What about unauthorized registrations? Re: [gnso-rap-dt] Updated document and wiki pages
So perusing this list again, it struck me that we've done a great job capturing what potentially abusive things people are doing with domains they do register, but not how they're actually registering them, outside of perhaps front running and a kind of "side effect" abuse of false whois data. I could argue (but won't get drawn into that with this post) that the other two "registration" abuses we have listed are really post-registration abuse (mis)use (cybersquatting, inappropriate use of whois), as that's where the harm is really felt. The thing we're missing is the use of stolen/fraudulent credentials to obtain the registration in the first place! This is the enabling force behind all (other than really stupid) criminal abuse of the domain registration process. A criminal will use one of three methods to obtain a new domain name: a stolen credit card/bank/payment account, a fake financial instrument (card, check, transfer), or unauthorized access to someone else's domain management account. If you kill this problem, most of the criminal uses of fraudulently registered domains (i.e. post registration abuse) disappear. There are certainly many methods out there to use to verify the authenticity of the domain applicant, screen fraudulent credentials, score transactions, and the like. That seems like a very fruitful area of pursuit to putting a real dent in all domain abuse issues to me. Soooo... am I just missing something here, or should we make this a major part of the work of this group - how to curtail the abuse of the domain registration system by people registering domains using stolen/ unauthorized credentials? Seems to me that's certainly an abuse AT THE POINT OF REGISTRATION and it directly affects registrar and registry operations at that time, and will affect everyone else in the food chain eventually. Just food for thought on a beautiful Friday afternoon. Cheers! Rod On Jul 10, 2009, at 3:52 AM, Marika Konings wrote: Dear All,As discussed on our last call, I have updated the definitions document to add a category to capture the discussion on potential recommendations (see attached). I have also added this column to the relevant wiki pages. In addition, I have moved the comments and notes related to the abuse definition discussion to a separate wiki page (see https://st.icann.org/reg-abuse-wg/index.cgi?abuse_definition) , to focus the document on our current discussion.With best regards, Marika
|