Cybersecurity, cybercrime, and online safety

10 Oct 2023 02:00h - 03:30h UTC

Event report

Moderators and Speakers

  • Dai Mochinaga
  • Denia Dennis
  • Eliamani Laltaika
  • Giovanni Zanni
  • Igonor Oshoke Samson
  • Peterking Quaye
  • Veronica Ferrari

Moderators

  • Lucien Castex

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Peterking Quaye

According to the analysis, it was found that only 39 out of the 54 countries in Africa have implemented cybersecurity legislation. This indicates that a considerable number of countries in the region still lack comprehensive laws to address cybersecurity threats and protect their digital infrastructure.

One speaker in the analysis argues that it is not sufficient for countries to merely have cybersecurity strategies outlined in literature. It is crucial for these strategies to be translated into actionable laws and for countries to adhere to them. This stance highlights the importance of putting cybersecurity measures into practice rather than just documenting them.

Supporting this argument, it is stated that some cybersecurity strategies exist only in literature and are not effectively enforced. These strategies may be in the form of policies or plans that are discussed and debated within national assemblies but do not progress beyond that stage. This lack of implementation can leave countries vulnerable to cyber threats, as they are not adequately prepared to tackle issues related to cybercrime and online safety.

Both speakers in the analysis share a neutral sentiment and agree on the need to push countries in Africa to implement cybersecurity legislation. It is suggested that increasing awareness about the importance of cybersecurity and its impact on various sectors, such as industry, innovation, and peace and justice, can help drive the adoption of legislation in this domain.

In conclusion, the analysis highlights the gap in cybersecurity legislation implementation among African countries. The argument that cybersecurity strategies should not be limited to literature but should be transformed into laws and adhered to is supported by the evidence provided. Increasing efforts to promote the adoption of cybersecurity legislation in Africa is crucial for ensuring the safety and security of digital infrastructure and countering cyber threats effectively.

Audience

The Internet Governance Forum covered a wide range of cybersecurity topics, including the role of public-private partnerships in ensuring cybersecurity and fighting cybercrime. For instance, a representative from Kaspersky, a global cybersecurity company, emphasized the importance of collaboration between government and industry in securing digital networks and combatting cyber threats.

Another speaker discussed the challenges faced by the global south in enabling cybersecurity. This involved examining cases of surveillance by countries in the global north on policies and activities in the global south. The speaker called for inclusive cybersecurity measures that address the specific needs of developing countries.

The forum also addressed the need for a more secure internet that includes the LGBTQI community. A speaker from Brazil highlighted ongoing research on internet security to protect the lives of LGBTQI individuals. This highlighted the importance of creating a safe and inclusive online environment for all communities.

The forum also tackled the security of elections and the threat of cyberattacks. Participants discussed initiatives mentioned by the Italian IGF representative and emphasized the importance of robust cybersecurity measures to safeguard the integrity of electoral processes.

The low ratification of the Malabo Convention on cyber security by African Union countries was also a concern. The forum raised awareness about the limited number of countries, around 14 or 15 out of 55, that have ratified the convention. This highlights the need for greater commitment to cybersecurity measures in the region.

In addition, the compatibility of cybersecurity strategies with artificial intelligence was explored. While details of the discussion were not provided, it addressed the potential challenges and opportunities arising from the intersection of these two domains.

A major topic of discussion was the trade-off between internet usability and security. The forum highlighted the need to strike a balance between these aspects to ensure internet freedom while implementing adequate safeguards against cyber threats.

On a global scale, the forum considered the idea of establishing common regulations applicable to all countries. This would help address cybersecurity challenges, recognizing that cybersecurity is a global issue, not a localized one.

The implementation of cyber security legislation in African countries was also emphasized. The forum highlighted the importance of legal frameworks that promote online safety, prevent cybercrime, and uphold cybersecurity.

The issue of online harassment and gender-based violence was another area of concern. An audience member highlighted the prevalence of online violence, harassment, and fraud targeting women in Bangladesh. The role of the Internet Governance Forum in addressing this issue globally was also discussed.

The potential of using the internet for elections and the need for stable cyber tools were also explored. The forum acknowledged the negative aspects of internet usage during elections but also recognized the positive potential of utilizing the internet for the electoral process.

Lastly, the forum stressed the need for a secure cyber space for youth, women, and children. An audience member representing the Bangladesh Youth IGF advocated for a cyber space that prioritizes the safety of these specific groups. The role of the Bangladesh Internet Governance Forum (BAGF), which includes communities dedicated to kids, women, and youth, was highlighted.

