28. Abuse Prevention and Mitigation
28.1 Abuse Prevention and Mitigation
Strong abuse prevention of a new gTLD is an important benefit to the internet community. The .whoswho registry operator Who’s Who Registry and back-end registry services provider, Neustar, agree that a registry must not only aim for the highest standards of technical and operational competence, but also needs to act as a steward of the space on behalf of the Internet community and ICANN in promoting the public interest. Neustar brings extensive experience establishing and implementing registration policies. This experience will be leveraged to help Who’s Who Registry combat abusive and malicious domain activity within the new gTLD space.
One of those public interest functions for a responsible domain name registry includes working towards the eradication of abusive domain name registrations, including, but not limited to, those resulting from:
- Illegal or fraudulent actions
- Spam
- Phishing
- Pharming
- Distribution of malware
- Fast flux hosting
- Botnets
- Distribution of child pornography
- Online sale or distribution of illegal pharmaceuticals
More specifically, although traditionally botnets have used Internet Relay Chat (IRC) servers to control registries and the compromised PCs, or bots, for DDoS attacks and the theft of personal information, an increasingly popular technique, known as fast-flux DNS, allows botnets to use a multitude of servers to hide a key host or to create a highly-available control network. This ability to shift the attacker’s infrastructure over a multitude of servers in various countries creates an obstacle for law enforcement and security researchers to mitigate the effects of these botnets. But a point of weakness in this scheme is its dependence on DNS for its translation services. By taking an active role in researching and monitoring these sorts of botnets, .whoswho’s partner, Neustar, has developed the ability to efficiently work with various law enforcement and security communities to begin a new phase of mitigation of these types of threats.
Policies and Procedures to Minimize Abusive Registrations
A Registry must have the policies, resources, personnel, and expertise in place to combat such abusive DNS practices. As Who’s Who Registry’s services provider, Neustar is at the forefront of the prevention of such abusive practices and is one of the few registry operators to have actually developed and implemented an active “domain takedown” policy. We also believe that a strong program is essential given that registrants have a reasonable expectation that they are in control of the data associated with the domains, especially its presence in the DNS zone. Because domain names are sometimes used as a mechanism to enable various illegitimate activities on the Internet often the best preventative measure to thwart these attacks is to remove the names completely from the DNS before they can impart harm, not only to the domain name registrant, but also to millions of unsuspecting Internet users.
Removing the domain name from the zone has the effect of shutting down all activity associated with the domain name, including the use of all websites and e-mail. The use of this technique should not be entered into lightly. .whoswho has an extensive, defined, and documented process for taking the necessary action of removing a domain from the zone when its presence in the zone poses a threat to the security and stability of the infrastructure of the Internet or the registry.
Abuse Point of Contact
As required by the Registry Agreement, Who’s Who Registry will establish and publish on its website a single abuse point of contact responsible for addressing inquiries from law enforcement and the public related to malicious and abusive conduct. Who’s Who Registry will also provide such information to ICANN prior to the delegation of any domain names in the TLD. This information shall consist of, at a minimum, a valid e-mail address dedicated solely to the handling of malicious conduct complaints, and a telephone number and mailing address for the primary contact. We will ensure that this information will be kept accurate and up to date and will be provided to ICANN if and when changes are made. In addition, with respect to inquiries from ICANN-Accredited registrars, our registry services provider, Neustar, shall have an additional point of contact, as it does today, handling requests by registrars related to abusive domain name practices.
28.2 Policies Regarding Abuse Complaints
One of the key policies each new gTLD registry will need to have is an Acceptable Use Policy that clearly delineates the types of activities that constitute “abuse” and the repercussions associated with an abusive domain name registration. In addition, the policy will be incorporated into the applicable Registry-Registrar Agreement and reserve the right for the registry to take the appropriate actions based on the type of abuse. This will include locking down the domain name preventing any changes to the contact and nameserver information associated with the domain name, placing the domain name “on hold” rendering the domain name non-resolvable, transferring to the domain name to another registrar, and⁄or in cases in which the domain name is associated with an existing law enforcement investigation, substituting name servers to collect information about the DNS queries to assist the investigation.
Who’s Who Registry will adopt an Acceptable Use Policy that clearly defines the types of activities that will not be permitted in the TLD and reserves the right of the Registry to lock, cancel, transfer or otherwise suspend or take down domain names violating the Acceptable Use Policy and allow the Registry where and when appropriate to share information with law enforcement. Each ICANN-Accredited Registrar must agree to pass through the Acceptable Use Policy to its Resellers (if applicable) and ultimately to the TLD registrants. Below is the Registry’s initial Acceptable Use Policy that we will use in connection with the Who’s Who Registry.
.whoswho Acceptable Use Policy
This Acceptable Use Policy gives the Registry the ability to quickly lock, cancel, transfer or take ownership of any .whoswho domain name, either temporarily or permanently, if the domain name is being used in a manner that appears to threaten the stability, integrity or security of the Registry, or any of its registrar partners – and⁄or that may put the safety and security of any registrant or user at risk. The process also allows the Registry to take preventive measures to avoid any such criminal or security threats.
The Acceptable Use Policy may be triggered through a variety of channels, including, among other things, private complaint, public alert, government or enforcement agency outreach, and the on-going monitoring by the Registry or its partners. In all cases, the Registry or its designees will alert Registry’s registrar partners about any identified threats, and will work closely with them to bring offending sites into compliance.
The following are some (but not all) activities that may be subject to rapid domain compliance:
- Impostrous Registrations: the registration of a second level domain not based on the Registrant’s own name, or claiming inauthentic credentials and⁄or contact information that could create a misimpression as to the identity of the Registrant.
- Phishing: the attempt to acquire personally identifiable information by masquerading as a website other than .whoswho own.
- Pharming: the redirection of Internet users to websites other than those the user intends to visit, usually through unauthorized changes to the Hosts file on a victim’s computer or DNS records in DNS servers.
- Dissemination of Malware: the intentional creation and distribution of ʺmaliciousʺ software designed to infiltrate a computer system without the owner’s consent, including, without limitation, computer viruses, worms, key loggers, and Trojans.
