illegal activity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Without dynamic next-generation brand safety tools that score websites for IP infringement risk in real-time, cloaking websites will continue to be saturated with advertising, putting brands at risk. Brands and ad companies alike need to be aware of these techniques and adopt the technology needed to address it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more information on cloaking, advertising safety and IP infringement please contact
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://mailto:info@white-bullet.com/"&gt;&#xD;
      
           info@white-bullet.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           or visit
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.white-bullet.com"&gt;&#xD;
      
           www.white-bullet.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1562575214-da9fcf59b907-ea868510.jpg" length="785508" type="image/png" />
      <pubDate>Thu, 06 Dec 2018 09:43:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/the-rise-of-cloaking-how-pirates-circumvent-traditional-brand-safety-tools-and-drive-advertising-revenue1</guid>
      <g-custom:tags type="string">Ad Supported Piracy,Digital Piracy</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1562575214-da9fcf59b907-ea868510.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1562575214-da9fcf59b907-ea868510.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Engaging With Chinese and Other Asian Authorities To Prevent Ad Funded IP Infringement</title>
      <link>https://www.white-bullet.com/white-bullet-engaging-with-chinese-and-other-asian-authorities-to-prevent-ad-funded-ip-infringement</link>
      <description>Speaking at the 2018 China-EU Conference on IPR Protection Online and Innovation , White Bullet CEO Peter Szyszko laid out the scope and scale of ad funded digital IP infringement and potential risks posed to the Chinese digital ad market</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/2a59779c-074d-4d8d-9d5c-83e0ab251c7e-original-969x1288.jpeg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman",serif;}
&lt;/style&gt;
&lt;![endif]--&gt;      &lt;!--StartFragment--&gt;                                  Speaking at the 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://ipkey.eu/en/china/activities/china-eu-conference-innovation-and-online-ip-protection"&gt;&#xD;
        
                        
        
      
        
      
                      
      2018
China-EU Conference on IPR Protection Online and Innovation
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    , White
Bullet CEO Peter Szyszko laid out the scope and scale of ad funded
digital IP infringement and potential risks posed to the Chinese digital ad market.The conference – which was held in Xiamen, China - was
jointly organised by EU IPKey and CAASA (China Anti-Infringement &amp;amp;
Anti-Counterfeit Innovation Strategic Alliance) to promote
collaboration between China and the European Union on IP rights protection online.Collaboration between European and Chinese rightsholders is fundamental to the global knowledge economy. With efforts underway for IP rightsowners and advertising industries to fight IP infringement in Europe and the US, China - and more broadly Asia - is looking to develop similar initiatives.Global cooperation is needed to defund digital piracy. White
Bullet is working the European Commission and welcomes this joint initiative from two of the world’s largest markets, and will continue to collaborate and engage with 
    
                    
    
      
    
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        
      
        
      
                      
      Follow the Money i
    
                    
    
      
    
      
                      &#xD;
      &lt;/i&gt;&#xD;
      
                      
      
    
      
    
                    
    nitiatives
    
                    
    
      
    
      
                      &#xD;
      &lt;i&gt;&#xD;
      &lt;/i&gt;&#xD;
      
                      
      
    
      
    
                    
    worldwide to help ensure misplaced ad revenue is not funding illegal
operators.
      
                      &#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Team2.png" length="633228" type="image/png" />
      <pubDate>Tue, 20 Nov 2018 08:59:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-engaging-with-chinese-and-other-asian-authorities-to-prevent-ad-funded-ip-infringement</guid>
      <g-custom:tags type="string">IP Protection,Advertising Compliance,IPR Protection,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Team2.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/Team2.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q3 2018 Report: Why Are Ad Companies with IP Compliance Commitments Still Funding Digital Piracy and Counterfeiting?</title>
      <link>https://www.white-bullet.com/white-bullet-q3-report-why-are-ad-companies-with-ip-compliance-commitments-still-funding-digital-piracy-and-counterfeiting</link>
      <description>Ad Companies are Not Fulfilling their IP Compliance Commitments.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ad Companies are Not Fulfilling their IP Compliance Commitments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/Q3%202018%20-%20Allegedly%20Compliant%20Ad%20Companies-959x1280.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman",serif;}
&lt;/style&gt;
&lt;![endif]--&gt;      &lt;!--StartFragment--&gt;                                  White Bullet’s Q3
2018 data found that 31% of the ad companies involved in ad placement to pirate
and counterfeit websites have taken the TAG Antipiracy Pledge or are signatories to EU MOU on Advertising and IPRs (EUMOU).These companies have
committed to minimise misplaced advertising on websites that infringe
intellectual property. This is a five percent increase since
Q2 2018.Most of these ad
companies operate within the programmatic ecosystem and have adopted
self-regulatory measures or non-piracy specific brand safety solutions to
ensure they are not inadvertently funding illegal pirate and counterfeit
websites.White Bullet’s Q3 data
clearly shows that without IP focussed tools that can assess IP infringement risk
in real time and at scale, the programmatic ecosystem will continue to provide
illegal operators with ad revenue.That ad revenue is
coming from significant campaigns (branded ad campaigns represented 76% of all
campaigns in Q3).
      
                      &#xD;
      &lt;!--StartFragment--&gt;      &lt;a href="https://www.white-bullet.com/contact-us"&gt;&#xD;
        
                        
        
      
        
      
                      
      Contact White Bullet
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     today to ensure you are IP compliant.
    
                    
    
      
    
      
                      &#xD;
      &lt;!--EndFragment--&gt;      &lt;br/&gt;&#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Fri, 09 Nov 2018 16:39:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-q3-report-why-are-ad-companies-with-ip-compliance-commitments-still-funding-digital-piracy-and-counterfeiting</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Should You Care if Your Brand is Advertising on an IP Infringing Website?</title>
      <link>https://www.white-bullet.com/why-should-you-care-if-your-brand-is-advertising-on-an-ip-infringing-website</link>
      <description>Major Brands Increasingly Found on IP Infringing Websites</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         Having your ads appear on IP infringing websites causes damage to your brand’s reputation, funds criminal operators and puts users at risk.
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1519944518895-f08a12d6dfd5.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
           After it was revealed last year that many reputable brands had their advertising appear next to high risk content – including IP infringing websites - many
           
                      &#xD;
      &lt;a href="http://adage.com/article/aarp-media-sales/true-costs-ignoring-online-brand-safety/310378/"&gt;&#xD;
        
                        
            reputable brands re-evaluated their advertising operation
           
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
           s in a reactive effort to minimise the damage caused.But why should brands care if their ads are appearing on IP infringing websites? What real damage does ad misplacement cause to brands?
           
                      &#xD;
      &lt;b&gt;&#xD;
        
                        
            Appearing next to infringing content damages the reputation of brands
           
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
           Brand equity is an intangible asset. The profitability of your brand is directly linked to how your customers regard it.Having your branded advertising appear on IP infringing websites can cause considerable damage to your brand’s reputation as consumers will question the principles underlying your company’s marketing strategy when they see the brand funding criminal activity.Ad revenue funds illegal operators and causes economic damage to the creative IndustriesIP infringing websites rely on ad revenue to function. Without it, most would be unable to operate.But ad revenue does not just keep IP infringing websites afloat, it makes pirate websites a highly lucrative proposition for criminals.
           