In summary, the Internet Governance Forum covered a wide range of cybersecurity topics, including public-private partnerships, challenges faced by the global south, inclusivity for the LGBTQI community, security of elections, ratification of the Malabo Convention, compatibility with artificial intelligence, trade-offs between usability and security, global regulations, implementation of cyber security legislation in Africa, online harassment and gender-based violence, the potential of internet usage in elections, and the need for a secure cyber space for specific demographics. The discussions aimed to strengthen cybersecurity measures, promote collaboration, and ensure the safety and inclusivity of digital ecosystems.

Giovanni Zanni

The discussion revolves around the crucial importance of addressing cybersecurity and misinformation in the electoral process. Concerns are raised about the risks that disinformation poses to public debates during elections. It is noted that the next European Parliament election is scheduled for June 2024, and there is growing recognition of the impact disinformation can have on the electoral process.

The European Digital Media Observatory (EDMO) is presented as a key tool in combating misinformation and improving public debates. Funded by the European Union, EDMO brings together researchers, media literacy experts, journalists, policy experts, and fact-checkers. It plays a vital role in facilitating communication and collaboration between public and private stakeholders involved in monitoring electoral efforts. The speakers highlight the importance of EDMO in tackling misinformation and improving the quality of public debates.

The discussion also emphasizes the significance of addressing foreign interference and ensuring the quality of information as part of electoral process cybersecurity. The COVID-19 pandemic is used as an example to demonstrate how disinformation can directly impact public health. The war in Ukraine is mentioned to highlight how false and misleading information can be weaponized in conflicts. The speakers argue that cybersecurity measures should focus on preventing foreign interference and ensuring the accuracy and reliability of information.

Monitoring election narratives and misinformation across Europe is another critical aspect discussed. A task force is mentioned, which engages various hubs responsible for covering specific nation states in Europe. The task force aims to identify and address the risks specific to each region. Additionally, a planned report on the main narratives of misinformation during recent elections indicates a commitment to comprehensive analysis and understanding of the issue.

Collaboration, fact-checking, and sharing of best practices are considered essential in the fight against misinformation. The speakers highlight successful collaborations with large fact-checking organizations and the emergence of networks in different parts of the world. They stress the importance of these collaborations and the sharing of best practices for effective fact-checking efforts.

The significance of media and information literacy is also emphasized. The speakers note that a significant portion of the population struggles to identify fraudulent or misleading content online, indicating a failure in current media literacy education. They argue for prioritizing media and information literacy education in order to effectively address this issue. Furthermore, establishing a global standard for teaching these skills is seen as a necessary step forward.

In conclusion, the discussion sheds light on the critical aspects of cybersecurity and misinformation in the electoral process. The speakers highlight the need for robust measures to address disinformation, with particular attention to foreign interference and information accuracy. The role of the European Digital Media Observatory is emphasized, along with the importance of collaboration, fact-checking, and sharing best practices. Media and information literacy education is identified as a priority, with a call for establishing global standards. Overall, these insights underscore the significance of addressing cybersecurity and misinformation to maintain the integrity of democratic processes.

Dai Mochinaga

The analysis presented covers several important aspects related to data and cybersecurity, with a specific focus on the role of big data in economic development and the challenges faced in maintaining data security. It recognises that big data plays a significant role in driving economic growth, enabling the sharing of data between companies and creating new opportunities for generating economic value. Furthermore, it emphasises that data is crucial for the development of infrastructure and the overall economy.

However, the analysis also highlights the challenges posed by data security. It acknowledges that as data becomes more vital for economic and infrastructure purposes, ensuring its security becomes a critical issue. The impact of cybersecurity breaches on critical infrastructure can have serious consequences that extend to other sectors, potentially hampering economic development.

The concept of data localisation, which refers to the practice of countries asserting control over data generated and stored within their territories, is also discussed. It notes that this trend has gained global traction as countries consider data as a vital source of economic value. One reason for this phenomenon could be the economic systems’ reliance on data, prompting governments to enact measures such as domestic data storage obligations and restrictions on cross-border data transfers and access.

Another important aspect addressed in the analysis is the significance of cybersecurity for critical infrastructure and other sectors that depend on data. The mention of a cyber attack on a hospital in Japan, affecting thousands of patients’ data, highlights the potential vulnerabilities and the need to strengthen cybersecurity measures across various industries.

The discussion also raises concerns about the fragmentation of data regulations and its adverse effects on cybersecurity. By providing examples from the Asia-Pacific region, where each country has different data regulations, the analysis demonstrates how variations in cross-border data transfers and data localisation can impact cybersecurity. The existence of differing data regulations makes it challenging to establish unified cybersecurity measures.

