<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.sanctions.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Woody</id>
	<title>sanctions - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.sanctions.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Woody"/>
	<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php/Special:Contributions/Woody"/>
	<updated>2026-04-24T13:30:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.5</generator>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=322</id>
		<title>Welcome to the Internet Sanctions Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=322"/>
		<updated>2024-01-15T12:59:20Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Why does this project exist? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is an [https://en.wikipedia.org/wiki/Open_standard open], [https://en.wikipedia.org/wiki/Internet_governance Internet community governed], project which produces real-time [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP] and [https://en.wikipedia.org/wiki/Response_policy_zone RPZ] data feeds of network resources ([https://en.wikipedia.org/wiki/IP_address IP addresses], [https://en.wikipedia.org/wiki/Autonomous_system_(Internet) Autonomous System numbers], and [https://en.wikipedia.org/wiki/Domain_name domain names]) associated with [https://en.wikipedia.org/wiki/Economic_sanctions sanctioned] entities. These data feeds facilitate [https://en.wikipedia.org/wiki/Internet_service_provider Internet network operators] in complying with governmentally-mandated sanctions against violators of international and human rights law.&lt;br /&gt;
&lt;br /&gt;
=== Why does this project exist? ===&lt;br /&gt;
Sanctions have been used as a tool of statecraft for [https://foreignpolicy.com/2012/04/23/smart-sanctions-a-short-history/ thousands of years], but their use has become particularly widespread in the latter part of the Twentieth Century. Most sanctions used since the Second World War and until the start of the new Millennium were employed through the United Nations. Over the past 20 years, however, impasse at the United Nations Security Council (UNSC) has meant that a number of national governments and regional organisations also use their own autonomous (or unilateral) sanctions.  These can supplement multilateral (UN) sanctions, or can be imposed entirely in their absence. All sanctions regimes employed today are supposed to be &amp;quot;targeted&amp;quot; or &amp;quot;smart&amp;quot; (geared to only impact certain targets and not a country's entire population). &lt;br /&gt;
&lt;br /&gt;
The United States (US) is the most prolific user of autonomous sanctions, followed by the European Union (EU). A number of other nations, such as the United Kingdom (UK), Canada, Australia and Japan also use autonomous sanctions; often in close coordination with one another. All regional organisations (such as the African Union and the League of Arab States) use sanctions against their own members, but the EU is the only one to use it as a tool of external foreign and security policy. &lt;br /&gt;
&lt;br /&gt;
In contemporary times, the private sector within each nation is responsible for complying with sanctions adopted by the government where a given company is based. This can include multilateral and autonomous sanctions.  In some cases, the US employs secondary sanctions, which have an extraterritorial reach, which means that all individuals, companies and other entities can be subject to US sanctions under certain regimes.  The most common types of sanctions used by all actors are asset freezes (against individuals or entities), travel bans (against individuals) and arms embargoes.  Since the early 2010s, there have been a rise in sectoral sanctions, such as those against finance, banking, energy and other commodities (in part, or in full). Some sanctions regimes have become so broad and hard-hitting that they can be considered de-facto comprehensive embargoes (or comprehensive sanctions) . &lt;br /&gt;
&lt;br /&gt;
In the case of sanctions targeting banking sectors, compliance is facilitated by the fact that, while superficially appearing to be multinational, banks are actually collections of individual, autonomous, independently-regulated entities, each existing within a single country, though they may share a common brand. In the case of the &amp;quot;flat&amp;quot; global, transnational nature of the Internet, compliance with diverse sanctions regimes is rendered much more difficult for Internet organizations. Large Internet networks operate as single networks spanning the world, with unitary policy and technical choices implemented globally. Thus a policy imposed by a single government on a global network, if implemented, has [https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction extraterritorial effects] in every other country, violating those countries' [https://en.wikipedia.org/wiki/Westphalian_sovereignty Westphalian] rights of [https://en.wikipedia.org/wiki/Self-determination self-determination]. And conflicting policies imposed by different governments cannot be resolved without breaking the fundamental nature of Internet connectivity.&lt;br /&gt;
&lt;br /&gt;
At the same time, broadly-defined Internet sanctions tend to disproportionately affect the civilian population of sanctioned countries; this is both counterproductive and violates their human rights to freedom of communication and access to information as recognized by [[Policy:Freedom of Expression and Access to Information|the United Nations, the European Union, the Council of Europe, the Organization of American States, the African Union, and others]]. &lt;br /&gt;
&lt;br /&gt;
This project brings together governments, Internet organizations, civil society, and academia to provide a globally-harmonized Internet sanctions imposition mechanism that combines the expertise and perspectives of different stakeholders to develop proportional and effective sanctions that aim to not impinge upon civilians' access to information and communications. '''This project is neither pro-sanction nor anti-sanction'''; it exists to facilitate public-sector/private-sector coordination while ensuring that the human rights of civilians are protected.&lt;br /&gt;
&lt;br /&gt;
=== Origin of the project ===&lt;br /&gt;
This project originated in an [[The Open Letter|open letter]] from leaders of the multistakeholder Internet governance community, calling for constructive dialog about the imposition of Internet-related sanctions, and for a principled, structured, and transparent approach to sanctions, with the explicit aim of maintaining connectivity to civilian populations. &lt;br /&gt;
&lt;br /&gt;
=== Structure ===&lt;br /&gt;
The project is implemented by five working groups:&lt;br /&gt;
&lt;br /&gt;
* A [[Policy:Policy Group|'''policy group''']] monitors the political situation and the sanction initiatives of national governments, and evaluates whether a situation or proposed sanctions is relevant in light of the project's principles. If a sanction is deemed in-scope, the policy group defines the situation and (potentially) sanctioned entities and passes them to the [[Open Source Intelligence|intelligence group]]. The policy group is responsible for determining the limited scope of measures, analyzing when existing sanctions should be repealed, and for liaising with governments which are considering declaring this mechanism to be sufficient compliance with their nationally-defined sanctions.&lt;br /&gt;
&lt;br /&gt;
* An [[Open Source Intelligence|'''intelligence group''']] investigates and catalogs the Internet resources (IP addresses, Autonomous System numbers, and domain names) held by sanctioned entities. This helps the [[Policy Group|policy group]] understand the (potential) impact of measures and assess their proportionality. &lt;br /&gt;
&lt;br /&gt;
* An [[Oversight Board|'''oversight board''']] provides a final check on which resources are included in the blocking feed, verifying its conformity with international and human rights law. When anything is added to the feed, an announcement will be posted to the (read-only) [https://lists.sanctions.net/mailman/listinfo/announce announcement email list], which you're welcome to subscribe to, to keep track of the project's outcomes.&lt;br /&gt;
&lt;br /&gt;
* An [[Operations Group|'''operations group''']] keeps the BGP and RPZ feed publishing mechanisms working and gather feedback from implementers.&lt;br /&gt;
&lt;br /&gt;
* A [[Research Group|'''research group''']] is responsible for metrics and monitoring of the system and its effectiveness, and liaises with the academic community.&lt;br /&gt;
&lt;br /&gt;
=== Participation ===&lt;br /&gt;
This is a community volunteer effort, and your participation is welcome! Please consider [[Frequently Asked Questions|reading the FAQ]] and subscribing to the [[E-Mail Discussion Lists|email discussion lists]] as starting-points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Style_Test&amp;diff=321</id>
		<title>Style Test</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Style_Test&amp;diff=321"/>
		<updated>2023-02-01T16:13:29Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Level 1 Heading '''Bold'''=&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Nonexistent link]] [[Welcome_to_the_Internet_Sanctions_Project]]&lt;br /&gt;
&lt;br /&gt;
==Level 2 Heading '''Bold'''==&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Nonexistent link]] [[Welcome_to_the_Internet_Sanctions_Project]]&lt;br /&gt;
&lt;br /&gt;
===Level 3 Heading '''Bold'''===&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Nonexistent link]] [[Welcome_to_the_Internet_Sanctions_Project]]&lt;br /&gt;
&lt;br /&gt;
====Level 4 Heading '''Bold'''====&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Nonexistent link]] [[Welcome_to_the_Internet_Sanctions_Project]]&lt;br /&gt;
&lt;br /&gt;
=====Level 5 Heading '''Bold'''=====&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Nonexistent link]] [[Welcome_to_the_Internet_Sanctions_Project]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Style_Test&amp;diff=320</id>
		<title>Style Test</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Style_Test&amp;diff=320"/>
		<updated>2023-02-01T16:08:53Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;=Level 1 Heading= Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  Link  ==Level 2 Heading== Plain text, '''bold text''', ''italic text'', '''''b...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Level 1 Heading=&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Link]]&lt;br /&gt;
&lt;br /&gt;
==Level 2 Heading==&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Link]]&lt;br /&gt;
&lt;br /&gt;
===Level 3 Heading===&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Link]]&lt;br /&gt;
&lt;br /&gt;
====Level 4 Heading====&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Link]]&lt;br /&gt;
&lt;br /&gt;
=====Level 5 Heading=====&lt;br /&gt;
Plain text, '''bold text''', ''italic text'', '''''bold italic text'''''.  [[Link]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=319</id>
		<title>Policy:Intake Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=319"/>
		<updated>2022-08-11T14:17:21Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Schema Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Schema Notes ==&lt;br /&gt;
Since a schema will need to be standardized across many governments, it should be as complete as possible in the first definition, since it will be extraordinarily difficult to revise or expand subsequent to adoption.&lt;br /&gt;
&lt;br /&gt;
* All sanctions should be published in an XML schema which is standardized across all participating governments.&lt;br /&gt;
&lt;br /&gt;
* When governments wish to &amp;quot;inherit&amp;quot; one or more sanctioned entities, or a whole sanctions regime, from another government, an &amp;quot;inclusion by reference&amp;quot; external citation record should be used, rather than a new record created. Such a record should consist of the URL of the cited entity, a start date, and a (potentially empty) end date.&lt;br /&gt;
&lt;br /&gt;
* Each government should provide a single canonical well-known location, containing a single file with all currently-active sanctions imposed by that government regardless of agency and, optionally, separate files archiving expired sanctions by decade (i.e. one file covering January 1, 1980 through December 31, 1989) with sanctions assigned to files by date of imposition. (If a sanction lasted from May 1, 2009 through February 15, 2011, it would be recorded in the 2000-2009 file, not the 2010-2020 file.) A standardized naming scheme should be established based on the ISO 3166 Alpha-2 country code and the year range; for example, &amp;quot;sanctions-au-2000-2009.xml&amp;quot; or &amp;quot;sanctions-se-2020-present.xml&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Other relevant metadata, like corporation type, gross revenue, gender of person, height and weight of person, should be recorded if available in standardized record types, in standardized (metric) units, with applicable date ranges and, if appropriate, source of authority or information.&lt;br /&gt;
&lt;br /&gt;
* The most authoritative name of any entity is the version as presented in its native language ''and script''. Not transliterations.  The native version should have a flag set which indicates it as such.  Each transliteration should be flagged as an alias and labeled by the destination language/script. Names should be rendered in Unicode and labeled as to script and language.&lt;br /&gt;
&lt;br /&gt;
* Countries should be canonically indicated by their ISO-3166 Alpha-2 abbreviation where available, and a flag should be used to indicate when a country without an assigned ISO-3166 abbreviation is being identified.&lt;br /&gt;
&lt;br /&gt;
* Suffixes for companies, such as &amp;quot;LLC,&amp;quot; &amp;quot;Joint Stock Company,&amp;quot; &amp;quot;Corp,&amp;quot; and prefixes and suffixes for people, such as &amp;quot;Jr.,&amp;quot; &amp;quot;Honorable,&amp;quot; &amp;quot;Eng.,&amp;quot; &amp;quot;Ph.D&amp;quot; should all be separated from the entity name proper, into separate corporate or individual prefix or suffix fields, and tokenized or harmonized to the degree possible.&lt;br /&gt;
&lt;br /&gt;
* Relationships between entities should be recorded using standardized forms (&amp;quot;subsidiary,&amp;quot; &amp;quot;parent company,&amp;quot; &amp;quot;controlling owner,&amp;quot; &amp;quot;officer,&amp;quot; &amp;quot;director,&amp;quot; &amp;quot;father,&amp;quot; &amp;quot;step-son,&amp;quot; &amp;quot;spouse,&amp;quot; with applicable date ranges and sources of authority or information where appropriate. Note that many relationships are asymmetrically bidirectional, and thus also require a directionality property: Aunt-Nephew for instance.  It may be appropriate to use gender-neutral or gender-inclusive relationship names (i.e. use the same relationship to express father-daughter, mother-son, father-son, and mother-daughter) in order to avoid synchronization issues in cases of unknown or changed genders. Many types of relationships are possible, but this category should not be allowed to become overburdened: it may not be necessary to state that a sanctioned individual is the pilot of a sanctioned aircraft, for instance, when the individual and the aircraft are already related to a common sanctioned holding company by employment and ownership, respectively.&lt;br /&gt;
&lt;br /&gt;
* For each name, dates of first and most recent observed use should be attached.&lt;br /&gt;
&lt;br /&gt;
* If an organization is dissolved, or a person dies, a date should be recorded.&lt;br /&gt;
&lt;br /&gt;
* For each sanction, a start date and, eventually, an end date should be attached to the entity-record, along with the identity of the sanctioning entity, and a link to a standardized identifier of the sanctioning event or reason. A single entity-record may have many separate sanction records attached to it, associated with different countries, different events, and different (possibly overlapping) date-ranges.&lt;br /&gt;
&lt;br /&gt;
* Sanctioning events or reasons should exist in their own table of unique records, including dates of general imposition or retraction, the entity which imposed them, and a canonical reference to the law, regulation, or finding in which the sanction is documented.  The dates attached to the overall event need not be specific to the date level, and need not align exactly with the specific dates on which individual entities were added to the sanction. Each act of national law or regulation which produces a sanction list, whether new or an amendment to an existing list, should be represented as a unique record, with the national legal action being the unique identifier.&lt;br /&gt;
&lt;br /&gt;
* A table of meta-sanctioning events should be used to link national sanction events. For instance, a meta &amp;quot;Russia-Ukraine conflict&amp;quot; event with a start date of 2014 might be used to tie together many separate national sanctions imposed by different countries with date ranges 2014-present, 2014-2014, 2014-2015, 2021-present, 2022-present, et cetera.&lt;br /&gt;
&lt;br /&gt;
* People names should be separated into parts, and each part should be flagged with an order-of-rendering and a type: &amp;quot;given name,&amp;quot; &amp;quot;patronymic,&amp;quot; &amp;quot;family name,&amp;quot; &amp;quot;anglicization,&amp;quot; &amp;quot;nickname,&amp;quot; etc.&lt;br /&gt;
&lt;br /&gt;
* The form of a personal name as it appears on a passport issued by the person's native country should have primacy.  Other forms of the name should be flagged as aliases.&lt;br /&gt;
&lt;br /&gt;
* The most-commonly-used form of a personal name should be flagged as such.&lt;br /&gt;
&lt;br /&gt;
* All known identifying numbers (corporate registration numbers, [https://www.gleif.org/en/about-lei/introducing-the-legal-entity-identifier-lei Legal Entity Identifier (LEI)], [https://www.dnb.com/duns-number.html DUNS number], passport numbers, driver's license or ID numbers) should be saved, along with start and end dates of validity, date of issuance, name and location of issuing authority, etc.&lt;br /&gt;
&lt;br /&gt;
* Identification-issuing authorities should exist in their own separate table of unique entities, with aliases, most-commonly-used-form, structured place names, start and end date of authority, and hierarchical relationship to parent organizations.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* When Internet resources are associated with sanctioned entities, they should exist in their own unique tables of IP address, Autonomous System Number, and Domain Name. Each resource should have a start (and potentially end) date which indicates ''its creation and deletion dates'', not the dates at which it was associated with a sanctioned entity. These resources are then linked to sanctioned entities through a table of links, each of which contains, minimally, a unique identifier, pointer to source of authority, sanctioning event or reason, date of record creation, party or process which created the record, start date of link applicability, optional end date of link (or still-in-effect), as well as the unique identifiers of the sanctioned entity and the Internet resource. These links are potentially many-to-many, and multiple links may exist between the same pair of sanctioned entity and resource, at different or overlapping date ranges.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=318</id>
		<title>Welcome to the Internet Sanctions Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=318"/>
		<updated>2022-08-11T14:04:35Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Structure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is an [https://en.wikipedia.org/wiki/Open_standard open], [https://en.wikipedia.org/wiki/Internet_governance Internet community governed], project which produces real-time [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP] and [https://en.wikipedia.org/wiki/Response_policy_zone RPZ] data feeds of network resources ([https://en.wikipedia.org/wiki/IP_address IP addresses], [https://en.wikipedia.org/wiki/Autonomous_system_(Internet) Autonomous System numbers], and [https://en.wikipedia.org/wiki/Domain_name domain names]) associated with [https://en.wikipedia.org/wiki/Economic_sanctions sanctioned] entities. These data feeds facilitate [https://en.wikipedia.org/wiki/Internet_service_provider Internet network operators] in complying with governmentally-mandated sanctions against violators of international and human rights law.&lt;br /&gt;
&lt;br /&gt;
=== Why does this project exist? ===&lt;br /&gt;
Sanctions have been used as a tool of statecraft for [https://foreignpolicy.com/2012/04/23/smart-sanctions-a-short-history/ thousands of years], but their use has become particularly widespread in the latter part of the Twentieth Century. Most sanctions used since the Second World War and until the start of the new Millennium were employed through the United Nations. Over the past 20 years, however, impasse at the United Nations Security Council (UNSC) has meant that a number of national governments and regional organisations also use their own autonomous (or unilateral) sanctions.  These can supplement multilateral (UN) sanctions, or can be imposed entirely in their absence. All sanctions regimes employed today are supposed to be &amp;quot;targeted&amp;quot; or &amp;quot;smart&amp;quot; (geared to only impact on certain targets and not a country's entire population). &lt;br /&gt;