- Fast Flux Hosting: a technique used to shelter Phishing, Pharming and Malware sites and networks from detection and to frustrate methods employed to defend against such practices, whereby the IP address associated with fraudulent websites are changed rapidly so as to make the true location of the sites difficult to find.
- Botnetting: the development and use of a command, agent, motor, service, or software which is implemented: (1) to remotely control the computer or computer system of an Internet user without their knowledge or consent, (2) to generate direct denial of service (DDOS) attacks.
- Malicious Hacking: the attempt to gain unauthorized access (or exceed the level of authorized access) to a computer, information system, user account or profile, database, or security system.
- Child Pornography: the storage, publication, display and⁄or dissemination of pornographic materials depicting individuals under the age of majority in the relevant jurisdiction.
The Registry reserves the right, in its sole discretion, to take any administrative and operational actions necessary, including the use of computer forensics and information security technological services, among other things, in order to implement the Acceptable Use Policy. In addition, the Registry reserves the right to deny, cancel or transfer any registration or transaction, or place any domain name(s) on registry lock, hold or similar status, that it deems necessary, in its discretion:
(1) to protect the integrity and stability of the registry;
(2) to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process;
(3) to avoid any liability, civil or criminal, on the part of Registry as well as its affiliates, subsidiaries, officers, directors, and employees; or
(4) to correct mistakes made by the Registry or any Registrar in connection with a domain name registration. Registry also reserves the right to place upon registry lock, hold or similar status a domain name during resolution of a dispute.
Monitoring for Malicious Activity
Who’s Who Registry’s partner, Neustar, is at the forefront of the prevention of abusive DNS practices. Neustar is one of only a few registry operators to have actually developed and implemented an active “domain takedown” policy in which the registry itself takes down abusive domain names. Who’s Who Registry has opted for Neustar’s Registry Threat Mitigation Service as part of an enhanced services offering that are of importance to a global niche registry such as Who’s Who Registry in meeting registrant demand.
Neustar’s approach is quite different from a number of other gTLD Registries and the results have been unmatched. Neustar targets verified abusive domain names and removes them within 12 hours regardless of whether or not there is cooperation from the domain name registrar. This is because Neustar has determined that the interest in removing such threats from the consumer outweighs any potential damage to the registrar⁄registrant relationship. Neustar’s active prevention policies stem from the notion that registrants in the TLD have a reasonable expectation that they are in control of the data associated with their domains, especially its presence in the DNS zone. Because domain names are sometimes used as a mechanism to enable various illegitimate activities on the Internet, including malware, bot command and control, pharming, and phishing, the best preventative measure to thwart these attacks is often to remove the names completely from the DNS before they can impart harm, not only to the domain name registrant, but also to millions of unsuspecting Internet users.
Rapid Takedown Process
Since implementing the program, Neustar has developed two basic variations of the process. The more common process variation is a light-weight process that is triggered by “typical” notices. The less-common variation is the full process that is triggered by unusual notices. These notices tend to involve the need for accelerated action by the registry in the event that a complaint is received by Neustar which alleges that a domain name is being used to threaten the stability and security of the TLD, or is part of a real-time investigation by law enforcement or security researchers.
These processes are described below:
Lightweight Process
In addition to having an active Information Security group that, on its own initiatives, seeks out abusive practices in the TLD, Neustar is an active member in a number of security organizations that have the expertise and experience in receiving and investigating reports of abusive DNS practices, including but not limited to, the Anti-Phishing Working Group, Castle Cops, NSP-SEC, the Registration Infrastructure Safety Group and others. All of these sources are well-known security organizations that have developed reputation a for the prevention of harmful agents affecting the Internet. Aside from these organizations, Neustar also actively participates in privately run security associations whose basis of trust and anonymity makes it much easier to obtain information regarding abusive DNS activity.
Once a complaint is received from a trusted source, third-party, or detected by Neustar’s internal security group, information about the abusive practice is forwarded to an internal mail distribution list that includes members of the operations, legal, support, engineering, and security teams for immediate response (“CERT Team”). Although the impacted URL is included in the notification e-mail, the CERT Team is trained not to investigate the URLs themselves since often times the URLs in Question have scripts, bugs, etc. that can compromise the individual’s own computer and the network safety. Rather, the investigation is done by a few members of the CERT team that are able to access the URLs in a laboratory environment so as to not compromise the Neustar network. The lab environment is designed specifically for these types of tests and is scrubbed on a regular basis to ensure that none of Neustar’s internal or external network elements are harmed in any fashion.
Once the complaint has been reviewed and the alleged abusive domain name activity is verified to the best of the ability of the CERT Team, the sponsoring registrar is given 12 hours to investigate the activity and either take down the domain name by placing the domain name on hold or by deleting the domain name in its entirety or providing a compelling argument to the registry to keep the name in the zone.
If the registrar has not taken the requested action after the 12-hNeustar’s period (i.e., is unresponsive to the request or refuses to take action), Neustar places the domain on “ServerHold”. Although this action removes the domain name from the TLD zone, the domain name record still appears in the TLD WHOIS database so that the name and entities can be investigated by law enforcement should they desire to get involved.
Full Process
In the event that Neustar receives a complaint which claims that a domain name is being used to threaten the stability and security of the TLD or is a part of a real-time investigation by law enforcement or security researchers, Neustar follows a slightly different course of action.
Upon initiation of this process, members of the CERT Team are paged and a teleconference bridge is immediately opened up for the CERT Team to assess whether the activity warrants immediate action. If the CERT Team determines the incident is not an immediate threat to the security and the stability of critical internet infrastructure, they provide documentation to the Neustar Network Operations Center to clearly capture the rationale for the decision and either refers the incident to the Lightweight process set forth above. If no abusive practice is discovered, the incident is closed. However, if the CERT TEAM determines there is a reasonable likelihood that the incident warrants immediate action as described above, a determination is made to immediately remove the domain from the zone. As such, Customer Support contacts the responsible registrar immediately to communicate that there is a domain involved in a security and stability issue. The registrar is provided only the domain name in Question and the broadly stated type of incident. Given the sensitivity of the associated security concerns, it may be important that the registrar not be given explicit or descriptive information in regards to data that has been collected (evidence) or the source of the complaint. The need for security is to fully protect the chain of custody for evidence and the source of the data that originated the complaint.
