This procedure only applies to copyright-infringing content, not to trafficking in circumvention devices. It seems that in this case, it's the latter.