The analysis acknowledges the primary responsibility of governments in harmonising data regulations. It recognises that harmonised government regulations are essential for cybersecurity service providers who rely on cross-border data transfers to operate effectively in cloud environments. This highlights the need for governments to work together to establish cohesive data regulations to ensure cybersecurity.

Public-private partnerships in cybersecurity are also discussed, noting that their scope differs from country to country. The analysis acknowledges the collaboration between companies, particularly those in critical infrastructure, and the government in Japan to secure their infrastructure. It also recognises that other countries have strong regulations with government enforcement to ensure infrastructure security.

However, the need for a common understanding of cybersecurity in public-private partnerships is stressed. The analysis suggests that establishing this common understanding can help ensure that both companies and the government are working towards the same goal of securing cyberspace.

The importance of international cooperation and effective application of knowledge is also highlighted. The analysis notes that despite the ongoing discussion about these topics, there seems to be a lack of progress in their implementation. It emphasises the need to move beyond knowledge acquisition and focus on effectively applying knowledge through collaboration and action.

In conclusion, the analysis highlights the significant role of big data in economic development and the challenges posed by data security. It discusses the concept of data localisation and its impact on the economy, emphasising the importance of cybersecurity for critical infrastructure and other sectors. The adverse effects of fragmented data regulations on cybersecurity are recognised, and the responsibilities of governments and the need for public-private partnerships to establish a common understanding are addressed. The importance of international cooperation and effective application of knowledge is also stressed.

Veronica Ferrari

The analysis reveals several important insights regarding gender perspectives in cybersecurity policies and the need for a human rights-based approach. It points out that traditionally, cybersecurity debates have primarily focused on national security and the security of systems, neglecting gender considerations. Few countries have integrated gender perspectives into their national cybersecurity policies, resulting in policies that fail to adequately protect vulnerable groups and could potentially threaten their human rights.

Veronica, one of the proponents highlighted in the analysis, emphasises the lack of gender perspective in cybersecurity and advocates for a human rights-based approach. She argues that since humans are the ones directly impacted by cyber threats, there is an increased consensus in favour of adopting a human rights-based approach and bridging the digital gender gap to promote diversity. APC (Association for Progressive Communications) has developed a framework that provides recommendations for integrating gender into cyber policy.

The analysis also recognises the importance of multistakeholder governance in ensuring a safer cybersecurity environment. It asserts that a clear and strong commitment to multistakeholder governance is crucial. This involves involving various stakeholders such as civil society companies, the technical sector, academics, and different state agencies and departments in the development of cyber policies. This broader participation helps to create inclusive and well-rounded policies.

Another key observation is the role of civil society organizations in policy development. The analysis points out that these organizations play a substantial role in supporting the implementation of norms and policies by coordinating and convening other stakeholders. Additionally, they increase awareness of these policies and norms, mobilize marginalized groups, including excluded communities and grassroots groups, and ensure that their voices are heard in the policy-making process.

Moreover, it is recommended that capacity building and security trainings should be tailored to the specific needs and risks of different communities. Generic security trainings may not be beneficial for everyone, and it is important for organizations to understand the unique challenges faced by different groups.

The analysis also stresses the need for accountability in the implementation of norms regarding cybersecurity policies. A specific framework should be adopted to ensure that policies are effectively implemented. The involvement of the United Nations and its first committee is mentioned in relation to discussions on accountability.

Furthermore, it is highlighted that international human rights law should serve as the guiding framework for any policy or new law related to cybersecurity. This ensures that the rights of individuals are protected and respected in the cyber realm.

Lastly, the analysis emphasizes the crucial role of broad stakeholder participation in international discussions and policy development. It argues that by mapping out stakeholders and ensuring a full range of stakeholder involvement, it becomes possible to create cybersecurity policies that effectively address human rights and gender aspects in each country and region.

In conclusion, the analysis calls for gender perspectives and a human rights-based approach to be integrated into cybersecurity policies. It emphasizes the importance of multistakeholder governance, civil society organizations, tailored capacity building and security trainings, accountability, and the adoption of international human rights law. The involvement of a diverse range of stakeholders is also vital for the development of inclusive and effective cybersecurity policies.

Igonor Oshoke Samson

Countries in the Global South, such as Nigeria, are actively working towards enhancing cybersecurity. One approach they are taking is collaborating with the private sector to develop effective strategies. By joining forces, the government and private companies can combine their expertise and resources to tackle cyber threats more effectively. This collaboration ensures that efforts to strengthen cybersecurity are comprehensive and inclusive.

To raise awareness among the general public, particularly young people, targeted school programs have been launched. These programs use child-friendly animations, music, movies, and educational interventions to educate students about the importance of cybersecurity. By making this information accessible and engaging, they aim to instill good cyber hygiene practices early on.