                      &#xD;
      &lt;a href="https://www.tagtoday.net/piracy/measuringdigitaladrevenuetoinfringingsites"&gt;&#xD;
        
                        
            Ad revenue linked to digital infringing content was estimated to be over $110m in 2017.
           
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
           The ability of pirate websites to offer free content causes immense economic damage to the creative industries by diverting users away from legitimate licensed media channels. Piracy is set to cost the global TV and film industry upwards of
           
                      &#xD;
      &lt;a href="https://www.digitaltveurope.com/2017/10/30/piracy-to-cost-tv-and-film-industry-us52bn-by-2022/"&gt;&#xD;
        
                        
            $52 billion dollars in 2022.
           
                      &#xD;
      &lt;/a&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
            Reputable branded advertising lends pirate websites credibility, putting users at risk
           
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
           Having advertising from reputable brands appear on IP infringing websites gives them credibility in the eyes of consumers. It begs the question: if the website is illegitimate, why would such a well-known brand be advertising there?This false legitimacy encourages further engagement with the website, exposing the user to a risk of malware infection. Not only do many files containing the infringing content contain viruses and malware, the digital advertising ecosystem is also littered with
           
                      &#xD;
      &lt;a href="https://www.welivesecurity.com/2018/03/21/pirate-websites-malware-study/"&gt;&#xD;
        
                        
            malvertising
           
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
           – a form of advertising that can infect users with malware, often without their knowledge.White Bullet’s IPI Brand Monitoring solutions can protect your brand equity and ensure you are not inadvertently funding criminal activityWhite Bullet’s IPI Index™ uses machine learning to identify and score millions of pirate URLs in real time. Websites scored as high risk are monitored for advertising from multiple territories to get national advertising data.White Bullet’s IPI Brand Monitoring solutions alert you if we find your advertising is being misplaced on IP infringing websites. The IPI Index™ identifies the ad companies responsible for misplacing your advertising, giving you the transparency required to take action to ensure your brand’s reputation is safe.Contact us today to find out how White Bullet can protect your brand equity and ensure you are not inadvertently funding IP infringing websites.
           
                      &#xD;
      &lt;b&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/b&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg" length="237524" type="image/jpeg" />
      <pubDate>Mon, 10 Sep 2018 14:45:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/why-should-you-care-if-your-brand-is-advertising-on-an-ip-infringing-website</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1508896080210-93c377eb4135.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What is a High Risk IP Infringing Website?</title>
      <link>https://www.white-bullet.com/what-is-a-high-risk-ip-infringing-website</link>
      <description>Intellectual property (IP) infringing websites distribute unauthorised and sometimes illegally copied digital content. Colloquially known as pirate websites, they allow users to download or stream a variety of digital content through illegitimate distributors, often for free by relying on advertising revenue.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many brands and ad companies do not fully understand what an IP infringing website is and lack the tools to correctly assess websites for IP infringement risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Intellectual property (IP) infringing websites distribute unauthorised and sometimes illegally copied digital content. Colloquially known as pirate websites, they allow users to download or stream a variety of digital content through illegitimate distributors, often for free by relying on advertising revenue.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Any type of digital content that can be found through legitimate licensed means can also be found on IP infringing websites. Pirate websites can broadly be categorised into three different types:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://euipo.europa.eu/ohimportal/documents/11370/80606/Digital+Advertising+on+Suspected+Infringing+Websites"&gt;&#xD;
      
           hosting, linking, and BitTorrent websites.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Types of IP infringing websites
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hosting websites act as storage servers that permit users to upload and store media files in the cloud. Once a media file is uploaded, a user can generate a link to access that file again, either themselves or for others to use the link to obtain the content.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Linking websites aggregate links to media content that is stored on hosting websites. They often categorise links by content type and then offer search facilities and suggestions, so users can quickly find content.BitTorrent websites enable specific peer-to-peer (also known as P2P) file transfers over the Internet.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Unlike hosting websites where one user uploads content to the cloud for others to download, P2P file transfers allow users to upload and download content simultaneously, sharing pieces of file data back and forth with each other until everyone has completed downloading the files they want.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Smart technology is needed to assess websites for IP infringement risk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The volume of IP infringing websites and complexity of the digital advertising ecosystem presents a risk to brands and advertisers: how can you be sure that your advertising or traffic is not being served to pirate websites without assessing each publisher for IP infringement risk?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           T
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           housands of new pirate domains appear every day as new platforms emerge and others hop domain names to avoid detection from law enforcement and rights-holders. Without the use of smart technology, it is impossible to keep up with the dynamism of the digital piracy ecosystem and score all potentially infringing websites for IP infringement risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s IPI Index™ gives brands and ad companies complete protection from IP infringing websites
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s IPI Index™ uses machine learning to score millions of URLs for IP infringement risk daily.The IPI Index™ looks at over 400 dynamic data points on each website, enabling White Bullet’s proprietary algorithm - developed by IP and ad industry experts - to score every website for IP infringement risk to a global standard.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The intelligence gathered by the IPI Index™ can be used by brands and advertising companies in several ways to ensure complete digital ad protection against IP infringing websites.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s IPI Risk Profiling solutions give advertising companies the ability to verify domains for IP infringement risk before ad bidding. The IPI Watchlist solution enables advertising companies to create their own dynamic watchlists of high risk domains, and the IPI Scoring solution in addition allows ad companies to assess their own inventories for IP infringement risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Any website that is scored as high risk by the IPI Index™ is monitored for advertising. White Bullet’s IPI Brand Monitoring solutions alert brands if their advertising is found on high risk IP infringing domains.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The IPI Index™ captures screenshots of the webpage and harvests intermediary data that can pinpoint the advertising companies responsible for misplacing the ad, providing the transparency needed to take action and ensure the safety of each brand’s reputation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           White Bullet’s IPI Brand Alert provides basic protection, tracking one brand and issuing monthly data reports. White Bullet’s IPI Brand Protect provides deeper brand protection, tracking up to 10 brands and issue weekly data reports. Monthly impact reports are also issued which track progress over time and compares your data to anonymised competitors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
           Contact White Bullet
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today to make use of our market leading intelligence.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg" length="256878" type="image/jpeg" />
      <pubDate>Mon, 10 Sep 2018 14:40:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/what-is-a-high-risk-ip-infringing-website</guid>
      <g-custom:tags type="string">High Risk Websites,Programmatic Advertising,Advertising Compliance,ad funded piracy,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Is Your Brand Funding IP Infringing Domains?</title>
      <link>https://www.white-bullet.com/is-your-ad-budget-funding-high-risk-domains</link>
      <description>Advertising is often the sole source of revenue for these illegal operators, and damage is being caused to consumer confidence and brand equity by inadvertently placing ads on these illicit websites and apps. The loss of tax revenue caused by pirate and counterfeit vendors is also harming governments.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Without integrating White Bullet’s ad safety solutions into your digital marketing operations, part of your advertising budget could be ending up in the hands of pirates.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/photo-1529236183275-4fdcf2bc987e.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
      Ad revenue received by websites infringing intellectual property exceeds 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.tagtoday.net/hubfs/Measuring%20digital%20advertising%20revenue%20to%20infringing%20sites.pdf?t=1507150221706"&gt;&#xD;
        
                        
        
      
        
      
                      
      hundreds of millions of dollars per year
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    .
    
