<div dir="ltr"><div dir="ltr"><div>Additionally, examples of impersonating a corporate entity to acquire unused IP space (Erie Forge and Steel's /16, anyone?) undoubtedly fall under existing, pre-internet interstate commerce fraud laws...</div><div><br></div><div><a href="http://web.mit.edu/net-security/Camp/2003/DBowie_IP_Hijacking.pdf">http://web.mit.edu/net-security/Camp/2003/DBowie_IP_Hijacking.pdf</a></div><div><br></div><div><a href="https://www.wired.com/images_blogs/threatlevel/files/edited-iphd-2.ppt">https://www.wired.com/images_blogs/threatlevel/files/edited-iphd-2.ppt</a></div><div><br></div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Wed, Jan 20, 2021 at 9:54 AM John Curran <<a href="mailto:jcurran@arin.net">jcurran@arin.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">



<div style="overflow-wrap: break-word;">
On 20 Jan 2021, at 12:17 PM, Bryan Fields <<a href="mailto:Bryan@bryanfields.net" target="_blank">Bryan@bryanfields.net</a>> wrote:<br>
<div>
<blockquote type="cite"><br>
<div><span style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none;float:none;display:inline">AFAIK
 IANA and the RIR's cannot enforce use of IP space assignments on any</span><br style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none">
<span style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none;float:none;display:inline">network.</span></div>
</blockquote>
<br>
</div>
<div><chuckle>  While route hijacking isn't necessarily an ARIN issue, I will note that several US law enforcement agencies (FBI & NCIS Cybercrime units) are quite interested in such events and do investigate them looking for criminal activity.   </div>
<div><br>
</div>
<div>(See <a href="https://pc.nanog.org/static/published/meetings/NANOG77/2108/20191028_Elverson_Your_As_Is_v1.pdf" target="_blank">https://pc.nanog.org/static/published/meetings/NANOG77/2108/20191028_Elverson_Your_As_Is_v1.pdf</a> for details.) </div>
<div><br>
</div>
<div>FYI,</div>
<div>/John</div>
<div><br>
</div>
<div>
<div>John Curran</div>
<div>President and CEO</div>
<div>American Registry for Internet Numbers</div>
<div><br>
</div>
</div>
</div>

</blockquote></div></div>