Coordination with Law Enforcement & Industry Groups
One of the reasons for which Neustar was selected to serve as the back-end registry services provider by Who’s Who Registry is Neustar’s extensive experience with its industry-leading abusive domain name and malicious monitoring program and its close working relationship with a number of law enforcement agencies, both in the United States and internationally. For example, in the
United States, Neustar is in constant communication with the Federal Bureau of Investigation, US CERT, Homeland Security, the Food and Drug Administration, and the National Center for Missing and Exploited Children.
Neustar is also a participant in a number of industry groups aimed at sharing information amongst key industry players about the abusive registration and use of domain names. These groups include the Anti-Phishing Working Group and the Registration Infrastructure Safety Group (where Neustar was represented for several years as on the Board of Directors). Through these organizations and others, Neustar shares information with other registries, registrars, ccTLDs, law enforcement, security professionals, etc. not only on abusive domain name registrations within its own TLDs, but also provides information uncovered with respect to domain names in other registries’ TLDs. Neustar has often found that rarely are abuses found only in the TLDs for which it manages, but also within other TLDs, such as .com and .info. Neustar routinely provides this information to the other registries so that it can take the appropriate action.
With the assistance of Neustar as its back-end registry services provider, Who’s Who Registry can meet its obligations under Section 2.8 of the Registry Agreement where required to take reasonable steps to investigate and respond to reports from law enforcement and governmental and quasi-governmental agencies of illegal conduct in connection with the use of its TLD. Who’s Who’s Who Registry and⁄or Neustar will respond to legitimate law enforcement inquiries within one business day from receiving the request. Such response shall include, at a minimum, an acknowledgement of receipt of the request, questions or comments concerning the request, and an outline of the next steps to be taken by Who’s Who Registry and⁄or Neustar for rapid resolution of the request.
In the event such request involves any of the activities which can be validated by .whoswho and⁄or Neustar and involves the type of activity set forth in the Acceptable Use Policy, the sponsoring registrar is then given 12 hours to investigate the activity further and either take down the domain name by placing the domain name on hold or by deleting the domain name in its entirety or providing a compelling argument to the registry to keep the name in the zone. If the registrar has not taken the requested action after the 12-hour period (i.e., is unresponsive to the request or refuses to take action), Neustar places the domain on “serverHold”.
28.3 Measures for Removal of Orphan Glue Records
As the Security and Stability Advisory Committee of ICANN (SSAC) rightly acknowledges, although orphaned glue records may be used for abusive or malicious purposes, the “dominant use of orphaned glue supports the correct and ordinary operation of the DNS.” See http:⁄⁄www.icann.org⁄en⁄committees⁄security⁄sac048.pdf.
While orphan glue often supports correct and ordinary operation of the DNS, we understand that such glue records can be used maliciously to point to name servers that host domains used in illegal phishing, bot-nets, malware, and other abusive behaviors. Problems occur when the parent domain of the glue record is deleted but its children glue records still remain in DNS. Therefore, when the Registry has written evidence of actual abuse of orphaned glue, the Registry will take action to remove those records from the zone to mitigate such malicious conduct.
Neustar runs a daily audit of entries in its DNS systems and compares those with its provisioning system. This serves as an umbrella protection to make sure that items in the DNS zone are valid. Any DNS record that shows up in the DNS zone but not in the provisioning system will be flagged for investigation and removed if necessary. This daily DNS audit serves to not only prevent orphaned hosts but also other records that should not be in the zone.
In addition, if either .whoswho or Neustar become aware of actual abuse on orphaned glue after receiving written notification by a third party through its Abuse Contact or through its customer support, such glue records will be removed from the zone.
28.4 Measures to Promote WHOIS Accuracy
Who’s Who Registry acknowledges that ICANN has developed a number of mechanisms over the past decade that are intended to address the issue of inaccurate WHOIS information. Whoʹs Who Registryʹs position is consistent with ICANN’s on the issue of WHOIS accuracy in relation to Registrant identity and beyond that, in allowing the public the benefit of access to such information. For this reason, as a policy of the TLD, Registrars selling .whoswho names must agree not to sell private registrations in conjunction with .whoswho domains, as well as to collect additional identifying field data at registration and to display them with whois query results for .whoswho domains.
These additional identifying fields pertain to the specific Whoʹs Who credentials Registrants cite in support of their domain registrations and include six fields that constitute a path⁄footnote to their designated Whoʹs Who listings. The addition .whoswho fields displayed in a WHOIS record include: Publication Title, Publication Year(s), Name (as listed therein), Publisher Name, Publisher Location, and Publisher Website (if any). In practice, with WHOIS query results and access to the specific digital⁄physical compendium, the public should be able to access a Registrantʹs cited biographical summary.
28.4.1 Authentication of Registrant Information
As a global niche registry, Who’s Who Registry is committed to full review of all registrations prior to domain creation. This commitment is being hardwired into the registry’s workflow through the insertion of a pendingCreate status between registration and domain creation. This requires active involvement by the registry before a domain can be created. (See Figure 27.1)
Correlation between the registrant’s name and the registered .whoswho domain(s) is a requirement of the .whoswho Registration Agreement, including specifics as to the combinations of names, initials, suffixes and prefixes that may be registered as a .whoswho domain. The Registration Agreement specifically prohibits registering a name that is not one’s own⁄misrepresentation (see Impostrous Registrations at 28.2). In the case of legacy sites, a correlation between the name as listed in the Whoʹs Who citation as well as rights of the entity seeking to register a domain(s) in that name – be it a university that has been bequeathed the individual’s papers, a trademark⁄IP holder, or other – to act in this capacity will be verified.
Who’s Who Registryʹs commitment to review all new registrations is primarily for identity authentication purposes. While the elimination of imposturous registrations is the main goal, authentication of contact information is an ancillary outcome. Only when the registry has ascertained that a Registrantʹs identity correlates with the domain registered will the registration be released from pendingCreate status.