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
      A significant portion of this revenue comes from the ad budgets of reputable brands. White Bullet found that 70 of the top 100 global advertisers had an advertising presence on IP infringing websites in 2017.The reason why so many reputable brands are appearing on IP infringing websites is not rooted in an unwillingness to tackle the issue. Rather, it is rooted in three causes: the complex and non-transparent nature of digital advertising, the ability of IP infringing websites to avoid detection, and a lack of dynamic ad safety tools available to brands.The millions of digital advertising transactions that happen every day make the ecosystem extremely complex and non-transparent. With so many advertising companies involved in the supply chain for each impression, it is incredibly difficult to figure out who is responsible for placing ads on high risk publishers.This complexity and inability to trace or fully understand the supply chains of ads means reputable brands have often served millions of impressions to IP infringing websites before they are even aware of the issue or how to fix it. By that time brand reputational damage has already occurred and the pirates have their money.Combine this complexity with the dynamic ability of pirate domains to circumvent law enforcement efforts to demonetize them and it is easy to see why so many reputable brands have an advertising presence on IP infringing websites.When a website becomes notorious for IP infringement, ad industry bodies, rights holders, and law enforcement officials will often lead efforts to blocklist them in an attempt to cut off their ad revenue.To avoid this, pirate websites engage in many blocklist evasion techniques, such as domain hopping.Once an IP infringing website gains a wide enough audience and becomes well known to rights holders and law enforcement agencies, the website will hop to a new, clean domain name that is certain to not be included on any static blocklists.Ad safety tools – such as static blocklists – lack the dynamism and intelligence to keep up with evasion techniques used by IP infringing domains. This lack of dynamism results in premium branded advertising placed by renowned ad exchanges being served to IP infringing domains.White Bullet’s IPI Risk Profiling solutions – powered by White Bullet’s IPI Index™ - tackle the dynamism of the pirate domain ecosystem, giving brands and advertising companies the ability to verify domains for IP infringement risk before bidding.White Bullet’s IPI Index™ is an ever-expanding repository of websites, each assessed and scored for IP infringement risk daily. The IPI Index™ identifies websites involved in domain hopping and other evasion techniques through machine learning, meaning it can prevent your ad budget finding its way into the hand of pirates no matter how sophisticated they are in avoiding detection.White Bullet’s IPI Brand Monitoring solutions can also pinpoint the non-compliant advertising partners responsible for misplacing your branded advertising.Websites that have been certified as IP infringing by the IPI Index™ are tracked for advertising, alerting you if we find your branded advertising on high risk IP infringing websites. White Bullet provides you with screenshots and all the pertinent information about the advertising companies involved in the misplacement of the ad. This gives you the transparency to act against the advertising companies responsible for putting your brand’s reputation at risk.Contact us today to find out how you can integrate White Bullet IPI Risk Profiling and Brand Monitoring solutions into your digital marketing operations.
    
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1529236183275-4fdcf2bc987e-1920x1285.jpg" length="100305" type="image/jpeg" />
      <pubDate>Mon, 10 Sep 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/is-your-ad-budget-funding-high-risk-domains</guid>
      <g-custom:tags type="string">IP infringement,Advertising Compliance,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/photo-1529236183275-4fdcf2bc987e.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/photo-1529236183275-4fdcf2bc987e-1920x1285.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Proactive, Not Reactive: Brands and Ad Companies Must Adopt Dynamic Pre-bid Safety Tools to Protect Their Brand Equity</title>
      <link>https://www.white-bullet.com/proactive-not-reactive-brands-and-ad-companies-must-adopt-dynamic-pre-bid-safety-tools-to-protect-their-brand-equity</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  White Bullet's IPI Index scores millions of URLs for IP infringement risk on an hourly basis, giving advertisers a proactive ad safety solution that offers 360° protection.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/whitebullet%20logo%20480%20x%20480_YuVYkC9PRn6z3JzYXCOy-480x123.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;                                  “Too many companies are addressing their brand safety issues in a decentralized, piecemeal, and reactive manner”, according to the 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://martechseries.com/sales-marketing/programmatic-buying/brand-safety-institute-launches-educate-accredit-brand-safety-execs-digital-ad-industry/"&gt;&#xD;
        
                        
        
      
        
      
                      
      Brand Safety Institute's co-founder Neal Thurman.
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      In the context of ad misplacement on pirate websites, Thurman is right. Addressing the issue of ad misplacement in a reactionary manner is not a sufficient solution to the two fundamental issues at hand: brand equity damage and the inadvertent funding of illegal websites.The complex and non-transparent nature of programmatic advertising means brands have often 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://www.brandsafecheck.com/"&gt;&#xD;
        
                        
        
      
        
      
                      
      inadvertently served millions of impressions to pirate websites
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     before they are even aware of the issue. By that time brand reputational damage may have already occurred and the illegal operators have their money.A reactive solution is needed to fix the damage caused, but to ensure that ad misplacement on pirate websites is avoided in the future, brands and advertising companies must adopt proactive and dynamic tools.Proactive tools – 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.linkedin.com/pulse/infringing-website-lists-iwls-france-looks-follow-lead-dana-neale/"&gt;&#xD;
        
                        
        
      
        
      
                      
      such as infringing website lists and static blacklists
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     – are currently being used by both brands and advertisers. However, these tools cannot compete with the dynamism found within the pirate domain ecosystem.Pirate domains are constantly hopping to new domain names to avoid detection, as well as setting up mirroring domains to dilute their audience base among many different domain names.Blacklists that do not address these evasion techniques used by pirate websites leave advertisers at risk of ad misplacement.This risk is demonstrable. whiteBULLET found that out of the top 100 global companies by ad expenditure, 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.linkedin.com/pulse/why-dynamic-risk-scoring-needed-tackle-brand-safety-crisis-dana-neale/"&gt;&#xD;
        
                        
        
      
        
      
                      
      70 had their branded advertising appear on piracy sites in 2017
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    . Many of these brands are actively using IWLs and static blacklists, but these lists have failed to protect them from placing ads on pirate websites.whiteBULLET’s IPI Index is the proactive tool that can tackle the dynamism of the pirate domain ecosystem. The IPI Index is the most up-to-date watchlist of high risk pirate websites available on the market. Using machine learning, the IPI Index scores and rescores millions of URLs on an hourly basis for IP risk, whilst also automatically detecting any domains which are engaged in evasion techniques such as domain hopping.The IPI Index can be utilised by brands and advertisers alike. Brands can use the watchlists to inform advertising partners what sites they want to avoid, whilst ad companies can integrate the IPI Index into their platform, giving buyers the option of comprehensive protection from their ads being served to IP infringing websites.The IPI Index is the proactive tool that ensures no reactionary tools are required. Contact whiteBULLET to make use of our IPI Index today.
      