&lt;br /&gt;
The United States (US) is the most prolific user of autonomous sanctions, followed by the European Union (EU). A number of other nations, such as the United Kingdom (UK), Canada, Australia and Japan also use autonomous sanctions; often in close coordination with one another. All regional organisations (such as the African Union and the League of Arab States) use sanctions against their own members, but the EU is the only one to use it as a tool of external foreign and security policy. &lt;br /&gt;
&lt;br /&gt;
In contemporary times, the private sector within each nation is responsible for complying with sanctions adopted by the government where a given company is based. This can include multilateral and autonomous sanctions.  In some cases, the US employs secondary sanctions, which have an extraterritorial reach, which means that all individuals, companies and other entities can be subject to US sanctions under certain regimes.  The most common types of sanctions used by all actors are asset freezes (against individuals or entities), travel bans (against individuals) and arms embargoes.  Since the early 2010s, there have been a rise in sectoral sanctions, such as those against finance, banking, energy and other commodities (in part, or in full). Some sanctions regimes have become so broad and hard-hitting that they can be considered de-facto comprehensive embargoes (or comprehensive sanctions) . &lt;br /&gt;
&lt;br /&gt;
In the case of sanctions targeting banking sectors, compliance is facilitated by the fact that, while superficially appearing to be multinational, banks are actually collections of individual, autonomous, independently-regulated entities, each existing within a single country, though they may share a common brand. In the case of the &amp;quot;flat&amp;quot; global, transnational nature of the Internet, compliance with diverse sanctions regimes is rendered much more difficult for Internet organizations. Large Internet networks operate as single networks spanning the world, with unitary policy and technical choices implemented globally. Thus a policy imposed by a single government on a global network, if implemented, has [https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction extraterritorial effects] in every other country, violating those countries' [https://en.wikipedia.org/wiki/Westphalian_sovereignty Westphalian] rights of [https://en.wikipedia.org/wiki/Self-determination self-determination]. And conflicting policies imposed by different governments cannot be resolved without breaking the fundamental nature of Internet connectivity.&lt;br /&gt;
&lt;br /&gt;
At the same time, broadly-defined Internet sanctions tend to disproportionately affect the civilian population of sanctioned countries; this is both counterproductive and violates their human rights to freedom of communication and access to information as recognized by [[Policy:Freedom of Expression and Access to Information|the United Nations, the European Union, the Council of Europe, the Organization of American States, the African Union, and others]]. &lt;br /&gt;
&lt;br /&gt;
This project brings together governments, Internet organizations, civil society, and academia to provide a globally-harmonized Internet sanctions imposition mechanism that combines the expertise and perspectives of different stakeholders to develop proportional and effective sanctions that aim to not impinge upon civilians' access to information and communications. '''This project is neither pro-sanction nor anti-sanction'''; it exists to facilitate public-sector/private-sector coordination while ensuring that the human rights of civilians are protected.&lt;br /&gt;
&lt;br /&gt;
=== Origin of the project ===&lt;br /&gt;
This project originated in an [[The Open Letter|open letter]] from leaders of the multistakeholder Internet governance community, calling for constructive dialog about the imposition of Internet-related sanctions, and for a principled, structured, and transparent approach to sanctions, with the explicit aim of maintaining connectivity to civilian populations. &lt;br /&gt;
&lt;br /&gt;
=== Structure ===&lt;br /&gt;
The project is implemented by five working groups:&lt;br /&gt;
&lt;br /&gt;
* A [[Policy:Policy Group|'''policy group''']] monitors the political situation and the sanction initiatives of national governments, and evaluates whether a situation or proposed sanctions is relevant in light of the project's principles. If a sanction is deemed in-scope, the policy group defines the situation and (potentially) sanctioned entities and passes them to the [[Open Source Intelligence|intelligence group]]. The policy group is responsible for determining the limited scope of measures, analyzing when existing sanctions should be repealed, and for liaising with governments which are considering declaring this mechanism to be sufficient compliance with their nationally-defined sanctions.&lt;br /&gt;
&lt;br /&gt;
* An [[Open Source Intelligence|'''intelligence group''']] investigates and catalogs the Internet resources (IP addresses, Autonomous System numbers, and domain names) held by sanctioned entities. This helps the [[Policy Group|policy group]] understand the (potential) impact of measures and assess their proportionality. &lt;br /&gt;
&lt;br /&gt;
* An [[Oversight Board|'''oversight board''']] provides a final check on which resources are included in the blocking feed, verifying its conformity with international and human rights law. When anything is added to the feed, an announcement will be posted to the (read-only) [https://lists.sanctions.net/mailman/listinfo/announce announcement email list], which you're welcome to subscribe to, to keep track of the project's outcomes.&lt;br /&gt;
&lt;br /&gt;
* An [[Operations Group|'''operations group''']] keeps the BGP and RPZ feed publishing mechanisms working and gather feedback from implementers.&lt;br /&gt;
&lt;br /&gt;
* A [[Research Group|'''research group''']] is responsible for metrics and monitoring of the system and its effectiveness, and liaises with the academic community.&lt;br /&gt;
&lt;br /&gt;
=== Participation ===&lt;br /&gt;
This is a community volunteer effort, and your participation is welcome! Please consider [[Frequently Asked Questions|reading the FAQ]] and subscribing to the [[E-Mail Discussion Lists|email discussion lists]] as starting-points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Conflict_with_Privacy_Law&amp;diff=317</id>
		<title>Policy:Conflict with Privacy Law</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Conflict_with_Privacy_Law&amp;diff=317"/>
		<updated>2022-06-27T11:10:28Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We should probably begin a conversation with governments over exempting sanctioned entities from the protections of privacy law which would prohibit the sharing of personally identifiable information (such as names, addresses, and IP addresses) used in the sanction implementation process.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=316</id>
		<title>Policy:Intake Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=316"/>
		<updated>2022-06-27T11:09:31Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Schema Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Schema Notes ==&lt;br /&gt;
Since a schema will need to be standardized across many governments, it should be as complete as possible in the first definition, since it will be extraordinarily difficult to revise or expand subsequent to adoption.&lt;br /&gt;
&lt;br /&gt;
* All sanctions should be published in an XML schema which is standardized across all participating governments.&lt;br /&gt;
&lt;br /&gt;
* When governments wish to &amp;quot;inherit&amp;quot; one or more sanctioned entities, or a whole sanctions regime, from another government, an &amp;quot;inclusion by reference&amp;quot; external citation record should be used, rather than a new record created. Such a record should consist of the URL of the cited entity, a start date, and a (potentially empty) end date.&lt;br /&gt;
&lt;br /&gt;
* Each government should provide a single canonical well-known location, containing a single file with all currently-active sanctions imposed by that government regardless of agency and, optionally, separate files archiving expired sanctions by decade (i.e. one file covering January 1, 1980 through December 31, 1989) with sanctions assigned to files by date of imposition. (If a sanction lasted from May 1, 2009 through February 15, 2011, it would be recorded in the 2000-2009 file, not the 2010-2020 file.) A standardized naming scheme should be established based on the ISO 3166 Alpha-2 country code and the year range; for example, &amp;quot;sanctions-au-2000-2009.xml&amp;quot; or &amp;quot;sanctions-se-2020-present.xml&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Other relevant metadata, like corporation type, gross revenue, gender of person, height and weight of person, should be recorded if available in standardized record types, in standardized (metric) units, with applicable date ranges and, if appropriate, source of authority or information.&lt;br /&gt;
&lt;br /&gt;
* The most authoritative name of any entity is the version as presented in its native language ''and script''. Not transliterations.  The native version should have a flag set which indicates it as such.  Each transliteration should be flagged as an alias and labeled by the destination language/script. Names should be rendered in Unicode and labeled as to script and language.&lt;br /&gt;
&lt;br /&gt;
* Countries should be canonically indicated by their ISO-3166 Alpha-2 abbreviation where available, and a flag should be used to indicate when a country without an assigned ISO-3166 abbreviation is being identified.&lt;br /&gt;
&lt;br /&gt;
* Suffixes for companies, such as &amp;quot;LLC,&amp;quot; &amp;quot;Joint Stock Company,&amp;quot; &amp;quot;Corp,&amp;quot; and prefixes and suffixes for people, such as &amp;quot;Jr.,&amp;quot; &amp;quot;Honorable,&amp;quot; &amp;quot;Eng.,&amp;quot; &amp;quot;Ph.D&amp;quot; should all be separated from the entity name proper, into separate corporate or individual prefix or suffix fields, and harmonized to the degree possible.&lt;br /&gt;
&lt;br /&gt;
* Relationships between entities should be recorded using standardized forms (&amp;quot;subsidiary,&amp;quot; &amp;quot;parent company,&amp;quot; &amp;quot;controlling owner,&amp;quot; &amp;quot;officer,&amp;quot; &amp;quot;director,&amp;quot; &amp;quot;father,&amp;quot; &amp;quot;step-son,&amp;quot; &amp;quot;spouse,&amp;quot; with applicable date ranges and sources of authority or information where appropriate. Note that many relationships are asymmetrically bidirectional, and thus also require a directionality property: Aunt-Nephew for instance.  It may be appropriate to use gender-neutral or gender-inclusive relationship names (i.e. use the same relationship to express father-daughter, mother-son, father-son, and mother-daughter) in order to avoid synchronization issues in cases of unknown or changed genders. Many types of relationships are possible, but this category should not be allowed to become overburdened: it may not be necessary to state that a sanctioned individual is the pilot of a sanctioned aircraft, for instance, when the individual and the aircraft are already related to a common sanctioned holding company by employment and ownership, respectively.&lt;br /&gt;
&lt;br /&gt;
* For each name, dates of first and most recent observed use should be attached.&lt;br /&gt;
&lt;br /&gt;
* If an organization is dissolved, or a person dies, a date should be recorded.&lt;br /&gt;
&lt;br /&gt;
* For each sanction, a start date and, eventually, an end date should be attached to the entity-record, along with the identity of the sanctioning entity, and a link to a standardized identifier of the sanctioning event or reason. A single entity-record may have many separate sanction records attached to it, associated with different countries, different events, and different (possibly overlapping) date-ranges.&lt;br /&gt;
&lt;br /&gt;
* Sanctioning events or reasons should exist in their own table of unique records, including dates of general imposition or retraction, the entity which imposed them, and a canonical reference to the law, regulation, or finding in which the sanction is documented.  The dates attached to the overall event need not be specific to the date level, and need not align exactly with the specific dates on which individual entities were added to the sanction. Each act of national law or regulation which produces a sanction list, whether new or an amendment to an existing list, should be represented as a unique record, with the national legal action being the unique identifier.&lt;br /&gt;
&lt;br /&gt;
* A table of meta-sanctioning events should be used to link national sanction events. For instance, a meta &amp;quot;Russia-Ukraine conflict&amp;quot; event with a start date of 2014 might be used to tie together many separate national sanctions imposed by different countries with date ranges 2014-present, 2014-2014, 2014-2015, 2021-present, 2022-present, et cetera.&lt;br /&gt;
&lt;br /&gt;
* People names should be separated into parts, and each part should be flagged with an order-of-rendering and a type: &amp;quot;given name,&amp;quot; &amp;quot;patronymic,&amp;quot; &amp;quot;family name,&amp;quot; &amp;quot;anglicization,&amp;quot; &amp;quot;nickname,&amp;quot; etc.&lt;br /&gt;
&lt;br /&gt;
* The form of a personal name as it appears on a passport issued by the person's native country should have primacy.  Other forms of the name should be flagged as aliases.&lt;br /&gt;
&lt;br /&gt;
* The most-commonly-used form of a personal name should be flagged as such.&lt;br /&gt;
&lt;br /&gt;
* All known identifying numbers (corporate registration numbers, [https://www.gleif.org/en/about-lei/introducing-the-legal-entity-identifier-lei Legal Entity Identifier (LEI)], [https://www.dnb.com/duns-number.html DUNS number], passport numbers, driver's license or ID numbers) should be saved, along with start and end dates of validity, date of issuance, name and location of issuing authority, etc.&lt;br /&gt;
&lt;br /&gt;
* Identification-issuing authorities should exist in their own separate table of unique entities, with aliases, most-commonly-used-form, structured place names, start and end date of authority, and hierarchical relationship to parent organizations.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* When Internet resources are associated with sanctioned entities, they should exist in their own unique tables of IP address, Autonomous System Number, and Domain Name. Each resource should have a start (and potentially end) date which indicates ''its creation and deletion dates'', not the dates at which it was associated with a sanctioned entity. These resources are then linked to sanctioned entities through a table of links, each of which contains, minimally, a unique identifier, pointer to source of authority, sanctioning event or reason, date of record creation, party or process which created the record, start date of link applicability, optional end date of link (or still-in-effect), as well as the unique identifiers of the sanctioned entity and the Internet resource. These links are potentially many-to-many, and multiple links may exist between the same pair of sanctioned entity and resource, at different or overlapping date ranges.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=315</id>
		<title>Frequently Asked Questions</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=315"/>
		<updated>2022-06-11T16:23:30Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* What is the purpose of this project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== What is the purpose of this project? ===&lt;br /&gt;
This project allows Internet organizations to comply with the sanctions imposed by the government or governments to which they're responsible, without &amp;quot;over-complying&amp;quot; by blocking entities which are not specifically named in those sanctions.&lt;br /&gt;
&lt;br /&gt;
=== Who is it for? ===&lt;br /&gt;
This project is operated by and for Internet organizations which are required by governmental regulation to comply with sanctions. Since this project is never inherently ''pro sanction'', we do not anticipate, nor advocate, that organizations which are not regulatorily required to comply with sanctions automate action based on the project's data feeds (e.g. the project does wants to help avoid over-compliance with sanctions by Internet organizations, rather than contributing to it).&lt;br /&gt;
&lt;br /&gt;
=== How does it work? ===&lt;br /&gt;
The project uses standardized protocols (BGP and RPZ) to distribute lists of Internet networks and domain names associated with sanctioned entities in ways that Internet network operators already use for blocking spam senders, DDoS attackers, malware distribution, and other threats against the Internet's infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Who runs it? ===&lt;br /&gt;
This is a typical Internet governance organization. It is operated by volunteers, and decisions are made by those who show up and do the work. There are no barriers to entry which would prevent any other organization from forming to perform the same function in a different way, or a competing effort in the same way.&lt;br /&gt;
&lt;br /&gt;
=== Does this project advocate for sanctions? ===&lt;br /&gt;
No, this project is agnostic with regard to whether sanctions should or should not exist, or should or should not be levied by any government against any party. Sanctions exist, and have done for centuries, and governments and society (particularly those in the Global North) generally regard them as deescalatory and preferable to violent alternatives. The aim of this project is to assist governments (that wish to impose sanctions) and network operators (that wish to comply with governmental requirements) to reach a mutually-satisfactory state. If you don't like the idea of sanctions, you can take that up with the government of your choice; this is not a forum for debate on fundamental questions such as whether sanctions should exist.&lt;br /&gt;
&lt;br /&gt;
=== Do Internet sanctions disconnect anyone from the Internet? ===&lt;br /&gt;
No, Internet sanctions remove the societal subsidy from the cost of Internet access to sanctioned entities. In the same way that banking sanctions don't prevent sanctioned entities from using money, they just increase the friction and cost of doing so, Internet sanctions don't disconnect sanctioned parties from the Internet, they just ensure that they pay the full cost of using it, without the subsidies which would normally be provided as a function of societal cooperation.&lt;br /&gt;
&lt;br /&gt;
=== Is anyone required to use this project? ===&lt;br /&gt;
No, this project is entirely voluntary. The relationship between this project and Internet network operators is exactly the same as the relationship between many preexisting organizations which provide similar blocklists identifying spam, malware, phishing, DDoS, and other forms of abuse to network operators, and the functional mechanisms are identical. Network operators choose to subscribe to the data-feeds we provide, or not, and choose to act upon the data, or not.  The obligation to comply with sanctions imposed by the governments, regional organizations or international organizatinos in which the network operators are incorporated, however, is not voluntary, it's mandatory under law. This project gives network operators a mechanism for complying with those mandatory requirements and helping to avoid operators from over-complying with measures that might otherwise arise due to lack of clarity of sufficient information on sanctions designations and legal requirements.&lt;br /&gt;
&lt;br /&gt;
=== What is the beacon? ===&lt;br /&gt;
The beacon is a set of artificial IP addresses and domain names which are not associated with any real-world organization or users, which will always be &amp;quot;sanctioned&amp;quot; and can thus be used by researchers to measure the reach and effect of the system. If the beacon is visible to you, the Internet sanctioning feeds are not being consumed by your transit providers or DNS recursive resolver operators. Beacons are a frequently-implemented diagnostic feature of Internet routing security systems.&lt;br /&gt;
&lt;br /&gt;
=== Is that really supposed to be a logo in the top left corner? ===&lt;br /&gt;
Yes, well, it wasn't the highest priority at the time, and these things are always stickier than you hope. A better project logo would be very welcome. Consensus is, as always in open projects, the difficult part.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=User:Woody&amp;diff=305</id>
		<title>User:Woody</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=User:Woody&amp;diff=305"/>
		<updated>2022-06-01T10:05:23Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Hi! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
===Hi!===&lt;br /&gt;
[[File:Bill Woodcock-Stockholm-2022.png|200px|frameless|right]]&lt;br /&gt;
I'm [https://en.wikipedia.org/wiki/Bill_Woodcock '''Bill Woodcock'''].&lt;br /&gt;
&lt;br /&gt;
I'm one of the signatories of the [[open letter]], one of the administrators of this wiki, and I help with implementation of the back-end systems that provide the data feeds to subscribing networks.&lt;br /&gt;
