ICANN ICANN Email List Archives

[bc-gnso]


<<< Chronological Index >>>    <<< Thread Index >>>

RE: [bc-gnso] Additional info for Whois Studies discussion at 1-AprGNSO Council Meeting

  • To: <randerson@xxxxxxxxxxxxxxxx>, Steve Delbianco <sdelbianco@xxxxxxxxxxxxx>, Zahid Jamil <zahid@xxxxxxxxxxxxxxxxx>, Mike Rodenbaugh <icann@xxxxxxxxxxxxxx>
  • Subject: RE: [bc-gnso] Additional info for Whois Studies discussion at 1-AprGNSO Council Meeting
  • From: Marilyn Cade <marilynscade@xxxxxxxxxxx>
  • Date: Thu, 1 Apr 2010 11:08:59 -0400

excellent additional background to why WHOIS is so important to business users.





> Subject: Re: [bc-gnso] Additional info for Whois Studies discussion at 
> 1-AprGNSO Council Meeting
> Date: Thu, 1 Apr 2010 08:56:29 -0600
> From: randerson@xxxxxxxxxxxxxxxx
> To: marilynscade@xxxxxxxxxxx; sdelbianco@xxxxxxxxxxxxx; 
> zahid@xxxxxxxxxxxxxxxxx; icann@xxxxxxxxxxxxxx
> CC: bc-gnso@xxxxxxxxx
> 
> 
> An accurate and readily accessible WHOIS is certainly important to more than 
> only businesses regarding trademark infringement.
> 
> An accurate and accessible WHOIS is important to consumers with respect to 
> protection. And recourse from online fraud and theft.
> 
> An accurate and accessible WHOIS is important to individuals and business 
> with respect to protection from defamation.
> 
> An accurate and accessible WHOIS is important to parents and children with 
> respect to transparency and the ability to see who's what with regard to the 
> websites children use.
> 
> An accurate and accessible WHOIS is important to civil society with respect 
> to the transparency of published news and views.
> 
> I always find it puzzling that a small number of people preoccupied with 
> privacy over all else are able to convince the wider community that to forego 
> the virtues of transparency and accountability. There are better ways to 
> fight spam than by hiding or misrepresenting the identity of web publishers. 
> And if you desire anonymity, don't publish a website.
> 
> Two of my children have been ripped off by online vendors hiding being fake 
> data. Our firm has been defamed by a website whose publisher hides being 
> privacy and fake WHOIS data. ICANN should not be tolerating this dysfunction.
> 
> 
> 
> 
> cheers/Rick
> 
> Rick Anderson
> EVP, InterBorder Holdings Ltd
> randerson@xxxxxxxxxxxxxx
> cell (403) 830-1798
>  
> 
> ----- Original Message -----
> From: owner-bc-gnso@xxxxxxxxx <owner-bc-gnso@xxxxxxxxx>
> To: Steve Delbianco  <sdelbianco@xxxxxxxxxxxxx>; Zahid Jamil  
> <zahid@xxxxxxxxxxxxxxxxx>; Mike Rodenbaugh  <icann@xxxxxxxxxxxxxx>
> Cc: Bc GNSO list  <bc-gnso@xxxxxxxxx>
> Sent: Thu Apr 01 08:14:05 2010
> Subject: Re: [bc-gnso] Additional info for Whois Studies discussion at 
> 1-AprGNSO Council Meeting
> 
> 
> While I support Steve's "thesis", I wouldn't refer to the GAC, who has worked 
> productively with business and law enforcement as "giants", however. 
> 
> I do support that policy has to be supported by informed data /research and 
> these studies should receive the funding needed. The amount proposed is 
> indeed small compared to the overall budget and will jelp to inform policy 
> making. 
> 
> I would have suggested a higher amount for the initial authorized budget-- 
> but getting two studies authorized for this budget year is a start on the 
> right direction. 
> 
> WHOIS is important to all Business users, and for more than trademark 
> collision issues. 
> 
> The delay in undertaking the studies is already a serious challenge since 
> further understanding of existing issues is important to also inform the new 
> gTLD and IDN programs. 
> 
> 
> Sent via BlackBerry by AT&T
> 
> -----Original Message-----
> From: Steve DelBianco <sdelbianco@xxxxxxxxxxxxx>
> Date: Thu, 1 Apr 2010 13:13:10 
> To: <zahid@xxxxxxxxxxxxxxxxx>; <icann@xxxxxxxxxxxxxx>
> Cc: <bc-gnso@xxxxxxxxx>
> Subject: [bc-gnso] Additional info for Whois Studies discussion at 1-Apr
>  GNSO Council Meeting
> 
> Mike and Zahid -- I predict you will encounter resistance today to the Study 
> on Whois Misuse ($150K).  If I were there, I would offer this:
>  
>  Milton Mueller, Robin Gross and the NCUC had for years claimed that people 
> suffered harm and harassment BECAUSE their data was displayed in Whois.   It 
> was just an assertion with no data support, but it was their main argument 
> against Whois.
>  
>  That's why I suggested study #1 and Claudio of INTA suggested studies 14 and 
> 15.   We wanted some data to know if significant harm comes from Whois.  It's 
> probable that a few harassment cases came from Whois but I am confident it 
> won't be material or significant, and we can show that there are other 
> sources where email addresses could be obtained.   (See below for what Liz 
> Gasster and Lorrie Cranor had to say about the misuse studies)
>  
>  I've already mentioned the AoC review of Whois that's coming next year.   
> And then there's the GAC.  In their Whois letter 
> (http://www.icann.org/correspondence/karlins-to-thrush-16apr08.pdf)  the GAC 
> explicitly calls for misuse data:
>  
>  The goal should be to initially compile data that provides a documented 