                      &#xD;
      &lt;em&gt;&#xD;
        
                        
        
      
        
      
                      
      info@white-bullet.com
    
                    
    
      
    
      
                      &#xD;
      &lt;/em&gt;&#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1496181133206-80ce9b88a853.jpg" length="175888" type="image/jpeg" />
      <pubDate>Wed, 08 Aug 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/proactive-not-reactive-brands-and-ad-companies-must-adopt-dynamic-pre-bid-safety-tools-to-protect-their-brand-equity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1496181133206-80ce9b88a853.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1496181133206-80ce9b88a853.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q2 2018 Report: Branded Ad Campaigns on IP Infringing Websites at Historically High Levels</title>
      <link>https://www.white-bullet.com/q2-report</link>
      <description>Advertising is often the sole source of revenue for these illegal operators, and damage is being caused to consumer confidence and brand equity by inadvertently placing ads on these illicit websites and apps. The loss of tax revenue caused by pirate and counterfeit vendors is also harming governments.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Branded Ad Campaigns Accounted for 76% of All Ads Found on IP Infringing Websites.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White-bullet-Q2-2018-V3.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
      
    
      
    
                    The percentage of branded advertising on IP infringing websites has increased for the seventh consecutive quarter.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  White Bullet’s Q2 2018 report found branded ad campaigns made up 76% of all advertising on IP infringing websites.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  This figure stood at 52% in Q4 2016 and has increased every quarter since.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Major branded ad campaigns – advertising from premium household names – also increased in Q2, making up 20% of all branded ad campaigns.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Interestingly, this increase in major branded advertising comes in the same quarter as the signing of the EU Commission’s Memorandum of Understanding on Advertising and IPRs (EU MOU).
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Signatories to the EU MOU – many of which are brand associations with members found in WhiteBullet's Q2 ad data – agree to minimise the placement of advertising on websites and mobile apps that infringe third party IP.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Premium brands risk further governmental scrutiny and damages brand reputation unless proactive brand safety tools that can specifically address the dynamism of the piracy domain ecosystem are adopted.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  The gambling sector continues to be the largest sector found on IP infringing websites, with 63% of all branded ad campaigns coming from gambling brands. In Q1 2018, this figure stood at 60%.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  This increase can be attributed to a rise in gambling campaigns during the World Cup, indicating that gambling operators must ensure they implement IP-specific brand safety tools on all campaigns, even during times of high demand.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  White Bullet’s Q2 data also found that 26% of the ad companies serving ads to IP infringing websites are engaged in compliance initiatives such as the TAG Anti-Piracy Group and the EU MOU.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  It seems the brand safety tools adopted by major ad companies are not being implemented on all campaigns or these tools lack the dynamism and intelligence to deal with the specific issue of advertising on pirate websites.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  Much like premium brands, ad companies must adopt dynamic and IP-specific brand safety tools which can effectively deal with the quickly evolving piracy ecosystem in order to achieve IP compliance.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
      
    
      
    
                    
  White Bullet’s IPI Risk Profiling solutions provide real-time intelligence on IP infringing domains, giving ad companies the ability to filter out high risk publishers before bidding.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
    Contact White Bullet
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
   today to ensure you are IP compliant.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202018%20Q2.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 02 Jul 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q2-report</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Signs EU Commission's MOU on Online Advertising and IPR</title>
      <link>https://www.white-bullet.com/white-bullet-signs-eu-commission-s-mou-on-online-advertising-and-ipr-launches-free-global-piracy-index-to-assist-signatory-compliance</link>
      <description>Advertising is often the sole source of revenue for these illegal operators, and damage is being caused to consumer confidence and brand equity by inadvertently placing ads on these illicit websites and apps. The loss of tax revenue caused by pirate and counterfeit vendors is also harming governments.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--StartFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    White Bullet representatives today signed the 
    
                    
    
    
  
  
                    &#xD;
    &lt;a href="https://ec.europa.eu/growth/industry/intellectual-property/enforcement/memorandum-of-understanding-online-advertising-ipr_en" target="_blank"&gt;&#xD;
      
                      
    
    
      
      
                      
      EU Commission’s Memorandum of Understanding
    
                    
    
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    
    
                    
     (MOU) on online advertising and intellectual property rights (IPR), along with many advertising stakeholders.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The initiative seeks to minimise ad funded IP infringement by requiring advertisers and brokers to avoid placement of ads on websites and apps that infringe copyright or disseminate counterfeit goods. It  recognises that these illegal platforms use the sale of advertising as a significant source of revenue.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Advertising is often the sole source of revenue for these illegal operators, and damage is being caused to consumer confidence and brand equity by inadvertently placing ads on these illicit websites and apps. The loss of tax revenue caused by pirate and counterfeit vendors is also harming governments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The sheer scale of ad-funded digital IP infringement has led to action by the EU Commission, underlying the importance of IP protection online.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The signatories to the MOU recognise the widespread damage to economic growth that is being caused and are signalling their intent to fix the issue.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    White Bullet embraces this agreement and has launched a free Global Piracy Index to help keep brand and advertising agencies compliant with some of the key terms of the MOU.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.globalpiracyindex.com/" target="_top"&gt;&#xD;
      
                      
    
    
      
      
                      
      Globalpiracyindex.com
    
                    
    
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    
    
                    
      is a freely accessible list of websites that have court orders against them relating to IPR infringement and launches this week. The Global Piracy Index also includes any websites listed in infringing website list (IWL) initiatives from around the world.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Pirate websites are 
    
                    
    
    
  
  
                    &#xD;
    &lt;a href="https://www.linkedin.com/pulse/infringing-website-lists-iwls-france-looks-follow-lead-dana-neale/"&gt;&#xD;
      
                      
    
    
      
      
                      
      constantly changing domain names and using other tactics to avoid detection and circumvent law enforcement.
    
                    
    
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    
    
                    
     It is no surprise to learn that the vast majority of pirate websites have no court orders against them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To truly ensure all steps have been taken to minimise ad misplacement, White BulletIPI Index™ can be integrated into the advertising operations of brands and agencies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    White Bullet's IPI Index™ evaluates all websites and not just those adjudicated by courts or enforcement bodies. It uses real time assessment and machine learning to analyse and score websites for IP infringement risk, evaluating over 400 data points and specialist criteria validated by IP owners, IP lawyers, and law enforcement.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are currently millions of domains scored in the IPI Index, making the IPI Index™ the global standard for online IP risk assessment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The IPI Index™ provides full protection against ad misplacement on pirate websites and offers a cost effective solution to protect brands.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg" length="432873" type="image/jpeg" />
      <pubDate>Mon, 25 Jun 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-signs-eu-commission-s-mou-on-online-advertising-and-ipr-launches-free-global-piracy-index-to-assist-signatory-compliance</guid>
      <g-custom:tags type="string">Press</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1521791055366-0d553872125f.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Can Ad Exchanges Do More to Combat Pirate Sites?</title>
      <link>https://www.white-bullet.com/can-ad-exchanges-do-more-to-combat-pirate-sites</link>
      <description>Real-time bidding (RTB) through programmatic ad exchanges has revolutionised the digital advertising industry. Juniper Research estimates RTB networks will generate $42 billion annually in advertising spend in 2021, up from $3.5 billion in 2016.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/PGP-660x364.png" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ﻿Real-time bidding (RTB) through programmatic ad exchanges has revolutionised the digital advertising industry.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Juniper Research estimates RTB networks will
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.juniperresearch.com/press/press-releases/ai-machine-learning-to-drive-%E2%80%98real-time-bid%E2%80%99-a"&gt;&#xD;
      
           generate $42 billion annually in advertising
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            spend in 2021, up from $3.5 billion in 2016. However, the instantaneous nature of programmatic exchanges combined with a lack of natively-integrated tools to dynamically verify publisher quality has led to exchanges
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.marketingweek.com/2017/03/29/ritson-google-brand-safety/"&gt;&#xD;
      
           brokering branded advertising on high risk publishers
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            that host adult, hate speech, or IP infringing content.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            White Bullet's
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.white-bullet.com/quarterly-report/"&gt;&#xD;
      
           quarterly reports
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            show ad exchanges are consistently found in the intermediary supply chain of ads served to pirate websites, indicating high risk websites are taking advantage of ad exchanges to gain funding.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Fearing the damage to the brand's reputation that may be caused by ad misplacement, many big brands have rethought their programmatic operations. Some brands, such as
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.adweek.com/digital/procter-gamble-cut-140-million-in-digital-ad-spending-because-of-brand-safety-concerns/"&gt;&#xD;
      
