Feeds

Child abuse cop slams ICANN

'Accurate Whois is a joke. It just doesn't happen,' says Interpol kid protector

The Power of One eBook: Top reasons to choose HP BladeSystem

One of Interpol's top child porn cops has launched a blistering attack on the domain name industry and the Internet Corporation for Assigned Names and Numbers (ICANN) for not doing enough to help law enforcement tackle child abuse imagery online.

At ICANN's public meeting in San Francisco this week, Garda Síochána's Michael Moran, on secondment to Interpol for the last five years as Coordinator of the Crimes Against Children team, slammed the domain name industry on at least two fronts.

First, he said that police lack a reliable way to quickly request that domains that lead to images of child abuse are suspended. Second, he said the accuracy of Whois records, which ostensibly contain the true name and contact information of domain name owners, needs to be more strictly enforced, so that abusers can be tracked down and arrested.

"Accurate Whois is a joke. It just doesn't happen," Moran said. "We don't see it, we never get it. Even if we do see something within it that might give us indications, it's always a dead end and it's a waste of time even trying. What's the point in having a Whois database if it can't be accurate? Somebody has to be responsible for having that accurate, and whoever that somebody is, can you please step up to the plate and do your work?"

His comments came during a session on DNS abuse at ICANN's 40th public meeting, which is being held all week at the Westin St Francis hotel in San Francisco. It was the seventh such discussion between law enforcement and the industry held by ICANN – there have been several more hosted recently by international governments – and Moran expressed frustration that there has been more talk about cooperation than hard action.

"Let's clear away the chairs and start dancing," he concluded.

Price constraints

Domain registrars are generally reluctant to implement technical measures, such as identity verification, that can add friction to the domain registration process or increase the price of a domain name. It's a fiercely competitive market. In addition, they argue that pre-checking Whois information for accuracy would only truly be of value to police if it was obligatory industry-wide practice, otherwise criminals would simply shop around for registrars with lax controls.

Interpol's Moran noted that payment processors, including the major credit card companies, have a Financial Coalition Against Child Pornography, which will immediately terminate the merchant account of any website police say is selling child abuse material. He called upon the domain name industry to create a similar coalition to suspend domain names associated with child porn.

"We would love to see an automatic system whereby, upon notification, ICANN, or whoever, can just sever them," Moran said, noting that Interpol maintains a "worst of" list of less than 400 domain names at any given time that are being used to traffic the most egregious types of child porn. On the current list, more than half of the domains are dot-coms.

Bobby Flaim of the FBI noted that there are "pockets of excellence" within the domain name industry, but that cooperation with law enforcement needs to be 100 per cent if it is to make a difference. ICANN requires registrars to enforce the accuracy of their customers' Whois records, and the leading registrars are often quite strict about complying with this rule. But with almost 1,000 ICANN-accredited registrars, there are many "rogue" companies with fewer scruples.

"We have no interest in our system being used to enable people to commit crimes on the internet," said Christine Jones, general counsel of Go Daddy, which has 100 staff on its abuse team. "But ... until all of the registrars are held to a standard that says you have to take care of the bad guys on your system, no matter how much effort Go Daddy and other good registrars put into this problem you're never going to solve it because there will always be a safe harbour, a bullet-proof registrar or a bullet-proof hosting provider those bad guys can go and seek solace in.

"We have to fix that hole in the fence." ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.