&lt;br /&gt;
I'm also the executive director of [https://pch.net Packet Clearing House], chairman of the foundation council of [https://quad9.net Quad9], and serve on the boards of the [https://www.ccor.org Cooperative Corporation of .ORG Registrants] and the [https://www.m3aawg.org M3AA Foundation].&lt;br /&gt;
&lt;br /&gt;
You can also find me on [https://www.linkedin.com/in/bwoodcock/ LinkedIn], [https://www.quora.com/profile/Bill-Woodcock-3 Quora] or [https://twitter.com/woodyatpch Twitter].&lt;br /&gt;
&lt;br /&gt;
=== Conflicts of Interest ===&lt;br /&gt;
&lt;br /&gt;
==== Current ====&lt;br /&gt;
I do not currently receive any money or other consideration from any military or propaganda agency, nor am I involved in the sanctions decision-making process of any government.&lt;br /&gt;
&lt;br /&gt;
'''Fuerzas Armadas de Honduras''': I oversee the DNSSEC cryptographic key management for the Honduran armed forces, along with the rest of the Honduran government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Forças Armadas de Defesa de Moçambique''': I oversee the DNSSEC cryptographic key management for the Mozambican armed forces, along with the rest of the Mozambican government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Nigerian Ministry of Defence''': I oversee the DNSSEC cryptographic key management for the Nigerian armed forces, along with the rest of the Nigerian government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Ugandan Ministry of Defence and Veterans Affairs''': I oversee the DNSSEC cryptographic key management for the Ugandan armed forces, along with the rest of the Ugandan government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Zimbabwe Ministry of Defence''': I oversee the DNSSEC cryptographic key management for the Zimbabwean armed forces, along with the rest of the Zimbabwean government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Forcas Defesa Timor Lorosae''': I oversee the DNSSEC cryptographic key management for the Timor Leste armed forces, along with the rest of the Timor Leste government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Illersuisut''': I oversee the DNSSEC cryptographic key management for the Greenlandic portion of the Forsvarsministeriet, along with the rest of the Greenlandic government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Ministere de la Defense d'Haïti''': I oversee the DNSSEC cryptographic key management for the Haitian armed forces, along with the rest of the Haitian government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''Wasaaradda Gaashaandhigga''': I oversee the DNSSEC cryptographic key management for the Somali armed forces, along with the rest of the Somali government and ccTLD, in a noncommercial role.&lt;br /&gt;
&lt;br /&gt;
'''CISA''': I serve in an unpaid role on the US [https://en.wikipedia.org/wiki/Cybersecurity_and_Infrastructure_Security_Agency Cybersecurity and Infrastructure Security Agency] [https://twitter.com/CISAJen/status/1502313208547270658 Technical Advisory Council], advising on topics related to cyber-defense and infrastructure resilience.&lt;br /&gt;
&lt;br /&gt;
==== Historical ====&lt;br /&gt;
&lt;br /&gt;
'''Al Jazeera''': In 2013, I wrote [http://america.aljazeera.com/articles/2013/9/20/brazil-internet-dilmarousseffnsa.html an article] on Brazilian industrial development which was published in [https://en.wikipedia.org/wiki/Al_Jazeera Al Jazeera]. Al Jazeera is funded in part by the government of [https://en.wikipedia.org/wiki/Qatar Qatar] and considered by some to be a voice of pro-[https://en.wikipedia.org/wiki/Sunni_Islam Sunni], anti-[https://en.wikipedia.org/wiki/Shia_Islam Shia], propaganda. Al Jazeera has been sanctioned at various times by Saudi Arabia, the United Arab Emirates, Bahrain and Egypt, generally as part of larger conflicts between Qatar and its neighboring countries.&lt;br /&gt;
&lt;br /&gt;
'''US Defense Department''': I was a member of the [http://www.pirp.harvard.edu/pubs_pdf/o%27neill/o%27neill-i01-3.pdf Highlands Forum], and have performed paid consulting for the [https://policy.defense.gov DoD office of Policy], and received research grants from [https://en.wikipedia.org/wiki/DARPA DARPA], all on topics related to cyber-defense and infrastructure resilience.&lt;br /&gt;
&lt;br /&gt;
'''Singapore Ministry of Defence''': I have performed paid consulting for the Singaporean [https://en.wikipedia.org/wiki/Ministry_of_Defence_(Singapore) Ministry of Defense] and precursors to the Singaporean [https://en.wikipedia.org/wiki/Cyber_Security_Agency_(Singapore) Cyber Security Agency], all on topics related to cyber-defense and infrastructure resilience.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=304</id>
		<title>Policy:Intake Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=304"/>
		<updated>2022-05-18T11:37:19Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Schema Notes ==&lt;br /&gt;
Since a schema will need to be standardized across many governments, it should be as complete as possible in the first definition, since it will be extraordinarily difficult to revise or expand subsequent to adoption.&lt;br /&gt;
&lt;br /&gt;
* All sanctions should be published in an XML schema which is standardized across all participating governments.&lt;br /&gt;
&lt;br /&gt;
* Each government should provide a single canonical well-known location, containing a single file with all currently-active sanctions imposed by that government regardless of agency and, optionally, separate files archiving expired sanctions by decade (i.e. one file covering January 1, 1980 through December 31, 1989) with sanctions assigned to files by date of imposition. (If a sanction lasted from May 1, 2009 through February 15, 2011, it would be recorded in the 2000-2009 file, not the 2010-2020 file.) A standardized naming scheme should be established based on the ISO 3166 Alpha-2 country code and the year range; for example, &amp;quot;sanctions-au-2000-2009.xml&amp;quot; or &amp;quot;sanctions-se-2020-present.xml&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Other relevant metadata, like corporation type, gross revenue, gender of person, height and weight of person, should be recorded if available in standardized record types, in standardized (metric) units, with applicable date ranges and, if appropriate, source of authority or information.&lt;br /&gt;
&lt;br /&gt;
* The most authoritative name of any entity is the version as presented in its native language ''and script''. Not transliterations.  The native version should have a flag set which indicates it as such.  Each transliteration should be flagged as an alias and labeled by the destination language/script. Names should be rendered in Unicode and labeled as to script and language.&lt;br /&gt;
&lt;br /&gt;
* Countries should be canonically indicated by their ISO-3166 Alpha-2 abbreviation where available, and a flag should be used to indicate when a country without an assigned ISO-3166 abbreviation is being identified.&lt;br /&gt;
&lt;br /&gt;
* Suffixes for companies, such as &amp;quot;LLC,&amp;quot; &amp;quot;Joint Stock Company,&amp;quot; &amp;quot;Corp,&amp;quot; and prefixes and suffixes for people, such as &amp;quot;Jr.,&amp;quot; &amp;quot;Honorable,&amp;quot; &amp;quot;Eng.,&amp;quot; &amp;quot;Ph.D&amp;quot; should all be separated from the entity name proper, into separate corporate or individual prefix or suffix fields, and harmonized to the degree possible.&lt;br /&gt;
&lt;br /&gt;
* Relationships between entities should be recorded using standardized forms (&amp;quot;subsidiary,&amp;quot; &amp;quot;parent company,&amp;quot; &amp;quot;controlling owner,&amp;quot; &amp;quot;officer,&amp;quot; &amp;quot;director,&amp;quot; &amp;quot;father,&amp;quot; &amp;quot;step-son,&amp;quot; &amp;quot;spouse,&amp;quot; with applicable date ranges and sources of authority or information where appropriate. Note that many relationships are asymmetrically bidirectional, and thus also require a directionality property: Aunt-Nephew for instance.  It may be appropriate to use gender-neutral or gender-inclusive relationship names (i.e. use the same relationship to express father-daughter, mother-son, father-son, and mother-daughter) in order to avoid synchronization issues in cases of unknown or changed genders. Many types of relationships are possible, but this category should not be allowed to become overburdened: it may not be necessary to state that a sanctioned individual is the pilot of a sanctioned aircraft, for instance, when the individual and the aircraft are already related to a common sanctioned holding company by employment and ownership, respectively.&lt;br /&gt;
&lt;br /&gt;
* For each name, dates of first and most recent observed use should be attached.&lt;br /&gt;
&lt;br /&gt;
* If an organization is dissolved, or a person dies, a date should be recorded.&lt;br /&gt;
&lt;br /&gt;
* For each sanction, a start date and, eventually, an end date should be attached to the entity-record, along with the identity of the sanctioning entity, and a link to a standardized identifier of the sanctioning event or reason. A single entity-record may have many separate sanction records attached to it, associated with different countries, different events, and different (possibly overlapping) date-ranges.&lt;br /&gt;
&lt;br /&gt;
* Sanctioning events or reasons should exist in their own table of unique records, including dates of general imposition or retraction, the entity which imposed them, and a canonical reference to the law, regulation, or finding in which the sanction is documented.  The dates attached to the overall event need not be specific to the date level, and need not align exactly with the specific dates on which individual entities were added to the sanction. Each act of national law or regulation which produces a sanction list, whether new or an amendment to an existing list, should be represented as a unique record, with the national legal action being the unique identifier.&lt;br /&gt;
&lt;br /&gt;
* A table of meta-sanctioning events should be used to link national sanction events. For instance, a meta &amp;quot;Russia-Ukraine conflict&amp;quot; event with a start date of 2014 might be used to tie together many separate national sanctions imposed by different countries with date ranges 2014-present, 2014-2014, 2014-2015, 2021-present, 2022-present, et cetera.&lt;br /&gt;
&lt;br /&gt;
* People names should be separated into parts, and each part should be flagged with an order-of-rendering and a type: &amp;quot;given name,&amp;quot; &amp;quot;patronymic,&amp;quot; &amp;quot;family name,&amp;quot; &amp;quot;anglicization,&amp;quot; &amp;quot;nickname,&amp;quot; etc.&lt;br /&gt;
&lt;br /&gt;
* The form of a personal name as it appears on a passport issued by the person's native country should have primacy.  Other forms of the name should be flagged as aliases.&lt;br /&gt;
&lt;br /&gt;
* The most-commonly-used form of a personal name should be flagged as such.&lt;br /&gt;
&lt;br /&gt;
* All known identifying numbers (corporate registration numbers, [https://www.gleif.org/en/about-lei/introducing-the-legal-entity-identifier-lei Legal Entity Identifier (LEI)], [https://www.dnb.com/duns-number.html DUNS number], passport numbers, driver's license or ID numbers) should be saved, along with start and end dates of validity, date of issuance, name and location of issuing authority, etc.&lt;br /&gt;
&lt;br /&gt;
* Identification-issuing authorities should exist in their own separate table of unique entities, with aliases, most-commonly-used-form, structured place names, start and end date of authority, and hierarchical relationship to parent organizations.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* When Internet resources are associated with sanctioned entities, they should exist in their own unique tables of IP address, Autonomous System Number, and Domain Name. Each resource should have a start (and potentially end) date which indicates ''its creation and deletion dates'', not the dates at which it was associated with a sanctioned entity. These resources are then linked to sanctioned entities through a table of links, each of which contains, minimally, a unique identifier, pointer to source of authority, sanctioning event or reason, date of record creation, party or process which created the record, start date of link applicability, optional end date of link (or still-in-effect), as well as the unique identifiers of the sanctioned entity and the Internet resource. These links are potentially many-to-many, and multiple links may exist between the same pair of sanctioned entity and resource, at different or overlapping date ranges.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=303</id>
		<title>Policy:Intake Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Intake_Database&amp;diff=303"/>
		<updated>2022-05-18T11:30:35Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Schema Notes ==&lt;br /&gt;
Since a schema will need to be standardized across many governments, it should be as complete as possible in the first definition, since it will be extraordinarily difficult to revise or expand subsequent to adoption.&lt;br /&gt;
&lt;br /&gt;
* All sanctions should be published in an XML schema which is standardized across all participating governments.&lt;br /&gt;
&lt;br /&gt;
* Each government should provide a single canonical well-known location, containing a single file with all currently-active sanctions imposed by that government regardless of agency and, optionally, separate files archiving expired sanctions by decade (i.e. one file covering January 1, 1980 through December 31, 1989) with sanctions assigned to files by date of imposition. (If a sanction lasted from May 1, 2009 through February 15, 2011, it would be recorded in the 2000-2009 file, not the 2010-2020 file.) A standardized naming scheme should be established based on the ISO 3166 Alpha-2 country code and the year range; for example, &amp;quot;sanctions-au-2000-2009.xml&amp;quot; or &amp;quot;sanctions-se-2020-present.xml&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Other relevant metadata, like corporation type, gross revenue, gender of person, height and weight of person, should be recorded if available in standardized record types, in standardized (metric) units, with applicable date ranges and, if appropriate, source of authority or information.&lt;br /&gt;
&lt;br /&gt;
* The most authoritative name of any entity is the version as presented in its native language ''and script''. Not transliterations.  The native version should have a flag set which indicates it as such.  Each transliteration should be flagged as an alias and labeled by the destination language/script. Names should be rendered in Unicode and labeled as to script and language.&lt;br /&gt;
&lt;br /&gt;
* Countries should be canonically indicated by their ISO-3166 Alpha-2 abbreviation where available, and a flag should be used to indicate when a country without an assigned ISO-3166 abbreviation is being identified.&lt;br /&gt;
&lt;br /&gt;
* Suffixes for companies, such as &amp;quot;LLC,&amp;quot; &amp;quot;Joint Stock Company,&amp;quot; &amp;quot;Corp,&amp;quot; and prefixes and suffixes for people, such as &amp;quot;Jr.,&amp;quot; &amp;quot;Honorable,&amp;quot; &amp;quot;Eng.,&amp;quot; &amp;quot;Ph.D&amp;quot; should all be separated from the entity name proper, into separate corporate or individual prefix or suffix fields, and harmonized to the degree possible.&lt;br /&gt;
&lt;br /&gt;
* Relationships between entities should be recorded using standardized forms (&amp;quot;subsidiary,&amp;quot; &amp;quot;parent company,&amp;quot; &amp;quot;controlling owner,&amp;quot; &amp;quot;officer,&amp;quot; &amp;quot;director,&amp;quot; &amp;quot;father,&amp;quot; &amp;quot;step-son,&amp;quot; &amp;quot;spouse,&amp;quot; with applicable date ranges and sources of authority or information where appropriate. Note that many relationships are asymmetrically bidirectional, and thus also require a directionality property: Aunt-Nephew for instance.  It may be appropriate to use gender-neutral or gender-inclusive relationship names (i.e. use the same relationship to express father-daughter, mother-son, father-son, and mother-daughter) in order to avoid synchronization issues in cases of unknown or changed genders. Many types of relationships are possible, but this category should not be allowed to become overburdened: it may not be necessary to state that a sanctioned individual is the pilot of a sanctioned aircraft, for instance, when the individual and the aircraft are already related to a common sanctioned holding company by employment and ownership, respectively.&lt;br /&gt;
&lt;br /&gt;
* For each name, dates of first and most recent observed use should be attached.&lt;br /&gt;
&lt;br /&gt;
* If an organization is dissolved, or a person dies, a date should be recorded.&lt;br /&gt;
&lt;br /&gt;
* For each sanction, a start date and, eventually, an end date should be attached to the entity-record, along with the identity of the sanctioning entity, and a link to a standardized identifier of the sanctioning event or reason. A single entity-record may have many separate sanction records attached to it, associated with different countries, different events, and different (possibly overlapping) date-ranges.&lt;br /&gt;
&lt;br /&gt;
* Sanctioning events or reasons should exist in their own table of unique records, including dates of general imposition or retraction, the entity which imposed them, and a canonical reference to the law, regulation, or finding in which the sanction is documented.  The dates attached to the overall event need not be specific to the date level, and need not align exactly with the specific dates on which individual entities were added to the sanction. Each act of national law or regulation which produces a sanction list, whether new or an amendment to an existing list, should be represented as a unique record, with the national legal action being the unique identifier.&lt;br /&gt;
&lt;br /&gt;
* A table of meta-sanctioning events should be used to link national sanction events. For instance, a meta &amp;quot;Russia-Ukraine conflict&amp;quot; event with a start date of 2014 might be used to tie together many separate national sanctions imposed by different countries with date ranges 2014-present, 2014-2014, 2014-2015, 2021-present, 2022-present, et cetera.&lt;br /&gt;
&lt;br /&gt;
* People names should be separated into parts, and each part should be flagged with an order-of-rendering and a type: &amp;quot;given name,&amp;quot; &amp;quot;patronymic,&amp;quot; &amp;quot;family name,&amp;quot; &amp;quot;anglicization,&amp;quot; &amp;quot;nickname,&amp;quot; etc.&lt;br /&gt;
&lt;br /&gt;
* The form of a personal name as it appears on a passport issued by the person's native country should have primacy.  Other forms of the name should be flagged as aliases.&lt;br /&gt;
&lt;br /&gt;
* The most-commonly-used form of a personal name should be flagged as such.&lt;br /&gt;
&lt;br /&gt;
* All known identifying numbers (corporate registration numbers, [https://www.gleif.org/en/about-lei/introducing-the-legal-entity-identifier-lei Legal Entity Identifier (LEI)], [https://www.dnb.com/duns-number.html DUNS number], passport numbers, driver's license or ID numbers) should be saved, along with start and end dates of validity, date of issuance, name and location of issuing authority, etc.&lt;br /&gt;
&lt;br /&gt;
* Identification-issuing authorities should exist in their own separate table of unique entities, with aliases, most-commonly-used-form, structured place names, start and end date of authority, and hierarchical relationship to parent organizations.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* When Internet resources are associated with sanctioned entities, they should exist in their own unique tables of IP address, Autonomous System Number, and Domain Name. Each resource should have a start (and potentially end) date which indicates ''its creation and deletion dates'' not the dates at which it was associated with a sanctioned entity. These resources are then linked to sanctioned entities through a table of links, each of which contains, minimally, a unique identifier, pointer to source of authority, date of record creation, party or process which created the record, start date of link, optional end date of link (or still-in-effect), as well as the unique identifiers of the sanctioned entity and the Internet resource.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=The_Open_Letter&amp;diff=302</id>
		<title>The Open Letter</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=The_Open_Letter&amp;diff=302"/>
		<updated>2022-04-22T09:38:00Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
{{clear}}&lt;br /&gt;
On March 10, 2022, members of the Multistakeholder Internet governance community published the following open letter:&lt;br /&gt;
{{clear}}&lt;br /&gt;
----&lt;br /&gt;
{{right|Thursday, March 10, 2022}}&amp;lt;br&amp;gt;&lt;br /&gt;
{{right|The Hague}}&lt;br /&gt;
==Multistakeholder Imposition of Internet Sanctions==&lt;br /&gt;
&lt;br /&gt;
===Executive Summary===&lt;br /&gt;
The invasion of Ukraine poses a new challenge for multistakeholder Internet infrastructure governance. In this statement, we discuss possible sanctions and their ramifications, lay out principles that we believe should guide Internet sanctions, and propose a multistakeholder governance mechanism to facilitate decision-making and implementation. &lt;br /&gt;