           P&amp;amp;G
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , have cut their ad spend by hundreds of millions of dollars and limited their digital marketing reach due to brand safety concerns.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Others –
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.iab.com/news/nearly-two-thirds-of-brands-purchasing-ads-through-programmatic-means-have-fully-or-partially-moved-the-function-in-house-according-to-iab-research/"&gt;&#xD;
      
           nearly two-thirds of all advertisers using programmatic exchanges
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - have fully or partially moved programmatic buying in-house in an attempt to ensure their branded advertising is never served to high risk publishers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Bringing programmatic buying in-house indicates the increasing importance advertisers are placing on brand safety, including anti-piracy verification, and widespread recognition of the lack of transparency provided in the digital advertising ecosystem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With real-time buying comes the need for real-time verification of publishers. If ad exchanges do not have accurate and dynamic risk assessments about the publishers where to which they serve ads, advertisers and brand equity will suffer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Dynamic risk scoring is imperative when it comes to ensuring brands are not funding criminals. Websites must be regularly reviewed to test and retest the quality of their content and site experience outside of the ad exchange ecosystem.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Further, as many IP infringing websites are
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/pulse/infringing-website-lists-iwls-france-looks-follow-lead-dana-neale/"&gt;&#xD;
      
           constantly changing their domain names to avoid detection
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , advertisers and ad exchanges cannot simply rely on static block-lists to ensure brand safety.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Smart technology that can accurately and instantly analyse the brand safety risk a publisher poses to an advertiser must be embraced by exchanges and directly integrated into their RTB technologies. At a minimum, ad exchanges should filter the lowest quality sites prior to sending bid requests to the exchange’s demand-side platform participants. Ad exchanges should also support third-party data integrations that enhance bid requests with additional dynamic sites scores for piracy risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            White Bullet's IPI Index and data service is the real-time solution needed. The
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/pulse/why-dynamic-risk-scoring-needed-tackle-brand-safety-crisis-dana-neale/"&gt;&#xD;
      
           IPI Index uses
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            machine learning and dynamic scoring to independently evaluate the brand safety risk a publisher poses to a brand in milliseconds. White Bullet's data-as-service solution can be integrated into existing RTB systems and can also be utilised by brands who are conducting in-house brand safety verification checks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If ad exchanges can get on top of ad misplacement by directly integrating AI-driven regulatory compliance technology, they will provide the transparency and safety needed to win back the trust of advertisers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1522204523234-8729aa6e3d5f.jpg" length="322218" type="image/jpeg" />
      <pubDate>Mon, 18 Jun 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/can-ad-exchanges-do-more-to-combat-pirate-sites</guid>
      <g-custom:tags type="string">Programmatic Advertising,Advertising Compliance,Real Time Bidding</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1522204523234-8729aa6e3d5f.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1522204523234-8729aa6e3d5f.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Infringing Website Lists (IWLs): As France looks to follow the lead of others, smart blocklist technology is needed to defeat IWL evasion techniques</title>
      <link>https://www.white-bullet.com/infringing-website-lists-iwls-as-france-looks-to-follow-the-lead-of-others-smart-blocklist-technology-is-needed-to-defeat-iwl-evasion-techniques</link>
      <description>Infringing Website Lists (IWLs): As France Looks to Follow the Lead of Others, Smart Blocklist Technology is Needed to Defeat IWL Evasion Techniques</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Françoise Nyssen, France’s Minister of Culture, admits any “blacklist” must be "constantly updated" to circumvent blocklist evasion techniques used by IP infringing websites. Due to sheer volume and dynamism of the online and mobile piracy ecosystems, keeping an effective list of infringing websites cannot be done through reliance on human review alone.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Smart use of artificial intelligence, as a trusted flagging mechanism for human review, is the way to manage this.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           France appears to be the latest country to adopt an Infringing Website List (IWL) as part of the French government’s strategy to demonetize pirate websites.Although IWLs have proven to be successful in limiting advertising revenue received by pirate websites in the past, the increased use of blocklist evasion techniques – such as domain hopping, automatic redirecting, and mirroring – is challenging the effectiveness of IWLs. Technology can help solve this.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Through “Operation Creative”, PIPCU – the City of London Police’s intellectual property crime unit – was the first to
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/pipcu/Pages/Operation-creative.aspx"&gt;&#xD;
      
                      
           develop an IWL
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            as part of a wider strategy to reduce financial and technical support to pirate websites. This included tackling the advertising revenue received.Initially developed in 2013, the PIPCU IWL comprises a list of websites, known to be unresponsive to law enforcement and each reviewed by police officers. Brands, advertising companies, and other Operation Creative stakeholders can use the IWL to identify illegal websites.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Based on ad monitoring data provided by White Bullet, in the twelve months from March 2016, PIPCU demonstrated a
          
                    &#xD;
    &lt;a href="https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/pipcu/pipcu-news/Pages/Operation-Creative-sees-64-per-cent-drop-in-UK-advertising-.aspx"&gt;&#xD;
      
                      
           64% decrease in advertising from the UK’s top ad spending companies
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            on IWL websites.In the wake of Operation Creative’s success since 2016, numerous countries have adopted similar approaches. Governments and law enforcement agencies recognise that the most effective anti-piracy strategy is to engage with brands and advertising companies to ensure they are not inadvertently funding illegal websites through advertising revenue – often their sole source of income.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://torrentfreak.com/danes-deploy-disruption-machine-to-curb-online-piracy-171119/"&gt;&#xD;
      
                      
           Denmark
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://jakartaglobe.id/showbiz-features/new-infringing-website-list-aims-to-reduce-online-piracy/"&gt;&#xD;
      
                      
           Indonesia
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.marketing-interactive.com/infringing-website-list-enlists-50-hk-brands-to-cut-pirate-ad-revenue/"&gt;&#xD;
      
                      
           Hong Kong
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.nst.com.my/news/nation/2017/10/289556/malaysia-launches-infringing-website-list-initiative-combat-digital"&gt;&#xD;
      
                      
           Malaysia
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            , and
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.taipeitimes.com/News/biz/archives/2017/09/05/2003677797"&gt;&#xD;
      
