<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div><blockquote type="cite" class=""><div class=""><div dir="auto" style="caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;" class=""><div class=""><div class="gmail_quote"><blockquote class="gmail_quote" style="margin: 0px 0px 0px 0.8ex; border-left-width: 1px; border-left-style: solid; border-left-color: rgb(204, 204, 204); padding-left: 1ex;"><div style="word-wrap: break-word; line-break: after-white-space;" class=""><div class=""><blockquote type="cite" class=""><div class=""><div dir="auto" class=""><div dir="auto" class=""><br class=""></div><div dir="auto" class="">So in the AFRINIC region, network abuse incidents have been reported on this very list as recent as this year and we have had incidents of misappropriation [1] of INR as well.</div><div dir="auto" class=""><br class=""></div><div dir="auto" class="">[1]<span class="Apple-converted-space"> </span><a href="https://lists.afrinic.net/pipermail/community-discuss/2020-August/003678.html" rel="noreferrer noreferrer" target="_blank" class="">https://lists.afrinic.net/pipermail/community-discuss/2020-August/003678.html</a><br class=""></div></div></div></blockquote><div class=""><br class=""></div>Your example cites resources that were misappropriated in such a way that they could have had ROAs issued that would have further masked the misappropriation.</div></div></blockquote></div></div><div dir="auto" class=""><br class=""></div><div dir="auto" class="">I read "further masked" ... eeeh heh ?</div></div></div></blockquote><div><br class=""></div></div>In other words, given the way those resources were misappropriated, they could have still had (apparently) valid ROAs attesting to their origin ASN providing an additional<div class="">assurance that this stolen space was in legitimate use.</div><div class=""><br class=""></div><div class="">Hence providing additional disguise…further masking…</div><div class=""><br class=""></div><div class="">Does that clarify for you?</div><div class=""><br class=""></div><div class="">Owen</div><div class=""><br class=""></div></body></html>