&lt;br /&gt;
===Introduction===&lt;br /&gt;
The Internet is in its thirtieth year of transition from national to multistakeholder governance. As we encounter pivotal moments, we must decide as a community whether Internet self-governance has matured sufficiently to address such newly encountered issue. Governments have imposed sanctions throughout history, but the global Internet governance community has not yet established a process dedicated to this task. &lt;br /&gt;
&lt;br /&gt;
We believe it is now incumbent upon the Internet community to deliberate and make decisions in the face of humanitarian crises. We may not responsibly dismiss such crises without consideration, nor with consideration only for the self-interest of our community’s own direct constituents; instead, maturity of governance requires that self-interests be weighed in the balance with broader moral and societal considerations. This document is the beginning of a global Internet governance conversation about the appropriate scope of sanctions, the feasibility of sanctions within the realm of our collective responsibility, and our moral imperative to minimize detrimental consequences.&lt;br /&gt;
&lt;br /&gt;
===Principles for Internet Infrastructure Governance Sanctions===&lt;br /&gt;
We, the undersigned, agree to the following principles:&lt;br /&gt;
&lt;br /&gt;
* Disconnecting the population of a country from the Internet is a disproportionate and inappropriate sanction, since it hampers their access to the very information that might lead them to withdraw support for acts of war and leaves them with access to only the information their own government chooses to furnish.&lt;br /&gt;
&lt;br /&gt;
* The effectiveness of sanctions should be evaluated relative to predefined goals. Ineffective sanctions waste effort and willpower and convey neither unity nor conviction. &lt;br /&gt;
&lt;br /&gt;
* Sanctions should be focused and precise. They should minimize the chance of unintended consequences or collateral damage. Disproportionate or over-broad sanctions risk fundamentally alienating populations.&lt;br /&gt;
&lt;br /&gt;
* Military and propaganda agencies and their information infrastructure are potential targets of sanctions.&lt;br /&gt;
&lt;br /&gt;
* The Internet, due to its transnational nature and consensus-driven multistakeholder system of governance, currently does not easily lend itself to the imposition of sanctions in national conflicts.&lt;br /&gt;
&lt;br /&gt;
* It is inappropriate and counterproductive for governments to attempt to compel Internet governance mechanisms to impose sanctions outside of the community’s multistakeholder decision-making process.&lt;br /&gt;
&lt;br /&gt;
* There are nonetheless appropriate, effective, and specific sanctions the Internet governance community may wish to consider in its deliberative processes.&lt;br /&gt;
&lt;br /&gt;
===Recommendations===&lt;br /&gt;
We believe it is the responsibility of the global Internet governance community to weigh the costs and risks of sanctions against the moral imperatives that call us to action in defense of society, and we must address this governance problem now and in the future. '''We believe the time is right for the formation of a new, minimal, multistakeholder mechanism, similar in scale to NSP-Sec or Outages, which after due process and consensus would publish sanctioned IP addresses and domain names in the form of public data feeds in standard forms (BGP and RPZ), to be consumed by any organization that chooses to subscribe to the principles and their outcome.''' This process should use clearly documented procedures to assess violations of international norms in an open, multistakeholder, and  consensus-driven process, taking into account the principles of non-overreach and effectiveness in making its determinations. This system mirrors existing systems used by network operators to block spam, malware, and DDoS attacks, so it requires no new technology and minimal work to implement.&lt;br /&gt;
&lt;br /&gt;
We call upon our colleagues to participate in a multistakeholder deliberation using the mechanism outlined above, to decide whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned, and to lay the groundwork for timely decisions of similar gravity and urgency in the future.&lt;br /&gt;
&lt;br /&gt;
===Signed,===&lt;br /&gt;
Bart Groothuis{{gray|, Member of the European Parliament, Netherlands}}&amp;lt;br&amp;gt;&lt;br /&gt;
Bill Woodcock{{gray|, Executive Director, Packet Clearing House}}&amp;lt;br&amp;gt;&lt;br /&gt;
Ihab Osman{{gray|, Non-Executive Director, Internet Corporation for Assigned Names and Numbers}}&amp;lt;br&amp;gt;&lt;br /&gt;
Mike Roberts{{gray|, founding President and CEO, Internet Corporation for Assigned Names and Numbers}}&amp;lt;br&amp;gt;&lt;br /&gt;
Jeff Moss{{gray|, President, DEFCON}}&amp;lt;br&amp;gt;&lt;br /&gt;
Niels ten Oever{{gray|, Postdoctoral Researcher, University of Amsterdam}}&amp;lt;br&amp;gt;&lt;br /&gt;
Marina Kaljurand{{gray|, Member of the European Parliament, Estonia, former ambassador to Russia and the United States}}&amp;lt;br&amp;gt;&lt;br /&gt;
Eva Kaili{{gray|, Member of the European Parliament, Greece}}&amp;lt;br&amp;gt;&lt;br /&gt;
Runa Sandvik{{gray|, security researcher}}&amp;lt;br&amp;gt;&lt;br /&gt;
Kurt Opsahl{{gray|, Electronic Frontier Foundation (affiliation for identification purposes only)}}&amp;lt;br&amp;gt;&lt;br /&gt;
 John Levine{{gray|, President, CAUCE North America}}&amp;lt;br&amp;gt;&lt;br /&gt;
Virendra Rode{{gray|, founder and contributor, Outages.ORG}}&amp;lt;br&amp;gt;&lt;br /&gt;
Stephen D. Crocker{{gray|, Edgemoor Research Institute}}&amp;lt;br&amp;gt;&lt;br /&gt;
Job Snijders{{gray|, board member, RIPE NCC, PeeringDB, and Route Server Support Foundation}}&amp;lt;br&amp;gt;&lt;br /&gt;
Moez Chakchouk{{gray|, Director of Policy, PCH, former ADG/CI UNESCO and former Tunisian minister}}&amp;lt;br&amp;gt;&lt;br /&gt;
Doug Madory{{gray|, Director of Internet Analysis, Kentik}}&amp;lt;br&amp;gt;&lt;br /&gt;
Ondrej Filip{{gray|, CEO, CZ.NIC}}&amp;lt;br&amp;gt;&lt;br /&gt;
Greg Rattray{{gray|, Founder, Next Peak and former cybersecurity advisor to ICANN}}&amp;lt;br&amp;gt;&lt;br /&gt;
Serge Droz{{gray|, in personal capacity, Director FIRST}}&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Tinka{{gray|, board member, FranceIX}}&amp;lt;br&amp;gt;&lt;br /&gt;
Dmitry Kohmanyuk{{gray|, founder, Hostmaster Ltd.}}&amp;lt;br&amp;gt;&lt;br /&gt;
Timothy Denton{{gray|, Chairman, Internet Society, Canada Chapter}}&amp;lt;br&amp;gt;&lt;br /&gt;
Barry Greene&amp;lt;br&amp;gt;&lt;br /&gt;
Perry E. Metzger{{gray|, Managing Member, Metzger, Dowdeswell &amp;amp; Co. LLC}}&amp;lt;br&amp;gt;&lt;br /&gt;
Roelof Meijer{{gray|, CEO, SIDN}}&amp;lt;br&amp;gt;&lt;br /&gt;
Svitlana Matviyenko{{gray|, Associate Director, Digital Democracies Institute, Simon Fraser University}}&amp;lt;br&amp;gt;&lt;br /&gt;
Rabbi Rob Thomas{{gray|, CEO, Team Cymru}}&amp;lt;br&amp;gt;&lt;br /&gt;
Harald Summa{{gray|, CEO, DE-CIX}}&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Gibson{{gray|, in personal capacity, CEO FIRST}}&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Killalea&amp;lt;br&amp;gt;&lt;br /&gt;
The Internet Archive&amp;lt;br&amp;gt;&lt;br /&gt;
Philip Reiner{{gray|, CEO, Institute for Security and Technology}}&amp;lt;br&amp;gt;&lt;br /&gt;
Megan Stifel{{gray|, Chief Security Officer, Institute for Security and Technology}}&amp;lt;br&amp;gt;&lt;br /&gt;
Bart Stidham{{gray|, CEO, NAND Technologies}}&amp;lt;br&amp;gt;&lt;br /&gt;
Rudolf van der Berg{{gray|, Programme Manager, Stratix Consulting}}&amp;lt;br&amp;gt;&lt;br /&gt;
Alejandro Pisanty{{gray|, Professor, National Autonomous University of Mexico}}&amp;lt;br&amp;gt;&lt;br /&gt;
Henrik Kramselund{{gray|, CEO Zencurity Aps}}&amp;lt;br&amp;gt;&lt;br /&gt;
Stéphane Duguin{{gray|, CEO Cyber Peace Institute, in personal capacity}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==Annex: &amp;lt;br&amp;gt;Technical Discussion of Internet Governance Sanction Measures==&lt;br /&gt;
&lt;br /&gt;
This statement is occasioned by the letter Andrii Nabok (Андрій Набок) of the Ukranian Ministry of Digital Transformation addressed to the Internet Corporation for Assigned Names and Numbers (ICANN) on the morning of Monday, February 28, 2022. ICANN and RIPE replied to Mr. Nabok’s letter directly, in the narrowest possible terms, and in the negative.&lt;br /&gt;
&lt;br /&gt;
In this annex, we discuss the technical specifics of each of the proposed sanctions, as well as of other possible Internet sanctions which we suggest are more effective, more precise, and carry fewer risks and lower costs.&lt;br /&gt;
&lt;br /&gt;
===Analysis of Ukraine’s Request===&lt;br /&gt;
We respect Mr. Nabok’s professional expertise and his inclusion of Ukraine’s Internet community in the drafting of his letter in the full spirit of the multistakeholder principles by which the Internet is governed, and we express our deepest sympathies for the indescribable trauma Ukraine is experiencing as a result of Russia’s invasion, which we condemn without reservation.&lt;br /&gt;
&lt;br /&gt;
Mr. Nabok’s letter requests the imposition of four Internet governance sanctions against Russia, namely:&lt;br /&gt;
&lt;br /&gt;
* Permanent or temporary revocation of the country code top-level domains “.ru”, “.рф” and “.su”.&lt;br /&gt;
* Revocation of SSL certificates associated with those domains.&lt;br /&gt;
* Disablement of DNS root servers situated within the Russian Federation.&lt;br /&gt;
* Withdrawal of the right to use IPv4 and IPv6 addresses by Russian networks.&lt;br /&gt;
&lt;br /&gt;
We commend Mr. Nabok and the Ukrainian people and government for responding to bloodshed with diplomacy and seeking deescalatory sanctions. Internet governance sanctions must, however, be selected and implemented carefully, in order to achieve the greatest effect and to avoid unanticipated consequences. In the attached appendix, we discuss each of the proposed sanctions, as well as others we consider more effective, with lower costs and risks of unintended consequences.&lt;br /&gt;
&lt;br /&gt;
===Revocation of country-code Top Level Domains (ccTLDs)===&lt;br /&gt;
Every ISO-3166 Alpha-2 two-letter abbreviation of a national name is reserved for the use of the Internet community of that nation as a “country-code Top Level Domain,” or “ccTLD.” This reservation is made expressly for the Internet community of the nation and not the government of the nation. Geographic, political, and sociocultural allocations of “internationalized” top-level domains (such as “.рф” to the Russian Federation, or “.укр” to Ukraine) are made in parallel with the ISO-3166 mechanism.&lt;br /&gt;
&lt;br /&gt;
The primary users of any ccTLD are its civilian constituents, who may be distributed globally and may be united by linguistic or cultural identity rather than nationality or national identity. Removal of a ccTLD from the root zone of the domain name system (the sanction suggested by the letter) would make it very difficult for anyone, globally, within Russia or without, to contact users of the affected domains, a group that consists almost entirely of Russian-speaking civilians. At the same time, it would have relatively little effect upon Russian military networks, which are unlikely to rely upon DNS servers outside their own control.&lt;br /&gt;
&lt;br /&gt;
We therefore conclude that the revocation, whether temporary or permanent, of a ccTLD is '''not an effective sanction''' because it disproportionately harms civilians; specifically, it is ineffective against any government that has taken cyber-defense preparatory measures to alleviate dependence upon foreign nameservers for domain name resolution. In addition, any country against which this sanction was applied would likely immediately set up an “alternate root,” competing with the one administered by the Internet Assigned Numbers Authority, using any of a number of trivial means. If one country did so, others would likely follow suit, leading to an exodus from the consensus Internet that allows general interconnection.&lt;br /&gt;
&lt;br /&gt;
===Revocation of certificates associated with domain names===&lt;br /&gt;
At least two kinds of cryptographic certificates and signatures are potential mechanisms for sanction, and we discuss each independently.  First, revocation of SSL certificates, as mentioned in Mr. Nabok’s letter:&lt;br /&gt;
&lt;br /&gt;
SSL (“Secure Socket Layer”), which has been succeeded by TLS (“Transport Layer Security”), is a certification mechanism principally used to authenticate and encrypt connections from web browsers to web servers. Such certificates are used in online commerce and banking, among other less visible roles. Certificates are issued by Certificate Authorities (“CAs”), of which there are many hundreds in existence, a significant number of them are controlled, directly or indirectly, by national governments or intelligence agencies. Any one of these organizations may issue a certificate to anyone, certifying that they are the authentic administrator of any domain.&lt;br /&gt;
&lt;br /&gt;
The revocation of certificates associated with governmental or military domains is '''not an effective sanction''', because the targeted government is likely already using a Certificate Authority under its own control, and if it is not it can easily cause any CA under its influence to issue a replacement certificate. The revocation of certificates associated with private subdomains (for instance, redcross.ru, citibank.ru) would render communications between these organizations and their constituencies insecure and vulnerable to cybercrime until they were able to get new certificates issued; decreasing law and order and rendering a civilian population more vulnerable to crime is '''not an effective sanction'''. Alternatively, adding existing certificates for propaganda outlets to Certificate Revocation Lists or using Online Certificate Status Protocol (OSCP) to flag them as revoked would warn casual users such websites are problematic and require them to take explicit action to proceed beyond the warning. These techniques are, however, limited: they must generally be done by the same CA that issued the original certificate, which may not be outside the influence of the sanctioned government. We thus believe this to be a '''moderately effective sanction''' in the cases where it is possible to invoke: it is specific, easily centrally implemented, and has little chance of unintended broader consequences. In X.509 public key infrastructures, certificate revocation cannot be rescinded; a new certificate must be issued and deployed.&lt;br /&gt;
&lt;br /&gt;
===Revocation of DNSSEC signatures on DNS delegations===&lt;br /&gt;
The cryptographic signatures used to authenticate domain names are known as DNSSEC, or DNS Security Extension signatures. Clients can evaluate the veracity of the mappings between domain names and IP addresses, which is what allows them to find and connect to resources on the Internet, by cryptographically validating the DNSSEC signature associated with a domain name.&lt;br /&gt;
&lt;br /&gt;
If a top-level domain were removed from the DNS root, the DNSSEC signature that validates the delegation of that domain would consequently be removed as well. DNS clients or resolvers still in possession of the old information could continue to reach the websites or email addresses identified by a domain, but they would be unable to validate that they had arrived at the right place. The DNSSEC signature validating the delegation of a top-level domain could also be removed while leaving the delegation itself in place. &lt;br /&gt;
&lt;br /&gt;
DNSSEC signatures prevent criminals from performing “man-in-the-middle” attacks, impersonating the website of a retail bank, for instance, to capture the user’s authentication information and empty their accounts. Military and high-security networks may use technical mechanisms to ensure that lack of a DNSSEC delegation above a signature under their control, in the DNS hierarchy, will not interfere with their resolution. Regular Internet users, however, either will be confronted with error messages indicating that their bank’s website is an impostor or will not be notified if an attacker stands between them and their bank. &lt;br /&gt;
&lt;br /&gt;
Removing the DNSSEC signature validating the delegation of a national top-level domain, whether in association with the removal of the delegation or not, may have little or no effect upon military and other high-security networks, but it would decrease law and order and make ordinary people much more susceptible to cybercrime. Tampering with DNSSEC signatures is thus '''not an effective sanction'''.&lt;br /&gt;
&lt;br /&gt;
===Disablement of DNS root servers===&lt;br /&gt;
Root nameservers are simply those nameservers that hold a static copy of the DNS “root zone,” which is, by its very nature, public information. Essentially any nameserver may be made a root nameserver, simply by telling it to retrieve and cache copies of the DNS root zone.&lt;br /&gt;
&lt;br /&gt;
Disabling specific root nameservers has no effect, since they are, by design, not uniquely privileged or in possession of unique information. Disabling all root nameservers is not feasible since it would disable the Internet for everyone, and anyone could, and would, establish new ones. Disabling root nameservers thus has '''no utility as a sanction'''.&lt;br /&gt;
&lt;br /&gt;
===Withdrawal of the right to use Internet Protocol addresses===&lt;br /&gt;
Internet Protocol (IP) addresses, the numeric identifiers by which Internet devices find each other, are allocated by the five Regional Internet Registries that together constitute the Number Resource Organization (NRO). Réseaux IP Européens (RIPE) is the Regional Internet Registry for Europe, the Middle East, and parts of Central Asia, with responsibility for allocating IP addresses to Russian entities. It is within RIPE’s power, if directed to do so by its member organizations through its multistakeholder governance process, to create policy that would effectively withdraw the allocations of IP addresses it has made to Russian organizations.&lt;br /&gt;
&lt;br /&gt;
This situation bears some similarities to the governance of domain names, yet it also contains crucial differences. ICANN’s authority extends no further into the DNS hierarchy than the root level, so actions taken by ICANN inherently affect entire top-level domains unitarily, without the possibility of “surgical” actions upon one subdomain and not another.  By contrast, the Regional Internet Registries can affect policy on a per-organization (or even finer) basis. Yet rescinding an IP address allocation does not prevent its previous holder from continuing to use it. Indeed, “IP address hijacking” is a relatively commonplace problem on the Internet. Therefore, although it can be precisely targeted, simply rescinding the right to use an IP address allocation is '''not, by itself, an effective sanction'''. &lt;br /&gt;
&lt;br /&gt;
Note that this process of IP address revocation and RPKI attestation revocation would be a normal consequence of an address recipient (such as the Russian military) failing to pay annual registration fees to its Regional Internet Registry, something that may in fact come to pass as a consequence of financial and banking sanctions. But such a process might take years. Another negative consequence of revoking IP address allocations is that revoked addresses will likely be allocated to a different recipient subsequently, who will then find themselves competing with the original holder for their use. &lt;br /&gt;
&lt;br /&gt;
===Manipulation of routing security attestations===&lt;br /&gt;
A potential sanction not explicitly requested in Mr. Nabok’s letter is the manipulation of routing security attestations to produce the effect of a partial or complete disconnection from the Internet of specific networks, such as those of the Russian military or propaganda agencies. &lt;br /&gt;
&lt;br /&gt;
As with domain names, technical mechanisms exist to cryptographically verify the legitimacy of use of IP addresses. Routing Policy Specification Language (RPSL) and Routing Public Key Infrastructure (RPKI) are the two primary such mechanisms. To be used for communication on the Internet, IP addresses must be “announced” through the routing system, and the routers of the larger and better-secured networks utilize these two mechanisms to ensure that invalid routes are not used by their routers. Smaller and less-secured networks do not typically implement these mechanisms. &lt;br /&gt;
&lt;br /&gt;
A manipulation of RPSL and RPKI records in centralized registries would flow through to all networks employing these common routing security mechanisms, some of which would then automatically stop routing traffic to and from the specified networks, without affecting other “adjacent” civilian networks or being subject to trivial “work-arounds.” &lt;br /&gt;
&lt;br /&gt;
The manipulation of RPSL and RPKI routing security attestations could be an effective sanction measure, because it appears precise, easily and quickly implemented and reversed, and reasonably effective. However, the appropriation of preexisting routing security mechanisms for use in sanctions, likely unexpected by the participating networks, could conflict with the business or regulatory requirements of those networks, and, crucially, could risk the withdrawal of networks from the system entirely. Such an exodus would both make this potential sanction less effective in the future and have the far greater cost of eroding cybersecurity for the Internet as a whole, the purpose for which the routing security systems were built in the first place. This thus constitutes an '''unacceptable risk'''.&lt;br /&gt;