                      
           Taiwan
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            have all implemented IWL initiatives in one form or another. Françoise Nyssen’s comments suggest France could be the next to follow.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          White Bullet's Q4 2017 ad-tracking data from France shows 300 premium brands had placed advertising on pirate websites.However, despite the introduction of IWL initiatives being a positive development, and a way to highlight the problem within the advertising community, blocklist evasion techniques used by pirate websites have challenged first-generation static IWL methods.According to White Bullet, next-generation technologies should be implemented to keep infringing lists updated, tracking websites in real time and seriously impacting their ability to receive revenue from misplaced advertising.This is because AI and real-time, or dynamic, tracking can see past domain hopping and similar techniques used by pirate websites.
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Such technologies form the basis of version 2.0 IWL blocklisting.Domain hopping is an evasion technique used frequently. When Google receives large numbers of takedown requests for a particular infringing website, Google attempts to demote the website
          
                    &#xD;
    &lt;a href="https://torrentfreak.com/google-anti-piracy-agreement-will-target-domain-hopping-share-search-data-170307/"&gt;&#xD;
      
                      
           in their search engine results.
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Moreover, the more takedown requests a website has, the more likely it is to be placed on an IWL.To avoid this, pirate websites often hop to a new domain that has no takedown requests and may automatically redirect users to their new domain.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Mirroring – where two or more websites appear to be identical in everything other than protocol or domain name – is another technique used by pirate websites to stay off law enforcement’s radar. By mirroring its content across multiple domains, the website may dilute its takedown requests.Such blocklist evasion techniques keep pirate websites one step ahead of blocklists like the PIPCU IWL.As of May 8th, 2018, 36% of the domains listed in the PIPCU IWL have hopped, automatically redirect to, or mirror another infringing domain that is not included in the IWL.
         
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Although advertisers and brands know to avoid placing ads on domains in the PIPCU IWL, they will not necessarily be aware if any of those domains have hopped or automatically redirect to a new domain. Nor will they be aware of any websites that mirror domains in the IWL. Domains that have arisen as a result of blocklist evasion techniques should also be considered high risk.White Bullet has published multiple reports in the past showing brands and ad companies that have embraced the IWL are still inadvertently
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/pulse/why-dynamic-risk-scoring-needed-tackle-brand-safety-crisis-dana-neale/" target="_blank"&gt;&#xD;
      
                      
           misplacing advertising
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            on websites that infringe third party intellectual property , partly because legacy IWL methodologies still used in the industry fail increasingly to successfully combat new blocklist evasion techniques.Many ad companies, brands as well as governments and enforcement bodies turn to White Bullet to provide AI-driven regulatory compliance technology to address blocklist evasion techniques used by pirate websites.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
        
                        
            White Bullet'sIPI Index is a dynamic and ever-expanding platform analysing millions of IP infringing domains, each assessed and scored for IP infringement risk on a daily basis. Effectively, the IPI Index is the next generation IWL. White Bullet's AI-driven technology detects if a domain has hopped or automatically redirects to a new domain, as well as detecting mirroring relationships between infringing domains.To keep their blacklists up to date, keepers of IWLs must invoke dynamic AI-driven technology to stay ahead of circumvention and the anti-detection techniques deployed by pirate websites.To ensure you have the most up to date piracy watchlist on the market – one that eliminates the issue of blocklist evasion techniques –
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/contact"&gt;&#xD;
      
                      
           contact White Bullet
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            to make use of our IPI Index.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg" length="238460" type="image/jpeg" />
      <pubDate>Fri, 01 Jun 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/infringing-website-lists-iwls-as-france-looks-to-follow-the-lead-of-others-smart-blocklist-technology-is-needed-to-defeat-iwl-evasion-techniques</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1484807352052-23338990c6c6.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Top UK Gambling Companies Feel Pressure to Reduce Their Advertising on IP Infringing Websites</title>
      <link>https://www.white-bullet.com/top-uk-gambling-companies-feel-pressure-to-reduce-their-advertising-on-ip-infringing-websites</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  White Bullet's ad monitoring service, which identifies fraudulent affiliates, drives progress in reducing frequency of ads served on IP infringing websites.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/SDFSD_knwTNWaVS1mHztUk5uvV-307x242.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;                                  In the wake of 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://news.cityoflondon.police.uk/r/842/operation_creative_prevents_millions_of_pounds_en"&gt;&#xD;
        
                        
        
      
        
      
                      
      pressure from the UK Gambling Commission
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     and use of White Bullet's smart technology, many of the UK’s top gambling companies have drastically reduced their advertising presence on pirate websites.The UK Gambling Commission had been informed by the City of London Police's Intellectual Property Crime Unit (PIPCU) that gambling companies were some of the worst offenders in terms of inadvertently funding IP infringing (pirate) websites through advertising.PIPCU launched Operation Creative in 2013 to disrupt and reduce funding to IP infringing websites. The initiative developed 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/pipcu/Pages/Operation-creative.aspx"&gt;&#xD;
        
                        
        
      
        
      
                      
      the Infringing Website List (IWL)
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     – a list of IP infringing websites that brands, ad companies, and other entities could use to better inform their advertising operations.White Bullet 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://www.bbc.co.uk/news/technology-33886174"&gt;&#xD;
        
                        
        
      
        
      
                      
      worked closely with PIPCU’s Operation Creative
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    , tracking locally served ads on the websites listed in the IWL and regularly identified ads for the top UK gambling companies on IWL websites.The UK Gambling Commission (UKGC) implemented 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://www.gamblingcommission.gov.uk/for-gambling-businesses/Compliance/General-compliance/Social-responsibility/Advertising-marketing-rules-and-regulations.aspx"&gt;&#xD;
        
                        
        
      
        
      
                      
      License condition 16
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     in late 2016:“You must ensure that you do not place digital advertisements on websites providing unauthorised access to copyrighted content and must take all reasonable steps to ensure that third parties with whom you contract do similar.”The primary aim behind this licensing condition was to ensure the ad budget for gambling companies was not ending up in the hands of the operators of IP infringing websites. If gambling companies fail to comply with the condition they can expect hefty fines or even the revocation of their license.To comply with this licensing condition, many of the top UK gambling companies have opted to use
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/"&gt;&#xD;
        
                        
        
      
        
      
                      
       ad monitoring service
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    s from White Bullet to track when their ads fall on pirate websites and then take action to stop it. Brands using this solution have on average seen a 92% reduction in the volume of their ads served to IP infringing websites over the last two years, with ads moving to safer websites.
    
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;div&gt;&#xD;
    &lt;/div&gt;&#xD;
    
                    
    
  White Bullet's ad monitoring service tracks advertising across 
    
                    
    
      
    
    
                    &#xD;
    &lt;a href="https://www.white-bullet.com/quarterly-report/"&gt;&#xD;
      
                      
      
      
        
      
                      
      millions of infringing URLs, categorising each ad found with a brand and a sector
    
                    
    
      
    
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    
    
      
    
                    
    . White Bullet also analyses the full ad path and identifies the individual third-party affiliates and ad companies responsible for placing each ad, enabling advertisers to identify who is responsible for the misplacement of their ads.The UKGC’s licensing condition is a strong example of the increased awareness on the importance of brand safety across a range of online activity. Gambling operators, as well as brands from other industries, are beginning to realise the need for safer ad placement.Skybet recently announced it has 
    
                    
    
      
    
    
                    &#xD;
    &lt;a href="https://www.racingpost.com/news/sky-bet-end-affiliate-programme-as-regulatory-pressure-mounts/299477"&gt;&#xD;
      
                      
      
      
        
      
                      
      completely abandoned the use of affiliate advertising
    
                    
    
      
    
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    
    
      
    
                    
     due to the risk of non-compliant affiliate advertising. Paddy Power Betfair has taken a similar stance, 
    
                    
    
      
    
    
                    &#xD;
    &lt;a href="https://sbcnews.co.uk/europe/uk/2017/09/15/1-strike-policy-paddy-power-betfair-gets-tough-affiliate-marketing-practices/"&gt;&#xD;
      
                      
      
      
        
      
                      
      implementing a one-strike policy for their affiliates
    
                    
    
      
    
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    
    
      
    
                    
     and tougher compliance conditions. Outside the gambling industry, companies like Unilever have committed to 
    
                    
    
      
    
    
                    &#xD;
    &lt;a href="http://www.exchange4media.com/marketing/keith-weed-talks-brand-safety-threatens-to-cut-ads-on-digital-platforms-_88417.html"&gt;&#xD;
      
                      
      
      
        
      
                      
      pull ads from exchanges that use inventory from risky websites.
    