28.4.2 Monitoring of Registration Data
While the self-reported Who’s Who credential of each registrant will not be verified to the same extent as registrant identity, the registry will actively monitor new registrations and updates in order to maintain the integrity of the registry. Measures to accomplish this could include commercially reasonable efforts such as performing reference and online research, contacting registrants directly or via their registrars. Direct registry contact could be by email, fax or phone for the purpose not only of verifying identity and contact information as mentioned in registration data but also to request that supporting documentation be provided to the registry for review (e.g., a scan or fax of a recent utility bill, a scan of one’s Who’s Who entry – together with the title page of a previously unknown publication, etc.) as the registry deems necessary.
Although pendingTransfer status will not be implemented, monitoring of registration data is planned for all Transfer requests, as it is for updates to registration data which is essential to achieving a dynamic and more up-to-date registry. Rules governing domains secured by transfer are identical to those governing new registrations, especially concerning a correlation between the registrant’s name and the domain registered and allowing for legacy transfers.
The registry will not place restraints upon registrants insofar as changes to their own registration records are concerned. For domain holders in the .whoswho registry, it would not be uncommon that an individual with a ten-year registration term wishes to update to a more recent or prestigious Who’s Who citation during that time, and should not be proscribed by registry policy from doing so. Given the accomplishments for which qualified registrants have been cited, the reliance upon an honor system pertaining to the update of these citations is expected to provide a high degree of accuracy.
In addition, given the information provided in the additional fields for registrant’s Who’s Who credentials that are part of the public display for .whoswho registry WHOIS queries, the level of scrutiny that is both possible and likely will increase. The fact that the .whoswho Registration Agreement specifies that the Registrant’s identity must correlate with that of the Who’s Who publication data cited in the registration, together with an anticipated level of scrutiny by the public that could approximate “group sourced” verification, any inclination toward puffery would be dampened.
28.4.3 Policies and Procedures Ensuring Compliance
A policy of Whoʹs Who Registry is that Registrars selling .whoswho domains are not permitted to sell ʺprivate registrationsʺ in conjunction with them. Because private registrations not only conceal the data actually entered by the Registrant, but also mask it with boilerplate information, the public is denied the opportunity to conduct a WHOIS query and obtain results indicative of the actual identity of the domain holder.
Should a registrant be challenged by any third party in a Uniform Domain Resolution Proceeding (UDRP) seeking transfer of an imposterously registered domain, the provision of inaccurate information may be taken to constitute “bad faith” and lead to a decision to transfer the domain to the Complainant, assuming that the registrant otherwise meets the Registry requirements to hold the domain.
28.5 Resourcing Plans
Responsibility for abuse mitigation rests with a variety of functional groups. The Abuse Monitoring team is primarily responsible for providing analysis and conducting investigations of reports of abuse. The customer service team also plays an important role in assisting with the investigations, responded to customers, and notifying registrars of abusive domains. Finally, the Policy⁄Legal team is responsible for developing the relevant policies and procedures.
The necessary resources will be pulled from the pool of available resources described in detail in the response to Question 31.
The following resources are available from those teams:
Customer Support – 12 employees
Policy⁄Legal – 2 employees
The resources are more than adequate to support the abuse mitigation procedures of the .whoswho registry.
29. Rights Protection Mechanisms
29. Rights Protection Mechanisms
Who’s Who Registry is firmly committed to the protection of Intellectual Property rights and to implementing the mandatory rights protection mechanisms contained in the Applicant Guidebook and detailed in Specification 7 of the Registry Agreement. Who’s Who Registry recognizes that although the New gTLD program includes significant protections beyond those that were mandatory for a number of the current TLDs, a key motivator for .whoswho’s selection of Neustar as its registry services provider is Neustar’s experience in successfully launching a number of TLDs with diverse rights protection mechanisms, including many of the ones required in the Applicant Guidebook.
More specifically, .whoswho will implement the following rights protection mechanisms in accordance with the Applicant Guidebook as further described below:
- Trademark Clearinghouse: a one-stop shop so that trademark holders can protect their trademarks with a single registration.
- Sunrise and Trademark Claims processes for the TLD which, for .whoswho, are especially relevant to eponymous companies and brands.
- Implementation of the Uniform Dispute Resolution Policy to address domain names that have been registered and used in bad faith in the TLD.
- Uniform Rapid Suspension: A quicker, more efficient and cheaper alternative to the Uniform Dispute Resolution Policy to deal with clear cut cases of cybersquatting.
- Implementation of a Thick WHOIS making it easier for rights holders to identify and locate infringing parties.
- Through the extra fields that .whoswho is adding to WHOIS, rights holders may check the public WHOIS display to identify, beyond simply the registrant’s identity, a reference resource in which they may typically find a concise biographic summary of the registrant.
29.1 Trademark Clearinghouse Including Sunrise and Trademark Claims
The first mandatory rights protection mechanism (RPM) required to be implemented by each new gTLD Registry will be support for, and interaction with, the trademark clearinghouse. The trademark clearinghouse is intended to serve as a central repository for information to be authenticated, stored and disseminated pertaining to the rights of trademark holders. The data maintained in the clearinghouse will support and facilitate other RPMs, including the mandatory Sunrise Period and Trademark Claims service. Although specifics about how the trademark clearinghouse will interact with registry operators have not yet been finalized, Who’s Who Registry is actively monitoring the developments of the Implementation Assistance Group (IAG), which was designed to assist ICANN staff in firming up the rules and procedures associated with the policies and technical requirements for the trademark clearinghouse. In addition, .whoswhoʹs back-end registry services provider is actively participating in the IAG to ensure that the protections afforded by the clearinghouse and associated RPMs are feasible and implementable.
Utilizing the trademark clearinghouse, all operators of new gTLDs must offer: (i) a sunrise registration service for at least 30 days during the pre-launch phase and (ii) a trademark claims service for at least the first 60 days that second-level registrations are open. For the .whoswho registry, the sunrise registration service will provide a window during which holders of registered trade⁄service marks for eponymous (one taken from the name of an individual, in this context the eponym) brands⁄companies may be registered in advance of the registry launch. The trademark claim service is intended to provide clear notice to a potential registrant of the rights of a trademark owner whose trademark is registered in the clearinghouse.
