Law enforcement and RIPE NCC Resource Certification Service Launch

On 3 January 2011 RIPE NCC launched her resource certification service. The idea is that there is to be a database in which all the IP address blocks distributed by RIPE NCC over the years are certified to the legitimate owners.

LEAs need to participate in the RIPE policy process
For LEAs this is of direct interest. The certification system will show beyond doubt to what Local Internet Registry (LIR) a certain IP address was allocated. With the allocation of IPv6 resources in mind, participation in the ensuing policy process is more important than before. In my opinion LEAs can not afford to miss out. Why is this?

RIPE NCC reminds us that this is only a trial period. The definite policy still has to be set by the RIPE community. Also the database does not (yet) deal with sub(-sub) allocations by LIRs at national level. This will be instituted later in 2011. If the RIPE community so wishes.

LEAs may want to monitor this process and work constructively with the RIPE community to make sure that the needs of enforcement agencies are understood and taken into account when policy is set. Sound proof certification of sub(-sub) allocations are an interesting topic for LEAs. The lower in the chain the harder investigations tend to get. Certification and thus correct data, may just make the abuse of IP addresses one step harder for cyber criminals, because the local IP address blocks owners are registered better in the first place and better traceable as a result. This makes the last step to tracing their costumers easier also.

Here’s the link to the RIPE NCC news flash.

Wout de Natris

Leiderdorp, 5 January 2011


About Wout de Natris

As a consultant I specialise in establishing new and different relationships between industry, governments and law enforcement where internet safety and the fight against cyber crime are concerned. This makes me a bridge builder. Hence the blogs name. In this blog I intend to stress the need for interaction, cooperation and exchange of information in order to change the mentioned relationships. On offer: a comprehensive training on all non-technical aspects of spam enforcement and a cyber awareness presentation for companies and institutions
This entry was posted in Cyber crime, International cooperation: cross border aspects, International cooperation: IP resources, News flash, spam and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s