                    
    
      
    
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    However, many brands are still at risk and would benefit from improved technology to prevent the misplacement of their advertising on illegal and dangerous websites. White Bullet continues to find ads from major brands on IP infringing websites. Research recently conducted by White Bullet found that among the top global ad spenders 
    
                    
    
      
    
    
                    &#xD;
    &lt;a href="https://www.linkedin.com/pulse/why-dynamic-risk-scoring-needed-tackle-brand-safety-crisis-dana-neale/"&gt;&#xD;
      
                      
      
      
        
      
                      
      70% had their branded advertising appear on pirate sites in 2017.
    
                    
    
      
    
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    How does this happen in the current environment where brands are increasingly feeling the pressure and showing a genuine willingness to improve their ad placement? The answer can be found in the shortcomings of static blacklists.In the context of keeping advertising off IP infringing websites, the high churn rate of piracy sites means static blacklists, including any of the industry’s infringing website lists kept by legal brand safety providers, that are not maintained hourly, cannot provide comprehensive protection. Pirate websites use domain hopping and redirection to evade enforcement and quickly and regularly go offline as new domains emerge to take their place. Any static list of infringing websites will not provide true insight into this dynamic ecosystem nor the real-time guidance needed to protect brands.White Bullet's IPI Index evaluates existing and new websites for IP infringement risk on an hourly basis.  Websites are dynamically scored using artificial intelligence based on a range of criteria to determine infringement risk. This dynamism ensures the IPI Index stays ahead of the high churn rate of pirate websites and is an effective tool in comprehensively identifying publishers that infringe third party intellectual property.
    
                    &#xD;
    &lt;!--EndFragment--&gt;  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg" length="256878" type="image/jpeg" />
      <pubDate>Tue, 03 Apr 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/top-uk-gambling-companies-feel-pressure-to-reduce-their-advertising-on-ip-infringing-websites</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1529030168380-b62c39672668.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/st-wb-2018.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q1 2018 Report: Ad Exchanges Need to Play a Greater Role in Brand Safety</title>
      <link>https://www.white-bullet.com/q1-2018-perspective</link>
      <description>Ad Exchanges Must Do More to Keep Brands Safe</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ad Exchanges Must Do More to Keep Brands Safe
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White-Bullet-Q1-2018-V1.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;                                  White Bullet's Q1 2018 report shows a decrease in the number of unique brands advertising on pirate websites. This decrease largely comes from US data. It is likely efforts by ad intermediaries within 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.tagtoday.net/participating-companies/"&gt;&#xD;
        
                        
        
      
        
      
                      
      TAG
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     have assisted in this reduction. TAG is an organisation of brands and ad companies who have pledged to take all reasonable steps to prevent their ads being served to pirate websites.It will be interesting to see if a similar trend happens in Europe once the 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://ec.europa.eu/growth/industry/intellectual-property/enforcement_en"&gt;&#xD;
        
                        
        
      
        
      
                      
      EU Memorandum of Understanding
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     has come into force.
    
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;div&gt;&#xD;
    &lt;/div&gt;&#xD;
    
                    
    
  Interestingly, White Bullet's Q1 data shows there was 43% increase in gambling sector ads. Although gambling brands engaged with White Bullet have drastically reduced their advertising presence on IP infringing websites, new gambling brands have emerged to take their place.This demonstrates that to effectively demonetize pirate websites, ad companies must play a greater role. Whilst brands can effectively reduce inadvertent ad misplacement when given pertinent supply chain information, ad companies and affiliates will simply serve other brands to those vacated inventory slots.Ad exchanges in particular could do much more to address the issue. Ad exchanges appeared in the supply chain of 37% of all ads served to pirate websites in Q1. Smart technology needs to be implemented by exchanges to verify in real-time the risk publishers poses to the reputation of brands. White Bullet is actively looking to integrate its AI-led IPI Index with exchanges as a real-time solution that eliminates brand reputational damage.Only White Bullet has a proven track record in reducing branded advertising presence on pirate websites – contact us now to make use of pre and post-bid ad safety solutions.
    
                    &#xD;
    &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
      
                      
      
    
      
    
                    
    Contact White Bullet
  
                  
  
    
  
    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
    
  
    
  
                  
   today to ensure you are IP compliant.
  
                  
  
    
  
    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202018%20Q1.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 02 Apr 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q1-2018-perspective</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Dynamic Risk Scoring is Needed to Tackle the Brand Safety Crisis</title>
      <link>https://www.white-bullet.com/why-dynamic-risk-scoring-is-needed-to-tackle-the-brand-safety-crisis</link>
      <description>The past year saw increased pressure from advertisers on exchanges to keep their ads off websites that could cause damage to brand reputation.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  A recent study by White Bullet found many premium brands appearing on IP infringing websites.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/photo-1525168203751-d01eb31bab7e-500x399.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;                                  The past year saw 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.marketingweek.com/2017/03/17/google-ad-safety/"&gt;&#xD;
        
                        
        
      
        
      
                      
      increased pressure from advertisers on exchanges
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     to keep their ads off websites that could cause brand reputational damage.An intensified collective effort within the digital advertising industry has aimed to eliminate the presence of premium branded advertising on fake news, hate speech, and digital piracy sites.After being alerted by brands earlier this year that their advertising was appearing next to inappropriate content on YouTube, ad companies responded by 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="http://www.adweek.com/digital/3-digital-ad-players-cashing-in-on-youtubes-brand-safety-issues/"&gt;&#xD;
        
                        
        
      
        
      
                      
      increasing the use of third-party brand safety tools
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     to protect their clients.Beyond YouTube, other publishers have been affected by the crisis. Sites such as Ranker have reported they are 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://adexchanger.com/publishers/publishers-find-caught-brand-safety-nets/"&gt;&#xD;
        
                        
        
      
        
      
                      
      being blacklisted by certain exchanges
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     due to some content on their site being deemed high risk to advertisers. Ranker is largely a safe site for advertisers in terms of brand reputational risk, although they do have some user-generated content that can seem questionable when analysed solely on a keyword basis.These third-party tools regularly flag content that is not high risk or resides in a grey area, as well as failing to flag publishers that would unquestionably cause brand reputational damage.Premium branded advertising placed by renowned ad exchanges is regularly found on intellectual property infringing websites. Research conducted by White Bullet found that out of the 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.adbrands.net/top-global-advertisers.htm"&gt;&#xD;
        