Who’s Who Registry’s service provider, Neustar, has already implemented Sunrise and⁄or Trademark Claims programs for numerous TLDs including .biz, .us, .travel, .tel, and .co and will implement both of these services on behalf of .whoswho.
29.1.1 Neustar’s Experience in Implementing Sunrise and Trademark Claims Processes
In early 2002, Neustar became the first registry operator to launch a successful authenticated Sunrise process. This process permitted qualified trademark owners to pre-register their trademarks as domain names in the .us TLD space prior to the opening of the space to the general public. Unlike any other “Sunrise” plans implemented (or proposed before that time), Neustar validated the authenticity of Trademark applications and registrations with the United States Patent and Trademark Office (USPTO). Subsequently, as the back-end registry operator for the .tel gTLD and the .co ccTLD, Neustar launched validated Sunrise programs employing processes. These programs are very similar to those that are to be employed by the Trademark Clearinghouse for new gTLDs.
Below is a high level overview of the implementation of the .co Sunrise period that demonstrates Neustar’s experience and ability to provide a Sunrise service and an overview of Neustar’s experience in implementing a Trademark Claims program to trademark owners for the launch of .BIZ. Neustar’s experience in each of these rights protection mechanisms will enable it to seamlessly provide these services on behalf of .whoswho as required by ICANN.
a) Sunrise and .co
The Sunrise process for .co was divided into two sub-phases:
- Local Sunrise giving holders of eligible trademarks that have obtained registered status from the Colombian trademark office the opportunity apply for the .CO domain names corresponding with their marks
- Global Sunrise program giving holders of eligible registered trademarks of national effect, that have obtained a registered status in any country of the world the opportunity apply for the .CO domain names corresponding with their marks for a period of time before registration is open to the public at large. Like the new gTLD process set forth in the Applicant Guidebook, trademark owners had to have their rights validated by a Clearinghouse provider prior to the registration being accepted by the Registry.
The Clearinghouse used a defined process for checking the eligibility of the legal rights claimed as the basis of each Sunrise application using official national trademark databases and submitted documentary evidence. Applicants and⁄or their designated agents had the option of interacting directly with the Clearinghouse to ensure their applications were accurate and complete prior to submitting them to the Registry pursuant to an optional “Pre-validation Process”. Whether or not an applicant was “pre-validated”, the applicant had to submit its corresponding domain name application through an accredited registrar. When the Applicant was pre-validated through the Clearinghouse, each was given an associated approval number that it had to supply the
registry. If they were not pre-validated, applicants were required to submit the required trademark information through their registrar to the Registry.
As the registry level, Neustar, subsequently either delivered the:
- Approval number and domain name registration information to the Clearinghouse
- When there was no approval number, trademark information and the domain name registration information was provided to the Clearinghouse through EPP (as is currently required under the Applicant Guidebook). Information was then used by the Clearinghouse as either further validation of those pre-validated applications, or initial validation of those that did not go through pre-validation. If the applicant was validated and their trademark matched the domain name applied-for, the Clearinghouse communicated that fact to the Registry via EPP.
When there was only one validated sunrise application, the application proceeded to registration when the .co launched. If there were multiple validated applications (recognizing that there could be multiple trademark owners sharing the same trademark), those were included in the .co Sunrise auction process. Neustar tracked all of the information it received and the status of each application and posted that status on a secure Website to enable trademark owners to view the status of its Sunrise application.
Although the exact process for the Sunrise program and its interaction between the trademark owner, Registry, Registrar, and IP Clearinghouse is not completely defined in the Applicant Guidebook and is dependent on the current RFI issued by ICANN in its selection of a Trademark Clearinghouse provider, Neustar’s expertise in launching multiple Sunrise processes and its established software will implement a smooth and compliant Sunrise process for the new gTLDs. Who’s Who Registry will benefit from Neustar’s experience and guidance in managing the .whoswho Sunrise Process.
b) Trademark Claims Service Experience
With Neustar’s biz TLD launched in 2001, Neustar became the first TLD with a Trademark Claims service. Neustar developed the Trademark Claim Service by enabling companies to stake claims to domain names prior to the commencement of live .biz domain registrations. During the Trademark Claim process, Neustar received over 80,000 Trademark Claims from entities around the world. Recognizing that multiple intellectual property owners could have trademark rights in a particular mark, multiple Trademark Claims for the same string were accepted. All applications were logged into a Trademark Claims database managed by Neustar.
The Trademark Claimant was required to provide various information about their trademark rights, including the:
- Particular trademark or service mark relied on for the trademark Claim
- Date a trademark application on the mark was filed, if any, on the string of the domain name
- Country where the mark was filed, if applicable
- Registration date, if applicable
- Class or classes of goods and services for which the trademark or service mark was registered
- Name of a contact person with whom to discuss the claimed trademark rights.
Once all Trademark Claims and domain name applications were collected, Neustar then compared the claims contained within the Trademark Claims database with its database of collected domain name applications (DNAs). In the event of a match between a Trademark Claim and a domain name application, an e-mail message was sent to the domain name applicant notifying the applicant of the existing Trademark Claim. The e-mail also stressed that if the applicant chose to continue the application process and was ultimately selected as the registrant, the applicant would be subject to Neustar’s dispute proceedings if challenged by the Trademark Claimant for that particular domain name.
The domain name applicant had the option to proceed with the application or cancel the application. Proceeding on an application meant that the applicant wanted to go forward and have the application proceed to registration despite having been notified of an existing Trademark Claim. By choosing to “cancel,” the applicant made a decision in light of an existing Trademark Claim
notification to not proceed. If the applicant did not respond to the e-mail notification from Neustar, or elected to cancel the application, the application was not processed. This resulted in making the applicant ineligible to register the actual domain name. If the applicant affirmatively elected to continue the application process after being notified of the claimant’s (or claimants’) alleged trademark rights to the desired domain name, Neustar processed the application.