The main argument is that countries in the Global South have the potential to control the influence of cybersecurity from social, cultural, and educational perspectives. By prioritising these aspects, they can build resilience against cyber threats. Culturally relevant approaches that take into account the specific socio-cultural contexts of these countries can be highly effective in encouraging individuals and communities to adopt safe online practices.

In addition, it is suggested that countries in the Global South should use the resources available to them and gradually transition towards tech-focused interventions. This approach recognises that financial and technological limitations may exist in these regions. Therefore, it is recommended to start with what can be controlled and gradually work towards more advanced solutions. This can be achieved through a multi-stakeholder and bottom-up approach, involving various actors from government, private sector, civil society, academia, and the technical community.

Noteworthy observations from the analysis highlight the importance of collaboration and the need for tailored interventions in the Global South. By harnessing the expertise of multiple stakeholders and considering socio-cultural factors, cybersecurity initiatives in these countries can become more effective and sustainable. Furthermore, the gradual transition towards tech-focused interventions acknowledges the diverse challenges faced by these regions and ensures that efforts to enhance cybersecurity are both realistic and progressive.

In conclusion, countries in the Global South are actively working towards enhancing cybersecurity through collaborations with the private sector and targeted school programs. By leveraging cultural relevance and educational interventions, they aim to raise awareness and promote safe cyber practices. Additionally, the recommendation to gradually transition towards tech-focused interventions using a multi-stakeholder approach ensures a comprehensive and sustainable approach to cybersecurity in these regions.

Lucien Castex

During the discussion, the speakers explored various dimensions of cybersecurity and its implications. They emphasized the need for a global resilience approach to tackle cyber threats effectively. This approach involves not only protecting critical infrastructure but also safeguarding the integrity of elections to prevent interference.

A key aspect addressed during the session was the importance of regulation in maintaining a safer cyberspace. The speakers acknowledged the dilemma between combating hate speech and disinformation and ensuring the preservation of digital freedoms. They underscored the need to find a balance between the two, creating regulations that effectively counter these issues while still respecting fundamental human rights and freedoms.

Another significant point raised was the integration of cybersecurity into educational curricula. The speakers highlighted the pressing need to build capacity in this area by incorporating cybersecurity principles and knowledge into schools, universities, and lifelong learning programmes. By doing so, individuals can become more informed about the risks and countermeasures associated with cyber threats, enhancing their ability to protect themselves and their communities.

The session also focused on bridging the gap to foster a safer cyberspace for all. This bridging involves addressing the inequalities in access to cybersecurity measures and knowledge. By ensuring that everyone, regardless of background or circumstances, has access to the necessary resources and information, a more inclusive and secure digital environment can be created.

A noteworthy observation from the session was the value of the International Governance Forum (IGF) in facilitating knowledge sharing, collaboration, and learning. The speakers emphasised that through open discussions and exchanges of ideas at IGF sessions, diverse perspectives can be brought together, enabling a better understanding of global and multidimensional phenomena related to cybersecurity.

In conclusion, the speakers highlighted the importance of a comprehensive and balanced approach to cybersecurity that takes into account global resilience, regulatory measures, capacity building through education, and bridging the gap to ensure a safer cyberspace for everyone. They also emphasised the role of platforms like the IGF in promoting collaboration and knowledge sharing among stakeholders. By addressing these issues, the speakers suggested that it is possible to mitigate cyber threats effectively while upholding human rights and fundamental freedoms.

Eliamani Laltaika

Cybersecurity plays a crucial role in ensuring safety in the cyberspace, encompassing a wide range of tools and strategies. It involves technological, legal, ethical, economic, and diplomatic approaches to protect individuals, organizations, and nations from cyber threats and attacks. Multiple layers of protection, including hardware, protocol, and content, are implemented to safeguard against vulnerabilities and regulate the information shared online. Raising cybersecurity awareness is essential, and individuals, organizations, and governments must all contribute to educating others and promoting safe online behavior. Deepfake technology is a growing concern, posing significant threats and requiring increased vigilance and technological tools to combat. Public-private partnership is crucial in implementing effective cybersecurity measures, and there is a need for global South engagement to shape cybersecurity policies and regulations. Expert consultations, like Laltaika’s involvement in crafting cybercrime legislation for Lesotho, strengthen institutions and cybersecurity frameworks. Analogies to African Maasai traditions provide practical insights for cybersecurity, making the concepts more relatable. Emphasizing awareness and proactive measures in online activities, such as using protective software and exercising caution when sharing personal data, is vital. Overall, the goal is to create a secure online environment for individuals, organizations, and nations.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more