                        
        
      
        
      
                      
      top 100 global companies by ad expenditure
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
    , 70 had their branded advertising appear on piracy sites in 2017. Many of these impressions were placed by major ad companies.Third-party brand safety tools often flag content as inappropriate through a blanket approach to high risk keywords, ignoring the wider context of the publishing site. This lack of contextualisation has left legitimate publishers out in the cold whilst letting risky ones slip through the net.Context-driven dynamic risk scoring tools are required to address the issue of brand reputational risk within the industry.Dynamic risk scoring principles are at the foundation of White Bullet's methodology of identifying piracy sites through their 
    
                    
    
      
    
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/#about-ipi-index"&gt;&#xD;
        
                        
        
      
        
      
                      
      IP Infringement Index
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     (IPI Index™). The IPI Index™ uses artificial intelligence to score publishers as to how infringing and high risk they are. The algorithm that generates the score is based on keyword components but also considers the wider context of the publishing site through harvesting other meta-data.A site will not be deemed infringing just because a certain keyword is present, nor will it be considered safe if no designated keywords can be found. The presence of a keyword triggers a score which builds up depending on the context. Only if the context meets the set threshold will the keyword component factor into the overall risk assessment of the site.Static blacklists and strict keyword driven approaches have failed to address the brand safety crisis. Dynamic risk-scoring solutions need to be expanded throughout the digital advertising ecosystem to eliminate the presence of premium branded advertising on high risk websites.
      
                      &#xD;
      &lt;!--EndFragment--&gt;    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg" length="432873" type="image/jpeg" />
      <pubDate>Mon, 19 Feb 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/why-dynamic-risk-scoring-is-needed-to-tackle-the-brand-safety-crisis</guid>
      <g-custom:tags type="string">Brand Reputation,Advertising Compliance,Brand Safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/jacek-dylag-SPpsFbCaN2A-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q4 2017 Report: Brands Engaged with White Bullet See Huge Reduction in Misplaced Ads</title>
      <link>https://www.white-bullet.com/white-bullet-q4-2017-report</link>
      <description>Brands Reduce Ad Misplacement with White Bullet</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Brands Reduce Ad Misplacement with White Bullet
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/Q4-2017.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;!--StartFragment--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;      &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman",serif;}
&lt;/style&gt;
&lt;![endif]--&gt;      &lt;!--StartFragment--&gt;                                  White Bullet’s
ad monitoring service, which identifies fraudulent affiliates, drives progress
in reducing frequency of ads served on IP infringing websites.Brands using White Bullet’s ad monitoring service have on
average seen a 92% reduction in the volume of their ads served to IP infringing
websites over the last two years, with ads moving to safer websites.White Bullet’s
ad monitoring service tracks advertising across millions of infringing
URLs, categorising each ad found with a brand and a sector. White Bullet also
analyses the full ad path and identifies the individual third-party affiliates
and ad companies responsible for placing each ad, enabling advertisers to identify
who is responsible for the misplacement of their ads.However, many
brands are still at risk and would benefit from improved technology to prevent
the misplacement of their advertising on illegal and dangerous websites. White
Bullet continues to find ads from major brands on IP infringing websites.
Research recently conducted by White Bullet found that among the top
global ad spenders 70% had their branded advertising appear on pirate
sites in 2017.
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
        
                        
        
    
      
    
                    
    Contact White Bullet
  
                  
  
    
  
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
  
    
  
                  
   today to ensure you are IP compliant.
  
                  
  
    
  
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202017%20Q4.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 01 Jan 2018 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/white-bullet-q4-2017-report</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q3 2017 Report: Premium Brands and Malvertising Continue to Jointly Fund Digital IP Infringement</title>
      <link>https://www.white-bullet.com/q3-2017-perspective</link>
      <description>Piracy and counterfeit Q3 2017 report: Premium Brands and Malvertising Continue to Jointly Fund IP Infringement</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Piracy and counterfeit Q3 2017 report: Premium Brands and Malvertising Continue to Jointly Fund IP Infringement
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White-bullet-Q3-2017-V4-Hi-Res.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
      White Bullet estimates piracy sites received over £800,000 in ad revenue from malvertising in Q3 of 2017. These estimates are based on conservative sampling data and known malware risk.The majority of this malvertising took the form of deceptive ads (76%), such as click generators. Adware (12%), potentially unwanted programmes (8%), and browser hijackers (4%) made up the rest of the malware ad-data.Piracy sites have a long history of exposing users to malvertising. As premium brands have ramped up their brand safety efforts to keep their advertising off IP infringing websites, piracy sites have increasingly turned to malvertising in order to generate revenue.However, despite their best efforts, the tools available to legitimate advertisers are not successfully eliminating their presence on IP infringing websites. White Bullet found many instances of premium branded advertising appearing next to malicious adverts on IP infringing websites in Q3.Not only does this damage the reputation of the major brands, it also gives the malvertising an air of legitimacy.In the eyes of the perpetrator, malvertising is one of the most efficient illicit money-making schemes. This coupled with the scale and instantaneous nature of programmatic advertising means it is unlikely that major ad exchanges can put an end to malvertising anytime soon.
      
                      &#xD;
      &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
      Contact White Bullet
    
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
     today to ensure you are IP compliant.
    
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202017%20Q3.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 02 Oct 2017 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q3-2017-perspective</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q2 2017 Report: 8% Increase in Branded Advertising Since Q1</title>
      <link>https://www.white-bullet.com/q2-2017-perspective</link>
      <description>Branded Advertising on Pirate and Counterfeit Sites Increases in Q2</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Branded Advertising on Pirate and Counterfeit Sites Increases in Q2
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White-bullet-Q2-2017-V1.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
    Contact White Bullet
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
   today to ensure you are IP compliant.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202017%20Q2.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 03 Jul 2017 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q2-2017-perspective</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>White Bullet Q1 2017 Report: 30% Increase in Advertising Found on IP Infringing Websites Since Q4 2016 </title>
      <link>https://www.white-bullet.com/q1-2017-perspective</link>
      <description>Major Brands Increasingly Found on IP Infringing Websites</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Major Brands Increasingly Found on IP Infringing Websites
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/aaf260d6/White-bullet-Q1-2017-V4.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://www.white-bullet.com/contact-us" target="_top"&gt;&#xD;
        
                        
        
      
        
      
                      
    Contact White Bullet
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
      
    
      
    
                    
   today to ensure you are IP compliant.
  
                    
    
      
    
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div data-rss-type="text"&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;a href="https://irp-cdn.multiscreensite.com/2de89de0/files/uploaded/White%20bullet%202017%20Q1.pdf" target="_blank"&gt;&#xD;
        
                        
        
      
        
      
                      
    Download PDF
  
                    
    
      
    
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png" length="90376" type="image/png" />
      <pubDate>Mon, 03 Apr 2017 00:00:00 GMT</pubDate>
      <author>damien.bidmead@gmail.com (Damien Bidmead)</author>
      <guid>https://www.white-bullet.com/q1-2017-perspective</guid>
      <g-custom:tags type="string">Reports</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/aaf260d6/dms3rep/multi/4-87394326.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