This process is very similar to the one ultimately adopted by ICANN and incorporated in the latest version of the Applicant Guidebook. Although the collection of Trademark Claims for new gTLDs will be by the Trademark Clearinghouse, many of the aspects of Neustar’s Trademark Claims process in 2001 are similar to those in the Applicant Guidebook. This makes Neustar uniquely qualified to implement the new gTLD Trademark Claims process.
.
29.1.2 Uniform Dispute Resolution Policy (UDRP) and Uniform Rapid Suspension (URS)
29.1.2.1 UDRP
Developed in 1988, the Uniform Dispute Resolution Policy (“UDRP”) became the first “Consensus Policy” of ICANN and has been required to be implemented by all domain name registries since that time. (A key contributor to that development has since joined the Neustar team and brings with him his expertise in this regard.) The UDRP is intended as an alternative dispute resolution process to transfer domain names from those that have registered and used domain names in bad faith. Although there is not much of an active role that the domain name registry plays in the implementation of the UDRP, Neustar has closely monitored UDRP decisions that have involved the TLDs for which it provides supports and ensures that the decisions are implemented by the registrars supporting its TLDs. When alerted by trademark owners of failures to implement UDRP decisions by its registrars, Neustar either proactively implements the decisions itself or reminds the offending registrar of its obligations to implement the decision.
29.1.2.2 URS
In response to complaints by trademark owners that the UDRP was too cost prohibitive and slow, and the fact that more than 70 percent of UDRP cases were “clear cut” cases of cybersquatting, ICANN adopted the IRT’s recommendation that all new gTLD registries be required, pursuant to their contracts with ICANN, to take part in a Uniform Rapid Suspension System (“URS”). The purpose of the URS is to provide a more cost effective and timely mechanism for brand owners than the UDRP to protect their trademarks and to promote consumer protection on the Internet. The URS is not meant to address questionable cases of alleged infringement (e.g., use of terms in a generic sense) or for anti-competitive purposes or denial of free speech, but rather for those cases in which there is no genuine contestable issue as to the infringement and abuse that is taking place. Unlike the UDRP which requires little involvement of gTLD registries, the URS envisages much more of an active role at the registry-level. For example, rather than requiring the registrar to lock down a domain name subject to a UDRP dispute, it is the registry under the
URS that must lock the domain within 24hours of receipt of the complaint from the URS Provider to restrict all changes to the registration data, including transfer and deletion of the domain names.
In addition, in the event of a determination in favor of the Complainant, the registry is required to suspend the domain name. This suspension remains for the balance of the registration period and would not resolve to the original website. Rather, the nameservers would be redirected to an informational web page provided by the URS Provider about the URS. Additionally, the WHOIS reflects that the domain name will not be able to be transferred, deleted, or modified for the life of the registration. Finally, there is an option for a successful Complainant to extend the registration period for one additional year at commercial rates. .whoswho is fully aware of each of these requirements and will have the capability to implement these requirements for new gTLDs. In fact, during the IRT’s development of the URS, Neustar began examining the implications of the URS on its registry operations and provided the IRT with feedback on whether the recommendations from the IRT would be feasible for registries to implement. Although there have been a few changes to the URS since the IRT recommendations, Neustar continued to participate in the development of the URS by providing comments to ICANN, many of which were adopted. It follow naturally, therefore, that Neustar will be especially committed to supporting the URS for all of the registries that it provides back-end registry services.
29.1.3 Implementation of Thick WHOIS
The .whoswho registry will include a thick WHOIS database as required in Specification 4 of the Registry agreement. A thick WHOIS provides numerous advantages including a centralized location of registrant information, the ability to more easily manage and control the accuracy of data, and a consistent user experience. Furthermore, because Who’s Who Registry’s WHOIS will provide even more data in extra fields to be added to the public WHOIS display (including the title, year of publication and publisher name for each registrant’s Who’s Who reference credential), both rights holders and the public will benefit from these extra data points directing them to reference sources that provide real insites into a registrant’s identity.
29.1.4 Policies Handling Complaints Regarding Abuse
In addition the Rights Protection mechanisms addressed above, Who’s Who Registry will implement a number of measures to handle complaints regarding the abusive registration of domain names in its TLD as described in .whoswho’s response to Question 28. In keeping with ICANN policy on this issue, the registry will include a point of contact to report abuse as well as an interface to report deficiencies in contact or other information in the WHOIS database, for reporting to Registrars for action, and later followup.
29.1.5 Registry Acceptable Use Policy
One of the key policies each new gTLD registry needs to have is an Acceptable Use Policy that clearly delineates the types of activities that constitute “abuse” and the repercussions associated with an abusive domain name registration. The policy must be incorporated into the applicable Registry-Registrar Agreement and reserve the right for the registry to take the appropriate actions based on the type of abuse. This may include locking down the domain name preventing any changes to the contact and nameserver information associated with the domain name, placing the domain name “on hold” rendering the domain name non-resolvable, transferring to the domain name to another registrar, and⁄or in cases in which the domain name is associated with an existing law enforcement investigation, substituting name servers to collect information about the DNS queries to assist the investigation. Who’s Who Registry’s Acceptable Use Policy, set forth in the response to Question 28, will include prohibitions on impostrous registrations, phishing, pharming, dissemination of malware, fast flux hosting, hacking, and child pornography. In addition, the policy will include the right of the registry to take action necessary to deny, cancel, suspend, lock, or transfer any registration in violation of the policy.
Monitoring for Malicious Activity
Who’s Who Registry is committed to ensuring that those domain names associated with abuse or malicious conduct in violation of the Acceptable Use Policy are dealt with in a timely and decisive manner. These include taking action against those domain names that are being used to threaten the stability and security of the TLD, or is part of a real-time investigation by law enforcement. Once a complaint is received from a trusted source, third-party, or detected by the Registry, the Registry will use commercially reasonable efforts to verify the information in the complaint. If that information can be verified to the best of the ability of the Registry, the sponsoring registrar will be notified and be given 12 hours to investigate the activity and either (i) take
down the domain name by placing the domain name on hold; or by (ii) deleting the domain name in its entirety; or (iii) providing a compelling argument to the Registry to keep the name in the zone. If the registrar has not taken the requested action after the 12-hour period (i.e., is unresponsive to the request or refuses to take action), the Registry will place the domain on “ServerHold”.
