<div dir="ltr"><i>Please see attached for fully formatted version.  Plaintext version follows:</i><div><br></div><div><span id="inbox-inbox-docs-internal-guid-d528e91e-bfc4-b301-8113-7e2fd6b6c703"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt;text-align:justify"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">September 22, 2017</span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Google applauds Competition and Consumer Trust Review Team (CCT-RT) for commissioning and supporting the Statistical Analysis of DNS Abuse in gTLDs Final Report (“Report”). Empirical research on the occurrence of abuse in the Domain Name System (DNS) as found in the Report is an important first step to effectively handling it, whether through the development of policies or implementation of tools by individual registries and registrars. </span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">We observed the following from the research put forth in the Report:</span></p><ul style="margin-top:0pt;margin-bottom:0pt"><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Patterns of abuse occurrence vary according to the type of abuse, with some forms more reliant on the reputation and visibility of a particular domain name and others with the ability to register domains en masse;</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Similarly, practices by registrars and new and legacy gTLD operators are not homogenous leading to uneven distributions of abuse across registries and registrars;</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">The introduction of new gTLDs changed the distribution of abuse for forms that rely upon low-cost or high-volume registrations, but left the overall amount of DNS abuse largely unchanged; </span></p></li><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">The occurrence of DNS abuse appears to be linked to both price and registry policies/procedures for monitoring for and handling these types of abuse; and, relatedly,</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;vertical-align:baseline;white-space:pre-wrap">Unless compensatory mechanisms are in place, abuse requiring high volumes of registrations is likely to be attracted to whatever TLDs are cheapest. </span></p></li></ul><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">We strongly urge the CCT-RT and ICANN community to apply the findings of the report in further research and efforts to address DNS abuse. This may include further segmentation of the existing findings, or additional research into price sensitivity of registrants engaged in various forms of DNS abuse. In order to succeed in reducing the aggregate occurrence of abuse, it may be necessary or more effective to bring additional Internet infrastructure players into the conversation and move beyond a contractual compliance based solution for addressing DNS abuse toward one that is more holistic. The alternative is likely to only perpetuate the current observed tendency for abuse to move between TLDs and registrars while leaving the aggregate occurrence of abuse constant. </span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">We appreciate the research carried out by Delft University of Technology and SIDN Labs and hope for additional constructive research and effort in the space. </span></p><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Sincerely,</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap"><img width="162" height="42" style="border: none; transform: rotate(0rad);" src="https://lh3.googleusercontent.com/QQJPHk6yUlDYiUlmemBe4vsj0aXu8vxFc9SYPBiBDlLdvbUvfuDz-b3V1tCdrLcz1O2-df-jtNPOyixsq9j9pOqliszLKBm6wsc2xKG1RrBlpKgErVhaNTD2iGpNZbErf1jWUDbM"></span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Ben McIlwain</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:Arial;background-color:transparent;vertical-align:baseline;white-space:pre-wrap">Registry Tech Lead</span></p></span><br class="inbox-inbox-Apple-interchange-newline"></div></div>