> evidence base regarding: ...  the types and extent of misuses of WHOIS data 
> and what harm is caused by each type of misuse, including economic, use of 
> WHOIS data in SPAM generation, abuse of personal data, loss of reputation or 
> identity theft, security costs and loss of data.
>  
>  There's a lesson I learned during the Microsoft case:  "Don't moon the 
> giant."   This study is $150K out of a $70M annual budget and that's a small 
> price to pay to avoid mooning the giants of GAC and USG.
>  
>  Just my two cents.
>  --Steve
>  
>  
>  Below is the early analysis from the esteemed Lorrie Cranor of ATT and W3C.  
> Lorrie concluded it might be helpful though she thought it would be 
> inexpensive.
>  
>  WHOIS misuse studies
>  Four proposals (suggestions #1, #14, #15 and #21) suggest that ICANN study 
> misuse of WHOIS data to determine the connection, if any, between WHOIS and 
> illegal activities. These studies will help establish the extent and nature 
> of problems caused by unprotected WHOIS data.
>  Study Suggestion Number 1: (DelBianco)  1) Gather data on WHOIS misuse from 
> consumer protection bureaus and other entities who maintain data on misuse 
> incidents reported by registrants and 2) survey a random sample of 
> registrants in each gTLD and selected ccTLDs.
>  Study Suggestion Number 14: (INTA)  Create a set of new email addresses, use 
> half of them to register domain names, and monitor all for spam for 90 days 
> to determine how much WHOIS information contributes to spam.
>  Study Suggestion Number 15: (INTA) Create a set of new email addresses, use 
> them to register new domain names at registrars that allow and disallow port 
> 43 WHOIS queries, and monitor all for spam to determine the extent to which 
> port 43 WHOIS queries contribute to spam.
>  Study Suggestion Number 21: (Kleiman) Survey registrars and human rights 
> organizations to determine how WHOIS is being used in ways that seem to have 
> no bearing on the security and stability of the DNS.
>  
>  1 and 21 propose to survey registrars and other parties who may keep records 
> of misuse incidents. 1 also proposes a survey of registrants. These proposed 
> studies may shed some light on the extent and type of misuse of WHOIS data. 
> However, it will be difficult to gather representative data as not all cases 
> of abuse are reported. In addition, it is not always possible to confirm that 
> misused data was obtained from WHOIS, as this information may be available 
> form other sources. A registrant survey is likely to receive disproportionate 
> responses from registrants who believe their WHOIS information has been 
> abused. Nonetheless, the above studies may result in useful qualitative data 
> about the nature of misuse and provide a rough quantitative estimate of the 
> extent of misuse. Surveying those who already keep track of abuse incidents 
> is likely to be a relatively low- cost approach. The registrant study is 
> likely to be more expensive if done on a large scale, and seems less likely 
> to result in useful data.
>  
>  14 and 15 focus specifically on spam and propose studies in which new email 
> addresses are created and used to register domains to determine how much 
> WHOIS information contributes to spam. 15 compares the amount of spam 
> received as a result of registering a domain at registrars that allow and 
> prohibit port 43 WHOIS queries. These studies should results in fairly 
> accurate quantitative data. However, 14 is quite similar to the October 2007 
> SSAC study "Is the WHOIS service a source for email addresses for spammers?" 
> and would not likely contribute new information. If port 43 queries are of 
> interest from a policy perspective, study 15 should provide reliable data to 
> inform that discussion.
>  
>  
>  
>  On 3/31/10 5:43 PM, "Steve DelBianco" <sdelbianco@xxxxxxxxxxxxx> wrote:
>  
>  Mike & Zahid -- 
>  
>  You asked for some BC membership views on the Whois studies that will be 
> discussed at your Council meeting tomorrow (1-Apr).  See below and 
> attachment.   Hope this helps.
>  
>  Your agenda shows potential actions on Whois studies:
>  3.4.1 Review and assess cost and feasibility estimates for the studies
>  3.4.2 Decide whether to pursue any of the studies and, if so, which ones
>  3.4.3 Provide input into the FY11 budget process
>  3.5 How should we accomplish the above?
>  .    Should we form a drafting team to develop recommendations for 
> consideration in our next meeting?
>  .    Note that a final budget has to be finished by 17 May and there are 
> currently no funds budgeted for Whois Studies
>  
>  My recommendations:
>  
>  Let's proceed with the Misuse and Registrant Identification studies.  
>  
>  The Misuse and Registrant ID studies are likely to generate data that would 
> affect policy decisions and compliance work.  These 2 studies are not going 
> to stop the long-standing disagreements between passionate parties on either 
> side, but that's not the point of doing studies.   Remember the debate over 
> domain tasting?  Fact-based data on the number of deletes with the AGP were 