Although this action removes the domain name from the TLD zone, the domain name record still appears in the TLD WHOIS database so that the name and entities can be investigated by law enforcement should they desire to get involved.
Who’s Who Registry has opted for Neustar’s Registry Threat Mitigation Service as part of an enhanced services offering that is of importance to a global niche registry such as Who’s Who Registry, in order to meet registrant demands.
29.2 Safeguards against Unqualified Registrations
Who’s Who Registry has signaled its commitment to safeguard against unqualified registrations by designing the authentication of registrants into the mechanics of the domain creation process. Registrations will enter pendingCreate status directly from registration, and no domain will be created until efforts to authenticate the registrant have been successfully completed. As discussed in the response at to Question 28 (see 28.4.1, above), authentication efforts will include review of all new registrations.
The bona fides of those participating in pre-launch registrations through the Trademark Clearinghouse should prove quite straight-forward, assuming that the clearinghouse is representational of true IP owners of bona fide trade⁄service marks. This should make an expected surge of registrations during the pre- and post-launch period more manageable, assuming that the Trademark Clearinghouse can under these circumstances be considered a source of third-party verification.
The main goals of authentication, starting with the most important, are:
(1) establishing a correlation between the registered domain and the applicant’s name
(2) resolving that the named registrant (or authorized legacy registrant) has, in fact, registered the domain
(3) establish that the contact information for the registrant provides a reliable means of contact
(4) verification of the Who’s Who research credential
Because both the applicant name and domain name are included on each registration pendingCreate, a gross discrepancy will immediately flag a need for clarification. More subtle discrepancies may require additional consideration and online research to explain any discrepancy. Where there is no discrepancy or once resolved) the second issue is to resolve that the registrant name provide is in fact that of the registrant, and not an attempt at an impostrous registration of the domain. A personal services approach, explaining the important authentication issue at hand should not only be well-received but also appreciated by the population eligible to register a .whoswho domain(s).
Following online research seeking to corroborate the contact information provided, outreach may commence and end with a confirmation phone call (in the USA leaving a toll-free callback number of 1-800-WHOSWHO or fax of 1-866-WHOSWHO) and leaving a reply email address. Where no corroborating data can be located through online search, nor any mention in the daily⁄online media or professional journals, an enhanced level of enquiry may be indicated. Such circumstances, as well as a seemingly unqualified Whoʹs Who credential, will result in the enquiry rising to the third, and perhaps fourth, tier of enquiry for authentication purposes.
While the registry is committed to making commercially reasonable efforts at authentication, it does not have have access to every Who’s Who edition published around the world during the past half-century. Virtually all of them, however, are accessible to those with Internet across the globe and, guided by the additional data fields provided in response to WHOIS queries, the potential for “group sourced” verification becomes real. The fact that the .whoswho Registration Agreement specifies that the Registrant’s identity must correlate with that of the Who’s Who publication data cited in the registration, together with anticipation of an increased level of scrutiny from the public should together dampen an inclination toward puffery.
29.3 Resourcing Plans
The rights protection mechanisms described in the response above involve a wide range of tasks, procedures, and systems. The responsibility for each mechanism varies based on the specific requirements. In general the development of applications such as sunrise and IP claims is the responsibility of the Engineering team, with guidance from the Product Management team. Customer Support and Legal play a critical role in enforcing certain policies such as the rapid suspension process. These teams have years of experience implementing these or similar processes.
The necessary resources will be pulled from the pool of available resources described in detail in the response to Question 31.
The following resources are available from those teams:
Development⁄Engineering – 19 employees
Product Management- 4 employees
Customer Support – 12 employees
The resources are more than adequate to support the rights protection mechanisms of the .whoswho’s registry.
30(a). Security Policy: Summary of the security policy for the proposed registry
30.(a).1 Security Policies
Whoʹs Who Registry and our back-end operator, Neustar recognize the vital need to secure the systems and the integrity of the data in commercial solutions. The .whoswho
registry solution will leverage industry-best security practices including the consideration of physical, network, server, and application elements.
Neustarʹs approach to information security starts with comprehensive information security policies. These are based on the industry best practices for security including SANS (SysAdmin, Audit, Network, Security) Institute, NIST (National Institute of Standards and Technology), and CIS (Center for Internet Security). Policies are reviewed annually by Neustarʹs information security team.
The following is a summary of the security policies that will be used in the .whoswho registry, including:
1. Summary of the security policies used in the registry operations
2. Description of independent security assessments
3. Description of security features that are appropriate for .whoswho
4. List of commitments made to registrants regarding security levels
All of the security policies and levels described in this section are appropriate for the .whoswho registry.
30.(a).2 Summary of Security Policies
Neustar has developed a comprehensive Information Security Program in order to create effective administrative, technical, and physical safeguards for the protection of its information assets, and to comply with Neustarʹs obligations under applicable law, regulations, and contracts. This Program establishes Neustarʹs policies for accessing, collecting, storing, using, transmitting, and protecting electronic, paper, and other records containing sensitive information.
The Program defines:
- The policies for internal users and our clients to ensure the safe, organized and fair use of information resources.
- The rights that can be expected with that use.
- The standards that must be met to effectively comply with policy.
- The responsibilities of the owners, maintainers, and users of Neustarʹs information resources.
- Rules and principles used at Neustar to approach information security issues
The following policies are included in the Program:
1. Acceptable Use Policy
The Acceptable Use Policy provides the rules of behavior covering all Neustar Associates for using Neustar resources or accessing sensitive information.
2. Information Risk Management Policy
The Information Risk Management Policy describes the requirements for the on-going information security risk management program, including defining roles and responsibilities for conducting and evaluating risk assessments, assessments of technologies used to provide information security and monitoring procedures used to measure policy compliance.
3. Data Protection Policy
The Data Protection Policy provides the requirements for creating, storing, transmitting, disclosing, and disposing of sensitive information, including data classification and labeling requirements, the requirements for data retention. Encryption and related technologies such as digital certificates are also covered under this policy.
4. Third Party Policy
The Third Party Policy provides the requirements for handling service provider contracts, including specifically the vetting process, required contract reviews, and on-going monitoring of service providers for policy compliance.