&lt;br /&gt;
===Other Internet-associated, non-technical sanctions===&lt;br /&gt;
Other sanctions related to the Internet’s operation and governance may be worth considering. These include, for example, the disallowance of sanctioned personnel from participation in Internet governance, policymaking, or standardization proceedings. Such nontechnical measures are outside the scope of this document.&lt;br /&gt;
&lt;br /&gt;
===Blocklisting===&lt;br /&gt;
Network operators and DNS resolver operators already make use of multistakeholder-governed lists, similar to the way financial lenders use credit scoring agencies, to determine what IP addresses to route and pass traffic between, and what domain names to resolve. This is the mechanism by which persistent spammers and address hijackers are excluded from the network, and by which Internet users are protected from malware and phishing attacks.&lt;br /&gt;
&lt;br /&gt;
The technical mechanisms by which such blocking information is passed are mature, robust, instantaneous, and globally standardized. Information related to IP addresses and Autonomous System Numbers is mostly carried over BGP feeds, while information related to domain names is mostly carried over RPZ feeds. Both mechanisms are implemented by essentially all large operators globally. Blocklisting IP addresses and Autonomous System Numbers has all of the advantages of address block revocation or manipulation of routing security attestations, without the drawbacks. It allows network operators to block both the acceptance of routes and the passage of traffic, each or both of which may be appropriate in different situations and in response to different threats. Blocklisting of domain names allows full precision and specificity, which is the problem that precludes action by ICANN. The system is opt-in, voluntary, consensual, and bottom-up, all values the Internet governance community holds dear. Yet, at the same time, it has achieved broad adoption.&lt;br /&gt;
&lt;br /&gt;
We conclude that the well-established methods of blocklisting provide the '''best mechanism for sanctioning both IP routes and traffic and domain names''', and that this mechanism, if implemented normally by subscribing entities, has no significant costs or risks.&lt;br /&gt;
&lt;br /&gt;
===Conclusion===&lt;br /&gt;
Our conclusion is that '''blocklisting''' of IP addresses, Autonomous Systems, and domain names upon which the multistakeholder community can establish consensus is effective and carries no inherent danger of being over-broad. Once decided upon, it is easily invoked—and equally easily rolled back once the problem is resolved. Most important, it carries no significant costs or risks and is aligned with the Internet’s multistakeholder governance values and principles.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=301</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=301"/>
		<updated>2022-04-21T20:11:13Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Web Page */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one changing on a regular period, perhaps hourly.&lt;br /&gt;
&lt;br /&gt;
==== Web Page ====&lt;br /&gt;
The beacon should be visible to the public in the form of a web page which attempts to load a variety of web objects, testing for sanction enforcement and a variety of forms of over-compliance.  The web page should also display to the client the client's apparent IP address, source port number, and a timestamp that can be used by the client to validate what if anything might be between it and the beacon web server.&lt;br /&gt;
&lt;br /&gt;
The web page should test:&lt;br /&gt;
&lt;br /&gt;
* Whether a sanctioned domain loads (green background indicates correct blocking, red overlay indicates failure to block)&lt;br /&gt;
* Whether a subdomain loads (green background indicates correct blocking, red overlay indicates failure to block)&lt;br /&gt;
* Whether a different domain hosted at the same IP address loads (red background indicates over-blocking, green overlay indicates correct non-blocking)&lt;br /&gt;
* Whether a previously-but-no-longer-blocked domain loads (red background indicates over-blocking, green overlay indicates correct non-blocking)&lt;br /&gt;
* Whether a blocked IP address loads (green background indicates correct blocking, red overlay indicates failure to block)&lt;br /&gt;
* Whether a different IP address in the same subnet loads (red background indicates over-blocking, green overlay indicates correct non-blocking)&lt;br /&gt;
* Whether a previously-but-no-longer-blocked IP address loads (red background indicates over-blocking, green overlay indicates correct non-blocking)&lt;br /&gt;
* Whether a blocked Autonomous System Number loads (green background indicates correct blocking, red overlay indicates failure to block)&lt;br /&gt;
&lt;br /&gt;
Potentially, we could test over-blocking of ASNs by multi-homing a beacon on a blocked and an un-blocked ASN, and testing to make sure the multi-homed object was not blocked.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net. We may also need two other (&amp;quot;negative&amp;quot;) domains, to host on the same IP addresses as these, which should '''not''' be blocked, to make sure that it's the domain, not the IP, that's being blocked.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 11, 2022, we've received the two independent IPv4 /24 beacon subnets for which we performed an 8.4 inward transfer.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-45-154-219-0-1 '''SANCTIONS-BEACON-IPV4-A''', 45.154.219.0/24]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-185-203-207-0-1 '''SANCTIONS-BEACON-IPV4-B''', 185.203.207.0/24]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=300</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=300"/>
		<updated>2022-04-21T20:00:59Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one changing on a regular period, perhaps hourly.&lt;br /&gt;
&lt;br /&gt;
==== Web Page ====&lt;br /&gt;
The beacon should be visible to the public in the form of a web page which attempts to load a variety of web objects, testing for sanction enforcement and a variety of forms of over-compliance.  The web page should also display to the client the client's apparent IP address, source port number, and a timestamp that can be used by the client to validate what if anything might be between it and the beacon web server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net. We may also need two other (&amp;quot;negative&amp;quot;) domains, to host on the same IP addresses as these, which should '''not''' be blocked, to make sure that it's the domain, not the IP, that's being blocked.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 11, 2022, we've received the two independent IPv4 /24 beacon subnets for which we performed an 8.4 inward transfer.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-45-154-219-0-1 '''SANCTIONS-BEACON-IPV4-A''', 45.154.219.0/24]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-185-203-207-0-1 '''SANCTIONS-BEACON-IPV4-B''', 185.203.207.0/24]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=298</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=298"/>
		<updated>2022-04-18T09:42:31Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Domain Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net. We may also need two other (&amp;quot;negative&amp;quot;) domains, to host on the same IP addresses as these, which should '''not''' be blocked, to make sure that it's the domain, not the IP, that's being blocked.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 11, 2022, we've received the two independent IPv4 /24 beacon subnets for which we performed an 8.4 inward transfer.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-45-154-219-0-1 '''SANCTIONS-BEACON-IPV4-A''', 45.154.219.0/24]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-185-203-207-0-1 '''SANCTIONS-BEACON-IPV4-B''', 185.203.207.0/24]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Operations_Group&amp;diff=297</id>
		<title>Operations Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Operations_Group&amp;diff=297"/>
		<updated>2022-04-18T08:19:36Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Goals */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''operations group''' is responsible for the functioning of this web site (which is MediaWiki, reskinned by [https://opentechstrategies.com Open Tech Strategies]) and mailing lists, the operational mechanism of the BGP and RPZ data feeds, and liaison with the Internet network operators who use them.&lt;br /&gt;
&lt;br /&gt;
The work of the operations group is done on the operations mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/operations welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/operations/ archives of past discussion]) and documentation will be published here.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
The long-term goal of the operations group is to provide a two-factor authenticated interface for each subscribing network operator, allowing them to select the specific jurisdictions in which they need to ensure sanctions compliance, such that the BGP and RPZ feeds they receive will contain exactly what's needed, and nothing more.  The goal is to ensure compliance, without falling into ''over''compliance.&lt;br /&gt;
&lt;br /&gt;
Because some jurisdictions issue partial exemptions, we currently imagine that the user interface will allow, for each jurisdiction, compliance selections of &amp;quot;full,&amp;quot; &amp;quot;minimum,&amp;quot; or &amp;quot;none.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=296</id>
		<title>Frequently Asked Questions</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=296"/>
		<updated>2022-04-18T07:55:26Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== What is the purpose of this project? ===&lt;br /&gt;
This project allows Internet organizations to enact precisely-targeted sanctions which affect only the military and propaganda agencies of sanctioned countries, rather than sweeping sanctions which principally effect the civilian populations of those countries.&lt;br /&gt;
&lt;br /&gt;
=== Who is it for? ===&lt;br /&gt;
This project is operated by and for Internet organizations which are required by governmental regulation to enact sanctions. Since this project is never inherently ''pro sanction'', we do not anticipate, nor advocate, that organizations which are not regulatorily required to enact sanctions automate action based on the project's data feeds.&lt;br /&gt;
&lt;br /&gt;
=== How does it work? ===&lt;br /&gt;
The project uses standardized protocols (BGP and RPZ) to distribute lists of Internet networks and domain names associated with sanctioned entities in ways that Internet network operators already use for blocking spam senders, DDoS attackers, malware distribution, and other threats against the Internet's infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Who runs it? ===&lt;br /&gt;
This is a typical Internet governance organization. It is operated by volunteers, and decisions are made by those who show up and do the work. There are no barriers to entry which would prevent any other organization from forming to perform the same function in a different way, or a competing effort in the same way.&lt;br /&gt;
&lt;br /&gt;
=== Does this project advocate for sanctions? ===&lt;br /&gt;
No, this project is agnostic with regard to whether sanctions should or should not exist, or should or should not be levied by any government against any party. Sanctions exist, have for thousands of years, and governments and society generally regard them as deescalatory and preferable to violent alternatives. The aim of this project is to assist governments which wish to impose sanctions, and network operators who wish to comply with governmental requirements, to reach a mutually-satisfactory state. If you don't like the idea of sanctions, you can take that up with the government of your choice, this is not a forum for debate on fundamental questions such as whether sanctions should exist.&lt;br /&gt;
&lt;br /&gt;
=== Do Internet sanctions disconnect anyone from the Internet? ===&lt;br /&gt;
No, Internet sanctions remove the societal subsidy from the cost of Internet access to sanctioned entities. In the same way that banking sanctions don't prevent sanctioned entities from using money, they just increase the friction and cost of doing so, Internet sanctions don't disconnect sanctioned parties from the Internet, they just ensure that they pay the full cost of using it, without the subsidies which would normally be provided as a function of societal cooperation.&lt;br /&gt;
&lt;br /&gt;
=== Is anyone required to use this project? ===&lt;br /&gt;
No, this project is entirely voluntary. The relationship between this project and Internet network operators is exactly the same as the relationship between many preexisting organizations which provide similar blocklists identifying spam, malware, phishing, DDoS, and other forms of abuse to network operators, and the functional mechanisms are identical. Network operators choose to subscribe to the data-feeds we provide, or not, and choose to act upon the data, or not.  The obligation to implement sanctions imposed by the governments of the nations in which the network operators are incorporated, however, is not voluntary, it's mandatory under law. This project gives network operators a mechanism for complying with those mandatory requirements, in countries which have accepted this mechanism as sufficient.&lt;br /&gt;
&lt;br /&gt;
=== What is the beacon? ===&lt;br /&gt;
The beacon is a set of artificial IP addresses and domain names which are not associated with any real-world organization or users, which will always be &amp;quot;sanctioned&amp;quot; and can thus be used by researchers to measure the reach and effect of the system. If the beacon is visible to you, the Internet sanctioning feeds are not being consumed by your transit providers or DNS recursive resolver operators. Beacons are a frequently-implemented diagnostic feature of Internet routing security systems.&lt;br /&gt;
&lt;br /&gt;
=== Is that really supposed to be a logo in the top left corner? ===&lt;br /&gt;
Yes, well, it wasn't the highest priority at the time, and these things are always stickier than you hope. A better project logo would be very welcome. Consensus is, as always in open projects, the difficult part.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=295</id>
		<title>Frequently Asked Questions</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Frequently_Asked_Questions&amp;diff=295"/>
		<updated>2022-04-18T07:53:20Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== What is the purpose of this project? ===&lt;br /&gt;
This project allows Internet organizations to enact precisely-targeted sanctions which affect only the military and propaganda agencies of sanctioned countries, rather than sweeping sanctions which principally effect the civilian populations of those countries.&lt;br /&gt;
&lt;br /&gt;
=== Who is it for? ===&lt;br /&gt;
This project is operated by and for Internet organizations which are required by governmental regulation to enact sanctions. Since this project is never inherently ''pro sanction'', we do not anticipate, nor advocate, that organizations which are not regulatorily required to enact sanctions automate action based on the project's data feeds.&lt;br /&gt;
&lt;br /&gt;
=== How does it work? ===&lt;br /&gt;
The project uses standardized protocols (BGP and RPZ) to distribute lists of Internet networks and domain names associated with sanctioned entities in ways that Internet network operators already use for blocking spam senders, DDoS attackers, malware distribution, and other threats against the Internet's infrastructure.&lt;br /&gt;
&lt;br /&gt;
=== Who runs it? ===&lt;br /&gt;
This is a typical Internet governance organization. It is operated by volunteers, and decisions are made by those who show up and do the work. There are no barriers to entry which would prevent any other organization from forming to perform the same function in a different way, or a competing effort in the same way.&lt;br /&gt;
&lt;br /&gt;
=== Does this project advocate for sanctions? ===&lt;br /&gt;
No, this project is agnostic with regard to whether sanctions should or should not exist, or should or should not be levied by any government against any party. Sanctions exist, have for thousands of years, and governments and society generally regard them as deescalatory and preferable to violent alternatives. The aim of this project is to assist governments which wish to impose sanctions, and network operators who wish to comply with governmental requirements, to reach a mutually-satisfactory state. If you don't like the idea of sanctions, you can take that up with the government of your choice, this is not a forum for debate on fundamental questions such as whether sanctions should exist.&lt;br /&gt;
&lt;br /&gt;
=== Do Internet sanctions disconnect anyone from the Internet? ===&lt;br /&gt;
No, Internet sanctions remove the societal subsidy from the cost of Internet access to sanctioned entities. In the same way that banking sanctions don't prevent sanctioned entities from using money, they just increase the friction and cost of doing so, Internet sanctions don't disconnect sanctioned parties from the Internet, they just ensure that they pay the full cost of using it, without the subsidies which would normally be provided as a function of societal cooperation.&lt;br /&gt;
&lt;br /&gt;
=== Is anyone required to use this project? ===&lt;br /&gt;
No, this project is entirely voluntary. The relationship between this project and Internet network operators is exactly the same as the relationship between many preexisting organizations which provide similar blocklists identifying spam, malware, phishing, DDoS, and other forms of abuse to network operators, and the functional mechanisms are identical. Network operators choose to subscribe to the data-feeds we provide, or not, and choose to act upon the data, or not.  The obligation to implement sanctions imposed by the governments of the nations in which the network operators are incorporated, however, is not voluntary, it's mandatory under law. This project gives network operators a mechanism for complying with those mandatory requirements, in countries which have accepted this mechanism as sufficient.&lt;br /&gt;
&lt;br /&gt;
=== What is the beacon? ===&lt;br /&gt;
The beacon is a set of artificial IP addresses and domain names which are not associated with any real-world organization or users, which will always be &amp;quot;sanctioned&amp;quot; and can thus be used by researchers to measure the reach and effect of the system. If the beacon is visible to you, the Internet sanctioning feeds are not being consumed by your transit providers or DNS recursive resolver operators. Beacons are a frequently-implemented diagnostic feature of Internet routing security systems.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=294</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=294"/>
		<updated>2022-04-11T14:16:17Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 11, 2022, we've received the two independent IPv4 /24 beacon subnets for which we performed an 8.4 inward transfer.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-45-154-219-0-1 '''SANCTIONS-BEACON-IPV4-A''', 45.154.219.0/24]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET-185-203-207-0-1 '''SANCTIONS-BEACON-IPV4-B''', 185.203.207.0/24]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Conflict_with_Privacy_Law&amp;diff=293</id>
		<title>Policy:Conflict with Privacy Law</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Conflict_with_Privacy_Law&amp;diff=293"/>
		<updated>2022-04-10T20:18:05Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;We should probably begin a conversation with governments over exempting sanctioned entities from the protections of privacy law which would prohibit the sharing of personally...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We should probably begin a conversation with governments over exempting sanctioned entities from the protections of privacy law which would prohibit the sharing of personally identifiable information (such as IP addresses) used in the sanction implementation process.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=292</id>
		<title>Policy:Policy Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=292"/>
		<updated>2022-04-10T20:16:41Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Open Issues */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
The '''policy group''' monitors the political situation and the sanction initiatives of national governments, and evaluates proposed sanctions in light of the project's [[Policy:Guiding Principles|guiding principles]] and precedents in [[Policy:International Law and Norms|international law and norms]], including those governing fundamental human rights of [[Policy:Freedom of Expression and Access to Information|freedom of expression and access to information]]. If a sanction is deemed in-scope, the policy group defines the sanctioned entities and passes them to the OSINT group. The policy group is also responsible for determining when existing sanctions should be repealed.&lt;br /&gt;
&lt;br /&gt;
The work of the policy group is done on the discussion mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/discuss welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/discuss/ archives of past discussion]) and its results are published here.&lt;br /&gt;
----&lt;br /&gt;
== Thoughts and Articles ==&lt;br /&gt;
* [[Policy:The Goals of Sanctions|The goals of sanctions]]&lt;br /&gt;
&lt;br /&gt;
== Open Issues ==&lt;br /&gt;
* [[Policy:The &amp;quot;Human Shield&amp;quot; Problem|The &amp;quot;human shield&amp;quot; problem]]&lt;br /&gt;
* [[Policy:More Specific Domains|The &amp;quot;more specific domain&amp;quot; question]]&lt;br /&gt;
* [[Policy:Data Formatting Issues|Data formatting issues]]&lt;br /&gt;
* [[Policy:Intake Database|Intake database]]&lt;br /&gt;
* [[Policy:Conflict with Privacy Law|Conflict with Privacy Law]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Specific Sanction Reviews ==&lt;br /&gt;
=== 2022 ===&lt;br /&gt;
==== Multiple vs. Russia and Belarus ====&lt;br /&gt;
Near the end of February 2022, many countries began levying sanctions against more than a thousand entities in Russia and Belarus, in connection with Russia's military invasion of Ukraine. In some cases, the sanctions were additive with preexisting ones associated with Russia's 2014 military invasion of Ukraine. [[Policy:Multiple vs. Russia and Belarus, 2022 |Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== Afghanistan vs. United States et al. ====&lt;br /&gt;
In March, 2022, the Afghan government sanctioned Voice of America, the British Broadcasting Corporation, and Deutsche Welle.  [[Policy:Afghanistan vs. Western Broadcasters, 2022|Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== United States vs. Iran ====&lt;br /&gt;
In March, 2022, the United States government added Iranian procurement agent Mohammad Ali Hosseini and his associated companies to existing sanctions aimed at Iran's ballistic missile development program.  [[Policy: United States vs. Iranian Ballistic Missile Program, 2022|Discussion of these sanctions can be found here.]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Operations_Group&amp;diff=291</id>
		<title>Operations Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Operations_Group&amp;diff=291"/>
		<updated>2022-04-09T20:00:51Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''operations group''' is responsible for the functioning of this web site (which is MediaWiki, reskinned by [https://opentechstrategies.com Open Tech Strategies]) and mailing lists, the operational mechanism of the BGP and RPZ data feeds, and liaison with the Internet network operators who use them.&lt;br /&gt;
&lt;br /&gt;
The work of the operations group is done on the operations mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/operations welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/operations/ archives of past discussion]) and documentation will be published here.&lt;br /&gt;
&lt;br /&gt;
== Goals ==&lt;br /&gt;
The long-term goal of the operations group is to provide a two-factor authenticated interface for each subscribing network operator, allowing them to select the specific jurisdictions in which they need to ensure sanctions compliance, such that the BGP and RPZ feeds they receive will contain exactly what's needed, and nothing more.  The goal is to ensure compliance, without falling into ''over''compliance.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=The_Open_Letter&amp;diff=290</id>
		<title>The Open Letter</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=The_Open_Letter&amp;diff=290"/>
		<updated>2022-04-08T06:21:15Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
On March 10, 2022, members of the Multistakeholder Internet governance community published the following open letter:&lt;br /&gt;
{{clear}}&lt;br /&gt;
----&lt;br /&gt;
{{right|Thursday, March 10, 2022}}&amp;lt;br&amp;gt;&lt;br /&gt;
{{right|The Hague}}&lt;br /&gt;
==Multistakeholder Imposition of Internet Sanctions==&lt;br /&gt;
&lt;br /&gt;
===Executive Summary===&lt;br /&gt;
The invasion of Ukraine poses a new challenge for multistakeholder Internet infrastructure governance. In this statement, we discuss possible sanctions and their ramifications, lay out principles that we believe should guide Internet sanctions, and propose a multistakeholder governance mechanism to facilitate decision-making and implementation. &lt;br /&gt;
&lt;br /&gt;
===Introduction===&lt;br /&gt;
The Internet is in its thirtieth year of transition from national to multistakeholder governance. As we encounter pivotal moments, we must decide as a community whether Internet self-governance has matured sufficiently to address such newly encountered issue. Governments have imposed sanctions throughout history, but the global Internet governance community has not yet established a process dedicated to this task. &lt;br /&gt;
&lt;br /&gt;
We believe it is now incumbent upon the Internet community to deliberate and make decisions in the face of humanitarian crises. We may not responsibly dismiss such crises without consideration, nor with consideration only for the self-interest of our community’s own direct constituents; instead, maturity of governance requires that self-interests be weighed in the balance with broader moral and societal considerations. This document is the beginning of a global Internet governance conversation about the appropriate scope of sanctions, the feasibility of sanctions within the realm of our collective responsibility, and our moral imperative to minimize detrimental consequences.&lt;br /&gt;
&lt;br /&gt;
===Principles for Internet Infrastructure Governance Sanctions===&lt;br /&gt;
We, the undersigned, agree to the following principles:&lt;br /&gt;
&lt;br /&gt;
* Disconnecting the population of a country from the Internet is a disproportionate and inappropriate sanction, since it hampers their access to the very information that might lead them to withdraw support for acts of war and leaves them with access to only the information their own government chooses to furnish.&lt;br /&gt;
&lt;br /&gt;
* The effectiveness of sanctions should be evaluated relative to predefined goals. Ineffective sanctions waste effort and willpower and convey neither unity nor conviction. &lt;br /&gt;
&lt;br /&gt;
* Sanctions should be focused and precise. They should minimize the chance of unintended consequences or collateral damage. Disproportionate or over-broad sanctions risk fundamentally alienating populations.&lt;br /&gt;
&lt;br /&gt;
* Military and propaganda agencies and their information infrastructure are potential targets of sanctions.&lt;br /&gt;
&lt;br /&gt;
* The Internet, due to its transnational nature and consensus-driven multistakeholder system of governance, currently does not easily lend itself to the imposition of sanctions in national conflicts.&lt;br /&gt;
&lt;br /&gt;
* It is inappropriate and counterproductive for governments to attempt to compel Internet governance mechanisms to impose sanctions outside of the community’s multistakeholder decision-making process.&lt;br /&gt;
&lt;br /&gt;
* There are nonetheless appropriate, effective, and specific sanctions the Internet governance community may wish to consider in its deliberative processes.&lt;br /&gt;
&lt;br /&gt;
===Recommendations===&lt;br /&gt;
We believe it is the responsibility of the global Internet governance community to weigh the costs and risks of sanctions against the moral imperatives that call us to action in defense of society, and we must address this governance problem now and in the future. '''We believe the time is right for the formation of a new, minimal, multistakeholder mechanism, similar in scale to NSP-Sec or Outages, which after due process and consensus would publish sanctioned IP addresses and domain names in the form of public data feeds in standard forms (BGP and RPZ), to be consumed by any organization that chooses to subscribe to the principles and their outcome.''' This process should use clearly documented procedures to assess violations of international norms in an open, multistakeholder, and  consensus-driven process, taking into account the principles of non-overreach and effectiveness in making its determinations. This system mirrors existing systems used by network operators to block spam, malware, and DDoS attacks, so it requires no new technology and minimal work to implement.&lt;br /&gt;
&lt;br /&gt;
We call upon our colleagues to participate in a multistakeholder deliberation using the mechanism outlined above, to decide whether the IP addresses and domain names of the Russian military and its propaganda organs should be sanctioned, and to lay the groundwork for timely decisions of similar gravity and urgency in the future.&lt;br /&gt;
&lt;br /&gt;
===Signed,===&lt;br /&gt;
Bart Groothuis{{gray|, Member of the European Parliament, Netherlands}}&amp;lt;br&amp;gt;&lt;br /&gt;
Bill Woodcock{{gray|, Executive Director, Packet Clearing House}}&amp;lt;br&amp;gt;&lt;br /&gt;
Ihab Osman{{gray|, Non-Executive Director, Internet Corporation for Assigned Names and Numbers}}&amp;lt;br&amp;gt;&lt;br /&gt;
Mike Roberts{{gray|, founding President and CEO, Internet Corporation for Assigned Names and Numbers}}&amp;lt;br&amp;gt;&lt;br /&gt;
Jeff Moss{{gray|, President, DEFCON}}&amp;lt;br&amp;gt;&lt;br /&gt;
Niels ten Oever{{gray|, Postdoctoral Researcher, University of Amsterdam}}&amp;lt;br&amp;gt;&lt;br /&gt;
Marina Kaljurand{{gray|, Member of the European Parliament, Estonia, former ambassador to Russia and the United States}}&amp;lt;br&amp;gt;&lt;br /&gt;
Eva Kaili{{gray|, Member of the European Parliament, Greece}}&amp;lt;br&amp;gt;&lt;br /&gt;
Runa Sandvik{{gray|, security researcher}}&amp;lt;br&amp;gt;&lt;br /&gt;
Kurt Opsahl{{gray|, Electronic Frontier Foundation (affiliation for identification purposes only)}}&amp;lt;br&amp;gt;&lt;br /&gt;
 John Levine{{gray|, President, CAUCE North America}}&amp;lt;br&amp;gt;&lt;br /&gt;
Virendra Rode{{gray|, founder and contributor, Outages.ORG}}&amp;lt;br&amp;gt;&lt;br /&gt;
Stephen D. Crocker{{gray|, Edgemoor Research Institute}}&amp;lt;br&amp;gt;&lt;br /&gt;
Job Snijders{{gray|, board member, RIPE NCC, PeeringDB, and Route Server Support Foundation}}&amp;lt;br&amp;gt;&lt;br /&gt;
Moez Chakchouk{{gray|, Director of Policy, PCH, former ADG/CI UNESCO and former Tunisian minister}}&amp;lt;br&amp;gt;&lt;br /&gt;
Doug Madory{{gray|, Director of Internet Analysis, Kentik}}&amp;lt;br&amp;gt;&lt;br /&gt;
Ondrej Filip{{gray|, CEO, CZ.NIC}}&amp;lt;br&amp;gt;&lt;br /&gt;
Greg Rattray{{gray|, Founder, Next Peak and former cybersecurity advisor to ICANN}}&amp;lt;br&amp;gt;&lt;br /&gt;
Serge Droz{{gray|, in personal capacity, Director FIRST}}&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Tinka{{gray|, board member, FranceIX}}&amp;lt;br&amp;gt;&lt;br /&gt;
Dmitry Kohmanyuk{{gray|, founder, Hostmaster Ltd.}}&amp;lt;br&amp;gt;&lt;br /&gt;
Timothy Denton{{gray|, Chairman, Internet Society, Canada Chapter}}&amp;lt;br&amp;gt;&lt;br /&gt;
Barry Greene&amp;lt;br&amp;gt;&lt;br /&gt;
Perry E. Metzger{{gray|, Managing Member, Metzger, Dowdeswell &amp;amp; Co. LLC}}&amp;lt;br&amp;gt;&lt;br /&gt;
Roelof Meijer{{gray|, CEO, SIDN}}&amp;lt;br&amp;gt;&lt;br /&gt;
Svitlana Matviyenko{{gray|, Associate Director, Digital Democracies Institute, Simon Fraser University}}&amp;lt;br&amp;gt;&lt;br /&gt;
Rabbi Rob Thomas{{gray|, CEO, Team Cymru}}&amp;lt;br&amp;gt;&lt;br /&gt;
Harald Summa{{gray|, CEO, DE-CIX}}&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Gibson{{gray|, in personal capacity, CEO FIRST}}&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Killalea&amp;lt;br&amp;gt;&lt;br /&gt;
The Internet Archive&amp;lt;br&amp;gt;&lt;br /&gt;
Philip Reiner{{gray|, CEO, Institute for Security and Technology}}&amp;lt;br&amp;gt;&lt;br /&gt;
Megan Stifel{{gray|, Chief Security Officer, Institute for Security and Technology}}&amp;lt;br&amp;gt;&lt;br /&gt;
Bart Stidham{{gray|, CEO, NAND Technologies}}&amp;lt;br&amp;gt;&lt;br /&gt;
Rudolf van der Berg{{gray|, Programme Manager, Stratix Consulting}}&amp;lt;br&amp;gt;&lt;br /&gt;
Alejandro Pisanty{{gray|, Professor, National Autonomous University of Mexico}}&amp;lt;br&amp;gt;&lt;br /&gt;
Henrik Kramselund{{gray|, CEO Zencurity Aps}}&amp;lt;br&amp;gt;&lt;br /&gt;
Stéphane Duguin{{gray|, CEO Cyber Peace Institute, in personal capacity}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==Annex: &amp;lt;br&amp;gt;Technical Discussion of Internet Governance Sanction Measures==&lt;br /&gt;
&lt;br /&gt;
This statement is occasioned by the letter Andrii Nabok (Андрій Набок) of the Ukranian Ministry of Digital Transformation addressed to the Internet Corporation for Assigned Names and Numbers (ICANN) on the morning of Monday, February 28, 2022. ICANN and RIPE replied to Mr. Nabok’s letter directly, in the narrowest possible terms, and in the negative.&lt;br /&gt;
&lt;br /&gt;
In this annex, we discuss the technical specifics of each of the proposed sanctions, as well as of other possible Internet sanctions which we suggest are more effective, more precise, and carry fewer risks and lower costs.&lt;br /&gt;
&lt;br /&gt;
===Analysis of Ukraine’s Request===&lt;br /&gt;
We respect Mr. Nabok’s professional expertise and his inclusion of Ukraine’s Internet community in the drafting of his letter in the full spirit of the multistakeholder principles by which the Internet is governed, and we express our deepest sympathies for the indescribable trauma Ukraine is experiencing as a result of Russia’s invasion, which we condemn without reservation.&lt;br /&gt;
&lt;br /&gt;
Mr. Nabok’s letter requests the imposition of four Internet governance sanctions against Russia, namely:&lt;br /&gt;
&lt;br /&gt;
* Permanent or temporary revocation of the country code top-level domains “.ru”, “.рф” and “.su”.&lt;br /&gt;
* Revocation of SSL certificates associated with those domains.&lt;br /&gt;
* Disablement of DNS root servers situated within the Russian Federation.&lt;br /&gt;
* Withdrawal of the right to use IPv4 and IPv6 addresses by Russian networks.&lt;br /&gt;
&lt;br /&gt;
We commend Mr. Nabok and the Ukrainian people and government for responding to bloodshed with diplomacy and seeking deescalatory sanctions. Internet governance sanctions must, however, be selected and implemented carefully, in order to achieve the greatest effect and to avoid unanticipated consequences. In the attached appendix, we discuss each of the proposed sanctions, as well as others we consider more effective, with lower costs and risks of unintended consequences.&lt;br /&gt;
&lt;br /&gt;
===Revocation of country-code Top Level Domains (ccTLDs)===&lt;br /&gt;
Every ISO-3166 Alpha-2 two-letter abbreviation of a national name is reserved for the use of the Internet community of that nation as a “country-code Top Level Domain,” or “ccTLD.” This reservation is made expressly for the Internet community of the nation and not the government of the nation. Geographic, political, and sociocultural allocations of “internationalized” top-level domains (such as “.рф” to the Russian Federation, or “.укр” to Ukraine) are made in parallel with the ISO-3166 mechanism.&lt;br /&gt;
&lt;br /&gt;
The primary users of any ccTLD are its civilian constituents, who may be distributed globally and may be united by linguistic or cultural identity rather than nationality or national identity. Removal of a ccTLD from the root zone of the domain name system (the sanction suggested by the letter) would make it very difficult for anyone, globally, within Russia or without, to contact users of the affected domains, a group that consists almost entirely of Russian-speaking civilians. At the same time, it would have relatively little effect upon Russian military networks, which are unlikely to rely upon DNS servers outside their own control.&lt;br /&gt;
&lt;br /&gt;
We therefore conclude that the revocation, whether temporary or permanent, of a ccTLD is '''not an effective sanction''' because it disproportionately harms civilians; specifically, it is ineffective against any government that has taken cyber-defense preparatory measures to alleviate dependence upon foreign nameservers for domain name resolution. In addition, any country against which this sanction was applied would likely immediately set up an “alternate root,” competing with the one administered by the Internet Assigned Numbers Authority, using any of a number of trivial means. If one country did so, others would likely follow suit, leading to an exodus from the consensus Internet that allows general interconnection.&lt;br /&gt;
&lt;br /&gt;
===Revocation of certificates associated with domain names===&lt;br /&gt;
At least two kinds of cryptographic certificates and signatures are potential mechanisms for sanction, and we discuss each independently.  First, revocation of SSL certificates, as mentioned in Mr. Nabok’s letter:&lt;br /&gt;
&lt;br /&gt;
SSL (“Secure Socket Layer”), which has been succeeded by TLS (“Transport Layer Security”), is a certification mechanism principally used to authenticate and encrypt connections from web browsers to web servers. Such certificates are used in online commerce and banking, among other less visible roles. Certificates are issued by Certificate Authorities (“CAs”), of which there are many hundreds in existence, a significant number of them are controlled, directly or indirectly, by national governments or intelligence agencies. Any one of these organizations may issue a certificate to anyone, certifying that they are the authentic administrator of any domain.&lt;br /&gt;
&lt;br /&gt;
The revocation of certificates associated with governmental or military domains is '''not an effective sanction''', because the targeted government is likely already using a Certificate Authority under its own control, and if it is not it can easily cause any CA under its influence to issue a replacement certificate. The revocation of certificates associated with private subdomains (for instance, redcross.ru, citibank.ru) would render communications between these organizations and their constituencies insecure and vulnerable to cybercrime until they were able to get new certificates issued; decreasing law and order and rendering a civilian population more vulnerable to crime is '''not an effective sanction'''. Alternatively, adding existing certificates for propaganda outlets to Certificate Revocation Lists or using Online Certificate Status Protocol (OSCP) to flag them as revoked would warn casual users such websites are problematic and require them to take explicit action to proceed beyond the warning. These techniques are, however, limited: they must generally be done by the same CA that issued the original certificate, which may not be outside the influence of the sanctioned government. We thus believe this to be a '''moderately effective sanction''' in the cases where it is possible to invoke: it is specific, easily centrally implemented, and has little chance of unintended broader consequences. In X.509 public key infrastructures, certificate revocation cannot be rescinded; a new certificate must be issued and deployed.&lt;br /&gt;
&lt;br /&gt;
===Revocation of DNSSEC signatures on DNS delegations===&lt;br /&gt;
The cryptographic signatures used to authenticate domain names are known as DNSSEC, or DNS Security Extension signatures. Clients can evaluate the veracity of the mappings between domain names and IP addresses, which is what allows them to find and connect to resources on the Internet, by cryptographically validating the DNSSEC signature associated with a domain name.&lt;br /&gt;
&lt;br /&gt;
If a top-level domain were removed from the DNS root, the DNSSEC signature that validates the delegation of that domain would consequently be removed as well. DNS clients or resolvers still in possession of the old information could continue to reach the websites or email addresses identified by a domain, but they would be unable to validate that they had arrived at the right place. The DNSSEC signature validating the delegation of a top-level domain could also be removed while leaving the delegation itself in place. &lt;br /&gt;
&lt;br /&gt;
DNSSEC signatures prevent criminals from performing “man-in-the-middle” attacks, impersonating the website of a retail bank, for instance, to capture the user’s authentication information and empty their accounts. Military and high-security networks may use technical mechanisms to ensure that lack of a DNSSEC delegation above a signature under their control, in the DNS hierarchy, will not interfere with their resolution. Regular Internet users, however, either will be confronted with error messages indicating that their bank’s website is an impostor or will not be notified if an attacker stands between them and their bank. &lt;br /&gt;
&lt;br /&gt;
Removing the DNSSEC signature validating the delegation of a national top-level domain, whether in association with the removal of the delegation or not, may have little or no effect upon military and other high-security networks, but it would decrease law and order and make ordinary people much more susceptible to cybercrime. Tampering with DNSSEC signatures is thus '''not an effective sanction'''.&lt;br /&gt;
&lt;br /&gt;
===Disablement of DNS root servers===&lt;br /&gt;
Root nameservers are simply those nameservers that hold a static copy of the DNS “root zone,” which is, by its very nature, public information. Essentially any nameserver may be made a root nameserver, simply by telling it to retrieve and cache copies of the DNS root zone.&lt;br /&gt;
&lt;br /&gt;
Disabling specific root nameservers has no effect, since they are, by design, not uniquely privileged or in possession of unique information. Disabling all root nameservers is not feasible since it would disable the Internet for everyone, and anyone could, and would, establish new ones. Disabling root nameservers thus has '''no utility as a sanction'''.&lt;br /&gt;
&lt;br /&gt;
===Withdrawal of the right to use Internet Protocol addresses===&lt;br /&gt;
Internet Protocol (IP) addresses, the numeric identifiers by which Internet devices find each other, are allocated by the five Regional Internet Registries that together constitute the Number Resource Organization (NRO). Réseaux IP Européens (RIPE) is the Regional Internet Registry for Europe, the Middle East, and parts of Central Asia, with responsibility for allocating IP addresses to Russian entities. It is within RIPE’s power, if directed to do so by its member organizations through its multistakeholder governance process, to create policy that would effectively withdraw the allocations of IP addresses it has made to Russian organizations.&lt;br /&gt;
&lt;br /&gt;
This situation bears some similarities to the governance of domain names, yet it also contains crucial differences. ICANN’s authority extends no further into the DNS hierarchy than the root level, so actions taken by ICANN inherently affect entire top-level domains unitarily, without the possibility of “surgical” actions upon one subdomain and not another.  By contrast, the Regional Internet Registries can affect policy on a per-organization (or even finer) basis. Yet rescinding an IP address allocation does not prevent its previous holder from continuing to use it. Indeed, “IP address hijacking” is a relatively commonplace problem on the Internet. Therefore, although it can be precisely targeted, simply rescinding the right to use an IP address allocation is '''not, by itself, an effective sanction'''. &lt;br /&gt;
&lt;br /&gt;
Note that this process of IP address revocation and RPKI attestation revocation would be a normal consequence of an address recipient (such as the Russian military) failing to pay annual registration fees to its Regional Internet Registry, something that may in fact come to pass as a consequence of financial and banking sanctions. But such a process might take years. Another negative consequence of revoking IP address allocations is that revoked addresses will likely be allocated to a different recipient subsequently, who will then find themselves competing with the original holder for their use. &lt;br /&gt;
&lt;br /&gt;
===Manipulation of routing security attestations===&lt;br /&gt;
A potential sanction not explicitly requested in Mr. Nabok’s letter is the manipulation of routing security attestations to produce the effect of a partial or complete disconnection from the Internet of specific networks, such as those of the Russian military or propaganda agencies. &lt;br /&gt;
&lt;br /&gt;
As with domain names, technical mechanisms exist to cryptographically verify the legitimacy of use of IP addresses. Routing Policy Specification Language (RPSL) and Routing Public Key Infrastructure (RPKI) are the two primary such mechanisms. To be used for communication on the Internet, IP addresses must be “announced” through the routing system, and the routers of the larger and better-secured networks utilize these two mechanisms to ensure that invalid routes are not used by their routers. Smaller and less-secured networks do not typically implement these mechanisms. &lt;br /&gt;
&lt;br /&gt;
A manipulation of RPSL and RPKI records in centralized registries would flow through to all networks employing these common routing security mechanisms, some of which would then automatically stop routing traffic to and from the specified networks, without affecting other “adjacent” civilian networks or being subject to trivial “work-arounds.” &lt;br /&gt;
&lt;br /&gt;
The manipulation of RPSL and RPKI routing security attestations could be an effective sanction measure, because it appears precise, easily and quickly implemented and reversed, and reasonably effective. However, the appropriation of preexisting routing security mechanisms for use in sanctions, likely unexpected by the participating networks, could conflict with the business or regulatory requirements of those networks, and, crucially, could risk the withdrawal of networks from the system entirely. Such an exodus would both make this potential sanction less effective in the future and have the far greater cost of eroding cybersecurity for the Internet as a whole, the purpose for which the routing security systems were built in the first place. This thus constitutes an '''unacceptable risk'''.&lt;br /&gt;
&lt;br /&gt;
===Other Internet-associated, non-technical sanctions===&lt;br /&gt;
Other sanctions related to the Internet’s operation and governance may be worth considering. These include, for example, the disallowance of sanctioned personnel from participation in Internet governance, policymaking, or standardization proceedings. Such nontechnical measures are outside the scope of this document.&lt;br /&gt;
&lt;br /&gt;
===Blocklisting===&lt;br /&gt;
Network operators and DNS resolver operators already make use of multistakeholder-governed lists, similar to the way financial lenders use credit scoring agencies, to determine what IP addresses to route and pass traffic between, and what domain names to resolve. This is the mechanism by which persistent spammers and address hijackers are excluded from the network, and by which Internet users are protected from malware and phishing attacks.&lt;br /&gt;
&lt;br /&gt;
The technical mechanisms by which such blocking information is passed are mature, robust, instantaneous, and globally standardized. Information related to IP addresses and Autonomous System Numbers is mostly carried over BGP feeds, while information related to domain names is mostly carried over RPZ feeds. Both mechanisms are implemented by essentially all large operators globally. Blocklisting IP addresses and Autonomous System Numbers has all of the advantages of address block revocation or manipulation of routing security attestations, without the drawbacks. It allows network operators to block both the acceptance of routes and the passage of traffic, each or both of which may be appropriate in different situations and in response to different threats. Blocklisting of domain names allows full precision and specificity, which is the problem that precludes action by ICANN. The system is opt-in, voluntary, consensual, and bottom-up, all values the Internet governance community holds dear. Yet, at the same time, it has achieved broad adoption.&lt;br /&gt;
&lt;br /&gt;
We conclude that the well-established methods of blocklisting provide the '''best mechanism for sanctioning both IP routes and traffic and domain names''', and that this mechanism, if implemented normally by subscribing entities, has no significant costs or risks.&lt;br /&gt;
&lt;br /&gt;
===Conclusion===&lt;br /&gt;
Our conclusion is that '''blocklisting''' of IP addresses, Autonomous Systems, and domain names upon which the multistakeholder community can establish consensus is effective and carries no inherent danger of being over-broad. Once decided upon, it is easily invoked—and equally easily rolled back once the problem is resolved. Most important, it carries no significant costs or risks and is aligned with the Internet’s multistakeholder governance values and principles.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=282</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=282"/>
		<updated>2022-04-07T15:15:48Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv4 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 7, 2022, ARIN's 8.4 transfer group has acknowledged that the transfer of our two /24s is approved, but has not yet completed the transfer.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=281</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=281"/>
		<updated>2022-04-07T15:15:30Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv4 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 7, ARIN's 8.4 transfer group has acknowledged that the transfer of our two /24s is approved, but has not yet completed the transfer.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=280</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=280"/>
		<updated>2022-04-07T15:12:30Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Domain Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a '''sanctions-beacon.net''']&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a '''sanctions-beacon.com''']&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=279</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=279"/>
		<updated>2022-04-07T15:09:50Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Domain Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
As of March 27, 2022, we have two domain name beacons. They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.net&amp;amp;t=a sanctions-beacon.net]&lt;br /&gt;
* [https://lookup.icann.org/lookup?q=sanctions-beacon.com&amp;amp;t=a sanctions-beacon.com]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=278</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=278"/>
		<updated>2022-04-07T15:04:31Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv6 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, 2022, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=277</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=277"/>
		<updated>2022-04-07T15:04:18Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* ASN Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 5, 2022, we've received both the 16-bit and 32-bit beacon ASNs we requested. They are:&lt;br /&gt;
&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS13400 '''16-bit''': 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
* [https://account.arin.net/public/secure/asn/view/AS400603 '''32-bit''': 400603]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=276</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=276"/>
		<updated>2022-04-07T15:01:21Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv6 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, we've received the two independent IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
The 16-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS13400 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
The 32-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS400603 400603]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=275</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=275"/>
		<updated>2022-04-07T15:00:50Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv6 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 7, we've received both of the IPv6 /48 beacon subnets that we applied for.  They are:&lt;br /&gt;
{{plainlist|&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A9-2000-1 '''SANCTIONS-BEACON-IPV6-A''', 2620:A9:2000::/48]&lt;br /&gt;
* [https://account.arin.net/public/secure/net/view/NET6-2620-A8-E000-1 '''SANCTIONS-BEACON-IPV6-B''', 2620:A8:E000::/48]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
The 16-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS13400 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
The 32-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS400603 400603]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:More_Specific_Domains&amp;diff=274</id>
		<title>Policy:More Specific Domains</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:More_Specific_Domains&amp;diff=274"/>
		<updated>2022-04-07T14:57:21Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;If a domain name (for instance &amp;quot;badperson.net&amp;quot;) is sanctioned, should all subdomains of that domain (for instance &amp;quot;www.badperson.net&amp;quot;) be automatically sanctioned as well?  Or...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If a domain name (for instance &amp;quot;badperson.net&amp;quot;) is sanctioned, should all subdomains of that domain (for instance &amp;quot;www.badperson.net&amp;quot;) be automatically sanctioned as well?  Or should each specific domain be sanctioned individually, recognizing that the operator of the sanctioned domain is then free to create additional as-yet-unsanctioned subdomains at will?&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=273</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=273"/>
		<updated>2022-04-07T14:55:19Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Domain Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.  Because these should be blocked by name ''and not'' by number, we will also host positive beacons on the same servers (which should be visible, although resources identified by the beacon domains should ''not'' be visible).  Depending upon the decision of the policy group on the matter of [[Policy:More Specific Domains|more specific domain names]], we may also want to host separate beacons on more-specific subdomains, c.f. http://more-specific.sanctions-beacon.net.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space, and they are not yet approved.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
The 16-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS13400 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
The 32-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS400603 400603]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=272</id>
		<title>Policy:Policy Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=272"/>
		<updated>2022-04-07T14:54:40Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Open Issues */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
The '''policy group''' monitors the political situation and the sanction initiatives of national governments, and evaluates proposed sanctions in light of the project's [[Policy:Guiding Principles|guiding principles]] and precedents in [[Policy:International Law and Norms|international law and norms]], including those governing fundamental human rights of [[Policy:Freedom of Expression and Access to Information|freedom of expression and access to information]]. If a sanction is deemed in-scope, the policy group defines the sanctioned entities and passes them to the OSINT group. The policy group is also responsible for determining when existing sanctions should be repealed.&lt;br /&gt;
&lt;br /&gt;
The work of the policy group is done on the discussion mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/discuss welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/discuss/ archives of past discussion]) and its results are published here.&lt;br /&gt;
----&lt;br /&gt;
== Thoughts and Articles ==&lt;br /&gt;
* [[Policy:The Goals of Sanctions|The goals of sanctions]]&lt;br /&gt;
&lt;br /&gt;
== Open Issues ==&lt;br /&gt;
* [[Policy:The &amp;quot;Human Shield&amp;quot; Problem|The &amp;quot;human shield&amp;quot; problem]]&lt;br /&gt;
* [[Policy:More Specific Domains|The &amp;quot;more specific domain&amp;quot; question]]&lt;br /&gt;
* [[Policy:Data Formatting Issues|Data formatting issues]]&lt;br /&gt;
* [[Policy:Intake Database|Intake database]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Specific Sanction Reviews ==&lt;br /&gt;
=== 2022 ===&lt;br /&gt;
==== Multiple vs. Russia and Belarus ====&lt;br /&gt;
Near the end of February 2022, many countries began levying sanctions against more than a thousand entities in Russia and Belarus, in connection with Russia's military invasion of Ukraine. In some cases, the sanctions were additive with preexisting ones associated with Russia's 2014 military invasion of Ukraine. [[Policy:Multiple vs. Russia and Belarus, 2022 |Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== Afghanistan vs. United States et al. ====&lt;br /&gt;
In March, 2022, the Afghan government sanctioned Voice of America, the British Broadcasting Corporation, and Deutsche Welle.  [[Policy:Afghanistan vs. Western Broadcasters, 2022|Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== United States vs. Iran ====&lt;br /&gt;
In March, 2022, the United States government added Iranian procurement agent Mohammad Ali Hosseini and his associated companies to existing sanctions aimed at Iran's ballistic missile development program.  [[Policy: United States vs. Iranian Ballistic Missile Program, 2022|Discussion of these sanctions can be found here.]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=271</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=271"/>
		<updated>2022-04-05T14:02:21Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* ASN Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space, and they are not yet approved.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
The 16-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS13400 13400]&amp;lt;br&amp;gt;&lt;br /&gt;
The 32-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS400603 400603]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=270</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=270"/>
		<updated>2022-04-05T14:02:07Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* ASN Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space, and they are not yet approved.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
The 16-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS13400 AS13400]&amp;lt;br&amp;gt;&lt;br /&gt;
The 32-bit beacon ASN is [https://account.arin.net/public/secure/asn/view/AS400603 AS400603]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=269</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=269"/>
		<updated>2022-04-05T13:31:00Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of April 5, RIPE has contacted ARIN's 8.4 transfer group and initiated the transfer of our two /24s.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space, and they are not yet approved.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 4, we've received the 16-bit ASN, which is [https://account.arin.net/public/secure/asn/view/AS13400 AS13400], but we're still waiting on the 32-bit ASN.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=268</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=268"/>
		<updated>2022-04-05T01:04:45Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* ASN Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of March 31, we have secured a donor for two independent IPv4 /24s, our new ARIN OrgID, SANCT-7, is active, the transfer has been initiated, and we're waiting for RIPE to contact ARIN's 8.4 transfer group.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of April 4, we've received the 16-bit ASN, which is [https://account.arin.net/public/secure/asn/view/AS13400 AS13400], but we're still waiting on the 32-bit ASN.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=258</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=258"/>
		<updated>2022-04-01T07:09:38Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv6 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of March 31, we have secured a donor for two independent IPv4 /24s, our new ARIN OrgID, SANCT-7, is active, the transfer has been initiated, and we're waiting for RIPE to contact ARIN's 8.4 transfer group.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of April 1, we've submitted requests to ARIN for two independent /48s of IPv6 space.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of March 31, we've been approved for both a 16-bit and a 32-bit ASN, and we're waiting to receive the invoices for them before they can be issued.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=257</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=257"/>
		<updated>2022-04-01T07:08:50Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* ASN Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of March 31, we have secured a donor for two independent IPv4 /24s, our new ARIN OrgID, SANCT-7, is active, the transfer has been initiated, and we're waiting for RIPE to contact ARIN's 8.4 transfer group.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of March 30, we're waiting for the completion of the ARIN account setup, but have an informal confirmation that we'll be approved for two IPv6 /48s.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of March 31, we've been approved for both a 16-bit and a 32-bit ASN, and we're waiting to receive the invoices for them before they can be issued.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=256</id>
		<title>Research:Beacon</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Research:Beacon&amp;diff=256"/>
		<updated>2022-04-01T07:08:00Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* IPv4 Beacon */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The design of the beacon which will be used to verify operation and reach of the program is currently underway on the mailing list, and will be described here when it reaches stable consensus. It is intended to allow independent verification of IPv4 and IPv6 routing and domain name resolution, and to be robust against orthogonal DNSSEC validation errors.&lt;br /&gt;
&lt;br /&gt;
Generally, our goal is to use two of each type of beacon, on independent and unrelated infrastructure, with one strobing on a one-hour period.&lt;br /&gt;
&lt;br /&gt;
==== Domain Beacon ====&lt;br /&gt;
We have registered two domain names for this purpose: [http://sanctions-beacon.net sanctions-beacon.net] and [http://sanctions-beacon.com sanctions-beacon.com]. Each will be set up to host the necessary responders, on two different independent network connections, using IP addresses not in any of our beacon IP address blocks. We will presumably need to get TLS certs for them as well.&lt;br /&gt;
&lt;br /&gt;
==== IPv4 Beacon ====&lt;br /&gt;
As of March 31, we have secured a donor for two independent IPv4 /24s, our new ARIN OrgID, SANCT-7, is active, the transfer has been initiated, and we're waiting for RIPE to contact ARIN's 8.4 transfer group.&lt;br /&gt;
&lt;br /&gt;
==== IPv6 Beacon ====&lt;br /&gt;
As of March 30, we're waiting for the completion of the ARIN account setup, but have an informal confirmation that we'll be approved for two IPv6 /48s.&lt;br /&gt;
&lt;br /&gt;
==== ASN Beacon ====&lt;br /&gt;
As of March 30, we're waiting for the completion of the ARIN account setup, but have an informal confirmation that we'll be approved for two independent ASNs, one 16-bit, the other 32-bit.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:The_Goals_of_Sanctions&amp;diff=255</id>
		<title>Policy:The Goals of Sanctions</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:The_Goals_of_Sanctions&amp;diff=255"/>
		<updated>2022-03-31T14:42:21Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Experts in the field of sanctions categorize the goals which sanctions can achieve as [https://www.iss.europa.eu/sites/default/files/EUISSFiles/cp155.pdf signaling, constraint, and coercion].&lt;br /&gt;
&lt;br /&gt;
'''Signaling''' is an attempt to communicate a community's strong disapproval to the sanctioned entity and the public: to convey to the world that army is operating outside the bounds of legal armed conflict and this should not be tolerated, for instance.&lt;br /&gt;
&lt;br /&gt;
'''Constraint''' is an attempt to directly curtail the actions of the sanctioned party: to stop a DDoS by blocking resolution of the domain name by which it locates its command and control, for instance.&lt;br /&gt;
&lt;br /&gt;
'''Coercion''' is an attempt to influence the voluntary behavior of the sanctioned party: to convince an arms manufacturer to stop selling to a third party, for instance.&lt;br /&gt;
&lt;br /&gt;
The success of a sanction may not be directly quantifiable, but it may be directed toward any or all of these goals simultaneously, and need only succeed in one of them in order to be effective.  Signaling is the easiest of these goals to achieve. Constraint requires effective implementation to be successful, but is well within the realm of possibility for Internet sanctions, as it differs little from existing constraints placed by the community upon the actions of spammers, booters, phishers, and the like. Coercion is generally understood to be the most difficult goal to achieve, particularly with respect to a concerted adversary; in the case of Internet sanctions, it depends both upon the degree to which the sanctioned entity depends upon the Internet and the degree to which a sanction effectively constrains or increases the cost of such access.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:The_Goals_of_Sanctions&amp;diff=254</id>
		<title>Policy:The Goals of Sanctions</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:The_Goals_of_Sanctions&amp;diff=254"/>
		<updated>2022-03-31T14:36:04Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;Experts in the field of sanctions categorize the goals which sanctions can achieve as [https://www.iss.europa.eu/sites/default/files/EUISSFiles/cp155.pdf coercion, constraint,...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Experts in the field of sanctions categorize the goals which sanctions can achieve as [https://www.iss.europa.eu/sites/default/files/EUISSFiles/cp155.pdf coercion, constraint, and signaling].&lt;br /&gt;
&lt;br /&gt;
'''Coercion''' is an attempt to influence the voluntary behavior of the sanctioned party: to convince an arms manufacturer to stop selling to a third party, for instance.&lt;br /&gt;
&lt;br /&gt;
'''Constraint''' is an attempt to directly curtail the actions of the sanctioned party: to stop a DDoS by blocking resolution of the domain name by which it locates its command and control, for instance.&lt;br /&gt;
&lt;br /&gt;
'''Signaling''' is an attempt to communicate a community's strong disapproval to the sanctioned entity and the public: to convey to the world that army is operating outside the bounds of legal armed conflict and this should not be tolerated, for instance.&lt;br /&gt;
&lt;br /&gt;
The success of a sanction may not be directly quantifiable, but it may be directed toward any or all of these goals simultaneously, and need only succeed in one of them in order to be effective.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=253</id>
		<title>Policy:Policy Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=253"/>
		<updated>2022-03-31T14:26:59Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
The '''policy group''' monitors the political situation and the sanction initiatives of national governments, and evaluates proposed sanctions in light of the project's [[Policy:Guiding Principles|guiding principles]] and precedents in [[Policy:International Law and Norms|international law and norms]], including those governing fundamental human rights of [[Policy:Freedom of Expression and Access to Information|freedom of expression and access to information]]. If a sanction is deemed in-scope, the policy group defines the sanctioned entities and passes them to the OSINT group. The policy group is also responsible for determining when existing sanctions should be repealed.&lt;br /&gt;
&lt;br /&gt;
The work of the policy group is done on the discussion mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/discuss welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/discuss/ archives of past discussion]) and its results are published here.&lt;br /&gt;
----&lt;br /&gt;
== Thoughts and Articles ==&lt;br /&gt;
* [[Policy:The Goals of Sanctions|The goals of sanctions]]&lt;br /&gt;
&lt;br /&gt;
== Open Issues ==&lt;br /&gt;
* [[Policy:The &amp;quot;Human Shield&amp;quot; Problem|The &amp;quot;human shield&amp;quot; problem]]&lt;br /&gt;
* [[Policy:Data Formatting Issues|Data formatting issues]]&lt;br /&gt;
* [[Policy:Intake Database|Intake database]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Specific Sanction Reviews ==&lt;br /&gt;
=== 2022 ===&lt;br /&gt;
==== Multiple vs. Russia and Belarus ====&lt;br /&gt;
Near the end of February 2022, many countries began levying sanctions against more than a thousand entities in Russia and Belarus, in connection with Russia's military invasion of Ukraine. In some cases, the sanctions were additive with preexisting ones associated with Russia's 2014 military invasion of Ukraine. [[Policy:Multiple vs. Russia and Belarus, 2022 |Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== Afghanistan vs. United States et al. ====&lt;br /&gt;
In March, 2022, the Afghan government sanctioned Voice of America, the British Broadcasting Corporation, and Deutsche Welle.  [[Policy:Afghanistan vs. Western Broadcasters, 2022|Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== United States vs. Iran ====&lt;br /&gt;
In March, 2022, the United States government added Iranian procurement agent Mohammad Ali Hosseini and his associated companies to existing sanctions aimed at Iran's ballistic missile development program.  [[Policy: United States vs. Iranian Ballistic Missile Program, 2022|Discussion of these sanctions can be found here.]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=252</id>
		<title>Policy:Policy Group</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Policy_Group&amp;diff=252"/>
		<updated>2022-03-31T14:24:26Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
The '''policy group''' monitors the political situation and the sanction initiatives of national governments, and evaluates proposed sanctions in light of the project's [[Policy:Guiding Principles|guiding principles]] and precedents in [[Policy:International Law and Norms|international law and norms]], including those governing fundamental human rights of [[Policy:Freedom of Expression and Access to Information|freedom of expression and access to information]]. If a sanction is deemed in-scope, the policy group defines the sanctioned entities and passes them to the OSINT group. The policy group is also responsible for determining when existing sanctions should be repealed.&lt;br /&gt;
&lt;br /&gt;
The work of the policy group is done on the discussion mailing list (which you're [https://lists.sanctions.net/mailman/listinfo/discuss welcome to join], or you can consult its [https://lists.sanctions.net/pipermail/discuss/ archives of past discussion]) and its results are published here.&lt;br /&gt;
----&lt;br /&gt;
== Open Policy Questions ==&lt;br /&gt;
* [[Policy:The &amp;quot;Human Shield&amp;quot; Problem|The &amp;quot;human shield&amp;quot; problem]]&lt;br /&gt;
* [[Policy:Data Formatting Issues|Data formatting issues]]&lt;br /&gt;
* [[Policy:Intake Database|Intake database]]&lt;br /&gt;
&lt;br /&gt;
== Specific Sanction Reviews ==&lt;br /&gt;
=== 2022 ===&lt;br /&gt;
==== Multiple vs. Russia and Belarus ====&lt;br /&gt;
Near the end of February 2022, many countries began levying sanctions against more than a thousand entities in Russia and Belarus, in connection with Russia's military invasion of Ukraine. In some cases, the sanctions were additive with preexisting ones associated with Russia's 2014 military invasion of Ukraine. [[Policy:Multiple vs. Russia and Belarus, 2022 |Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== Afghanistan vs. United States et al. ====&lt;br /&gt;
In March, 2022, the Afghan government sanctioned Voice of America, the British Broadcasting Corporation, and Deutsche Welle.  [[Policy:Afghanistan vs. Western Broadcasters, 2022|Discussion of these sanctions can be found here.]]&lt;br /&gt;
&lt;br /&gt;
==== United States vs. Iran ====&lt;br /&gt;
In March, 2022, the United States government added Iranian procurement agent Mohammad Ali Hosseini and his associated companies to existing sanctions aimed at Iran's ballistic missile development program.  [[Policy: United States vs. Iranian Ballistic Missile Program, 2022|Discussion of these sanctions can be found here.]]&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=251</id>
		<title>Welcome to the Internet Sanctions Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Welcome_to_the_Internet_Sanctions_Project&amp;diff=251"/>
		<updated>2022-03-31T13:30:00Z</updated>

		<summary type="html">&lt;p&gt;Woody: /* Why does this project exist? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
This is an [https://en.wikipedia.org/wiki/Open_standard open], [https://en.wikipedia.org/wiki/Internet_governance Internet community governed], project which produces real-time [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP] and [https://en.wikipedia.org/wiki/Response_policy_zone RPZ] data feeds of network resources ([https://en.wikipedia.org/wiki/IP_address IP addresses], [https://en.wikipedia.org/wiki/Autonomous_system_(Internet) Autonomous System numbers], and [https://en.wikipedia.org/wiki/Domain_name domain names]) associated with [https://en.wikipedia.org/wiki/Economic_sanctions sanctioned] entities. These data feeds facilitate [https://en.wikipedia.org/wiki/Internet_service_provider Internet network operators] in complying with governmentally-mandated sanctions against violators of international and human rights law.&lt;br /&gt;
&lt;br /&gt;
=== Why does this project exist? ===&lt;br /&gt;
National governments have used sanctions as a deescalatory punitive measure for [https://foreignpolicy.com/2012/04/23/smart-sanctions-a-short-history/ thousands of years]. The private sector within each nation is responsible for enacting sanctions defined by their government. This has historically worked well with banking, since banks (which may superficially appear to be multinational) are actually collections of individual, autonomous, independently-regulated entities, each existing within a single country, though they may share a common brand. But the &amp;quot;flat&amp;quot; global, transnational nature of the Internet makes compliance with diverse sanctions regimes much more difficult for Internet organizations. Large Internet networks operate as single networks spanning the world, with unitary policy and technical choices implemented globally. Thus a policy imposed by a single government on a global network, if implemented, has [https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction extraterritorial effects] in every other country, violating those countries' [https://en.wikipedia.org/wiki/Westphalian_sovereignty Westphalian] rights of [https://en.wikipedia.org/wiki/Self-determination self-determination]. And conflicting policies imposed by different governments cannot be resolved without breaking the fundamental nature of Internet connectivity.&lt;br /&gt;
&lt;br /&gt;
At the same time, broadly-defined Internet sanctions tend to disproportionately affect the civilian population of sanctioned countries; this is both counterproductive and violates their human rights to freedom of communication and access to information as recognized by [[Policy:Freedom of Expression and Access to Information|the United Nations, the European Union, the Council of Europe, the Organization of American States, the African Union, and others]]. &lt;br /&gt;
&lt;br /&gt;
This project brings together governments, Internet organizations, civil society, and academia to provide a globally-harmonized Internet sanctions imposition mechanism that combines the expertise and perspectives of different stakeholders to develop proportional and effective sanctions that aim to not impinge upon civilians' access to information and communications. '''This project is neither pro-sanction nor anti-sanction'''; it exists to facilitate public-sector/private-sector coordination while ensuring that the human rights of civilians are protected.&lt;br /&gt;
&lt;br /&gt;
=== Origin of the project ===&lt;br /&gt;
This project originated in an [[The Open Letter|open letter]] from leaders of the multistakeholder Internet governance community, calling for constructive dialog about the imposition of Internet-related sanctions, and for a principled, structured, and transparent approach to sanctions, with the explicit aim of maintaining connectivity to civilian populations. &lt;br /&gt;
&lt;br /&gt;
=== Structure ===&lt;br /&gt;
The project is implemented by five working groups:&lt;br /&gt;
&lt;br /&gt;
* A [[Policy:Policy Group|'''policy group''']] monitors the political situation and the sanction initiatives of national governments, and evaluates whether a situation or proposed sanctions is relevant in light of the project's principles. If a sanction is deemed in-scope, the policy group defines the situation and (potentially) sanctioned entities and passes them to the [[Open Source Intelligence|OSINT group]]. The policy group is responsible for determining the limited scope of measures, analyzing when existing sanctions should be repealed, and for liaising with governments which are considering declaring this mechanism to be sufficient compliance with their nationally-defined sanctions.&lt;br /&gt;
&lt;br /&gt;
* An [[Open Source Intelligence|'''intelligence group''']] investigates and catalogs the Internet resources (IP addresses, Autonomous System numbers, and domain names) held by sanctioned entities. This helps the [[Policy Group|policy group]] understand the (potential) impact of measures and assess their proportionality. &lt;br /&gt;
&lt;br /&gt;
* An [[Oversight Board|'''oversight board''']] provides a final check on which resources are included in the blocking feed, verifying its conformity with international and human rights law. When anything is added to the feed, an announcement will be posted to the (read-only) [https://lists.sanctions.net/mailman/listinfo/announce announcement email list], which you're welcome to subscribe to, to keep track of the project's outcomes.&lt;br /&gt;
&lt;br /&gt;
* An [[Operations Group|'''operations group''']] keeps the BGP and RPZ feed publishing mechanisms working and gather feedback from implementers.&lt;br /&gt;
&lt;br /&gt;
* A [[Research Group|'''research group''']] is responsible for metrics and monitoring of the system and its effectiveness, and liaises with the academic community.&lt;br /&gt;
&lt;br /&gt;
=== Participation ===&lt;br /&gt;
This is a community volunteer effort, and your participation is welcome! Please consider [[Frequently Asked Questions|reading the FAQ]] and subscribing to the [[E-Mail Discussion Lists|email discussion lists]] as starting-points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User's Guide] for information on using the wiki software.&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Afghanistan_vs._Western_Broadcasters,_2022&amp;diff=250</id>
		<title>Policy:Afghanistan vs. Western Broadcasters, 2022</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Afghanistan_vs._Western_Broadcasters,_2022&amp;diff=250"/>
		<updated>2022-03-31T09:59:43Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.state.gov/media-access-and-fundamental-freedoms-in-afghanistan/ U.S. State Department complaint].&lt;br /&gt;
&lt;br /&gt;
{{Blockquote&lt;br /&gt;
|text=&amp;quot;It is with alarm and deep concern we learned of the Taliban’s decision to stifle the Afghan people’s access to independent, objective, international media sources. Media outlets such as the '''Voice of America''', the '''British Broadcasting Corporation''', and '''Deutsche Welle''' have reported that their local broadcasting partners have been prevented from airing their programming in the country due to new, restrictive, and unpublished guidelines from the Taliban.&amp;quot;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
We do not yet have documentation of this from the Afghan government side.&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:Afghanistan_vs._Western_Broadcasters,_2022&amp;diff=249</id>
		<title>Policy:Afghanistan vs. Western Broadcasters, 2022</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:Afghanistan_vs._Western_Broadcasters,_2022&amp;diff=249"/>
		<updated>2022-03-31T09:59:12Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;[https://www.state.gov/media-access-and-fundamental-freedoms-in-afghanistan/ U.S. State Department complaint].  {{Blockquote |text=&amp;quot;It is with alarm and deep concern we learne...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.state.gov/media-access-and-fundamental-freedoms-in-afghanistan/ U.S. State Department complaint].&lt;br /&gt;
&lt;br /&gt;
{{Blockquote&lt;br /&gt;
|text=&amp;quot;It is with alarm and deep concern we learned of the Taliban’s decision to stifle the Afghan people’s access to independent, objective, international media sources. Media outlets such as the '''Voice of America''', the '''British Broadcasting Corporation''', and '''Deutsche Welle''' have reported that their local broadcasting partners have been prevented from airing their programming in the country due to new, restrictive, and unpublished guidelines from the Taliban.&amp;quot;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:United_States_vs._Iranian_Ballistic_Missile_Program,_2022&amp;diff=248</id>
		<title>Policy:United States vs. Iranian Ballistic Missile Program, 2022</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:United_States_vs._Iranian_Ballistic_Missile_Program,_2022&amp;diff=248"/>
		<updated>2022-03-31T09:56:03Z</updated>

		<summary type="html">&lt;p&gt;Woody: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://home.treasury.gov/news/press-releases/jy0689 US Treasury Department announcement].&lt;br /&gt;
&lt;br /&gt;
{{Blockquote&lt;br /&gt;
|text=&amp;quot;'''Mohammad Ali Hosseini''' is being designated for having provided, or attempted to provide, financial, material, technological or other support for, or goods or services in support of, the IRGC RSSJO and PCI.&lt;br /&gt;
&lt;br /&gt;
'''Sina Composite''' is being designated for having provided, or attempted to provide, financial, material, technological or other support for, or goods or services in support of, the IRGC RSSJO.&lt;br /&gt;
&lt;br /&gt;
'''Sepehr Delijan''' and '''Jestar Sanat''' are being designated for being owned or controlled by, directly or indirectly, Mohammad Ali Hosseini.&lt;br /&gt;
&lt;br /&gt;
Today’s action also targets '''P.B. Sadr Co.''' which has acted on behalf of Parchin Chemical Industries as a key intermediary to procure parts that are used to develop missile propellant.&amp;quot;&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
	<entry>
		<id>https://wiki.sanctions.net/index.php?title=Policy:United_States_vs._Iranian_Ballistic_Missile_Program,_2022&amp;diff=247</id>
		<title>Policy:United States vs. Iranian Ballistic Missile Program, 2022</title>
		<link rel="alternate" type="text/html" href="https://wiki.sanctions.net/index.php?title=Policy:United_States_vs._Iranian_Ballistic_Missile_Program,_2022&amp;diff=247"/>
		<updated>2022-03-31T09:53:19Z</updated>

		<summary type="html">&lt;p&gt;Woody: Created page with &amp;quot;[https://home.treasury.gov/news/press-releases/jy0689 US Treasury Department announcement].&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://home.treasury.gov/news/press-releases/jy0689 US Treasury Department announcement].&lt;/div&gt;</summary>
		<author><name>Woody</name></author>
	</entry>
</feed>