The publisher asks the corresponding author for suggested reviewers
and the publisher subsequently uses the suggested reviewers without
sufficiently vetting their qualifications or authenticity. (This protocol also
may allow authors to create faux online identities in order to review
their own papers).