5. Security Awareness and Training Policy
The Security Awareness and Training Policy provide the requirements for managing the on-going awareness and training program at Neustar. This includes awareness and training activities provided to all Neustar Associates.
6. Incident Response Policy
The Incident Response Policy provides the requirements for reacting to reports of potential security policy violations. This policy defines the necessary steps for identifying and reporting security incidents, remediation of problems, and conducting lessons learned post-mortem reviews in order to provide feedback on the effectiveness of this Program.
Additionally, this policy contains the requirement for reporting data security breaches to the appropriate authorities and to the public, as required by law, contractual requirements, or regulatory bodies.
7. Physical and Environmental Controls Policy
The Physical and Environment Controls Policy provides the requirements for securely storing sensitive information and the supporting information technology equipment and infrastructure. This policy includes details on the storage of paper records as well as access to computer systems and equipment locations by authorized personnel and visitors.
8. Privacy Policy
Neustar supports the right to privacy, including the rights of individuals to control the dissemination and use of personal data that describes them, their personal choices, or life experiences. Neustar supports domestic and international laws and regulations that seek to protect the privacy rights of such individuals.
9. Identity and Access Management Policy
The Identity and Access Management Policy covers user accounts (login ID naming convention, assignment, authoritative source) as well as ID lifecycle (request, approval, creation, use, suspension, deletion, review), including provisions for system⁄application accounts, shared⁄group accounts, guest⁄public accounts, temporary⁄emergency accounts, administrative access, and remote access. This policy also includes the user password policy requirements.
10. Network Security Policy
The Network Security Policy covers aspects of Neustar network infrastructure and the technical controls in place to prevent and detect security policy violations.
11. Platform Security Policy
The Platform Security Policy covers the requirements for configuration management of servers, shared systems, applications, databases, middle-ware, and desktops and laptops owned or operated by Neustar Associates.
12. Mobile Device Security Policy
The Mobile Device Policy covers the requirements specific to mobile devices with information storage or processing capabilities. This policy includes laptop standards, as well as requirements for PDAs, mobile phones, digital cameras and music players, and any other removable device capable of transmitting, processing or storing information.
13. Vulnerability and Threat Management Policy
The Vulnerability and Threat Management Policy provides the requirements for patch management, vulnerability scanning, penetration testing, threat management (modeling and monitoring) and the appropriate ties to the Risk Management Policy.
14. Monitoring and Audit Policy
The Monitoring and Audit Policy covers the details regarding which types of computer events to record, how to maintain the logs, and the roles and responsibilities for how to review, monitor, and respond to log information. This policy also includes the requirements for backup, archival, reporting, forensics use, and retention of audit logs.
15. Project and System Development and Maintenance Policy
The System Development and Maintenance Policy covers the minimum security requirements for all software, application, and system development performed by or on behalf of Neustar and the minimum security requirements for maintaining information systems.
30.(a).3 Independent Assessment Reports
Neustar IT Operations is subject to yearly Sarbanes-Oxley (SOX), Statement on Auditing Standards #70 (SAS70) and ISO audits. Testing of controls implemented by Neustar management in the areas of access to programs and data, change management and IT Operations are subject to testing by both internal and external SOX and SAS70 audit groups. Audit Findings are communicated to process owners, Quality Management Group and Executive Management. Actions are taken to make process adjustments where required and remediation of issues is monitored by internal audit and QM groups.
External Penetration Test is conducted by a third party on a yearly basis. As authorized by Neustar, the third party performs an external Penetration Test to review potential security weaknesses of network devices and hosts and demonstrate the impact to the environment.
The assessment is conducted remotely from the Internet with testing divided into four phases:
- A network survey is performed in order to gain a better knowledge of the network that was being tested
- Vulnerability scanning is initiated with all the hosts that are discovered in the previous phase
- Identification of key systems for further exploitation is conducted
- Exploitation of the identified systems is attempted.
Each phase of the audit is supported by detailed documentation of audit procedures and results. Identified vulnerabilities are classified as high, medium and low risk to facilitate managementʹs prioritization of remediation efforts. Tactical and strategic recommendations are provided to management supported by reference to industry best practices.
30.(a).4 Augmented Security Levels and Capabilities
There are no increased security levels specific for .whoswho. However, Neustar will provide the same high level of security provided across all of the registries it manages. A key to Neustarʹs Operational success is Neustarʹs highly structured operations practices.
The standards and governance of these processes:
- Include annual independent review of information security practices
- Include annual external penetration tests by a third party
- Conform to the ISO 9001 standard (Part of Neustarʹs ISO-based Quality Management System)
- Are aligned to Information Technology Infrastructure Library (ITIL) and CoBIT best practices
- Are aligned with all aspects of ISO IEC 17799
- Are in compliance with Sarbanes-Oxley (SOX) requirements (audited annually)
- Are focused on continuous process improvement (metrics driven with product scorecards reviewed monthly).
A summary view to Neustarʹs security policy in alignment with ISO 17799 can be found in section 30.(a).5 below.
30.(a).5 Commitments and Security Levels
The .whoswho registry commits to high security levels that are consistent with the needs of the TLD. These commitments include:
Compliance with High Security Standards
- Security procedures and practices that are in alignment with ISO 17799
- Annual SOC 2 Audits on all critical registry systems
- Annual 3rd Party Penetration Tests
- Annual Sarbanes Oxley Audits
Highly Developed and Document Security Policies
- Compliance with all provisions described in section 30.(b) and in the attached security policy document.
- Resources necessary for providing information security
- Fully documented security policies
- Annual security training for all operations personnel
High Levels of Registry Security
-Multiple redundant data centers
- High Availability Design
- Architecture that includes multiple layers of security
- Diversified firewall and networking hardware vendors
- Multi-factor authentication for accessing registry systems
- Physical security access controls
- A 24x7 manned Network Operations Center that monitors all systems and applications
- A 24x7 manned Security Operations Center that monitors and mitigates DDoS attacks
- DDoS mitigation using traffic scrubbing technologies
© 2012 Internet Corporation For Assigned Names and Numbers.