> astounding, and helped us enact a policy change.  The data did not make 
> everyone agree on whether domain tasting was harmful.  But facts showed a 
> hugely prevalent use of AGP that was outside its original purpose, and that 
> moved us to a new consensus policy.
>  
>  We'll certainly use study data when setting policy and compliance standards, 
> especially with so many new TLD operators coming online next year.  
>  
>  Moreover, the Affirmation of Commitments (9.3.1) requires ICANN to "organize 
> a review of WHOIS policy and its implementation to assess the extent to which 
> WHOIS policy is effective and its implementation meets the legitimate needs 
> of law enforcement and promotes consumer trust".  The Misuse and Registrant 
> data studies will be essential for that review.
>  
>  We will also want to have these study results on hand so they can be 
> compared with study results after new TLDs are operating for one year, as 
> required by the Affirmation of Commitments item 9.3 
>  
>  
>  Let's go right to the core issue of Money.  Consider this discussion that 
> happened during Council meeting in Nairobi:
>  Liz Gasster described some study proposals as "expensive" and then Stefane 
> and Wolf commented on the costs and budget constraints.   
>  
>  I intervened to say that the lack of fact-based studies has itself been very 
> expensive over several years of time & travel on the part of dozens of 
> community members.   Those costs will continue unless/until we have facts at 
> hand to make policy decisions.
>  
>  Marilyn made a similar point about need for fact-based analysis.    
>  
>  Bruce Tonkin recommended that Council budget a lump sum for studies, then 
> decide how to spend it.  Don't budget each specific study, he said.
>  
>  I believe Bruce Tonkin is right.  Council should ask for a budget of 
> $XXX,XXX in FY 2011 for a general category of Whois studies.   Since we need 
> a budget number now, I'd say $360,000, to cover the misuse and registrant 
> studies ($150K each) plus a 20% contingency.  
>  
>  Next steps: I would ask staff to begin negotiating with the two 'superior' 
> bidders on detailed workplan for their studies.  Staff should start by asking 
> bidders to review:
>  
>  The 4-Mar-2009 Council resolution on Whois studies, including the original 
> rationale for each hypothesis, etc.   
>  
>  The Affirmation of Commitments, items 9.3 and 9.3.1
>  
>  Staff should also show the bidders any Whois-related items in the Draft 
> Applicant Guidebook.
>  
>  Superior Bidders can then prepare detailed study workplans that policy staff 
> can analyze and present to Council later this year. 
>  
>  
>  Note:  The Staff report (page 7) mentions the Whois Accuracy report, and 
> asks whether "barriers to accuracy" provide useful insights to policy.  
>  
>  I would answer, "Accuracy is something we aspire to; whereas inaccuracy is a 
> contract compliance problem."    
>  
>  Let's set high aspirations to require accurate Whois data for registrants, 
> even if we know that lots of data is inaccurate today. After all, registrars 
> manage to gather credit card information that's sufficiently accurate to 
> ensure they get paid.   Let's find ways to ensure they apply the same 
> diligence in collecting and validating public Whois data.
>  
>  (Note: Susan Kawaguchi of Facebook volunteered to draft BC comments on Whois 
> Accuracy report.  Those aren't due until 15-Apr)   
>  
>  Whois Studies Reports and resources: 
>  https://st.icann.org/gnso-council/index.cgi?whois_discussion#
>  
> http://gnso.icann.org/issues/whois/whois-studies-report-for-gnso-23mar10-en.pdf
>  Presentation Slides: 
> http://gnso.icann.org/correspondence/whois-studies-presentation-01apr10-en.pdf
>  
>  -- 
>  Steve DelBianco
>  Executive Director
>  NetChoice
>  http://www.NetChoice.org and http://blog.netchoice.org 
>  +1.202.420.7482
> 
> 
>  
>  
> This e-mail message and any attachments may contain confidential and/or 
> privileged information intended only for the addressee. In the event this 
> e-mail is sent to you in error, sender and sender’s company do not waive 
> confidentiality or privilege, and waiver may not be assumed. Any 
> dissemination, distribution or copying of, or action taken in reliance on, 
> the contents of this e-mail by anyone other than the intended recipient is 
> prohibited. If you have been sent this e-mail in error, please destroy all 
> copies and notify sender at the above e-mail address.
>  
> Computer viruses can be transmitted by e-mail. You should check this e-mail 
> message and any attachments for viruses. Sender and sender’s company accept 
> no liability for any damage caused by any virus transmitted by this e-mail. 
> Like other forms of communication, e-mail communications may be vulnerable to 
> interception by unauthorized parties. If you do not wish to communicate by 
> e-mail, please notify sender. In the absence of such notification, your 
> consent is assumed. Sender will not take any additional security measures 
> (such as encryption) unless specifically requested.
                                          


<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy