Hive – people, pandemics and health information platform | IGF 2023 Lightning Talk #48

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

John LEE

The analysis highlights the importance of pandemic preparedness and emphasizes the pivotal roles of digital platforms and community involvement in effectively addressing pandemics. It acknowledges that pandemics are escalating in both scale and frequency, as demonstrated by the devastating impact of COVID-19 on a global scale. To address this challenge, the World Health Organization (WHO) has introduced the HIVE, a digital platform that aims to provide trustworthy health information with a community-centered approach.

Digital platforms like the HIVE play a crucial role in pandemic preparedness. Through dialogue, support, and collaboration, these platforms create a space for collective intelligence and efficient access to information. They also tackle the issue of infodemics and misinformation by providing accurate health information, combating the spread of false information during pandemics. By harnessing technology and fostering partnerships, digital platforms such as the HIVE facilitate the effective dissemination of vital health information to the public.

The analysis also emphasizes the crucial role of community involvement in addressing pandemics. It recognizes that communities have a direct influence on individuals’ access to information and decision-making during health emergencies. Hence, active engagement of communities in pandemic response efforts is essential. Community-driven platforms are particularly valuable as they provide local, contextualized information and facilitate connections with global health experts. Informed communities actively participating in developing solutions are vital in pandemic response and control measures.

Furthermore, the analysis highlights that the integration of digital platforms and community involvement in pandemic preparedness aligns with multiple Sustainable Development Goals (SDGs). Specifically, SDG 3 (Good Health and Well-being) and SDG 17 (Partnerships for the Goals) are directly related to these initiatives. The integration of digital platforms and community participation not only enhances healthcare outcomes but also promotes sustainable development through collaborative efforts.

In conclusion, the analysis underscores the urgency of improving pandemic preparedness and highlights the instrumental roles of digital platforms, such as the HIVE, and community involvement in addressing pandemics. By leveraging the power of technology and fostering community engagement, stakeholders can collectively combat infodemics, provide accurate health information, and effectively respond to health emergencies. Furthermore, these efforts align with the broader SDGs, indicating the potential for comprehensive and sustainable approaches to global health challenges.

Session transcript

John LEE:
All right. We’re on time. Let’s get started. Good morning and distinguished guests. I guess between now and the next opening ceremony, we have a very light session of the lightning talk. And thank you very much for this opportunity to share a little bit about the HIVE. The title is People, Pandemic, and Information Platform, which is WHO’s digital space for health emergency preparedness platform powered by communities. My name is John Lee, technical officer at WHO headquarters Geneva in Switzerland. I work with an area where teams are working on preparing for next pandemic. As you can see, it’s not really a popular topic. We just went through a pandemic. But I guess the idea is that when next pandemic happens, not if, when the next pandemic happens, then we’ll be ready as a global community together. The purpose of this presentation is to share the high level overview of the platform. And as you can see in the name, like a beehive, we envision a platform that is creating a space of activity, support, and community to come together. You see the photo up there is a Kyoto. It’s great to be here. Did a little bit of the homework about the Kyoto. The colleague sitting over here might know a bit better about. Apparently in 1467, the Onin War happened. And, you know, it actually triggered the Kyoto citizens to develop autonomous communities to protect their lives by themselves. And in 16th century, it evolved into another version, Choshi Kinomuku, which in turn become Choki or Chosadame, which they form a rules, formulated by the residents of the Kyoto for the purpose of making the comfortable for themselves and maintaining favorable environment in the community. I see that there is the important similarities there between the hive platform and the community sense in Kyoto. So we just went through COVID-19. So devastation caused by the pandemic COVID-19 has brought really urgency to strengthen the way the world prepare for, prevent, and detect the response to health emergencies. The question is, are we prepared to globally respond to the next major pandemic? Are we ready to cooperate and perform across countries and across sectors to face such a threat? Not only to protect health in major epidemic and pandemic, but also to protect economic development, protect political and social systems, and not to repeat the history again. This is a bit of a chart about what are the tangible impact or devastating effect of COVID-19 and other emergencies that we just went through. It was a destabilizing event, and the effect of the pandemic is continued to reverberate in our society. Our political system, health system, and global economy. So it is important to note that pandemics are increasing in impact and scale and frequency, and the epidemic and pandemic risk has become a global strategic concern. I’ll also note that this was the second pandemic of 21st century. So like it or not, this is new normal, and we don’t expect the frequency of these epidemics to go down, unfortunately. In fact, the vulnerabilities of all over the world, whether it’s developed or developing countries, have increased, not decreased. So the question is, how do we prepare the communities before the next pandemic happens again? And especially, obviously, there are many work to be done, but I’ll be speaking to the preparedness of the communities when it comes to preparing for the next pandemic. So the WHO HIVE team envisions community-centered, trustworthy health information that facilitates health information and synchronous and asynchronous collaborative working practices, supported by a few functionalities, including community spaces, document repositories, and documentation, instant chat, and breakout groups. Some of the technological effect, but I guess that when you think about the community center approach, to me, it is fully informed and a properly informed community who are actively engaging in developing solutions. As some of the earlier speakers in previous session mentioned, very important topic about this as well, is that having the community centered and community-led is a very important piece of preparing our digital ecosystem for the next era. Each individual is a part of the multiple communities. For example, the workplace can be a faith community, a learning community like universities, or health or wellness, and each community influences an individual and their access to information and decisions, and an individual makes during the health emergency, and how they behave. So the challenge is that when the high-impact public health event happens, it’s often accompanied by the infodemic. I think it was touched on a number of sessions throughout this IGF. It’s defined as an over abundance of information, whether it’s accurate or not, in the digital space or physical space. It accompanies acute health events such as an outbreak, an epidemic, which is what we saw in the recent event of COVID-19. The infodemics drive today, especially in digitized and interconnected ecosystem right now, and individuals are exposed to a very complex and highly targeted information ecosystem, and the content is not always from the most reliable sources, and they can serve to confirm biases. And as you know, it takes time to build trust, and it’s hard to earn, but as we observed throughout the COVID-19 pandemic, it’s so easy to erode very quickly. So a small team at WHO began to think, I think this was before COVID-19 pandemic, how do we actually get the right information to the right people in the format that is actually appropriate, so that they can make decisions to protect their communities. And when we recently went through the COVID-19 pandemic, we were able to answer the question of, you know, can we rapidly ramp up the communication and address the key questions and concerns with large networks? And the answer is yes. We were able to, you know, use the opportunity provided the COVID pandemic to engage with the networks like Worldwork Network, all the industries and associations, the faith network and youth councils, and other associations and groups associated across the world. So building on some of those success that we envision, building a digital community space that is safeguarding communities during high-impact public health events, and creating a space for people to come together and discuss about, you know, whether they might have a question about the situation, whether the sum of public health social measures, you know, what does that mean in their context, and also reach out to the experts, whether it’s the WHO folks or the peripheral networks in the Ministry of Health or other advocacy groups and stakeholders within pandemic preparedness. There are a few features. I wouldn’t make this into the technical one. There’s four key components. There is ability for you to connect and collaborate. You can host and attend events. So then you can build what you saw in digital, the hybrid format of the events such as this, that you can really build the collective intelligence together, and you can access information that is slightly more efficient using, thanks to the technologies, machine learning and AI technology to really connect the people, information, and communities, and having a space, the digital space people can go to when it comes to the specific topic of epidemic pandemic preparedness. All right. So with the, and before we open up to a quick discussion with the participants here, you know, as a WHO, we’re not a technology expert, but we are the technical experts in health. So we would like to invite as many experts as possible, especially in digital space and in IGF is a really important forum to learn about what it means and engage in communities in digital space. So we need help from global experts in bringing the communities together while leveraging all the technologies that is available and enabling building community relationships for the preparedness and response to health emergencies. And most importantly, not go through what we went through is not leaving anyone behind, addressing the vulnerable and marginalized and the communities whose needs are also addressed and they have a place they can go to, to interact with the people. And I give the communities opportunity to bring the local and contextualize information that is the more appropriate for them. And also connect with the global, the experts of the global health public issues. Also this, this will, could create an opportunity to directly or indirectly the manage the, some of the issues around the mis and disinformation naturally by participating and not letting some of the questions and concern, progress it into the information bias, thereby progressing further into narratives than what we saw during the COVID-19 pandemic that created the huge impact on public health and everyone’s livelihood and life in general. So with that, I’ll end my presentation. Thank you for attention. And yeah, if you have any questions, I will invite everyone for a quick discussion before we wrap up. Any questions? All right, well then, we’ll end this session early and maybe we’ll proceed to next main session. So there are a few pens and brochures. Feel free to take them for as a reminder.

John LEE

Speech speed

117 words per minute

Speech length

1647 words

Speech time

848 secs

How Submarine Cables Enhance Digital Collaboration | IGF 2023 Town Hall #80

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Hendrik Ike

Submarine cables play a critical role in facilitating international cooperation in internet governance and diplomacy. The agreements between various entities, such as NRENs/Rens, are built on trust and reciprocity. These agreements enable public entities to share and disseminate public research and educational data, fostering collaboration and knowledge exchange.

The evolving landscape of internet ownership and utilization underscores the significance of an open, resilient, and distributed internet structure to support research and education. The demand for investments in submarine systems is driven by the growth of research and educational activities, particularly in remote and traditional routes.

Submarine cables also serve as physical geopolitical solutions to the increasingly politicized internet. By providing reliable connectivity across borders, submarine cables promote international collaboration in research and education. This aligns with the goals of SDG 9: Industries, Innovation, and Infrastructure, and SDG 17: Partnership for the Goals in fostering global partnerships.

Strategic agreement provisions for submarine cables between the European Union and Japan have significant implications for scientific, political, and economic aspects. These agreements demonstrate the recognition of the importance of submarine cables in facilitating international cooperation and advancing research and educational initiatives.

However, the construction and operation of submarine cable systems present complex challenges. Paul Rouse describes them as intricate engineering projects that require careful design and construction. The complexity arises from the various components involved and the need to navigate through different territories and environments.

Successful submarine cable projects often involve multi-stakeholder collaborations. The involvement of multiple member states or nations enhances project outcomes and strengthens partnerships. Hendrik Ike highlights the importance of multi-stakeholder collaboration in achieving project success, enabling different interests and expertise to contribute to the project’s objectives.

To summarize, submarine cables are crucial for international cooperation in internet governance, diplomacy, research, and education. Trust-based agreements facilitate the exchange of public research and educational data. The evolving internet landscape necessitates an open and resilient structure. Submarine cables also provide geopolitical solutions and are strategically recognized by the European Union and Japan. However, the complexity of designing and implementing submarine cable systems requires careful planning and coordination, often through multi-stakeholder collaborations.

Jun Murai

The discussions revolve around various topics related to infrastructure, technology, and funding in the Asia-Pacific region. The WIDE project, which has been operational for 35 years, focuses on improving infrastructure and technology research for the internet in the Asia-Pacific region. It involves more than 100 companies, including Starbucks, and encompasses professionals, engineers, and scientists. This project has a positive sentiment and aims to enhance internet infrastructure and technology research.

The need for a large funding body in the Asia-Pacific region similar to the EU and US is highlighted. The EU and US have significant funding bodies promoting research that ultimately results in the installation of submarine cables. However, the Asia-Pacific region lacks such a body, leading to the argument that there is a need for one to facilitate the installation of new submarine cables. This argument is expressed with a neutral sentiment.

The WIDE project started ARINAPAC, an arterial research and educational network, to create a supportive infrastructure in the Asia-Pacific region and link it to Europe and America. This initiative receives positive sentiment and supports the SDG goals of industry, innovation, and infrastructure and partnerships for the goals.

There is also support for the development of Wet ROADM (reconfigurable optical add and drop multiplexer) technology for submarine cables. Wet ROADM allows for the reconfiguration of spectrum splitting for future adjustments and enables adding or dropping traffic without reinstalling the fiber. This positive sentiment stance supports SDG goal 9.

The importance of effective collaborative projects between multiple stakeholders is emphasized by Jun Murai, with in-kind contributions being a significant aspect. Past collaborations mentioned include satellite transponder companies working together and high-speed switches and equipment developers participating in interoperability testing. Additionally, a wide project exploring new technology is mentioned, highlighting the mutual benefits of collaboration from an investment perspective. This argument has a positive sentiment and emphasizes the importance of collaboration and in-kind contributions for future networking progress.

Connectivity in Southeast Asia is seen as crucial, with Jun Murai supporting collaboration between the EU and JAN. The initiation of IHPI and satellite utilization, as well as the reference to 10 efforts to connect as the next generation of terrestrial connectivity, are mentioned. A three-phase plan is also outlined, involving satellite connection as phase 1, TEN connectivity as phase 2, and the redesigning of southern connectivity utilizing the Arctic Ocean as phase 3. This argument has a positive sentiment and highlights the importance of collaboration for enhancing connectivity in Southeast Asia.

Tain, the giant version and regional network of Southeast Asia, is mentioned to have started in the 80s, while the cable CAE-1 began in the middle 90s. These historical facts are mentioned neutrally.

Research and educational networks contribute a small percentage, around 5-10%, of the total installation costs of cables like NordNet. It is mentioned that it is possible, though not easy, to raise funds for research and education to cover 5% of the entire cable installation costs. This argument has a neutral sentiment and highlights the contribution of research and educational networks.

Once installed, the research and educational community will occupy about 5% of the capacity on the fiber pair. This positive sentiment argument emphasizes the usage of fiber capacity by the research and educational community.

The EU-Japan Digital Partnership Agreement endorses the project and extends the scope of people involved. It also promotes the benefits of investing in optical fiber to various industries. This argument has a positive sentiment and supports the importance of partnerships and endorsements for the project’s success.

Jun Murai believes that the special approach taken by the research and education community in actively initiating the project and inviting other stakeholders to get involved is unique and has not been done in the past. This positive sentiment argument emphasizes the importance of the research and education community’s active involvement.

Japan’s high frequency of earthquakes is mentioned in discussions related to the smart cable concept, which involves piggybacking sensors on commercial communication cables. It is argued that this concept is not enough for Japan due to the frequency of earthquakes, resulting in a negative sentiment.

Investment for the specific installation of sensor cables at the bottom of the ocean, identified as a dangerous area due to earthquakes, is seen as necessary for earthquake preparedness. It is argued that this investment can help in preparing for future catastrophes. This argument has a positive sentiment and supports the importance of investing in sensor cables for earthquake preparedness.

Japan has different funding sources for commercial companies, research, education, and seismic operations due to the frequency of earthquakes. This positive sentiment argument highlights the unique funding decision-making in Japan influenced by the frequency of earthquakes.

In conclusion, the discussions highlight the importance of infrastructure, technology, and funding in the Asia-Pacific region. Projects like WIDE and ARINAPAC aim to improve internet infrastructure and create supportive networks. There is a need for a large funding body to support submarine cable installation, similar to the EU and US. Collaboration and in-kind contributions are seen as important for future networking progress. Jun Murai emphasizes the importance of connectivity in Southeast Asia and the significance of collaboration between the EU and JAN. Additionally, the importance of investment in sensor cables for earthquake preparedness in Japan is emphasized. The discussions also highlight the different funding sources in Japan due to the frequency of earthquakes.

Audience

During a discussion, an audience member raised a question regarding the cost comparison between transferring energy and transferring data. This query sparked interest and highlighted the importance of understanding the financial implications of such processes.

In another point of discussion, the topic of installing cables in icy regions was explored. It was revealed that this project would be costly and resource-intensive, potentially requiring the commissioning of a new icebreaker. The task was considered a significant challenge, particularly when attempting to accomplish it without the assistance of immigrants alone. It became evident that substantial resources and funding would be required to successfully carry out the installation.

The need for government endorsements and funding emerged as a key aspect of the project. Participants agreed that financial support from the government would help alleviate the cost burden associated with the installation of cables. Furthermore, the issue of financial viability and return on investment was raised, reinforcing the importance of government involvement in this initiative.

Collaboration between various regions, namely Nordic, European, and Asian countries, was identified as a potential solution to facilitate the project’s progress. It was suggested that a common understanding and agreement on funding the project among these regions could lead to more efficient and effective implementation.

Switching gears, the discussion turned to the business case for the ability to predict natural disasters such as tsunamis and earthquakes. The potential benefits of accurate predictions were highlighted, including the reduction of costs associated with disaster recovery. In addition, it was pointed out that companies like Google and British Telecom were already testing predictive technologies, which could open up new revenue streams. This observation emphasized the need for companies to explore and capitalize on the opportunities presented by disaster prediction services.

In conclusion, the discussion covered various aspects related to the costs, resources, and collaborative efforts required for projects involving transferring energy and data, installing cables in icy regions, securing government endorsements and funding, and exploring the potential of disaster prediction services. The importance of government support, collaboration between different regions, and seizing new revenue streams were emphasized as crucial factors for the success of these initiatives.

Ieva Muraskiene

Submarine cables across the Arctic have the potential to revolutionise connectivity between Europe and Asia by offering a faster, more reliable, and geopolitically stable connection. Currently, 90% of direct traffic between the two continents goes through the congested Suez Canal, but the Arctic route presents a shorter distance and can avoid geopolitical complications by passing through the exclusive economic zones of Norway, Denmark, Canada, the US, and Japan. This alternative route has the potential to alleviate congestion and improve data transfer efficiency.

Additionally, the analysis highlights the potential for submarine cables in the Arctic to support the green data centre industry. The abundant surplus of renewable energy in the far north is currently underutilised due to a lack of power infrastructure. By leveraging submarine cables, this excess energy can be effectively harnessed to power data centres. Data transfer is more efficient and cost-effective than moving energy, and the cool climate in the northern regions can assist in dissipating the heat generated by data centres, reducing energy consumption and environmental impact.

To realise the vision of Arctic connectivity by 2030, two potential projects are identified: PolarConnect and Far North Fiber. Expected to be operational by 2030, these projects would establish reliable submarine cable connections in the Arctic. PolarConnect spans a total distance of 11,000 kilometres, while Far North Fiber covers 14,500 kilometres. These projects hold the potential to unlock the vast benefits of Arctic connectivity and bridge the digital divide.

In addition to enhancing connectivity, submarine cables equipped with sensors can also serve as powerful scientific instruments. These cables can be utilised for distributed acoustic sensing or state of polarization technology, allowing them to collect valuable data for monitoring Earth’s conditions, marine life, and seismic research. The ability to measure temperature, pressure, velocity, and salinity provides valuable insights into climate change and oceanic processes. Furthermore, the sensors can aid in the protection and monitoring of the cables themselves.

The analysis also touches on the cost disparities between transferring energy and data. The report acknowledges that the lack of infrastructure largely contributes to the cost difference. However, it emphasises the need for further exploration of the value proposition of energy versus data transfer. This information would provide valuable insights for decision-makers and assist in the development of infrastructure to support both energy and data transfer.

Engagement with governments and the European Commission is considered essential to secure funding and support for these projects. The Nordic countries, in particular, are recommended to communicate with their respective governments to obtain the necessary endorsements and support. The European Commission can also play a crucial role in exploring funding opportunities for these projects, aligning with SDG 17, which emphasises partnerships for attaining goals.

It is worth noting that the potential of submarine cables in the Arctic extends beyond mere connectivity. The analysis highlights multiple use cases and benefits across various sectors, including research, education, and the commercial sector. The project can contribute to early warnings for natural disasters and seismic activity, providing valuable information for scientific research and supporting SDGs 9 and 13.

In conclusion, the analysis showcases the immense potential of submarine cables across the Arctic. These cables offer a faster, more reliable, and geopolitically stable connection between Europe and Asia, bypassing congested areas like the Suez Canal. They not only facilitate efficient data transfer but also support the green data centre industry by utilising excess renewable energy and managing the heat generated by data centres. The PolarConnect and Far North Fiber projects are anticipated to realise the vision of Arctic connectivity by 2030. Furthermore, submarine cables equipped with sensors have the potential to serve as scientific instruments, collecting valuable data for observing the Earth, marine life, and seismic research. Engagement with governments and the European Commission is crucial for securing funding and support for these projects. The potential of submarine cables in the Arctic extends beyond connectivity, offering multiple benefits and use cases across different sectors.

Dr. Masafumi Oe

The National Astronomical Observatory of Japan (NAO-J) operates astronomical facilities globally that rely on large volumes of data for research and analysis. To support this need, high-bandwidth networks are essential. The Subaru Telescope, which was established in 1999, has recently undergone system upgrades, including the addition of the hyperspring cam. As a result, the telescope’s data can now be efficiently transferred to Tokyo for analysis through a 100 gigabit Ethernet network, improving data transfer capabilities.

In addition, the ALMA (Atacama Large Millimeter/submillimeter Array) project is currently upgrading its network infrastructure to a 1.2 terabit capacity. This upgrade will enable synchronous data transfer from all ALMA receivers, enhancing overall data transfer capabilities for the project. Dr. Masafumi Oe supports these network improvements for big science astronomy facilities, as it allows them to meet the demands of modern research effectively.

One significant outcome of these network upgrades is the reduction in data analysis time. With the upgraded network, the Subaru Telescope can now analyze data in under 10 minutes, demonstrating the positive impact of enhanced network capacities on research efficiency. Additionally, the 1.2 terabit network infrastructure upgrade for the ALMA project promises improved efficiency and reliability in astronomical research through enhanced data transfer capabilities.

The evidence strongly supports the argument that high-bandwidth networks are crucial for the advancement of modern astronomical research. The notable achievements of the Subaru Telescope and the ongoing network upgrade for the ALMA project highlight the benefits that improved network capacities bring to big science astronomy facilities. The positive sentiment surrounding these advancements, along with Dr. Masafumi Oe’s endorsement, further emphasizes the importance of upgrading network capacities for the progression of astronomical research.

Overall, the National Astronomical Observatory of Japan operates astronomical facilities globally that heavily rely on large datasets, making high-bandwidth networks essential. The upgrades made to the Subaru Telescope’s data transfer capabilities and the ongoing network upgrade for the ALMA project underscore the significance of improving network capacities for modern astronomical research. The reduction in data analysis time and the endorsement of Dr. Masafumi Oe enhance the overall efficiency and progress of big science astronomy facilities. These advancements contribute to the overall efficiency and progress of astronomical research.

Paul Rouse

The analysis explores the role of submarine cables in supporting research and education, highlighting that 98-99% of global internet traffic is transmitted through these cables. They not only facilitate data transmission but also offer physical solutions to the increasingly politicized internet, benefiting research and education. The agreements between research and education networks at national and regional levels, based on trust and reciprocity, form the foundation for submarine cable usage in this context.

However, concerns arise regarding the changing ownership and utilization of submarine cable infrastructure. Content providers like Google, Microsoft, and Facebook are increasingly acquiring a larger share of the market, potentially reducing available capacity. This poses a risk in meeting the demands of research and education missions adequately.

To address these challenges and ensure critical infrastructure availability, proactive measures and investment in submarine systems are essential. Recent collaborations serve as examples, such as Géant partnering with the European Investment Bank and DG NIR from the European Commission to invest in the Medusa submarine cable system in the Mediterranean Sea, improving connectivity for North African countries. Additionally, Red Clara collaborated with Géant and received funding from the European Commission to invest in a new submarine cable connecting Europe to Latin America.

The analysis acknowledges the Bella project as a trailblazer amongst National Research and Education Networks (NRENs) worldwide. The project encountered various hurdles, including limited experience in submarine cable investments initially and economic difficulties, particularly in Brazil. Nonetheless, it emphasized the significance of stakeholder engagement, compliance, governance, and financial requirements in realizing successful submarine cable projects.

Collaboration and partnership emerge as recurring themes throughout the analysis. NRENs alone cannot deliver the necessary infrastructure and support; collaboration with commercial partners is crucial. The analysis suggests that NRENs are desirable partners due to their capacity to mitigate risks using public funds.

In conclusion, the analysis underscores the importance of submarine cables in supporting research and education. While concerns exist regarding changing ownership and utilization, proactive measures, investment, collaboration, and partnerships are crucial to secure critical infrastructure. The Bella and Medusa projects serve as successful collaboration examples, reflecting the value of government support, funding bodies, user communities, and the skills within NRENs. Moving forward, fostering collaboration and partnerships between NRENs and other entities will be instrumental in ensuring continuous growth and success in research and education pursuits.

Keiko Okawa

Two speakers in Asia highlight the crucial role of internet connectivity in promoting educational and research collaboration in the region. The first speaker stresses the necessity of internet access for internet engineers, as it not only supports sustainable development but also enhances collaboration among professionals in the field. They propose the implementation of an Asia-wide educational programme for internet engineers, which would ensure that they have the necessary education and connectivity to contribute effectively to the region’s progress.

The second speaker focuses on the long history of collaboration among universities in Asia, which has been facilitated by internet connectivity. They highlight the ‘Asia Internet Interconnection Initiative’, which was launched in 1996 with the aim of connecting universities across the region. This initiative has played a vital role in fostering knowledge sharing and learning among academic institutions. Furthermore, the establishment of the ‘School of the Internet’ in 2001 has further contributed to the exchange of ideas and information among universities in Asia.

Both speakers emphasise the positive impact of internet connectivity on education and partnership building in Asia. They highlight the importance of enabling access to high-speed internet for educational institutions, as it plays a crucial role in connecting these institutions and facilitating research activities. The first speaker mentions that Asia university partners are excited about the new high-speed network, showing the enthusiasm and support for such initiatives.

Furthermore, evidence of internet connectivity’s impact is demonstrated by the fact that as of 2019, almost 60% of the population in Asia was connected. This wide access to the internet has undoubtedly contributed to the growth of educational and collaborative networks across the region.

In conclusion, internet connectivity in Asia is recognised as a fundamental force driving educational and research collaboration. By providing internet access to internet engineers and enabling universities to connect and share knowledge, sustainable development and partnership building in the region can be greatly enhanced. The examples of initiatives like the ‘Asia Internet Interconnection Initiative’ and the ‘School of the Internet’ demonstrate the long-standing commitment to collaboration and shared learning among universities in Asia. With the continued efforts to expand and improve internet connectivity, the potential for educational and research collaboration in Asia is immense.

Session transcript

Hendrik Ike:
you want to double check with number 2 as well? They are face to face. They are face to face. He’s going to speak in the first, and you’re going to do the second part. He’s going to speak in the first, and you’re going to do the second part. He’s going to speak in the first, and you’re going to do the second part. He’s going to speak in the first, and you’re going to do the second part. He’s going to speak in the first, and you’re going to do the second part. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Yeah. Hello. Good morning everybody. Thank you for making it here so early on the first slot of this being the second day officially of the IGF23. My name is Hendrik Eick, I’m a public affairs officer at Géant, which is the regional research and education network of Europe. And before I introduce the speakers, I’d like to just talk a little bit about why we’re here today. So global cooperation in the field of submarine cables is an essential element of both internet governance and diplomacy. Research and educational activity is fueling demands to support investments in submarine systems. in remote areas as well as in more traditional routes. The changing profile of the ownership slash utilisation of the internet is noted, and the public interest role of research and education can be seen to be significant enough to be a conduit to ensure a retention of an open, resilient and distributed internet structure. Submarine cable agreements between national, regional research and education networks, or NRENs slash RENs, are based on the common values of trust and reciprocity, and they allow public entities to not just share and disseminate public research, educational data, but innovate solutions and services to bolster scientific advancement. With this, of course, comes both economic growth and drivers of sustainability. Submarine cables can also provide physical geopolitical solutions to an increasingly politicised internet for the good of research and education. I’d like to now introduce the speakers we have today for you. The first, and this will be in order of appearance, so the first is my colleague Paul Rouse. He’s the Chief Community Relations Officer at J-ON, and he’s joining us online, and he’ll be presenting first. Following that, we have our friends and colleagues from wide, so starting with Jun Murai-san, founder of the Wide Project, professor at Keio University and father of the Japanese Internet. We then have Professor Kaiko Okawa-san, and she’s a professor at the Keio University Graduate School of Media Design. She’s a director of the School on the Internet Asia Project, launched by the Wide Project in 2001. And then we have Dr Masafumi Oe-san, who’s a Vice Director of the IT Security Office at the National Astronomical Observatory of Japan. And our final speaker will be Ieva Mureshkene. She’s a Strategy and Policy Officer at Noijinet. which is the regional network for the Scandinavian NRENs. The backdrop of this session is we wanted to view it a bit through the lens of the EU-Japan strategic partnership, and also within that agreement between the EU and Japan, there are provisions for agreements on submarine cables. In order to understand this and its scientific, economic and political impact, we’ll start with Jaon giving a brief overview of how we came to this space, and with that, I’d like to hand over to Paul for his first 20 minutes.

Paul Rouse:
Thank you, Hendrik, and good morning to everybody there and to all those online. Can you see and hear me okay? Good, thank you. Right, we’ll start then with the first slide, and really, I’d like to start off with an introduction here to talk about how we have the outcome of the combination of submarine cables, the internet, and research and education networks. So we’ll start today with a little lesson in history, first of all, and let’s look at the concept of the submarine cable. It was in the mid-19th century when the first transatlantic cable was put into service. It started off with another very successful beginning, but by 1988, the world saw the advent of fibre-optic cables in place across the North Atlantic as well, and this really became the start of the capabilities as we know today, to the point where 98, 99% of all the world’s internet traffic is actually carried by submarine cables. And there to the right, you can see an extract of all the submarine cables that are in service around the world, so really very much a critical infrastructure for modern society. Let’s overlay that next then with how the internet came about. So it was Vint Cerf back at Stanford University, and the importance here of the story here is you’ll see that a lot of the internet was born out of research, academia. So Stanford University, the internet protocol was devised. And then later on at CERN, Sir Tim Berners-Lee actually came up with the concept of the World Wide Web. Now many of you may have heard of the Maslow’s Hierarchy of Needs, where at the lowest level humans recognize we have the need for simple things like food, warmth, shelter. Some bright individual has repurposed this Maslow’s Hierarchy of Need and suggested Wi-Fi is the most important characteristic in modern society. So it just goes to show from the concept of ideas in research that the internet now is ingrained in everything we do. And for any of you that have young children, you’ll know anywhere you go someone new, the first thing they want to do is find out the code for the Wi-Fi. Looking at the next slide then, what’s the significance of research and the use of the internet? Well, here in the image, you can see the ATLAS experiment at CERN in Geneva. The purpose of CERN is high energy physics, and it looks for new exciting research into how the world was created. So most recently you would have heard of a new particle that had been identified, the Higgs boson particle. When the scientists there work on these activities, the experiments are conducted there, but the data is disseminated around the world for scientists to collaborate globally to investigate those data sets. And what you can see on that bottom graph on this slide is actually the increase and the profile of traffic. These scientists generate huge amounts of data when they conduct these experiments. And what you’ll actually see on the right-hand side of that graph is where the traffic is now, or the data produced, flowing out of the network to researchers around the world is actually starting to peak at around a terabit of data that’s coming out there. So in terms of networking connectivity, that’s a pretty significant flow rate in the network. And we need certain kind of network capabilities and solutions to be able to convey and transmit that data accurately. As well as this, CERN produces other great impacts on all of our lives. A picture there of an x-ray, so the technologies that CERN are working with are actually then deployed and adopted in x-ray technology that many of us, hopefully, you won’t experience it, but if you go into hospital and have an x-ray taken, some of the technology from CERN may be incorporated into the x-ray machines that are used to improve the image definition. So that’s physical sciences, but that’s not the only place where network connectivity is important. In the subject of observing the Earth, Earth environmental sciences, the European Union has a space program called Copernicus. Copernicus has a number of satellites that have different sensors there, and all of these sensors take a range of measurements around the Earth and make this data set available for researchers around the world. So as an example here, one such center in Kenya, the Regional Center for Mapping of Resources for Development, receives this data that’s gathered from the satellites and is transmitted over research and education networks for researchers to help contribute towards the United Nations Sustainable Development Goals, looking at land use, crop erosion, crop diseases. All of the sensing technologies are very important to help make effective use of land resources. Now if you recall back to what I told you about the creation of the Internet, roughly at the time the Internet was created was also the birth of the National Research and Education Networks. And I’d now like to introduce you to the GIANT organization. Hendrik mentioned it briefly in his introduction, and I’ll spend a little bit more time here. GIANT is based in the Netherlands, but we’re an association with 39 member NRENs behind us, and we provide services and activities that support over 10,000 institutions or 50 million academic users. So, we’re pretty significant in terms of research and education activity. And in our composition and our activities, the things that we cover and do, if we look at the next slide please Hendrik, is in running that organisation, we undertake a number of European funded projects. But in doing this, we have three dimensions, the network, services and people. The network I’ll talk about more in just a moment, but the services are also important to exploit that network technology layer. So identity services, allowing students to access their resources as they move around centres, or researchers to collaborate using shared facilities. And then finally, the people dimension, ensuring communities of interest can collaborate and work effectively. And the way the modern world works, this isn’t limited just to Europe, we often work on a global basis. Let’s have a little bit of a look at the network now. The network that you can see there isn’t built by Jeanne alone. A characteristic of our community, the National Research and Education Network, or that when it’s aggregated at a regional level, the Regional Education Network, we collaborate together. So Europe will collaborate with North America, with Asia-Pac, to ensure a network is in place to support those use cases that I’ve described already. And my colleagues and speakers here today will talk to you at greater length about some of the specific activities or initiatives that we see coming up in the future. But at present, we have a good infrastructure to ensure this collaboration and this research activity can happen. We not only support the physical sciences, and the earth sciences, but we support other user communities as well. Research often relies on technology, artificial intelligence, high-performance computing infrastructure. Access to those sorts of resources are important. Our network provides the connectivity pathways to those. But also the control that we have over our network infrastructure ensures that we can service arts and humanities community who are very sensitive to latency characteristics on a network, such that an artist performing a dance routine in Latin America can collaborate with someone in Central Europe who may be playing the accompanying music with a very much controlled latency over the music and image coordination. Health and food is another area, and also energy. We’re working on developing a new site in Cadarache in France, where there is a global collaboration to look at fusion energy sources. The data and control of those systems will produce a significant amount of connectivity requirements and research and education networks are underpinning that. So I’ve explained to you a little bit about how the internet came to be, how it has its source in research education, and also the significance of submarine cables in that domain. So what have we done about this? What have we done as research and education networks to make sure that the network and infrastructure exists there? Well, as an example, Red Clara, the regional network in Latin America, with Géant and funding from the European Commission, enabled an investment in a new submarine cable connecting Europe to Latin America, such that we have dedicated spectrum on this route for the use and benefit of research and education networks. So this was a real pathfinder example, how research and education networks can be an active player in the submarine cable marketplace. That’s a little bit about the now. What about the future? Well, why are we here talking today? What’s important to us? If we look to an external advice, that from telegeography, good expert organization and understand all things that are going on about connectivity in large. Their data shows that the ownership of these submarine cables is changing. It’s changing that what are called content providers, the likes of Google, Microsoft, Facebook, are taking a greater percentage ownership in this submarine cable infrastructure, which means the market is shrinking. So we perhaps have a risk around ensuring that we have adequate capacities that we can continue as NRENCH to deliver the research and education mission. So this is taking our attention and we’re seeing some action and response to this already. In Europe, on the next slide, there is an initiative called the Digital Data Gateways. Just recently, Xiao has worked with the European Investment Bank and DG NIR from the EC to invest in the new Medusa submarine cable system in the Mediterranean Sea. And this will improve the connectivity for a number of North African countries. There’s another example where, for the benefit of research and education and securing sovereignty over this infrastructure for the public good, we can have a good mix in the parties and actors to ensure continued outcomes and infrastructure access. But it’s not just the connectivity. As a community, the research element continues. And we’re using these same submarine cables in a new project called Submerse to investigate whether it’s possible to use submarine cables to be Earth-observing. And on the next slide, you’ll see an overview of the Submerse project. One slide appears to have missed out there, so I’ll just talk to that. The submarine cable has the ability to not only carry data, that research data that may be produced by CERN, but it has the ability to observe the Earth around it, and the oceans are the largest, greatest unexplored territory. So we can see what’s happening to the Earth from the view of the ocean, which is important for things like climate change and understanding undersea currents. So we’re looking at how these submarine cables can also be used for Earth observation. I mentioned earlier, when I was talking about the network, how we don’t ever do this just alone. We always ensure that we collaborate with partners around the world. And often at a political level, we see commitments being made, for example, between Europe and Japan, with a recently signed strategic partnership agreement. And I know Jun will talk to this more shortly, and explain how we can translate this political agreement into action in the form of things like digital connectivity, and the broader socio-economic benefits that that brings. So overall, there’s an introduction there. I hope you’ve understood how the internet has come to be, how the importance of submarine cables are relevant to the internet in carrying that majority of all traffic, and how for research and education, it is essential that we can continue to have access to submarine connectivity infrastructure to deliver the benefits for society at large. Thank you very much for listening. And I hope you enjoy the rest of the session. Thank you, Hendrik.

Hendrik Ike:
Thank you very much, Paul. And thank you very much for that clear introduction as to why these cables matter, essentially, for research and education in our community at large. Before I move on, does anybody have any questions for Paul from the audience? Or in the chat, which I see no questions. We can also, we also have a segment at the end where we have time for more audience questions. But now, I would now like to move on to WIDE, our colleagues in Japan, and I see Jun has a microphone already, so I will let him start.

Jun Murai:
All right, thank you very much, good morning everybody, and welcome to Kyoto, Japan. And I’m Jun Murai, Keio University WIDE, well, founder of WIDE project, and I’m going to talk about WIDE much later, but Professor Hiroshi Yasaki sitting in there is a director, representative of WIDE project, but anyway, today I’m going to talk about what the Japan team basically, not only the WIDE project, is talking about, and can I see my slide? Can you control the slide, please? Okay, so WIDE project is a research consortium working for the infrastructure, researches on the internet technology and protocols and other things for a long time. It’s been 35 years of history, and it’s more than 100 companies, more Starbucks companies supporting us from Japan, but also they are from the other part of the world as well. And then the universities and the engineers from the ISPs and the vendors, engineers, so it’s a very nice mixture of professional experts on the network and the computation background, including the science and other researchers. So the WIDE project decided to work on the submarine cable, and we’ve been kind of are doing a lot of work. But if you heard GEANT and other European activities, and this is very nice that the EU is funding the research activities. And then the research activity is endorsing the installing of a new submarine cable around. OK, so then the US, National Science Foundation, United States, is doing a very similar thing and connecting the international cable, including the connectivity to Japan and Europe, but also to South America and the other thing. So see, the US got a pretty big funding body. And then the EU got a pretty big funding body based on the research and then endorsing the installing of a submarine cable. So the point is that we don’t have that in the Asia-Pacific region. So that has been the issue. So various entities started to work together to work as Europe and America, and then the Asia-Pacific Submarine Infrastructure for the research and educational activities. That has been discussed. But finally, now it’s got into the form. Go ahead. And so the wide project started the things called the ARINAPAC, Arterial Research and Educational Network in the Asia-Pacific, and also working together with the other funding agency of Japan and the other partners around the Pacific to work together. Then it’s creating the great collaboration to connect the various partners, and then onto the very strong, try to establish a strong network infrastructure in the Asia-Pacific, and then connecting to both Europe and America. So if you, the next slide’s going to be this one. OK, good. OK, so we have a booth, actually, and then asking all the people visiting the booth to connect to their own research and educational network link by themselves. And creating this globe with a pin and a string. And so if you look at this carefully, then we do have a very important partners. And the blue one is, by the way, the dream, dream line. So it’s not there. So the Arctic fiber is one of the blue line. And from the Chile to this side. Yeah, Chile to, we don’t have that one yet. Yeah, we have one here. So after this session, then please visit our booth. And you can add your dream link for the, anyway. But anyway, so that’s kind of a symbolic effort we’ve been working together. So this part of the Asia-Pacific is not just by Arena Park, which is a wide project operation, but also the Sinet and other things. So going to the, oh, let me share one of the challenges we started to work. We are the researchers of networking technology as well. So we have a new technology called reconfigurable optical add and drop multiplexer, which is well known for the data center technology as well. But so instead of dropping the fiber. And then the going forward type of a thing. Then we can split the spectrum and the dynamically reconfigurable spectrum thing. That’s a ROADM technology, which is now getting pretty much standard for the data center technology. But that’s called a dry ROADM. So there’s going to be a wet ROADM, which is used for undersea cable. So that’s going to change our configured and the design of the submarine cable for the dropping in the city from the middle of the ocean and then reconfigurable for the future. So remember, the lifetime of the optical fiber is like 25 years. And therefore, during that 25 years, probably the split to the dropping in a certain city, traffic might be changed. And then instead of reinstalling the fiber, we can do the reconfigurable, utilizing the existing fiber and then the control. So this might be, it’s not there for the research long-term, long-haul network on the submarine cable yet. But we are now very eager to explore this technology for the new cable, especially between Europe and Japan. So go ahead with the new one. So if the Arctic fiber coming to Japan from north, which is a red line, and then going to south, which is reaching to a southeast Asia. And then the important thing is that this connectivity for the northern cable and the southern cable should be benefit for the European community to reach. the Southeast Asia research entity as well. Therefore, the question is how can we dropping and from, I mean, connecting Tokyo and then dropping in the Philippines and other cities, which is also a requirement of a EU research community as well. Okay, so next slide, please. And then those places could be a candidate of installing the wet ROADM and then reconfigurable for the dropping in Hokkaido, dropping in Tokyo, dropping in, terminating in Tokyo and then connecting in the Tokyo and then reaching to Philippines and other Southeast Asia. This is what we are trying to achieve for the future. So, next slide, please. So this is a yellow part, basically they’re working with the Japanese government that which part’s gonna be a more missing ocean of the cable and then, so that’s gonna be beneficial because most of the traffic is on the internet. Internet traffic can be getting a benefit from alternative and the complicated route and the topology, right? So route topology should be complicated and the redundant for the internet traffic anyway. So from here on, then the application like a research and education, not only the scientific big researches and the starting with Keiko for explaining about this way here and that. Oh, okay, all right, okay, I’m sorry. I’m gonna talk a little bit more. This slide is talking about the research collaboration between Asia and Europe, each of the specific subject. and including fusion and astronomy, high-performance computing. There is a lot of requirements for the research community between Asia and Europe. And this is from one entity, agency, NIA, and the next one is NICT, to work with various entities and the research. And then the third slide is basically asking their requirements for the, how much bandwidth do you want? And then they said 100 gig, 500 gig. Oh, by the way, I forgot to say that most of this string is 100 gig today, and they’re going up to 400 gig for the future, so which is gonna be a lot of traffic. So then switching to educational thing, there’s Keiko, and then more the consuming a lot of bandwidth from astronomy research from OSR. Okay.

Keiko Okawa:
Thank you, Jun, introducing me. So I’ve been working in Southeast Asia and Japan education and research collaboration for more than 20 years. So we have right now a lot of partners. You can see a red dot. Maybe it’s not a little bit blur, but red dots are our current partners. And we do have a Nepal, this is the list from west to east, Nepal, Bangladesh, Myanmar, Thailand, Cambodia, Vietnam, Indonesia, Malaysia, Philippine, Timor-Leste, Japan, and the most east, I believe, Australia. And those are the partners, not only a pinpoint university, but those are the gateways to their own RANs, like an NRAN, BDRAN, MRAN, so all the countries and regions have their own universities and institutions connecting. So we are kind of gatewaying to all the areas. The red dots, as you can see, they are connected to each other by international collaboration. So, Huawei, the wide project, launched two significant projects in 1996 and 2001. 1996 is the Asia Internet Interconnection Initiative. Remember when we lived with a little connectivity in 1996? We had a big hope to connect all the universities. How can we connect the Internet among universities in Asia? It was 1995, only .4% of the population of the world was using the Internet, and even smaller in Asia. And they connected many universities in Southeast Asia utilizing satellite technology. And five years later, from the IEEE, as we call it, the right-hand side is the School of the Internet. How can we share knowledge among universities in Asia over the Internet that the IEEE created? That was 2001. Still, only 8.6% of the population was using the Internet. So this is the beginning of our collaboration. And at that time, all the universities set up the satellites to connect each other, and so on, so on. So connectivity is essential for research and education, even from a very early stage. In 2007, we had a whole set of partners start to work together. That was 20% of the population era. So at that time, learning and research together in Asia has been a norm since the beginning. So, yeah, we got together. We know we can do better with peers than doing ourselves. So we learned each other. You can see many countries are connecting there and very, very simple technology at that time, multicast and satellite and many countries connected by themselves because of the education. And many, many things happened and then 2019, we had almost 60% of population connected and the university are ready to go farther in 2019. And then COVID came and yes, this is the way we’ve been working together for several years now. But now we got a cable connectivity and we have a good harmonization with satellite and cables right now. And ArenaPAC that Jun just talked about started to strengthen our collaboration beyond Asia. So you can see Tokyo is connecting to many places and Singapore is connecting to many places and Guam has a new topology added by ArenaPAC. But Asia university partners are excited about new high speed network, which is Indonesia’s signing ceremony, 100 giga BPS coming to Indonesia. And that is not only to Indonesia, but beyond that. And Indonesia is connecting to Guam, Tokyo, but not only to Tokyo, beyond Tokyo, go into other places, Europe and the United States as well. So it’s already connected, ready to do many more things. And we are looking forward to more collaboration and that is on the research and education. And in order to keep this environment sustainable, we really believe education for the internet engineers are key essence for the future. So we have our education program and now all Asian partners, Asia-wide educational program are ongoing and we are ready for research and education collaboration beyond Asia. So I would like to pass this microphone to Oe-san.

Dr. Masafumi Oe:
Thank you very much. So I’m Masahumi Oe from Astronomical Observatory of Japan. So today I would like to talk to you about how submarine cables enhance the big astronomy science. So the first three, so why we, our network undersea, the submarine cables are relevant to astronomy. So this presentation will be explain about our big science facilities. So this is a very big consuming the data to analyze the astronomy data. And also I would like to introduce to impact the network have bandwidth on the science. So why we NAO-J? NAO-J is National Astronomical Observatory of Japan. So we have a lot of the astronomical facilities in the world. So our main facility is locating in the top of Mauna Kea in Hawaii. And also we make a collaborate with the ESA and the NARO in US in the Chile. So it’s called the ALMA, Atacama Submarine Array Antenna. So that is two of the current facilities are consuming a lot of data to analyze, to observing the astronomy. So that is one of the example. So the Subaru Telescope, that has a one. 8.2 primary single meter is facility. So this telescope facility is a multipurpose use. So this Subaru Telescope has the three point of the mounting point for the attaching to some observation system. So the Subaru Telescope established in 1999, the system has been upgraded year by year. So currently, the hyperspring cam is our flagship observation facility, one of the facilities. So this is a lot of the huge amount of the data to the short start. So this is a lot of the high sensitive CCD is connected to the computing facility and the storage facilities. So right at 870 million pixels digital camera in the top of the monocular. So all of our facility is located in the world. So one of the Subaru facilities I talked. So another one is the Aruma project. That’s first right is 1921. So this site also, there are a lot of consuming data to transfer to the Tokyo and other European countries and the US mainland. So currently, this figure is showing to the submarine cable. But that facility is not quite different. Actually, the data network from the Aruma Subaru to the Tokyo. So the submarine cable planning is not relationship to the location of the observation site. The current location site is the best location for observing the stars. So the next fact is science is not possible without network technologies. So the ARMA is the one of big facilities. So you show this figure showing the Yamanote line. That is a major JR line in the Tokyo area. So each parabola antenna is connected around the size of the Yamanote line. So the fiber cable over the 16 kilometers away from the central data center. So each data from their telescope has been transferred to the correlation office. So all of the correlation office has a supercomputer system. So this system facility, the engineering that analyze the data from each telescope. So then they’re creating the images. So currently, this network has based on the 10 gigabit Ethernet. However, so this facility, it’s depending on the technology of the commodity technology, like Ethernet or some ATM or something. So this program will be updated year by year. So firstly, I’m talking about the current the astronomy facilities with the bulk data networks. So in last year, we have collaborated with the Arena Park, the 100 gigabit Ethernet network reached to the Subaru Telescope in the top of Mauna Kea. So we are upgrading all of the network facility from Mauna Kea to Tokyo. So before the upgrading, so we need to do one more week to analyze the data. However, so after the upgrading the 100 gigabit Ethernet network deployed, so all of the data analyzed to the computing facility in Japan. So I mean, basically, the Subaru Telescope in 1999, we just only have the 100 ATM-based network. So all of the computing, analyzing, storage facility should be located in the Subaru. However, currently, the high bandwidth network has been deployed from the Mauna Kea to Tokyo. So it means that all of the data transferred to Tokyo and analyze the computing facility in Tokyo. So that means a lot of accelerates to analyze the data, just only currently under 10 minutes. So that’s a very good impact for the astronomy science. And also, the ARMA has currently a data transfer system. DTS system is upgrading. So the ARMA is currently using a 10-gigabit Ethernet. However, that will be upgrading to the 1.2-terabit network, which is based on the 400-gigabit Ethernet. So I mean, currently, the ARMA Telescope has the multiple band receiver is existing the one single antenna. However, if bandwidth upgrading to the 1.2-terabit, means that all receivers are sending data synchronous to the data centers in Santiago. So it means the fiber is also deployed to the over 6 kilometers away from the main site to the data center facilities. So this network improvement is improve the network functionality, open the way to the new scientific frontier. That is a very good impact for the bandwidth. So that’s all from me. So thank you.

Hendrik Ike:
Thank you very much from all three representatives from wide. I would like to open the floor if I have any questions for our three colleagues here. And I don’t see anything in the chat, but as I said before, we’ll have time at the end for more questions and I have one or two up my sleeve too. But before then, it’s my pleasure to introduce my colleague Ieva from Nordinet, who’s going to talk to us about the Nordinet view of subsea cables.

Ieva Muraskiene:
Thank you. Thank you. Sorry. Thank you, Henrik, for the introduction. So my name is Ieva Mureskene. I’m sorry for the voice. I come from Nordinet and if someone introduced me, then I have to introduce Nordinet as well. Nordinet is a collaboration of the research and education networks of the five Nordic countries, Denmark, Iceland, Norway, Sweden and Finland. Nordinet was established in 1985 when the five Nordic countries joined forces. And since then, Nordinet has been known to pioneer innovative solutions and push the boundaries of the technology from the beginning of history of Internet itself. The first connection between Stockholm and Princeton was set up in 1988 with a capacity of 56 kilobits per second. And in 1989, Nordinet established the first open available Internet outside of the U.S. In 1991, Nordinet was selected to operate the first root name server and then after that a lot of other innovative solutions. Currently, Nordnet operates a global network that interconnects the research and education networks in the five Nordic countries and connects these countries to the rest of the world. The high level of redundancy on the Nordics networks is ensured by using the shared infrastructure as each end run in the Nordics provides spectrum for the Nordnet network itself. On global scale, Nordnet has presence both in the United States and Asia. Going further, today I will talk more about the global communication problems and how we foresee to improve the routes and what value we can bring to the green data centers up in the north and how we can make an impact on the climate science and by presenting the smart cables. Fast and reliable internet is now vital for all parts of our modern society. Being it private use, businesses, governments, research and education institutions and going forward with the digital transformations, we will need the connectivity to be more resilient, more robust, bringing even more capacity to our everyday life. If we take a look at the statistics and we break down the distribution of internet traffic for the last five years, we can clearly see that the real-time traffic has grown the most. It’s more than three times growth. We cannot afford to have delays in real-time traffic. It’s not acceptable anymore by any user. But if we take a look at the example of research and education world, in the north of Europe, Nordnet provides connectivity, high-speed connectivity to iSCAD 3D, which is the next generation international atmosphere and geospace research radar. With this high-speed connectivity, we enable real-time steering and data integration between three sites of the iSCAD 3D, each consisting of the 10,000 antenna beam-forming phased array systems. In Europe, we also have connectivity to Large Hadron Collider and CERN, and throughout other research and education networks, we have connections also to ALMA Observatory in Chile. Before many years, scientists had to wait for the dedicated time slots or several years to get access to the equipment on the network. But now, the connection needs to be up and running with 100% availability. You can imagine the pressure of delivering that through the research and education networks. I don’t know if many of you in the audience know what this picture is showing. If not, the answer is a methane plume from the Nord Stream gas pipeline explosion in the Baltic Sea. My point here is, you cannot protect the cable on its whole stretch, but what you can do is build more redundancies. Network cables can ensure redundancy and resilience for our networks, and that’s why we need to look at geographical redundancy, meaning we need to look at alternative routes. And while doing that, we must keep geopolitical situation in mind, especially if we consider the Nord Stream case or similar cases which disrupted the submarine cables. Now if we take a look again at the statistics and the connectivity today, we take a projection to very near future. We would see that we would have doubling of the traffic between Europe and Asia to be expected and almost tripling to the traffic between Europe and North America Depending on the perspective we take it can be a big challenge But it also can present us as an opportunity to take action and do something about it Now if we look at the connectivity from the perspective of Europe, we can divide it into four major parts, four major areas For example Europe to North America connections. There are a lot of cables connecting Europe to North America through the Atlantic Ocean But a lot of systems are aging and we do not know yet if there will be other systems built in time to serve the future needs and demands Then we go to Europe, Africa and Europe, South America. The cables go outside of the coast of Africa with very limited redundancy Connecting Asia We have a terrestrial route going across Russia and due to a lot of geopolitical implications This route is already more or less getting closed. A lot of Contracts are being terminated and Then it leaves us with a Suez route to the Middle East and Asia Now if we take a really closer look at the Suez We’re currently 90% of the direct traffic between Europe and Asia traverses. It’s a very narrow area It’s only 200 meters wide at the most narrow place and you can imagine the congestion of the submarine cables there It’s basically a cable every 20 meters and over this area 1,500 trips pass every month. You can imagine there’s danger And to the challenges that I just mentioned We can offer one solution if we take the earth from the North Pole perspective and look at the route opportunities from the Arctic. We can see that we can build the additional redundancy or create complementary routes to the existing Suez Canal area connections by adding submarine cables over the Arctic Ocean. It would be a fast track between Europe and Asia as it is the shortest possible route. It would strengthen the digital sovereignty of the involved regions. The route also avoids geopolitical considerations as it would go through exclusive economic zones of Norway, Denmark, Canada, US and then traverse to Japan. But then you might ask, why are the Nordics involved? The Arctic connectivity would also increase the accessibility of the green data centre industry in the far north. There we have a lot of local excess energy from renewable energy sources but due to lack of power infrastructure there are limitations of how much energy you can transfer from north to south. Additionally, there is a relatively high cost of transferring energy in large distances. Therefore, moving data is much more efficient and cheaper than moving energy. In addition to this, where we have a really cooler climate in the north we can utilise the free cooling, we don’t need air conditioning to cool the data centres and we can reuse the excessive heat from them to the nearby communities. Also, if we land high-speed connectivity in the northern areas we can create work opportunities and prevent young talents from leaving northern communities from coastal areas of the Nordic countries. And all of these things combined, we create the PolarConnect Vision 2030, where PolarConnect is an initiative led by Nordnet to obtain secure and resilient connectivity through the Arctic to Asia and North America. Where we see submarine cables over the Arctic, adding digital routes from Europe, they improve the digital resilience and autonomy in the global network. They can create a ring structure of two or more cables traversing the Arctic Ocean. Here in this vision, we see PolarConnect, a more direct route passing under the ice cap of North Pole in the Arctic Ocean, just north of Greenland by exclusive economic zones and then traversing to Asia. The other one, the yellow one, is Far North Viber, a route passing through northwest passage of Greenland and then to North America through Bering Strait and then to Japan. Far North Viber project is more advanced. It’s way ahead of us. It’s scheduled to be in service in 2027, with the total distance of the submarine cable being 14,500 kilometers. Where PolarConnect project aims to be in service around 2030, with a total distance of 11,000 kilometers. A lot of questions can be raised from this vision. And one of them, is it doable? And we are working really hard to answer these questions. We’re working together with the Swedish Polar Research Secretariat to find a way if this is viable to cross the Arctic Ocean with the submarine cable. And the answer is yes. Their knowledge, they shared the knowledge from their previous Arctic expedition. It was the Arctic Coring Expedition in 2004. With a drill ship, Vidar Viking, and the two icebreakers, Odin and Sovetsky Soyuz, they were able to cross the Arctic Ocean and do the expedition. So in essence, to be able to build the submarine cable over the Arctic, we need two icebreaker ships and one cable-laying vessel. With this approach, we can cross the Arctic Ocean and put a submarine cable there. So while Sweden has one icebreaker, the government is already in the discussions about building a second icebreaker of the highest polar class, comparable to the Russian one you see here. And with the preparations, we see it being ready by 2030. Additionally, for the submarine cable, we need to have information about the seabed of the ocean. Where Arctic Ocean is largely unexplored territory, especially for intercontinental subsea cables, but it offers dramatic advantages for us all. So we must investigate the seabed. So we are working together with Professor Martin Jakobsson from Stockholm University and his project, International Bathymetric Chart of the Arctic Ocean, where the project is helping us to gather the information on what’s openly available about the seabed of the Arctic Oceans. So the initiative of this project is to develop a digital database that contains all available bathymetric data north of 64 degrees north to be used by map makers, researchers, institutions, and others who work requires a detailed and accurate knowledge of the depth and shape of the Arctic seabed, including our submarine cable. So what we see in this image is about 24% of the Arctic seafloor that is already mapped. And we will continue to work with this project to improve this map and fill out the gaps. We aim that the seabed data will be available. used to identify the potential route of the Arctic connectivity and it will contribute further for us to de-risk the project and contribute to the cable survey. So as you can see Arctic connectivity can bring broader economic benefits for the productivity trade and our all consumer welfare. It will be the shortest route from Europe to East Asia, safeguarding the minimal delay time, but also submarine cables can serve as scientific instruments for Earth observation, marine and seismic research. Traditionally we have scientists making measurements in the Arctic Ocean by dropping various instruments from icebreakers into the Arctic Ocean. They either take instant measurements or they are left to float and take measurements over time, but there are a lot of challenges. A lot of things can go wrong in the Arctic. Sometimes the instruments are lost and recovered, sometimes never recovered. This is where fiber sensing comes into play. We can enable submarine fiber cables be used as sensors by equipping them with distributed acoustic sensing or state of polarization technology. Apart from that we also are familiar with the smart cable concept where fiber cables can be equipped with various sensors and can act like monitors under the sea. They can measure temperature, pressure, velocity, salinity and together with the vibrations and acoustic sensors can provide a very wide scope of observations around the cable. They can also present near real-time data to be used by scientists and this data can be used to improve Forecasting models, it can be used to monitor climate change, ocean heat circulation, it can support us while monitoring from natural disaster warning systems like earthquakes or tsunamis. It can also help us understand marine mammal ecosystems better. The measurements will be continuous and over a long time, and scientists will have access to this data. Also, fiber sensing can help us protect and monitor the cables themselves. So a lot of benefits on the scientific angles, which are really important, as this was not possible before. In addition to that, there’s currently a lot of political momentum for the Arctic connectivity, as expressed by Margrethe Wester, the Executive Vice President of Europe Fit for the Digital Age. In addition to that, in July there was a memorandum of cooperation signed between the European Union and Japan and MOC on submarine cables for secure, resilient and sustainable global development. And this mock states that the Arctic route presents the potential to be expanded to wider European and Asian regions, and to the Atlantic and the Pacific areas. And to realize this advantage, MOC expresses a shared intention to explore and facilitate joint and respective support action as appropriate on trans-oceanic submarine cables, such as awareness raising, financial supports, demand aggregation, and as appropriate facilitating relevant administrative processes. This was a joint statement by the President of European Council Charles Michel, President of the European Commission Ursula von der Leyen, and Prime Minister Kishida Fumio from Japan. And they met in Brussels and communicated this jointly. And with this positive note on multinational collaboration on submarine cables, I end my presentation. If you would like to know more, we have a value proposition of submarine cables report done by Copenhagen Economics. And also you can find a lot more information about the Polar Connect initiative under this QR code. Thank you so much.

Hendrik Ike:
Thank you very much, Ieva. I had no idea that 90% of European traffic to Asia was at its narrowest 0.200 meters wide. That was quite an eye-opener for me. Does anyone in the audience have any questions for Ieva? Or any in the chat? I have some questions of my own, but I should also expand it to all of the speakers here, including Paul online, if anybody had any further questions. Please, I think that microphone should be working.

Audience:
Thanks, I need it because I’m losing my voice. Nothing to do with karaoke. I did actually have a question for Ieva about the cost of transferring energy versus data that you mentioned. Is there any reports or research you could point to for that?

Ieva Muraskiene:
There is a lot of research done in that value proposition in the report. We did investigate that. But it’s due to lack of infrastructure or the cost for actually transferring the power. So I can share the report with you and we can discuss it. Great, thank you.

Hendrik Ike:
Thank you. Any further questions? Well, then I’ll rattle off a few of my own. I’d actually like to start online with Paul. He’s staying up very late in the UK to be with us here. So I’m very, very happy that he is. Paul, you mentioned in your presentation the Bella project. were a big part in making that happen between Géant, Red Klar and the EC. I’d just like to know or see your perspective on what would you say was the highest challenge in actually bringing together those stakeholders in an R&D context in order to make Bella happen? I think

Paul Rouse:
First you had the challenge of it being a pathfinder. In our global community NRENs haven’t had a lot of experience in investing in submarine cables at their inception, at the build date. They tend to procure from a more established market. So there was working in a new space with different ways of working and then being a publicly funded body comes with certain requirements for compliance, governance and how the money was spent. And that was sometimes at odds with the way the telecommunications industry works. So trying to find a common way of working that satisfies everybody’s obligations was a challenge. We were carrying out the project as well during some difficult times in the world’s economy, with Latin America particularly as well in Brazil. So ensuring funding was available. There were challenges throughout the project. So I don’t think I have one particular one that rises above all the others. But these submarine cable systems are big pieces of heavy engineering taking lots of resources, complexity to design, construct and build. So there are many moving parts. It’s not a simple project.

Hendrik Ike:
Thank you, Paul. No, it doesn’t. I remember at the time it of course wasn’t an easy one to get over the line as such, but it did work and it was a success. Jun, I liked your slides and a part which struck me especially because I’m more from a public affairs policy point of view, was you showed the different political agreements on the different projects between Europe, other countries, and you were showing the multi-stakeholders of these different areas, and I was wondering, with your experience, what has been, in your view, the more successful projects that have had multiple member states or nations collaborating together, and what do you think were the reasons that made them a success?

Jun Murai:
That’s a great question. You know, 30 years is a long time, so it’s always different funding could be available for creating the future of the kind of fibre networking and other things. So one time it was very much kind of a satellite transponder company was exploring the way for allocating the spectrum, so they wanted to work together, and therefore kind of their transponder is, I hardly say that in kind, to work together with, right? And then also the submarine cable itself is not that particular thing, but all the high-speed switches and the equipment is going to be, you know, so the vendor started to create the new. Right, great. Thank you. Thank you. switch from, you know, kind of, say, whatever, the 10 gig to 100 gig, they really wanted to test that with interoperability and other things. So multiple companies working together with us for the exploring the interoperability testing and the other thing. So these are the research network mission that they’re working together. So that’s one of the reason I intentionally introducing today about the RODEM type of challenges, so that probably the new generation of the optical submarine cable control might be achieved working together with those people. And then they want to test that, and we want to test that. And therefore, probably, it’s a kind of mutual benefit to work together from the point of view of investment to the new technology, it could be very expensive. But then for the testing purpose and the other thing, then it’s a kind of a mutual benefit without, you know, actually paying. So I said the in-kind, right? So this is a testing, therefore, they bring the equipment and they’re working together. So it’s varied for the time by time that how that research type of funding could be benefit for the real operation of creating the network. That’s a wide project, probably characteristic in the world, right? So we are always exploring the new technology so that probably the fundraising is not that high, but we can challenge the new things. So that’s a model of the wide project. But it reminds me, if you’re working with these actors and you’re talking about in-kind contributions, that’s very similar to reciprocity between NRENs. when we make agreements in such a sense. OK. Oh, by the way, I forgot a very important thing during our presentation to all of the European side of the people. So talking about Southeast Asia connectivity for the researchers, that was initiated by what Keiko mentioned, like IHPI and utilizing a satellite. But we should note that the 10 efforts to connect them is very much the next generation of a terrestrial connectivity to Southeast Asia, collaboration with the EU and the JAN. And then now, we are working together for the new generation, utilizing the Arctic Ocean or the redesigning the southern connectivity as well. So that’s basically the phase one. It’s going to be by satellite. Phase two is going to be by TEN. And the phase three, we are talking about those historical things should be mentioned clearly

Keiko Okawa:
by me or Keiko, but I apologize. Yeah, let me add one. TEN, T-E-I-N, and Trans-Eurasia Information Network, the initiative supported by EU to connect the ICT infrastructure between Asia and Europe a long time ago, but now TEN is phase four. And that strongly supported not only EU to Asia, but Pan-Asia connectivity, basically Singapore-centered connectivity, right? So a long time ago, it’s still there. Of course, it was still there, of course. Since a long time ago. OK, thank you.

Hendrik Ike:
If I ask just a simple question, when was the first iteration of Tain? Do you remember when it began? Because Tain is like the giant version, it’s the regional network of Southeast Asia. That’s a question to you, actually. Yes.

Jun Murai:
Or Paul. Paul knows about the exact year when it started. In the 80s. Yes. The project was? Yes, but the cable CAE-1 started later. Probably middle 90s, I believe. Okay. Thank you very much.

Hendrik Ike:
I mean, it just also goes to show that NRENs and regional networks were really pioneers at the beginning of the boom of the Internet. And I, for one, am honoured to have so many colleagues who were there at that point. I would like… I saw a few people come in. I’d just like to open the floor for any final questions to our guests. Yes. Microphone here, or… Okay, thank you so much.

Audience:
Good morning, everybody. My name is Bjørn Rønning. I’m representing the Norwegian data centre community, i.e. the commercial part of a potential project. So, my first question is endorsements by governments. But I think the reason for asking is… I guess this is going to be an extremely costly project. So, already it’s been mentioned that you have to commission a new icebreaker just to get this over there. But that can probably be repurposed to other tasks and cable deployment and cable maintenance. So, obviously, I think… I consider this project to be too much of a heavy lift for only for the immigrants, no offense, by no means, but I think that there should be, we should probably expect that you have some governmental funding or you need to have a common Nordic or even European and also on the Asian side and a Japanese common understanding and agreement on how to fund this project because there also has to be done some financial viability on the return of investments. So how much is one willing to sacrifice for returns on investment, worst case? I don’t know if I made myself clear or if I should probably dive into details.

Hendrik Ike:
I have my own thoughts on it, but it’s for Jun or Ieva or Paul to answer.

Jun Murai:
Yeah, I think you are right. I mean, so, you know, yeah, I was going to explain a little bit more on that part, but, you know, the research and educational network contribution for the, you know, kind of investment is just, you know, probably, you know, the 10% or 5% of the actual installation cost, I believe. But the important thing is that for the NordNet and ourselves from the both sides that, you know, the cable company had a plan, and then, you know, we kind of generated a little interest from both sides that once it’s installed, then we’re going to occupy, like, you know, kind of 5% of the capacity on fiber pair and tire for the research and educational community. So that might be possible. It’s not that easy. But the fundraising for the research and educational for 5% of the entire cable installation, right? And the other part, of course, need to be, you know, kind of investment has to come in from the commercial or the public entity other than research and educational purposes. So this is not that easy. So in the past, a number of projects failed because of the lack of the, you know, construction building was not successfully done to raise enough funding. But so for this one, we kind of did very special approaches different than the past on the other part of the cable, which is, which when the poll explained about the EU-Japan digital partnership agreement, which is very much in public entity endorsing that this is gonna be needed for, not only for the research and educational scientific one, but all the economy of the both end. So that is a way that, I don’t think a government can raise, support the commercial activities. I don’t believe that, but they can endorse. That means, you know, the Japanese government, frankly, already started to communicate with the economy industries that, and the financial industry, that you’re gonna get the benefit of this cable if that is the case, then you have opportunity to invest for the optical fiber because this is special. So that kind of a promotion already are supported by the government in Japan already. So this is an additional endorsement type of efforts from the public, I mean, government side. So I think this is good, and I don’t remember this has been done in the past on the history. So the EU-Japan Digital Partnership Agreement. is now extending the kind of industry and the scope of the people and the stakeholders to be involved for the supporting the industry. So the research and education are actually initiated that kind of thing. So Nordnet and ourselves said, we want this cable, and that this might be, so we kind of started the efforts and then inviting the other stakeholders to be involved. So this is a very special way, I believe, but what do you think, Ami?

Ieva Muraskiene:
Yeah, I agree everything you said. And from the Nordics perspective, of course, we need to engage with the Nordic ministries and governments to get their support and endorsement equally like in Japan. But apart from the governments, we’re also engaged with the European Commission to ensure that there’s relevant support from their side to ensure also the funding opportunities that we can explore to have the conversation with them as well, because they also made some promises. We also contribute to the goals they are expecting us to deliver on. And we benefit from the unique position we have from the research and education point. We can talk to them all and also engage with the commercial side. And that partnership with Japan and having connections to Japan also helps to communicate our message even further and for them to communicate it back so that both ends of the connectivity are engaged. And we create this multiple use cases to have the arguments that we really need such infrastructure on our end. It’s not just the connectivity that we talk about. We talk about much more benefits added on top of simple submarine cable. So I think there’s good progress. And we’re also working on de-risking the project for the commercial side. So to make them a little bit more attracted to the idea, we’re working on building the business cases, exploring the opportunities there. So it’s not just that we talk, but we also do the work, the CBET survey, the resources we need for actually building the cable, but to know when they will be available, so we can make use of them. So I think there’s good progress. Thank you.

Hendrik Ike:
Thanks, Siobhan. Paul, did you still want to answer before I move on to the next question?

Paul Rouse:
I think a lot of the good points have been made there. I’ll just reinforce the point. We’ve got some experience of doing this now. In the Bella case study, I gave us an example. So in the Mediterranean with the Medusa system recently, and in both of those instances, as Yeva and Jun have said, it’s about a collaboration and partnership. So the question from the floor there is absolutely right that NRENs alone can’t deliver this, whether it’s the financial investment, the skills, the expertise, the resources, there’s government, there’s funding bodies, there’s the user communities, the skills that we have within NRENs. As we explained, the history of the internet comes from our community, so we’re pretty good at building networks. But the heavy lifting of actually implementing a submarine cable, we work closely with commercial partners. And I’d like to say that I think we’re quite desirable partners there. Yeva used the term there around de-risking with public funds and our use case, supporting research and education. We’re a good partner to have on board to enable a project to progress. Thanks, Andrew.

Hendrik Ike:
Thank you very much, Paul. I think we have another question from the audience.

Audience:
I was actually just going to build on that. I’m wondering if part of the story then is also a security and resilience one, if we’re looking at it from a government perspective. So from one side, you’ve got the ability to pump time down this, so you’ve got a GPS type of solution there. But then what is the cost of disaster recovery after an event so if you can predict tsunamis for example if you can predict earthquakes Surely that has a very strong business case So we’re working with the likes of Google and British Telecom at the moment to test some of these and of course all of these Companies are looking for new revenue streams and new services and products So I think that is part of the story as well

Hendrik Ike:
Thank you anyone want to take that Yeah

Jun Murai:
Yeah, probably that is a little bit different from the Maybe you know following me probably smart cable concept should be explained from an alternate side but then in Japan, we’ve been in a suffered with the earthquake very much and Then they know so the smart cable concept is like, you know Piggybacking the sensors on a commercial communication cable, right? but that is not enough for Japan and therefore the National Laboratory of Earthquake Seismic Study had its own collaboration with a cable company for the specific type of sensors to be installed so historically we started from the well expired communication cable and the putting the sensor and for the you know kind of detecting the earthquake or the Mitigation for the earthquake type of a thing, but now it’s a kind of a very much The we we now identify that this area of oceans gonna be a very thing I mean bottom of the ocean is gonna be very dangerous. Therefore. We have a very specific installation of the sensor cable So that it’s its own purposes as well, so It’s a very serious in this country. So and so the meaning that separate funding for the, you know, kind of a commercial company’s funding and the research and the educational traffic funding and the seismic funding, a little bit different funding possible in Japan because of the frequency of the earthquake.

Hendrik Ike:
Anyone like to add?

Ieva Muraskiene:
Just a little comment. So last week we, as NORDONET, had a science engagement workshop. We engage with the scientists and look what kind of opportunities they want to see on the submarine cables. And there’s a lot of good conversations, but there’s also an understanding of how different the commercial companies want to use the cable and how different it is for the scientists what they want. They want accuracy. They want a lot of information. So alone, the submarine cable cannot replace other research instruments, but it can contribute highly to early warning or just, hey, look, something is happening at that end. Maybe you want to look more closely, that kind type of information, but not be the main source of seismicity or other types of natural disasters. But we can contribute to the scientific research. We can bring the information to the table, but not be the main source of it. So we need to kind of distribute the expectations a little bit, but it’s really insightful to talk to the scientists. They have really good comments. Thank you.

Hendrik Ike:
Thank you, Eva. Are there any further questions? No, I don’t see any in the chat. Well, I think with that, I will close the session. I’d really like to thank everybody who presented today and who attended from remotely across the world. And for those of you who turned up for this session this morning, it’s been an eye-opener for me, and I very much appreciate everyone’s input. So thank you so much. and enjoy your coffees, goodbye. Thank you very much. Have a good day all, thank you. Thank you Paul, and the audience please visit our booth after that, then you can touch and you can install your dream to theirs. Thank you. Thank you. Thank you. Thank you. Thank you. . . . . .

Audience

Speech speed

165 words per minute

Speech length

421 words

Speech time

153 secs

Dr. Masafumi Oe

Speech speed

133 words per minute

Speech length

1002 words

Speech time

453 secs

Hendrik Ike

Speech speed

140 words per minute

Speech length

1549 words

Speech time

664 secs

Ieva Muraskiene

Speech speed

152 words per minute

Speech length

3132 words

Speech time

1235 secs

Jun Murai

Speech speed

137 words per minute

Speech length

2878 words

Speech time

1258 secs

Keiko Okawa

Speech speed

137 words per minute

Speech length

832 words

Speech time

365 secs

Paul Rouse

Speech speed

165 words per minute

Speech length

2596 words

Speech time

943 secs

Gathering and Sharing Session: Digital ID and Human Rights C | IGF 2023 Networking Session #166

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Speaker 3

Speaker 3 discusses two initiatives aimed at solving problems within the coalition. The first initiative is the National Legislation Mapping Group, which conducts mapping exercises to understand the development of ID systems in different countries. This group recognizes that the issuing and implementation of nationality programs vary greatly across the world and seeks to compare and understand these differences. By doing so, they aim to identify best practices and foster collaboration between countries.

The importance of the National Legislation Mapping Group’s work is emphasized by Speaker 3. Through their mapping exercises, the group hopes to create a comprehensive understanding of the different approaches and challenges in developing ID systems. This knowledge can then be used to inform policy decisions and drive innovation in the field of identity management. The group’s work is particularly relevant to SDG 9: Industry, Innovation, and Infrastructure, as it aims to improve the efficiency and effectiveness of identification processes worldwide.

Speaker 3 also highlights the collaborative and flexible nature of the methodology used by the mapping group. Each member contributes their ideas to the development of the methodology, ensuring that it reflects diverse perspectives and is adaptable to different contexts. This flexibility is vital for newcomers to easily understand and contribute to the mapping exercises.

Furthermore, the National Legislation Mapping Group has specific goals and aims for its work. They aim to develop a tool that can be hosted on each organization’s website, making the information easily accessible to stakeholders. This tool would enable organizations to compare and learn from the different legislative approaches employed by countries around the world. Additionally, the group aspires to adopt a more quantitative approach in the future, further enhancing the accuracy and comprehensiveness of their mapping exercises.

In conclusion, the initiatives discussed by Speaker 3 are positive steps towards achieving the goals of the coalition. By mapping the development of ID systems and understanding the varying approaches to nationality programs, the National Legislation Mapping Group is contributing to the partnership for SDG 17: Partnerships for the Goals. Their collaborative and flexible methodology ensures that all members of the group can contribute effectively. The goals and aims of the mapping group highlight their commitment to advancing knowledge and promoting best practices in the field of identity management. Ultimately, these initiatives have the potential to drive innovation, foster collaboration, and create positive change within the coalition.

Audience

The speakers at the event covered various topics related to proactivity, digital ID systems, biometrics, and government cooperation. They highlighted the importance of proactive initiatives within organizations, advocating for the need to put things on the agenda themselves. The audience agreed that Caitlyn’s organization supports proactivity and is not just reactive but also proactive.

The discussion also touched upon the implementation of digital ID systems in different countries. The World Bank has been advocating for the entity system, which is being used in countries with numerous problems. The audience believes that the entity system is perceived as a solution for struggling countries, and the World Bank has been endorsing it as a proposed fix.

The government in Mexico is trying to pass a law to expand the digital ID system, raising concerns about the use of funds collected through digital ID. Similarly, there is an expectation for the implementation of mandatory digital ID in Mexico. In Iraq, it was stated that there is currently no biometric system in place.

The introduction of biometric passports worldwide has been initially rejected by most countries but later accepted. Hugo Cordova, an employee of the European Parliament, is currently working on legislation to introduce electronic IDs for Europe.

Concerns were raised about the coexistence of international and national digital identity initiatives and their respective purposes. The audience highlighted the need for clarity on how multiple digital identity initiatives would cohabit. The discussion also touched upon the entry process for various coalitions, as Camila wanted to know how to join.

Armando Manzuela from the Dominican Republic expressed his interest in seeing the scope of a study extended to other countries within the same region. He offered to share plenty of information from his country. The convergence of national and supernationals electronic identity systems into international standards was seen as a possibility in the future, but concerns were raised about the governance of these systems and the need for privacy safeguards.

The principle of necessity was emphasized for digital ID systems, as it was argued that each system should be based on the principle of necessity and not applicable to all contexts. Digital ID systems were also discussed as socio-technical systems, not just technological systems, where context should be carefully considered in analyses. Extensive documentation of the harms that digital ID systems can create and exacerbate was also highlighted.

The speakers also touched upon the importance of public interest litigation and the potential involvement of individuals. The audience acknowledged and appreciated the influence of work done on multinational and national issues related to digital identification. However, concerns were raised about the lack of engagement with communities and the penetration level of the ID system in certain countries.

The significance of digital identity as the entry to the digital economy and society was discussed. The implementation of digital identity was seen as a way to track individuals, and there was increasing momentum from both the government and private sector for its implementation. However, doubts were raised about whether digital identity could be implemented correctly given the pressure.

There was mention of a private meeting on litigation about digital ID, indicating that Peter from Access Now is planning to discuss this topic at the meeting. He also expressed the need for a better acronym for their network.

The importance of multilateral engagement for the proactive development of the Digital Public Infrastructure (DPI) safeguards initiative was discussed. The need for a deeper and more participatory engagement process beyond unilateral consultation was emphasized, as the coalition aimed to not just contribute inputs but also receive feedback. The upcoming summit of the future was seen as a pivotal moment for the coalition.

The tech envoy’s insight into the safeguards process’ timeline and key engagement opportunities was highly sought after, as the coalition was eager to prepare for future engagements. The coalition also stressed the importance of civil society involvement and accountability in digitization interventions.

The UNDP’s signing of an MOU with the Kenyan government regarding digital ID without civil society or community engagement was criticized. The audience believed that the UNDP should not abet exclusion in digitization interventions and should be accountable. Transparency and the right to information were seen as essential, and there were concerns about the lack of information regarding the negotiated protection mechanisms concerning civil society.

The benefits of open-source technology for critical systems development by the government were highlighted. Open-source technology was seen as a way to ensure safety, security, and trust in government systems, and it also opened up the possibility for global contribution to what was being built. The audience expressed the belief that everything should be digitized using open-source technology to prevent issues faced by countries with their digital systems.

Regarding government cooperation, the audience expressed a desire for more transparency and communication. There were incidents of claimed public participation without actual involvement, and progress in advocacy in Kenya related to the Data Protection Act and digital access was discussed. It was stressed that the government should work effectively with civil societies and the UNDP.

The event also saw community members expressing their interest in joining the community and asking how to get involved. One audience member, who represented a tech company, T4Beast, with a strong presence in the MENA region, highlighted their expertise in supervision, digitalization, and security. The audience believed that T4Beast was the biggest in the region and valued their close partnership in META.

In conclusion, the event covered a wide range of topics related to proactivity, digital ID systems, biometrics, and government cooperation. The speakers and audience highlighted the importance of proactive initiatives, community engagement, transparency, open-source technology, and effective communication between stakeholders. They also discussed the potential risks and benefits associated with the implementation of digital ID systems. The speakers emphasized the need for context-specific approaches to digital ID systems and the importance of privacy safeguards. Overall, the event provided valuable insights and sparked important discussions about the challenges and opportunities in the digital identification landscape.

Speaker 5

The team responsible for organising the Summit for the Future has developed a plan to host multiple convenings in the lead-up to the summit. These convenings aim to gather input and feedback on the overall process, ensuring that a diverse range of perspectives and ideas are considered.

In addition to in-person convenings, a virtual platform will be provided for individuals unable to attend in person. This platform will enable participants to share their experiences and contribute to the dialogue, ensuring that everyone has an opportunity to actively participate and provide insights, regardless of physical presence.

One of the summit speakers strongly advocates for open dialogue and collective input, emphasising the importance of civil society’s involvement. The speaker encourages civil society to engage and participate in the summit’s discussions. This approach highlights the significance of inclusivity and diversity in decision-making processes and underscores the role of civil society in shaping the summit’s outcomes.

Overall, the team’s plan for the convenings, the inclusion of a virtual platform, and the call for open dialogue and collective input demonstrate a commitment to creating an accessible, inclusive, and responsive space. This approach aims to represent a wide range of voices and interests, fostering collaboration and partnership during the summit.

Amandeep Singh Gill

There is a growing interest in Digital Public Infrastructures (DPIs), and more investments are being directed towards them. It is crucial to develop a safeguards framework to protect the safety, security, human rights, and sustainability considerations associated with these infrastructures. This framework aims to ensure that investments in digital infrastructure do not lead to violations in these areas.

Addressing the issue of exclusion in digital public infrastructures, especially for marginalized groups, is also important. Efforts should be made to avoid excluding these groups and ensure that DPIs are accessible and inclusive for everyone.

Prominent advocate Amandeep Singh Gill suggests the formation of multi-stakeholder partnerships to develop and implement effective safeguards. Involving various stakeholders, including governments, civil society organizations, and the private sector, these partnerships can establish comprehensive safeguards for DPIs.

To support this initiative, the UN Secretary-General’s tech envoy launched an initiative with the UNDP on DPI safeguards, reflecting a positive sentiment towards the need for these safeguards.

Regarding governance, there are plans to establish a governance structure for the DPI initiative. This structure will include an advisory board and a steering committee, contributing to the decision-making process. Additionally, efforts are underway to identify learning partners who can provide valuable insights and contribute to the development of this governance structure.

Engaging civil society and the private sector is also a priority, particularly in developing digital ID systems. Consultations with these stakeholders are planned, recognizing the key role the private sector can play in developing digital identification systems.

The overarching goal is to leverage DPIs in a human-centered and human rights-respecting manner to advance the Sustainable Development Goals (SDGs). Planning for a good and ambitious global digital compact is underway to ensure DPIs significantly contribute to the achievement of the SDGs.

A noteworthy observation is Amandeep Singh Gill’s emphasis on joint participation in building and maintaining digital platforms. He suggests involving the community in the process, enabling them to contribute to the development and maintenance of digital systems.

Furthermore, Amandeep Singh Gill highlights the importance of accountability for UN agencies in maintaining DPIs and digital services. He suggests holding these agencies accountable as per the safeguards framework to ensure effective management of digital services.

In conclusion, there is a need to establish a safeguards framework around DPIs, ensuring safety, security, human rights, and sustainability considerations are not violated. Multi-stakeholder partnerships, governance structures, and engagement with civil society and the private sector are key elements in developing and implementing effective safeguards. Leveraging DPIs in a human-centered manner can significantly contribute to the attainment of the SDGs. Additionally, promoting joint participation and accountability are crucial in maintaining DPIs and digital services on the ground.

Speaker 1

The organization being discussed is a global coalition of civil society comprising diverse members, ranging from small grassroots organizations to large multinational NGOs. These members employ various approaches, including advocacy, lobbying, and strategic litigation, to advance their goals.

A significant highlight is the organization’s transition from a reactive to a proactive approach in the context of digital identity systems. Instead of merely reacting to opportunities, they now actively identify and pursue them. This proactive mindset enables them to develop shared resources and leverage their community’s strengths to achieve more inclusive outcomes.

Multilateral engagement and national level advocacy have been identified as key priorities for collective action. The organization seeks to incorporate its members’ concerns, information, and expertise in multilateral spaces and international organizations. Additionally, they focus on advocacy at the national level to promote human rights.

Speaker 1 demonstrates a positive stance towards the organization’s evolution and development. They highlight achievements such as agreeing on a shared vision, formalizing a structure, and identifying key priorities. The transition from a reactive to proactive approach is seen as a significant advancement.

The ongoing discussion revolves around clarifying the distinction between legal identity and digital ID. This discussion takes place both online and at RiceCon, and the community perceives productive progress. The incorporation of safeguards and remedies is central to this ongoing debate.

It is important to note that there have been misunderstandings regarding civil society’s approach to digital identity systems. Therefore, it is necessary to clarify the difference between legal identity and digital ID. The speaker does not oppose digital IDs but emphasizes the need for appropriate safeguards to protect individuals’ rights.

In summary, the organization is a global coalition of civil society with diverse membership and approaches. They have transitioned to a proactive approach towards digital identity systems, and prioritize multilateral engagement and national level advocacy. The ongoing discussion revolves around clarifying the distinction between legal identity and digital ID while highlighting the importance of safeguards and remedies.

Laura Bingham

Strategic litigation has generated significant interest within civil society communities. To address this, a strategic litigation training workshop has been organized. The decision to hold this workshop was influenced by a heat mapping exercise conducted by the organization, which likely revealed a high demand for knowledge and expertise in this area.

In addition, the concept of ‘Digital ID done right’ was discussed, highlighting its dynamic nature. It was emphasized that Digital ID implementation should not be seen as a one-time event but rather an ongoing process that requires constant monitoring and adaptation to local, national, and regional contexts. This recognition acknowledges the evolving nature of society and the need for digital identification systems to respond accordingly.

Moreover, the importance of incorporating frameworks for ongoing feedback was emphasized. It was suggested that these frameworks are crucial in addressing exclusion and rectifying any issues that may arise during the implementation of Digital ID systems. By continuously seeking feedback from individuals affected by these systems, organizations can ensure they are inclusive and responsive to the needs of all stakeholders.

In conclusion, strategic litigation has garnered significant interest within civil society communities, leading to the organization of a dedicated training workshop. Furthermore, the concept of ‘Digital ID done right’ recognizes the need for constant monitoring and adaptation to effectively respond to evolving societal dynamics. Incorporating feedback frameworks is crucial to ensure the inclusivity and effectiveness of Digital ID systems.

Speaker 2

The coalition’s initiative in Costa Rica involves conducting an exercise to map the needs and capabilities of its members with the aim of facilitating knowledge sharing and capacity building. This initiative is driven by the recognition that effective collaboration and partnerships are essential in achieving the goals outlined in SDG 17: Partnerships for the goals.

Through this mapping exercise, the coalition has sought to identify a balance between the expertise that exists within its member organizations and the areas where development is needed. The exercise was successful in pinpointing the strengths and needs of the coalition’s members, providing valuable insights to guide future actions.

The mapping exercise revealed that some members excel in research fields such as discrimination, economic and social rights, privacy and data protections. On the other hand, there were identified needs in areas such as comparative examples, collective actions, surveillance fields, transparency, and access to information. This comprehensive understanding of the capabilities and gaps within the coalition’s organizations is crucial for effective collaboration and targeted capacity-building efforts.

In light of these findings, the coalition has encouraged its members to support each other by sharing their expertise and learning collectively. By populating the cells according to their strengths and needs, the members can better grasp the areas where support can be given and received. This collaborative effort aims to build capacity and address the identified needs collectively, enhancing the overall effectiveness of the coalition in working towards its goals.

Overall, the mapping exercise conducted by the coalition in Costa Rica has provided valuable insight into the needs and capabilities of its member organizations. By leveraging the strengths and expertise of its members and addressing the identified needs through collaborative learning, the coalition is well-positioned to make significant progress towards its objectives. This initiative demonstrates the power of partnerships and knowledge sharing in achieving the goals set forth in SDG 17.

Speaker 4

The Multilateral Working Group is a dedicated initiative that aims to enhance expertise building on a global scale while ensuring more strategic and coordinated engagement in multilateral forums. The group’s primary focus is on providing training related to technology, science, and standards, equipping members with the necessary knowledge and skills to effectively participate in these international platforms. This approach not only increases the group’s collective understanding of these subjects but also enables them to actively contribute to global development and problem-solving.

In addition to knowledge-building initiatives, the Multilateral Working Group also plays a crucial role in facilitating the participation of its members in international forums. They recognise the importance of having a diverse range of voices and perspectives in these discussions and, therefore, provide funding to support the presence of more members. This financial assistance ensures that individuals from various national contexts can actively engage and contribute to multilateral forums, enabling a more inclusive and comprehensive dialogue.

Another important aspect highlighted in the analysis is the significance of collective efforts in addressing issues related to identification systems. The importance of this collective approach was emphasised by the community involved in the study. They stressed the need for a unified and collaborative approach, acknowledging that tackling such complex issues requires the collective knowledge, skills, and resources of a diverse group of individuals and organisations.

To support this collective effort, the community developed a toolkit aimed at digital rights activists. This toolkit provides valuable insights into the intricate complexities associated with identification systems. Its purpose is to aid advocacy, mobilisation, and education on this topic. By equipping activists with a deeper understanding of identification systems, the toolkit empowers them to effectively advocate for policies and practices that align with the principles of peace, justice, and strong institutions, as outlined in SDG16.

In conclusion, the Multilateral Working Group’s focus on expertise building and strategic engagement in multilateral forums highlights their commitment to global collaboration and problem-solving. By providing training on important subjects and facilitating diverse participation in international platforms, the group aims to enhance the collective knowledge and impact of their members. Furthermore, the emphasis on the importance of collective efforts in addressing identification systems showcases the community’s dedication to promoting peace, justice, and strong institutions. The development of a toolkit further supports this objective by empowering activists to advocate for positive change in this area.

Moderator

The analysis of the provided information highlights several important points made by the speakers during the discussion. Firstly, it is noted that the Internet Governance Forum (IGF) community has made significant progress since the last meeting. This progress includes the development of a structured framework, regular communication, and the identification of thematic areas. These advancements suggest a more organized and coordinated approach within the IGF community.

The community places great importance on deliberate and intentional learning, leveraging each other’s strengths, and identifying gaps and opportunities. They have conducted exercises such as mapping the needs and capabilities of members to identify areas for knowledge sharing and influence. By focusing on capacity building in areas with greater needs, they aim to create a supportive and collaborative environment.

In terms of their focus, the community is working on two thematic groups: one focusing on national-level interventions and the other on multilateral engagement. This demonstrates their commitment to addressing different aspects and levels of digital identification issues.

The World Bank has advocated for the use of an entity system in countries facing various problems. However, it is important to note that digital ID should not be conflated with legal identity, as they serve different purposes. The community recognizes the need for disentanglement between these two concepts and is working towards achieving a common understanding.

The engagement in multilateral forums, particularly in the context of ID4D, has presented challenges. There have been both online conversations and discussions at events like RiceCon. However, misunderstandings in approach have been observed, emphasizing the complexities involved in addressing digital identity system issues at a global level.

Strategizing public interest litigation has been seen as an effective approach to address multinational and national issues related to digital identification. The analysis reveals that countries like Uganda are interested in learning from Kenya’s experiences in working on digital identification issues. Furthermore, the community’s engagement with civil societies and organizations from India and Jamaica showcases the potential for cross-country collaboration.

The analysis also emphasizes the importance of constant oversight and updates in socio-technical systems like digital ID. These systems need to adapt and evolve along with societal changes and should have mechanisms in place for feedback and addressing exclusions and other issues.

Public involvement and collaboration are encouraged for the development and maintenance of digital public infrastructure (DPI) and digital services. By involving the public, UN agencies can be held accountable, promoting a more transparent and inclusive approach.

The use of open-source technology in government systems is suggested as a way to develop secure, trusted, and effective systems. Open-source technology allows for a deeper understanding of how systems operate and enables technical communities from different countries to contribute to their development. It is considered a key solution to address ongoing challenges faced by countries in their digital systems.

In conclusion, the analysis highlights the progress made by the IGF community in terms of structure, communication, and thematic areas. It also emphasizes their deliberate approach to learning, collaboration, and capacity building. The recognition of the need for disentanglement between legal identity and digital ID, as well as the challenges in multilateral engagement, are notable observations. The effectiveness of strategic litigation in addressing digital identification issues at various levels is also highlighted. Finally, the analysis underscores the importance of constant oversight and updates in socio-technical systems, as well as the value of public involvement and the use of open-source technology in government systems.

Session transcript

Moderator:
Okay, wonderful, fantastic to have you. We’ve got some new faces, lots of smiles, so that’s really exciting. So this session is about the digital what? IDs and?

Audience:
Human rights.

Moderator:
And we’re called a?

Audience:
Coalition.

Moderator:
A coalition, a?

Audience:
Revolution.

Moderator:
A revolution, a? Yes. Okay, welcome. So this session is really an opportunity for the digital IDs and human rights community to tell you a little bit about what they’re doing, to hear from you about what they do, and hopefully you can join this fantastic community, revolution, coalition, togetherness, yeah? Okay. Excellent. So this digital IDs community is global, yeah? We know what global means? Global means? Global? Huh? Over. Global means? Balloon.

Audience:
Balloon.

Moderator:
So we’ve got people from all over the world represented in this coalition, yeah? Okay, let’s see. We’ve got people from South America, where are you? You see? We have people from North America, can we hear it? Again, again. We have people from Europe in the coalition, where are they? We’ve got people from Asia, Asia, yeah, that was a very, Asia, can we hear you? Yeah, okay. We’ve got people from, we have Australia?

Audience:
Yes.

Moderator:
Hey! Okay, and then people from the motherland, where are you?

Audience:
Hey!

Moderator:
Okay, fantastic. So on our agenda, you have the slide? So on the agenda, we will start with really a brief. a brief overview, so we’ll have different members tell you about the incredible stuff that this community has been doing. They’ll tell you a little bit about the journey. It’s been about a year since the last IGF, isn’t it? But we’ve come such a long way, you know? They’ve got structure, they have regular communication, they have focus, they have thematic areas, they have, you’re going to wait and hear the rest. Okay, so you’ll hear about that and some of the activities that they are doing. Then we’ll also really like to hear from the rest of you and hear about what are some of the digital ID challenges that you’re dealing with, okay? So let’s start with a brief overview, background. Let’s give it up for Kaitlin, for Kaitlin! All right, here you go.

Speaker 1:
Hi everyone, I’m Kaitlin Shafi and I have the very difficult task of following our excellent moderator, Ash Newt. I can promise a drop in energy, so I apologize for that. And I won’t do any call and response, but what I’ve been asked to do is to give a background of our coalition work to tell you a bit how we got here today, why we’re here and why we really want to invite more of you to come join us in the great work that we’re doing in advancing digital ID and human rights. So Ash Newt’s already told you a little bit about who’s in the room, that we’re a global coalition. We are a civil society organization, so we are researchers, activists. Some of us are unfortunately lawyers as well. We’re diverse in our geography, but we’re also diverse in the size of organizations that we represent. So we have small community grassroots organizations all the way up to large multinational NGOs, people from universities. We really run the gamut when it comes to human rights organizations and human rights actors. We’re also very diverse in the reasons why we’re interested in digital ID. People are approaching it from many different perspectives, bringing many different viewpoints, and we’re very diverse as well in our approach to how we come to the work. Some of us are researchers, some of us are engaged in advocacy, some of us do lobbying, strategic litigation. We bring a lot of tools to the table when it comes to advancing human rights. And really the reason that we came together is because we have shared concerns about the types of digital ID systems that we’re seeing, the way digital identity is being formed. And if you look at the timeline, which is the slide that’s on the screen right now, you can see that in the beginning we were very reactive. So we saw opportunities to come together for consultation. consultations, to do joint research projects, to write things like open letters that shared some of our concerns, but we were really reacting to opportunities that we saw. And over the past few years, I think we’ve become a much more proactive community. So we’ve become more cohesive, we do have structure now, which is very exciting for all of us, and also we are trying to be much more forward-looking, to identify opportunities before they come, so that we’re much more prepared to meet them, to develop shared resources, and also to leverage the strengths of our community to build more inclusive and human rights-focused outcomes. And it’s very special for us to be here today at IGF in the first public session to share the work of our coalition, because it was actually at IGF last year in Addis that the coalition really began to take on a formal shape. So that’s when we launched our initial volunteer group to start establishing some structures, and started to bring what was at the time a very loose coalition of civil society organizations together into something that is much, much, much more organized today. And over the last year, we are in a kind of a piloting phase, a building phase, but we’ve accomplished quite a lot. We’ve agreed on a shared vision statement for the coalition, so we’re a powerful coalition that aims to move together to provide solidarity and support, and engage in collective action. And we have a beautiful one-pager that’s on the table here, and I’m sure will be shared with some of the folks online as well, talking about some of our shared vision. And we also established a structure, which will be the next slide that you’ll see here. And at the top of this structure, the thing that is most important to us is our community membership. All of the CSOs and activists that have come together, that is our strength, and that is what we build all of our work on. And to bring some shape and structure to that, we established a coordinating group that’s responsible for setting meetings, developing visions to share with the group, setting up things like sharing sessions as well. We have a specific work stream on sharing and learning, so we have, for instance, shared information about strategic litigation that’s happening in Uganda for the rest of the coalition to learn and hear about current developments, and we have a lot of other opportunities planned where information and resources will be shared with members of the coalition. We also have a work stream on communication, so improving the way that we share and communicate with one another, but also. with the outside world. And perhaps most importantly, at the last meeting we had together, identified two priorities for collective action. So one is on multilateral engagement, on bringing the concerns and the information and the expertise of our members into multilateral spaces and international organizations. And we also have a piece of collective action on national level advocacy. And I have some wonderful colleagues here who are gonna share a bit more about this work. So without further ado, I’ll turn it over to Janina, who’s gonna talk about some of the needs mapping that we’ve done.

Audience:
Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi. Hi.

Moderator:
What did you like about what Caitlyn said? Anything that struck a chord? I hope you’re paying attention. Should we ask her to get back again? You like the word community? Aha, what else did we like from Caitlyn’s presentation? Caitlyn’s presentation? You talk to me. Please, don’t be like on Zoom where you hide behind the screens. What did we like about Caitlyn? What else did Caitlyn say that we liked? Sorry?

Audience:
She said that they’re not just reactive, but they’re proactive. Proactive. Putting things on the agenda themselves, which is good.

Moderator:
Okay, excellent. You had another point. Any other thing that stood out for us? Okay, all right. So now let’s listen to Janaina. She’s going to tell us about one of the initiatives of the coalition, of the community.

Speaker 2:
Thank you so much, Ashmit. I don’t know if everyone here was in Costa Rica. I don’t know if Ridescom, but when you were there, get. So some of us, yes. But what we did there, we did this exercise, this mapping of our needs and our capabilities. What we tried to do is actually, it’s better show where we can influence and we can share knowledge between our members and where we can actually build the capacity, where we need to build this capacity. This is something that Juan’s gonna tell just after me. And we wanted to see how we can find these areas. The coalition members can support each other. So we did one sheet just for the capabilities and distribute another sheet just for the needs. What we ask for our members were to populate the cells, where they, for example, which kind of digital governance influence methods they utilize in their organizations and which kind of human rights and social fields they are most, build their expertise on it. So we give them these examples, and I think we can show the next one. And what we came with all of these answers is what we have flourished in the capabilities map, where we have our strengths, where each organization can support each other, like the big ones, the multilateral ones. So here we can see, for example, where some of our members comment. For example, one of our members had like 12 affiliate actors, and they produced state policy research outputs. They are very strong in research fields like discrimination, economic and social rights, privacy and data protections. Other members are like real GDPR experts. They’re from lawmaking to enforcement and compliance. We also have experts using personas, storytelling, and how to reach communities, how to actually raise awareness, and how to stoke advocacy. So these are strong suits, and this is how we can support each other. But also, we see where are our biggest needs, where we should focus our capacity building, where we can actually construct workshops, bring more experts, actually, to help us to capacity build on our needs. So here we see where our members want to learn more about it. For instance, learn about comparative examples. Some of them want more focus on collective actions, alias for advocacy, and their surveillance fields, transparency, and access to information. And this also speaks from our multilateral engagement projects, and also the national legislation project that I’m going to pass to Juan to speak, and how we share knowledge on these two big fields that you’ll focus on this year. So without further ado, Juan, please. Thank you.

Moderator:
Thank you. Thank you. Thank you. Thank you very much, Janaina. As you can see, the community is very deliberate, very intentional on trying to make sure that members learn from each other, leverage on each other’s strengths, really understand where are the gaps, where are the opportunities. and use that to create opportunities to learn from one another. Not just regionally, not just nationally, but? But all over the world. Can you imagine being part of that? Exciting, yeah? Okay. Thank you, thank you. Okay, so we are now going to listen to one of the initiatives that the community is working on. There are two thematic groups. One looking at national level interventions, and then the other one looking at multilateral engagement. So let’s give it up for Juan.

Speaker 3:
Thank you, thank you. Okay. It’s hard to fight against jet lag and keeping such high energy levels. I mean, I’m not gonna be able to deliver as good, but yeah. Yeah, I’m not gonna try and match it, yeah. That’s right.

Moderator:
Should we try and give you energy?

Speaker 3:
No, no, no, I’m fine.

Moderator:
Should we try? Thank you. Should we try and give you energy? Let’s give him energy. Shall we give him energy? You see, we are compassionate, kind. Hey, imagine. We are compassionate, we are kind, we support each other. Yeah, shall we clap? Clap. Energy, energy, energy, energy.

Speaker 3:
Thank you. Okay, now proceed, yeah. I’m feeling very capable now. So yeah, we’ve got two initiatives that are working groups aimed at solving particular problems that we think we can solve for in the coalition. And one of them is the National Legislation Mapping Group. We, this stems also from the Ridescon meeting in which we agreed on forming these two groups. And this one, what it’s doing is a mapping exercise on the development of ID systems in different countries. One of the reasons we think that’s an important task is because the issuing and the implementation of nationality programs is very different in different parts of the world. And we try and compare those different systems in different places to understand how they’re working and to use that knowledge to our advantage in terms of advocacy mainly. So this was a prioritization, as I mentioned, from the Ridescon Summit. And the idea behind it is that we create a tool that’s useful to advocate mainly. We are not a coalition that’s focused only on research or on academic work, although we’re very academically capable as well. We do think that that’s a requirement to build better arguments. But we’re aiming this effort towards something which allows us to move forward our advocacy efforts. And then the methodology, which is maybe one of the stronger points of this exercise as a whole, was collectively developed as well. It’s very flexible, but every member of the working group has pitched in with ideas and with ways of making that methodology very strong, which I think it’s one of the strengths of the group as a whole. So the methodology has that advantage. And the other one is that it’s easy for newcomers to adapt to it. So this is, of course, an invitation for all of you to come join us. join us, but we develop it so that any country or any researcher can come in at any point and bring their specific situation to the table in a manner that allows us to compare the different situations all around the world. So yeah, I think we can show them the idea of how we’re going to – oh yeah, first the categories that we’re actually mapping. For now, it’s these five. We, as I mentioned, have a methodology on how we’re gathering this information in order to make it easy to compare. But this is very much still open to discussion. If we see that we need to develop more or newer categories, we can do that. And then what we’re aiming for with the results is something, at least for the first part, that looks like the next slide. Yeah, something of this sort. So we’re trying to develop something that can be hosted in each organization’s website so that it doesn’t require people to navigate to another website in itself, but it can be – I mean, it’s the same information presented in many different places. And we’re trying to, for now, just have the more narrative version of it displayed. But this is going to be the building, the stepping stone for probably a more quantitative approach towards ID in the future. That depends on what we’re doing. And as you can see, I mean, some countries are already beginning to be blue. But on this side of the map, we still lack some of your help. So if you’re willing to join, that would be great. And yeah, I think that’s it for the National Legislation Group for now. I guess we can take questions on the methodology and everything on the Q&A. Next up, Marianne.

Speaker 4:
I have a lot of energy. I have all the energy. I have all of the energy that you guys do not have. I stole it. Hi. from Access Now. I am the campaigner for YID, which is our campaign on digital identity. So I was supposed to talk to you. I don’t have phone graphs. I only have this one slide. So I need to have a lot of energy to counteract it. But this is basically what the Multilateral Working Group has been working on for the past year. We have been working a lot and meeting constantly so many meetings. This is not trying to deter you from joining. Like, you can join the meetings as you wish. And as you can, you do not have to be present weekly. I mean, yeah, no, but we have the biweekly. And then we have the working group meeting. So it’s a lot. It’s just I’m saying. I’m just saying we have worked a lot. That is good. So this is basically our effort to build expertise that is across national context and transnational and global, which are all different things, and engaging multilateral forums in a way that is more strategic and coordinated, because we have been doing that, all of us, but separately and uncoordinatedly so far. So basically, the goal is to ensure that all of the community members that are part of the coalition have the timely information and the insights so that they can engage in processes at an international level, but also to be able to understand which tools and which activities and which learning experiences can be developed that integrate the different needs across the globe. So that means that, on the one hand, we, this year, work on a collective strategy for our members, independently, to engage with different processes, such as the UN-GIA High Level Week, where we have different sorts of participation and different types of meetings, and then a debrief session to understand how to work with the knowledge that each of us have acquired throughout the different activities. That also means that we are preparing trainings on technology, the science, and standards, and also on how to engage in this forum, because for each organization, we all have different levels of expertise, and we all have different. approaches to how to engage and where to engage. And also, the coalition has been funding, providing funding for the presence of more members on forums like this one. So a lot of the people who came to this IGF, to the previous IGF, to Ridescone as well, to our meeting at Ridescone, where their travel was funded by them. Also, the YAD campaign, ha, ha, ha, you knew this was coming. The YAD campaign is launching today, a report that we have been working on for an entire year with the community, which was a community effort that many of you were part of at the last Ridescone, providing feedback in our zero draft of this. This is a toolkit that, I don’t know if we have a couple of them still there, but the great part is that now we have a website and everyone can see it on the website. This toolkit aims to help digital rights activists working on the identification systems to navigate the complexities of this topic in an easier way and to provide them with language that might help them get started in campaigning and mobilizing, advocating, educating around the YAD systems. So this is basically a stack of a framework to help us think about the YAD systems. And it came from community effort to understand what the global needs were across different regions. And that is all from me. Thank you. Thank you.

Moderator:
Thank you. Thank you. Excellent. You see? You’ll even have cards. You have tools. So many things, yeah? OK, so we’ve heard from the different presentations. So what I’d just like to give you is three minutes with the person next to you or three of you. Do you have any questions about the community, about the coalition? Is there anything that intrigues you? Yeah, I give you three minutes. Three minutes. Just talk to the person next to you. Not to your phone. The phone is not a person. A laptop is not a person. A person is an actual human being. Yes. Talk to the person next to you. Please talk to each other. I beg, I beg, talk to each other.

Audience:
The entity system can also be found in countries that have many other problems as well. The World Bank and others have been pushing it as a solution.

Moderator:
Hey, people, please put your phone down. Talk to the person next to you. That phone is with you.

Audience:
I have no natural entity system. By the way, by the way, in Iraq, it’s not my national identity. which is very new in Mexico. Sorry? In the passport. The biometric passport. Okay, yeah. So still, there is no biometric in the world. And the big question is then you have to be mindful what they do with that money. Yeah, I don’t know. There will be creative appliances in the future. Government institutions that collect or that are provided by the authorities like the governments or the nearest organizations or the global organizations that provide the digital ID or add it to the wall. And there are others like the tax authorities. But now, particularly right now, like probably next week, the government is trying to pass a law to expand the digital ID that will be like the mandatory ID for all people in Mexico. And so, we’ve been expecting this for a long time. And they have not been able to do that. Yeah. No, in Iraq, it’s…

Moderator:
Okay, can I have your attention, Bob?

Audience:
My passport just came in. No! So there is a biometric thing, which is very new. And in the beginning, most of the countries, they rejected it. Can I have your attention? They asked people to have it around the world. And now they accept it. So, for example, if you are in trouble… Can I have your attention, please? Yes? So, yeah. Okay, what questions do we have? What questions do we have? What questions do we have? There are no questions. I was hoping for at least… No questions for the community? Oh, it’s clear? It was perfect? Okay. Okay, let’s listen. Hello, everybody. My name is Hugo Cordova, and I work for the European Parliament. I’m working currently in legislation to make electronic IDs for Europe. And my question will be for everybody here who wants to answer. We know that these digital identities now are going to be more and more provided by different countries. How this coexistence of these initiatives with the national solutions is going to cohabit, and what is the purpose of one and another? How is the relationship? Thank you. Okay.

Moderator:
Good thing I’m a moderator. Someone from the community will answer that. Do we have any other questions? Take two or three. Any other questions for the community? Yes.

Audience:
Okay, so we are just curious about the impressive work, and we wanted to know how many organizations are in the coalition so far. Yeah.

Moderator:
How many are we? We are so many. Can you even count? Someone start counting, okay?

Audience:
Hi, I’m Camila from EDAC in Brazil, and my question is, how can we enter the coalition?

Moderator:
You have to go through me, number one. Any other?

Audience:
Two questions, yeah. How much does it cost to join, and why don’t you have a better name and acronym?

Moderator:
A better name, an acronym, as compared to? As compared to? OK. That’s another question. Any other? Those were three? OK.

Audience:
Hello, I’m Ale from Brazil. I’d like to hear how the coalition have been influencing multilateral and international organizations such as ID4D and so on. Thank you.

Moderator:
OK. Do we have someone for each of the questions? Can we take any other? Are we ready? Two more, two more points. Are we OK to answer? OK. No, OK.

Audience:
Yeah, Armando Manzuela from the Dominican Republic. Just wanted to know if you are planning to extend the scope of the study you’ve made to other countries as well, especially to other countries, maybe in the same region, the Caribbean, for example? All countries. I don’t know all countries. OK. If that’s the case, I have plenty of information I’m willing to share with you. So you can have from my country, of course. Dominican Republic.

Moderator:
Dominican Republic. OK. Does someone want to be the facilitator? I saw you taking up. OK, great. So let’s start with the first question. The first question? Who’s taking the first question? Oh, yeah, Thomas, there you go. And you’ve got a microphone right in front of you. Oh, yeah, you’re right. There you go. And it works. Hello, hello.

Audience:
So as I understood the question, it’s about the relationship between these national electronic identity systems, supernationals ones. And I mean, we don’t know the answer yet. But my strong assumption would be that we see a convergence. There will be international standards. They will be supported by our phones, by the secure hardware elements on that. So sooner or later, there will be a one-size-fits-all solution for at least, let’s say, particular regions in the world. And my fear is that not in all cases, these systems will be governed democratically and will have privacy by design safeguards that make them safe to use, particularly for vulnerable parts of the society.

Moderator:
OK, thank you. Did that answer your question? OK. There was a second question. Yes, please add.

Audience:
Yeah, I think I would just add to Thomas’s answer. And I don’t think I can speak for the entire coalition, because I think there is some divergence in our views here. And we’re not a coalition that has a set viewpoint or advocacy position on any given digital ID system, I think, because we are such a diverse group and we have such diverse concerns. But I think from an individual perspective, our position of my organization, which is the Center for Human Rights and Global Justice, is that each digital ID system, whether it’s national or supranational, needs to be based on the principle of necessity. So it really needs to be a stronger understanding of where and why certain ID systems are necessary. And that certainly won’t apply to every context in which a digital ID system is currently being implemented. And I think also, just to emphasize the strength of our coalition, is that we have extensive evidence and documentation of the harms that digital ID systems can create and can exacerbate in different contexts. And I think what that has really shown is how important each individual context is, the political context, the economic context, the social context. And that in having an evaluation of how a system should interface, that context needs to be very carefully considered. Because these are not just technological systems, they are socio-technical systems. And it’s very important to situate any kind of analysis about system design, system implementation in the individual contexts of each country and each region.

Moderator:
Mm-hmm, you see that community? I saw people nodding their heads as Caitlyn was speaking. OK, there was another question. What was the other question? There was a question around the number. We have almost 60 groups. Almost 60 groups in the coalition now. Civil society. Oh, there’s a one pager down here at the end with some more information about the community. And there is an email address that you can get in touch with and our new communication system that we set up. Yeah, or anyone in the room. We’re all here to talk to you. OK, does everyone have the one pager? Who has the one pager? Who doesn’t have the one pager? Who doesn’t have the one pager? Really, really, please, please pass that one pager. You must get it. Everyone must get that one pager. Is that the one? There’s another one. It’s the other one. Horizontal. No, this one behind you. That one. Yes, yes, yes. Please, please, please. They didn’t answer your question, Peter. Yeah, you had two questions, Peter. They didn’t answer the second. They are still thinking about it. They are ruminating, ruminating, ruminating. OK, any other questions? Any other questions? Yes, Maria?

Speaker 1:
OK, I don’t need that many microphones. So yeah, I don’t remember who asked this beautiful question that I get to answer now. On our engagement in multilateral forums, but particularly on ID4D. It has been a bumpy road. Is that a assessment of our relationship with ID4D, a bumpy road? But I think that for the last year, we have had a very interesting conversation. It is an ongoing conversation that we had both online and later at RiceCon, and it’s continuing, and it’s ongoing. about there have been some misunderstandings, let’s say, in how we approach digital identity systems from the space of civil society, which is that we are not in the position of a digital ID is bad, necessarily. But that there needs to be a disentanglement between the notion of legal identity as the relationship, the legal relationship, between a person and a state. And digital ID being a tool that is used to accomplish that maybe, maybe, but not necessarily. So there is an identification there that we are trying to disentangle from a conceptual point of view. And then we are working on getting to about the same page on safeguards and remedy. And so there is an ongoing conversation. That is what I’m going to say about that. And I would say that this past year has been very productive for us as a community. And I’m not going to speak on behalf of ID4D, but I think that for them as well. They have expressed so. So that’s that there. Did I miss something?

Moderator:
OK, thank you. No, thank you. OK, OK, OK. Questions? Comments? Yes. Oh, I love.

Audience:
I have a question. I heard a phrase, strategizing public interest litigation. I was wondering if you are doing it. And if yes, how? Secondly, if I could join. So please let me know. OK, let’s take that. Hi, everybody. There was a question. I don’t think it has been answered. It was about how the work has influenced the way we are working. For instance, let me say what Caitlyn was talking about the issues of multinational and national issues. In Kenya, we can give an example. Through the civil societies, Kenya was to launch a digital ID on 2nd of October. But through this platform and a lot of engagement, they suspended it. And through also working together, we’ve seen countries like Uganda, they want to learn more on how Kenya has worked. We’ve worked with Adhar from India and also Jamaica. So at least there is a lot of issues that is happening. Unlike before, not so many people used to know about the issues of digital identification card. But right now, so many people, and the way we are here, there are so many people who are learning a lot from this. So let’s keep it on. Let’s continue. Let’s make more noise. Thank you.

Moderator:
Did you hear that? OK.

Audience:
Hi, I was wondering, I mean, I think we’ve been tracking digital identity for, what, five years or more, probably close to 10 now. And it seems like, and maybe I’m wrong, that there’s like a lot more momentum from a governmental perspective and also from a private sector perspective, kind of that digital identity is going to be, I think it is perceived to be the entry to the digital economy and to digital society. So I’m wondering, over these last years, does the coalition, has the coalition come to a conclusion of what digital identity done right might look like? And is that possible, given that, you know, there’s just so much pressure from a national perspective and from a private sector perspective to implement this, as we’ve seen in, you know, Uganda, Tunisia, you name it. Can it be done right?

Moderator:
Okay. Uh-huh. Laura? Hey, quickly.

Laura Bingham:
Well, I did want to mention something about the strategic litigation question down here, which is to say that that was, in the heat mapping that we did, that was one of the areas where there was a lot of interest across many different members of the community. So in the sharing and learning piece that we talked about, we’re holding a strategic litigation training workshop later this year, so you should join up now and you can come. But there’s a lot of, that was one of the main interests, I think, that got on people’s radar within the civil society communities for transnational exchanges, especially. I had one thing I wanted to say about the question on digital ID done right. You know, I think we get that, I get that question a lot. I think a lot of us get that question a lot. I think it’s the wrong question, because I think just in a lot of what folks have been saying in responding to other responses, other inquiries that have come up, is that things really are contextualized in every single local, national, regional context. And digital ID is never done. It’s the fact that it is implemented and it needs to be monitored and society changes. That’s what we mean when we say it’s a socio-technical system. It’s not done. So it’s not done right. It needs frameworks so that we have constant feedback about people who are being excluded, about the way things are going wrong, because they’re going to continue to go wrong. So I guess that’s, in thinking about the structures that we put in place around it as human beings, that’s how you can get more right.

Moderator:
And they nod their heads again. Okay.

Audience:
Peter, you had something to say about litigation? Yeah, thanks. Peter. from Access Now. We coordinate the Digital Rights Litigators Network. I know there’s some fierce advocates in this room, some folks in the network, some folks who are not yet in the network, but we’re gonna meet on Thursday afternoon, 3.30, and I think digital ID is definitely gonna be on the agenda, so there is an opportunity here for a private meeting on litigation, and we need a better acronym too.

Moderator:
Okay, we’re working on that. I said we are ruminating. We’re thinking, we’re thinking, we’re thinking. Okay, all right. We have a special guest. We have a special guest with us today. We have, who? Who do we have? Who do we have, Laura? Who do we have? We have a special guest. Who’s the special guest? Right there. Who’s the special guest? Who is the special guest? Hey! Yes, we have the UN Secretary General’s tech envoy here with us. Can we welcome him? Welcome, welcome, welcome. You see, when you hang out with this community, you see the kind of people who come into your spaces. Yeah. Okay, welcome, sir. I’d like to give you an opportunity to say something.

Amandeep Singh Gill:
Thank you very much. It’s a great pleasure to join you, and such an important topic. So, the interface of, as Laura put it, socio-technical systems, but I might even add socio-legal technical systems. These interfaces are creating opportunities, but they’re also creating potential problems, even existing problems. So, we need to get them right. And we are very keen to bring together multi-stakeholder partners to build some safeguards, a framework of safeguards around digital public infrastructure at large. So, not just digital ID, but also payment gateways, things that work at the data layer. There is, because of the G20 discussion, many other developments, great interest in DPIs today. More investments are going to come in. So, we have to make sure that these investments don’t result in digital public infrastructure, don’t result in these socio-legal technical infrastructures that violate. safety, security, human rights, sustainability considerations, and that lead to exclusion of marginalized groups. So for that, we’ve launched with UNDP an initiative on DPI safeguards last month, so at a very formative stage, and we would like to invite all of those who are part of this coalition to help us get to that safeguards framework and to help us maintain that, like an international standard that people in the civil society can use as a reference, but also those who are investing in DPIs, who are development cooperation partners on the ground, can use as design principles, can use it to inform their decisions, inform their investments. Tomorrow, and this is a plug in C1 at 9.45, we will be doing an event with UNDP, jointly with UNDP on this issue. It’s the beginning of a conversation, so please help us get this right, and the insights from Kenya, Uganda, India, so if you can, the Caribbean, if you can, Jamaica in particular, we can get those together and put that into a framework that we maintain as a kind of living framework, so version one could be next year with the summit of the future, and we can maintain it after that. Thank you so much.

Audience:
Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Is this? Yeah. Thank you very much. My name’s Caitlin Shafi. I’m a member of the coalition, and I’d just like to say thank you very much to the tech envoy for joining us. I think it’s a fantastic opportunity. There’s been a lot of energy in the room tonight, and a lot of, we’ve already picked up some new members, so I think it really shows the kind of importance and power of this coalition, and it seems to many of us, I think that this is a really pivotal moment with the lead up to the summit of the future, the launch of the safeguards initiative, the critical point that we’re at with the sustainable development goals, and in this room, I think we have a lot of learning about the problems, the solutions, where things can go wrong, and where things can go right, and one of the themes of the beginning of this session was that as a coalition, and as individual members, I think we’re seeking to become more proactive in engaging in some of these multilateral processes, in some of the national level processes, and I think it would just be great to hear from you since we have you in the room today, to hear a little bit about what you see the next six months looking like in this safeguards process, where will be the key opportunities to engage so that we, as coalition members, as a group, can be prepared for them, and I think the final question is really how do we ensure that the engagements go deeper than a kind of unilateral consultation process, which I think is always something that civil society is keen to engage in, I think a lot of members here are very active in contributing inputs, but I think what we’re really seeking here is a real exchange, the opportunity to give feedback, receive feedback, and be more engaged in a truly participatory process, so how can we work together with you to make sure that that is a reality in the kind of next six months?

Amandeep Singh Gill:
That’s a great question, so we are currently in the process of putting together a governance structure for the initiative, so there’ll be an advisory board, there’ll be a steering committee, and also in the process of putting together a list of learning partners, those who have been engaged on these issues, whether it’s the Digital Public Goods Alliance, DILE, the GovStack initiative, so that we can bring these players from the DPI ecosystem into this initiative and learn from their experiences. In terms of the engagement, the consultations with civil society, also with the private sector, in some cases they may be the lead actors in developing digital ID and other layers of DPIs, if they are arranged in a stack, so we will develop a plan for engagement all the way up to the summit of the future, where version one can be stood up next to, hopefully, a good, ambitious global digital compact, so that this is seen as a concrete manifestation of, yes, we want to advance on the SDGs by leveraging DPIs, but we want to do it responsibly in a human-centered, human rights-respecting manner. But I do want to ask my colleague Moritz, who’s into the design of this initiative, check if he has anything to add.

Speaker 5:
Thank you, Amandeep. Pleasure to be here. My name’s Moritz. I work as an advisor on Amandeep’s team. Just referring to your question on how civil society can engage in the process, we will have multiple convenings up to the summit for the future, where we will collect input on the process. We are also planning to set up a platform where you can share the experiences that you’ve made, should you not have the possibility to engage in person during the convenings. Yeah, and we will be sharing updates on that process in the next two months, I would say, something like this. And yeah, if you have questions about that, feel free to reach out. We are looking forward to engage with you.

Moderator:
Fantastic, thank you. We’ll just see, do we have any other questions? We’re having a conversation here. Yes, yes, behind. I think that microphone works. You can give him that one. Thank you. Yes, please.

Audience:
Good evening. I was really asking myself, should I ask this question? But let me just ask. My name is Mustafa from Kenya. In Kenya, for example, UNDP signed an MOU with the government of Kenya without engagement, community engagement in terms of civil society, in terms of community, and without any policy in terms of launching a digital ID until the civil society were up in arms and all that when the government was actually launching it in September. But it was pushed. So I was asking, at this level where there’s already an existing MOU, how do we engage with the UNDP? Because there’s a lot of risk of digitizing exclusion because we are digitizing 5,000 services and all of them are pegged to a digital ID. And in Kenya, there’s no access, the accessibility of digital, leave alone digital ID. The current ID system is less than 50% penetration level. And now all 5,000 services, including health services are going to be linked to a document that is not accessible. So how do you protect that the UN does not? as a bit exclusion. And it also promotes issues of accountability. For example, this one, we don’t even have a data protection impact assessment, leave alone a human rights protection impact assessment. So how do we hold the UN accountable in that situation and also get to get information, right to information from the UN sector? Because in this sector, we don’t clearly alienate you from government actor or civil society compatriot. Because we are like, which side do we put you? Are you part of the government now? Are you going to support civil society? Sorry, I don’t want to look combative, because that’s the situation that we are in. You’re just engaging. Yes. And I’m very passionate, because my community has been locked out of these systems for 100 years. So seeing it, we look at it as digitizing marginalization. So how do we hold the institution accountable and even get information in terms of what are the lines of engagement with the government? What are the protections, mechanisms that you have negotiated in terms of on behalf of civil society and all that? I would love to interact more on that. But in case, I know my questions are ambiguous. But in case you pick any that you feel like you can address now, I really appreciate.

Amandeep Singh Gill:
Great point. And I have a very simple answer to that. Help us build it. So build it together with us. And help us maintain it so that we can all be held accountable. If UN agencies are the ones who are kind of building out DPIs and digital services on the ground, you can hold them accountable as per the safeguards framework.

Moderator:
OK. So working together in community, right? OK.

Audience:
Just to add a bit to what the Secretary-General just said. The best thing a government can do is to develop their critical systems, their main systems, the central systems that sustain main public services, world public services, should be using open source technology. Because open source technology help us to not just to understand how things work, but also opens up the possibility for the technical communities from our same nations or other countries around the world to contribute and to see what we’re building upon. It gives us the possibility to understand that most government systems can be safe, can be secure, and also develops trust. Especially in the context where we’re digitizing everything. And in the context of digital, it’s the same. So in order to prevent most of the situations that most countries are facing with their digital systems, an open source technology should be the best. And that’s the thing that we’ve been doing in the DR.

Moderator:
Great. So there’s an experience to learn from there. OK. Any other comment? Any other question? OK. One more, and then we’ll be wrapping up. OK.

Audience:
Just to respond on, there is, we’ve worked with UNDP. And one of the things that we were told, actually we had a very direct conversation, was kindly work with the government. Because you said, have a simple, we give you ideas on simple way to work. But in most cases, when we give out these ideas, we are told, you have a very good government. You can go and listen to them. But in real sense, the government doesn’t listen to you. For instance, we were brought into a room to agree that we’ve decided to work together with government as civil societies. To an extent, there was a white paper that was provided. We did not know. To an extent, public participation, the government was saying they have done. It hasn’t, it has not been done. So what room is there for us to really work with the UNDP and UN to be able to share the same ideas? To be able to share this? Because there is platform, as you can see, but now having that conversation, it’s not there. And also, there is one question that Brett asked that has not been answered. There has been progress, as we cannot say that the government is really not doing so. For instance, through advocacy in Kenya, we’ve seen some communities have been recognized as a community. They can be able to access these digital platforms. And also, things like Data Protection Act, which weren’t there, they’re still there. So there are still opportunities that we’ve seen.

Moderator:
And your question?

Audience:
Yeah, I don’t have a question.

Moderator:
That was it, okay, okay. So I think what you’re, do you want to respond to?

Amandeep Singh Gill:
I think if you come to the event tomorrow, our colleagues from UNDP will be there, because I don’t have the background to this white paper and the interaction with the government. So we can discuss it tomorrow.

Moderator:
Exactly, the conversation will continue. You said nine what? 9.45, 9 a.m.? You can plug in again. 9.45. 9.45, where?

Amandeep Singh Gill:
C1.

Moderator:
C1, did we hear that? No? 9.45, where? C1, okay. An opportunity to continue the conversation. Can you imagine? The conversations don’t just end here, they continue, they continue online. Oh my goodness, oh, this community. Okay. Any other comments, any other questions? Okay, I think I can wrap up, anything? Four minutes, we have four minutes. Okay, yes, it seems you’re joining the community. By the way, members, can you put up your hands so that if people want more information, you know who to talk to? Okay, fantastic.

Audience:
I don’t have a question, I just want to make a statement that, you know, I’m from India, and India is always glorified with our DPI structure as like the outstanding model, and it’s going to push your economy to blah, blah, blah levels, and you’re gonna gain like trillions of dollars, and et cetera, et cetera. But I think there is a lot of myth that surrounds. And I think that’s the reason why I want to join the community, because, you know, to address the myth before even thinking about starting this kind of an infrastructure in your country, because you should ask whether you needed or not, and are you going to face the problems that India suffered? Because India suffered massively, because it started when I was studying law, and now I’m in the position where I’m researching in this kind of structure. So I myself have seen that it had its own problems, and you need to work it out. I guess that’s it.

Moderator:
Thank you. All right, okay, you can also ask her about the community. Okay, any other comments, any other questions? Can I wrap up now? Yeah? Okay, okay, thank you all so very much for being part of this conversation. The conversation continues. Please get the one-pager if you want to get to know any other information about what the community does. Please enjoy the rest of your evening, the rest of your day. Asante sana. Thank you.

Audience:
I don’t know if you have someone to speak to. Yeah, I mean, actually, I’m happy to have you. Yeah, me too. I’m really happy to join the conversation. That’s lovely. I don’t know, just send an email, or? I just received this email. The best is to send to this IE admin at system.org. Okay. And then our community will receive the email, and we should maybe also just introduce you to a few of the people, so. Laura Bingham, the blonde lady over there. And it’s like, but you are absolutely right. We have many members from Africa, and. No one is speaking Arabic. I can, we have like a. Ah, you could be right, yes. I’m a partner of T4Beast. T4Beast, we do supervision, digitalization, security. So, we think that we are the biggest in the MENA region as a practitioner. We are close partners in META, and also we are certified by AFC International for our tech area as well. That’s a perfect match. Yeah. So, let me. Yeah, yeah. I am, I am the founder and president of the organization. Which is, I’m living in the Netherlands, because of, you’re right. Yeah, yeah. And you can Google me, like, I’m very easily found. Yeah, me too. You can. No, no, no. It’s brilliant, so you are a perfect match, let’s send that email and we’ll get the ball rolling. Thank you very much. Nice to meet you. Nice to meet you. Nice to meet you. Nice to meet you.

Amandeep Singh Gill

Speech speed

147 words per minute

Speech length

766 words

Speech time

312 secs

Audience

Speech speed

176 words per minute

Speech length

3514 words

Speech time

1197 secs

Laura Bingham

Speech speed

168 words per minute

Speech length

309 words

Speech time

111 secs

Moderator

Speech speed

166 words per minute

Speech length

1942 words

Speech time

700 secs

Speaker 1

Speech speed

181 words per minute

Speech length

1273 words

Speech time

422 secs

Speaker 2

Speech speed

178 words per minute

Speech length

507 words

Speech time

171 secs

Speaker 3

Speech speed

161 words per minute

Speech length

740 words

Speech time

276 secs

Speaker 4

Speech speed

166 words per minute

Speech length

719 words

Speech time

259 secs

Speaker 5

Speech speed

180 words per minute

Speech length

143 words

Speech time

48 secs

Encryption’s Critical Role in Safeguarding Human Rights | IGF 2023 WS #356

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Sharon Polsky

Encryption plays a vital role in maintaining confidentiality and privacy across various sectors, including law and healthcare. Lawyers, doctors, and policymakers rely on encryption to safeguard sensitive information and prevent unauthorized access. The positive sentiment towards encryption is driven by its crucial role in protecting client confidentiality and patient privacy. Encrypted communications ensure secure strategy discussions for lawmakers and policy analysts.

Another important argument supporting encryption is the universal need for privacy, whether it is for personal, business, or national security purposes. Encryption is viewed as a fundamental tool that helps individuals protect their privacy. This positive sentiment emphasizes the significance of maintaining encryption as a fundamental aspect of upholding privacy rights.

However, there are concerns about the lack of understanding of technology implications in legislation. The negative sentiment surrounding this issue suggests that uninformed legislation can lead to unintended consequences. Many people use technology without fully comprehending its intricacies, including lawmakers and policymakers. This lack of education and understanding poses challenges in creating effective and well-informed legislation.

Child protection is a pressing concern, but the negative sentiment arises from the concern that laws aimed at protecting children through breaking encryption could result in harmful consequences. These laws might create vulnerabilities in encryption, potentially endangering everyone’s privacy. Furthermore, it is argued that children reporting abuse might be mistakenly flagged as suspects if encryption is compromised.

The need for lawmakers to have a correct understanding of the technology they regulate is highlighted. The negative sentiment stems from the observation that many current lawmakers lack a thorough understanding of encryption technology. Some members of parliament come from non-technical backgrounds, which hinders their ability to comprehend the nuanced aspects of encryption.

Canadian legislation, such as Bill C-18 and Bill C-26, has raised concerns about potential infringements on privacy and freedom. Negative sentiment arises from the observation that these laws allow Canada to govern internet content globally. This broad regulatory reach can undermine privacy and freedom, raising questions about the potential overreach of government intervention.

It is also worth noting that other platforms outside Canada may face challenges in complying with Canadian legislation, as they are not bound by the Canadian Charter that protects individuals against government overreach. This negative sentiment stems from the observation that foreign companies are forced to execute censorship measures, which may conflict with their existing policies and obligations.

The importance of regulators having a proper understanding of what they regulate is emphasized. This positive sentiment highlights the criticalness of regulating technology with a thorough understanding of its impacts and consequences. Sharon Polsky’s argument supports the need for regulators to possess comprehensive knowledge of the technologies they oversee.

Education is proposed as a long-term solution to bridge the gap in understanding technology implications. The positive sentiment suggests that starting from the youngest grades, education should include topics like laws, political structures, and critical decision-making related to technology. This approach aims to equip future generations with the knowledge to create effective legislation and understand the potential risks associated with technology.

Tech companies are criticized for prioritizing shareholder returns over user privacy. The negative sentiment arises from the observation that corporations primarily focus on maximizing profits for shareholders. The promise to prioritize user privacy is viewed as unreliable, as companies are seen as bound to eventually fail in protecting user privacy.

There is a growing awareness among the general public about the monetization of personal information. This positive sentiment suggests that people have become increasingly frustrated with seeing their personal information being used for financial gain. The expectation is that individuals should have control over their personal information and how it is used.

In conclusion, encryption is seen as an essential tool for maintaining confidentiality and privacy in various sectors, but there are concerns about the lack of understanding of technology implications in legislation. The legislation aimed at protecting children through breaking encryption has raised concerns about potential unintended consequences. Education is proposed as a long-term solution, and there is an increasing focus on the need for regulators and policymakers to possess a comprehensive understanding of technology. Tech companies are criticized for prioritizing shareholder returns over user privacy, and individuals are becoming more aware of the monetization of their personal information. The expectation is that companies will have to adapt their practices to meet the demand for better privacy control.

Rand Hammoud

Encryption is widely regarded as crucial for ensuring online security, safety, and trust. It plays a vital role in safeguarding human rights by providing a secure means of communication and organization for activists, lawyers, and human rights defenders. These individuals rely on encryption to protect their freedom of expression and assembly.

However, concerns have been raised regarding the vulnerability of encryption to exploitation by the surveillance industry. It has been argued that these vulnerabilities are harnessed by a billion-dollar surveillance industry, leading to human rights abuses such as enforced disappearances and extrajudicial killings. Such abuses pose significant risks to activists, undermining their ability to protect their rights.

Governments often assert that undermining encryption is necessary for national security. However, there is widespread fear that such actions would make surveillance cheaper and easier, potentially resulting in privacy infringements. There is growing use of spyware against human rights activists and journalists, highlighting the urgency to ban spyware vendors and technologies associated with human rights abuses. Spyware is unregulated and unchecked, and despite the existence of legal frameworks branding surveillance as illegitimate, it continues to be used.

Existing international standards already render surveillance capabilities invasive. The argument that law enforcement requires spyware to maintain national security and safety is contested, as there is no evidence to support its effectiveness in these areas. On the contrary, there is ample evidence indicating that spyware infringes upon individuals’ rights and diminishes their safety.

Undermining encryption is tantamount to assuming everyone is guilty until proven innocent, fundamentally contradicting the existing surveillance system. This highlights the need for an international framework to define surveillance and encryption. Such a framework should be aligned with the spirit of existing rights protections, fostering greater accountability and transparency.

However, advocating for the use of surveillance technologies in autocratic governments presents its own challenges. Limited advocacy avenues and the difficulty in implementing rights-respecting frameworks in such contexts hinder progress in this area. On a contrasting note, economic arguments can be employed to protect the economic advantages of certain companies.

Overall, there is a pressing need for a more comprehensive, global, and international framework governing the use of surveillance technologies. Given the borderless nature of technology, jurisdiction-dependent regulations are inadequate. By establishing clear guidelines and regulations, a more balanced and accountable approach can be adopted, ensuring the protection of human rights and promoting global security.

In conclusion, encryption is integral to online security and the protection of human rights. However, the vulnerabilities of encryption and the misuse of surveillance technologies pose significant risks to individuals and their rights. Upholding encryption and establishing a global, rights-based framework for surveillance technologies are crucial steps to safeguarding privacy, enhancing accountability, and preserving fundamental rights in the digital age.

Tate Ryan-Mosley

This analysis explores various arguments regarding end-to-end encryption and backdoor access. Advocates emphasise the importance of end-to-end encryption in ensuring internet security, particularly in messaging apps like Signal, Telegram, and WhatsApp. These apps employ end-to-end encryption to safeguard user data, ensuring that only the intended recipients can access and decipher messages. Notably, tech companies that create such encrypted apps do not possess decryption keys, enhancing their security.

On the contrary, critics argue that creating a backdoor to encryption would compromise its security. They contend that establishing a master key or any form of backdoor access would be challenging to control, potentially enabling misuse by bad actors or governments. Tech companies vehemently oppose compromising encryption security, as weakening it could have significant implications for user privacy and data protection.

The United Nations (UN) supports strong encryption and concurs with those who assert that encryption backdoors contravene freedom of expression. The UN underscores the imperative nature of robust encryption to enable human rights advocates and journalists to function securely, preserving confidentiality and security.

Lawmakers are currently grappling with the task of addressing harmful online content moderation while maintaining encryption security. They are deliberating ways to gain access to secure communication channels, particularly given the increasing migration of internet users to private platforms like messaging apps. This shift has made monitoring and preventing the dissemination of abusive or harmful information more challenging.

Furthermore, it is essential for lawmakers to possess accurate knowledge of technology to prevent unintended consequences in their legislation. A pertinent example is the scrutiny of the UK online safety bill and similar legislation in Canada, which may inadvertently compromise encryption in an effort to safeguard children. Concerns have been raised that such well-intentioned legislation could endanger everyone, including children, by enabling unauthorized access through encryption backdoors.

Alongside discussions on encryption and backdoor access, the analysis highlights the media’s coverage of non-Western countries. It argues that the press should strive for better representation and reporting of international stories, acknowledging issues such as biases and racism that can influence media coverage. The press is encouraged to maintain openness to improvement and be accountable for their reporting.

In conclusion, the analysis underscores the crucial role of encryption in internet security, while emphasizing the need to strike a balance between public safety and preserving privacy and human rights. It underscores the significance of encryption in protecting free speech, human rights, and the work of journalists. It also highlights the necessity for lawmakers and the press to possess a comprehensive understanding of technology to make informed decisions and enhance their practices.

Roger Dingledine

The discussions revolved around the topic of encryption and privacy, specifically examining their impact on society. Encryption was highlighted as a vital tool that allows individuals to have control over their personal information, offering them the ability to determine who can access their data and ensuring a sense of privacy and security. It was particularly emphasised that encryption is invaluable for vulnerable groups such as minorities and human rights activists, as it plays a crucial role in ensuring their safety.

However, the proposal for backdoor access to encryption was strongly rejected. The argument put forth was that incorporating a backdoor feature in encryption would undermine the entire concept, compromising the safety of everyone. It was emphasised that if a mechanism to break encryption is created, it can be exploited anywhere in the world, regardless of the country, leading to potential misuse. This raised concerns about the weakening of society and the possible dangers associated with backdoors in encryption.

The discussions also highlighted the intrinsic connection between security and privacy. It was argued that security and privacy are essentially two sides of the same coin, both being crucial aspects of individuals’ lives. Instances of identity theft were cited to illustrate the intertwining nature of security and privacy. Furthermore, the reliance of FBI agents, who play a significant role in maintaining security, on tools like TOR was mentioned, underscoring the importance of both security and privacy in their work.

Another significant point of discussion was the adverse effects of false positives generated by automated content moderation tools. It was highlighted that AI-powered systems are not infallible and can produce false positives. This means that innocent users may be falsely reported and labelled as criminals due to errors in content moderation. The potential consequences of such misreporting were stressed, as they can have serious implications and ruin lives.

The discussions also touched upon the unrealistic expectations of politicians who desire technological solutions that provide both privacy and enable surveillance. It was argued that such a solution is currently not technologically feasible and can potentially result in exploitation. Tech companies were criticised for deceiving governments by promising to develop such technology for significant sums, despite its impossibility. The need to strike a balance between privacy and surveillance was emphasised, particularly considering the long-term effects of compromising safety.

Regarding specific tools, the discussions highlighted the significance of encryption in Tor. It was mentioned that Tor is not solely for resisting surveillance but also for resisting censorship. The widespread use of tools like Tor was deemed vital for their effectiveness and safety. It was emphasised that as more common tools incorporate real encryption, it becomes a normal part of everyone’s daily life, rather than being perceived as a sign of political dissent.

Additionally, the discussions raised concerns about the compromising stance of some tech companies on privacy. It was noted that certain tech companies prioritise profit over users’ privacy rights, especially when accessing large markets like China, Russia, Saudi Arabia, and India. This practice was criticised as it enables dangerous actions against user privacy.

In conclusion, the discussions on encryption and privacy shed light on the importance of encryption in safeguarding personal information and the need to have control over its access. The idea of backdoor access to encryption was strongly rejected, highlighting its potential for misuse and the weakening of society. The inherent connection between security and privacy was underscored, with a particular focus on the negative consequences of false positives from automated content moderation tools. The unrealistic expectations of politicians in balancing privacy and surveillance were criticised, while the importance of widespread use of tools like Tor was emphasised. The compromising stance of certain tech companies on privacy for market access was also challenged. Overall, the discussions provided insights into the complex and multifaceted nature of encryption and privacy in contemporary society.

Speaker

The analysis reveals that companies often fail to prioritize privacy, despite claiming to do so. This can be attributed to their primary focus on maximizing returns for shareholders, which raises concerns about the genuine value placed on privacy in corporate decision-making.

Another pressing concern is the negative impact of cybercrime and spyware on economies. Billions of dollars are lost to cybercrime each year, with industry statistics supporting these claims. Moreover, the economic damage caused by cyber threats can surpass the economies of certain nations, emphasizing the need for effective measures to combat cyber threats and protect against economic losses.

On a more positive note, it is acknowledged that Artificial Intelligence (AI) has the potential to contribute positively, particularly in the field of medical advancements. The application of AI in healthcare can drive innovation, improve patient outcomes, and enhance overall well-being. This suggests that if properly harnessed, AI technology could play a significant role in advancing healthcare and addressing societal challenges.

In light of the alarming statistic that millions of people’s genetic identities have been compromised through privacy breaches, it is concluded that government action is imperative. Government intervention is needed to protect individuals’ privacy rights, maintain the integrity of sensitive data, and establish robust regulations that hold companies accountable for any lapses in privacy protection.

In summary, the analysis highlights the tendency of companies to overlook privacy concerns in their pursuit of maximum shareholder returns. The negative impact of cybercrime and spyware on economies serves as a wake-up call, emphasizing the need for comprehensive cybersecurity measures. While opportunities for positive contributions through AI exist, safeguarding privacy must remain a priority. Ultimately, government action is necessary to address privacy breaches, protect individuals’ data, and safeguard the interests of society as a whole.

Smith

The speaker at the event politely requested participants to form a queue at the microphone and introduced herself. She emphasized the limited time remaining and expressed the desire to address both of the upcoming questions within the given timeframe. The speaker’s request for concise questions was to ensure enough time for comprehensive answers. Additionally, the importance of participants introducing themselves before posing questions was highlighted, fostering respect and engagement.

As the queue formed, there was a sense of urgency to address the remaining questions. With only one minute left, the speaker urged the next person in line to promptly ask their question to not miss the chance for a response. This showcased the speaker’s commitment to effectively addressing all inquiries before the session ended.

In conclusion, the speaker’s management of the Q&A session demonstrated professionalism, consideration, and a strong focus on maximizing the remaining time to accommodate participants’ questions.

Audience

During the discussions, various important topics were explored, shedding light on the challenges and complexities surrounding technology, human rights, privacy, and accountability.

One significant point of discussion was the danger posed by encrypted apps in countries with authoritarian regimes. It was argued that the use of encrypted apps can actually endanger users in such countries. The Turkish government was cited as an example, using the presence of encrypted apps as evidence against individuals, highlighting the fact that autocratic nations often learn and adopt oppressive policies from each other. The call was made to consider the context and oppressive governmental practices when assuming the safety of encrypted apps for all users globally.

The biased media coverage of technological issues and human rights abuses was also extensively addressed. It was argued that Western-centric media tends to give more attention to issues in Western countries. Non-Western governments’ tech requests or laws often do not receive as much coverage, despite the potential replication of policies in similar geopolitical contexts. The need for a more global perspective in technology and human rights reporting was emphasized.

The lack of accountability for big tech companies in their interactions with autocratic nations was another key concern. It was pointed out that big tech compliance in autocratic governments is increasing, and these companies are often willing to compromise on human rights for financial gain. There was a call for increased scrutiny and accountability to ensure that these companies are held responsible for their actions in autocratic nations.

The potential for mandated encryption backdoors was also raised, particularly in the context of the UK’s online safety bill. One audience member expressed concern about this possibility and the implications it may have for privacy. The stance was against the implementation of mandated encryption backdoors.

Surveillance capitalism, the practice of tech companies using user data for profit, was identified as a concerning aspect of privacy. It was acknowledged that while governments are mostly blamed for surveillance, tech companies also play a significant role in exploiting user data for financial gain.

The rights of victims of child sexual abuse material (CSAM) were highlighted as often being overlooked. This raised the issue of the need for greater attention and support for victims of such abuse.

The discussion also revealed that, in many cases, tech companies prioritize their revenues over human rights. It was pointed out that companies encrypt data extracted from users primarily to prevent competitors from accessing it, rather than for the protection of user rights.

Double standards in abiding by privacy laws were identified as a problem. Tech companies were found to comply with laws in autocratic states but often ignore those in democratic states, indicating a lack of consistent and ethical practices.

The potential cybersecurity risks associated with data encryption on internet protocols were highlighted. It was argued that the inappropriate use of encryption can weaken cybersecurity, emphasizing the need for careful consideration and implementation.

Finally, the importance of adapting advocacy messaging to different regions was raised. It was noted that different parts of the world may require tailored approaches to effectively communicate and advance human rights and justice.

In conclusion, these discussions shed light on the complex issues surrounding technology, human rights, privacy, and accountability. They highlighted the dangers of encrypted apps in authoritarian regimes, the biased media coverage of technological issues, the need to hold big tech companies accountable, concerns about privacy and surveillance capitalism, overlooked rights of CSAM victims, tech companies prioritizing revenue over human rights, double standards in privacy laws compliance, potential cybersecurity risks of encryption, and the importance of adapting advocacy to different regions. These discussions call for greater awareness, scrutiny, and efforts to ensure the protection of human rights, privacy, and justice in the rapidly evolving digital landscape.

Session transcript

Tate Ryan-Mosley:
plain text. And so with end-to-end encryption, even the tech companies that make encrypted apps actually do not have the keys, as they would call it, to break the ciphertext. But more on that later. Most commonly, when we talk about end-to-end encryption for the average internet user, we’re talking about messaging apps like Signal, Telegram, and WhatsApp. But there are different variations of encryption. So HTTPS, for example, protects websites and website activities, and even some devices are fully encrypted with passwords and passcodes, like an iPhone, for example. And encryption has actually been debated from a policy perspective really since the beginning of time, for 20 or 30 years, as authorities have sought access to encrypted messages and devices. This access is commonly called a backdoor, and authorities or law enforcement agencies that have advocated for backdoor access often will say, you know, we just want access to some messages on a case-by-case, restricted, small-scale, targeted allowance. In the past, of course, tech companies argued that doing so would have pretty substantial risks to encryption as a whole, because the creation of a sort of master key, which doesn’t exist today, would be really hard to control from bad actors, inappropriate government uses, and just generally weaken encryption. Opponents of backdoor access say that, of course, law enforcement can’t really be trusted with this type of access, plus it’s not really how the technology works. And additionally, strong encryption is necessary for human rights advocates, journalists, and free speech more generally. Historically, the UN has actually sided on the side of the opponents of backdoor access, saying that encryption backdoors are contrary to the freedom of expression. So in the past, we’ve seen the encryption debate pop up really during times of crisis, when law enforcement agencies are looking for a particular piece of intelligence in a high-profile case like the San and Bernardino shootings in the US or the Paris bombings, both of those in 2015. But currently we’re seeing this debate crop up in the form of online safety and content moderation most commonly. There’ve been a handful of bills in the US and globally, US at the state level, but also Australia, UK, places, Canada that we’ll talk a little bit about today that are threatening encryption. So we’re gonna talk about all of this today in light of also the growing use of surveillance technologies by governments around the world and what we might do to strengthen encryption protections. So as a reminder, we will have some time for questions at the end. So please do think of them throughout our chat so that you’re ready to shoot them out to our lovely panelists at the end of this. So now that we’re kind of all on the same page about what we’re talking about, I wanna pass the first question to Roger, which is Roger, why do governments, law enforcement agencies, anybody really want backdoor access? What are they getting at?

Roger Dingledine:
Yeah, so that’s a broad question. I mean, the fundamental conflict here is between society being safe and national intelligence, law enforcement, governments wanting control in these cases. So the way that I look at this is the question is about privacy. And by privacy, I mean control or choice about your information. So if you are successfully having privacy, and one of the ways to get that is through this encryption that we’re talking about, then you get to choose who learns things about you. So that’s my definition of privacy. And one of the interesting characteristics of it is vulnerable populations need it more, find it more valuable. So if you already have a lot of power, if you’re a nation state or a Russian mafia or whatever large powerful group, you already have power. It’s not so important for you to have. an extra layer of privacy. Whereas if you’re a minority, LGBT, journalist, human rights activist, and so on, then it’s much, then this is one of the most important things for you to retain control of your own safety. Yeah, and Roger, kind of sticking with you on that point, when governments or law enforcement agencies, you know, whatever party is in control, asks for backdoor access to encryption, from a technical point of view, why is that a slippery slope? Like, why is that such a risky request? Yeah, so there are several problems here. One of the big problems is, math doesn’t know what country it’s in. Technology doesn’t know what country it’s in. So if you, let’s say you have a country with perfect rule of law, I don’t know where you’d find one of those, but let’s say you have one of those. And in that situation, the judicial process gets to decide who can break the encryption and whose messages we’ll look at. That same tool is going to be used elsewhere in the world, and there are other countries who are going to try to reuse the same mechanism for breaking the encryption. So even if in the US we had a perfect judicial system, which we don’t, what do the tech companies do? What do the tools do when the judge in Saudi Arabia asks for that same access? So the fact that there are different countries in the world is one of the main challenges to having this whole backdoor concept make any sense at all. And I guess the other way of saying that is this notion of a backdoor that law enforcement keeps asking for weakens society as a whole. It makes everybody less safe. That’s not a worthwhile trade-off.

Tate Ryan-Mosley:
Rhonda, I want to pass it to you because. you work with protecting free expression and people on the ground who are doing human rights work, how have you seen encryption being used to protect activists or even citizens who are just expressing their voices?

Rand Hammoud:
Thanks, Tate. I think one of the main things that comes up when it comes to encryption and protecting or safeguarding or enabling even fundamental rights is the fact that it is one of the biggest technologies today that is the foundation of security and safety and trust online. And so it’s enabled activists, lawyers, human rights defenders, dissidents to securely communicate, organize and protect their freedom of expression and assembly. And so if we go ahead and undermine encryption, we are thus undermining their ability to do so. And we need to place this conversation within the context of an already pervasive surveillance industry where even with strong encryptions and even when we do have data that is now encrypted and safe, we already have a large billion dollar industry that is working day in and day out to find vulnerabilities to exploit and already survey these individuals and place them at risk and thus putting them in harm’s way and even causing and enabling grievous human rights abuses such as enforced disappearances, extrajudicial killings. And so the conversation around safeguarding encryption needs to also be aware of the already existing surveillance capabilities of governments and malicious actors.

Tate Ryan-Mosley:
Yeah, I think that’s such a good point. And one thing, Sharon, I want to ask you about is even from an economic perspective, encryption is essential to data protection activities at normal businesses, right? So, yes, as Roger spoke about, you have these grave power imbalances between activists and states, but also you have people at their jobs who are protecting sensitive information who rely on encryption. Can you talk about that use case as well a little bit?

Sharon Polsky:
Absolutely, and you’re right, it’s not just the human rights people and the advocates, but it is every day people in business, and the one area that is seldom mentioned is also the lawmakers themselves. Whether you are a lawyer who has to maintain client confidentiality, or you’re a doctor and you have to maintain confidentiality of your patient information. If you’re a lawmaker, a strategist, a policy analyst, and you’re in discussion with your colleagues, you don’t want somebody else being able to infiltrate and figure out what you are strategizing. So everybody has privacy issues, whether it’s for personal privacy or for business and economic, and actually for national security reasons. Maintaining encryption is absolutely fundamental.

Tate Ryan-Mosley:
Yeah, and I think, Rhonda, I want to pass it back to you. We’re in a room, I’m sure with some policymakers, at a policymaking conference. How do you think we should respond to governments who want backdoor access to encrypted technologies, and who stands to gain and who stands to lose? Do you trust them?

Rand Hammoud:
I think to piggyback on what my fellow panelists just said, undermining encryption is also a national security issue. And so when you look at it that way, no one stands to gain. It will place national governments at risk, the same governments that are advocating for undermining encryption will be themselves at risk. And then democratic processes are included within those risks. Because when you think about journalists, activists, essential people that uphold democratic processes being at risk, or having to self-censor because they know that they could be surveyed in such a way that is mass scale, really, when you talk about undermining encryption, then that whole process is lost. And so I think from my point of view. view, there is no one left to gain except, you know, individuals or malicious actors who want to survey those people, and who want to gain access and, you know, who want to exercise population control, because essentially, that is what undermining encryption will do, it will make surveillance so much cheaper, it will take us into, you know, pre Snowden revelation days when, you know, there was mass surveillance from governments and companies. And so there is no one to gain, there is no one that is going to gain and as we shouldn’t be trusting backdoor accesses, or any sort of pretexts that really are not even technologically sound.

Tate Ryan-Mosley:
Yeah, and I feel like you’re picking up on one kind of key tension that has been in this narrative for a long time, which is, you know, our security and privacy opposing things. Can we have both? How do you achieve both? And Roger, I wanted I wanted your perspective on that, like, to what extent is this binary of security and privacy real?

Roger Dingledine:
Yeah, so security and privacy are the same thing in a lot of ways. Imagine you give out your financial data, and then somebody does identity theft on you. So going back to your example of encryption being a national security thing, I was at an FBI conference years ago. And the I talked to a bunch of FBI people, and some of them use TOR, and some of them fear TOR. And one guy was saying, surely you have some sort of backdoor, right? Surely you have some way to learn what people are doing on the TOR network. And I explained to him, I pointed to his colleagues and said, these people just told me today that they use TOR and rely on TOR every day for their job. Do you want me to have a way to learn what they’re doing on the internet? So from that perspective, it’s a, it’s a national security. It’s a security. It’s a privacy. They’re all the same. They’re all the same sides of the same coin.

Tate Ryan-Mosley:
Yeah, Sharon, do you want to expand on that?

Sharon Polsky:
I have to agree with Roger, it is all connected, and it’s all too often that people will talk about one aspect or another without relating, without connecting the dots, and you absolutely have to. But the problem I’ve found through my career, and that’s been dealing with governments and policy people and corporations, there’s been very little education about these things. We use the internet, we use computers, but a lot of people, unless you live it, unless you’re a Roger and you design these protective mechanisms, most people just use them. And that’s a problem because they know how to use it to a very small degree, they don’t understand the implications of what they’re doing quite often, and that also falls over to the lawmakers and the people who prepare the research and the briefing notes for the lawmakers. If they don’t understand what the technology is about, what the risks really are, and the unintended consequences of the legislation they draft, then they are building something that is going to create a world of problems, and for that I look to things like various pieces of legislation in Canada, some have just come in, some are still on the books being debated, and the so-called Online Safety Act in Britain. They’re all being promulgated as necessary to protect children, and doesn’t everybody want to protect children, that’s the argument. Of course we want to protect children, they are among the most vulnerable, but if you undermine encryption to ostensibly protect children, other people will also be able to get through that back door and endanger not only the children, but everybody else, and it is the very children who will be endangered because the way the laws are being written, the content will have to be scoured automatically, proactively, automatically reported to police if it is suspected as potentially, maybe, possible. being in child sexual abuse material. So what happens when a child has been abused and wants to report? Their content gets stopped and reported and they are the ones who become the suspects. In Canada, a child is chargeable under the Criminal Code of Canada as of 12 years old. Imagine the possibilities and the unintended consequences of breaking encryption.

Tate Ryan-Mosley:
Yeah, and I’m really glad you brought that up and I want to get a little bit further into the specifics here because I think, you know, this is where we’re hearing a lot of the encryption debate. You know, if we have a lot of encrypted messaging, if we have a lot of really secure portals for communications, we can’t moderate those spaces. And we know that internet users are increasingly moving to private spaces in this age of, in this current, you know, moment of social media. And so lawmakers are saying, hey, you know, what can we do about all this abuse information? What can we do about, you know, all of this, you know, bad, harmful content that’s being passed through people that that tech companies themselves and governments have no visibility into. And you brought up the UK online safety bill. This was obviously a big one. Australia, India, the U. S. We’ve also seen some discussions of, you know, providing either technical or real backdoor access to encrypted messages. I’d love to know, Sharon, like, can you tell me something kind of specific about some of the bills in Canada, where you see, you know, an unintended consequence or a misunderstanding from lawmakers of, you know, the technology or the ramifications?

Sharon Polsky:
Absolutely. And really, I don’t have the imagination to make up the stories, the examples that I will cite. I had a conversation with one of our current members of Parliament about a year ago. We were talking about this because the legislation in Canada was just being formulated. And I said, but if you break encryption for some, so that all the content can be monitored and she stopped me and I went, break encryption? No, I don’t think that’s how it works. And changed the subject. She, like many of our current members of Parliament, come from journalism. They’re educated, they’re worldly, that’s great, but they don’t get it. We have, you might have heard of Bill C-18 that just became law to update the Broadcast Act and that sounds wonderful except it now includes not just radio and television but it includes governing the Internet globally. Canada has taken it upon themselves to declare that they will govern the content. Combine that with another piece of legislation on the books, Bill C-26, and we refer to them by their numbers because unlike the United States, Canada has a history of creating legislation with very lengthy, hard to say names, not nice, concise, easily said acronyms. So Bill C-26 is another piece of legislation and that one is going to amend the Telecommunications Act to create the Critical Cyber Systems Protection Act and like the others it’ll infringe on privacy and freedom. All of these will narrow identified gaps. They do, if you look at it from a certain perspective, have a legitimate application protecting children, preventing terrorism, preventing all the ills and harms that we see so often, the very same things that were going on long before the Internet became a thing. But the problem is everything is going to be surveilled, as Ran said. That is a problem particularly because when everything is surveilled and the various pieces of legislation say some content And we will deem, we will have our separate agencies deem as misinformation, disinformation, unwanted content. The government will not be the one to do the censoring. The law will have the platforms do the automatic, routine, mandatory proactive screening. Those are outside of Canada, outside of the reach of Canadian law, of course. So it’s actually a very interesting way that they’ve created it, because similar to the Americans who have constitutional rights to freedom of speech, we have charter and protected right to freedom of expression, and the charter protects Canadians against overreach by government. So it’s not going to be the government committing overreach, it’s going to be the companies that the charter doesn’t cover. The companies will just do as the law requires. And that affects everybody, including everything from children to the elderly in every walk of life, including the politicians themselves.

Tate Ryan-Mosley:
And on that point, I mean, luckily for us, we have someone on this panel who runs a tech company, Roger. How do you think about balancing privacy with content moderation? I mean, I know this is not the Tor Project’s bread and butter, but we do know that there have been the proliferation of child sexual abuse material on some private messaging apps. So is there an approach that balances these two things? Can you achieve some level of moderation and encrypted privacy?

Roger Dingledine:
Yeah. So, fortunately, Tor is a communications tool, not one of these platforms. So we don’t have content to moderate in the way that Facebook and so on have. But from… from the So everything Sharon said is right, but it’s worse than that because you were talking about If the technology behaves in a perfect way, then it’s still bad for society But the reality is for example in the UK online safety bill. They’re imagining there will be magic AI machines that perfectly just look at pictures and perfectly decide correctly if they’re bad pictures or not bad pictures and The reality is AI doesn’t work that way. It’s not perfect You’re going to have some false positives and let’s say you have 2% of the time It says that’s a bad picture and it shouldn’t and there are 10 billion pictures being sent each day Then 2% of the users are going to get reported each day for being criminals And maybe they can drive the false positive rate from 2% down to 1% So now it’s only tens of thousands of people being misreported and having their lives ruined because the the math screwed up a little bit for them, so it’s definitely a challenge here because the politicians want this reality to be possible and it isn’t but they want it to be possible and There are all sorts of for-profit tech shark scam companies that say oh, yes yes, yes, give me millions of dollars and I’ll build a magic thing for you and it will be magic and The reality is it’s not going to work. It’s not going to do what what people want But the politicians really want it. They they they would love to have a technology solution to be able to give people privacy while also Surveilling all of them, but the reality is that the tech does not support the things that they’re wanting

Tate Ryan-Mosley:
Yeah, and just some context if people aren’t familiar these are you know, I’m sure you’re referring to a handful of technologies some of which are you know, message franking, client-side scanning, server-side scanning, and really the idea behind these types of technologies, they are different, so I’m sorry for painting with a broad brush here, are technologies that basically allow a machine to evaluate the content underneath the encryption, so that there’s not a person, you know, reviewing necessarily the content of encrypted messages, but there’s a machine checking and saying, oh, you know, this might be child sex abuse material, for example, and in the UK law, you know, it was a stipulation of the UK online safety bill that, you know, technically feasible, I think, was the terminology they used, you know, had to use those type of technologies, and then it was recently, just a month ago, repealed because the technologies do not exist or change, that part of the bill was changed, and I really like, Roger, how you said, you know, let’s talk about reality today, and Viranda, I want to pass this back to you, so talking about reality today, what sort of protections do human rights advocates, journalists need right now when it comes to, you know, protecting their own privacy and protecting themselves against government surveillance?

Rand Hammoud:
So, I think there are two main subjects to this kind of answer, and when it comes to protecting themselves from government surveillance, it mainly takes us into the idea that, you know, even before we get into undermining encryption, we already are in a space where spyware is largely used against, you know, human rights activists, dissidents, etc., and with the most recent reports that Amnesty put out, it’s become even cheaper today, for example, a predator infection costs €9,000 only, when years ago it was much, much more expensive, and so the technology is proliferating, and it is off the shelf, it is unregulated, unchecked, and governments, and who knows what other actors, are just using it against human rights activists, lawyers, journalists. And so the first thing that we need to tackle or the governments need to tackle is firstly ban spyware vendors and technologies that have already been used to enable human rights abuses. And then talk about establishing the safeguards that are needed in order to have a more human rights respecting framework to use certain digital surveillance technologies in a way that does not infringe on human rights. If that framework exists, but we first need to be able to have multiple safeguards that would ensure that even if these technologies are used, there is a mechanism to access remedy, a mechanism for investigations, et cetera, which largely even in spaces that it exists today is not respected. And we see that where there are multiple democracies where there are legal frameworks that deem the surveillance illegitimate, but it is still happening. And so the conversation around the protections, the legal protections that we need should also look into why the technology is proliferating in such a way and the pretext behind why it exists or the need behind why it exists. And the pretext that law enforcement needs this kind of technology today to ensure that everyone is safe is completely false. We have not seen any evidence that this technology has helped in any way to maintain national security or make anyone safe. But we have plenty of evidence of it making people less and less safe and infringing on their rights.

Tate Ryan-Mosley:
Yeah, absolutely. I think that’s a really interesting point. And Roger, I wanna pass it back to you. I mean, so what can tech companies do and how are tech companies responding to both, I would say, increased surveillance, increased demand for access to citizen data and also to this kind of policy moment? I mean, tech companies are beheld to the laws that govern them. So what are you seeing from the tech side?

Roger Dingledine:
Yeah, so tech companies. is not a monolith. There are a bunch of different sides to the technology world. In terms of the huge companies like Apple, it’s interesting to notice that Apple is mostly on society’s side in this, where their users want safety, and Apple wants to give them safety. And it’s actually in Apple’s interest to give them safety, because if Apple had the ability to watch everything that they’re saying over messaging, then they’re a target for people trying to break in and harm the users. So in this sense, we’re aligned with groups like Apple. On the other hand, we haven’t said the word crypto wars yet, but we have to look at history and we have to look at the fact that governments have been asking for weakening security over and over for years. And for example, in the West, for internet routers, like the backbone pieces of the internet, each router has a port called a lawful intercept port. And the idea is you go to a judge and you say, I want to be able to watch all the internet traffic going along this part of the internet, because there’s a bad guy and I want to be able to watch him. And the judge thinks about it and says, okay, sounds good. And then you plug into the lawful intercept port and you get to listen to all of the internet traffic there. And I was years ago talking to a group in the German foreign ministry, and they were trying to figure out, should we regulate, as Rand was talking about, should we regulate these spyware tools? How do we decide what counts and what doesn’t count? And there was an engineer from Dubai telecom there who was like, you guys put the lawful intercept port in. And when my prince in Dubai asks, what’s that port? And I say, oh, that’s the lawful intercept port. And he says, plug it in. Like the jurisdiction is is wildly different, but the tool works the same in Dubai versus the US versus Europe. So to bring it back to Tate’s question, part of the things that the tech companies need to think about here is this is a recurring theme where governments keep asking for more and more access, more and more weakening. And there are side effects, such as having lawful access ports on backbone internet routers, which can be used well and wisely and are often not used well and wisely. So every time we think about weakening safety for society, we need to think through where that’s going to go in the future.

Tate Ryan-Mosley:
Yeah, and we’re just about ready to take some audience questions, but Roger, I wanted to ask you to just expand on that last point before we bring in any audience questions. So have your questions at the ready. But when it comes to thinking about this globally, as you said, technology doesn’t know boundaries. There is this kind of competitive market for both spyware and privacy technology. How do you think about how might we foster a global approach to encryption protecting framework for governance? Again, a big question for you.

Roger Dingledine:
Yeah. So the answer isn’t to make all of society less safe. That cannot be the answer. And it is frustrating that the US and the UK and Europe are so excited to do that. And it’s especially frustrating at the same time as each of these countries is signing the Freedom Online Coalition, the Declaration for the Future Internet, the Global Compact, all these acronyms we’re hearing about at IGF this week. We’ve got countries saying that they value safe. for society, yet here they are trying to to pass these laws each year. So yeah, how do we, I guess, so it can’t be mass weakening. A lot of countries then look at the targeted attacks, the ones that Rand was talking about, where they go to some Israeli company and they buy the ability to break into their specific target’s phone and bypass encryption and other mechanisms. And in a sense that’s better. At least it’s not mass attacks. At least it’s not harming everybody. But the reality there is we keep seeing these targeted attacks being used against not just journalists and bloggers and activists, but French politicians and the Parliament members in Germany and so on. So that’s, I’d like to live in a world where the targeted attacks are the better answer, but that seems like a pretty bad answer also. I guess the, as a technology person, I’m good at explaining why things won’t work. But the best solution that I have is we need to maintain strong security for all of society, meaning we need encryption to work well. And as Rand was saying, we need to start regulating and deciding what small arms dealers are allowed to do in the software vulnerability exploit space. And I mean, yeah, we could go on and on about this, but I’ll pause for other people to jump in.

Sharon Polsky:
And I’m gonna do just that, because I think for the people who are going to create the regulations, if they don’t have a proper, correct understanding of what it is they’re regulating, what the impacts of not regulating, regulating in a certain way, regulating completely, if they don’t get it, then regulating is going to be… a Band-Aid approach. The long term that should have started many, many years ago is education from the youngest grades, not just in how to use a computer, how to use these wonderful devices that do provide convenience for the good among us and the opportunists among us, but educate people about everything from how are laws made, what is democracy, what are different types of political structures. Give them the education so they can make critical decisions and grow up to build systems that don’t provide the very same problems we’re tackling and struggling with now.

Roger Dingledine:
Ultimately, we need to normalize what encryption is. So one great success story is HTTPS. It used to be that governments and law enforcement said, but if everybody has encryption when they go to websites, society will collapse. Think of the children. What would happen if we aren’t able to watch what you do when you connect to a website? And now, whenever you do your online banking or you log into the IGF website or any website, you use HTTPS. It’s normal. They fought that fight. We won. Let’s look to that as an example where we need to somehow figure out how to make society safer for the next round also.

Tate Ryan-Mosley:
Yeah, and I want to pass it over to Ron to get your perspective on this. What can we do to take a positive step forward globally?

Rand Hammoud:
I think the answer is actually quite simpler than many policymakers would like to hear, because they would want to know that it’s a complicated manner. And so use that to not pass progressive laws. But really, the international standards that we already have are quite strong. We already have many rights respecting laws and rights pushing laws. And so when we look at international standards for due process, for fair trials, for freedom of expression, et cetera, they already render surveillance capabilities as invasive as they stand right now illegitimate. Surveillance in the sense that would be promoted when encryption is undermined is basically assuming that everyone is guilty until proven innocent, which is the opposite of what should be, what should happen. And it brings to the consciousness of the state people who are not guilty of anything. And so it already is sort of an unlawful kind of attack. So really what we need to do is be able to enshrine in an international framework what surveillance and encryption means, inspired by the spirit of what we already have, which is strong international protections for our rights as they stand.

Tate Ryan-Mosley:
Yeah, and I feel like the infrastructure approach is something that is increasingly, I don’t mean to put words in your mouth, but it feels like that’s a similar approach that you’re advocating for that has also been applied to areas like anti-censorship technologies and that space as well. So I want to pause and see, are there any questions either online or in the room? If it’s online, you can just add them to the chat. And in the room, please make yourself known and I will take care of you.

Roger Dingledine:
We’ve got some hands in the room. So go to the microphone and-

Smith:
Yeah, go to the mic and get in line, please and thank you. Please introduce yourself before your question, that’d be great.

Audience:
Can you hear me? Yeah. Hi, I’m Handa Nuslu. I work for Google at the Trust and Safety Function and Policy Implementation for a while. And then I founded Turkey’s Internet Observatory, Gözlemeve. So what I want to ask is I actually have questions for three of you. So for Roger firstly, so when we talk about protecting human rights activists, I feel like the conversation is sometimes assuming a functioning democracy and the functioning government that kind of is really willing to protect the citizens. So that really doesn’t apply outside of Western Europe and outside of the US. So what we see in here, for example, in Turkey, we see that people are, so when there is any encrypted app found on someone’s phone or someone’s computer that can be used as evidence to support a case that someone is doing something illegal. So if TOR project, if I’m using TOR on my computer, that can actually endanger me. So it might be more safe in terms of surveillance, but it’s not safe if we talk about the tools of oppressive governments, for example. So I was just wondering if you’re discussing, if you’re talking about human rights activism and if you’re talking about protecting democracies, is there any context or any information that you ever get on how autocracies work? Because the problem is these countries, they learn from each other. So any law that pops up in a country is likely to be transferred. And so, for example, as someone who works in technology and human rights and democracy, we do not suggest some of the telegram or signal. Yes, it is encrypted. Yes, it’s open source, but it might put you in more danger because of this. So that’s my question to Roger. I also have a question to Tate, actually. So when we see about, because I’ve been following MIT Tech Review and we do have a lot going on in Middle East and in other countries, and what we see is that these are not being reported often. So there might be an issue in the US and it will get a lot of news and presence. But when the Turkish government or some other government or any government has a big tech request and this big tech company complies or some other stuff happens, these things would get a lot more, I feel like, coverage if it was happening in other countries. But like I said, when problems happen in a country, it’s not just for that country. It’s probably going to be replicated. If there is a law popping up in a certain country, for example, against encryption, it is very likely to be replicated in a similar geography. So I was wondering if you have any insights on maybe improving the coverage on just going beyond the Western look on how human rights issues and human rights activists could be protected. And for you, sorry, Sharon. Yes, I’m bad at remembering sometimes. But my question is, because you mentioned that you do talk a lot with the government’s bodies. and you are in interaction with them is, what percentage of your work is actually focusing on holding big tech companies accountable? And if that is a perspective, because, again, big tech compliance in autarkic governments is growing a lot. And these companies, they really want to earn a lot of money, and they are willing to give up every single human rights. And so, for example, Messenger is encrypted, but we have learned from Facebook officials that they do actually give information, chatting information, once it’s requested. And these are not requests based off of security reasons. So it’s not a request to identify someone who has been missing for a while. They’re mostly politically motivated. So these are my three big questions to you. Thank you.

Roger Dingledine:
Should we try to answer them now, or should we take more? What’s the right way to… One at a time. One at a time. Okay. So you’re absolutely right that there are not as many functioning democracies in the world as we would like. In fact, if you know a good functioning democracy, please let me know. In terms of the safety of having tools like Tor installed in dangerous places, there’s actually a really interesting synergy, because Tor is not just for resisting surveillance, it’s also for resisting censorship. And in a lot of countries, like Iran, and now Russia, and Turkey, and so on, there’s a lot of censorship. So the average Tor user in Iran is using it to get to Facebook, because they blocked Facebook. And that means the average Tor user in Iran is an ordinary Facebook user who’s just using it to get around the censorship. Yes, there are some political dissidents in there, but the average user is an ordinary citizen. And that ordinariness is an important security property for having these tools. And similarly, as the whole world moves to not just Telegram or Signal, but WhatsApp and iMessage, and as more ordinary tools… tools get real encryption, it becomes a normal thing that everybody has, not a sign that you’re a political dissident. So you’re absolutely right. And the tools need to become pervasive and ordinary in order to be safe.

Tate Ryan-Mosley:
I can briefly answer the question, and also just a reminder so that we can get to all the questions. We can all try to be brief in our responses. Thank you so much for that question. It’s a very important question. I don’t know if I can give you a very satisfying answer, other than it shouldn’t be that way. And I, as an individual reporter, and us as Technology Review, are constantly trying to be better about this. I think, frankly, you get into all of these issues with journalism, and local journalism, and journalism business models right now. And racism, and where people pay attention, and who people pay attention to, I think those are all parts of the answer to your problem. But certainly, the press can and should do better at covering countries outside of the West. And so thank you for encouraging me to do so. And feel free to send me tips at any point as well. And I will do my best to cover international stories more.

Sharon Polsky:
I appreciate your question. Do we deal directly with the tech companies? No, we tend not to. We deal with putting on the record what is going on. So when we spoke to the Canadian Parliament about facial recognition, or about spyware, we put on the record the billions of dollars, the statistics from industry, as to what sort of contribution those industries, cybercrime, spyware, what do they contribute to an economy? And often, it’s larger than some nation’s economies. And we put on the record what the impact is. And of course, it’s very simple. As you said, companies are not interested in your privacy or mine. They are interested in providing the greatest return possible for their shareholders. That is their raison d’etre. So for them to say, and this isn’t specifying one company or another, for them to say, we take your privacy seriously, we will protect it. I think that’s a promise that nobody should try to make because it’s inevitably going to fail. We need to see governments recognizing what the problems are, realizing that the tech companies, yes, they certainly do provide employment, innovation, and for perfectly legitimate and wonderful purposes. You know, using AI for medical advancement, that’s great. Using AI so I can pay whatever the fee is today to spit into a vial and have my DNA analyzed by a company in the United States that says in their so-called privacy policy online, we will protect your privacy, and then they are breached. This just happened. And millions of people’s genetic identities have been spirited away. You can’t change your genetics. You can change your password. Do governments understand? Do the bureaucrats and the lawmakers and the policymakers understand? No. When it happens to them, that, I find, is when things might start to change. So we do a lot to increase their awareness of these risks.

Speaker:
Thank you for these questions and answers. Why don’t we get a question from this line here?

Audience:
Good morning. I’m Masayuki from Japan. I’m academic. This may be a bit extreme, but it’s kind of related to the previous question. Do you have a plan of action for when the backdoor is somehow, I mean encryption backdoor is somehow mandated, since we finally avoided the worst with the UK online safety bill barely and I think the fight will be continued, especially in Japan or anywhere, so thank you.

Roger Dingledine:
Do we have a plan of action for when the backdoors are really, really required? Is that the question? We will never put a backdoor in Tor. We will never undermine Tor security. I don’t care what the laws say. So we’re going to have to wrestle with whatever the political policy implications of that is. We’ve got EFF, ACLU, a bunch of legal organizations in Europe and the US and around the world who want to fight these things and I hope they succeed. We will never weaken Tor security.

Sharon Polsky:
If I can add to that, I think the most important part is that people are now becoming aware and I don’t mean just people in technology or in the privacy realm or certain policy makers, I mean the general public has gotten fed up with seeing their personal information monetized. They are starting to ask questions. I’m working with some people who are developing systems so it will completely change the dynamic. No longer will you have to submit to whatever the so-called privacy policy is on a website. You will have control over whether, when, how much, to whom your personal information goes. You will be in control to flip things around. Companies aren’t going to like it but when the people who are their bread and butter now say we’ve had enough, they will have to change how they do it and that’s going to be a plan of action.

Smith:
So we have four more minutes. I want to try to get both of these questions in. So if the answers could be brief that would be great. This line next.

Audience:
Andrew Campling, I’m a consultant on Internet standards and a trustee of the Internet Watch Foundation. A couple of quick comments, and I’ll try to be brief. In the discussion, the title is about human rights and it’s mainly been about privacy. We’ve largely, up until the last answer, ignored surveillance capitalism, if we’re going to talk about privacy. We focus on evil governments, and it seems to deflect attention from what the tech sector does itself to users, and arguably that’s a lot worse. We’ve ignored the rights of the victims of CSAM to focus on the rights of others at their expense, and I think we need to acknowledge and talk about that. We’re treating privacy as an absolute right, whereas certainly in Europe it’s a conditional right. Other human rights are absolute rights. Often now we’re protecting the conditional right to privacy at the expense of the absolute rights of people whose other rights are being infringed, such as the CSAM victims. We need to acknowledge that when we have the blind use of encryption, that can weaken privacy. So when you apply encryption to Internet protocols, that can actually weaken cybersecurity, and if you don’t have good cybersecurity, you have no privacy, even when you think you do, and I think that’s a significant problem. We need to acknowledge that most of the tech companies, and I accept not the ones here probably, they’re not defending my human rights, they’re defending their revenues because they’re encrypting the data that they’re extracting from my endpoint to… when they surveil me, and they don’t want their competitors to access that data. That’s why they want the encryption, not to protect my rights. That’s an interesting byproduct to justify the encryption. And then finally, and acknowledging the comment you just gave on Tor’s position on backdoors, almost all of the big tech companies absolutely compromise their approach to privacy in order to have market access in some of those very problematic states. So you don’t have a private relay in China because it’s illegal. But they will cheerfully ignore the laws in democracies, but will comply with the laws in more autocratic states. And I think that’s pretty problematic as well. And I’ll stop there. Thank you.

Roger Dingledine:
Yeah, we could definitely have a session on surveillance capitalism and the evils of large tech companies and how they’re attempting to primarily maximize their profit rather than actually caring about their users. One of the points that we tried to make here is there are some synergies, some overlaps, where at least in this case, Apple is interested in privacy, first of all, because it’s good for marketing. People ask for it this year. But also because it helps them have less surface area for attack so that they don’t have as much that they have to worry about for people trying to attack their users. But you’re right that that doesn’t make Apple great. And it’s also an excellent point that many tech companies choose to design their approaches with China, Russia, Saudi Arabia, all the other interesting big markets around the world, India in mind, and that causes them to do bizarre and dangerous things for their users.

Smith:
I think we have. like one minute left so if you could ask your question hopefully we can fit in an answer.

Audience:
I just want to build on the the first question really and ask about the mechanics of advocacy in different countries and and parts of the world so take one of the examples you mentioned was India and I’m just wondering whether there’s a sense in which you need to adapt the messaging and and the arguments around this to different parts of the world.

Tate Ryan-Mosley:
Ron do you want to take that I feel like you have a good perspective better than I would certainly.

Rand Hammoud:
Yeah sure I think that’s a very good point of course you know using the same narratives within different contexts doesn’t always or isn’t really fruitful it’s not as productive as you would hope of course when we are trying to do any advocacy within autocratic states that have no regard for human rights we cannot be using a human rights kind of based argument which is when you kind of talk about national security and how that is also kind of in the interest of the state or also use economic advantages or economic kind of arguments to say you know there is business espionage how do you protect kind of the economic advantages of certain companies a competitive advantage of certain companies and that’s when you know other companies come on board and try to as you know as Roger was saying and try to become allies in this space and so it is definitely incredibly important to make sure that we’re using the appropriate narrative within the advocacy spaces that we are using but also to be very mindful that you know the advocacy avenues in some contexts are just not there it is really difficult to talk about you know a rights respecting framework for the use of surveillance technologies in autocratic governments or even in democracies these days which is why we need to look at it as sort of a more global or international framework because you cannot depend depend on the jurisdiction where this technology is utilized. The technology doesn’t, the infrastructure is there. And so we cannot control how well or how bad it is utilized. And so that’s why we need to look at a more international framework for the use.

Tate Ryan-Mosley:
OK, I just want to say thank you so much to everybody for all of your questions, for your comments, to all the panelists, and Al for the participation in today’s panel. I hope you all learned something. I certainly did, and I hope you have a great time at the rest of the day’s events.

Audience:
Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th th

Audience

Speech speed

136 words per minute

Speech length

1480 words

Speech time

652 secs

Rand Hammoud

Speech speed

180 words per minute

Speech length

1406 words

Speech time

469 secs

Roger Dingledine

Speech speed

175 words per minute

Speech length

2566 words

Speech time

880 secs

Sharon Polsky

Speech speed

151 words per minute

Speech length

1751 words

Speech time

694 secs

Smith

Speech speed

176 words per minute

Speech length

83 words

Speech time

28 secs

Speaker

Speech speed

226 words per minute

Speech length

19 words

Speech time

5 secs

Tate Ryan-Mosley

Speech speed

177 words per minute

Speech length

1987 words

Speech time

673 secs

Education, Inclusion, Literacy: Musts for Positive AI Future | IGF 2023 Launch / Award Event #27

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Siva Prasad Rambhatla

The analysis highlights various important aspects relating to the impact of technology on education. Firstly, it emphasizes that technology is a medium that is guided by humans, and it has proven to be extremely useful in facilitating education during the COVID-19 pandemic. The supporting facts provided in this regard include the fact that humans play a crucial role in feeding into technology and guiding its development. Moreover, it is acknowledged that technology has been instrumental in enabling educational continuity while traditional in-person learning has been disrupted.

However, another significant finding of the analysis is the existence of a digital divide that poses challenges to education. This digital divide is characterized by disparities in access to technology and online education resources. The research highlights the fact that not everyone has access to the necessary equipment and broadband connectivity, thereby hindering their ability to fully participate in online learning. An illustrative example is given where students had to resort to climbing trees to receive internet signals. This digital divide is particularly pronounced during the COVID-19 pandemic and it disproportionately affects individuals from disadvantaged backgrounds, exacerbating existing inequalities.

To address the educational needs and promote inclusivity, it is argued that education should be more inclusive, multicultural, and locally relevant. The analysis stresses the importance of adopting AI learning models that are designed to be inclusive of diverse perspectives and cultures. Furthermore, it highlights the need to recognize that subject learning cannot be universal and should be tailored to the specific cultural contexts and needs of different communities.

The analysis also sheds light on the challenges posed by generative AI, particularly in the context of copyright and plagiarism. It is pointed out that generative AI technology has the potential to bypass traditional learning processes and facilitate easy content generation, which can have negative consequences on the creative thinking ability of learners. This aspect raises concerns about copyright infringement and plagiarism, indicating the need for safeguards and ethical considerations in the use of generative AI in education.

On a positive note, the research suggests that AI technology can fill gaps in the shortage of teachers and instructors, and it also provides opportunities for innovative course design. However, it is emphasized that the design and implementation of AI technology should be approached with caution to fully harness its potential. This implies considering ethical implications, promoting transparency, and ensuring proper oversight to mitigate potential risks and biases that may be embedded in AI algorithms.

The analysis underscores the existence of a real and persistent digital divide, which is influenced by socioeconomic and cultural factors. It is observed that individuals with access to infrastructure and resources benefit more from digital advancements, while socioeconomic and cultural backgrounds contribute to the perpetuation of this divide. The presence of international groups is found to slightly reduce this divide, indicating the potential of collaboration and global initiatives to address the issue.

It is also highlighted that biases and discrimination in AI algorithms pose a significant challenge. The analysis acknowledges the existence of biases and discrimination in AI algorithms and emphasizes the need to address these concerns. The research does not provide specific supporting facts in this regard, but it implies that efforts should be made to identify and rectify biases to ensure fair and equitable outcomes.

A noteworthy observation from the analysis is the importance of governmental intervention and the involvement of private firms in bridging the digital divide and countering exclusions and biases. The research suggests that governments and private firms should invest in initiatives to reach larger sections of society and ensure that technology is accessible to all, regardless of their socioeconomic or cultural background. This would require strategic planning, substantial investment, and collaborations between various stakeholders to create a more inclusive and equitable educational landscape.

Finally, the analysis highlights the need for academics to propose alternatives to address biases in the digital medium. Further research and discussions are needed to explore innovative approaches and strategies that can mitigate biases and promote fairness in the use of technology in education.

In conclusion, while technology has played a valuable role in education, it is important to address the challenges posed by the digital divide, generative AI, biases in AI algorithms, and the need for inclusivity and local relevance. Governments, private firms, and academics all have a crucial role to play in ensuring that technology is harnessed ethically and equitably to enhance access to quality education for all.

Renata de Oliveira Miranda Gomes

The presence of digital platforms has significantly increased in higher education, particularly during the COVID-19 pandemic. These platforms have incorporated artificial intelligence (AI) to revolutionise the learning process and facilitate new ways of exchanging knowledge. One such tool, chat GPT, has emerged as a valuable resource in enhancing learning experiences.

The speakers highlight the advantages of incorporating digital platforms and AI in higher education. Firstly, the ease of access and availability of digital platforms have made learning more accessible, especially during the pandemic when in-person classes were disrupted. Additionally, the incorporation of AI has allowed for innovative learning methods and the exploration of new ways to deliver educational content.

One of the major concerns expressed is the gap between students and educators in accepting these new platforms. Some resistance stems from the fear that these platforms may facilitate plagiarism or promote shortcuts in assignments. However, this stance is neutral, indicating a need for further dialogue and understanding between students and educators to address these concerns effectively.

Despite the concerns raised, chat GPT emerges as a promising tool for learning. It has the potential to save time by generating bullet point summaries or highlights of reading material. Moreover, its use can foster the development of critical thinking and analytical skills among students.

The speakers emphasize the importance of collaboration between educators and students in the effective use of AI in education. They highlight the significance of users influencing AI’s functionality and tailoring it to meet specific learning requirements. This collaboration can lead to a more beneficial and effective integration of AI in education, ensuring its positive impact on achieving SDG 4: Quality Education.

Furthermore, the inclusion of AI in initial learning processes is seen as an important step towards transforming education. The state of Piauí in Brazil has taken a notable stride by including AI in its high school curriculum, making it the first state in Brazil to do so. This initiative demonstrates the potential for AI to enhance teaching and learning methodologies at an early stage.

Overall, the speakers express a positive sentiment towards incorporating digital platforms and AI in education. They acknowledge the potential benefits of these technologies in improving access to quality education and fostering a more innovative and effective learning environment. With further collaboration, dialogue, and understanding, the successful integration of AI in education can be realised, ultimately contributing to the achievement of SDG 4: Quality Education.

Lee Rainie

Elon University is taking a stand in upholding the essential principles for the Internet and Artificial Intelligence (AI), which are crucial for safeguarding human rights, autonomy, and dignity. The university is diligently following these principles, which bring time-tested truths to the age of AI. By doing so, they ensure that the development and use of AI technology align with ethical considerations and respect for individual freedoms.

As the influence of AI spreads, universities like Elon recognize the need to study and disseminate insights about how this technology impacts people. They understand that AI is rapidly surpassing our cognitive capacities and becoming a prominent part of our lives. Therefore, it is essential for higher education institutions to promote new literacies and best practices to empower individuals and equip them with the necessary skills to navigate this AI-driven world.

In the age of AI and smart technologies, human traits such as critical thinking, sophisticated communication, teamwork, and emotional resilience are becoming increasingly valuable. These unique qualities distinguish humans from AI and need to be honed. Universities like Elon acknowledge this and emphasize the importance of identifying and exploiting these distinctively human traits and talents. By doing so, individuals can find their place in a world where AI is becoming more integrated into various aspects of society, including the workforce.

It is crucial to recognize that AI should serve humans and not the other way around. This principle is advocated by experts like Mr. Rainie, who emphasizes the importance of domesticating technologies to serve our needs and enhance the well-being of individuals and communities. Acknowledging and implementing this principle ensures that AI technology is developed and utilized in a manner that prioritizes and respects the interests, autonomy, and dignity of human beings.

In conclusion, Elon University’s commitment to upholding the principles for the Internet and AI is commendable. Their efforts in studying the impact of AI on society and promoting new literacies and best practices are crucial in preparing individuals for an AI-driven future. Recognizing the distinctively valuable human traits in the age of AI and advocating for AI technology to serve humans are essential for maintaining a balance between technological advancement and human well-being.

Audience

The discussion centered around the use of Artificial Intelligence (AI) in education and its potential impact. One argument highlighted the gap in expectations between university administrators and students regarding the use of AI. The law faculty at Leiden University expressed opposition to AI implementation, revealing a negative sentiment. On the other hand, the argument in support of using AI with caution emphasized proper attribution and the need to address misinformation. It advocated for alerting students about the dangers of misinformation and displayed a positive sentiment towards AI in education.

Another concern raised during the discussion focused on the potential for AI to worsen the digital divide, particularly among marginalized groups. This concern was exemplified by the significant digital disparities in countries like Bangladesh. It was feared that AI would primarily benefit technologically advanced individuals, further marginalizing those without access. This argument conveyed a negative sentiment towards AI, suggesting that it could exacerbate inequalities.

The discussion also emphasized the importance of embracing technology in education and ensuring AI is accessible for lifelong learning and marginalized groups. It stressed the need to integrate AI in lifelong learning while addressing the challenges faced by certain demographics in accessing AI-based public services. This perspective showed a positive stance towards AI, advocating for inclusivity and reduced inequalities.

Additionally, the lack of sensitivity and ethical standards in AI development by STEM professionals was criticized. The argument highlighted a negative sentiment towards the apathy or lack of interest among STEM workers in developing AI ethically. This raised concerns about the ethical implications of AI development and the need for stringent ethical standards.

Furthermore, there was a call for diversifying AI engines beyond corporate control. This view expressed a neutral sentiment, advocating for the exploration of open-source alternatives and diversification of AI engines. The aim was to move away from the dominance of corporate entities in AI development.

In conclusion, the discussion on AI in education highlighted various arguments and concerns. While there was an expectation gap between university administrators and students regarding AI, there was also support for using AI with caution and proper attribution. The potential exacerbation of the digital divide and the importance of inclusivity and accessibility in lifelong learning were significant considerations. Additionally, the lack of sensitivity and ethical standards in AI development by STEM professionals raised concerns. There was also a call for diversifying AI engines beyond corporate control. These insights shed light on the complex considerations and diverse opinions surrounding the use of AI in education.

Connie Book

In their discussion, the speakers emphasise the importance of taking into account human well-being and inclusivity in the face of artificial intelligence (AI) advancements. They argue that while AI can bring about many benefits and innovations, the focus must always be on the welfare of individuals and society as a whole. To achieve this, they stress the need for strong policies and regulations to guard against the negative consequences that AI can potentially have.

The speakers advocate for digital inclusion, asserting that access to AI technologies should be a right for all, particularly within educational institutions. They believe that universities and colleges play a crucial role in ensuring that AI is not only accessible to everyone but also integrated into the educational curriculum. They call on the higher education community to become active advocates for digital inclusion, providing opportunities for individuals to gain knowledge and understanding about AI.

Furthermore, the speakers assert that teaching and learning are experiencing significant transformations as a result of AI. They highlight the importance of academic leaders in shaping these changes by creating policies and designing new approaches to education that incorporate AI technologies. Faculty members are encouraged to adapt to these advancements and collaborate in the development of innovative teaching methods.

The need to prepare learners for the ongoing AI revolution is another key point addressed by the speakers. They stress that education must go beyond imparting theoretical knowledge and focus on equipping individuals with practical skills that enable them to adapt to the rapidly changing landscape of AI. They believe that by fostering a mindset of lifelong learning and providing hands-on experiences, individuals can be better prepared for the challenges and opportunities brought about by AI.

In conclusion, the speakers highlight the importance of prioritising human well-being, inclusivity, and education in the era of AI. They call for the implementation of strong policies, digital inclusion, and collaboration within the educational community to ensure that AI advancements benefit everyone and do not leave anyone behind. They urge universities and colleges to lead the way in incorporating AI technologies into the curriculum and preparing learners for the ever-evolving AI landscape. By doing so, they believe that individuals can be empowered to thrive in a world marked by accelerated change and innovation.

Francisca Oladipo

The analysis focused on several key aspects of artificial intelligence (AI) and its impact on education, ethics, policy-making, diversity, and continuous learning. The speakers argued for the role of universities in providing a comprehensive AI education that goes beyond technical skills. They stressed that AI students should be encouraged to study subjects like philosophy, finance, healthcare, and social sciences to develop a well-rounded understanding of AI’s applications in various fields.

In terms of ethics, the speakers acknowledged the importance of safeguarding against the abuse and misuse of AI. They emphasized the need to promote ethical AI practices and educate individuals on the ethical implications of AI. It was suggested that ethical AI education should be incorporated into AI curricula and training programs to ensure that future AI professionals possess the knowledge and skills to develop responsible AI solutions.

Another key point raised during the analysis was the importance of engaging with policymakers. The speakers highlighted the need for continuous advocacy to effectively communicate the potential benefits and challenges of AI to policymakers. They also stressed the need for collaboration between AI experts and policymakers to develop responsible AI governance frameworks that address societal concerns and ensure the ethical and safe use of AI technologies.

Promoting diversity and inclusion within the AI field was another noteworthy argument made by the speakers. They highlighted that AI has applicability across all fields and is not limited to computing. Thus, it was suggested that the AI field should be more inclusive and diverse, encouraging participation from individuals with diverse backgrounds and perspectives. The speakers emphasized the importance of including arts and humanities in AI education to foster social good and ensure that AI technologies benefit all segments of society.

Lastly, the speakers underscored the significance of continuous learning in the rapidly evolving landscape of AI. They pointed out that AI is evolving rapidly, and professionals in the field must keep pace with the latest advancements and developments. Continuous learning was identified as a key factor in staying updated and maintaining the relevance of AI professionals.

In conclusion, the analysis highlighted the multifaceted dimensions of AI education, ethics, policy-making, diversity, and continuous learning. The speakers advocated for universities to play a central role in providing comprehensive AI education, incorporating ethics into AI curricula, engaging with policymakers for responsible AI governance, promoting diversity and inclusion in the field, and emphasizing the importance of continuous learning to keep abreast of the evolving AI landscape.

Wei Wang

The analysis provides a comprehensive overview of the implications of artificial intelligence (AI) and emphasizes the necessity for legal considerations. One of the key findings is Wei Wang’s research, which primarily focuses on global AI governance. Wang’s work acknowledges the crucial impact of AI on higher education and underscores the need for legal frameworks to address this issue.

Another critical aspect highlighted in the analysis is the data supply chain of AI, which intersects with three legal areas. Data protection emerges as a priority, as AI services rely on personal data for training. The analysis mentions that investigations have been conducted globally to examine the use of personal data by AI services. Notably, Italy has been at the forefront of such inquiries.

Furthermore, AI services raise concerns regarding research integrity and content safety. The analysis points out the challenges posed by fake citation links in AI services, which can compromise the credibility of research findings. Additionally, there are worries about the use of unverified information in machine learning processes. These concerns highlight the need for safeguards to maintain the integrity of research and ensure content safety.

The analysis also draws attention to the impact of AI services on copyright law. Specifically, it argues that AI services challenge our traditional understanding of fair use. Litigation experiences related to AI services have raised questions about the fairness of generative AI services in terms of copyright infringement. This observation underscores the need to reevaluate and adapt existing copyright laws to keep pace with advancements in AI technology.

In conclusion, the analysis highlights the importance of legal considerations in relation to the implications of AI. It emphasizes the need for data protection, research integrity, content safety, and fair use in copyright law. These findings provide valuable insights into the various legal aspects that must be addressed to harness the benefits of AI while ensuring ethical and responsible AI practices across diverse domains.

Divina Frau-Meigs

The speakers in this discussion emphasise several key points about AI. Firstly, they argue that there is a need to resist the panic and fear surrounding AI systems and the possibility of them developing super intelligence that surpasses human intelligence. Instead of succumbing to these concerns, they advocate for a human-centred approach to AI development. By keeping humans at the focus of AI technology, it can be harnessed to benefit society rather than posing a threat.

Moving on, the speakers assert that media and information literacy are crucial in understanding AI. They highlight the importance of education that familiarises individuals with media and information, narrowing the knowledge gap and enabling them to acquire the necessary competencies to comprehend AI. By enhancing their literacy in this area, people can make informed decisions and be better equipped to engage with AI technologies.

Another pertinent point emphasised by the speakers is the need for proper guardrails in AI education. While some guardrails are currently proposed by AI systems, there is an acknowledgment that they can be bypassed. Therefore, universities are encouraged to develop their own solutions to provide teachers and learners worldwide with the necessary guardrails. This will help establish a responsible and ethical framework for AI education.

Furthermore, the speakers stress the importance of source reliability and ethically sourced data in AI. They note that currently, there is a lack of ethically sourced data and a lack of consensus on the use of data scraping and models. This highlights the need for a careful and thoughtful approach to ensure that AI systems are built on reliable sources of data and adhere to ethical considerations.

Lastly, the speakers advocate for a focus on explainable AI. They argue that it is crucial to have access to the motivations behind the creation of AI systems and to validate their operations. By having transparency and explainability, AI technologies can be more trustworthy and accountable.

In conclusion, this discussion underscores the importance of taking a human-centred approach to AI development, fostering media and information literacy, implementing proper guardrails in AI education, ensuring source reliability and ethically sourced data, and prioritising explainable AI. By addressing these key points, individuals and society as a whole can navigate the realm of AI in an informed and responsible manner, maximising its potential benefits while mitigating potential risks.

Alejandro Pisanty

In an article discussing the role of universities in the era of Artificial Intelligence (AI), Alejandro Pisanty highlights the importance of approaching this technological advancement in a rational manner and resisting panic. He firmly believes that universities should serve as the depositaries of rational thought. Pisanty argues that in order for universities to adapt to the AI age, they need to ensure their relevance. He suggests that they play a major role in the mainstream of things and develop a solid academic system with reasonable infrastructure and faculties.

However, the article also raises concerns about brain drain in universities. Pisanty points out that higher-paying jobs in AI development at companies are attracting researchers away from academia. This brain drain is seen as a cause for concern, as it affects the quality of education and research at universities. Researchers also tend to move to places where they can actually conduct experiments and get their work published.

Regarding ethical considerations in AI, the Institute of Electrical and Electronic Engineers (IEEE) is developing a set of standards for ethical AI. However, translating these ethical codes or laws to AI developers is proving to be challenging. The difficulty lies in avoiding subjectivity and effectively implementing ethical standards in the development of AI systems.

Furthermore, Pisanty highlights the need to resist panic in the face of AI advancements. He suggests the development of tools to analyze conduct online, as problems in the digital realm often have a human and social element. Pisanty himself has developed a tool for analyzing online conduct, emphasizing the importance of addressing online misconduct proactively.

Universities also face the challenge of addressing the lack of pre-university ethical and mathematical education. It is seen as crucial for universities to cultivate ethical consciousness and mathematical competence among students, as a lack of these fundamental skills poses a significant challenge to education.

In conclusion, universities are encouraged to approach the AI era rationally and resist panic. The article emphasizes the need for universities to ensure their relevance in the AI age by playing a major role, developing a solid academic system, and addressing the challenges posed by brain drain. The development of ethical standards for AI and tools to analyze online conduct are also deemed essential. Additionally, universities must focus on cultivating ethical consciousness and mathematical competence in students to meet the demands of the AI age.

Eve Gaumond

The use of Artificial Intelligence (AI) in education has both positive and negative impacts. On one hand, AI has the potential to greatly improve the quality of education. It can provide students with personalised learning experiences, tailored to their individual needs and learning styles. This has the potential to enhance student engagement and motivation, leading to better learning outcomes. The ability of AI to analyse large amounts of data can also enable educators to identify areas where students may be struggling and provide timely interventions to support their learning.

However, on the other hand, there is a lack of data that supports the notion that personalised learning actually increases retention of information. While AI may be able to deliver content in a customised manner, it does not necessarily guarantee that students will retain the information more effectively. Some argue that the hype around educational technology (EdTech) can be akin to “modern snake oil” – promising transformative effects without concrete evidence to back it up. In fact, there are concerns about the negative impacts of EdTech, such as increased screen time, decreased social interaction, and the potential for data breaches that compromise student privacy.

Another important aspect to consider is the regulation of data collection and usage in education. The ‘datafication’ of students’ lives, starting from an early age and continuing throughout their academic journey, has raised concerns about the potential encroachment on students’ privacy and autonomy. The collection, storage, and analysis of vast amounts of data about students can have a discouraging effect on their engagement in meaningful formative experiences. It is crucial that policies and regulations are in place to prevent harm and protect students’ freedom in the context of data collection and usage in education.

In conclusion, while AI has the potential to revolutionise education by improving its quality and providing personalised learning experiences, there is a need for critical examination of its impacts. The positive effects of AI in education are not guaranteed and should be constantly scrutinised. Additionally, regulations must be in place to ensure the responsible and ethical collection and usage of student data. It is essential for stakeholders in higher education to understand AI sufficiently well to ask relevant questions and make informed decisions about its implementation.

Session transcript

Connie Book:
of Elon University in North Carolina, USA, and chair of the National Association of Independent Colleges and Universities in the United States. That organization represents 1,000 private and independent colleges. This is my second time at IGF and the 12th time that Elon University has sent a delegation to this important global gathering. Our engagement at IGF since 2006 has been through our Imagining the Internet Center. It is Elon’s public research initiative focused on the impact of the digital revolution and what it does and impact on individuals and institutions. We have a booth over in the village and our team is recording video interviews at IGF. And I encourage you to take a few moments to stop by and share your thoughts with us at some point this week. Today’s launch event highlights the urgent issues related to artificial intelligence and higher education. We are releasing a substantive position statement titled, Higher Education’s Essential Role in Preparing Humanity for the Artificial Intelligence Revolution. If you work at a college or university, you know how timely and important this statement is. The statement introduces six holistic principles and calls for higher education community to be included as an integral partner in AI development and AI governance. The statement provides a framework for leaders at colleges and universities around the world as they develop strategies to meet the challenges of today and tomorrow. At Elon University, faculty are adapting the statement as they create policies on AI and design new approaches to teaching and learning. In writing this statement, we worked with higher ed leaders, scholars, and faculty members from around the world to synthesize ideas from authoritative sources on AI. I want to thank everyone who spent time considering this statement and contributing their thoughts and support. Today, more than 130 distinguished academic leaders and organizations from 42 countries are initial signatories to the document. And we invite you to join them. Study the document on our website and sign on if you wish. There are printed copies available for those in the room today and our moderator will post a link for remote participants. Let’s briefly look at these six principles. First, principle number one, people, not technology, must be at the center of our work. As we adapt to AI, human health, dignity, safety, and privacy must be our first considerations. Two, digital inclusion is essential in the age of AI. We must be an advocate and ensure people at our universities and colleges and beyond gain access to these technologies and be educated about AI. Principle three, digital and information literacy is no longer optional for universities. We must prepare all learners, no matter what their discipline, to learn and act responsibly with AI and other digital tools. Digital literacy gives us power and that must be part of every post-secondary education. Principle number four, teaching and learning is already undergoing dramatic change because of AI and we must carefully navigate the use of these tools in education, using them transparently and wisely, and protecting the interest of students and faculty members. Principle number five, we are just at the beginning of the AI revolution, so we must prepare all learners for a lifetime of growth and help them gain hands-on skills to adapt to accelerating change. Principle six, this final principle has to do with AI research and development, research conducted in higher education institutions around the world. These powerful technologies carry great rewards and great risk and therefore great responsibility. We need strong policies in place to guard against negative consequences of digital tools that could go beyond human control. These are our core principles and this sets the stage for a great discussion by our distinguished panelists today. After their remarks, we will open the floor for all to share their thoughts on higher education’s role in advancing the future of humanity in the AI age. Let’s begin with Mr. Lee Rainey, who spent the past 24 years as Director of Internet and Technology Research at the Pew Research Center in Washington, DC. We’re very excited that Lee has joined Elon University to lead our continuing research on imagining the digital future. Lee, please get us started today.

Lee Rainie:
Thank you so much, President Book. It’s a pleasure to be here and to be associated with this really important initiative. We believe that the six principles for the internet and artificial intelligence in our global petition are essential for maintaining human rights, human autonomy and human dignity. The principles bring time-tested truths to the age of artificial intelligence. There is evidence of plenty that societies advance as their educational systems emphasize how people’s adoption of new skills can help them become smarter as people discover new ways to create, connect and share as diverse populations are given the wherewithal to control how new technologies are used and as people adjust their lives to the emerging practices that the new technologies afford, including lifelong learning. As President Book noted, we at Elon University think that institutions of higher education can be the vanguard of civil society forces that enable beneficial changes for humanity. Since the earliest universities were created centuries ago, they have cultivated the grandest purposes of humankind, discovering and advancing knowledge, training leaders, promoting active citizenship and, yes, critiquing the societies around them and sounding warnings as troubles loom. Importantly, we know that as technology revolutions spread, one of the major jobs of universities is to pass along the best ideas and most effective strategies for learning new literacies, especially to other institutions and those involving children in particular. Clearly, we are at a singular moment now as AI spreads through our lives. In the past, tools and machines were created to enhance or surpass physical capacities of humans. The advent of AI for the first time brings technologies that enhance or surpass our cognitive capacities. This revolution will cause a big sort that will force us humans to identify and exploit the traits and talents that are unique to us and make us distinctively valuable. What will be the differentiators between what we can do and what our machines can do? How can we domesticate these technologies to make sure they serve us and not the other way around? At Elon, we are planning to be in the forefront of universities studying and disseminating insights about how AI is affecting people. We have an ambitious agenda of fresh research that will build on several decades of exploration of digital trends and future pathways for digital innovation. In fact, we are gathering data right now in a survey of experts and a separate survey of the general population in the United States to explore how both groups’ views about possible benefits and harms of artificial intelligence are going to unfold in the coming years. We will be releasing those findings in early 2024. Beyond that research, these are some of the questions that will guide our work in the age of artificial intelligence metaverses and smart environments. What are the new literacies that people would be wise to learn? They might include things like media and information literacy, the accuracy and inaccuracy of information, judging it and making the right decisions based on it. Data literacy, privacy literacy, algorithmic literacy, creative and content creation literacy. In addition, we at Elon seem destined to explore how well we are doing to hone our singular valuable human characteristic, means things like problem solving, hierarchical decision making that makes pattern connections and makes decision trees about how to move forward. Critical thinking, sophisticated communication and the ability to persuade which machines can’t yet do. The application of collective intelligence and teamwork, especially in diverse environments. The benefits of grit and a growth mindset. Flexibility, especially in fluid creative environments and emotional resilience. In the end, big issues await exploration. What are the signposts and measures of human intelligence? What are the qualities leaders must possess? How do people live lives of meaning and autonomy? What is the right relationship between us and our ever more powerful digital tools? Our past studies have shown that there are a wide range of answers to questions like those, and yet there is a universal purpose driving people’s answers. They want us to think together to devise solutions that yield the greatest possible achievements with the least possible pain. Thank you so much for your interest. Please feel free to reach out to me here or find me in our booth in the exhibit hall. If you’re interested in furthering this campaign, signing our petition and maybe getting involved with us, we are always on the hunt for new partners, new collaborators and new ideas. Again, my thanks, President Book.

Connie Book:
Thank you, Lee. We now have two distinguished speakers who are joining us remotely. First is Professor Davina Frau-Miggs, who helped with the research and writing of this statement and connected us with thought leaders around the world. She teaches and researches at Sorbonne Nouvelle University in Paris and has been quite active for years with UNESCO and at IGF. Dr. Frau-Miggs, you’re up.

Divina Frau-Meigs:
Hello, everybody. Thank you very much for having me so far away. It’s two o’clock in the morning in Paris, but it’s really worth it to be with you and for me to return to IGF as I saw it being born since I participated in the World Summit on Information Society in 2005, representing academia for the Civil Society Bureau of the summit. And I’ve worked on these topics ever since and followed ever since, from the beginning of social media in 2005 to what we could call now the beginning of synthetic media. And this is maybe one of the tags I will take. I wanted to thank before that Dana and Daniel Anderson, as well as Lee Rainey and the Elon University for including me in drafting the document and fine-tuning it. And I wanted to stress the importance also of IMCR, my NGO, the International Association for Media and Research, that is a UNESCO observer status NGO, which has supported fully all members of the statement and added a statement of its own. And I think, I hope that one of the impacts of this big statement by us all and contribution to IGF will also encourage other entities to make their own because we each and all have to appropriate what we feel is going on with the internet and make sure that the cultural diversity of our universities continues so that we don’t fall under two problems. One which would be a kind of homogeneity brought by the control of some sources and some types of AI models in the world and therefore creating more digital divides. And the other one, which is something I think we all feel, is that as researchers we have to resist the panic, the current panic about AI systems and the fact that they could produce a super intelligence that is more intelligent than us. I think we all agreed, as we discussed and went around the world, that this has to remain human-centered and that actually the humanities have a possibility of being back, not just STEM, as fields because more than ever we need to be human-centered and get down to what it really is to be human. So I represent also, it’s true, a network of researchers at UNESCO called MILIT, the Media and Information Literacy and Intercultural Dialogue network of universities where we also try to think these items. We push, of course, for media and information literacy first because it permits a kind of familiarity that allows us then to move to AI literacy. So one of the focuses of how to go about it for us would be to go with familiarity so that people don’t have the feeling there’s a huge gap before getting all these competences. So as to prevent the panic and, on the contrary, leave a space for understanding and for adoption, we need to lift fear and anxiety. And for that, we have to go also at policy level. And I think for us, we would emphasize, and that’s the nice thing about the six items that we’ve put in there, they can all be unpacked. They can all be unpacked and updated. So if I were to unpack and update our work, continuous way, I would say that one of the most important things is proper guardrails for teachers and students. And we know, and research has shown, that the guardrails proposed currently by AI systems, tech companies, can be bypassed. So this is a problem. And we as universities have to come up with our solutions for teachers and learners worldwide. Also, we need explainable AI. It’s probably one of the most important elements, because we have to have access to the motivations for creating AI systems, for funding AI, for the validity of the AI, the fact that the scraping of the data has to be lawful, unbiased, safe, because that’s how we can make proper decision-making. And we know at the moment that there’s no really ethically sourced data. They’re not consensual. The models of data scraping are not consensual, especially in certain parts of the world like Europe, where I come from, and where we have a feeling that there is a lot of violation. And for us at university and in research and teaching, source reliability and ethically sourced data are crucial. We must, we can’t let go of fake information, fake news, including those proposed by synthetic media that are coming up, without being scared about what happens with proliferation of pseudosciences. And this undermines the whole remit of our university and our research approaches. So I would call on a lot of reflection on source reliability, because we probably are facing a new kind of source, a source that is not a primary source, nor a secondary source, with the intelligence AI models. So these are elements that I wanted to put into the discussion. And soon, at the moment it’s under embargo because it’s not out yet, but UNESCO will release, during Media and Information Literacy Week, at the end of October in Jordan, will release the approach, its approach on AI and media and information literacy. And I hope you’ll see that it buttresses everything that is being done here. Clearly at IGF level, we would support, I think all of us, the creation of a body on information and AI, information and AI, with all stakeholders, and especially, of course, universities and researchers, because we probably are the best place to facilitate the relatively asymmetrical dialogue right now between the edtech companies and the AI edtechs, which are becoming extremely proprietary, extremely commercial, and what we would like to have as independent research spaces that are universities and policy-making spaces. So definitely at IGF, you guys who are there could push for the creation of a global body of this kind, but this is actually more or less being delineated at UN, but IGF could be a very good space for continuous discussion about these items that I’ve underlined, like source reliability, AI explainability, and of course, all of this within our human, very human rights. Thank you very much.

Connie Book:
Thank you, Frau Meggs. Lots to consider there. Thank you for those thoughtful remarks. We are honored today to be joined by Internet Hall of Fame member Alejandro Pisanty. Dr. Passanti is a legendary leader in global Internet governance circles. He is a professor of Internet governance at the National Autonomous University of Mexico. Dr. Passanti, please give us your thoughts on the future role of higher education in the AI age.

Alejandro Pisanty:
Thank you, Professor Buch. Can you hear me well? Sorry, it is awful manners to begin a speech by correcting the previous speaker, but legend. That’s Divina from Mikes. That’s Elon University. Legend. That’s Jana Anderson and Lee Rainey. And I don’t want to continue with the list because it’s very long. I’m very honored, and I hope, Professor Buch, that you realize how highly many of us think of the effort that Elon University has done. You really made a world-worthy mark with Jana Anderson’s and Lee Rainey’s work with the Internet Governance Forum. They have done so much from having students over, documenting by video things that no one even thought were worth recording, and now they are that document to their deep thoughts and understanding, their identifying leaders, bringing young people. I followed a few of them, of your former students who have become really brilliant media analysts or figures or communicators. So they have increased the aura of Elon University to immense heights. This is really, really wonderful. So thank you for supporting this work. Thank you, Dr. Pisanti. That’s very nice. Thank you. That’s really amazing. I come from a very large university. It’s very hard for us not to look at things through a lens of size, and Elon is especially remarkable when we see that you have done far more than universities like mine with probably 20 times as many students as you have. We have two zeros to your numbers. I want to enter now the subject matter of this speech, make it very brief, and try to make it concise. First, I join Divina from Maximum. It’s one of my most admired figures in this world. From the era that she has mentioned, from the early times of the World Summit on the Information Society, when people like her and IEMCR were championing these alternative views to state-controlled media or to the large private interests. At the time, it was mostly media and carriers, network operators, who needed opposing, and we have now a much broader spectrum and a much more complex one because we simultaneously need to oppose and platformize many of the entities that are now considered troublesome. I want to join her statement in particular of resisting the panic. I think that the first thing that universities have to do, universities and schools all over, is sober up and tell everybody, sober up, calm down, cool down, look at this rationally. What are we, if not as post-depositories of rationality, rational thought, not of the truth, but of the way of approaching whatever becomes the truth and letting it be built on fact and reason. That’s, I think, the very first thing. I have a second question here for the universities. I want to thank Jana Anderson and Lee, and Jana particularly because she made much of the follow-up, for sharing with me drafts, early drafts of the statement that has now become the statement for this. And I was a little bit shocked at the beginning because I thought it was conceiving the universities in a very partial and small role in the corner of things, where they should be part of the mainstream and even the leading edge of things. First world universities, let me abbreviate things by calling just advanced economy or first world universities, are seeing now what we have suffered in developing countries for decades, if not centuries, which is a brain drain. One of the things that you are so concerned about comes from the fact that AI development pays a lot better in companies than it does in universities. Universities were sort of the Santa Santorum, where even the winters were weathered out. Even the several AI winters were weathered out by universities, where this slow research kept going on. Algorithms were developed. The mathematics was developed, not only the computational technique, but the basic math of neural networks was developed in academia. And we’re suddenly out of our best people because they are working for companies which have not only large funding, but the other thing that drives researchers, the opportunity to actually do it. When our researchers leave, when our PhD students leave for the US or for Europe or Japan, they’re not only looking for a place which will pay a better salary, but they’re looking for a lab that is actually equipped for work, where they can actually do the measurements, do the experiments, get them published. It’s significance, it’s impact, it’s actually doing the thing that moves them. And you are suffering the same thing now. There’s just a new echelon of that. So the question here, and I’ll stop with that question for this intervention, is the most expensive thing we have in developing countries, is the highest cost we incur in, is the cost of not doing. The cost of not having developed a solid academic system with tenure, with infrastructure, with diversity. The cost of not developing a government that is rationally driven, that creates policies with continuity on an evidence basis, that invokes rights, invokes pragmatism. We never know where we actually are. So rights are invoked as a way of pulling the handbrake, instead of finding the way of calling rights, not for the other guys to go faster, but for us to be able to go as fast or faster. So that cost of not doing is now being clearly manifested in the shortcomings that the universities are trying to overcome with this statement. Thank you.

Francisca Oladipo:
Thank you, Dr. Pisanti. Really interesting. Calm down, cool down. So next we have Dr. Francisca Oladipo, Vice Chancellor and Professor of Computer Science at Thomas Adewame University in Nigeria. Dr. Oladipo? Thank you very much, and thank you for the opportunity, Ellen University. Speaking from the perspective of an African university and an African researcher, we were probably just still catching up with the rest of the world. But then you look at it with an emerging technology, or like everyone else, experiencing something new for the first time, there is that risk of a wrong adoption, or even possibility of abuse. And so I believe that universities, most of our roles should be centered around the educational aspect of artificial intelligence of AI. So if you look at not just interdisciplinary education, but also interdisciplinary collaboration, AI is applicable in practical every field. So AI researchers should not think of just collaborating with subject level experts, but students in the field of AI should be made to study other subjects like philosophy, finance, healthcare, social sciences, to give some basic kind of domain knowledge. And universities also need to promote ethical artificial intelligence and do a lot of education around ethical AI, because students are, you know, to kind of guard against that abuse and misuse. And then there’s a lot of questions in the society about the role of AI in education and on the educational space. So not just educating the student, but also there’s a need to educate the society, generally, maybe through seminars, or handbills, or, you know, to have a town and gown on artificial intelligence. The curriculum these days needs to be centered around AI, because whether we like it or not, it’s going to be with us for a very long time. I mean, it’s always been here, but the awareness is now higher. So most of the curriculum, whether it’s in the humanities, or in the arts, or sciences and technology, even medicine needs to build around AI to ensure that AI literacy for everyone. Universities, we need to do a lot of advocacy to engage with policymakers. The issue of we can contribute our expertise to responsible artificial intelligence in governance, but how can we effectively do this if we don’t engage with policymakers and do a lot of public outreach? We must continue to promote more diversity and inclusion. In Nigeria, we see AI as more of, oh, it’s for you computer people, but it is no longer the case. Students in arts, they use chat GPT now to get answers. They use other online AI tools for one reason, to listen to research papers and so on. So there is always that indirect application of AI across every field. And so we need to be more inclusive to embrace everyone and not make AI look more like it’s for computing people. When we talk about AI for social good, the people primarily at the center of ensuring social good are mainly in the arts and humanities. They’re the ones that study behavior. They’re the one that look into issues and how factors affect people due to different reasons. So it is important that these people are also included in the study of AI. There is a need for every one of us to engage in continuous learning. The fast pace at which AI is emerging now with the large language models and before we know it, something new is out there. We all need to continue to learn to keep up, keep abreast and be able to educate others. Thank you all very much for this opportunity. Again, I’m sorry, it’s 1 to 3 a.m. in Nigeria, and pardon me. Yes, it’s very, very late. I know, Dr. Aladipo, thank you.

Connie Book:
Now joining us remotely from India is Dr. Sivaprasad Rambihatla. He is a retired professor and leader of the Center for Digital Learning, Training and Resources at the University of Hyderabad. Dr. Rambihatla.

Siva Prasad Rambhatla:
Very, very good morning or good night, good afternoon, wherever we are. I must thank Professor Diana Anderson for this opportunity. I let me, because I’m an anthropologist, so I don’t know if I’m going to be able to answer all the questions, but I’m going to try my best. I look at it differently. Technology is a medium which we, as humans, feed into it. We, as humans, guide it. Our biases are also put into it. When I am looking at the field of education, education is one of the challenges that makes access to a large number of people who have been denied on account of their poor economic condition. If you look at the statistics of education in many countries, especially in the Global South, because we must remember there is a large disparity between the Global South and the Global North. In the Global South, those who have no access to education are from the disadvantaged sections. During COVID-19, digital technology, especially using online education technologies, played an interesting role. After that, AI and other technologies are really useful. What we find is that this itself has thrown up new challenges for academics. When I say new challenges for academics, you find a major problem that lies in the digital divide. Access to the equipment, access to the technology, and many of the people, especially children and others, during COVID-19, they never had broadband connectivity. Some of them were climbing trees to catch the signals. It was such a horrible thing. Online courses also need to be designed and articulated in a way that captures the minds of the learners. That is also a big challenge. What we find is the lack of skills and the ability to design courses using multimedia or even the kind of new technologies that people are using. That is where we find designing them in an imaginative way to keep the attention of the learners is an important thing. That is where we even try to train the teachers or the persons who are designing the courses. That is where capacity building was one of the important things that we need to undertake. We need many specialists, including experts from the visual media, to sensitize the online content and course developers. This is where AI technology is trying to fill the lacunae of a shortage of teachers or instructors. The moment you design it carefully, it can fill the gap. It only fills the partly knowledge gap. The challenge posed today is from the generative AI, especially charge and this challenges the use of issues of copyright, laserism and other issues. There are some tools developed to capture whether the content is taken from the other sources, online sources. That is where the problems of others are mentioned. Copyright, the debt of sovereignty, the kind of importance and security. This is where they are impeding the creative thinking among the younger learners . They try to bypass the process of learning. They can ask for a copy and the content writing becomes easier. It does not help them to think. The challenges are real and they require multidisciplinary approaches. Another important thing is education has to be inclusive and multicultural . It has to be more local. We need to have local AI models of learning. That is local AI models of learning because the subject cannot be universal . Most of the things are local . We need to make people learn better . Thank you very much.

Connie Book:
Thank you. Next to speak is a doctoral student at the University of Hong Kong School of Law and a member of the FGV think tank in Brazil. Dr. Wang?

Wei Wang:
Thank you so much. Thank you so much for having me here. Thank you so much for everybody for coming. I am so sorry that I cannot be physically with you in Japan but I am excited to be here virtually. I will probably brief you with some legal aspects but before moving to the legal aspects of AI’s implications upon higher education , I think I will have some very general points as well. As the chair has mentioned, we are currently in a dynamic on data and AI governance . Our first research report on global AI governance , probably tomorrow. If you are interested in this topic , you can probably get a hard copy as well. Some of my colleagues propose a data supply chain of artificial intelligence. This supply chain is relevant to three legal aspects. The first is data protection for sure. As you may know, some AI services are using personal data for training. We need a lot of data protection globally to investigate those AI services like Italy. I think it is our first authority to investigate these AI services. The second area is so-called content safety. The most significant is what we call machine learning. For example, if you use some AI services , their citation links are fake . It would definitely produce a lot of challenges . For example, research integrity . I am currently volunteering . I think it is a good mechanism . It is a contractual mechanism for copyright. There is a lot of litigation in terms of AI services . I think that would be a big issue . Those services are challenging our perception of fair use in copyright law. Many years ago, there was a book . The judges thought it was fair use. What about the generative AI services in the near future? I think these are three areas . Thank you so much for having me.

Connie Book:
Thank you. We will now hear from law researcher of the University of Montreal. Her research focuses on the impact of artificial intelligence on higher education. She is currently working on that research here in Japan. Good morning.

Eve Gaumond:
Thank you very much. I would like to thank you for inviting me to comment . I would like to build upon three elements contained in the statement . The three elements are improving teaching and learning , and increasing literacy. I will walk through these three elements in order to make the following point. It is crucial that people who develop and deploy AI in higher education understand it sufficiently well to ask relevant questions . Let’s start with enhancing learning and teaching. AI has the potential to improve the quality of education. It can help create personalized learning experiences . Students can learn at their own pace, focusing on their strengths or weaknesses. It can also be used to contribute positively to the students-teachers relationship. There are some educators who report that they use data analytics to reach out to students that are suddenly disengaging from the classes. But it is far from guaranteed. These positive impacts are far from guaranteed. Even though AI promoters say that personalized learning increases retention of information, there is no data that supports that claim. Oftentimes, EdTech looks like modern snake oil. Modern snake oil can have real negative impacts. The datafication of students’ lives can discourage them from engaging in meaningful formative experiences. It is especially worrisome when we know that data starts being collected as early on and continues following them through high school and university. Some students, for instance, can refrain from writing essays about controversial topics out of fear that it might limit future opportunities. They avoid learning the formative experience of engaging with challenging ideas. College students can refuse an invitation to go to the bar on a Monday night because geolocation data can be used to predict their likelihood of success at school or predict if they are at risk of dropping out. It can influence their admission to grad school or their scholarship application. It can prevent people from engaging in meaningful formative experiences. Remember when you were in college, these are things that promote increased human flourishing. What if an immigration officer can access immigrant student classes attendance data, for instance? Is it really what we want for higher education? Is it really fully promoting the development of the human personality as international human rights law says it should? I don’t know. But these are questions we ought to be asking. And this is why it is so crucial that professors, university administrators understand how AI and data works so that they can ask relevant questions. What kind of data is being collected? What is it used for? Who can access it? Only professors or third parties as well? And if third parties can access it, what for? So, yeah, this is why I believe that the statement is so interesting and so important and particularly principle 4.1 and 3 because they can contribute to protect students’ freedom. That’s it. Thank you, Evi.

Connie Book:
Our final panelist is Renata de Oliveira, Miranda Gomes. She is an IGF 2023 youth delegate representing Brazil who recently earned a master’s degree in communication at the University of Brasilia and she’s here with us today. Welcome, Renata.

Renata de Oliveira Miranda Gomes:
Thank you. Thank you so much. Good morning. I’d like to thank the opportunity to participate in this panel as a youth representative. I am part of the Brazilian youth delegation this year and I have been studying for some time how we use Internet and specifically digital platforms to communicate science. I’ll be mindful of my time here and pass to the main point that I wanted to bring to the debate and it’s how new digital platforms are extremely present in higher education and I believe that the COVID-19 pandemic actually showed us this quite significantly. During a time of social isolation, we had to quickly adapt to a new way of learning and exchanging knowledge and AI was certainly very much part of it but the thing is I believe that there is still a gap between students and educators when we think about the acceptance of new platforms and ways of learning and I’ll give an example which resonates a bit with what Professor Oladipo mentioned just now. For example, chat GPT can be used as a tool for learning in multiple ways and I am aware and agree with arguments that point that chat GPT can facilitate like plagiarism or cutting corners when producing assignments. However, and I was discussing this with some friends from the Brazilian delegation, that chat GPT can also make our lives easier. For example, at a post-graduate level, we are faced with a lot of challenges and we have to adapt to the new technology and we have to adapt to the new environment and we have to adapt to the new environment and we have to adapt to the new environment with long, long lists of reading materials. And although CHAT-DBT does not substitute comprehensive reading and understanding of text, it can certainly aid by producing perhaps bullet point highlights and aid us in gaining some time actually. So it can also be a tool to develop critical thinking and analytical skills. So my argument here is that educators and students should work together. And the principles here presented are proposing to find solutions that can help all parts involved. Specifically, I wanted to point out principle number five, learning about technology is an experiential, lifelong process. And new platforms such as AI depend much more on the users than on the software itself. So it is crucial that we educate ourselves and work collaboratively to ensure that it can be the best possible. So this is why I believe that these spaces of debate are so important. In Brazil, the approximation between AI and education is going beyond the scope of higher education also. For example, the state of Piauí recently announced that it is working to including AI in the state’s high school curriculum. So it will be the first state in Brazil to do so. So this is a great way to begin the dialogue of good platform usage from the initial learning processes. So I think this is pretty much what I had to say to bring to the debate for now, but I look forward to discussing it further with you. So thank you for the opportunity.

Connie Book:
Thank you, Renata. We do now want to engage the community here with us and broaden our conversation. So we’re going to open it up for questions. There are microphones at the table. So the floor is yours. Does anyone have any questions? Yes. Say your name and your association. Certainly.

Audience:
My name is Christa Tobler. I’m a professor of European Union Law at two universities, Basel in Switzerland and Leiden in the Netherlands. I would like to react to the point made by the youth delegate just a moment ago. I can absolutely underwrite that. There is in my experience, this gap in expectation. I can see that, for example, at my Dutch university, Leiden University, the law faculty at the moment is trying to formulate an AI policy. They’ve not yet quite managed it. But for the time being, they said, actually, we are against using it. My students, of course, are from a wholly different generation. They’re all digital natives. They know how to use these things, and they want to use them. So I can see the gap that you’re talking about. And I personally, in one of my courses where people have to write an essay, have taken the approach suggested by our own department that deals with these matters, which has said that one way of doing it is to alert students to the possibilities and the dangers, especially in the legal field. You may all be well aware of the fact that a lot of wrong legal information is provided by these models. So you alert them to them, but you also tell them that, yes, you can use it, because it makes no sense to say no. It’s just not realistic, in my opinion. So I have followed the approach of telling them, yes, you can use it, but with proper attribution. So in your papers, you have to state whether or not you have used AI and how you have used it. I think this is a better approach, because as I just said a moment ago, it’s totally unrealistic to expect that people will not use it. It’s also not clever, because as you said, quite rightly, there are positive elements in these systems, and we should use them in a positive sense. So thank you for your contribution. Renata, I believe, was your name, is entirely reflecting what I have seen in my work. Thank you. I think we had another question here, yes? Thank you very much. This is, my name is Nazmullah Hassan. I came from Bangladesh. You work with an NGO called ActionAid Bangladesh. So I take my liberty, actually, to bring down a little bit of root of the discussion, since I work with the community and the excluded group and marginalized communities. So I was thinking, in our country, there is a huge digital divide, so in between the urban and rural, in addition to that, even also in the different age groups and generations, and also based on their sexual identity. Let’s say male or female, you know, men and women. So I was thinking, since still there is a huge digital divide, so we are talking about the AI in universities. So if it is becoming more and more kind of pertinent technologies in our lives, so how the divide will increase, and how the people will be excluded and more marginalized. Some people will be, you know, so super tech people, and they will be using the AIs and other technologies and getting more and more opportunities, access and rights, everything. I imagine public service will be based on AI in future. So then people like us, you know, in our countries, global south, and living in a very interior place, how they will have their basic rights, let’s say education and health and other spaces. Whether, you know, do we think of how the AI can be also, you know, as a part of our lifelong learning? You know, so sometimes we are thinking, you know, technology will come, definitely we need to embrace the technology, this is for sure, but how it can be also, you know, people can acquire the knowledge and the skills by their lifelong learning. What are the educational institutions are taking that kind of tools, curriculum, or developing that tools and curriculum for the community, or the excluded groups, so that they are also not being left behind. They are also taking this, you know, becoming this part of this new technologies. So I don’t know who could reflect on that, but this is actually the point came in to my mind. Thank you very much. Thank you.

Connie Book:
Would anyone like to react to that? Yes. Yes, feel free to open the mic. Shall I? Yes. Yeah.

Siva Prasad Rambhatla:
I think this is exactly what I have been talking about. The digital divide has many shares of it, because it has something to do with the socioeconomic backgrounds, cultural backgrounds, and also the nearness and away from the towns or cities, and infrastructure. And those who have this infrastructure, they are the ones who will benefit, and those who do not have will not benefit. So the digital divide is real. In fact, there are people now, they say that it has come down. It is true. It has come down as the, you know, the kind of availability of the international groups in some of the remote areas, but still there are problems. And how do we, in fact, it is, that is one aspect. Second aspect is that we have something, what we call the algorithms that are written, and the biases themselves reflect the kinds of discrimination exclusion, because the moment you perpetuate them, because whether it is generative AI and other kinds of forms are real challenge, because that is where, how do we counter these biases? How do we counter these exclusions are the challenge. This is where academics have to think about alternatives of this thing, because one way is using the traditional medium, but the traditional medium reachability is lesser, whereas the technology that we have can reach large sections, but then governments have to intervene, governments have to invest, and even some of the private firms have to invest. This is the alternative.

Connie Book:
There is no other way. Thank you. Thank you. Any final question? Yes. Yes. I think the microphone’s right there. They’ll turn it on for you. Yeah, yeah. Hello. Okay.

Audience:
My name’s Julia. I am a youth delegate for Brazil. I’m here with my colleagues, and I am very proud to participate in Renata’s and the group’s presentation panel, for she is also a colleague of us in our youth delegation. But jumping to my question, I asked myself during this presentation, how are the participants see and act to work sensibility and empathy on the ethics perspective of using AI, and is there a connection to using like different engines for AIs, like not feeding only to a corp, like, oh, we work about AI, but let’s see different engines and different groups and corporations that have worked, like the open source and the closed source engines, and like diversifying, because if there is that sense in using the diversity of engines to help building sensibility and to see for the ethics problem. I see it as a problem, because there is a lot of apathy or uninterested STEM academics or STEM operators, not necessarily academics, only workers that are uninterested in developing and working with AI in a ethical or a moral, over ethical and moral standards.

Connie Book:
Thank you. Dr. Pisanti, that is right up one of your observations. Would you like to respond to that?

Alejandro Pisanty:
Yes, thank you. There are, at the last counts a few months ago, around 1,300 ethics codes for AI around the world that have been collected, and there must be 10 times as many that have not been collected anymore. No one cares. Some of them are very solid. They were built from the ground up, starting from an inventory of ethical systems by the Institute of Electrical and Electronic Engineers, the IEEE, which is now developing a set of standards for ethical AI that can be used by companies and governments for developing, for guiding the development of systems and for guiding the assessment of systems. One problem these have is that it’s very hard, first, to avoid subjectivity. You look at the whole big 30 pages of ethically aligned AI that is age appropriate for children, and in the end, it’s a value judgment. Someone has to make a value judgment, whether something is appropriate for 13 years old and not 13 and a half years old. So that’s one problem. The other one is that it’s very hard to bring these codes, or the law, by the way, because some people say that codes are a way to, ethical codes are a way to avoid the law, not have the strict legal observance. But either way, it’s very hard to bring this down to the person who’s actually doing the coding, who’s actually selecting data and saying how you, how you actually develop the system and put data into it. That has to have a large part of contribution from the universities. We’re in exercises. We challenge our students at all levels, the people who are doing the hard computer science, coding, and so forth, and all the way to people, as was mentioned, students using ChatGPT for their essays. We have to work on that, and we cannot solve that at the university level alone. If our students arrive from high school, from pre-university education, without this ethical, and without the mathematical competence, there’s a huge challenge for universities to compensate for 18 years of non-education. This, again, goes to the cost of not doing it. And one other contribution here. As I said, I second Divina from Mike’s statement of resisting the panic, but I don’t only say, okay, please, calm down. I think that we can develop tools. I personally, I’m going to bring in a little plug for a tool I have developed, which is not for AI, but can be extended, which is when you look at all the panics around the internet and also the ways that the internet is seen as a panacea, as a saving all, you can actually see that most of the things that we either like very much or dislike very much that are happening on the internet have a human, social, pre-online or offline component, and a disruptive, sometimes radically revolutionary change that brings through the internet. It’s like phishing or Wikipedia, you know, the bad and the evil and the good. They are all, either phishing is simple fraud, hugely enabled by the internet, and Wikipedia is, you know, plain human, warm-hearted cooperation, the will to share knowledge made big. So we have six elements there, identity, scale, identity, trans-jurisdictional border crossing, barrier lowering, friction reduction, and the management of humankind’s memory and forgetfulness. We can analyze every conduct that we like or dislike online or every project, divide it into these pieces and reassemble it, and then decide, where do you want your ethical code? Where do you want your police? Where do you want, totally change human minds. Human minds will not, if you don’t change human minds, you will not stop having fraud. You will not stop people trying to cheat people and people falling for cheats. So let’s not blame the internet and let’s not blame artificial intelligence or it’s a very small niche thing called chat GPT without looking at this broader picture, and as I said, rationally. This may be too Cartesian, we still need some fluffiness and some fuzziness, but this is the kind of tool we can have. Final point, universities can contribute to this in an institutional way. We have been providing our individual academic contributions, the technical contributions, the institutions have their own role that transcends the activism that sometimes comes with situated academic social science and bridge with the technical community that’s actually doing all this development. Thank you.

Connie Book:
Thank you, Dr. Pisanti, and we couldn’t agree more, and that’s why we think that having an articulated set of principles to begin the work of higher education, and I love Dr. Frau-Miggs encouraging each organization to make it their own so we have that diversity of thinking with this set of principles. So we’ve reached the end of our time, and I’d like to conclude with an invitation. Please go to our webpage and see the list of signatories and consider adding your name. This will give our statement more reach and credibility. Our site will provide updates as the statement reaches new audiences and begins to influence institutions around the world. Thank you all for your participation in our event today and your support of this important initiative. Thank you. flaws

Alejandro Pisanty

Speech speed

166 words per minute

Speech length

1840 words

Speech time

665 secs

Audience

Speech speed

175 words per minute

Speech length

1052 words

Speech time

360 secs

Connie Book

Speech speed

137 words per minute

Speech length

1418 words

Speech time

620 secs

Divina Frau-Meigs

Speech speed

137 words per minute

Speech length

1130 words

Speech time

495 secs

Eve Gaumond

Speech speed

126 words per minute

Speech length

581 words

Speech time

276 secs

Francisca Oladipo

Speech speed

151 words per minute

Speech length

675 words

Speech time

269 secs

Lee Rainie

Speech speed

147 words per minute

Speech length

861 words

Speech time

351 secs

Renata de Oliveira Miranda Gomes

Speech speed

177 words per minute

Speech length

605 words

Speech time

205 secs

Siva Prasad Rambhatla

Speech speed

127 words per minute

Speech length

995 words

Speech time

470 secs

Wei Wang

Speech speed

103 words per minute

Speech length

403 words

Speech time

234 secs

Digital Me: Being youth, women, and/or gender-diverse online | IGF 2023 WS #255

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Vera Zakem

The analysis highlights the importance of multi-stakeholder collaboration in addressing tech-facilitated gender-based violence and gendered disinformation. The speakers stress the need for joint efforts and engagement from various stakeholders, including survivors, civil society activists, and members of the private sector. The Biden-Harris administration has announced the Global Partnership for Action on Gender-Based Online Harassment and Abuse, in association with 11 other nations.

The speakers also emphasize the significance of women, girls, LGBTQ+ communities, and youth in decision-making processes and civic engagement. They argue that investment in these groups is essential for bringing about meaningful change. USAID’s Transform initiative is mentioned as an example of efforts to promote the participation of these groups in civic life.

It is strongly emphasized that governments alone are insufficient in addressing these issues. Collaboration between governments, civil society, and private entities is necessary. The notion of multi-stakeholder solutions is advocated as the way forward, and it is suggested that such solutions should be developed at global, country, and sub-national levels. These solutions should involve governments, civil society actors, and private sector entities. The importance of multilateral cooperation and public-private partnerships is highlighted.

Overall, the analysis highlights the need for inclusiveness and collaboration to combat tech-facilitated gender-based violence and gendered disinformation. It calls for action that involves survivors, civil society, the private sector, and governments. By working together and investing in women, girls, LGBTQ+ communities, and youth, meaningful change can be achieved.

Daniela Cuspoca Orduz

Digital violence against women is a significant problem in Colombia, highlighting the urgent need for a specific regulatory framework to address it. Currently, there is a lack of legislation and guidelines that specifically target and prevent digital violence. This legal gap creates challenges in effectively dealing with these crimes and developing appropriate public policies.

One crucial issue highlighted by the analysis is that women who experience digital violence often face blame and re-victimization. Instead of receiving support and protection, they are often held responsible for the incidents or accused of provoking the violence. This victim-blaming mentality exacerbates the problem and adds to the challenges faced by the victims. Shifting this narrative is essential to ensure that women experiencing digital violence are provided with the necessary support and protection without being blamed or stigmatized.

Furthermore, there is a lack of interest and awareness in investigating digital violence cases. This lack of attention may be due to a limited understanding of the seriousness and impact of these crimes. Raising awareness among law enforcement agencies, policymakers, and the general public about the gravity of digital violence against women and its profound effects on victims is crucial. Increasing awareness can help direct more resources and attention towards investigating and addressing these crimes.

The analysis also emphasizes the need to recognize and prioritize digital violence as an issue requiring immediate attention in policy generation. The current legal gaps present challenges in creating effective public policies that specifically address digital violence against women. The nature of digital violence calls for tailored protective measures and responses that are distinct from those applied in offline contexts. Empowering women online is another crucial factor in combating digital violence and ensuring their safety and well-being in the digital space.

Advocates are urging the development of a dedicated framework against digital violence. Several initiatives related to framework development are currently pending approval in Congress. This demonstrates a growing recognition of the need to address digital violence comprehensively and proactively. Additionally, the Court has acknowledged the issue by recognizing instances of digital violence against women journalists.

In conclusion, digital violence against women is a serious issue in Colombia, necessitating the establishment of a specific regulatory framework and effective public policies. It is imperative to shift the blame from the victims to the perpetrators and increase awareness about the severity of digital violence. Tailored protective measures and responses are required to address the unique challenges posed by digital violence. Empowering women online is crucial in preventing and addressing digital violence. Ongoing initiatives in Congress and the recognition from the Court signal positive progress towards addressing this issue. However, further concerted efforts are needed to create a safer and more inclusive digital environment for women in Colombia.

Umut Pajaro Velasquez

The analysis highlights the challenges faced by women and gender-diverse individuals in the online world, focusing on issues of internet safety. It acknowledges that the internet is not always a secure and inclusive space for these groups, specifically addressing concerns such as cyberbullying, gender-based violence, and the digital divide. These challenges undermine the goals of gender equality and reduced inequalities, thus necessitating discussions and efforts to create a safe and inclusive digital environment.

The session aims to address the intersection of gender and youth online, with the ultimate objective of fostering a safer and more inclusive digital environment. By specifically considering this intersection, the session aims to tackle the unique challenges and concerns experienced by women and gender-diverse individuals in the online sphere. The ultimate goal is to establish an environment where gender equality is prioritised and where the rights and voices of these groups are not compromised.

To achieve this aim, the analysis proposes various strategies encompassing policy, education, and digital literacy. It emphasises the need for policy measures that protect the online rights of women and gender-diverse individuals, ensuring their safety, privacy, and digital well-being. Additionally, it suggests that educational initiatives and efforts to promote digital literacy should be intensified to empower individuals within these groups, enabling them to navigate the online world confidently and securely. By raising awareness and knowledge, it is believed that women and gender-diverse individuals will be better equipped to protect their rights and actively participate in discussions concerning internet governance.

Umut, a supporter of the cause, strongly advocates for a safe and inclusive digital environment for women and gender-diverse individuals. Through endorsing the objectives of the session, Umut actively contributes to the collective endeavor of creating a digital space that respects and acknowledges the rights of all individuals, regardless of their gender. Umut’s support signals a growing recognition of the importance of addressing these challenges and promoting inclusivity in the online world.

In conclusion, the analysis underscores the urgent need to address the challenges faced by women and gender-diverse individuals in the online world. By highlighting issues such as internet safety, cyberbullying, gender-based violence, and the digital divide, the session aims to establish a safe and inclusive digital environment. The proposed strategies, encompassing policy, education, and digital literacy, seek to uphold online rights and include diverse voices in discussions regarding internet governance. Umut’s support further reinforces the significance of these endeavors, underscoring the collective commitment to creating an inclusive digital space for all individuals.

Luisa Franco Machado

The analysis examines various aspects of the digital space and its impact on marginalized groups. One major issue discussed is shadow banning, portrayed as a form of online censorship that disproportionately affects discussions on women’s rights and systemic issues. Shadow banning is defined as a phenomenon that appears to be a technical glitch but is actually a manifestation of deeper systemic problems. The author’s personal experience is highlighted, where her political posts discussing these matters mysteriously vanished from her followers’ TikTok feeds. This serves as evidence of shadow banning’s negative impact on radical discussions.

The discussion then shifts to the oppressive nature of the digital space for youth, women, and gender diverse individuals. While the digital realm offers a platform for advocacy, it also becomes a breeding ground for backlash and harassment. Misogynistic and alt-right groups are specifically mentioned as organized contributors to the unease in the digital space. This evidence underscores the negative sentiment associated with the experiences of these marginalized groups.

Furthermore, the analysis explores the issue of personal data collection and its implications. It asserts that almost every institution collects personal data and digital footprints, which are subsequently used to reinforce oppressive structures and drive profits. This criticism raises concerns about the motivations behind data harvesting and how it often fails to contribute to public welfare or policy shaping.

Another point examined in the analysis is the erasure of marginalized groups resulting from restrictive binary thinking in digital spaces. An example is given of online forms typically offering only binary gender options, thereby neglecting non-binary and other identities. The erasure of diverse identities and the perpetuation of binary thinking is viewed as a negative aspect of the digital realm.

On a positive note, the analysis underscores the importance of celebrating diverse expressions and championing critical thinking in the digital space. These values are believed to contribute to a more inclusive and empowering environment. Additionally, it asserts that government intervention and accountable content moderation are necessary to address the issues discussed. Europe’s Digital Services Act (DSA) and Digital Markets Act (DMA) are cited as promising steps in the right direction.

Regarding representation, the analysis argues that feminist, queer, and diverse representation should be non-negotiable in both public institutions and major tech companies. This stance emphasizes the need for diversity in decision-making processes and the creation of inclusive digital spaces.

In conclusion, the analysis presents a comprehensive exploration of the impact of the digital space on marginalized groups. It highlights issues such as shadow banning, online oppression, data privacy concerns, erasure, and the need for diverse representation. The ultimate call is for the digital realm to celebrate diverse expressions, champion critical thinking, and for government and public intervention to ensure accountability and create a safer online environment.

Chilufya Theresa Mulenga,

The analysis highlights several key points made by the speakers. Firstly, it is noted that education and skill development have played a crucial role in fostering increased youth participation in Internet-related fields, particularly among young women. This is supported by the increase in online platforms that promote gender-related initiatives, as well as the implementation of STEM programs aimed at engaging young learners, including girls and gender diverse individuals. These efforts have led to a positive sentiment, as more and more youths are being empowered to pursue careers and opportunities in the digital sphere.

Moving on, the analysis underlines the impact of social media activism in raising awareness about inclusivity and social change. The speakers mention that online communities have provided a safe space for individuals from different backgrounds to connect and support each other. This sentiment is reinforced by the ability to share challenges and innovative solutions across different countries. By utilising social media platforms, activists have been able to amplify their messages and reach a wider audience, further strengthening their efforts towards reducing inequalities. Overall, the sentiment expressed towards social media activism is positive, as it has proven to be an effective tool for driving social change.

Furthermore, the analysis emphasises the significance of policy involvement in supporting youth-led organisations. In particular, it highlights a concrete example from Zambia, where members of parliament have actively invited young people to partake in discussions and initiate tailored development in local communities. Additionally, the creation of the CDF fund in Zambia has provided support for projects initiated by youth-led organisations. This positive sentiment towards policy involvement suggests that engaging young people in decision-making processes and providing them with resources can lead to sustainable development, as indicated by the alignment with SDG 11: Sustainable Cities and Communities and SDG 16: Peace, Justice, and Strong Institutions.

Lastly, the analysis points out the role of gender advocacy groups in promoting equality and safety for gender diverse individuals. Noteworthy evidence includes the presence of online petitions and campaigns led by young people, addressing issues related to gender, youth, and women. These efforts contribute to the pursuit of SDG 5: Gender Equality and generate a positive sentiment towards the advocacy for gender diversity.

In conclusion, the analysis highlights the positive impact of education, social media activism, policy involvement, and gender advocacy groups in empowering youth and promoting key social and gender-related goals. These findings underscore the importance of providing opportunities, resources, and support to young people, as they play a crucial role in shaping a more inclusive and equitable society.

Ayden Férdeline

The analysis provides a comprehensive overview of various arguments and perspectives on several topics. One argument focuses on the issue of inadequate representation of women, youth, and LGBT+ individuals in internet governance and coordination bodies. This is supported by researched participation data spanning the past 20 years. It is argued that these marginalised groups are not given enough influence in decision-making processes, resulting in a lack of diverse perspectives and potential biases in internet governance.

Another critique discussed in the analysis pertains to civil society’s approach to making change. It is pointed out that there is a lack of a clear theory of change, which may hinder effective strategies for addressing key societal issues. Furthermore, civil society seems to struggle with managing trade-offs that may arise in the pursuit of their goals. The sentiment towards this critique is negative, indicating dissatisfaction with the current approaches employed by civil society to bring about meaningful change.

On a more positive note, the analysis highlights the need for advocacy from a position of power instead of victimhood to achieve sustainable results. It is argued that advocacy efforts should not solely rely on portraying oneself as a victim, but rather focus on empowerment and leveraging existing positions of influence to drive real change. This argument is supported by the observation that exclusion is often intentional and that setting goals, prioritising, and fighting one battle at a time would yield more effective advocacy outcomes.

The analysis also includes a stance that supports focus and goal-setting in advocacy, despite the inherent difficulty in doing so due to the presence of multiple pressing issues. It is acknowledged that advocacy efforts tend to be scattered amidst numerous important causes, making it challenging to channel resources and efforts towards achieving specific goals. Nonetheless, the importance of setting clear objectives and concentrating efforts is emphasised, as it enables more targeted and impactful advocacy work.

In conclusion, the analysis presents a range of viewpoints on different topics. It highlights the need for greater representation of marginalised groups in internet governance, the necessity for a well-defined theory of change in civil society’s approach, the importance of advocacy from a position of power, and the benefits of focus and goal-setting in advocacy work. By considering and addressing these perspectives, it becomes possible to enhance the effectiveness and inclusivity of various societal initiatives.

Hollie Hamblett

The analysis reveals that women face significant inequalities as consumers, despite representing 51% of the global population and making the majority of global purchasing decisions. Shockingly, their needs are often disregarded in policy, product design, and service provision. This inequality is evident in the form of the “pink tax”, financial barriers, and sexism in advertising.

The “pink tax” refers to the practice of charging higher prices for products and services marketed to women compared to similar products marketed to men. This discriminatory pricing perpetuates gender-based inequalities by forcing women to pay more for essential items such as personal care products and clothing. Additionally, financial barriers prevent women from accessing financial services and resources, limiting their economic empowerment. Sexism in advertising further exacerbates inequalities, as it perpetuates harmful gender stereotypes and objectifies women, often influencing their choices as consumers.

One of the key arguments put forward is that consumer protection frameworks lack gender equality. Despite the significant purchasing power and influence that women have, these frameworks fail to adequately address their specific needs and concerns. The analysis highlights the urgent need for consumer protection policies and regulations to incorporate a gender lens, ensuring that women’s rights and interests are protected and promoted.

To address this issue, it is suggested that gender-disaggregated data be collected and used in policy, product design, and service provision. Such data can reveal the truth about women’s experiences in the marketplace, aiding in the identification and elimination of sexist biases. Without reliable data, gender biases may persist, and misguided policies may unintentionally cause harm to women. Therefore, prioritising the collection and analysis of gender-disaggregated data is essential for promoting gender equality in consumer protection.

Furthermore, the analysis emphasises the importance of a multi-stakeholder approach. It is suggested that designers, developers, researchers, and marketing authorities work together to create gender-equal products and policies in digital spaces. This collaborative effort can help address biases and discriminatory practices present in the design and development of digital products. Additionally, raising public awareness about consumer rights can empower women to assert their economic interests and demand gender-equal treatment in the marketplace.

In conclusion, women continue to face inequalities as consumers, with their needs often overlooked in policy, product design, and service provision. The “pink tax”, financial barriers, and sexism in advertising are examples of the challenges they encounter. The analysis underscores the need for consumer protection frameworks to embrace gender equality, highlighting the importance of gender-disaggregated data and a multi-stakeholder approach. By prioritising women’s experiences and empowering them in their consumer choices, a more gender-equal marketplace can be achieved.

Agita Pasaribu

Since the start of the COVID-19 lockdown in 2020, Indonesia has witnessed a staggering 300% surge in online abuse cases. One prevalent concern is non-consensual intimate image abuse, which predominantly affects young females. This increase in online abuse has become a significant issue in the country during the pandemic.

Despite the passing of a law on sexual violence crimes, prosecuting online abuse perpetrators across different jurisdictions remains a considerable challenge. Cross-border jurisdiction issues complicate and hamper the process of holding these perpetrators accountable for their actions.

To effectively tackle online harassment, it is crucial to strengthen global partnerships and involve all stakeholders in policy development. By engaging tech companies, particularly online platforms, in policy-making processes, it becomes possible to comprehensively address and prevent online harassment. Incorporating both global and local perspectives is essential to ensuring that policies are effective and inclusive.

Ethical AI practices can play a vital role in protecting individuals online. Deepfake pornography using AI has become a pressing issue, violating the rights and mental well-being of women and gender diverse individuals. Policies should actively protect digital citizens and ensure that technology serves as a force for progress rather than harm.

Preventing online harassment requires the collective efforts of various stakeholders. Governments, tech companies, schools, parents, and civil society all have unique roles to play. Stakeholders need to advocate for safety measures, embed digital literacy in education systems, support victims of online harassment, and promote ethical digital citizenship.

In conclusion, the COVID-19 pandemic has led to a significant increase in online abuse cases, with non-consensual intimate image abuse being a prevalent concern in Indonesia. The prosecution of online abuse perpetrators is hindered by cross-border jurisdiction issues. Strengthening global partnerships, involving tech companies in policy development, advocating for ethical AI practices, and engaging all stakeholders are essential in effectively combating online harassment.

Session transcript

Umut Pajaro Velasquez:
Hello, we can hear you Ahmad. Okay, I was scared that you can’t hear me for a moment. Yeah. Well, thank you very much to all the people there. We’re going to start the session. This is a roundtable session that is called a digital me being you, woman, and or gender diverse people online. In this session, we wanted to highlight that the internet plays a vital role in our lives, but it’s not always safe or an inclusive space, especially for two women and gender diverse people. In this session, we’re going in the discussion in the roundtable that we’re going to have, we’re going to try to address the intersection of gender and you online, aiming to create a safe and inclusive digital environment. We will try also to highlight the challenges we face, like cyberbullying, gender based violence, and digital device with the different panelists, we share their expertise from the different backgrounds they are coming from. Also, at the end, we will like to discuss on strategies to encompass policy, education and digital literacy. to hold online rides for these groups and involve diverse voices in internet governance discussions. The session aims to offer recommendations for multi-stakeholder to take some practical steps in addressing these internet challenges and fostering inclusivity and safety. The structure of the session will consist in a short introduction that I’m doing right now. And so then we going to pass to the part of the speaker when they going to have five minutes to present their perspective or their vision to share any knowledge related to the topic and the policy question that were shared before with them. And then we’re going to have a second part of the session that we’re going to allow the public to also share their visions and make some question if they want to. And finally, we’re going to have a final remarks or a conclusion if we can have a conclusion in this session. So we going to start this round on interventions. We Agita Pasarigu, she is from Indonesia and she is a test developing and designing on a bully idea that was launching in 2020. I wish she will be sharing some insights about online gender violence in the context of the country and also in the Asia Pacific region. So the floor is yours, Agita.

Agita Pasaribu:
Thank you, Umut. Hi, everyone. I am Agita, and I’m currently the founder and executive director of Bullied Up. At Bullied Up, we are focusing on addressing online harassment in Indonesia by providing psychological legal support and anonymous reporting platform through our web-based application. On the issues regarding on the policies that can be developed to address the challenge faced by youth, women, and gender diverse people in digital space, I think I would like to touch on and provide a little bit of a background of what happened in Indonesia. So since the COVID-19 lockdown in 2020, Indonesia has witnessed a staggering 300% surge in online abuse cases, and this leaving victims without access to essential legal and mental health support. And from our statistic, non-consensual intimate image abuse, or NCNI, has been a prevalent concern, and its majority impacting young females. This issue also becomes very intricate due to its cross-border nature, and often law enforcement feels powerless due to jurisdictional constraint. And even with the recent passing of the law on sexual violence crimes in the country, which recognized NCNI, the persecution of perpetrators across different jurisdictions remains a significant challenge. So considering these, we did policies that facilitate international cooperation to forge global cooperation amongst law enforcement to address cross-border jurisdiction issues, emphasizing what our governments can do. I believe it’s pivotal to strengthen global partnership to tackle online harassment. Engage tech companies, especially actively involving them, the online platforms, in policy development. We need social media, online dating, online gaming platforms. to focus on both enabling reporting mechanism and also addressing past report needs, making sure that perpetrators are refrained and victims are supported. It also important to incorporating both in global local views, especially in the policy, knowing that the emerging issues like deepfake pornography using artificial intelligence, it affecting women and gender diverse individuals online, violating their rights and their mental wellbeing. So therefore our policies must not only respond after, but must actively protect our digital citizens. Ethical AI practices and rules need to ensure that technology becomes a helper, not an enemy in our fight against online harassment. Also policy should be our shield and made with the complexities of technological advancement and the ethical consideration of its application in mind. And I believe that policies should safeguard every digital citizen, ensuring that technology serve as a beacon of progress, not a tool for perpetrating harm and fear. Coming to the aspect in terms of multi-stakeholder challenges and what we can do, I believe the responsibility of multi-stakeholders is a paramount in constructing a safe online environment. Government, social media, tech companies, schools, parents, civil society, each of us hold a unique and significant role in the prevention of online harassment. Government needs to advocate and enforce policies that foster a secure digital environment across legal enforcement. Social media and tech companies have to incorporate safety by design principles, focusing not on the enabling report mechanism. but also effectively addressing false report issues, preventing further perpetrations and partnering with NGOs to further support victims with psychological or the support they need. Schools, parents should embed digital literacy and ethical online behavior within educational structures. And civil society organization, we must continue to advocate for digital safety and support victims, driving policy development and ensuring accountability. And lastly, as netizens and young people, I believe we need to promote ethical digital citizenship, promote an upstander culture and be committed to create a digital environment that is respectful, inclusive, safe, and empowering for all regardless of age and gender. So I’ll stop there.

Umut Pajaro Velasquez:
Thank you. Thank you to you for that valuable insights about the situation in Indonesia and how this kind of risk that we have in face if intercross with mental health and policymaking and another stuff that are actually really important to protect online. And now we’re going with Holly Hamblett. She is a policy specialist at Consumer International. She leads the digital consumer rights work including trust in digital marketplace, virtual economies, and data rights. Holly previously managed CIS Global Consumer Protection and Empowerment Index, measuring the consumer landscape of 80 countries worldwide. Holly, the floor is yours.

Hollie Hamblett:
Thank you. So I’ll be talking about gender in relation to consumer protection and how consumer protection frameworks are not gender equal. So women represent 51% of the population which means that is also half of. consumers worldwide as well. And they have the majority of the purchasing decisions, they have the potential to drive the marketplace and with their purchasing power, about 65 to 85% of global purchasing decisions are made by women globally. And yet whilst they have this potential to influence the marketplace with these decisions, their specific needs and experiences as consumers are still not considered in the design of policy, products and services. And we see this from sexist advertising to online scams, male default products and services, barriers to financial accessibility, gender-based pricing discrepancies, toxic and harmful products. The marketplace is not a level playing field for women. So when we look at the experiences of women in the marketplace in relation to consumer protection principles, and this is based on the UN guidelines for consumer protection, we can see that women’s rights as consumers are not being upheld and that these consumer protection frameworks are not gender equal. So let’s give some examples of women’s experiences in the digital space. We have a lack of access to essential services. In Rwanda, 84% of women have access to mobile phones, but of those 84%, only 55% have access to mobile money. Women’s economic interests are not protected in the same way as men. The pink tax, as we all know, is a gender-specific form of offering products, which is translated from traditional markets into the online space as well. So in e-commerce platforms, we see the same pink tax occurring there. In the US, we have personal care products for women costing 13% more money for women than men. Products are. designed by default for men to contribute to an equal health outcomes as well. So we’ve seen this with VR headsets. They don’t account for the eye width of women, and so women are experiencing cyber sickness as a result of this. We have product design, again, just ignoring women’s needs with the mobile phones being the size for men’s hands instead of women’s hands. It’s more difficult to hold, to type. We have existing data contributing to gender discrimination. So any data that is used for AI algorithms are based on the reflections of society that we have at the minute, and that includes gender biases and discriminations. One common example is AI used for lending. There we have women are more disproportionately likely to be rejected for loans, especially black women as well. We have poor design allowing women to be sexually harassed online in spaces, VR, AR, with the metaverse. This is a design fault. There is no form of consent. There’s no consequence of what will happen to women, and this is then further compounded with difficulties in redress. Women are a lot less likely to seek redress when their consumer needs have been infringed or disregarded. A lot of the times they won’t seek redress unless they have the backing of a man in their household in a lot of countries. So we have all these harms that are absolutely gender issues, but they’re compounded by consumer interests, and this is a framework that is meant to protect consumers worldwide, but we can see that the framework itself is not being respected for women, and so the framework is designed, again, for men, with men in mind. But thinking about how we can address these policies and develop them so that… these challenges are mitigated at least. Gender equality in terms of access, inclusion, skills, and leadership can only be understood and addressed through internationally comparable gender disaggregated data. So there is an urgent need for this data in policy, product, and services design. Without this, policies can be misguided, gender biases can remain and be reinforced, and harm can occur. So even if we have gender intentionality in the design of these policies, products, and services, without this data, we have no evidence and real understanding of how women are experiencing these things in the marketplace and how they have such an impact on them. To be able to develop further and make sure that we have gender equality in digital spaces, in analog spaces, just generally as consumers in the marketplace. And so thinking of practical steps to move forward as well, to work together in a multi-stakeholder approach. We can, of course, apply a gender lens to any work that we have and ensure that women are in designer development roles. But this doesn’t offer a global change that we need. To be able to get the data that we’re looking for, this gender disaggregated data, we need to conduct more research. This includes product testing, product comparisons, looking into research for policy, testing out redress mechanisms, and seeing if women can go all the way through with them, whether they’re stopped through the time constraints, the cost of this as well. And having this data, just knowing how women are experiencing this is gonna help a little bit more than just having women in the spaces. So that we can, this is so that it’s. reflective of women everywhere, and not just personal experiences shared in individual rooms. And this is something that consumer organizations can help with, especially. National consumer organizations do product testing. They do product comparisons. And a lot of them will share this on their websites. So this can be, we can plug consumer organizations into different spaces. But with that, we need bridges for organizations working in silos, and making sure that we do have this multi-stakeholder approach. And this isn’t just your traditional policy, business, consumer organization. We also need to link in marketing agencies or marketing authorities to make sure that messaging around products and services is also not gender biased. We can create public awareness campaigns to make sure that women are aware of their consumer rights. And enforce them, and they can try and live a more fair life in the marketplace if they’re a little bit more aware of the consumer rights that they have. And then finally, just creating a little bit more visibility of the issues that there are, and making sure that there’s space for this influence of consumer issues. Because consumer protection can be a means to an end of trying to get to gender equality, particularly with the links to economic interests that are in the UNGCP. This might be an easier way to gather interest and gain a little bit more influence. Thank you.

Umut Pajaro Velasquez:
Thank you, Holly, for the intervention. It was really insightful. Because you put into cross how some details, how some economic rights can also affect another human rights. And then so how gender data is needed to actually improve the system in general. Not only in the consumer aspect, but in all the system in general. So thank you very much for that. Now we’re going with Chilufya Theresa Mulenga, she’s from Zambia. She’s a certified gender equality chain maker who founded the ICD4Head club. She has over six years experience in the STEAM ICD sector, where she has advanced in her development in innovation in local communities, and as I say, she’s involved in the Internet Society Zambia chapter. Lucia, the floor is yours.

Chilufya Theresa Mulenga,:
Thank you so much, Umed. I hope I’m audible enough. Am I audible enough? Yes, we can hear you. All right, thank you so much. I’ll be touching a little bit on how youth and gender diverse youth groups are present currently on Internet-related initiatives. So we have seen a prominent number of growth increasing in the youth and gender diversity groups and increasing and actively participating in Internet-related initiatives across various fields. And it’s initially because of a lot of education and skill development that has been advocated for youths and young women in various industries. So we have prominent youths and young women, young girls, young men actively participating in Internet-related fields because of the online platforms that are advocating. for gender-related courses and gender-related initiatives. So mostly these online platforms offer opportunities and also a chance for most of our youth and also various diverse groups to gain tech-related skills. And also there’s been some prominent growth in STEM programs that are promoting a lot of science technology and a lot of engineering in all diverse groups and which mostly aims to engage young learners including girls and gender diverse individuals in these groups. There has been over the years an increase in a lot of social media activism that has helped most of the inclusive individuals and groups to use, like I said, learning platforms and social media platforms to raise awareness about various issues that promote inclusivity and also mainly just advocate for social change nationwide and also global wide. And also these social media activism has promoted a lot of online groups that encourages a lot of online communities to provide a safe space for individuals and diverse group members from different backgrounds and different tech-related industries to connect and share experiences and just support each other. Also prominently, there’s been a lot of events locally, nationally, and just globally like the IGF that help to promote a lot of diversity and inclusive initiatives. Most of the events actually help to focus more on… inclusion and encouraging participation from a lot of youths and a lot of groups, marginalized groups, I would say, and individuals to give them a platform where they can be able to share various ideas and also engage with diversity, people from different backgrounds, from different countries, share their challenges, and also some innovative solutions that can help increase their advocacy and also their work to amplify our voices in interrelated issues. We do have a lot of open source and tech communities also to contribute that help engage a lot of youths and young women and allows them to contribute to any tech-related solutions that may help them develop some of their local communities and some of the initiatives go as far as collaborating with developers to develop a software application or even technology innovations that can help them just engage with their local communities and find some of the solutions that can help grow their local communities and also it helps them have a voice so that they can be able to talk to their local government and people that are making policies in their country. So, with that, there has been a lot of youth-led organizations that advocate for internet policies that promote accessibility and digital rights and online safety and this has helped a lot of people participate in discussions and also campaigns that help to shape the related policies. I’ll give an example for Zambia. We do have members of parliaments that invite us to sit down and discuss with them and we’re able to voice out our challenges and also provide solutions that may help to, that may help to increase youth participation and also provide tailored development in our local communities that mostly bend on youth. They have been initiatives like the CDF, that’s the youth fund that helps fund youth-led organizations to come up with projects and initiatives that mostly help develop their local communities. It can be a small business, it can be a small learning platform, but all these initiatives have been, they have increased participation in all gender diverse groups, more especially in marginalized groups. And also just as a way of introducing the digital environment to certain communities that don’t have the internet or don’t have access to actually participate on these online platforms. So the CDF has grown largely in the country and it has helped a lot of youth engage to certain groups of people who are learning and some who are not learning it to just kind of actually voice out what they need. These also, they have helped provide tailored solutions because it’s not everywhere where they have access to water, it’s not everywhere where they have access to good health facilities. So the CDF fund has enabled a lot of youth-led organizations to provide tailored solutions to these communities. by empowering the communities to learn what they can do instead of just waiting for the government to offer them money or to come and offer them a solution to the problems that they are currently facing. There’s been also some gender advocacy groups that have been created that helps to promote a lot of gender diversity by actually engaging in policy discussions and advocating for inclusivity, equal opportunities, and also safety for gender individuals online and as well as offline. So a lot of online activism has led to some online petitions and also youth-led campaigns that allow the gender diverse active groups to use any online platforms to launch petitions and awareness campaigns addressing a lot of prominent issues that still affect us even in the 21st century in relations to gender, youth, and also women at a large scale. And mostly of these issues have been addressed due to technology and it has helped a lot of youth engage themselves in various topics that affect them in their society like justice, climate change, and also gender equality and so on and so on. So just in summary, the youth and gender diverse individuals are very much prominent participants and they have leveraged a lot of online platforms to learn, create, and innovate and as well as advocate for local change and also become policy changemakers in their communities and also nationwide. And this contribution has played a very crucial role in shaping the digital landscape and also promoting inclusivity and diversity in the community. online world. Thank you so much. Thank you to you, Lucia, and for reminding us that the combination

Umut Pajaro Velasquez:
of advocacy with some grassroots work and technical, in general, multi-stakeholderism can be a benefit for getting more digital rights for Jewish women and gender diverse people. Now we are moving to our fourth speaker. She is Luisa Franco Machado. Luisa, the floor is yours.

Luisa Franco Machado:
Thank you so much, Umut. Well, good evening, Kyoto. Morning, Berlin. And hello to everyone in between. I’m Luisa Franco Machado. I’m a Brazilian feminist social scientist. Last year, the UN appointed me as a young leader for the Sustainable Development Goals for my work in digital rights and data justice. And currently, I advise GIZ, the German Development Corporation Agency, on the use of ICTs for development. However, today’s thoughts are purely mine, not affiliated with any of these organizations. That’s an important disclaimer. But now let’s dive right in. And I would like to actually begin with the shadows. So the silent, unseen, censorship that many of us face online. So have any of you ever heard of shadow banning? For those who haven’t, this is a sneaky form of online censorship. You post something and suddenly it’s like shouting into a void, you know, especially if you’re discussing something as radical as women’s rights or systemic issues, you know, or even if you have a perceived female body and show a little bit of skin, unless you’re a big influencer, TikTok will take you deep into this uncharted caves of the internet. My post on TikTok, for example, when I try to talk about something slightly more political, they really vanish from my followers’ feed. And sometimes shadowbanning might seem like a tech glitch, but actually it’s often a manifestation of deeper systemic issues, right? But the challenge is they don’t stop there. The digital space can really be a minefield, especially for youth, women, and gender diverse people. So while it offers a platform for advocacy and change, as we’ve heard in previous speeches, the backlash, especially from misogynistic and alt-right groups is real and it’s intense and they are super organized and it sucks. But it’s not just about facing threats though. Sometimes oppression is much more subtle. Our personal data and our digital footprints, they are really constantly harvested by nearly every single institution out there, not just the tech giants. But does this data really contribute to public welfare, to understanding the needs of, let’s say, gender diverse people or shaping policies? No, countries know close to nothing about their LGBTQIA plus population. Instead, the data collected is used to reinforce oppressive structures and drive profits, all the stuff we already know, right? Then of course, there’s erasure. How many times have we encountered online forums asking gender, male or female? They’re not just forms, right? They’re a symbol of the binary restrictive thinking that should have no place in our diverse world. The occasional other option, it’s a slap in the face, right? A gross oversimplification of our complex identities. Okay, so now what’s the way forward? First, let’s take a step back, because I know most of us have the attention span of a goldfish, so if you spaced out, now it’s time to come back. I mentioned at least five issues in the past three minutes. Shadow banning, fear of persecution, organized hate, data exploitation, and erasure of marginalized groups. That being said, our call to action is clear. First, we need and we demand a digital realm that celebrates diverse expression. And that’s not, you know, just kind of like a buzzword. We really need and want spaces that champion feminist discourse and critical thinking and not suppress them. Of course, this doesn’t mean allowing harmful content, but rather distinguishing between genuine critique and hate speech. Second, we need smarter content moderation. Governments must invest in and reinforce rigorous content moderation to protect marginalized voices and dismantle hate-driven narratives. I know this almost sounds like too much to ask, but it’s really not. But we don’t just need to hope for that to happen, right? Which takes me to my third recommendation. Responsible public intervention in the online space is not a choice anymore. Creating digital spaces or the data that is at the backbone of these spaces is just necessary. You know, look at Europe’s DSA and DMA. They are steps in the right direction, but they are just starting points, right? We need global yet localized efforts. So we really need to ensure that data collection of non-sensitive data, right, serves for what actually matters, understanding our community’s needs and shaping policies tackling them. Last but not least, representation is non-negotiable. To every public institution or tech giant out there, If your team doesn’t have queer, feminist, and diverse voices, you’re doing it wrong. Stop sidelining us into the other box and start recognizing our worth. Institutions they must not just include, but rather prioritize marginalized voices on decision-making. To wrap up, let’s dream of an internet where every voice matters. But let’s not just dream, let’s act. So find me online, all my contacts are here, but if you can’t see it, just search for Luisa Franco Machado online. It’s a huge step that we’re making space for these conversations. So thank you so much for Umut and everyone organizing this session. So let’s keep this conversation going and let’s foster a digital world that truly includes and celebrates all of us. Cheers to that. Thank you so much for that, Luisa, you touched a topic that is close to my, to everything that I do. So yeah.

Umut Pajaro Velasquez:
Thank you. Thank you so much for it. Well, right now we’re moving another online speaker. She is Daniela Cuspoca from Colombia. She is, wait a minute, she’s a lawyer with a study in economics and public policy. She worked several years in the sixth commission of the Colombian Congress in charge of technology and policies and regulation. Additionally is part of the ISO Foundation as a volunteer and she leads a project, focuses on the gender digital divide through digital literacy programs. So Daniela, the floor is yours.

Daniela Cuspoca Orduz:
Thanks so much. Thanks to everyone. So today I’ll be talking about the Colombian case, especially I will talk about the digital gender balance in the. country. The challenge that Colombia has by developing a policy that faces the phenomenon, since violence is the main human rights violation against women in the country, has become a problem of justice. So technically digital violence is any painful action carried out with the support of information and communication technologies in terms of distribution, exhibition, commercialization of images, videos, intimate sexual content, without the concept of the person, which definitely causes psychological and emotional damage to the victim. In Colombia, we have a generic law devoted to prevent violence against women. However, we don’t have any specific regulatory framework. We don’t have a name that can maybe emphasize with legal enforcement about digital violence in the country. And since we don’t have a name for that, we don’t have data, and it still is not clear how the way that government can act when this type of violence happens. So digital violence against women takes many shapes. It could be doxy, it could be non-conceptual dissemination of intimate images, and so on. Now Colombian authorities lack the necessary awareness to respond, and sometimes women victims tend to be re-victimized or even blamed for what happened. There is also a lack of interest to investigate this type of crimes. And at the end of the day, this legal gap makes it difficult to have reliable and comprehensive data to create better public policies. And at the same time, digital violence needs a particular response from the state, from the government, from the actors, and the protective measures we need to, in this type of cases, certainly are different. In the case of dissemination of intimate images, for example. We need to have, we need to take into account the impact that has this phenomenon for the victim to put the victim at the centre, give them psychological attention, for example. In September 2022, the Colombian Constitutional Court studied the first case of women whose intimate photos were disclosed without concept by another woman on Facebook. This woman showed the photos to her colleagues, and it was clear that releasing the images was intended to humiliate her using the traditional idea of how a woman should behave. And the purpose, obviously, was to damage her reputation in the workplace. However, in this case, the Constitutional Court only focused on the protection of sensitive data. However, this year, fortunately, the Constitutional Court ruled in relation to online attacks that certain women journalists have received with sexualized and misogynistic content. The court in this time is different, and forces multiple state actors to act against this violence. So, it asks all political departments and movements to create a code of ethics with guidelines to punish acts of violence, or incitement to violence online, implement an acts rule for women victims of any type of violence. So, as a consequence of this rule of the Constitutional Court, several initiatives have been presented in relation to the development of framework inside the Congress, but it is still pending of approval. Without adult, the state needs to recognize the digital phenomenon as a priority aspect to generate policies to support victims, but also to empower women online. Women need to know that they have a healthy and safe space to also defend their rights. And I appreciate the invitation to participate today, and I give the floor again to Umut, so that I can give our way to our next panelist, it was a pleasure to share the Colombian experience to all.

Umut Pajaro Velasquez:
Thank you so much, Daniela. We vote on the Colombia right now, we are live for in the morning, so thank you for the time. So I’m sharing this video in the case of Colombia. Now we moving to one of the speaker on site, he is Ayden Férdeline, I’m hoping that’s your last name, right? He is a public interest technologist, and Landecker Democracy Fellow, we human in collaboration with Alfred Landecker Foundation, so the floor is yours, Aiden.

Ayden Férdeline:
Thank you so much, Umut, I’m really pleased to be here. And the reason why I am on the stage today is because I wrote a report last year that was published by the National Democratic Institute that was exploring who is involved in making decisions within internet governance and internet coordination bodies. And we looked at the participation data over the past 20 years, and it was pretty clear that there was inadequate representation from women, from youth, from LGBT plus people. There were also other demographics that were missing too, and there were demographics that were given more influence than others, law enforcement, intellectual property interests, for example, and so of course… intersectionality plays into this. So what I wanted to really talk about was to build off of Louise’s call to action at the end of her talk about let’s act. What can we do about this? Part of the research that I did last year was speaking with leaders within internet governance institutions to understand how they perceive different stakeholders. How do they assess contributions that they receive? How do they act on the evidence that is presented before them? Something that I heard quite frequently was around that, aside from the fact that there are disputes over what adequate representation looks like, it’s also really hard to explain what adequate representation constitutes and is representation what we really want? Is it being on panels like this where with full respect to everyone in the room, we don’t actually have many decision makers in this room? We don’t have the IGF leadership panel. We have a few empty seats. What does it actually mean to have representation? Do we want outcomes instead? What would be outcomes that we’re happy with? And I would argue that effectiveness starts with how you conceptualize your work. And when I was interviewing different stakeholders last year for this project, something that came across very clearly to me when I spoke with civil society representatives who have very strong mission-driven goals that they’re working towards that are very important is the lack of a theory of change. There is this idea that the problems are so huge that we must solve them because they’re so urgent and pressing, and that is definitely true. But I do think civil society in general is not very good at being able to manage trade-offs, is not very good at being able to. to assess what is enough and what is not enough. And so to have a loud voice and to be able to give a good speech when you don’t have a problem statement, it doesn’t get you very far. When you can’t or you’re not doing the stakeholder analysis, when you’re not doing a power analysis, when you understand your own context but you don’t necessarily understand the context that others are working within, I fear that it can undermine what we’re all working towards. And so I think that for traditionally excluded stakeholders who are, I would argue, by design being excluded from some of these institutions, you have to be able to tell your story from a place of power. You have to be able to be an example of not how horrible and unfair the world is because you are, of course, a victim. You are intentionally being excluded. But you do have to also have agency. And it’s very difficult to develop agency when you are perceived by other stakeholders as victims of something. And you may be a victim. Again, you probably are. But if your advocacy comes from a place of victimhood, you just don’t get sustainable results, or at least what I saw is you don’t get sustainable results. You need to know how to set goals, how to prioritize, how to fight one battle at a time. And this is really difficult, particularly for advocates who are volunteering their time to focus on issues, who care about multiple things. It is so easy to be pulled this way, the other way. To be able to just really condense what you’re focusing on to one or two issues and to follow them through, it’s really difficult, but I think it’s something that’s really important for us to try to focus on. We are running out of time, so I’ll leave my remarks there. But very happy to expand on any suggestions, if you like. Thank you both.

Umut Pajaro Velasquez:
Thank you very much, Aiden. And thank you for sharing the call to action that is actually needed for all of us. in this kind of processes. Now to finally finalize this panel speaker, we have Vera Zakem. She serves as USA Chief Digital Democracy and Rights Officers. She’s situated in the Center of Democracy, Human Rights and Governance and she leads the agency’s agenda on digital democracy to ensure technologies advances democratic values and respect for human rights globally. Vera, the floor is yours and thank you so much for actually being there at the hour because I was so worried about it. I don’t know, it’s just me, but I cannot hear you. How about now?

Vera Zakem:
Okay, perfect. So yeah, thank you so much for hosting this. I’m delighted to be here. Actually, literally just got off the flight from the United States, so I’m glad I was able to make this. And then also, I represent the voice of government, but also the voice of the United States government. And I have some colleagues in the room as well that I would be remiss not to acknowledge, including my very dear friend and colleague, Cailin Crockett, who represents the White House, who may and others may have a few things to say on this topic. So what I wanted to do is bring not just the US government, but the government perspective to this topic. First thing is first, for multi-stakeholderism, we know in the digital realm, multi-stakeholderism is everything. And it’s from both in the global, in the normative settings and also in convenience like this, but also at the local level in a lot of the countries where a lot of the countries are operating in. And multi-stakeholderism. does require governments, civil society, and yes, private sector, like really private sector at the table, and not just the big tech but emerging tech. So on the government side, the United States has been doing quite a bit along with a number of other countries, 11 countries to be exact. The Biden-Harris administration announced recently, not too long ago, the Global Partnership for Action on Gender-Based Online Harassment and Abuse, and it really is in concert with 11 other nations. It really also has a multi-stakeholder advisory group composed of survivors, civil society, activists, private sector, and others. And the reason is because we in the United States are extremely committed to investing in preventing tech-facilitated gender-based violence and also related gendered disinformation and all of the ills that are happening to women, girls, gender diverse LGBTQ plus people. And so I do want to tell you a little bit about a couple of goals of the partnership, and again I’d be delighted for Caitlin and others to highlight as well, but I do want to kind of highlight a few goals and what the U.S. Agency for National Development, which is the United States foreign assistance arm, is doing. And some of it, quite frankly, I’ve actually been able to see it myself through a lot of the work in a lot of the places I’ve been to already in my current role. So the first is, there’s three big goals that I want to just cover real quickly. One is to close the gender divide, the gender digital divide, by promoting online safety, accountability, and meaningful connectivity. That’s foremost. We see so fundamentally access and connectivity are everything. I can tell you from the USAID, we have been investing in the space quite significantly. in a number of countries, one with the Reliance Foundations, we announced actually seven winners of Women Connect Challenge in India as one example, but we’re doing this in different parts of the world in a number of countries that we operate in. The second is really promoting meaningful participation, and meaningful participation for women and girls and LGBTQ plus in gender diverse populations. Did I lose you guys? Okay, good. By countering tech-facilitated gender-based violence and gender disinformation. I cannot begin to tell you how important this piece is. When women are at the table, that’s when meaningful change happens. We have seen it again and again. There’s data, there’s research on this, and this involves not only making sure that we are investing in women and girls and LGBTQ plus communities to ensure in all sectors of our society, including in political life and civil society, but also, I think you mentioned also in the tech sector as well, how critical this is. And here’s why, and I can even speak a little bit on the tech sector, having come from the tech sector into the role that I’m currently in. Because when women and girls, when women are at the table, this is when we’re talking about to ensure that human rights assessments are part of the product features. It is also making sure that we are in the room when meaningful decisions and change happen in all facets of society. But also most especially in the technology sector where a lot of the, if you will, decisions are being made. And by the way, when I talk about tech, I’m not just talking about the big tech, but I’m also talking about emerging technologies as well. Because again, having that cultural knowledge, having that. gender, if you will, or LGBTQ plus knowledge, and the contextual knowledge on how these products need to be designed is just so important. One of the things I can tell you at USCID, one of the things we announced at the last summit for democracy is the transform initiative where we’re actually trying to bring and really increase that participation in the civic life for women and girls, and we’re actually doing a number of pilots in the coming year, most especially in Guatemala, Georgia, and Kenya. But I actually, I will tell you on this one, I actually was able to see this myself. In May of this year, I was in the Middle East and North Africa, and this is where I saw, first and foremost, where women have been especially victims of tech-facilitated gender-based violence as well as gender disinformation, online hate and harassment online, so much so that they could not actually go back to where they were from. They were completely shunned, and also when we talk about shadow banning, that’s also shadow banning. But in that, I also saw glimmers of hope, and glimmers of hope were, for example, when I was in Jordan, I met a number of technologists who are developing digital apps and products that ensure that women are safe online. One of them is called Amanha, and it’s actually really just truly designed to promote digital security and digital safety for women. So it’s just, again, giving you one example. And the last but not least, I think this goes without saying, but I just think this is so important. We need to make sure that youth are at the table. Youth are the next generation, and as we’re here sitting, talking in person. person and in virtually around these issues. We need to make sure that youth, the investment in youth on these issues is paramount and it’s really critical. It is critical in all, again, facets of society, whether we’re talking about to ensure that they are, we inspire them to take positions in the public life and civil society, in the private sector, other forms of private sector as well as technology sectors and of course we’re making investments as well. But again, the last thing I’ll say, and I know we’re short on time and Kayla, I don’t know if you wanna add anything to this, is this, no government can do this alone. Even though I’m here representing the government perspective here in the U.S. government, no government can do this alone, no civil society actor can do this alone or private sector entity. That is why it is so critical and I firmly believe in the multi-stakeholder, not just convenings, but ensuring that we have multi-stakeholder solutions to this problem. That I actually think is the beauty of the global partnership, why I think it’s really great. But also, again, it’s part of the solutions building, which is so important that we take these big ideas, everything that’s happening at the global level, all of these amazing convenings that we’re having this week and so many other for us and translate them to action at the local level because multi-stakeholderism needs to be built at the country level and as well at the sub-national level. And then when you marry the two, from global to local, then I think we’re gonna, we can, not gonna start, but can continue to start making and seeing meaningful progress. I’ll stop there.

Umut Pajaro Velasquez:
Well, as we are running out of time, this is where we don’t want to have time to actually hear from the people on the floor about the topic. So I will really thank you to all of you for reminding us first like the importance of having grassroots movement working in different aspects of digital rights, how economic rights are related with other human rights and how this is important to get data on gender data to improve the quality of life, not only women but also gender diverse people, how multistakeholderism is essential in all the processes that we want to address and all the changes that we want to, also how the own agency or individuals that are women, gender diverse people or are part of the homogenised or underrepresented population is important in this factor, and finally how policies are necessary also in all these processes and how representation should be meaningful and we have always called to actions in order to get the changes that we need, and having always as I said before the multistakeholder approach. Thank you very much for your interventions and for your time and yes if you want to reach any of the panelists you can find the information on most of them in the session page, and also you can reach me as Umu Pajaro, I will share some information about them if you authorise me, and also you can follow the gender standing group and I will… share with you anything that you wanted to know. Thank you very much. And that’s all for now.

Chilufya Theresa Mulenga,

Speech speed

134 words per minute

Speech length

1217 words

Speech time

544 secs

Agita Pasaribu

Speech speed

138 words per minute

Speech length

663 words

Speech time

289 secs

Ayden Férdeline

Speech speed

186 words per minute

Speech length

846 words

Speech time

272 secs

Daniela Cuspoca Orduz

Speech speed

143 words per minute

Speech length

661 words

Speech time

278 secs

Hollie Hamblett

Speech speed

168 words per minute

Speech length

1269 words

Speech time

452 secs

Luisa Franco Machado

Speech speed

153 words per minute

Speech length

973 words

Speech time

381 secs

Umut Pajaro Velasquez

Speech speed

124 words per minute

Speech length

1344 words

Speech time

649 secs

Vera Zakem

Speech speed

171 words per minute

Speech length

1504 words

Speech time

526 secs

Empowering Civil Servants for Digital Transformation | IGF 2023 Open Forum #60

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

The lack of digital skills and AI competencies in the public sector has significant implications for the adoption of AI. This is because the absence of necessary technical competencies can result in inhibitory legal measures. Without the required digital skills and AI competencies, it becomes difficult for the public sector to fully embrace and implement AI technologies, leading to prohibitory laws that hinder its adoption.

Similarly, the lack of technical skills within government teams poses challenges to the sustainability of AI projects and their transfer from the private to the public sector. The co-development and handover phases of project life cycles become difficult due to a lack of understanding and technical abilities. The absence of these skills hinders the successful implementation and continuation of AI initiatives in the public sector.

Public-private partnerships are seen as key for successful digital transformation, but achieving these partnerships has proven to be challenging. Donors insist on public-private partnerships to drive digital transformation, but the realization of these partnerships has been difficult. Despite the positive sentiment towards public-private partnerships, their implementation poses obstacles that need to be overcome.

Civil servants should be better equipped with digital skills to drive transformation in the public sector. Different skill levels are needed for different civil servant levels, as higher-level civil servants may require a different set of skills than the average government worker. Embedding digitally competent officers can help bring about digital transformation, which is viewed positively.

Before any government department embarks on digital transformation, a deep dive study on the impacts is necessary. Such a study, involving all stakeholders, can result in a nuanced understanding of the transformation process. It is important to ensure that the intentions are aligned with the execution to avoid falling short. The positive sentiment towards deep dive studies highlights the need for a thorough understanding of the impacts of digital transformation.

Synergy and buy-in from multiple levels of government are essential for successful digital transformation. In countries like India, where both the central and state governments implement digital transformations, synergy becomes crucial. Additionally, many civil servants may have pushback towards new technologies and processes. To drive successful digital transformation, it is important to demystify these technologies and processes for them. This is viewed positively as it emphasizes the importance of collaboration and cooperation in digital transformation.

A rights-based approach and end-to-end native language digital transformation are important considerations in the implementation of digital transformation. Often, rights are overlooked during the transformation process, and it is necessary to ensure that a rights-based approach is adopted to protect individuals. Furthermore, digital transformation should be end-to-end in native languages, including voice-based technology, to ensure inclusivity and reduce inequalities.

There is a significant lack of awareness and involvement in digital public infrastructure (DPI) issues in African countries. A survey conducted across 24 African countries involving the CSO community and members of parliament revealed a low level of involvement and understanding of DPI issues. This neutral sentiment highlights the need for increased awareness and engagement in DPI matters in African countries.

Addressing simultaneous issues in the public sector, such as data protection, blockchain, and digital ID, requires a multidimensional approach. It is necessary to curate solutions with a broad understanding of these issues. This sentiment suggests that a holistic approach is needed to tackle the multifaceted challenges in the public sector.

Tailor-made strategies for different audience types within the public sector are important. This includes tech experts, literate consumers, and decision-makers, who may require different types of capacity building. In addition, a gender-sensitive approach is necessary to ensure that digital capacity building is inclusive and addresses the specific needs of women. This positive sentiment emphasizes the importance of tailored strategies and gender equality in the public sector.

Cultural change, continuous assessment, and the development of collaboration skills are necessary alongside digital skills. Government resistance to change due to age-old systems can hinder digital transformation. Institutions like UNESCO can provide frameworks for reliable data and support in fostering digital skills, which is viewed positively.

It is important to address the fear and misunderstanding around AI in the civil service sector. The fear of AI in civil service can stem from misunderstandings, and there is a need for more clarity regarding the role and capacity of AI. This negative sentiment highlights the importance of addressing concerns and providing clear explanations about AI in the civil service sector.

Gaps exist in knowledge about the relationship between technologies and their human rights impact. It is important to consider human rights impacts in digital capacity building. This is viewed positively as it underscores the need for responsible and ethical approaches to technology implementation.

Digitalization should be seen as a tool to solve specific problems rather than just an end goal. The application of technology without understanding the problem it aims to solve can be disruptive and limit problem-solving capacity. This negative sentiment highlights the need for a problem-driven approach to digital transformation.

Technologies impact people and communities at risk differently, and such communities should be involved from the start. These communities have often been least effectively served by government agencies. This negative sentiment emphasizes the importance of inclusivity and involvement of marginalized communities in digital transformation.

Digitalization can also be useful for improving internal processes within organizations. The use of artificial intelligence, for example, can improve tasks such as searching legal text. This positive sentiment highlights the potential benefits of digitalization for organizational efficiency and effectiveness.

Receptiveness to feedback from civil society is vital for the successful implementation of digital transformation in the public sector. Involving public opinion and enhancing public engagement are essential for driving digitalization. Education reform and stronger cyberinfrastructure investments are also necessary. This positive sentiment underscores the importance of stakeholder engagement and collaboration in digital transformation.

Capacity building in the judiciary is required to handle issues related to administration and policymaking in digital transformation. This neutral sentiment highlights the need for specialized skills and knowledge within the judiciary to address legal aspects of digital transformation.

Complexity and uncertainty in digitalization can lead to fear and resistance. The fast-paced learning and constantly evolving nature of technology introduce challenges and uncertainties, which can discourage individuals from embracing digitalization. This negative sentiment points out the need for support and guidance in navigating the complexities of digital transformation.

Building capacities towards digitalization should be a collective effort rather than an individual one. The challenge posed by the literacy problem in societies highlights the need for community-wide initiatives to enhance digital skills. This neutral sentiment highlights the importance of collaboration and collective action in driving digital transformation.

AI can provide new approaches to learning and demystify digitalization. AI-based tools, such as simulation and studying behaviors in collective learning, have the potential to revolutionize education and facilitate understanding of digitalization. This positive sentiment recognizes the transformative potential of AI in the learning process.

Regulation needs to catch up with the fast-paced development of technology. The pace of technological advancement often surpasses the ability of regulations to keep up. Changes in regulations from GDPR to AI acts highlight the need for regulatory updates to effectively govern new technologies. This negative sentiment calls for increased regulatory agility.

Lifelong learning and adaptation are necessary in the digital age. The constant evolution of technology, such as the development of ChatGPT, and changing regulations require individuals to continuously update their skills and knowledge. This positive sentiment emphasizes the importance of continuous learning in the digital era.

In conclusion, the lack of digital skills and AI competencies in the public sector poses challenges to the adoption and successful implementation of AI technologies. Public-private partnerships, tailored strategies, and a human-centric approach are important for driving digital transformation. Deep dive studies, synergies, and a rights-based approach are necessary for effective digitalization. Addressing fears and misunderstandings, considering human rights impacts, and involving marginalized communities are crucial elements of digital capacity building. Receptiveness to feedback, capacity building in the judiciary, and regulating technology at an appropriate pace are vital for digital transformation. Overall, the multifaceted nature of digital transformation requires a comprehensive and collaborative approach to ensure its success in the public sector.

Nobu Nishigata

During the discussion, the speakers explored various challenges and opportunities related to technology in government services. One major issue that was highlighted was the difficulties in connectivity specifically with Zoom, compared to other platforms such as Webex and Teams. It was mentioned that there is a preference for Zoom over Webex and Teams for webinars specifically, however, there are still challenges in achieving seamless connectivity.

Another important aspect discussed was the need for better tech understanding among government workers. It was noted that there are differences in tech capabilities and requirements across various government sectors. In particular, there is a lack of understanding among “normal” people in the government who work on document creation. An expectation was expressed for AI technology to aid in their work, providing a solution to these challenges.

The risks associated with AI technology were also a concern. It was highlighted that allowing every government person to use Chat GPT, an AI technology, within the government network comes with certain risks. The speakers emphasized the need for more understanding and awareness of AI technology to mitigate these risks effectively.

The advantages and challenges related to cloud services were also discussed. The government has a preference for on-premises services due to security concerns. However, it was acknowledged that cloud services offer advantages in terms of cost and efficiency. The discussion touched upon the need for a better understanding of the benefits of cloud services and finding a balance between security and efficiency.

One significant conclusion drawn from the discussion was the expectation for UNESCO and its partners to aid in improving government services through a better understanding of new technology. The goal is to leverage this understanding to enhance the delivery of government services. This expectation reflects a positive sentiment towards the potential impact of collaboration between UNESCO and government agencies.

In summary, the discussion highlighted the challenges of connectivity with Zoom, the need for better tech understanding among government workers, the risks associated with AI technology, the advantages and challenges of cloud services, and the expectation for UNESCO and its partners to aid in enhancing government services through improved technology understanding. These insights provide valuable observations for addressing the technological needs of government services.

video

Artificial intelligence (AI) and digital transformation are predicted to contribute over $13 trillion to the global economy by 2030. These technologies are shaping societies and economies in a positive way. The adoption of AI and digital transformation has the potential to stimulate economic growth and improve productivity across various industries.

Policymaking plays a crucial role in ensuring sustainable development amid the impact of AI and digital transformation. It is important for policymakers to consider the needs of different social groups and the environmental implications of these technologies. By implementing appropriate policies, governments can leverage AI and digital transformation to achieve sustainable development goals.

However, there is a significant issue of readiness among civil servants for the digital revolution. Many countries lack strategies to improve digital skills, and siloed decision-making prevents the effective implementation of digital transformation schemes. This lack of preparedness hinders the full potential of AI and digital technologies in the public sector.

To overcome these challenges, it is important to ensure that the adoption of digital technology and systems is inclusive and tailored to the unique context of each organization. Competency gaps in digital adoption, data analysis, IT, and AI skills need to be addressed, with particular attention given to the inclusion of women. Low levels of investment in digital adaptation create disparities and hinder progress towards reducing inequalities.

Upgrading government organizations for the digital age is crucial. Cultural and organizational barriers, along with data and infrastructure issues, pose challenges to digital transformation in the public sector. However, by addressing these barriers and investing in the necessary resources, governments can enhance their ability to deliver services efficiently and effectively.

The introduction of the Artificial Intelligence and Digital Transformation Competency Framework is a positive step towards equipping public sector officials with the necessary skills and knowledge. This framework, based on extensive research, outlines the essential digital competencies required in the digital age.

In addition to the competency framework, the Digital Planning and Design, Data Use and Governance, and Digital Management and Execution domains are established to improve understanding and address complex problems associated with digital transformation.

To achieve successful digital transformation, a particular mindset is necessary. Trust, creativity, flexibility, curiosity, and experimentation are essential for embracing and adapting to the changes brought about by AI and digital transformation.

In conclusion, AI and digital transformation have the potential to significantly impact economies and societies. Policymaking, inclusivity, and the competency development of civil servants play important roles in ensuring sustainable development. Although challenges exist, upgrading government organizations and embracing the right mindset will enable successful digital transformation, with the potential to drive economic growth and improve overall societal well-being.

Gianluca Misuraca

There is a growing recognition for the need for a global digital governance framework. This call has been made by influential figures such as Kofi Annan in 2002, who highlighted the urgent need for Information and Communication Technologies (ICTs) to bridge the digital divide. This need for a framework continues to be pushed by current UN Secretary-General Antonio Guterres, who advocates for a human-centric digital transformation strategy.

The importance of AI governance in the public sector is a central focus. The use and management of Artificial Intelligence (AI) in this sector are deemed crucial and require the incorporation of human-centric principles. The AI4Gov program has been launched to equip civil servants with the necessary skills to handle AI implementation and governance. This program aims to enhance the understanding of AI technology, its ethical use, procurement systems, and the need for interdisciplinary skills. The program also emphasizes the importance of teamwork in dealing with complex issues.

Addressing the multidimensional and complex issues linked to digital transformation is of utmost importance. It has been reported that only 20% of UK civil servants are currently equipped with the skills needed to manage the digital future. This indicates an urgency to upskill civil servants to handle the challenges and opportunities brought by digital transformation. The development of a comprehensive national framework is crucial in ensuring that countries are digitally ready and capable of effectively managing the digital landscape.

UNESCO has been actively working towards operationalising the guidelines and principles they have provided. Efforts include the development of a self-assessment methodology for policymakers and civil servants to improve their capacity. Additionally, principles have been designed for an open educational resources repository, and a proposal for a short-term curriculum for the training of policymakers has been put forward.

The creation of a digital competence framework, addressing areas such as digital planning and design, data generation and user governance, and management and implementation, is underway. This framework aims to provide a toolkit for inclusive digital planning and design. Furthermore, the idea of establishing a knowledge-sharing community in the realm of digital governance and AI competence is being explored.

Overall, the need for a global digital governance framework remains evident. The use and governance of AI in the public sector are central in this regard. Efforts to equip civil servants with the necessary skills, operationalise guidelines, and develop inclusive digital planning and design tools are crucial steps towards effective digital governance. There is a clear emphasis on the importance of interdisciplinary skills, teamwork, and a human-centric approach in addressing the challenges and opportunities presented by digital transformation.

Prateek Sibal

A joint convening by UNESCO and GIZ’s Fair Forward team highlighted the importance of capacity building for civil servants in the context of digital transformation. The meeting aimed to encourage communication and learning between ongoing capacity building initiatives. Collaboration and knowledge sharing were identified as crucial for effectively preparing civil servants for the digital age.

The formation of a coalition model for sharing good practices and developing new content was supported. This coalition has the potential to create new knowledge products that can benefit organizations globally, contributing to digital transformation efforts. The need for practical implementation of competency frameworks, such as the one focused on AI and digital transformation, was emphasized.

The impact of AI and digital transformation on societies and economies was acknowledged, with a projected contribution of over $13 trillion to the global economy by 2030. However, a recent survey revealed that most civil servants are not adequately equipped for digital transformation. This is attributed to the lack of strategies to improve digital skills and barriers caused by siloed decision-making processes.

UNESCO proposed solutions to overcome capacity barriers related to culture, organization, data, infrastructure, and human resources. A comprehensive approach that addresses multiple dimensions of digital capacity building is needed. Public sector officials were also identified as requiring a solid understanding of digital technologies for effective transformation.

Trust, creativity, flexibility, curiosity, and experimentation were highlighted as crucial qualities for successful digital transformation. These qualities enable individuals and organizations to embrace new technologies and navigate the ever-evolving digital landscape.

Prateek Sibal advocated for capacity building in government organizations, emphasizing the use of digital solutions, new technologies, tools, and strategies to solve complex problems. This highlights the role of digital capacity building in enabling governments to address the challenges of the digital age.

The complexity of digital capacity building was recognized, emphasizing the need for continuous learning and literacy about evolving technology. Digitalization necessitates rapid learning and adaptation to technological advances. Lifelong learning was identified as crucial due to the pace at which technology and related regulation evolve.

A dynamic coalition on digital capacity building involving civil society, academia, governments, and the private sector was proposed. This coalition would serve as a community of practice for knowledge sharing and collaboration. It would also focus on developing assessment methodologies for civil servants, enhancing their preparedness for digital transformation.

The gap between technology and regulation was highlighted as a concern. With technology advancing at a faster pace than the creation of related regulation, individuals may feel uncertain and fearful about rapidly developing digital technologies. Proactive regulation that keeps up with technological advancements is crucial.

In conclusion, the joint convening by UNESCO and GIZ’s Fair Forward team emphasized the critical role of capacity building for civil servants in the context of digital transformation. Collaboration, knowledge sharing, and practical implementation of competency frameworks were highlighted. Additionally, the impact of AI and digital transformation, challenges faced by civil servants, and proposed solutions were discussed. A comprehensive, multidimensional, and global strategy for digital capacity building is essential.

Session transcript

Prateek Sibal:
So, good morning, everyone. I think we’ll start now. I’m receiving WhatsApp messages of people who are late, but let’s be on time. So welcome to this open forum on capacity building for civil servants on digital transformation, which is co-organized by UNESCO and GIZ’s Fair Forward team. Some of our GIZ colleagues are also online. And welcome to all of you who’ve made it this early in the morning. The idea is really to have an open conversation, to learn from you. We’ve shared with you some of the guiding questions on what this open forum seeks to achieve. The first idea is to really convene a diverse group of experts from different parts of the world who are working on capacity building initiatives so that we can explore whether a coalition would be a sustainable model to go forward in terms of sharing good practices of capacity building initiatives. I’ve been here since the past two, three days, and we’ve heard about so many wonderful initiatives, but they don’t seem to be talking to each other. For instance, I was talking to Mark from Kenya in GIZ, and they’re doing some great work. And then I was talking to Risper, who’s also here from Nairobi, and they’re doing some great work. But we need to kind of learn from this work and then also share these practices with different parts of the world. So this is just one of the reasons. The second is, of course, we want to also develop new content and create new knowledge products which can then be used by partners and organizations around the world. So just as an example, we launched the competency framework on AI and digital transformation with the UN Broadband Commission, which is itself a multi-stakeholder group composed of the private sector, civil society, governments, academia, and UN entities, of course. And we developed this framework through a year-long process of regional consultations and then through a working group. And now we have the framework, which has identified a wide range of competencies, and some of you have the copies in front. Now the point is about how to operationalize this. And UNESCO alone cannot do it, or GIZ alone cannot do it. We need to work with partners and build these coalitions, and then eventually support governments with your expertise. So this is the kind of the broad theme of the conversation today. I’ll invite our technical team to play two short videos to kind of set the stage, and then my role will be really to facilitate conversation. We’ll be taking notes, and then I’ll walk you through some of the final objectives for this session. May I request the host to play the video, please?

video:
Artificial intelligence and digital transformation competencies for civil servants. We stand on the cusp of a digital revolution brought by artificial intelligence and other digital technologies. These technologies are shaping societies and economies, and are predicted to add over $13 trillion to the global economy by 2030. Given how significantly AI and digital transformation is affecting different social groups in our environment, policymaking plays a crucial role in ensuring sustainable development. The question is, are civil servants ready? Unfortunately, the answer is no. A recent survey of 198 countries found 47% had no strategy to improve digital skills, and 51% of government chief information officers said they were blocked from implementing digital transformation schemes by siloed strategies and decision-making. This needs to change, and UNESCO has been working on how. Beyond funding constraints, there are three key challenges to address. Cultural and organizational barriers. Many governments see opportunities in changing their traditional way of working by encouraging experimentation and innovation to deliver better services to people. Data and infrastructure barriers. This includes limited access to datasets, inefficient data organization, management and governance, and a lack of IT infrastructure investment. These issues need to be addressed. Human resource capacity. Related competency gaps grow when there are low levels of investment in digital adaptation, data analysis, IT, and AI skills, particularly for women. The adoption of digital technology and digital systems needs to be inclusive and fit each organization’s unique context. Fortunately, while these issues might be challenging, they aren’t impossible to address. Watch the next episode to learn more about it.

Prateek Sibal:
So that’s a short overview of the challenges that we’ve mapped over the past years. And I would, before we go to some of the solutions that we are proposing, actually like to open the floor and invite our host country here, Mr. Nobuo Nishikata, to also say some opening remarks and welcoming words. Over to you, sir.

Nobu Nishigata:
Good morning, everybody, and welcome to Kyoto on behalf of the Japanese government and the Ministry of Internal Affairs and Communication, who hosts this IGF. We are very much proud of it, and a warm welcome to everybody. And just as I saw the video, there’s great work. Most of them I agree, even in the Japanese government, and we always appreciate the work of UNESCO, the wide range of the work stream on the capacity building. And let me give some words on the capacity building that the Japanese government is facing. Just some of the programs that you already showed, and for example, like we are having a hard time connecting with Zoom. It’s more like a network thing. We can use the Webex and Teams, but some different network structure provided by Zoom. So we are still working on it, and of course, the company with Zoom is also working to get us more connectivity to the Japanese government so that we can use them, particularly for the webinars. I mean, for the video conference, then the Webex and Teams are okay, but once we want to have the webinars, then Zoom is some advantage right now. So we are working on that thing. Or maybe like some challenges, the government is more like a procurement, I would say. It’s a big issue, like for the government perspective, I mean, there are a bunch of the different kind of the people working in the areas. So for example, the people who are working on the research and development side, we don’t much worry about their capacity or capability of doing their job, because they know what the technology is, and they know how to cope with it. But on the other hand, the normal people who usually, you know, they’re making the documents, like for me, like make some documents to the minister, documents to the other ministries, and some speech for the minister, et cetera, these people, we are not very good at a computer. I mean, of course, we can use the computers, but we know more. We want to know more about what the technology is built on, and those kind of things. Once, particularly when it comes to the AI, like a chat GPT is a great solution, and we have very big expectation on the technology within our work, but still there are some risks in it, and it is not easy to allow every government people to use the chat GPT within our network within the government. I mean, if you can use a stand-alone PC or your smartphone, then it could be okay, but there are some risks, and we have to identify the right risks. We don’t have to worry too much, but still we have to, I mean, then the UNESCO can come in to help us understand better what the technology is, or like, for example, maybe before that the AI came in, there were some challenges in the cloud services. You know, like the government is more like prefer to have the data within the building in the government, on-premise type of services, but of course there are some advantages in the cloud services in terms of the cost and some efficiency and et cetera, but still we have to know more about the security or like SLA type of things to know better about the cloud service, so that we can get the best advantage of the cloud service in our service. So there are many, many things that we are expecting that the UNESCO and your partners in working harder to help us to do the better service in Japan. So I mean, it goes to everybody, I think, I hope, so I think we are just up here.

Prateek Sibal:
Thank you. Thank you for sharing those examples, and actually these are some of the challenges across governments around the world. It’s not only in Japan, it’s in different countries, and I’m hoping that we’ll hear more about that also today. We’ll play the second video, and then I’d like to move also to the online. I know that a lot of people have connected on Zoom as well, so may I invite the technical team to play the second video, and then we’ll go online.

video:
To strengthen government organizations for the digital age, we need to meet the challenges of digital transformation. This doesn’t mean public sector officials have to become specialists, but they do need a solid understanding of how technologies work and of their impacts. This is where the Artificial Intelligence and Digital Transformation Competency Framework comes in. Built on exhaustive global and regional research, it articulates essential digital competencies that public sector officials need. There are three competency domains that are interlinked and complementary. Digital planning and design. This enables better understanding of the volatile, uncertain, complex, and ambiguous problems policymakers face. It will allow policymakers to identify opportunities, to use digital solutions and strategies, and to handle possible unwanted consequences. Data use and governance. This competency provides a deeper understanding of the data lifecycle. It will support policymakers in addressing governance issues and public expectations while using data effectively and ethically. Digital management and execution. This empowers policymakers to apply new management and collaboration tools in government. It will enable them to harness data, new technologies, tools, and approaches to solve complex problems and foster civic participation. In addition, digital transformation also requires a mindset that enables trust, creativity, flexibility, curiosity, and experimentation. Digital transformation is everywhere, and the knowledge and skills divide across governments is expanding. Let us leave no one behind. Those who are prepared are the ones who will benefit the most and create the most benefit.

Prateek Sibal:
I’d encourage you to check out the report at a later point. I’d now open the floor and really start with the conversation today. I’d like to invite Dr. Jhanluka Misuraka, who’s joining us online at 1.30 a.m. in Seville. Jhanluka, if you can take the floor and share some of your thoughts around what kind of work you’re doing, what kind of capacity building are you doing with your AI4Gov program, but also what are the skills and knowledge we need in today’s age in the public sector? So, over to you, Jhanluka.

Gianluca Misuraca:
Thank you, Pratek, and good morning. I hope you can hear me well. Yes, loud and clear. Yes, it’s true. It’s almost 2 o’clock in the morning. I’m actually calling from Rome today, but yes, I’m normally based in Seville when I’m not traveling, so it’s a pity I could not make it to IGF. That was the plan when we discussed with Pratek, so sorry for that, and I hope you’re enjoying the forum and I’m following it from remote. So, I will just share. I prepared a few slides, if you allow me to share and try to be brief, but yes, that’s something that I want to share with you is exactly the topic of the day, whether we are able as civil servants and policymakers actually to master the digital governance and especially AI, that is now artificial intelligence is what everybody is talking about. I know there are a lot of sessions at the IGF on this topic, also closed-door meetings like this morning that was discussing about the global governance issue of AI. So, if we are actually ready for disruption, that’s something more than what already the video showed and what Pratek was saying. I’ll try to go brief on a few issues. So, basically, why we are still lacking after more than 20 years of the global digital governance framework that we are in much need for this topic, and maybe we should also be a bit back to fundamentals. Everybody is talking about charge EPT and generative AI. That’s very exciting, but maybe we still have to fix some of the basics in our public administrations, and that’s why we propose, and I’ll show a bit of what we’re doing with the AI4Gov master. We need what we call functional specialists for supporting, let’s say, the governance of AI, and that’s what we are also trying to do with the colleagues of UNESCO that we partner with to build a compass for digital governance and AI capacity. So, briefly, I was working for the UN General Secretariat back in 2002. At the time, Kofi Annan was the Secretary General, and he was pushing very hard on the fight against the digital divide and showing the sense of urgency that we had already at the time very, very clear, and as ICTs, as we were calling at the time, were actually already about to change the world, and they did so, but 20 years later, the Secretary General Antonio Guterres is still calling for the need to really make sure that we can manage this digital transformation, and we basically need to do this in a human-centric way, and that’s why probably, I mean, for next year, there’s the need to propose something, let’s say, concrete to make sure that we can have still the open, free, inclusive, and secure digital governance that we deserve, and that’s a very important role for governments in addition to all other stakeholders. So, this shows also the need and the urgency for equipping the civil servants and policy makers with the skills and the capacity, as it was mentioned before, needed to also address these big challenges. Now, going back to the fundamentals, as I said, we need to really rethink a bit the way we address public sector innovation, I mean, in a data-driven society, so data is fundamental, that’s one of the key competencies that was mentioned before in the video, and clearly, we need to address the multidimensional complex issues that are linked to the digital transformation. It’s not just digitalizing or putting some computers in the room, it’s really completely reframing and changing the way we address the digital transformation strategy. I mean, I won’t go into details, but I just want to mention that when I was still working for the European Commission JRC, the Joint Research Centre, we did a comprehensive review of literature and practice on this, with a specific focus on the European Union, and we saw that despite the quite big rhetoric on this topic and the claim many governments have done over the years, there’s still a lot to be done, and at the policy level, it’s important to be really clear on what is the objective of these transformational strategies we want to, let’s say, you want to unleash. And so, the question is, if we are ready for it, I think this was also one of the questions in the video, and actually, the answer is yes, because data shows actually the very not rosy picture, and the latest data from ITU shows in their dashboard, and actually, for instance, despite there is an effort to prepare to have digital-ready countries in the world, only a few actually have a mature national framework, and even, let’s say, advanced countries like the UK, that notably quite always been a pioneer in this topic, they showed in recent data from the National Audit Office that only 20% of their civil servants actually are equipped with the skills needed to manage the digital future, as they say. So, this shows that we need a lot of this capacity building, and this is not just the technical skills that are needed, and actually, what we did with the I4Gov program, that is a program implemented by the Universidad Politecnica de Madrid and Politecnico di Milano, also in collaboration with other partner universities in Estonia and Germany, is to design a master that actually addresses what we call specialist role, based also not only on teaching and training theoretical issues or technical work, but actually based on real project and concrete cases. And at the same time, we’re trying to build, and that’s why the… collaboration with UNESCO, an ecosystem that of course started from the European Union, but actually has a global outreach and a mission to create a network worldwide. So the master in particular that I have the pleasure to direct is actually training, at the moment we are in the third edition, we have trained 120 executives from all over the world, more than 40 countries are represented, and here the idea is really to focus on the governance aspect of AI that are fundamental, the human-centric principles for service design and the AI systems, and that’s very important because while we of course have experts from the AI and data science, we also have specific complementary skills from the design department of Politecnico di Milano, so the question here is not what kind of AI to use or what techniques or what methodology or technology, but is rather if we really need to use AI for instance on a specific service, and now we can redesign the entire process to make sure that we use the best technology, the more appropriate technology. So we of course focus on the use of AI in the public sector, but also there is the importance of public procurement that was actually mentioned in the intervention from the host representative. So to get to the conclusion…

Prateek Sibal:
Gianluca, we can’t hear you for some reason. Can you try again? No, sadly we don’t hear your conclusion. Okay, now you’re back. Okay, I don’t know what happened, so maybe we were, I don’t know, we were banned from the conclusion. I don’t know. Okay, so just, can you hear me? No? Yes, yes, please. Okay, so I hope I’m not taking too long.

Gianluca Misuraca:
So basically, yeah, just getting to the conclusion. So yeah, the work that we are, I mean, we are doing with Pratink and colleagues at UNESCO is actually, I would say, quite ambitious and it was very interesting because we’ve been trying to develop a comprehensive approach to operationalise exactly the framework that has been developed by UNESCO, that of course provides the principles, the guidelines and the specific, let’s say, orientation. But now we need to design and develop, and that’s what we’ve been doing with colleagues, a self-assessment methodology for making sure that policy makers, civil servants, both at individual level but also organisational level, can actually be empowered, if you want, because by first assessing the needs and then developing specific tools that can help them, let’s say, improve their capacity. At the same time, we are supporting UNESCO on designing and defining what are, let’s say, the principles for an open educational resources repository that could support also the digital capacities navigator that UNESCO and partners are actually developing. And at the same time, we have proposed an outline of a short-term curriculum, I mean, curriculum for a short-term training for policy makers that, based on this compass, could actually be immediately operationalised. And in fact, I mean, I don’t know if Pratink we can say that there will be a first pilot training soon in Africa, and others, I guess, will follow. So just to, I mean, without going into details, what we have been doing, of course, we started from the work UNESCO and the Broadband Commission with IQ data of this competence framework. We’ve been, I mean, re-conceptualising certain issues, but we also engaged some of the participants in the AI4GO Master and other experts in validating some of the proposals we made for having, you know, a self-assessment methodology. And then we, of course, proposed this based on questionnaires and some tools that could be then piloted and further developed into this digital governance and artificial intelligence compass or competence compass. So just to mention, and also we are trying to align with the canvas, we call it the functional specialist canvas of AI4GO that we are also developing, because here the difficulty is to create some, probably some new professional roles or some new figures that we need, some new profiles that we need in the public administration in particular, is not the super data scientist, the super expert in AI, but is rather someone that understands how this technology can be used, how to procure, let’s say, systems that are ethical and appropriate and context-based. And of course, we have three areas here. One is the management, the technology also, and the policy and legal and ethical aspect. These are all in, let’s say, embedded into what we call digital governance, basically. And we’ve been doing this with a number of colleagues and through some expert peer review and validation. Also to underline the importance not just to be the best technical expert, but actually this is a multidisciplinary field. So we need to really combine hard and soft skills. And some of these soft skills are what is sometimes making the difference. And it’s not enough, I mean, it’s not so important or not important for all, especially at the highest level of the hierarchy to be technically a super expert, but rather it’s important to have this interplay between soft and hard skills that is fundamental. And of course, what we have to also understand, this is a teamwork, it’s not just the individuals that need to be empowered, but it’s rather the team, the organization, the department that deal with these complex issues. And so to conclude, this is the first sketch of the work we’ve been doing over the summer, basically to exactly try to personalize the three main areas that was mentioned in the video that are included in the digital competence framework of UNESCO. So the digital planning and design, the data generation, the user governance, and also the management implementation part. So here we have a self-assessment toolkit that is being developed with this initial training that will be tested and piloted with the idea, and this is more forward looking to have also as part of these digital governance and the high competence compass, a kind of knowledge sharing community that could also be instrumental to the work that UNESCO and partners are actually doing in these digital capacities navigators. So I will stop here and thank you for the attention. And of course, if there’s any question or comment, happy to take on board. Thanks.

Prateek Sibal:
Thanks so much, Gianluca. And thanks for joining us in the middle of your night as well. Feel free to stay, but I understand that you’ll have to leave and sleep at some point as well. So we’ll open the floor now. Actually, the first prompt is really around what kind of digital skills and competencies that you have seen are needed in governments from your perspective in different parts of the world. What are these areas and how can we as a global collaborative coalition work towards this? I’m also glad that we have some members of parliament here. So it’s a really multi-stakeholder grouping today. So I’ll open the floor. We don’t go by any particular order. So anyone who wants to take the floor, just raise your hand and we’ll pass on the mic.

Audience:
Yeah, thank you. I’m Odas, CEO of Digital Muganda. So I’m coming more from a private sector perspective. I think a lot of the discussions around AI this week has gone around balancing regulation and also innovation. I think I’ll touch more on the innovation, but in terms of regulation, I think the discussion we’ve had even earlier this week with the parliamentarians is around the fact that the lack of competencies around the digital skills and the AI skills leads to prohibitive measures or prohibitive laws instead of permissive and assistive laws. So I think in terms of regulation, that lack of those competencies could hinder the adoption of AI in the public sector. But speaking on the innovation side, I think that on all levels, if there are no skills in terms of understanding, identifying the benefits of what artificial intelligence could bring, but also balancing and identifying also the risks that it could also pose hinders the adoption, obviously, starting from the first cycle, which is the managerial buy-in. So if you go to a government institution and it’s working with a private sector company, I think the first phase is the buy-in from the management. And the misunderstanding of this technology first and foremost hinders either by overlooking the benefits or by not putting in safety nets that really could make sure that these technologies are safe to use. And also moving past that, I think one thing that we’ve seen is that from the private sector and moving now from the buy-in to the co-development of these projects and handover, one of the things that we see is that once we start co-developing with the public sector and then we reach a phase where we have to hand over these projects is that the lack of these technical skills of the teams hinders this project sustainability, making it hard for the developers who are mostly in the private sector to hand over to a public institution to take over the projects and internalize and fully operationalize them. So I think across all the spectrum of development, the life cycle coming from the buy-in and the co-development and the handover, it’s really important for these skills and also knowledge advancements, which is one of the competencies that is in this framework, to be able to fully digitize or have a true digital transformation. Thanks for that. Anyone else would like to take the floor? Yes. Okay, that’s wonderful. So we go with Miriam first. Please feel free to introduce yourself and then we’ll come from here and then to you. Okay, so my name is Mimi Stankovic. Nice meeting you all. I am a principal digital policy specialist with the AI. Piggybacking on the previous comments, I would like to also stress the need. I work with different governments and we work on capacity building. We work in Southeast Asia, we work in Africa, and I have worked with different civil servants, different managerial levels, etc. What I scheme through is the AI and digital transformation competency framework, and I agree with the previous discussions that we need to have competencies along the lifecycle of digital technologies. So this is really important, and especially in the context of AI, I think these should be even more granular. So you talk about digital planning and design, data use and governance, and digital management and execution. I would add another phase, and this is monitoring, evaluation, and learning, so the mill phase. And then with respect to government, working with the private sector, I have seen in Eastern Europe, in Southeast Asia, in Africa, everywhere I go, donors, they insist on public-private partnerships, but this is really important. This is very challenging, very difficult to achieve, and what we need is digital champions within government. We need a more contextual, more granular, more targeted approach to these competencies. We need one approach when addressing digital transformation and AI issues for higher echelons of civil servants or the managerial echelon, and then normal people working for the government. So there is another type of skills and competencies that we need for this type of civil servants. So what else? And a model that used to function in practice with respect to digital champions in government is the model of digital transformation officers in Ukraine. So you could take a look at it and see how these officers have worked. Those are basically appointees from the Ministry of Digital Transformation of Ukraine that are embedded in different teams throughout different ministries and agencies in Ukraine, and this is really important to have champions within different agencies and ministries that are going to champion the cause of digital transformation, and how digital transformation can be, how digital services can be improved, and what does this mean? And I want to put the focus on simplifying things, because what I have seen is that we come up with all these wonderful terms, so algorithmic transparency, algorithmic accountability, ethics, but when you work with civil servants, governments, different government entities, public officials, they say, oh, these terms are wonderful, okay, so ethics, accountability, and transparency, but what do they mean in practice, okay? So we talk about human-centric approaches, but then try working and, you know, institutionalizing capacity-building programs in different countries around the globe, and, you know, equipping civil servants with different digital skills, it’s not easy at all. Okay, just putting it out there. so

Prateek Sibal:
Thanks, Mimi, that al complements a lot, I think we have a strong private sector, without us setting the stage, on the need for the public sector to be able to, for digital transformation along the life cycle. Okay, so, okay, we go, I would first like to pass the floor to some women speakers, because we have been a lot of men speaking first, so perhaps I go to Amrita, and then to Risper. Thank you, Pratik,

Audience:
and thank you, and apologies for being late. I think, my name is Amrita Chaudhary, I represent a civil society organization, CCUI, from India, and looking at it from the civil society lens, and I agree with what, Odison, you just mentioned, a few more things, obviously capacity-building is important, but before any government, or any department of a government goes in for a digital transformation, I think they need to actually do a deep dive study on the impacts, that’s very important, and having a multi-stakeholder discussion at that point of time, not only the private, public, but even the individual, the end-users into consideration, would have a more nuanced understanding of what the ultimate product would be, because many times, intentions are great, but the execution at the end is not seamless, so I think that is very important, buy-in between, like, if I’m looking at countries such as India, you have state, you know, you have the center, which implements something, but states also implement something, so there has to be synergy between the state, there has to be a buy-in from the civil, civil servants in the state to that, it should not be, and for that, the capacity-building is important, that this is going to help you, it’s not going to take away, you know, it’s not going to harm you, many times, civil servants, you know, different age categories, think new technologies, new processes, you know, they have a pushback in their mind, so I think that needs to be demystified, similarly, just as, you know, capacity-building on technology is important, having a rights-based approach while implementing is important, because many times, those are overlooked, as in, it’s not a conscious thing, but unconsciously, those are not looked in, so I think those are important, and countries such as us, which is multilingual, having it in different languages, end-to-end is important, for example, I’ll give you, many of our websites are on different Indian languages, but if a citizen wants to do something end-to-end, some parts, for example, the payment gateway is in English, so if you can have an end-to-end in a particular language, even voice-based, because not many people read, they don’t like to read, I would say, many people don’t read emails too, so I think, you know, using those kind of innovative technology, what people will adopt, because at the end of the day, anything you bring in is for people to use it, if it’s not used, it would not work, and thank you.

Prateek Sibal:
Thanks, Amrita, for that insight. Risper, you wanted to do something?

Audience:
Can you just go this way? Yeah, thank you, Prateek. My name is Risper Onyango, from the Lawyers Hub Nairobi, Kenya, and I think just to echo, you know, the sentiments in the room, recently we ran our annual conference, which is called the Africa Low-Tech Festival, and for this year, we were focusing on the digital public infrastructure, and we kind of tend to look at the different facets, you know, the interlinkages with either AI, technology issues, and all that, and so one of the projects that we were running, together with co-developers, trying to look at how we can first do an assessment, and then also create awareness, particularly for policymakers and CSOs, and so we ran a survey, we did a number of workshops, and it was very interesting, the same things that we are finding in the room, whereby first the level of involvement and awareness on most of these issues was actually really low for many of the participants, so we tried to run it across 24 African countries, with representatives both from the CSO community, and some members of parliament, and a higher percentage of them actually had no involvement in, say, in the case that you are looking at, DPIs, so they don’t really have conversations or understandings around, you know, whether it’s data governance, whether it is digital ID, you know, and getting into having that as a starting point, I think is actually very important. Like she was saying, the assessments would come really key. But I think what I’d like to emphasize also is the multidimensional aspect of it. And that’s what you find in the public sector. So you find that there are very many arising issues or conversations. And sometimes we try to have like a linear line to it. And yet we are facing very many simultaneous issues. So for instance, in Kenya, we are having so many cross-cutting conversations. We are looking at blockchain, we are looking at digital ID, we are looking at data protection. And sometimes we want to be rigid and kind of have a straight jacket approach to it. But I think it’s very important that we actually consider that the public sector actually operates cross-cuttingly, you know, on these issues. So that even as we are trying to curate solutions around it, then we are actually informed of how they operate, yeah. Thanks, Paola. And then we go to the gentleman there. Good morning and well, good afternoon to everyone online. My name is Paola Galvez. I’m from Purdue, former strategic advisor to the presidency of the Council of Ministers. And that’s where I provided my service to develop the Digital Talent National Strategy. And as a bottom-up process in a multi-stakeholder way, we came to the conclusion that we could not have the same strategy for everyone in the public sector. So we divided this in three different users or audiences. First, we have in the public sector, methodologies or geeks. I mean, people who know about technology, who are in the IT area and definitely need different kind of capacity building. Then we have the users who need to be literate consumers, but not really, they don’t need to be experts. They need to understand the technology that are using, why it is important and also super important here, grab some capacity building on the ethical aspects and privacy. Because we received many concerns from academia and civil society that sometimes when they use the technology that were offered by the Peruvian government, they would ask too many information in the forms, for instance. And when we ask them, hey, and why are you asking the ID here? No, because we’re used to this. So yeah, actually, that’s when we need to also engage the Ministry of Justice to talk about the Privacy Data Act, for instance. And then the third layer is decision makers, because they need to know enough about technology to make decisions and to bring this culture that was very well explained in the video, Pratik, and we were all talking about. Digital transformation is not using tech, it’s actually the shift in mindset. And also for that, and while we were developing the national strategy, we created the Digital Talent National Platform where we tried to make it easy for Peruvian public servants to develop these skills. But what we noticed is that female public servants were the least consumer, sorry, servants, enrolling on these courses and finishing these courses. So what is happening here? Of course, there are not enough motivations and female servants have other tasks at home that don’t allow them to have the time to complete these courses. So here, what I would like to stress is, first, let’s think about our different audiences when we’re thinking about capacity building in the public sector. Second, always wear gender lenses when we’re thinking about these policies. And third, create motivations. I was discussing with friends from the UAE and Colombia. They have fantastic motivations. For instance, very briefly, in the UAE, they have badges that will be earned only when they finish their certifications and when they apply the certifications to their roles, which will be counted in their annual evaluations. So this will make them eager to have this. In the Peruvian case, for instance, and I believe now in the government they are working on it, is how to create these motivations so they can create more time because this is something apart from the daily tasks they have, right? So yes, this is just my main three points. Thank you.

Prateek Sibal:
Thanks so much, Paola. Over to you, sir. Okay, do we have a mic there? If we can just pass one around.

Audience:
Thank you. Good morning. My name is Rudolf Griedel. I’m Director General for Central Affairs that encompasses HR, IT, and other things in the German Ministry for Digital Affairs. First of all, I want to thank you for organizing this open forum and also to say that everything I’m hearing here and everything that has been presented, it is very clear that these issues and these challenges are the same everywhere. Europe, Africa, Asia, Latin America, I think we are all more or less in the same situation that we have vested civil servants structures, public service structures that have been functioning in one way or another for decades. And now that we are at this point where we want to go to the digital transformation, I think that has been said in several interventions before, and I want to emphasize this also from my personal experience in our administration. At the beginning, the transformation has nothing or very, very few to do with digitalization. It has to do with a cultural mindset and it has to do with looking at administrative processes. How do they work? What are the layers of administration that we have created over the decades for ourselves and are they really necessary? And only if we look at these processes, at these internal ways how we operate, and only once we have optimized those ways, we can then go into digitalization. Because if you take the old way of doing it and you put a computer on it, you still have a very poor process behind it and it won’t create good results. So people will say, oh, you see, this digitalization, it’s worth nothing and it brings only harm and it brings work. So that’s one point. The second point is we are trying to always have a double gain when we introduce new digital tools and this double gain has to be for the customer, for the citizen, for the user. That is very important, but it has also to be on the administrative side. So because then you have a chance to take the civil servants on board and to convince them that it’s a good thing to do. I mean, in Germany, other than perhaps other countries, we have a very poor demography and so we are older and older. We do not have so many young people again on the employment market. So we need these computers and machines to help us to provide the same services and the same quality as we did before with like 100 persons, now with 80 or 60. So we have to have a gain on the administrative side in order to take people on board and in order to start this cultural mind shift. So thank you very much for this and I’m really learning a lot here from all of you and I’m looking forward to continue the exchange. Thank you.

Prateek Sibal:
Thank you. I see there are several more hands and I will come back here first and then go back again this side. And yes, so Peter, over to you.

Audience:
Good morning, everybody. And indeed, very interesting conversation. My name is Peter Marien. I’m working for the European Commission and DG Intpa. I’m team leader for digital governance. A few comments from my side. So at Intpa, digital became a priority a few years ago. And when we started looking at that, we of course were in the middle of the COVID, post-COVID situation when there was this huge shift, even more than before one could argue towards having society moving online in many aspects of society. So as we worked with our partner countries, because that’s part, that’s a lot of our mandate to work with partners outside of Europe, we wanted to make sure, let’s say, that we’re all together seeing the benefits of this digital shift, let’s say, but also that we managed the risks. So both were important. And also we looked at this from, let’s say, a global perspective. So we were not focusing only at national digital transformation, for example, within certain administrations or other aspects of society, which is important, but also how do we see the global aspects of this when you talk about data transfers, privacy, and eventually also sovereignty of nations, information, access to information, those things. So of course, to have these kind of discussions, and I fully agree, we need them as much internally in our organization as anywhere else, we need this capacity to be increased. And that’s, so there, I just wanted to share a few things that we’ve been doing. So just a few more things before I go into some examples. So we, as I said, we wanted to make sure that we reap the benefits, but also avoid the risks. And these risks, to be blunt about it, are also geopolitical. So we wanted to also make sure that the capacity is there, that ourselves and our partners avoid being captured, captured by states, methodologies, and also by companies. And their value sets that go with that. And I heard already the term human-centric here. So for us, this is very important, this human-centric approach, where we put the individual at the center and not the company and not the state. So when we thought, okay, so how do we go about this? We linked this also to our objective to support and work with our multilateral institutions. So this is just for context, so we put this in the context also of working with multilaterals, and specifically also with the UN, United Nations Agency, and again, based on the principles of the UN charters and this human-centric approach. So what have we been doing concretely, just to give a few examples? We have an agreement ongoing with UNESCO on the topic of AI, so this is a few million euro, I won’t go into too much details, but a large objective here is also to work on these topics of, if I can call them capacity building, you can call it more or less, but let’s say it includes capacity building on the topic of artificial intelligence and working with partner countries around the world. We also have an agreement with ITU and UNDP together, so jointly, so it’s a few million euro, it’s just recently been signed, and the idea there is to train a few thousand civil servants around the world, so it’s global, I mean, UNESCO is also global, and that is training, we can argue for years about this, but it’s training online and offline, so it is online and different types of online training, but it also includes offline training, and that training, I would call it like digital diplomacy type training, and it includes training on AI, and for that, ITU and UNDP will work also with UNESCO. We also have another project that just started recently where we are working, and this is specifically in Sub-Saharan Africa, with regulators. I also heard the regulator question coming up, so that’s about 34 million euro at the moment, where we’re also working with other EU member states, and the idea there is to work with regulators in Sub-Saharan Africa, and indeed, this approach will be much more based maybe on the notion, I could say, of working with champions, and with working with the notion of change management, and I completely agree with what was said before about this not just being about digital and computers, but indeed about what was said by my predecessor. Also to emphasize that we have absolutely realized that we need capacity building in-house. This is in our own unit, in our own DG, in the commission, also in our delegations around the world. We have many delegations around the world, offices, embassies, and everybody needs to be skilled, and again, it’s not about using computers, but about all these other aspects, and so we are trying to do that actively, and then maybe just to respond, because of course we have many partners here and the session today was about civil servants, but of course I think civil society there is key, and we also have under the same general umbrella a program that we’re just starting with two consortia of CSOs globally to work on capacity building for digital, and that includes for them to be able to join discussions like this one, so we are explicitly asking them to join discussions at IGF, ITU, ICANN, IETF, and so on, so that they are part of this whole discussion. Thank you very much. Thanks, Peter, for sharing the multilateral dimension and what kind of global work you’re doing. I think we move to some parliamentarians, so over to you, the gentleman, and then to you, sir. Yeah. Thank you very much. My name is Sam George. I’m a member of parliament from Ghana. I think that in having these conversations, we need to appreciate that the different demographics, especially in different sectors, when we look at the public service, for example, if I use Ghana, the public service is made up of the civil service, and then you’ve got the executive government machinery, you’ve got the judiciary, and then you’ve got parliament. Now, the approaches to introducing digital tools in all of these various sectors of the public service cannot be the same. When we try to approach this with a one-cup-size-fits-all, you have challenges. Ghana’s demographic is different from Germany, but we have the same problem, where we have a very aged civil service. In fact, many of them will tell you they are BBC, born before computers, and so the approach to digital uptake is different from if you were talking, for example, to the private sector or if you were talking, for example, to parliament, where you’ve got a mixed demographic. Now, the challenge with parliament, where I sit, will be that a lot of the capacity building is tailored for members of parliament, and that’s fine, but then that is just half of the solution. Members of parliament face attrition. In many African parliaments, your longevity is maximum eight years or maximum two terms, so when you invest a lot of capacity building in just the members of parliament and not the parliamentary service, which is the technical bureaucracy that survives longer than the members of parliament, because there are technical persons in parliament who’ve been there for 25 years and 30 years. They see various iterations of parliament. That is a cater that we need to focus on because they provide the technical support for members of parliament in pushing legislation and all the technical work, so I think that that’s an area we need to look at. Same happens with the judicial service. There is more longevity there for a judge who gets appointed to the bench. If you give them the requisite training, then they’re able to have better interpretation of legislation and all of that, and I get the benefit of having worked in the civil service and then transitioning into the government machinery, working in the office of the president before finding myself in parliament now, and so I see the various iterations there. The last point I want to make is the fact that we need to understand the life cycle of introducing digital, especially on the African continent. A lot of governments in Africa are talking about digitization because that’s the in thing. A lot of European and Western funding is available for digitization, but digitization is just literally us moving from our analog systems to digital systems. The main concept of digitalization itself, which is the next phase of digitization, is lost on many African governments, and many governments, frankly, across the world, and then the whole concept of digital transformation, so being able to have that complete life cycle established for the public sector, that digitization is just one step of it, is just one small minutia of the whole process. We need to get to the digital transformation through digitalization. It’s a critical part of getting this actually implemented so that we just don’t have check boxes that are ticked so that our countries appear to be compliant, but implementation is actually zero, and that’s why I think a lot of the focus must be on. Thank you. Thank you, sir. So I just, I think this conversation will go on, but we have about half an hour left, and I would, so please take the floor. We have time, and I would not totally stick to the script because I like the conversation is flowing. We are learning from each other. We’ll keep it, but keep the remarks as brief as possible so that everyone can have a chance. Hi, I’m Damien Cepeda. I’m a senator from Mexico, and while thinking of the topic, I think when you want to push an agenda in civil public service. and government and parliamentary, you need to look at two specific things. We need information and we need resources. Resources, access, funding, or whatever costs, benefits. In information, we need information for the scope of opportunity of the technology. In specific topics, because most of the countries that are underdeveloped or like not fully developed, the members of Congress or the government’s servants are thinking about health issues, security issues, education issues, specific problems of the people right now. Not in like 10 years, 20 years, 30 years. So, what we need to do, I think so, is to put the information that makes reasonable to take an agenda in pushing internet, artificial intelligence, technology, in all these areas to make specific benefits to the people. And you need to identify key players, not everybody, key players, key members of Congress, key members of government that you need to convince that if you invest in this technology, it will make a specific benefit for the people. That’s one thing, information of opportunities. The other thing is information on the risks, because all the people that are making the decisions are always worried about what can happen if you open up all the technology without correct regulatory measures. Things of personal data, information, biometrics, and all of that stuff. Things of the right to privacy, for example. What about public and private security surveillance? So, I think when you do these gatherings, or if I was UN, UNESCO, or whatever, I would give specific information to how to use it safe. And the third thing I think we need to get into it is specific costs. We need infrastructure, we need to make investments in schools, public places, whatever, to get access to everybody. But if you don’t do that, for example, in internet, what happens is that you open the breach between the people that has access to technology information and the people that doesn’t have it. So, I think if we give the information to policymakers and to key decision players, we can get the objectives done. Thank you, sir, for those thoughts. I’ll come here to Mr. Tarada, and then we come here. And then we go there, finally. And this, oh, please come here, don’t stay at the back. Please come in the front on the table, please. Sir. Thank you very much. First of all, I’d like to express my sincere gratitude for being invited here as a speaker. My name is Takeo Harada, and I’m a CEO and a representative of the Institute for International Strategy and Information Analysis, located in Tokyo in Japan. Before I have founded my own think tank, this institute is a total independent think tank in the private sector. But before having founded this think tank, I was a career diplomat. So, in the capacity between bureaucracy, civil servants, on one hand, on the other hand, the private sector, I’d like to make three very short proposals. While I’m very pessimistic in terms of the digitalization or digital transformation, particularly in the Japanese bureaucracy, just after our Japanese civil servants’ friends had left the room, I’d like to make a very short statement, very honestly. First of all, I think by nature, the bureaucracy is very reluctant to be digital, because the civil servants are working on politics. And politics, by nature, needs intransparency to make deals with all the possible stakeholders. So I think before getting into the discussion in detail of the competencies, we should differentiate from the easy, DX-friendly tasks done by the civil servants from others. For example, as I said, I was a career diplomat. But in diplomacy, I cannot imagine that, for example, generative AI will make a final statement for the foreign minister or prime minister. So we should be very realistic. Yeah, we should be very, very realistic. So first point is, we should differentiate different tasks done by civil servants. And maybe there are some fields which are very relevant to the DX and AI, but others are not. So the second thing is, we should enhance the public engagement. Because I’m terribly sorry, but I’m a newcomer to this forum. But UNESCO’s splendid works in terms of DX and artificial intelligence is invisible enough, particularly in the Japanese society. So we should involve much more public opinions so that we can boost this movement in terms of the introduction of artificial intelligence and DX to the civil servant world. For example, in Japan, maybe all the friends and colleagues coming from the emerging markets, emerging countries, cannot imagine how acute the declining population issue is, especially in Japan. All the Japanese social sectors are now urged to introduce AI or the DX because of lackness of the human capacity. So this sentiment shared by the public opinion should be mobilized in connection with our works done by this forum. And last but not the least, I’m still wondering, what is the AI? I myself am a global AI specialist. And I’m still pessimistic because the AI technology is just pattern matching, just calculated by the computer. So we need much more elaborated AI technologies so that we can maybe predict civil servants cannot rely on very sparse outcomes of the calculation done by the AI in the current status. So I would say the UNESCO and our DC alliance should help all the endeavors done by the academia and also the private sector and industries to make much better AI and DX technologies. That is. Thank you very much. Thank you, sir. We have to go over there. I’m sorry, if you can please keep it very brief. Thank you. Thank you, Brad. Yeah, it was my turn. Thank you, Patrick, for inviting me to speak in this open forum. And first of all, I would like to thank UNESCO for putting this together. I know you have put in a lot of work to bring this for discussion. Number two, I would like to raise my hand. And as you can see on the screen, my fingers are not the same. So all governments are not created equal. So we really have to know this as we begin this discussion. And I would like to add that we don’t have to discuss this as if we are concluding it today. We have just begun. And this is a conversation. And I believe what we have to do is to create partnerships with the government locally for them to be able to express what the needs are in terms of capacity, digital capacity building for the civil servants. I think that is very critical in terms of achieving what we want. Because the issue is, the question is, and your question that you asked was, are there really need for what sort of skills and competencies that we need? I believe that to be able to get a set of skills and competencies that you need will vary from one government to another, from one public sector entity to another. I’ll try to share what is happening with my government in Tanzania. Tanzania has been implementing what we call digital Tanzania. And you will find they have created a Zoom-like platform. It’s called Imi Kutano, where internally they organize meetings using this Imi Kutano platform. So there are a lot of things that are happening with governments around the world that we need to learn from them as we create these sort of partnerships to implement this capacity building as a coalition. I would like to say one of the skills that we’ll need in the governments is the issue of data governance training. Because many governments are now implementing data protection acts in Africa. And I believe handling data is very important. Number three is the issue of digital customer service. In 2020, I write about 50 emails to different government agencies. And what do I get? Some of the agencies reply to my emails, some don’t. So some reply within a few hours, others reply after maybe several days. So what does it mean in terms of capacity building? The issue of attitude change. And that has been previously alluded by a friend from Germany. So I think there is a lot that will go into this in terms of making sure that we also create capacity in terms of attitude change for the government officials to learn about digital customer care and whatnot. And lastly, I would like to say that as we move forward with this, it is very important, number one, we create partnerships so that what we are doing does not appear as though it is an imported menu that is being shoveled into the governments in terms of their capacity building. So with that said, again, thank you for what you are doing for the capacity. Thank you. And I think it’s all of us doing, not us alone. And it’s just the start of the conversation. To the gentleman over there in white. And then I come to the lady here. And then Mike. Thank you very much and good morning. I’m Honorable Alhaji Mbo from The Gambia. And also the Vice Chair of the African Parliamentary Network on Internet Governance. I’m a member of Parliament, but I came from the tech sector to be in Parliament, which is really a very different world than from what I used to know. In any case, digital transformation, personally, I think is a must for all governments now. So there is no going back, so we need to move forward. And in doing so, governments actually must take the bull by the horn in trying to understand the capacity gap that they actually have. And to do that, first, you know, we talk about the civil servants, which is crucial. Because at the end of the day, the policy making rests in their hands. Even though there’s a big debate whether parliamentarians do policies, you know, it’s debatable. But at the end of the day, what makes the policies work also rests in the hands of the members of Parliament. So I think the two need to really work very closely just to ensure that we have what it means to get those policies to work. Now, in doing so, for me, I think there are multiple approaches we can use to ensure that we bridge this gap. First, let’s look at our education system, the curriculum that we actually have in our schools. I think this is a key area that we can start to build now for the future. Because like you said, we have, you know, civil servants or the public sector, actually, the age gap also is really, in many countries, actually, it’s not really very good. So to do that, we need to start building the younger generation to move up. Then, the civil servants that we currently have, I think there needs to be a study to understand the various gaps they actually have. Because it cannot be one gap fits all. Like, me personally, when I interact with some of them, I can easily tell that sometimes you have a very, very big gap in some of them. But then, in the other way around, you see some also that are up there, that they just need to go to the next level. So I think chairing them, knowing exactly their level of competency also is going to actually help in terms of the capacity building. And the last one, actually, is also what we are doing in the Gambia. I’m sure my colleague is also going to say something about that. The government actually now is on a very rapid transformation. In fact, just last week, they transformed one high education of learning called Manningham Development Institute into a college for the civil service. That will actually help them to train them so that they can actually move to the next level in terms of developing the needs of the country. Thank you. In fact, I was in the Gambia earlier this year for training of the judiciary, and we had about 50 magistrates and judges on AI. And it was a very fascinating discussion. Sir, if it is also from the Gambia, can we wait a bit? And- It’s a different approach. OK, OK. But very quickly, please. Yeah, very quickly. Yeah, I’m Pons Light from the Gambia NRI. My approach, I’m looking at it from the perspective of being a computer scientist, looking at it being technology people and processes. Now, if you look at most countries, especially in the global south, taking the view from Africa, who are the nearest civil servants that deal with the people? Are those in the municipalities? So the strength of any digital transformation process must start with the municipalities. If you look at Seoul, the capital of South Korea, you look at their municipality, what they have done with digital transformation is amazing on how the common person can get services who reside in Seoul. And I think if we focus on building the bottom top from our municipalities, a big change will happen. Thank you. Thank you, sir. That’s extremely important. Ma’am, the floor is yours. I’m truly impressed. This room is a field with wisdom. And I wish I could have a time to talk to you individually one for an hour. So my name is Jingbo Huang. I’m from a United Nations University. So I don’t know how many of you have heard of UNU. The headquarter is in Tokyo. And we have, thank you, 13 research institutes in 12 different countries. Every institute has its own specialty. And the one that I’m leading, the institute in Macau, is specialized in digital technologies. So right now, our research training and education portfolio is mainly related to AI, governance, modeling for disaster management, online child protection. So digital technology is our bread and butter. So we have actually different types of challenge because we are an interdisciplinary research team. Like this gentleman just said, we have a room full of computer scientists specialized in AI. And we have been just launching a series of generative AI plus series, talking about the impact on education. Actually, we’re going to work on a series with UNESCO on education, on the environment, and the future, the responsible way. So we have a series of generative AI plus. So our challenge is to have a, we have a computer scientist and psychologist economist. But we want to hear about the real country context so that our knowledge can make sense. So we also have a training catalog ranging, you know, very, I can share, I’ll be happy to share with you. But we do need a context from you. So I would like to call for collaboration, and both for training that we’re offering, but also for the next conference that we’re going to run in Macau in April as a UNU AI conference. And we’re going to be 10 times smaller than IGF. But our approach would be very focused, problem-driven. You have a specific issue. We bring private sector, our academic research network together just to focus on one specific issue. Hopefully, everybody goes home with something concrete. So I would like to call for participation and collaboration. And please come to me. I would love to talk to you for one hour each with each one of you. Thank you. Thank you so much. Mikey, you wanted to take the floor, and then the lady next to you. And so let’s keep it to one minute. I know it’s hard, but there’s a lot. to talk about. I’ll be quick, I promise. Thanks, Prateek. I’m Maikki Sipinen, and I’ve worked in AI policy for, I think, five or six years now. So I can bring the perspective of people drafting their national AI strategies or working on AI regulation. And I’d just like to bring up that it’s very easy and everyday work to write plans and strategies and how to develop skills for workforce or citizens or universities or really anyone else than yourself. And when it comes to this part on competencies of AI policy officers, it’s actually kind of difficult and can be scary. Because starting this discussion means inviting everyone to analyze, like, can I do my job? And can our team actually do what we are supposed to do? Or do we have the skills? So it can be really hard. And I feel like maybe this pressure comes actually from a misunderstanding. And it’s really clear that we would need to put more effort into clarifying that this is not really about turning civil servants into technical AI developers. And not everyone needs to have a PhD in AI to write AI regulation, for example. And we should really stop saying things like, let’s bring the real technology experts in, or we don’t need to be experts on AI. Because AI policymakers are also experts. It’s just a different emerging field of expertise. And I think this is what the Competency Framework is all about. So that’s going to be a really good tool for encouraging these discussions. Thanks.

Prateek Sibal:
Thanks, Maike. I move to Alexandre, and then I come back. Alexandre. You can take, OK.

Audience:
Thank you, Patrick. And good morning, everyone. I’m Alexandre Barbosa, head of CETIC, which is a UNESCO Category 2 center based in Brazil. We are a regional center for Latin America and the Caribbean and also Portuguese-speaking countries in Africa. Well, I don’t have much to say after all this wonderful debate. But I would like to mention that we are involved in measuring the socioeconomic implications of the ICT adoptions by different sectors, including public sector. And we do run surveys every year with government to see the level of adoption. And it is really clear that having data, we give visibility to the problems and to the issues that we have to face and to address. Without data, we don’t have visibility. But more than have data, like UNESCO is really making a very wonderful job in making assessment and to revealing the state of the adoption among civil servants. But we need, as our colleague from Ghana and also from Tanzania has mentioned, government is not a homogeneous body. So we need to have segregated data so that we can understand the different inequalities in terms of digital skills among civil servants in the government. We have different structures, like central government, state or provincial government, local governments. Within those levels, we have different powers, like legislative, judiciary, executive. And the level of skills development is very different. I would say that among all countries here represented, we can say that it’s not the same. So we don’t have one solution that will solve the whole problems. But it is clear that when we start to discuss what are the challenges in empowering civil servants in engaging in the digital transformation, we need to have disaggregated data. We need to understand what are the differences among civil servants. And besides the lack of digital skills that I guess all of us agree that we have an issue to be addressed, I would like to also mention three other things that was already mentioned in terms of cultural change. Governments are the oldest type of organization and the only type of organization that touches every us in the society. So the cultural resistance to change is really enormous. And besides that, I think that we need to develop a culture of continuous assessment, many of you has mentioned the need of assessment. And I think that we need to rely on institutions such as UNESCO to help member states to really put in place effective frameworks able to capture, able to measure, and to produce reliable data. And last but not least, I would say that we have to work on a set of skills, not only digital skills, such as collaborations and best practice sharing. So those are a few points that I would like to address. And once again, Pratik, I would like to congratulate UNESCO for this initiative, really very important. Thank you.

Prateek Sibal:
Thanks, Alexander. I think the point of measuring digital skills is extremely important. Actually, we don’t have a global measure of this. And the kind of proxies which are still being used are not very sure they measure education. I think we’ll continue, but I think we can extend by five minutes if the folks in the technical team allow us to. So we start while I figure out. Yeah?

Audience:
OK. Well, thank everyone for a rich discussion. My name is Carolyn. I am with a human rights organization called Access Now. So we work at the intersection of human rights and technology. And just there’s a lot of shared sentiment in this room, I think. But just to highlight on a few things, one, when we’re talking about digital capacity building, I think we just cannot overlook the major gaps that still exist and just knowledge about the relationship between those technologies and their human rights impacts and how human rights law applies to those particular technologies. So I think just making sure that we’re keeping pace between the technology itself and also the human rights framework that it needs to operate inside of. I think when we’re talking about a human-centric approach to digitalization, we also need to really understand that that’s not just about end users versus governments or private sector, but about people versus the technology itself. Just the language of digitalization or digital transformation, I think, lends itself to moving in a direction of seeing implementation of the technology as the end goal or the point. And it’s just really not. And it can be disruptive to a design process and can limit our capacity to really understand the problem that we’re trying to solve in the first place. So I think really keeping people’s experiences and, to the senator’s point, being very specific about the problems we’re actually trying to address to avoid overreach and misapplication of certain technologies. And I think just as a final point, really understanding the way that these technologies impact people and communities at risk in ways that are very different than they apply to end users in general. And those people and communities at risk are also the people who have been least effectively served by so many of these government agencies. And so really centering those communities’ perspectives from the very beginning of the process and not seeing it as something to be tacked on at the end, and really thinking about co-creation, accountability, and co-design with those communities who perhaps have the most to be gained in some cases, but also stand the most risk of harm. Thanks. Actually, we… OK, so it was not cut. Can you speak loud? We don’t have a microphone. Hope you can hear me well. Yeah. Ah, OK. Very shortly, I’m Hugo Cordova. I’m a civil servant, so I feel very… very affected by what we are discussing here. And I work for the European Parliament. My only thought is, like, I see a lot of focus on how the utilisation is used for access and services from the public, but there is other aspects that are important for the utilisation, at least from my perspective, is how the utilisation help us to provide or to do new things. And I’m thinking, just an example, I work with legal text, and sometimes we have to see how something has been done somewhere else. So, for instance, I would love to have artificial intelligence who helps me to say, OK, how this particular problem has been solved around the world, in all these relations. Something very stupid, but maybe, but I think it would be very useful, and it’s part of the conversation. So, not only access to public services, but how we do business inside the house.

Prateek Sibal:
I think that’s very important. We go to José, José, José.

Audience:
Well, thank you very much. My name is José Renato, I am from civil society in Brazil, from the Laboratory of Public Policy and Internet, and also from the Federal Administration Central Committee on Data Governance, representative of civil society. And just to share a thought on, how can we even be more productive when thinking about digitalization, digital transformation of the public sector, and resounding the voices that mentioned communication and feedback also. Be attentive to the feedback of civil society, of people who are using the systems. This is fundamental, otherwise all the work can be counterproductive. And in Brazil, we have many cases that went to the judiciary to question issues related to ethics or to the compliance with, for instance, privacy and data protection issues that could have been solved just with a further dialogue with civil society and specialists. And just to finalize, something that was not touched that much today here is also on the capacity building of the judiciary, because judges are the ones that are responsible for when something goes wrong in the administration and policy making, they’re the ones that tackle the issue when rights are being violated. So thank you very much indeed.

Prateek Sibal:
Thanks Jose. We have a judge from Tanzania here joining us also. Professor Amal, and then I come to the lady there.

Audience:
Thank you. I will be very brief. I think many things have been said. I’m wondering about, my question is why people are scared from digitalization? And I think we have to think in multidimensional level. The first is that people have to learn too much new things, very quickly and fastly, in a global world, because when you now, when you have to deal with regulations, you face regulations coming from Europe, from the United States, from China, from everywhere. So building capacities, I will just think very quickly about complexity and uncertainty. And this makes building capacity something very difficult in this new moving world. My experience is that in Morocco, which is a part of Africa, we have also to face the problem of literacy. Civilians will deal with people that cannot read, that cannot write, etc. So something that could be very interesting to study and to put in the framework, we don’t talk a lot about this, but I think that building capacities is not individual matter. It’s collective one. And we should put frameworks that we can bring together techniques and methodology to learn individually and also at the group level. And AI can bring also tools that are not very well known, but tools based on simulation. We can also study the behaviors of people in collective learning setting. And we can provide new approaches to learning because for most people digitalization means tracing, means surveillance, means that everybody will know what I am doing, etc. So I think it is very important to demystify what does it mean. In fact, if we master these tools, we can be a lot more comfortable with using them. So just to be very brief, because I don’t have time, I know, I think that technology is going very fast, regulation is going very slow. And this distortion is putting people in very uncomfortable situation. So there are three things, I think, very important, if I want to summarize. The first is rise awareness and demystify at all levels. The second is lifelong learning. People should learn all the time because the technology is moving. If you remember November 22, everybody was surprised about the tsunami of ChatGPT. Even people working in academia were very surprised about this huge tool. And the third thing is adaptation and agility to all these things. Regulations, we started with GDPR and now we put we developed executive master to learn about governance of AI. Two years after, we have to change the curses because we are not dealing with GDPR anymore. We have to deal with AI act. AI act means you have to learn about how to qualify the risk of tools. And I agree with you. If you don’t master the technology, you cannot understand what’s going on with this regulation. So there are a lot of things to debate but I know I have to stop.

Prateek Sibal:
Thank you, everyone. I think just as some very quick concluding remarks I know there are more people We will now explore really proposing a formal dynamic coalition on digital capacity building to the IGF. With kind of three broad objectives which can be defined with the community and what we would try to serve is more a secretariat to facilitate that cooperation. First would be a community of practice for knowledge sharing. So what all civil society, academia, governments, private sector experiences that they are having we can share those around the world as someone also mentioned the experiences in Germany to the experiences in Tanzania are quite similar. And this is a real chance for all of us to learn from each other. There is also perhaps a need for developing knowledge tools so this is not only a forum for discussion but also collaboratively working on some products which could be for instance an assessment methodology for civil servants which whatever UNESCO will produce is of course available for free for everyone to use contextualize and so on but we can collaboratively work on tools which then everyone can take forward and then also to have a network of experts which can actually support governments provide technical assistance and this will be useful to learn from Brazil to learning from Ghana and facilitating that exchange. We don’t have much more time but what we will do is follow up with an email and with the formal processes of the IGF and open this up for people to join the coalition and then we will follow up with more discussions. But thank you so much for your insights. It was a pleasure hosting this discussion this morning. Have a wonderful day. Thank you. Thank you. Okay. People to settle down. And we’re waiting for one on-site speaker to join but other than that we’re good to go. Could I request the organizers to help us see the speakers on the screen? The two speakers joining online. Okay. Thank you. Thank you. Thank you. Thank you. Thank you.

Audience

Speech speed

158 words per minute

Speech length

10203 words

Speech time

3874 secs

Gianluca Misuraca

Speech speed

155 words per minute

Speech length

2093 words

Speech time

813 secs

Nobu Nishigata

Speech speed

173 words per minute

Speech length

680 words

Speech time

236 secs

Prateek Sibal

Speech speed

163 words per minute

Speech length

1686 words

Speech time

623 secs

video

Speech speed

123 words per minute

Speech length

555 words

Speech time

270 secs

DigiSov: Regulation, Protectionism, and Fragmentation | IGF 2023 WS #345

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

The analysis features three speakers who delve into different aspects related to the internet and its impact on global trade and regulation. The first speaker emphasizes the complexities of the internet and how it has transformed the world. They also discuss the influence of state trade policies on end users. It is noted that critical resources play a significant role in this realm. Additionally, the speaker highlights that not all critical resources are managed by states, providing the example of IP and IPv4 blocks. Overall, their stance is neutral.

The second speaker raises a question posed by Samridhi Kumar regarding a potential different approach to ADF fragmentation in the Global North and South from a regulatory perspective. The speaker focuses on topics such as ADF fragmentation, the Global North and South, and internet regulation. This discussion is closely linked to SDG 9 (Industry, Innovation, and Infrastructure) and SDG 16 (Peace, Justice and Strong Institutions). Unfortunately, no supporting facts or evidence are provided, leaving their stance neutral.

The third speaker, responding to an inquiry by Amir Mukavi, explores the effects of internet weaponization, digital interference, and violence in campaigns from abroad. They also discuss the impact of these factors on internet fragmentation. The speaker suggests ways to avoid this situation, particularly by promoting cooperation between cross-border digital entities and national competent authorities. Their sentiment is concerned.

From the analysis, it becomes evident that the internet is a complex domain that has greatly transformed the world. State trade policies have profound effects on end users, while critical resources have a crucial role to play. Additionally, questions arise regarding the regulatory perspectives on ADF fragmentation in different regions of the world, highlighting potential disparities. The analysis also brings attention to the detrimental impact of internet weaponization, digital interference, and violence in campaigns from abroad, as they contribute to internet fragmentation. Cooperation between cross-border digital entities and national competent authorities is suggested as a preventative measure. Overall, the analysis provides insights into the multifaceted nature of the internet and its implications for global trade and regulation.

Neelesh Maheshwari

The analysis explores various aspects of digital sovereignty and internet regulations, discussing the importance of policies and regulations aimed at exerting state control over internet public policy issues within territories. Digital sovereignty has gained significant attention in recent years, with regulations having extraterritorial implications due to the nature of the internet.

The analysis argues for the need to address monopolistic tendencies of big corporations and promote the growth of small businesses, asserting that states have the right to combat these tendencies while ensuring a level playing field. The focus is on supporting small businesses and reducing inequalities in the digital economy.

Regarding data localization, the analysis suggests keeping restrictions minimal and opposes unnecessary constraints on the free flow of data based on security or information localization requirements. The example of the Indian government’s Digital Personal Data Protection Act is cited as a liberalized data protection regime.

The analysis emphasizes the inclusion of Global South countries in digital trade agreements and negotiations, recognizing their lack of infrastructure and institutional capacity. Capacity-building initiatives are seen as vital for these countries to benefit from big data, AI, and machine learning.

Regulations to combat the dissemination of disinformation and misinformation on the internet are deemed necessary, highlighting the real-life harm caused, particularly in the Global South. The analysis asserts the need for effective regulations in addressing this issue.

Concerns are raised regarding the potential limitation of fundamental rights due to regulations, cautioning against restrictions on freedom of speech and other fundamental rights when implementing regulations.

The analysis advocates for international norms and dialogue to address internet-related issues, promoting a standardized approach and providing guidelines for corporations facing state demands.

The potential risks of leaving public policy functions to private corporations are highlighted, citing surveillance capitalism and instances such as Cambridge Analytica, Snowden revelations, and electoral interferences. Regulatory oversight of public policy functions is advocated to prevent the misuse of power by private entities.

Different perspectives on the weaponization of the internet in the Global North and Global South are discussed, with cybersecurity and attacks on critical infrastructure being a focus in the North, while information security is a concern in the South.

Governance challenges in the digital age are addressed, emphasizing the need for novel approaches to address these challenges effectively.

The analysis stresses the importance of regulations that consider different contexts, allowing countries to pursue their own policies while ensuring a holistic approach to internet governance.

In conclusion, the analysis emphasizes the significance of digital sovereignty and regulations to exert state control over internet public policy issues. It advocates for the promotion of small businesses, reduced inequalities, and minimal restrictions on data flow. It highlights the necessity of regulations to combat disinformation, the importance of international norms and dialogue, and the potential risks of leaving public policy functions in the hands of private corporations. The differing perspectives between the Global North and Global South, as well as new governance challenges, are also considered. The analysis calls for regulations that consider different contexts and allow countries to pursue their own policies while maintaining a comprehensive approach to internet governance.

Andrea Beccalli

The analysis provides a comprehensive overview of the current state of the internet and its governance, shedding light on several important points. One key highlight revolves around the principle of global accessibility of the internet, which is seen as essential and fundamental. It is emphasized that the internet functions as a network of networks, with approximately 60,000 networks operating as one single internet. Any disruption to the principle of global accessibility could result in the fragmentation of the internet, which would have significant implications for connectivity and communication worldwide.

Another point of concern raised in the analysis is the potential risk associated with policy development on the application layer of the internet. Discussions surrounding the application layer are gaining more attention, but it is crucial to consider the sovereignty of countries and ensure that public authorities handle any issues related to it. Disruptions in the application layer have the potential to disrupt the underlying technical layer, amplifying the need for careful consideration and policy-making in this area.

The geopolitical and economic context also plays a pivotal role in shaping the internet and its governance. The analysis notes that during the creation of the Internet Corporation for Assigned Names and Numbers (ICANN), globalization was on the rise. However, current global events and wars have dramatically changed the way we view and use the internet, which necessitates a reevaluation of its governing principles.

Furthermore, the analysis emphasizes the need for the evolution of the internet governance model. The current model, established around 30 years ago, was designed when the internet was nothing like what it is today. With the growing complexity and usage of the internet, the model needs to adapt and evolve to effectively address the challenges posed by the modern digital landscape.

The impact of internet fragmentation is also explored in the analysis. It is highlighted that the size and development of a market can have varying implications when it comes to fragmentation. Fragmenting a market as large as the European Union, for example, can have a different impact compared to a smaller market in the global south. Fragmentation could potentially exacerbate the digital divide, particularly in underdeveloped regions and countries.

Additionally, the analysis delves into the potential consequences of regulations and policies on the internet. The influence of regions such as Europe, China, and India in shaping internet regulations is noted, with concerns raised about certain regulations being inconsiderate of the impacts on the global south. It is crucial for policymakers to be mindful of the potential ramifications of their actions and to consider the specificities of the internet landscape.

The analysis also highlights the importance of not taking internet access for granted. The internet serves as a tool for global connection, transcending platforms, languages, and time zones. However, it should be acknowledged that internet access often comes at a cost to users or through public means, and its value should not be underestimated or overlooked.

Lastly, policymakers are urged to be specific and mindful of the consequences of their actions in the realm of internet regulation. The internet has been weaponized and misused for purposes it was not initially designed for, which underscores the need for careful and well-informed policymaking in order to address issues such as free speech and cybercrime effectively.

In conclusion, the analysis provides a comprehensive overview of several crucial aspects of the internet and its governance. It emphasizes the importance of upholding the principle of global accessibility, while also addressing the risks and challenges posed by policy development, geopolitical and economic factors, internet fragmentation, and the need for an evolved governance model. Policymakers are urged to be mindful and specific in their actions, and internet access should be valued as a tool for global connection.

Bruna Santos

There has been a significant discussion about internet fragmentation, which has resulted in the creation of a policy network. This network aims to promote inclusive discussions and resource sharing on the topic. It focuses on addressing the challenges posed by fragmentation in different aspects of the internet, including user experience, internet governance and coordination, and the technical layer of the internet.

One of the key concerns raised in these discussions is the lack of inclusivity and coordination in internet governance. This could lead to decision-making without consensus, favoring multilateralism over multi-stakeholder participation. It is argued that an inclusive approach is crucial to ensure that all relevant stakeholders have a say in shaping the future of the internet.

Fragmentation can be caused by various factors, such as client-side instruments or legislative interferences, which can lead to negative outcomes like internet shutdowns or restrictions on access to certain content or apps. Striking a balance between security measures and preserving open access to information is essential.

Advocates for user experience on the internet argue that it should adhere to principles of equality, enhancement, choice, impact assessment, harmonization, and allowing users to shape their own experience. Empowering users and providing them with diverse options to customize their internet experience is considered crucial.

The discussions on internet regulation have gained traction in many countries and member states, with ongoing debates on topics like disinformation regulation. The potential impact of internet regulation on the way the internet is viewed and used is being closely examined.

While regulation may be necessary in certain areas, it is important for policymakers to consider the significant aspects of the internet before implementing wide-ranging regulations. Striking a balance between addressing concerns and preserving the open and innovative nature of the internet is crucial.

The need for inclusive and balanced international regulations for information security is emphasized. It is argued that these regulations should take into account the perspectives of victims and marginalized communities, who are often excluded from the conversation. By including their voices, power imbalances can be addressed, ensuring equal representation in discussions on information security.

In summary, the discussions on internet fragmentation have led to the establishment of a policy network to facilitate inclusive conversations and resource sharing. This network focuses on addressing fragmentation in various aspects of the internet. The importance of inclusivity, user empowerment, and balanced international regulations is highlighted to mitigate the challenges posed by internet fragmentation. Policymakers are urged to approach regulation carefully, considering the significant aspects of the internet and maintaining its open and innovative nature.

Venceslas Katimba

The Democratic Republic of Congo (DRC) has made significant progress in digital transformation and internet inclusion. In 2021, the country appointed its first minister in charge of digitalization, demonstrating its commitment to embracing new technologies. The DRC has also adopted a digital law to regulate the digital sector, ensuring structured and controlled digital activities. Additionally, the country has signed the Malabo Convention for cybersecurity and data protection, emphasising its dedication to safeguarding data privacy.

However, the DRC still faces challenges in connectivity and internet access. Over 50% of the population lacks coverage, highlighting a digital divide. Private operators like Facebook and Google are investing in infrastructure, including the construction of a second cable, to improve connectivity. The DRC aims to connect to five submarine cables, bridging the digital divide and enhancing access to internet resources.

In conclusion, the DRC’s digital transformation efforts are underway with the appointment of a digitalization minister and the adoption of a digital law. The country’s commitment to cybersecurity and data protection through the Malabo Convention is also commendable. However, improving connectivity and internet access remains a challenge. Nonetheless, investments in infrastructure by private operators and plans to connect to submarine cables show a determination to address this issue and promote internet inclusion in the DRC.

Turra Daniele

The analysis thoroughly examines the complex issues of internet fragmentation and governance. There is an increasing debate about the sovereignty of countries in relation to the application layer of the internet. This indicates a growing concern among nations about maintaining control over their respective internet spheres.

Furthermore, the analysis highlights the impact of trade policies on the end users of the internet and the management of critical internet resources. It is evident that trade policies can have far-reaching consequences for the accessibility and affordability of the internet for individuals and businesses. Additionally, the analysis notes that the management of critical internet resources, such as IPv4 blocks, is not solely dependent on state involvement. This suggests the need for a comprehensive multi-stakeholder approach in addressing these issues.

A key argument put forth in the analysis is that protectionist policies made by states should consider a multi-stakeholder model. It stresses that critical resources are not solely managed by states, and emphasizes the importance of incorporating various stakeholders in policy-making processes.

The analysis also explores the potential consequences of internet regulations. It highlights the possibility of these regulations leading to changes in the current internet landscape. Moreover, the analysis notes that different countries and member states are actively enacting various aspects of internet regulation. This raises important concerns about the management of the multi-stakeholder model when it comes to specific risks of fragmentation, indicating the challenges associated with balancing regulation and maintaining an open internet.

Another aspect addressed in the analysis is the challenge of determining who should review specific policy requirements. It notes that it can be difficult to establish a central authority or body responsible for reviewing and shaping policy requirements. This highlights the complexity involved in ensuring effective policy management in relation to internet fragmentation and governance.

The analysis stresses the need to include all perspectives in the design of global policies. It highlights the Internet Governance Forum (IGF) as a valuable space for inclusive discussions and contributions from a diverse range of panelists from various countries. The analysis recognizes that issues of internet governance affect not only local communities but also have global implications. Consequently, including multiple perspectives helps mitigate biases and ensures comprehensive policies that cater to the needs and interests of all stakeholders.

Lastly, the analysis points out concerns about connectivity issues and their impact on internet policies and governance. The importance of connectivity is emphasized, with one of the panelists, Venceslas, experiencing connectivity issues during the discussion. This serves as a reminder that connectivity is central to effective internet policies and governance, and efforts must be made to address connectivity challenges to achieve a truly inclusive and accessible internet for all.

In conclusion, the analysis provides a detailed examination of the complex issues surrounding internet fragmentation and governance. It sheds light on the debates over national sovereignty, the impact of trade policies on end users, the management of critical internet resources, and the challenges associated with regulatory measures. The analysis advocates for a multi-stakeholder model in policy-making, emphasizes the need for inclusive global policies, and highlights the importance of addressing connectivity issues. Overall, it provides comprehensive insights into the multifaceted nature of internet fragmentation and governance.

Session transcript

Turra Daniele:
wherever you are in the world, whichever time zone. Welcome everybody. Welcome to our workshop, Digital Sovereignty, Regulation Protectionism and Fragmentation. Before we begin the session, just as a reminder, if you would like to step in during the discussion or during the question and answer session at the end, just please state your name and make sure to use English as a language. Also, if you are online and you would also like to step in, just please put your name in the chat and please make sure that there is a question mark at the end of your question. So without any further ado, welcome again. My name is Daniele Tura. I’m from Italy. I’m one of the Internet Society’s Youth Ambassadors for 2023 and I will be the on-site moderator for this session today. Also, we have Herman Lopez-Ardilla. I hope I pronounced it right. He’s our online moderator and he’s right here in the audience with everybody else. Also, we’ll have Nathalie as our rapporteur for today. So, worldwide, as an increasingly large number of networks are becoming dependent on proprietary protocols, we are experiencing the rise of national and private interests in cyberspace. So this and other phenomena suggest that IT procedures, standards, and access to data infrastructure could be used to raise technical barriers to trade or negatively affect the sharing nature of the Internet, actively shifting the equilibrium towards particular interests with an economic political in nature, therefore reinforcing again a protectionist approach. So today we will try to understand if the tension between the power exerted under conditions of digital sovereignty and digital protectionism may actually translate into an increased risk for citizens’ rights and the Internet at large. Particularly, we want to explore how different regions and stakeholders perceive the need to strike a balance between these two categories and how this creates new dimensions in the discussions on Internet fragmentation. In fact, despite the efforts to rightfully seek to protect elective interests through economic or social considerations, in some cases the broadness of these concepts has been used to promote censorship and raise trade barriers for foreign companies. Today, politicians and big businesses initiate fragmentation processes that the technical community alone can no longer control. Furthermore, if fragmentation were to be achieved, it will limit the Internet and its critical properties as an enabler of choice. So throughout the session we will try to tackle three main questions with our guests. The first one is what are the most impactful legal initiatives around the globe with potential fragmenting effects and what are their justifications? On a technical level, are there tools or protocols that promote data protection for a country’s citizens and companies? And the last one, what could increase the risk of unfair limitations to legitimate economic use of data restriction, free trade and the harm to physical infrastructure of the Internet? Of course, these are all relevant issues that cannot just be taken… from simply a global perspective, but it’s very important to keep regional differences in mind. So this is why today’s panel is composed from stakeholders coming from all over the world and from different groups. So together we would like to outline a typology of risks brought by different approaches to digital sovereignty in various regions and this will help the community in general identify a sketch of measures and actions for ensuring compliance with data regulations on a local level. So the overarching approach will respect multi-stakeholder guidelines on how to avoid internet fragmentation and digital protectionism and its hindering effects while advancing in legitimate protection of citizens. So we hope that through the sessions participants will be able to access collective knowledge by discovering answers to their concerns themselves within the context of their own working groups in their own regions. I invite you all to actively engage in the session, to listen to our esteemed panelists and to contribute your insights and your perspectives during the question and answer section. So let me begin by introducing our speakers. So we have Neelesh Maheshwari. He’s a PhD candidate from South Asian University in India. He’s been part of the Youth IGF India and was also a fellow of the India School of Internet Governance. His articles have been published in the Kathmandu Post and by the Stimson Center. Also we have a guest from the Democratic Republic of Congo. His name is Cetimba. He’s Chief Advisor for IT Infrastructure at the Ministry of Digitalization in the Democratic Republic of Congo. Congo. Bruna Martis Dos Santos is here at my left. She is Global Campaigns Manager at Digital Action. Welcome. She’s a current member of the Multi-Stakeholder Advisory Group at the IGF, as well as a member of Council for the Generic Name Supporting Organization at ICANN. Also, we have another online guest. His name is Andrea Beccali, is Director for Stakeholder Engagement at ICANN in Europe. So, welcome everybody. So, I will now start presenting the first question and we’ll have Nilesh introduce his contribution. So, again, what are the most impactful legal initiatives around the globe with potential fragmented effects

Neelesh Maheshwari:
and what is their rationale? So, when we talk about digital sovereignty, what is the first thing that comes to our mind? Of course, it’s a new policy construct that has been formulated and this term has been used over and over again in the last two, three years. It has become a buzzword. However, how do we understand it in simple terms? We can say that digital sovereignty is about policies and regulations that aim at exercising state power and control on the internet public policy issues within their own territories, but owing to the nature of the internet, of course, such regulations and laws also have extraterritorial implications. So, this is not a phenomenon that is related to a few countries or a particular region. We have seen that overall, like all the countries and regions are coming up with such kind of laws. So, in Europe, we see GDPR, we have digital secure DSA, DMA. In China, we have PIPL. In India, we have Digital Personal Data Protection Act and there are such legal initiatives around the world. So, it’s not limited to anyone. territory or a region. Now, if we look at it, this is a departure from the erstwhile liberal regime where largely private corporations were supposed to deal with issues like collection of data, processing and the use of data. However, there was increased dissatisfaction with how private corporations were doing quasi-public policy functions with lack of adequate constitutional check and balances. So, we were seeing the rise of attention economy and the phenomena of surveillance capitalism, and today when we talk in the context of generative AI and synthetic content, the need to have adequate regulation is felt even more. So, on this part, in terms of regulation, we can say that, okay, there are legitimate reasons for states to have such regulations in terms of protecting and promoting their citizens’ rights. However, such laws and regulations also need to be critically scrutinized so that they don’t end up doing more harm than the positive benefits. For one, we need to assess whether these laws are following the standard tests of legality, necessity and proportionality, and not giving excessive power in the hands of government agencies. Now, this is not the only motive why states are coming up with such regulations. Of course, there are other motives as well. There are strategic, political, as well as commercial motives behind this. So, let’s go to the point of protectionism and fragmentation on that. So, in terms of fragmentation, of course, there are technical aspects to it, and we talk about having open standards in terms of that, and a few of my co-panellists will further touch on it. However, I’m going to touch upon the commercial aspects of fragmentation, as well as the political aspect of fragmentation. So, what we actually see is that, okay, the issues like misinformation and disinformation has to be dealt with. However, if we see that different states are coming up with their different sort of laws, we actually need to have some sort of global convergence in terms of having international norms and best practices to deal with these issues. And the good part is that on some of these issues, there has been, we are seeing a tendency that, okay, there are certain things like having grievance redressal mechanism which are coming up. And we can share all these global practices so that, you know, there are some standard common norms which can guide the states around the world when it comes to drafting over these issues. Now, coming to the issue of protectionism. Of course, there were certain countries which had the benefit of an early start and with most of the big corporations based in those places. We can say that a lot of other countries were excluded from the benefit of digital economy. And as we all say, the data is the new oil in the world. So if we look at where are the headquarters of big corporations, where are the data centers in the world? So, of course, the states have a right to fight against the monopolistic tendencies of big corporations and put in place mechanisms which allow small businesses to flourish. However, such mechanisms should not be discriminatory to foreign businesses. There should be an equal and level playing field. We also need that in terms of cross-border data flow. States should not put unnecessary restrictions on free flow of data on basis of national security or critical information localization requirement. The data localization requirements should be kept at a minimal. In these regards, we can say that digital trade agreements and negotiations like DIPA and G7’s Institutional Arrangement for Partnership can be a way in terms of harmonizing the cross-border data flow. However, at the same point, we also need to take into account the position of Global South in these negotiations. Because a lot of states in the Global South already are bereft of the digital economy, as well as they don’t have enough institutional and infrastructural capacity. So there should be capacity-building initiatives also, so that the countries around the world can take the benefit of big data, AI, and machine learning, and are not excluded further. In that regard, I would say that, to conclude my statement, that we need a more liberalized sort of regime when it comes to data flows and free trade. So for example, the Indian government recently came up with the Digital Personal Data Protection Act. Now, let’s compare it with GDPR. While in GDPR there are certain positive obligations, like you need to have equivalent standards that are in place in Europe, if the cross-border data flow has to take place, or otherwise you need to have standard contractual clauses. So in that terms, okay, you have to pass a few tests, only then the data will be allowed to travel. Instead, in Indian government, what they have done, that they have said that, in general, we will allow the cross-border flow of data. There are no such positive obligations. However, in exceptional cases, we can put certain countries in negative lists, if there are certain problematic dimensions. So in general, it’s a largely liberalized regime, where certain countries will be put in the negative list based on the guidelines which the government will provide. It’s a recent act, so the guidelines are not there yet. So if we keep this sort of restriction to cross-border data flow to the minimal, I believe we can protect the legitimate interest of our citizens, as well as allow for a liberalized free trade in terms of digital economy.

Turra Daniele:
So thank you, Nilesh, for this. insights for perspectives on how handling worldwide resources on the Internet and how to engage with national actors worldwide without posing specific limits when it comes to capacity building especially, but still trying to keep local necessities and needs in mind. So speaking of which, especially when it comes to critical Internet resources, we have our next speaker. He’s Venceslas Katimba. He’s connected online and I don’t know if he can hear us. Can we hear him?

Venceslas Katimba:
Good morning everybody. Welcome. I think, yeah, thank you, thank you for giving me the opportunity to speak. I’m a French speaker. I apologize, my English maybe cannot be very, very well. So I just want to tell regarding the point of Internet resources and to share the experience regarding what is happening in my country, DRC, to promote the digital transformation and the Internet, the inclusion of digital. So in my country, you see DRC is in the center of Africa and is a big country. We have like nine three neighbors and we are not too much far with the Internet. So since 2021 is the first time in my country there was a minister in charge of digitalization and this minister was created since 2021. And we started to build the foundation of digital in DRC with some action that the minister already did. We started to make the policy regarding the regulations. So in DRC before that, there was no regulation regarding the digital sector. There was, we work for the first law text, which is code numeric in DRC, and which is bring the regulation on the sector of digital in DRC. And this law has been adopted last year, and it already published. So this is the basic now on the regulation sector in my country. We have now a law which regulate the digital sector. We work also to make sure that my country is also in partnership with other country. And we signed the Malabo Convention regarding the cybersecurity and data protection. And so regarding this sector, it is already done. In my country, we have many challenges regarding connectivity. We have like more than 50% of the coverage, which is not already done. We have many projects to build fiber around the country, all infrastructure for the connectivity. to bring connectivity to all the people is a big country and many challenges regarding war and this which is not which affects a lot the promotion of the digital and we already work with other partners we have the telecom company for working for coming from voracom we have this airtel who are helping us to to to improve the digital sector here we have also regarding internet connectivity and a resource of internet here in drc regarding infrastructure drc is is now connected only to one submarine cable works but there is a big project with facebook google and other private operator they are now building the second cable two for africa which we will be land very soon in drc so before the end of this year we have two submarine cable and our plan is to have like five to be connected to five submarine cable we have also start many project to do the interconnection with other countries african countries neighbors we have some connection with uh with our neighbor it’s This is Les. We are starting to lose him.

Turra Daniele:
Yeah, I think unfortunately we are losing him. I think there are some connectivity issues there. So I will make sure to provide Vince Zesla’s reference, contacts to everybody who wants to keep in touch with him and maybe have a second chance to hear his contribution firsthand. And also for time reasons, we will proceed with Bruna and her introduction. So I will now give the floor to you. Thank you.

Bruna Santos:
Yeah. You guys can hear me, right? No, just my intent for today was to go over a little bit of the policy network on internet fragmentation discussions. It is a work that we have been doing together with the IGF community for almost two years now. We’re at the second year of the PNIF framework. I thought it would be important to bring that around here because the initial assessment was the idea that internet fragmentation discussions were rather something very technical. discussions that didn’t really include a lot of the community. Maybe because of some of the debates being placed in a lot of the technical community or more academic ones. So the first assessment and maybe the thing that motivated us to to bring up a policy network for that was helping share some of the resources or even like revisiting the discussions. And the PNIF has started developing a framework with three initial baskets. And we talked about fragmentation in three different ways. The first one is fragmentation of the user experience. Second one is fragmentation of internet governance and coordination, which talks a lot to the debates we’re having nowadays about the digital cooperation forum, OASIS plus 20, the IGF, where all of these spaces moving ahead. Are they moving together and how? And the last one would be fragmentation of the internet technical layer, which is the most classical one. And I think I’m going to leave a lot of the technical debates to Andrea, because I want to share this a little bit with him. But then I can go over both on the governance and coordination and user experience, as I was saying. But starting with the governance and coordination one, when we talk about this basket, we’re basically discussing that all of those four should be interacting with each other. Both standards and policy and internet governance spaces, they should coordinate, they should be inclusive. And if they stop to do it, the discussions might result in some level of fragmentation of the debate itself. We’re not saying it fragments the internet, we’re just saying it might be harder to follow up with these discussions. And the division of the debate would be something that would result in decisions being taken without consensus, lack of respect for the multi-stakeholder community, or even preference for multilateralism instead of the multi-stakeholder model of participation that we’re used to. So, we have a lot of questions about fragmentation. We have a lot of questions about fragmentation. We have a lot of questions about fragmentation. So, we have a lot of questions about fragmentation at the governance level. At the discussion paper that PNF put out, we also say it might create knock-on effects for fragmentation at the other technical and user experience areas. So, we basically have some asks for this debate and say that offering to implement a framework that’s likely to develop strategies that may improve coordination, avoid siloed, public policy discussions and also be fully inclusive to all stakeholders and enable participation. And also, that global Internet governance must engage the user experience. And that’s the one that relates more with some of the facts and things we see these days. We more or less define the user experience as the phenomenon by which different end users of the Internet when trying to perform the same action can be presented with different content, options, interfaces. And that can happen in both as a consequence of client-side instruments, so device and applications, but also some level of engagement. So, we’re not saying that it’s necessarily a bad thing. It might happen, it might be part of the user experience or how the web has been shaped in order to cater to our necessities or even, like, the whole information landscape. But at the same time, we’re also bringing up some bad sides and bad effects of that that could be Internet shutdowns or when legislations just simply block apps from existing or people from having access to the Internet. So, we’re bringing up some bad sides and bad effects of that that could be Internet shutdowns or when legislations just simply block apps from existing or people from having access to certain contents or people from having access to the Internet. And, just to wrap up on that, we’ll note when we talk about fragmentation of the user experience, we insist in five principles. The first one would be equality. Second one would be enhancement. So, we should be developing the same, allowing people to have the same level of experience when assessing the Internet. And also, allowing for users to make their own choices. Like, we know that the a lot of our choices nowadays are kind of, like, shaped by companies themselves in the space they dominate in markets. And, we also insist on impact assessment. So, whenever a government is considering some measure that might result in a different experience for the user, such as a jail blocking or a court order demanding to take certain content down, they should be able to perform some level of impact assessment and try to understand how that would affect citizens. And, which could be basically, like, a three-part test, just to see whether freedom of expression would be affected by that or any other things. We also insist in harmonization. So, every single new framework, legal framework, or public policy in this space should be talking to pre-existing policies, should be talking to company policies and so on. And, last but not least, going back to the third principle, which is that we should allow users to shape their own experiences instead of the other way around. So, I think I’ll stop around here a little bit, but just to flag that a lot of this framework will also be discussed tomorrow morning at 9 a.m. at the Policy Network for Internet Fragmentation main session. So, a lot of these debates will be continued. Thank you so much.

Turra Daniele:
Thank you so much, Bruna, for bringing, again, the perspective on end-users and to remember how fragmentation can also happen through Internet shutdowns, geo-blocking. And again, I think we are, we delved a lot into the applicational layer. So I would like also to hear Andrea, that is connected online, to maybe give us some more perspectives on the whole stack.

Andrea Beccalli:
Thank you, Daniel. Hello, everyone. Can you hear me? Okay. Yes. Thank you. So I’m happy to be here, although virtually, and I hope you’re all doing well with the jet lag and you’re enjoying the IGF, and I wish I was there with you. So thank you again for inviting me, and this is a topic that indeed is very relevant for ARIFM, but it’s relevant that really uses the internet, and every time that I come to speak about internet fragmentation or to think about, I always see how by the day, the issue becomes on one side more complex, but at the same time, even a little bit more dramatic in terms of what is laying ahead with us, for us. So we tend to take the internet for granted. You open up your phone, you open up your computer, you connect your smartwatch, whatever you have, and you almost, you know, simply, you see that the internet is there, you connect, you don’t think about it. And it has been like that for at least the past 25 years But, you know, we take it as a given, and we don’t think that what’s going on underneath, beneath. And I personally think that if we look to the next 25 years, or even the next five years, You know, we should seriously consider whether we can keep taking this principle for granted. And so let me go, you know, through the, as you mentioned, we call it the stack, or, you know, the global ecosystem of the internet. So basically, when you speak about the internet, the internet is a network of networks, that they all look like one internet, because they all decide, you know, to use the same language, the same, technically, we call it system of unique identifiers. And it’s the way that those networks exchange data, strings of zeros and one, okay. And that’s, you know, the basic principle that keeps thousands of networks, around 60,000 networks, looking like one single internet, because they all adopt this basically fundamental principle that anything is accessible from anywhere on the internet. If you stroll around Kyoto, the venue of the meetings, you will see one of the fathers of the internet, which is Vint Cerf is there, you can ask him how destructive this principle was back then, and it still is today. So, but then we are speaking about the networks, we are speaking about how, you know, networks managed by different companies, by large private companies, they all decide to use the same protocols to exchange information to each other. 90% of the time, maybe less, I don’t want to go into the, into the statistics, but what we think about fragmentation, legislation, I heard some of the distinguished speakers mentioning GDPR in Europe, mentioning initiatives in India. the DSA and DNA packaging in Europe. We’re actually speaking at those, that we call the application layer of the Internet, which we all know as the web, the World Wide Web, which is the most known and most used one. So these are services, softwares, communication means that are built on top of the Internet, of these network of networks. And that’s where, you know, our daily life basically, you know, develops every day. You know, sending messages via WhatsApp or iMessage, making video connection with Zoom or any other services. That’s those services, those applications are the one that in the past years are gathering more and more attention. I mean, those has been following the IGF, maybe had the advantage of being looking at those issues with some advance from, you know, respect to many others. But that’s where the main policy discussion is happening. And that’s where there is also this interesting distinction between the Internet governance and digital governance. And this layer, that we call as the application layer, is the one where, indeed, issues relating to the sovereignty of countries needs to be dealt by public authorities in order to defend, promote the rights and the duties of his own citizens. But in doing so, there are increasing risks that you disrupt the layer that is underneath, which is the technical layer, which is the layer of the system of unique identifiers. And, you know, of course, as… in such a complex technology as it is and such as complex society as we’re living it isn’t always so clear-cut and so sometimes there is the real intention of disrupting these very same principles that I mentioned to you that is anything is accessible from anywhere in the internet sometimes that’s the objectives but sometimes that’s not objectives but you end up you know risk to be that one and that’s where at ICANN we want to you know raise the tension that’s where you know although we have very technical mandate to coordinate this glue we want to flag where the risks are you know I just want to leave you with a reflection a personal reflection you know if you think ICANN is this year is 25 years old okay was created in 1998 we are celebrating in a couple of weeks the 25th anniversary and if you look back at the world back then 1998 to the turn of 2000 some of you had the lack of not being born or very young but you know you may have studied that on the books you know there was a time where globalization was on the rise I was just thinking in the WTO because we’re speaking about protectionism the door around in 2001 is when trade barriers across the globe were being taken down and there was you know this push of integration of global markets this push of you know the idea of the trade it’s indeed good for the economy it’s good for the for the promotion of democracy there is there was a whole political geopolitical economically the political economy framework that that’s upheld that one and if you look at today you know, you know, just 24, 24 hours ago, we see another war breaking up in the Middle East, we see how, you know, the global context has changed, dramatically changed. And this is another warning, and it’s not to me to elaborate. But it’s something that we have to consider that, you know, things don’t happen in a vacuum. And even at the technical layer, we see that. So we have to be wary of those two dimensions. Thank you, Andrea, for underlying all these

Turra Daniele:
complexities that are inherent in the internet, but that also are strictly related to how the world has changed. So I think that one common thread that is emerging here is around the idea of critical resources, and how the state can have an impact in this with specific trade policies, but and therefore, at the end of this whole chain impacting end users. So there might be some food for thought there on specific policy recommendations, maybe keeping in mind the end user. But also, one thing I think it’s emerging out of this specific conversation is that not all critical resources are managed by states. For example, one little piece is also about IP, IPv4 blocks, that are a critical resource of the internet, but therefore, but are not also managed solely by states. So keeping the multi-stakeholder model in this and how protectionist policies are made by the state should actually relate to that is a key point of this discussion. So, Herman is telling me that we have one online question, so, two online questions, so I will ask him to read those out loud, please.

Audience:
Yeah, thank you very much, Danilo. So the two questions that we have online are the following. The first one from Samridhi Kumar, he is asking, do we see a difference of priorities or approach towards the ADF fragmentation in the global north and the global south, particularly from a regulatory perspective? And then the second question by Amir Mukavi is, what would be the effects of internet weaponization against other nations, digital interference in other countries, and enactment to violence in campaigns from abroad on internet fragmentation, especially when we cross-border digital do not cooperate with national competent authorities? What could be done in this situation to avoid internet fragmentation?

Turra Daniele:
So back to the panel. So I will ask now whoever of our speakers would like to reply to this, maybe both of the questions, and then we will have time for just one question from the audience, if there are any, and then we can try to close the session. Bruna, okay, thank you.

Bruna Santos:
Yes, thanks a lot. Just about the priorities, I don’t know if it’s possible to say whether there’s a difference on priorities and where it comes from, but we are seeing, right, like a lot of countries and like member states as well, like diving further on internet regulation aspects and discussions, right? Like DSA is one of them, AI Act on the EU is another one of them. In Brazil, we have been discussing for the last three to four years a proper like disinformation regulatory And the point is that a lot of these regulations might influence, might result in some aspects or even changes to the Internet as we see it today. And I think that will be the main challenge, right? When engaging with policymakers, when engaging with politicians. Just remind them of the core, the critical aspects of the Internet in general, or why is it important, or even to explain what a court order would be something that would be problematic or blocking an app or anything like that. So I wouldn’t know to kind of like pinpoint whether there’s a difference in priorities, but I just wanted to flag that we are seeing this kind of change in the mindset recently, whereas before a lot of states avoided regulation, and now we’re much more focused on regulating every single or maybe all of the Internet aspects that we have been flagged or have been pointed out as like places for abuse or issues in terms of speech and rights in general. So just to say that. Thanks.

Turra Daniele:
Thank you so much, Bruna. I encourage anyone who wants to speak up and maybe ask a question to our panelists. Okay, I don’t think we have any specific questions. I might have one, and again I will ask probably Andrea, I think is the most indicated person for this. So actually I wanted to know a little bit more about this idea of managing the risk of fragmentation given its multifaceted nature. So this can be hard to regulate. It’s very hard to manage the multistakeholder model, and when it comes to specific risks of fragmentation. Who do you think should be responsible for reviewing specific policy requirements that in this specific case might also take into account priorities and the end user perspective?

Andrea Beccalli:
So Daniele, yes, so indeed, the model that, as I said, underpins the internet, the protocol layer, is a model that is now 30 plus years old. And it was built when the internet had nothing to do with what we define internet as of today. And the sheer number of people that designed this model, of course, is not representative of what is the internet user base today. So there is a critical point, and you pointed out into the model that developed that, this multi-stakeholder model, this bottom-up model, that wasn’t designed to scale up to that level. And to include all the different interests, even geographically, positions into that. And that’s one of the challenges that Eigen has, and many of the technical organizations have. How to make sure that as the internet scales up in terms of users, in terms of application, in terms of complexity, the models that govern it, underpins it, even in the development of its protocols, of its technical applications, adapt to that. And for anyone that participates in Eigen knows that this is a constant topic, how to evolve the multi-stakeholder model. And what I can say is that, and what we always say is that, the model is far from perfect. It’s a bit like the famous phrase from Churchill, that democracy is a terrible form of government, but it’s the best of anything out there. So the multi-stakeholder model for the internet application layer, sorry, for infrastructure layer, is the one that works. It’s not perfect, but it’s open. It allows everyone to get in. When we look at the other layers, well, there it’s a whole different series of approaches. If you’re lucky enough to be born in a region where your government is accountable, you may have channels to go through a law that your government push to. But one thing that I want to respond was one of the questions there. There were two very interesting, but I only limit to one, is the different priorities of fragmentation from the global South, the global North. What I think is that, yes, there may be different priorities. And sometimes, you know, protectionism or harming a different country, it’s one of the priority. But what I’m actually worried about is the effects, because fragmenting a market that is 500 million strong as the European Union has a different impact on the economy and the society of a market, of a country that is in global South, it is 30 million users, okay? So the impact that that one has is way larger that you can see in Europe. So some regions of the world, in a way, can withstand fragmentation, can survive through that, because they have developed enough markets that in a way can survive through that. They can develop their applications, you know, will be awful situation, but can survive that. Others, you know, it’s yet a step more. of pushing this digital divide that used to be one of the, you know, main issues of the WSAS and the early IGF yet to a next level. So that’s one of the things that I hope that we are taking consideration. I’m sure that in the IGF community, this one is well ingrained. So not everybody can withstand the interfragmentation and the protectionism that we are seeing around. The effects are very much different.

Turra Daniele:
Thank you, Andrea. My bad, actually, we have another contribution also on this specific point of engaging the Global South and how we can tackle policy needs, also from Nilesh. So I’ll leave you the floor.

Neelesh Maheshwari:
Personally, I think that, okay, there is not an issue per se with regulating. In fact, I argue that we need regulations to find solutions to problems like dissemination of disinformation and misinformation. And these are critical issues that need to be dealt with. Because these are not only issues about harm in the digital domain. In Global South especially, due to the spread of disinformation, we have seen that people are losing their lives. There are riots because somebody posted something about a particular community and it got spread. So, of course, the state needs to deal with these low-end order situations. The problem only arises when these regulations go beyond the legitimate ends. And it’s used to curb the exercise of fundamental rights. It’s used to curb the dissent, the freedom of speech, the freedom of expression. So, in that regard, I would rather say that, you know, the convergence of policy at a global level on these issues. Dialogue at the international level is the way to go. If we have international norms regarding how to combat misinformation, what should be the role of the state, what should be the role of the technical community, what is the role of big corporates, then you know, if a state who has a lot of market power is asking Twitter or any of the corporate for that matter, that okay, you take down these accounts, otherwise we will deny you access. Those can also refer to those international guidelines and can say that no, we will try to follow what is there in international norms. The civil society of the state then can say that no, you are going beyond the internationally agreed upon norms. The government is going beyond and curtailing the rights. But so there should not be an issue with the regulations, but what kind of regulations we are going for. So I don’t believe that regulations are problematic per se. For me, I think that it was a wrong idea that we can leave this sort of public policy functions to private corporations and of course what it resulted in. We just saw that, okay, there was a rise of surveillance capitalism and also from time being we are seeing Cambridge Analytica, we are seeing Snowden revelations, we are seeing electoral interferences where private corporations are hands in hands with state as well. So that is like my understanding of this issue. So I would like to keep once again the attention to, there was another question regarding the weaponization of the internet and if this could actually be, I suppose, moved also through protectionists. policy, what’s your thinking in this regard? You know, the question about weaponization of internet is also, you know, if we look at global north and global south, there’s a different perspective on that. Because the global, in the global north, we see the talk about cyber security that, okay, if you are trying to harm the critical infrastructure in a particular country, you are launching a cyber attack, which can lead to the failure of critical infrastructure. But in global south, we see countries like Russia and China, which are more concerned about information security, they see that, okay, the information can also lead to harm to their society and the stability of their country. So, how we look at the weaponization in that term, we also need to assess that, okay, what are the concerns of the global south, because I don’t believe that there can be one global norm or one global solution for these things. We live in a world where we come from different societies and different contexts, and without underlining those contexts, we cannot come up with, you know, one single policy formulation.

Turra Daniele:
Yeah, okay, yeah, I also wonder if this is, maybe you’re also suggesting that cyber security frameworks might also include local identities and local needs again, but I will give the floor to Bruna that I think wanted to contribute something in this regard.

Bruna Santos:
Yeah, no, just about the international standards or norms for regulating this information and so on. This is a rather confusing, complex, and multi-layered discussion. We are still trying to make social media companies apply their own, like, policies and the things they decide on every day at the same level to every single state, and it doesn’t happen. I’m working in a campaign currently that’s talking about basically, like, safeguarding elections and users and, like, how do you actually ensure that every single voter gets to have the same level of protection all over the world. But at the same time, we still have, like, policies and decisions from companies and many other spaces that prioritize some spaces and countries instead of others, right? So I’m a little wary when we come and do a lot of, like, conversations about this, what will be a global and international standard or conversation for that, because often when we come to those spaces, it’s not, it’s much less my part of the world that speaks, it’s much less the global majority, it’s the richer countries, right? It is Europe, it might be the U.S., and these are the main players in this discussion. So the same level of, like, global standards or policy discussions for every single country won’t happen if we continue to insist in the same kind of, like, power imbalances in spaces. So we definitely need or might need something special here, something that brings in the perspectives of victims, of the communities that are mostly affected by these issues and by the things that we’re talking about. And that also means bringing in people from Ethiopia to talk about fragmentation or people from Congo to talk about the issues about connections, just like Vencesa was talking before. So we do need to do a lot more work on including perspectives in this conversation so we can move forward.

Turra Daniele:
Thank you, Bruna. I will take this, may I take this as a closing statement? I think you mentioned, again, capacity building, so especially in the Global South and trying to include them in this global discourse. I will give you one minute, Nilesh. to maybe doing your closing remarks, just one minute. Then we’ll have Andrea, and we can conclude.

Neelesh Maheshwari:
So I would just like to conclude by saying that we have to accept certain realities of the world. And these are the realities, that there are new governance challenges. We cannot just say that what worked 20 years before is going to work effectively even now. So since we have seen new challenges in the past five, six years, over a decade, we have seen what kind of harms misinformation can do, what kind of harms the electoral interference can do. So of course, we need regulations. But at the same time, we have to see that while there are certain global sets of norms which lead to convergence of these policies, also there should be space for various different contexts in which the states come from. So if we allow such kind of policy development, that would protect the fragmentation of the internet, as well as allow the countries to pursue their own set of policies. At the same point of time, in terms of trade, I believe that the localization requirements should be minimal. The cross-border flow of data should be promoted. And probably digital trade agreements may be a way forward. But they need to keep in mind the realities of the global south, that they are already excluded from the benefits of the digital economy. And they might lack institutional capacity. So this should be taken into consideration and in mind while going forward with these negotiations.

Turra Daniele:
Thank you, Nilesh. Andrea, I’ll give you the floor for one minute of closing.

Andrea Beccalli:
Thank you Daniel and thank you everyone, all of you. The impact of fragmentation to me is way larger in the global south and the effects it can have that you can see in Europe or even China or India itself. I’m sure that in Brussels when DSA or GDPR or the DMA or AI Act were designed, not much reflection was put into what are the impacts on the global south. That’s not really the priority, it’s pushing them. It’s we need to defend our markets, we need to defend our users and that’s understandable but still a certain point of where these actions actually risk to compromise something. Then if you look back, it’s something marvelous. We never had such a technology, we never had such a way to connect everyone, everywhere across platforms, across languages, across time zones. And as I said at the beginning, we took it for granted. The internet is there, you connect, you only pay for your internet service providers. If there is a public way, if you don’t pay, you just pay for the device. And no, I don’t think we can take this principle for granted any longer and we need to fight for that. But we need to fight seeing going out which are the right battles and which are the right layers. Often we see that policies, policy makers, elected officials, they mess it up with the layers. They think they are tackling some issue, free speech, cyber crime, and there was this question about the weaponization of the internet. no, that we arrive and we see it. The EDNS has been used as a way of attacking other countries, something that the technology wasn’t designed for. But you need to be specific, you need to know what you’re acting for and be mindful of the consequences. So hopefully we will have more chances at the IGF to do that because the spaces to discuss these issues are shrinking, unfortunately.

Turra Daniele:
Yes, exactly. Again, I would like to thank every speaker and every panelist for today. I would also like to thank everybody who connected in their own time zones. I would like to connect Pedro, one of our organizers, that is connected from Brazil right now. Pilar also just arrived from Spain after a super long trip. And I just wanted to point out that, again, it’s very important to try to include everybody and also in the design of these policies that seem to have local impacts. In fact, we might also have some unexpected global issues. So it’s important to include those other perspectives in spaces such as the IGF where we can actively contribute and talk about the specific issues as a community, as a global community. And also, I would also have been very happy to hear more from Venceslas. But again, this is also connectivity issues are, I think, at the center of this whole conversation. So there is a need also to include those perspectives and not lose focus. So we are out of time, unfortunately. We will share our report and our policy recommendations. as well as the contacts from our panellists, for everybody interested in following up after this session. So I would like to thank again everybody for this session. A little round of applause and have a good night. Good morning or continue your day. Bye. Thank you.

Neelesh Maheshwari

Speech speed

159 words per minute

Speech length

2158 words

Speech time

813 secs

Turra Daniele

Speech speed

125 words per minute

Speech length

1992 words

Speech time

957 secs

Venceslas Katimba

Speech speed

100 words per minute

Speech length

541 words

Speech time

323 secs

Andrea Beccalli

Speech speed

151 words per minute

Speech length

2173 words

Speech time

866 secs

Audience

Speech speed

159 words per minute

Speech length

121 words

Speech time

46 secs

Bruna Santos

Speech speed

182 words per minute

Speech length

1741 words

Speech time

573 secs

Development of Cyber capacities in emerging economies | IGF 2023 Open Forum #6

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

During the discussion, several crucial topics were brought up, including digital diplomacy, cyber diplomacy, cyber capacity building, digital education, administrative risk, cyber security, DNS, OTT, CEO awareness, investment in cybersecurity tools in developing countries, AI in cyber intelligence, cyber certification, and cybersecurity education.

One of the main points emphasized was the need to differentiate between digital diplomacy and cyber diplomacy. A curious audience member posed the question to the speaker, highlighting the audience’s interest in understanding the distinction between these two terms.

Another key point was the importance of cyber capacity building in achieving broader development goals. It was argued that cyberspace is an integral part of a country’s development, and investment in securing cyberspace significantly affects the success rate of other policy initiatives. Academia and policymakers have stressed the need to integrate cyber capacity building and development policies.

The significant contribution of digital education in dealing with cyberspace issues and developing cybernetics was also highlighted. Digital education involves utilizing the internet critically and reflectively, and it was argued that long-term digital education can prepare a society for life in a cybernetic context.

The critical role of cyber security in economic development was another focal point of the discussion. Evidence from a research program sponsored by UNECA demonstrated that an increase in cyber security maturity could lead to a substantial increase in GDP per capita. The research incorporated data from Africa, Asia, and Latin America, providing a broader perspective on the impact of cyber security on economic growth.

The need for leadership and policymakers to recognize the connection between cyber security and economic development was emphasized. The results of the research program sponsored by UNECA were seen as a persuasive tool for promoting this understanding among decision-makers.

Concerns regarding the affordability and sustainability of investing in cybersecurity tools in developing countries were also raised. A concerned individual highlighted the challenges of providing affordable and sustainable cybersecurity solutions in countries with limited resources.

The discussion also touched on the challenges of balancing the use of AI in cyber intelligence and preventing its malicious misuse. It was noted that AI can be a powerful tool for cyber intelligence, but precautions must be taken to avoid its misuse for malicious purposes.

The deficit of cyber security experts and the expensive nature of cyber certification were also mentioned. It was argued that cyber certification is an expensive process, and there is a scarcity of skilled cyber security professionals, highlighting the need for more investment in cybersecurity education.

In terms of cybersecurity education, the level of education required was brought into question. The audience member wanted to know whether cybersecurity education should be basic or advanced, underscoring the importance of understanding the appropriate level of training needed in this field.

Overall, the discussion covered a wide range of topics related to digital diplomacy, cyber diplomacy, cyber capacity building, digital education, administrative risk, cyber security, DNS, OTT, CEO awareness, investment in cybersecurity tools in developing countries, AI in cyber intelligence, cyber certification, and cybersecurity education. The arguments and evidence presented shed light on the critical role these areas play in today’s digital world.

Sandy Palma

Central America is facing significant challenges in the field of cybersecurity. The region is underdeveloped in terms of cybersecurity, with a shortage of trained professionals in the field and limited availability of universities offering education in cybersecurity. This lack of expertise and education contributes to the vulnerability of Central America’s digital infrastructure.

One key issue is the underreporting of cybersecurity attacks in the region. Due to the absence of policies and laws around cybersecurity and the non-disclosure of cyber attacks, incidents often go unreported. It is only when individuals are personally affected and voice their experiences on social media that the wider public becomes aware of these violations. The low reporting rate hinders efforts to effectively address and mitigate cyber threats.

The exponential growth of cyberattacks in Central America has necessitated resilience in all sectors. The switch to virtualization as a response to the pandemic has made several academic centres, from preschools to high schools, victims of cyberattacks. To combat these threats, schools and universities have had to implement internal policies, rules, and protocols. This demonstrates the urgent need for increased resilience and cybersecurity measures in the region.

Another concern is the lack of participation from government authorities in platforms like the Internet Governance Forum (IGF). Over the past five years, only one decision-maker or government representative from Central America has taken part in the IGF. This lack of participation hampers the region’s ability to shape policies and strategies related to cybersecurity on a global scale.

Creating awareness through education and training is seen as essential in addressing cybersecurity issues. It is suggested that cybersecurity should be included in the curriculum, covering areas such as laws and computer rights. This would help to equip individuals with the necessary knowledge and skills to protect themselves and contribute to cybersecurity efforts. Furthermore, policymakers, who are mainly government authorities, should prioritize cybersecurity education within the region.

In conclusion, Central America faces significant challenges in cybersecurity. The region has a shortage of trained professionals and limited educational opportunities in the field, leading to vulnerabilities in its digital infrastructure. Cybersecurity attacks often go unreported due to the lack of policies and public awareness. The region must focus on building resilience and increasing participation in platforms like the IGF. Creating awareness through education and training is crucial in combating cybersecurity threats. By including cybersecurity in the educational curriculum and prioritising it as a policy agenda, Central America can address these challenges and enhance its cybersecurity capabilities.

Cláudio Lucena

Universities have faced criticism for their slow integration of cybersecurity into their formal curricula, resulting in a shortage of cybersecurity professionals. This has become a pressing issue as the scale and nature of cybersecurity threats have evolved with the increasing reliance on online activities. Traditional approaches to education may no longer be adequate to address the demand for skilled professionals in the field.

Furthermore, the importance of cybersecurity extends beyond just technical expertise. It is essential for universities, particularly those in the Global South, to play a significant role in promoting cybersecurity awareness. By understanding the importance of the digital ecosystem and cybersecurity, universities can adapt their curricula accordingly. Public universities in the Global South have the potential to effectively reach out and raise awareness about cybersecurity among their communities.

In addressing the digital transformation, it is crucial to consider the elderly population, who are often neglected in cybersecurity initiatives. Elderly individuals may lack the instinctive ability to navigate online activities safely and protect themselves from threats. However, initiatives like the UAMA program implemented by Paraíba State University in Brazil have shown promise in educating elderly people about cybersecurity. The results of the program’s first semester demonstrated a significant increase in awareness and participants’ ability to protect themselves online.

On the other hand, allowing elderly individuals to manage their own digital transformation without proper guidance can have negative consequences. It highlights the importance of providing targeted education and resources to ensure that the elderly are equipped with the necessary skills to navigate the online world safely.

Overall, academia in the Global South has tremendous potential for community engagement in cybersecurity awareness. Universities such as Paraíba State University have harnessed this power by implementing programs like UAMA. By actively engaging with communities, universities can contribute to reducing the cybersecurity skills gap and promoting a safer digital ecosystem.

In conclusion, universities need to restructure their cybersecurity education to keep pace with the evolving threat landscape. The integration of cybersecurity into formal curricula, especially in the Global South, is vital in creating awareness and bridging the skills gap. Additionally, targeted programs that focus on educating the elderly about cybersecurity are essential to ensure that everyone can participate safely in the digital transformation. To maximize their impact, universities in the Global South should leverage their potential for community engagement and work towards building a more secure online environment.

Christopher Painter

Capacity building in cybersecurity is highlighted as crucial for combatting threats and driving economic growth. It enables countries to navigate the challenges of digitisation and the digital economy effectively. The COVID-19 pandemic has further emphasized the reliance on technology, leading to the recognition of the necessity for robust cybersecurity measures.

Political buy-in is seen as essential for the long-term sustainability of cybersecurity objectives. Without political support, capacity-building efforts in cybersecurity would not be sustainable. Capacity building should be integrated into a country’s economic priorities to ensure commitment and success.

Cybersecurity has a tangible impact on creating trustworthy systems and facilitating economic success. Progress has been made in several countries in establishing reliable systems to counter various threats, demonstrating the positive potential of cybersecurity in enhancing economic growth.

The integration of cybersecurity into political and economic priorities is crucial, as it is not solely a technical issue but also a geopolitical and economic concern. Handling cybersecurity issues is compared to nuclear matters, underscoring its multifaceted nature and broader implications.

Efforts are being made to improve policymakers’ understanding of cybersecurity to address the evolving cyber threat landscape. There is growing recognition of the importance of cybersecurity among policymakers, as evidenced by increased awareness and prioritization of cybersecurity issues under various administrations.

The Department of Homeland Security has established an action board to review major cyber incidents. This board includes renowned experts like Jeff Moss and focuses on investigating and learning from cyber incidents while preparing reports.

There is a shift in how cybersecurity breaches are handled, with increasing requirements for disclosure due to changing laws and regulations. The Securities and Exchange Commission mandates publicly traded companies to disclose significant breach events, and Europe is introducing laws that compel companies to disclose cybersecurity breaches.

Digital diplomacy and cyber diplomacy are considered similar, focusing on economic aspects, telecommunications, cyber security, and geopolitical issues. The convergence of the development community and the cyber community is seen as critical, aiming to bring together different perspectives and expertise.

In summary, capacity building, political buy-in, and a multidimensional understanding of cybersecurity are central to addressing threats and driving economic growth. Efforts to educate policymakers and establish clear protocols and mechanisms are necessary to address cyber incidents. The evolving regulatory landscape and emphasis on transparency shape the future of cybersecurity.

Mark Datysgeld

The Domain Name System (DNS) is a crucial component of the internet, responsible for managing the translation of domain names into IP addresses. It operates most of the internet, enabling users to access websites, send emails, and use various applications. However, the security of the DNS has not always been given the necessary attention, leaving it vulnerable to abuse and exploitation by cybercriminals.

Neglecting DNS security can have severe consequences for the integrity and reliability of the internet. Cybercriminals can exploit weaknesses in the DNS to launch devastating attacks, such as phishing, botnets, malware distribution, and malicious spam. This not only puts users at risk but also undermines trust in online platforms and services.

To tackle these issues, there is an ongoing initiative to combat different forms of DNS abuse. The initiative focuses on specific use cases and recommends that registrars and registries, who operate the DNS, adopt measures to block these harmful practices. By implementing these measures, it aims to strengthen DNS security and safeguard the internet ecosystem.

Mark, who presided over the working group dedicated to DNS security, advocates for increased DNS security and the broad implementation of the proposed measures. His optimism stems from the belief that rules blocking the malicious use of DNS will be adopted worldwide within the next year. His advocacy highlights the importance of prioritising DNS security and taking proactive steps to mitigate the risks associated with DNS abuse.

Another aspect being emphasised is the need for operators to include reporting mechanisms in their contact forms. Users play a critical role in identifying and reporting DNS abuse. With an increased requirement for operators to include reporting options, users will have an easier way to directly report instances of abuse. This not only facilitates the reporting process but also enhances interaction between users and operators, ensuring prompt action is taken against malicious activities.

Moreover, educating people about the wide-ranging roles and importance of the DNS is crucial. Many individuals perceive the DNS as only relevant when they have a URL in their address bar. However, the DNS is integral to the functioning of most apps and devices, powering the entire internet infrastructure. By raising awareness and providing education on the significance of the DNS, users can develop a better understanding and appreciate its vital role in supporting online activities.

In conclusion, prioritising DNS security is essential for maintaining the integrity and reliability of the internet. The ongoing initiative to combat DNS abuse, along with the advocacy for increased security measures and reporting mechanisms, showcases the collective effort to address these issues. By raising awareness and educating people about the importance of the DNS, we can build a safer and more secure internet ecosystem for all users.

Olga Cavalli

The discussion focuses on the topic of cybersecurity in Latin America, particularly in relation to its importance, capacity building, resilient infrastructure, and the impact of immigration. One key argument raised is that cybersecurity is not seen as a primary concern in the region, as it is overshadowed by economic and security issues.

However, there is increasing recognition of the need for resilient infrastructure to effectively cope with cyber threats. Recent events related to ransomware attacks have highlighted the value of having a solid and resilient infrastructure. It is argued that without such infrastructure, economic development cannot occur. This positive link between resilient infrastructure and economic development is seen as crucial for the region.

One concern raised is the scarcity of specialized cybersecurity education programs in the region. It is noted that only a few universities offer programs or careers focused on cybersecurity. This lack of specialized education is seen as a significant obstacle in developing a strong cybersecurity workforce.

The lack of transparency and open discussion surrounding cyber attacks is also a concern. It is pointed out that the only way people get to know about these attacks is through individuals sharing their experiences on social media. This lack of transparency and open discussion is seen as a problem that needs to be addressed.

Another significant observation is the loss of cybersecurity professionals from developing economies to countries with higher demand. It is argued that the demand for cybersecurity professionals in other countries is causing a brain drain, depleting the talent pool in developing economies. This loss of professionals is seen as a challenge that needs to be addressed to ensure the cybersecurity capabilities and resilience of these economies.

The role of universities in generating cybersecurity experts is emphasized, and it is suggested that universities should play a vital role in offering cybersecurity education. Specifically, it is advocated that cybersecurity should be included as part of the formal curriculum in universities. This inclusion is seen as essential for developing a skilled workforce to meet the growing demand for cybersecurity professionals.

Furthermore, attention is drawn to the vulnerability of older adults in the digital world and the need for cybersecurity education that includes them. It is highlighted that older adults often lack digital literacy and are therefore more susceptible to online risks. This vulnerability underscores the importance of including all demographic groups, including the elderly, in cybersecurity measures and education.

In conclusion, the discussion underscores the importance of cybersecurity in Latin America and highlights various challenges and areas that need to be addressed. These include the lack of prioritization of cybersecurity, the scarcity of specialized education programs, the need for resilient infrastructure, and the vulnerability of older adults. The role of universities in generating cybersecurity experts and the importance of transparency and inclusion in cybersecurity initiatives are also emphasized.

José Cepeda

Spain is taking steps to enhance its understanding and awareness of critical infrastructures, with a particular emphasis on parliaments. The country is evaluating the critical nature of all parliaments in order to develop a comprehensive understanding of the potential risks and vulnerabilities they face. This signifies a positive development in Spain’s approach to safeguarding essential entities.

However, there exists a significant gap between the technical understanding of cybersecurity and the realm of politics. Many politicians lack the necessary technical knowledge to effectively make informed decisions regarding cybersecurity. This knowledge deficit often hinders the policymaking process and can lead to suboptimal outcomes. Therefore, it is crucial to bridge this gap to enable more effective decision-making in matters of cybersecurity.

To address this issue, Spain is collaborating with the Interparliamentary Union to formulate resolutions that define critical infrastructure. The focus of these resolutions is on parliaments, recognizing their indispensable role in the functioning of the state. By establishing clear definitions and guidelines, Spain aims to strengthen the protection of parliaments as essential entities within the broader critical infrastructure framework.

Local institutions in Spain, due to their limited security infrastructure, are particularly vulnerable to cyber attacks. The majority of attacks in Spain occur on Fridays at 5 p.m. This timing allows cyber attackers to operate throughout the weekend, when there are typically fewer personnel available to detect and respond to such incidents. This vulnerability highlights the urgent need to enhance the security measures and resources available to local institutions.

In response, the Spanish government is developing a hierarchical security infrastructure that caters to institutions at all levels. This initiative ensures that designated individuals at both the national level and in each autonomous region are responsible for the security of municipalities and corporations. Establishing a comprehensive security infrastructure is a positive step towards bolstering cybersecurity across various institutions in Spain.

Furthermore, there is a proposal to create an institutional shield aimed at safeguarding critical infrastructures. This shield would enable institutions, companies, and even citizens to connect with public administrations and governments for enhanced protection. It offers a coordinated and collaborative approach to cybersecurity, ensuring that all stakeholders have direct access to a network of resources and support.

Moreover, Spain is actively involved in developing a global report for the Interparliamentary Union, focusing on cybercrime. The report is currently being analyzed and debated in meetings at the Department of Communications. Additionally, there are plans for a world summit on cybersecurity at the United Nations, demonstrating Spain’s commitment to addressing this pressing issue at an international level.

Recognizing the United Nations’ potential to lead in cybersecurity, there is a proposal to leverage the organization’s resources to establish it as a paradigm of cybersecurity. This would involve utilizing the U.N.’s expertise and infrastructure to provide cybersecurity resources to regions, such as remote parts of Asia and Africa, that are particularly in need of support.

Lastly, an interesting proposition is being considered to create a technological branch called ‘Cyber Blue Helmets’ within the United Nations. Inspired by the current Blue Helmets body, this branch would be dedicated to providing worldwide cybersecurity coverage. This idea holds promise in enhancing global cybersecurity efforts and demonstrates a forward-thinking approach towards addressing cybersecurity challenges.

In conclusion, Spain is taking significant steps to improve its understanding of critical infrastructures, particularly in relation to parliaments. While there is a need to bridge the gap between technical cybersecurity understanding and politics, Spain’s collaboration with the Interparliamentary Union in formulating resolutions for defining critical infrastructure is a positive development. Enhancing the security infrastructure for local institutions and proposing an institutional shield to protect critical infrastructures further demonstrates Spain’s commitment to cybersecurity. Participation in the development of a global report and the proposal to make the United Nations a paradigm of cybersecurity showcases Spain’s international engagement in addressing cybercrime. Additionally, the prospect of ‘Cyber Blue Helmets’ within the U.N. highlights innovative thinking in providing worldwide cybersecurity coverage.

Session transcript

Olga Cavalli:
participants, but we are not able to I cannot I cannot open the zoom Okay, thank you Okay, thank you for for being with us in the meantime. Just let’s let’s start our conversation and They’re in okay, but I cannot I cannot see them I Moderate and moderate in the dark Okay, oh, I can mark the mark solution at all of problems. Okay. Thank you. Thank you very much for being with us so in respect of the time and people that are Punctually joining us this this afternoon. Let me introduce myself. My name is Olga Cavalli Presently, I am the national director of cybersecurity of Argentina and I also do the several other activities in in my Academic side. I am the director of the South School of Internet Governance and University teacher as well and with me I have a lot of friends and very well-known and respected specialists that were so kind to be with me this afternoon Mrs. Chris Painter Chris is he has been the first cyber diplomat in the world he’s very well known for his work with the President Obama and I I met him for the first time in IGF in Turkey and and since then we have been in contact and he has been participating in all the schools of Internet Governance that we organize in countries of the Americas whether in person or remotely he’s always keen to Help us with his knowledge and his presence and all the activities that sharing all the activities that he does With me is my dear friend Claudio Lucena Claudio is He’s a professor in Universidad de Paraíba in the northeast of Brazil We recently organized the South School of Internet Governance there in the beautiful city of Campina Grande where he lives and he is based there. So thank you for receiving us there. To my right I have my dear friend, Mark is one of these young jewels of the Internet governance space. He is very active in ICANN, he’s a GNSO Council Member, and also he’s involved in several research activities related with the Internet. And I have remote, my dear friend remote participants I have Sandy. Sandy, are you there? Are you there, dear?

Sandy Palma:
Hello, dear.

Olga Cavalli:
Hello, Sandy. Sandy Palma, she’s from Honduras. She’s the CEO of a non-governmental organization named Honduras Cibersegura. And she is very active in all related with cybersecurity. Also, she has been a student, a fellow of the South School of Internet Governance. And I have Jose. Jose, are you there? Jose Cepeda, he’s a diplomat, he’s a parliamentarian from Spain. Hello, dear Jose, how are you? Jose, good question. In between us, do you want to speak in Spanish or English? I don’t care, I can do a non-simultaneous translation if you prefer to speak in Spanish.

José Cepeda:
Well, the truth is that we prefer it, I think.

Olga Cavalli:
Okay, we always want the language. Okay, fantastic. No problem. No problem. So, I have drafted some questions for my dear colleagues. And I would like to start with Chris. Chris is now the… What’s the director? CEO?

Christopher Painter:
President, yeah.

Olga Cavalli:
President of the Global Forum of Cyber Expertise. And he travels all around the world contributing and organizing different capacity-building activities related with cybersecurity. And I have kind of a weird question. How do you see the impact of all the activities that you do around the world? Do you see that it’s really changing the cybersecurity… landscape in the countries that you visit, especially focusing on developing economies, countries that, what I see, at least in Latin America, is that priorities are always other priorities. It’s not cybersecurity, it’s not the main priority, it’s usually problems with economics, it’s the security, exporting goods, or some other problems related more mainly with economy. How do you see that evolving after, through all the work that you do? You feel that that has an impact and something is changing, and then we can ask some other questions to you. And thank you for being with us.

Christopher Painter:
Really happy to be here with my friend, Olga, and the other panelists, and all of you. Well, I shouldn’t say no, then I’d have to find another job. I’d just say, no, I do think it has an impact. And I should say that capacity building was one pillar of what I did when we started the office at the State Department, the Cyber Diplomacy Office. And now there are like 45 of them around the world, some of them are in this room, and that’s great. And that’s important to look at this as not just a technical issue, but also as a diplomatic issue, as a policy issue. And I’d say that, even back when we started the office, we were doing capacity building in different parts of Africa, other parts of the world. We also focused with the Organization of American States and others, and one of the reasons for that is I think of capacity building in the cyber realm, but really in everything, as the enabler for all, not just to fight all the bad things we see, all the threats that are continuing to grow and evolve, but also to enable all the good things we want out of the internet. And more importantly, to your point, Olga, to enable something that every country wants now, which is to seize on digitization, and seize on the digital economy, and take advantage of this relatively new platform where they all see, you know, this is bridging gaps between communities is always interesting. The security community doesn’t talk to the economic innovation community. This was true when I worked in the White House, too. There was a National Economic Council, National Security Council, they had different views of things, so they didn’t always coordinate. And when we did the cyber strategy at the White House, getting them together was itself kind of a Herculean effort because they’re just different viewpoints. So if you can message it in a way that both the security people and the economic people understand, which is this enables this digitization, this seizing of the digital economy that you all want to grow your economy, particularly in developing countries, that makes it something where they say, okay, this really is a priority, because that’s a priority. And if cyber security is going to enable that priority to succeed, then we want to be part of this. Then we understand what the end game is, that it’s not just a cost, it’s something that’s going to achieve something. And to get that, you often, you know, for this capacity building to work in cyber or anything else, you need real political buy-in. It can’t just be, you know, the technical people you’re training say, yes, we want more, which is great that they do. But if you don’t get the larger political buy-in, it’s not sustainable in the long term. You end up doing one-off trainings, one-off things that are great when they happen, but then five years later, it’s lost. So you need to have a sustained effort, get it ingrained in that country, and that’s really tying it to the economic priorities as well. And I think we’ve seen that, you know, the pandemic had a silver lining in the sense that countries recognized how reliant they were on these technologies, that it wasn’t optional anymore. And they see it in terms of infrastructure projects, water, power, financial, everything is controlled by cyber and security is something that will make that more trustworthy and also operational. So the couple things that I’d say is in Africa, we created a cyber experts group. I think that’s having real impact, certainly in the Latin American Caribbean region. I’m working through the OAS as our kind of regional hub too. We’ve been partnering with them. There’s been lots of great efforts to build certs. Computer emergency response teams have national strategies, which are the kind of framing policy document. And I have seen real, I think, impact there, which is good. ASEAN countries, I just came from Fiji, where we launched our Pacific hub, so for the Pacific Islands. More and more countries are understanding, and that was with the Deputy Prime Minister of Fiji, so I think, again, that political level was important. We’ve seen that connection, but we have to sustain this. And my organization was brought together to have more, as a community, really, it’s supposed to coordinate and make sure we put this on a higher level. And we’re having a big conference in Ghana, which is a worldwide conference, not just an Africa conference, at the end of November, to bring some of these communities together, including the traditional development community. We all know the SDGs, but the cyber community and the development community, again, two separate spheres, and bringing them together is critically important if we’re gonna make progress. So my long answer is, yes, there has been an impact. Yes, I’ve seen it. It’s hard to measure these things, but I’ve seen, I think, real progress in a number of countries as they, I think, create a more trustworthy system against all the threats that will help them succeed economically.

Olga Cavalli:
Thank you. I think that some recent events, perhaps related more with ransomware, are showing the value of having a resilient infrastructure and be aware and have a rising awareness about all these things. And I find very interesting the link that you make with the development of the economy. If we don’t have that infrastructure in shape, that won’t happen. So I think this latest new attacks are perhaps putting this issue more in the spot.

Christopher Painter:
Yeah, I mean, look, I’ve been doing cyber now for 33 years. So for a long time, I was a prosecutor prosecuting cyber crime cases when no one cared about them back in the 90s, and then went to help run the computer crime section was at the FBI, the White House, and the State Department. And through that whole time, the cyber people were not cyber people. but we do cyber stuff, we would be saying this needs to be a priority. And to be sure, in the US, under, at the end of the Bush administration, certainly the Obama administration, because his campaign was hacked into. And now in the Biden administration, it’s, you know, it’s, it’s a priority, but it can’t just be one priority of like 300. Right? When we had the ransomware attacks, where people had to wait in line for gas, where you might not get your hamburger, because it went after a meatpacking plant, where in the Irish healthcare system, you might have your healthcare impacted. That makes it a backyard issue. It makes it, it makes it a political issue. And it makes it a real priority. And so that’s what I’ve seen, not just in the US, but around the world is more and more, this is becoming a priority. The other thing is, the cyber people are pretty bad at explaining this, being the translators to policy people, you know, and we need that translation. We can’t make this a magic thing. It has to be something that they understand. This is a geopolitical issue. It is a capacity building issue. It’s an economic issue. And we need to put it in those terms. You know, I remember used to going and with the exception of Janet Reno, as the Attorney General, who got this completely early on, on cybercrime, but most senior ministers or cabinet officials for us, you talk about cyber, their eyes would roll back in the back of their heads and go, Oh, my God, that’s a technical issue. I’m afraid of that. They’re not afraid of like nuclear issues. And those are really technical, you don’t need to be a nuclear engineer to deal with those issues. And you don’t need to be to be a coder, to understand the implications of cyber and cybersecurity. You need to have some of those people on your staff, but you don’t need to be and I think we need to make sure that the policymakers can grasp that. And I’ve also seen that both in the government and in companies. And that’s, I think, a real change to

Olga Cavalli:
think this is why capacity building so important to build bridges in between technical people and policy people, which is always challenging, especially technicians and lawyers. No, I’m an engineer. Okay, José, are you there? José, did I miss you? Yes. Hi, I’m going to ask you a question in Spanish, but then I’m going to translate it and then I’ll give you the word. Of the comments you sent me for this workshop, I found this initiative that you are carrying out very interesting, these blue helmets, cyber blue helmets, and if you can tell us a little about that, and also another initiative of a mapping of critical infrastructures. Now I’m going to explain it in English and then I’ll give you the word, and after you speak, I’ll translate it into English. Thank you very much for being here with us. José Cepeda, he is a parliamentarian from Spain, and he has been going around the world, and he’s engaged in a very interesting initiative, perhaps you have heard of it, I’m sure you have heard about it. It’s a, how do you say helmet in English? Helmet. Helmet. Cyber helmet. Cyber helmet. And you’re involved in that initiative from the United Nations. José, maybe you can tell us about that, and also another initiative that you told me is about a map about cyber critical infrastructures and related with parliamentarian activities. So maybe you can start with the cyber helmet issue, and if you speak in Spanish, then I can translate to the audience. Many thanks for being with us this afternoon. Morning, early morning for you in Spain.

José Cepeda:
Muchas gracias. Thank you so much, Derek, for this meeting, and especially to Olga Cavalli. Thank you so much. I prefer to speak in Spanish because my English is very bad.

Olga Cavalli:
Sounds good.

José Cepeda:
Okay, okay. Well, thank you. The truth is that talking about the blue cyber helmets or talking about the maps of critical infrastructures in Spain in particular, for me it is a great opportunity in this world forum. I’m going to talk first about Spain, if you like, and then about the more international or more global part. With respect to Spain, it is true that they are developing, following a bit the last resolutions that we have approved in the Interparliamentary Union, a greater awareness of what it is and a greater deepening in the idea of what are really critical infrastructures. For example, we are already evaluating in a serious way that all the parliaments are critical infrastructures. Before, I liked a bit what Christo Cernó and Olga were talking about, about the fusion of the bridges between the technical and the political. I think it is essential. Unfortunately, there are not many politicians who understand technically cybersecurity. This often generates a problem when trying to make decisions.

Olga Cavalli:
Jose, I will translate. So, Spain is… He will focus first on Spain. They are developing resolutions, especially with the Interparliamentary Union, in definition of critical infrastructure. They are starting to think that the parliaments and the parliamentarians are a critical infrastructure. Also, he finds interesting this idea of building bridges between technical people and policy makers, and also the politicians to be involved with the value and the importance of cybersecurity. You go on. Sorry for interrupting you.

José Cepeda:
No, no, no. Thank you very much, Olga. What is happening? One of the biggest cyberattacks, we are seeing them, is being developed in the most basic local institutions. The majority of the attacks that we are receiving in Spain are usually on Fridays at 5 p.m. Why? Because this way they have the whole weekend free to be working when they know that there are no employees and there are no employees behind or controlling the machines. There should be, but there really are not, especially in the small institutions, in the local corporations, not in the municipalities. So, let’s say that from the institutions, from the government of Spain, an infrastructure has been developed that from the highest level to the lowest level, there is a capillarity in the responsibility when it comes to appointing. For example, there are people in charge at the national level, but then they have been created autonomously by regions, and then each of those regions is in charge, in turn, of helping and controlling each of the municipalities and corporations so that the whole institutional structure is protected.

Olga Cavalli:
Ok Jose, I will translate, In Spain they noticed that most of the attacks occur on Friday at 5 pm, so they have all the weekend to work with the infrastructure that they have intruded. So, the government has started to work with all levels of the government, which is national, regional, and municipal, local level. And also establishing responsible people, CISOs, responsible people of cybersecurity, in all of these different levels of the government. You go on, Jose.

José Cepeda:
Thank you. So, it is true that what has been taken as a decision is to develop this institutional shield so that all the critical infrastructures, not only the institutional ones, but from the institutions, there is the possibility of developing a map in each locality, in each region, and in the whole country. so that not only the question of institutions or politics, but that all companies can have direct access to this network, and in the end, even any citizen who may have a problem, so that they know where there can be a connection with public administrations, with governments, whether local, regional or the central government of the state, to protect all citizens and all companies and all infrastructures that depend directly on the government. Well, and if you don’t mind, now we are going to talk about the blue helmets, cyber blue helmets, right? As you well know, I have been working for some years on the development of a global report, precisely at the institutional level for the Interparliamentary Union, and this report is being analyzed and debated in the meetings that are being held at DOC on cybercrime and cyberterrorism, a commission at DOC that is being developed, supposedly for the future, the forecast is that there will be one or two years, to make a great world summit in the United Nations on cybersecurity, better known as cybercriminality, cybercrime, well, cyberterrorism and cybercrime in general, right? And it is true that in that context, the idea arose to look for the United Nations to become a paradigm of cybersecurity as well, right? If it is security at a global level, why not also provide it with resources, with means, so that they are also a little bit the leaders, that above all, as Christopher also commented, there are some places in the world where cybersecurity is very far away, for example in Africa, there are some remote places in Asia, some places in Africa. It is important that in the end, as in a pandemic, when we talk about cybersecurity, all countries have some minimum resources to protect themselves. And it is true that the United Nations can do a great job there. That is why our proposal is aimed at the fact that, if the Blue Helmets already exist as a structure of the United Nations, also to safeguard the decisions of the Security Council and safeguard and prevent conflicts that go further, as unfortunately we are seeing lately all over the world, our proposal would be for the United Nations to develop, even more so, the Blue Helmets body in a technological area that could provide coverage to all countries in the world.

Olga Cavalli:
So, there exists this concept of the Blue Helmets that are taking care of security and organized by the United Nations. So, he has been working with the Inter-Parliamentary Union to promote the creation of a summit in the United Nations focused on cybersecurity, cybercrime, with this United Nations paradigm focused on security. Why not having cyber helmets for cybersecurity, as they have already cyber normal Blue Helmets to try to help bring security to all different places in the world? So, the idea would be to develop this concept of cyber helmets in this summit that would happen in one or two years. I hope I haven’t forgotten anything. I think I’ve said everything. I’m receiving myself as a non-simultaneous translator.

José Cepeda:
Wonderful, wonderful. You translate fantastically well.

Olga Cavalli:
Thank you. Is there anything else you want to tell us for now? Then I’ll come back with another question, José.

José Cepeda:
No, in principle, nothing else. Thank you very much and I’m sorry for all this double work I’m commenting on.

Olga Cavalli:
That’s how I learn more. Your English is not bad. I’m going to tell you that for the little I heard, it was very good. Sandy, are you there?

Sandy Palma:
Hi, dear.

Olga Cavalli:
Hi, dear Sandy. There I see you. How beautiful the background.Now I have to switch to English, Sandy Palma, she’s from Honduras.edit She’s the CEO of a non-governmental organization named Honduras Cibersegura. And she has been very, very active, apart from the fact that she has been one of the students of our school several times. She was in Buenos Aires last year and she’s a good friend of our group and our community. Sandy, how do you see the situation in Central America? We see, especially, I see all these immigrants going through Central America, trying to reach the United States, going through borders. I don’t know how this has an impact in the infrastructure, how these people handle the situation. How do you see the situation in Central America in relation with cybersecurity? How do you see the capacity building in bringing a difference in that region? And thank you very much for being with us today. What time is for you? It must be the middle of the night. Thank you for that.

Sandy Palma:
No, just like Jose, I’m going to speak to you in Spanish because my English is not so good. Yes, it’s 12.40 in the morning, so it’s an honor. But no, don’t worry, I’ve been all these days at the same time. I’m going to speak in Spanish, so you have to translate as well.

Olga Cavalli:
It’s my turn, but did you understand what I said?

Sandy Palma:
Yes, the question, yes? Yes, I understood it, no problem, but I prefer in Spanish. Okay, in Central America, I tell you, we are like in diapers, we are at the capacities, professionally we are very few in the area, as well as at a global level, the reports indicate that there is a great need for professionals specialized in cybersecurity, however, there are very few universities in the region that allow you or have included the subject matter in their curriculum. I don’t know if I stop or continue, right? A little more and then I’ll translate. Okay, in terms of cybersecurity, as you all know, even one of our brother countries, Costa Rica, suffered very strong cyber security attacks at the governmental level, however, it is not the exception, this happens daily in all of Central America, the difference is that they are not made public, this happens at the private level, at the private sector and also at the public level, but since there is no director, there are no policies, there are no laws that talk about the subject matter, so they are not made public and all those affected realize only when the citizen uses a social network to report that he was a victim or his data was violated in a private or public institution. Otherwise, they are not made public, but we do have a big gap to cover in cybersecurity.

Olga Cavalli:
Sandi is saying that the region has a lack of professionals in cybersecurity, which I think, is a problem all around the world, and many professionals from developing economies are moving to being captured perhaps by other countries demanding the capacity of these professionals. They have a high necessity of infrastructure. Few universities have programs to train. And this is something that I want to speak with Claudio in a moment. Few universities have careers focused on cybersecurity. And a country in Central America, Costa Rica, we all know they have really suffered a very, very strong ransomware attack that practically immobilized the government for several days. So she said something very, very interesting that I have been thinking about after I heard something in the school in Campina Grande. Nobody talks about what is happening. The only way that people get to know about attacks is through some citizens explaining that something is happening in social networks. This is something complicated. And someone in the school said something very interesting, that the aviation industry uses all the information of every unfortunate event, like an accident, to improve the security of airplanes. And now we all know that it’s safer to go in an airplane than crossing the street. We all know that. But that is because and thanks to all the information that has been provided and captured after something wrong is happening. So someone said, I cannot recall who said that in the school. And I said, why don’t we find a way to capture all the details of the attacks? Perhaps taking away the name of the institution, or bank, or organization, or country that is being attacked. But using all this information to really try to improve. advance the way to solve or to be resilient. Sorry, I got excited telling a story that I heard in Brazil, Sandy, so now I give you the floor again. I don’t know if you understood what I said, that I found it very interesting from the aviation industry, to capture all the information to improve how to solve attacks. Now the floor is yours.

Sandy Palma:
Okay, well, look, here in the region we have had to be resilient in all sectors, even during the pandemic, we have seen exponential growth in cyberattacks, especially in the academia sector, right? Taking into account that they had to change their way, the way of teaching that they had decades to use, and they had to change it in 30 days, switch to virtualization. And many of these academic centers, from all levels, from preschool to high school, were victims of cyberattacks. So what happened? This did not stop. The universities did not stop, the schools did not stop, but they did have to be resilient in this regard, and start implementing policies, rules and protocols at the internal level. Although our countries do not have a national cyber security strategy, a national cyber security policy, or even the clearest example, if you look at the history of events like this, like the IGF, and look at how many government representatives have registered or have participated in Central America, you will realize that there is only one in the last five years. A single person, representative, decision-maker. I have participated, I have worked in the government sector, but I am not a decision-maker. There are ministers, there are chancellors, there are presidents, and no one has participated. And those who create policies are the government authorities, right? So there is something very important that we have to create awareness. And to achieve this, Olga, it is related to something that you indicated to me in the questions you sent me. What should we do? Well, how are we going to do it? And this cannot be achieved in any other way if we do not create awareness through education, training of public servers, of users, of people. And this is not easy to achieve. As I was saying, the academy has to include in its educational curriculum to talk about cybersecurity, as well as we talk about ethics, mathematics, science. We have to talk about cybersecurity, and cybersecurity is not only hacknetic, but also laws, computer rights, more and more.

Olga Cavalli:
And they had to develop their own internal policies, because some countries in the Central American region, as per what she is explaining, they don’t have a national cybersecurity strategy, or perhaps they don’t have the policies in place, so the different organizations have been organizing themselves in having their own internal policies. And she talks about the lack of participation, perhaps, in this forum of governmental officials, or people that are involved in developing policy, especially from Central America, and the importance of rising awareness and education of public servants, and the lack of activities in the academia. Sandy, can I give the floor now to Claudio, because I want to follow up a question to him in relation to what you have been saying. Is that okay?

Sandy Palma:
Yeah, sure.

Olga Cavalli:
Chris wants to make a comment in between.

Christopher Painter:
Yeah, so it’s interesting, this idea of doing something like the National Transportation Safety Board does for airplanes. in the U.S. And actually this is something I think our Department of Homeland Security, I’m no longer in the government, the Department of Homeland Security, has done is they have this action board to look at major cyber incidents. They have a number of luminaries on it, Jeff Moss, our friend and others, who look at things and try to learn and have reports on it. So it’s still in its infancy, but that’s exactly what they’re trying to do.

Olga Cavalli:
Yes, but what we notice, at least in Argentina, is that in general, who has been attacked doesn’t want to say because of different reasons. Because if it’s a bank, they want to keep their reputation for their customers. They don’t want that the customers go away to other banks because they think that their deposits will disappear. Or if you’re a government or government agency, perhaps you’d…

Christopher Painter:
But that’s been true for like 30 years, right? And I think it’s changing a little bit because now, in certain parts of the world, there are disclosure laws. If there is a breach, they have to disclose it. Securities regulators, like the Securities and Exchange Commission, are saying if you’re a publicly traded company and this is a significant event, you need to disclose it. Europe has laws they’re passing now as part of their package of laws. And I always used to say to companies who didn’t report it, and the same with government, better report it and get it out of the way, and people will understand that you’re on top of it. Then it’d be found out a year and a half later, then you risk more reputational harm, I think. But it’s still a challenge, I agree.

Olga Cavalli:
I think it’s challenging. I think it’s a process that it’s starting to be more transparent. But we still have a kind of a lack of transparency in general to learn from experience. Claudio, Sandy mentioned something that I think is really important, the role of universities. There are few universities that really have a career in cybersecurity. As far as I know, there is one university in Argentina, in Buenos Aires, the Universidad de…What is the name? No.Ok, I forgot No, no, no. Ok, I forgot I cannot remember the name of the university. They have created one career on cyber security. They have a very high demand of students. It’s not virtual yet. It’s still for some demands of the bureaucracy, local bureaucracy of universities, but they plan to go virtual. How do you see the role of universities? Because I’ve been a university teacher for 20 years and I teach these issues to my students but not as part of the formal program. I share with them information, try to motivate them to learn about these things, but it’s not really in the formal program of the career that they do, which is general informatics. How do you see that being someone so much involved in this process and being a university teacher?

Cláudio Lucena:
Thank you very much, Olga. Thanks for the invitation, for the space, and thank you. Good afternoon, everyone. That’s a very good question for which I obviously do not have the answer, I do not have the truth, but I might have a suggestion of a path to follow, and I think it should be based on at least three pillars. The first one is we have, from the academia, we have to acknowledge that the presence of the digital ecosystem is much more different now than it was 33 years ago when Chris started. I think that’s a very good starting point in scale and in nature. I’ll elaborate a little bit on it a bit more. Second, the university has to understand its role in the process and it’s difficult to make universities change. University professors who are here are already starting to laugh. And the third, it should be for universities to understand that traditional approaches, such as courses, curricular reform, as Sandy was mentioning, to us might not be good enough. It might not be enough for the amount of the challenge that we have. On the first point, back in, let’s say, 2005 in Tunis, and when the IGF started, cybersecurity was already an issue. So there were critical infrastructure. There were particular professions that were concerned about it. It was important, but still a niche thing, if we could say so. Fast forward 15 years, and now visiting a temple in Kyoto during the IGF might raise cybersecurity concerns. So it’s not only the scale, it’s the nature. I’ve written a paper during the pandemics that was an initiative from the Latin American office of the Conrad Adenauer Foundation. And we were trying to analyze cybersecurity aspects of what happened after the pandemics in the scenario of Latin America. There was some data that I collected from a friend from the University of Chile that stroke me absolutely. He mentioned that by February in the COVID time, before the COVID, right, before the declaration of the pandemics, 0.6% of the Chilean population had some online activity connected to labor. 0.6% of the Chilean labor force was somehow connected to working online. If he measured then it again in April, three months later, the percentage had risen to 5.6%. And he measured it again in July. The percentage had risen to 18% of the Chilean population doing some kind of regular activity connected to work. It’s not cybersecurity, but it’s attack surface. It’s an aspect of people that had not been online yet. And it’s a personal digital transformation that accelerated a lot. So that is to end this point is to say a lot of our life. It’s not a niche thing. It’s not an aspect. It’s not a fraction of the human lives. Cybersecurity is an embedded aspect, an embedded dimension of everyone’s life that touches, it’s a backyard issue. So I think this consciousness is not obvious to universities. And the second and third points, I think they’re together. And this, I speak a little bit more from a Global South perspective in public universities to be very specific. Because those are institutions that have a different role in the Global South. They have a different outreach. They are able to work on that awareness. And as I say, bringing you numbers, Sandy here brought a deficit of cybersecurity professionals. I have an estimate of around 300,000 professionals that we lack today around that mark. And I can confirm that 300,000 professionals in Brazil only. We do not and we will not fill that gap with regular courses, reforming curricula, formalizing this. For one, because the university simply does not do that. We do not reform curricula overnight or depending on that.

Olga Cavalli:
Takes forever.

Cláudio Lucena:
Yeah. So thinking about other alternatives, but the university and the academia in general and in the Global South, it happens a lot. We have a huge mobilizing power, community engagement. So through other alternatives, we can try to hit one of those aspects. And I can bring you a good practice from my university, Paraíba State University, which is the UAMA, which stands in Portuguese for the Open University to the Elderly. I think it’s something we discussed over the SIG. It’s a program. It’s a formalized program in the university that is directed to the elder, 60 plus people. We include various, the idea of the program is to bring them back to the university and make them do interesting things in life again. So they have language classes. health for their age, human rights notions. And then last year, in the beginning of last year, because they have suffered a lot in their personal process of digital transformation, that was a segment of the population that was hitting hard. So the director of the program asked me, he phoned the law school and said, why can’t we prepare a cybersecurity course for these people, 60 plus? And I thought the idea was just brilliant. And then I thought, looking at stakeholder-wise, and it seems like that for children, we’re very much concerned. They learn how to grow up in this environment. We help them navigate. It’s pretty much taken care of. It’s far from being solved. They’re far from being safe, but it’s pretty much taken care of. For us, we manage, right? We’ll get around, we’ll get around. But it seems that for 60 plus, we have just forgotten them. Just left them on their own. And they do not instinctively act adequately and appropriately. And the results of that first semester of two groups with 30 people was absolutely amazing. How much engaged, how much more aware they were, how much more they were able to defend themselves in this environment. Because then again, and I close here, the cybersecurity dimension that we have to tackle today is not only institutional anymore. It’s not only collective anymore. It’s also on an individual basis. And I think universities have an incredible role that can play in this, provided that they meet these three aspects and understand those three criteria.

Olga Cavalli:
It’s interesting what you mentioned, because where I work in the directory of cybersecurity, we’re promoting some papers that we’re writing. And I did write about old people, because I experienced that with my mom. And she had a Facebook and she used… She died two years ago, but she used a lot of social networks. And she tended to believe that everyone was thinking like her because all the people were her friends. And it was very difficult for me to explain to her that that was not the whole universe of the connected world. And yeah, she was very vulnerable about the information that we received, what she read. And I think that’s a target that it’s totally forgotten. And I agree with you. And so I wrote something about that. So now I will go to my dear friend Mark. He has been so kind to do the translation in the chat of the Zoom room when I was translating into English and Spanish, which is my new profession now. Mark is very active in the GNSO. GNSO is one of the spaces of participation of ICANN. ICANN is the organization that gathers all the different millions of different networks in the world together through some unique identifiers. And one of these unique identifiers is the domain name system. And Mark has been working very actively in a working group about security in the domain name system. So why don’t you share, Mark, with us what is that? And how does it affect the cybersecurity? And what us should know about that and how people can learn about it? And thank you for your participation here.

Mark Datysgeld:
Thank you so much, Olga. It’s a pleasure to be here with everyone. I will try to be that guy that is the bridge between the technical and the normal. So let’s give this a try. So when we talk about the domain name system, we’re talking about pretty much anything that resolves using that system. People don’t think about that. But when you’re using WhatsApp, it is using the DNS. You just don’t see it. So, the Domain Name System actually operates most of the internet as we know it. So, it’s one of the only, one of the few shared resources that we really have in the world, that are truly global. And that’s why caring for its security should be a priority. The problem is, and we have people here in the room who are very active in ICANN as well, who can say I’m wrong or right, but for a long time this was not put as a priority. This was put as something important to be looked into, and certain aspects of security were maintained, but that was on the very, very deep technical level, at the security level of the protocol. So, it’s like, how secure is the technical part of the DNS, right? Is it running smoothly? Can it be tempered with? That was the concern for a long time. But, as we see an increasing amount of cyber attacks, different types of initiatives that really seek to harm users around the world, then we had to expand the conversation a little bit. Who are the actors who are using the DNS to do things that are simply not secure, that simply do not fulfill the mission of the DNS, which is being reliable, secure and available for all? And there are some cases in which we arrived at that simply do not have a positive use. So, the operation of a botnet, there are no good botnets out there. There’s nobody doing charitable, nice things with a botnet. It’s always criminals and always of the worst kind as well, might I add. So, why are we allowing these people to make use of the system that is a global good, to leverage this for their attacks, right? That was the sort of question that started this working group, this process that I chaired. And the reality is that there are a few categories. of questions that we arrived at, that we believe are not good uses of the DNS. And as a working group, we recommended that to the people who run the systems of the DNS. So we’re talking here about the registrars and registries, which are basically the people who either have custody over a certain suffix, like say .ninja, or they sell those domain names using that suffix. And we approached them and said, you know, we think that in this very specific, very narrow use cases, this cannot go on. So we settled into a list that is basically botnets. So for those who don’t know, it’s basically leveraging machines from around the world to carry out a concerted attack or to carry out a disruption in mass. So phishing, which is sites that impersonate another institution or another organization and use that to steal credentials from users. Malware distribution, so it’s sites that only exist to perpetuate malware. So there is no other use for that domain name other than spreading a virus or an attack or being a bridge for an attack. There’s nothing else there other than that. And farming, which is when a website only exists to collect information of users for malicious purposes. There’s also an addition to that, which is spam. But when I mention spam, you shouldn’t really think about it that way because it’s spam as a vector to the things that I said before. It’s very specific, right? So this is not about fighting spam, which might have legitimate users. It’s about fighting spam that leads a user to a malware website. And this has been presented to these operators, and so far what we think is that they agree with us that this is something that would be desirable. that it would be better for the Internet if they adopted these changes to block these specific use cases. So, the term that we use is DNS abuse, but if we are to be very, very accurate, it’s technical DNS abuse. We’re talking intellectual property infringements, anything that has to do with honor or anything like that, anything that’s content is not going to be touched upon by that because ICANN has a technical mission. What we’re trying to fight is some forms, this is not even all forms, right, we didn’t actually arrive at all forms, but we arrived at some forms that malicious people used to leverage the DNS in a negative way, and we are now in very deep into the negotiation of this being a standard. For the entire world, no. So, it is for generic names. The country codes, they operate under their own rules. We hope that some of them adopt this or want to talk to us about this or think that this is a good idea, but this is each nation’s prerogative. So, our expectation is that within the next year or so, this will come to be, these new rules will come to be, and with that, we’ll be able to add a little bit extra security to the Internet. It’s not even like the tip of the iceberg, but we are hoping that at least we can show that we are actually looking into this, that this is not a known issue and that we understand that there are very, very bad criminals leveraging this public resource for things that it should not be used for. So, that’s the general idea. If anybody is more interested in this, I can offer more technical material, but this is the overview, sort of. So, thank you very much for your attention.

Olga Cavalli:
Marc, this is an issue of operators only or global cities, individuals can have a say or do something? to prevent that? Can I do something against the DNS abuse or just have to suffer it and hope that my operator or my registrar do something about it? How do you think?

Mark Datysgeld:
So as part of this, that’s actually a very good question, as part of this agreement, we’re also upping the requirements for what these operators need to include in their contact forms. Before it was very much like whatever you want, right? They needed to have some form of reporting available on their website. So you go to a big registrar, I’m not gonna cite names, but like a big registrar that sells a lot of domain names, right? And you have identified that they are the ones operating a malicious domain name. Right now, if you go there, you don’t, it’s not very clear where you can report something, but that’s gonna be standardized. It’s gonna go into their contracts that they need to have something that’s actually, the user can get there and say, hey, I noticed that this website is a phishing operation. It’s copying this website, I have the proof, here are the elements, here’s the proof of this, here are the comparisons, and this will enable people who are looking into the system to verify. That’s not an automated thing, it’s never gonna be that. It’s literally a way for you to communicate with these operators very directly. At the end of the day, it’s still their call, but we are making an effort so that people actually can report this thing. So supposing your business was cloned and you’re currently suffering an attack from that, now you can report that at the international level, which, you know, I think it’s a big win. But, you know, opinions may diverge, but still, I consider it a win.

Olga Cavalli:
That’s an event that we usually see in the national CSIRT and people having problems with domains. Okay, we have like eight minutes, any comments, questions from the audience? Yes, there’s a mic there, can you go to the mic? And can you tell us your name and where you’re from?

Audience:
Thank you. My name is James. Oh, no. My name is James. I’m from Cameroon. So my question go to- Chris, our star. The man in the middle. So quite frankly, I’d like to understand the difference between digital diplomacy and cyber diplomacy.

Olga Cavalli:
Oh, that’s a- Thank you very much. Slight difference, eh? I’ll take all the questions first. Yeah, please. Yeah, we don’t have much time.

Audience:
Hi, everyone. Good afternoon. My name is Paloma. I’m from northeast of Brazil. I would like to congratulate the panel. These speeches were wonderful and necessary, of course. Then my question, especially taking Cloud’s speech about the digitalization of personal life and the attack on individual base. And your speech, I forgot your name, sorry. When you told us that everybody’s using DNS, while we are using WhatsApp, but most people don’t see it, or about phishing cases, something like that. Well, it become clear that cyberspace is an intrinsic part of the development of any country. A strong cyber capacity is crucial for states to progress and develop in economic, political, and social spheres. The need to integrate cyber capacity building and development policies has been documented by the academia and the policy makers. And the other sectors from society. The investment in securing cyberspace affects the success rate or other policy initiative as well. However, there is a clear need for a deeper dialogue with the development community and received countries in order to better to understand how to implement cyber capacities in practice in order to achieve broader development goals. So to stimulate the debate on cyber capacity building and its impacts on social and economic development worldwide, I’d like to understand your opinion about the contribution of digital education to this issue. Since digital education involves not only learning how to use platforms and tools, but also involves a critical and reflective use of the internet and its possibilities and is capable of, in long term of course, preparing a society for life in a cybernet context. And I’m including this topic at the debate because I think that it’s a thing, it’s something really important when we are talking about administrative risk or better, we are talking about to define what kind of risk I’m able to support and to know that I need to understand which are the risks and the impacts in my society, business or whatever. I don’t know if I made myself clear, but that’s my question, contribution to the panel. Thank you.

Olga Cavalli:
We have like four minutes, so you can take all the questions.

Audience:
Okay, my name is James Ndolufuyi from Abuja, Nigeria. I have a comment and then a question. First to Chris, on the issue of connecting cyber security to development. Last year, UNECA sponsored a research program which was released at the IGF in Ethiopia. Chris, you were there and I had the privilege of actually conducting that research. I was able to really measure it, measure maturity, cyber security maturity to development as a way of persuading leadership, policy makers to see the connection. In that study, a 10% increase in cyber security maturity could yield between 0.66% and 5.4% increase in GDP per capita. And that used data from Africa, Asia and Latin America. So it’s available on the website, at least some of the data is available on the website www.cd4ir.africa. So you can check it there. The secondly, where is Mark? Okay, the question is for Mark.

Olga Cavalli:
He’s trying to get more minutes for us.

Audience:
Okay.

Olga Cavalli:
It’s very, very important.

Audience:
Okay, Mark talked about DNS with WhatsApp. I want him to expand it further because there is what we call the OTT. The number of this OTT don’t really need to depend on the root system. So I want to expand it on what you mean by even using WhatsApp. You know, there are a lot of OTT over the top application. Thank you. Good afternoon, everyone. I’m Christine Mujimba. I work with a regulator, communications regulator in Uganda. And we operate as SART there for the communication sector. So information sharing indeed is like Olga said, there’s reputational risk. And so especially the financial sector tends to keep it back. But what we have done is to have an awareness of the CEOs of companies so that they don’t see this as a technical issue. And they begin to invest in it. But I’m curious to know about investment in tools. We are talking about capacity building, but we need the eyes to know what’s happening. And that is really very, very expensive. And in developing countries, or emerging economies like we are talking, it cannot be, it’s not affordable and sustainable. So I’d like to hear from the panelists what is being done in that area. The other, when Mark mentioned, and I appreciate the issue of botnets and them only being malicious, but I know that there are use cases of AI in terms of the cyber intelligence. So where is the balancing act when they are deployed for those purposes? Especially since you said you have a list. I don’t know if it’s a black list or a white list. And then lastly, on the cyber certification, again, this is very expensive, and yes, there’s a deficit of cyber security experts. So what level are you looking at? Just the basics like how you’re taught as a child to look left, right, left, right before you cross the road, not to share your pin, things like that. Is it at that level, like with the elderly, or is it at a higher level? Thank you.

Olga Cavalli:
Okay, we have running out of time. I’m so sorry. Next year, I will book one hour and a half. I promise. My proposal is that we find a moment outside. Do you have five more minutes? Maybe you can respond quickly, and then we have to cut off the queue. I’m so sorry for that.

Christopher Painter:
Those were all great questions. Digital diplomacy and cyber diplomacy, they’re similar. I think digital diplomacy has often been the economic aspects and telecommunications, where cyber was the larger cyber security, geopolitical issues, but I think they’re merging. I think that I’d say that. I think the question about, I agree, bringing the development community and the cyber community together is critically important, and that’s what our conference in Ghana is trying to do, and a lot of our efforts are trying to do. I thank you on the GDP issue. I think that’s an important one that shows actual impact of this work, and I think that helps drive decision maker and money and funding, which is scarce, so that’s really good. So those are the ones I’ll quickly comment on. There’s many others. I wish I had more time, sorry.

Mark Datysgeld:
Yeah, very quickly, I’ll go back to my comment. This is something that I always mention when I’m giving classes. People think that the DNS only works when you have an URL on your address bar, so that’s where the DNS exists, and you go, you type, and that’s the DNS, but the DNS operates when you find something on a search engine. The DNS exists when you’re operating any app, pretty much, because they use DNS routing to actually function, so these protocols, they exist everywhere. It doesn’t matter if you’re using it through an app, if you’re using it on your microwave, or whatever you’re using, and we don’t do enough to explain this to users, so they think that this is a very specific thing. Oh, it’s about having a domain name. It’s not that. It’s an entire system that sort of runs the internet, so people can’t appreciate the importance of it because they don’t understand that it’s not just owning your name, dots, anything. Thank you.

Olga Cavalli:
Okay, big applause to everyone. Thank you, Chris. Thank you, Mark. Thank you, Claudio. Gracias, Jose. Gracias, Sandy. Muchas gracias a todos. I promise next time I will book more time. Thank you so much, Chris.

Audience:
I’m here all week, so I’ll see you guys around. Great meeting you. Congrats. Great meeting you too. Thanks a lot. Thank you.

Audience

Speech speed

166 words per minute

Speech length

1042 words

Speech time

378 secs

Christopher Painter

Speech speed

214 words per minute

Speech length

1851 words

Speech time

520 secs

Cláudio Lucena

Speech speed

172 words per minute

Speech length

1180 words

Speech time

411 secs

José Cepeda

Speech speed

154 words per minute

Speech length

943 words

Speech time

367 secs

Mark Datysgeld

Speech speed

182 words per minute

Speech length

1576 words

Speech time

520 secs

Olga Cavalli

Speech speed

168 words per minute

Speech length

3162 words

Speech time

1132 secs

Sandy Palma

Speech speed

158 words per minute

Speech length

716 words

Speech time

273 secs

Digital Inclusion Through a Multilingual Internet | IGF 2023 WS #297

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Ram Mohan

The topic of Universal Acceptance is not solely a technical issue but a human one that requires inclusivity to create a truly inclusive internet society. Users often face difficulties when their email addresses or domain names are not recognized as valid by certain systems. This problem is more about inclusivity than purely technical.

The next generation, known as digital natives, should be able to communicate and interact with names and systems in their native languages. Language should not be a barrier when it comes to converting email addresses and website addresses into hyperlinks. Regardless of the language script they are represented in, they should universally convert into hyperlinks. This would enhance usability and accessibility for users from different languages and cultures.

A failure in universal acceptance forces organizations to resort to inferior systems to represent themselves. If a company or organization’s name fails to convert into a hyperlink due to the language script, they are excluded from the digital ecosystem. This limitation hampers their online visibility and reduces their ability to communicate effectively with others in the global digital space.

Ram Mohan, a prominent figure, regards websites, domain names, and email addresses as communication tools between human beings rather than just identifiers. This perspective highlights the importance of Universal Acceptance in enabling effective and inclusive communication among individuals worldwide. It stresses the need to prioritize inclusivity and accessibility in the digital realm.

While the core technical challenges of Universal Acceptance and multilingualism have been mostly resolved, the main issue lies in policy coordination and incentives. The problem itself is relatively small compared to larger issues that organizations and technical firms have to deal with. Therefore, the focus should shift towards policy-based initiatives and economic incentives that can drive progress towards universal acceptance.

Policy-driven incentives, such as vendor preference for demonstrating universal acceptance in governmental procurement, can play a crucial role in prioritising universal acceptance. By creating impetus for businesses and organizations to prioritize inclusivity in their digital presence, policy-driven incentives can help promote universal acceptance on a broader scale.

The dialogue surrounding Universal Acceptance should also be simplified to make it more accessible and inclusive. Rather than using technical jargon, terms like digital accessibility and inclusion should be used to effectively communicate the importance of this issue to internet users. The satisfaction of users’ needs and preferences should be the central focus of discussions regarding Universal Acceptance.

In conclusion, Universal Acceptance is not just a technical matter but a human one that requires inclusivity and prioritising the needs of internet users. It involves enabling communication and interaction in native languages, converting addresses into hyperlinks regardless of the language script, and promoting accessibility and inclusion in the digital realm. While technical challenges have been largely resolved, policy coordination and incentives are vital to driving progress in achieving universal acceptance. By simplifying the dialogue and focusing on policy-based initiatives, a more inclusive and accessible internet can be created for all.

Edmon Chung

The analysis emphasises the importance of universal acceptance for digital inclusion and the development of a multilingual internet. It reveals that internet suppliers lack awareness of the impact of their actions on internet accessibility, resulting in partial support for internationalised domain names and email addresses. This limited support hinders users from fully utilising the internet in languages other than English, which inhibits digital inclusion and denies individuals the opportunity to access the internet in their native languages.

A multilingual internet is both a matter of language justice and a means to improve internet safety. Understanding the sender’s email address aids in identifying spam and scams, while multilingual email addresses facilitate better comprehension of sender details. Consequently, a multilingual internet provides a safer online experience for users.

While some argue that domain names and email addresses are becoming less relevant in cybersecurity, the analysis highlights their continued importance. Direct navigation on the internet still relies on domain names, and email addresses are critical in cybersecurity training. Elderly individuals are trained to verify the sender’s email address before taking any action, emphasising the ongoing significance of these elements in online security.

However, the analysis reveals that Internet Domain Names (IDNs) are not being efficiently or correctly utilised, causing them to be devalued and act as second-class citizens on the internet. Problems, such as the inadequate readiness of email and web hosting for IDNs, contribute to their underutilisation. This highlights the need for greater awareness and implementation of IDNs to fully realise their potential for achieving a multilingual internet.

While the technical groundwork for universal acceptance has been established, the analysis highlights challenges in implementing and adopting it in the market. While protocols exist at a low technical level, convincing the technical community of the importance of universal acceptance remains a hurdle. Market forces alone are not enough, and the lack of a smooth user experience creates a chicken and egg problem.

The analysis also highlights the need for policy interventions to motivate suppliers to support universal acceptance. Existing policies enable internationalised email addresses and domain names, but increased motivation is required for full implementation. Issues with the ease of use for multilingual email addresses further underscore the need for policy interventions to foster support.

In promoting local languages via domains, the analysis emphasises that the importance of community or culture should outweigh obstacles such as keyboard strokes and input complexity. Chinese and Japanese individuals continue to search in their native languages, even with the need for additional keyboard strokes. The popularity of single-character Chinese domain names, representing a word with just two to three strokes, demonstrates the value placed on promoting local languages in internet domain names.

Furthermore, the analysis notes that promoting local languages via domains aligns with the international decade of indigenous languages and the sustainable development goals supporting local culture. It asserts that choice should not be limited to ASCII domains but should include local names as options.

The importance of community empowerment and co-creation in building internet infrastructure and a multilingual internet is also emphasised. Community networks play a vital role in developing infrastructure that caters to the needs of the communities themselves. Community networks also contribute to making local languages more prevalent in the internet space. Thus, empowering community networks is seen as a valuable model for building internet infrastructure and fostering a multilingual internet.

In conclusion, the analysis underscores the significance of universal acceptance for digital inclusion and the development of a multilingual internet. Awareness among internet suppliers, efficient utilisation of Internet Domain Names (IDNs), and policy interventions are key factors in achieving universal acceptance. Overcoming obstacles such as keyboard strokes and input complexity is important for promoting local languages via domains. Community empowerment and co-creation offer valuable models for building internet infrastructure and encouraging a multilingual internet.

Susan Chalmers

The discussions centered on the significance of connectivity and digital inclusivity in native languages. The Tribal Broadband Connectivity Program emerged as a key initiative, allocating a substantial budget of $3 billion to enhance internet access in Native American tribal lands. As a part of this program, funding is provided for remote educational activities aimed at preserving indigenous languages, thus connecting tribal language and cultural resources to the internet. This initiative has been received positively, with its focus on addressing the digital divide and promoting inclusivity.

Another important aspect highlighted was the promotion of universal acceptance, which is vital for the development of a multilingual internet. Universal acceptance refers to a technical standard that enables domain names and email addresses to function in non-Latin scripts. This standard plays a significant role in bridging the language barrier and ensuring equal access to online resources for all language communities. Its promotion is considered a foundational element for a truly multilingual internet, contributing to reduced inequalities.

While efforts have been made for language acceptance, it is observed that many communities have adapted to the limited capabilities of the ASCII-only system. However, the ultimate objective remains to offer internet access to everyone in their own language and script. This highlights the importance of overcoming linguistic barriers and providing equal digital opportunities for all individuals.

Though the technical groundwork for universal acceptance has been completed, challenges in coordination and policy implementation persist. The coordination among stakeholders and the formulation of effective policies are essential to ensure the practical implementation of universal acceptance standards. The need for government intervention and policy changes to overcome these challenges and promote internet access in native languages was emphasized. The involvement of governments is crucial in creating a conducive environment for the development and adoption of policies that ensure language inclusivity online. It is important for this issue to gain visibility and propel governments to take the necessary actions.

In conclusion, the discussions shed light on the significance of connectivity and digital inclusivity in native languages. The Tribal Broadband Connectivity Program and the promotion of universal acceptance emerged as key initiatives to address this issue. Challenges remain in terms of coordination, policy, and implementation, for which government intervention is seen as crucial. Overcoming these barriers will contribute to reducing inequalities and ensuring that internet access is available in individuals’ own languages and scripts.

Speaker

The internet has the potential to significantly support local languages, particularly in Italy, where several unrecognized languages such as Furlan, Sardo, and Arberesh exist. These languages often struggle for recognition and preservation, but the internet can provide a platform for their promotion. By utilizing this powerful tool, local communities can distribute information, resources, and cultural content in their native languages, helping to preserve their linguistic heritage.

One of the key advantages of using the internet to support local languages is its ability to overcome geographical barriers. Through the internet, speakers of these languages can connect and communicate with each other, regardless of their physical distance. They have the opportunity to share their experiences, educate others about their languages and cultures, and build a sense of community.

Furthermore, the internet allows for widespread distribution of information in local languages. This ensures that speakers of these languages have access to essential resources, educational materials, and news in their native tongue. It empowers local communities by enabling them to develop and share content that reflects their unique perspectives and experiences.

In addition to the role of the internet, government and community support are crucial for the promotion and preservation of local languages. Without the active involvement and support of both entities, promoting these languages would be challenging, if not impossible. Governments can play a significant role by implementing policies that recognize and protect local languages, allocating resources for language revitalization initiatives, and encouraging their use in official capacities.

Similarly, community engagement is vital in raising awareness about the importance of local languages and fostering a sense of pride and ownership among speakers. When communities actively participate in the promotion of these languages, they contribute to preserving cultural diversity. Local languages embody the traditions, values, and cultural heritage of a community, and by supporting these languages, communities can safeguard their identity and promote intercultural dialogue.

Promoting local languages aligns with the Sustainable Development Goals (SDGs). Specifically, SDG 4 (Quality Education) aims to ensure inclusive and equitable quality education for all, including opportunities for lifelong learning in local languages. Additionally, SDG 16 (Peace, Justice, and Strong Institutions) emphasizes the importance of preserving cultural diversity and embracing linguistic rights as part of building peaceful and inclusive societies.

In conclusion, the internet can serve as a powerful tool in supporting local languages, helping to overcome barriers and distribute information in these often unrecognized languages. However, the success of promoting and preserving local languages depends on the active involvement of governments and communities. By recognizing the value of local languages and supporting their use, communities can preserve their cultural diversity and contribute to the achievement of SDGs related to education and peaceful societies.

Akinori MAEMURA

The summary has been reviewed and edited for grammar errors, sentence formation issues, typos, and missing details. UK spelling and grammar have also been corrected. The expanded summary accurately reflects the main analysis text while incorporating long-tail keywords where appropriate.

The importance of digital inclusion and universal acceptance of native languages on the internet has been emphasised by multiple speakers. In the past, using the internet in languages other than English posed difficulties due to character handling issues. However, advancements in computer systems have addressed these challenges, enabling users to access the internet in their own language. This development is seen as vital for overcoming the barrier of using the internet in native languages.

Furthermore, the inclusion of everyone on the internet is considered crucial because English is not universally understood. The preference for ASCII characters as identifiers is due to their simplicity, but it limits the ability to communicate effectively across diverse languages. Therefore, the usage of native languages is needed to ensure equal access to information and services on the internet. The speakers argue that platforms capable of handling multilingual input should be developed, highlighting the importance of universal acceptance.

Akinori Maemura, an advocate for digital inclusion, emphasises the need for a multi-stakeholder approach to implement this inclusivity. He believes that every stakeholder, including communities, platform vendors, and public policy, should play a part in making the digital platforms ready for multilinguals, Internationalized Domain Names (IDNs), and universal acceptance. Maemura also highlights the role of public policy in encouraging user systems to move towards universal acceptance. He suggests that public policy can serve as a catalyst for progress in achieving equal access to the internet.

The analysis reveals a consensus among the speakers regarding the significance of language inclusivity on the internet. They argue that overcoming language barriers is essential for ensuring equal access to information, opportunities, and services for everyone. By developing platforms that can handle multilingual input, and with the collective efforts of all stakeholders, digital inclusion and universal acceptance can be achieved. This would enable individuals to utilise the internet in their own language, removing the barriers that limit participation and access.

Theresa Swinehart

The discussion focuses on the importance of inclusivity and the use of any language on the internet. Around 5.4 billion people worldwide, from different cultures and languages, are affected by this issue. However, approximately 2.6 billion people have never had internet access, potentially due to limited access or language barriers. This highlights the urgent need for universal acceptance, which allows the use of domain names in any chosen language. It is worth noting that there are approximately 6,500 languages spoken globally, with a significant number in Asia, Africa, and the Pacific. Major languages like Chinese, Hindi, and Arabic also play a crucial role.

The multilingual internet not only has economic benefits but also societal advantages, such as preserving languages and promoting understanding of diverse cultures. Asia, Africa, the Pacific, the Americas, and Europe collectively have a wide range of languages, with approximately 2,300 languages in Asia, 2,100 in Africa, 1,300 in the Pacific, 1,000 in the Americas, and about 280 in Europe.

The Internet Corporation for Assigned Names and Numbers (ICANN) is committed to advancing universal acceptance. Its efforts include expanding top-level domain names to include more languages and scripts. ICANN supports Universal Acceptance Day and plans for the next round of top-level domains, creating opportunities for applications in various languages and scripts. These initiatives contribute significantly to a more inclusive and accessible internet.

User demand, awareness, and education are crucial for a seamless online experience. Understanding and studying user demands can improve user satisfaction. Similarly, incorporating queries when setting up new devices can increase user awareness. These elements contribute to the overall user experience and help individuals navigate the online world more effectively.

The establishment of Universal Acceptance Day and the development of policies targeting internationalized domain name elements have received significant support. Universal Acceptance Day has seen high levels of participation, while guidelines for applications for internationalized domain names are still being developed. These efforts aim to create a more inclusive and globally connected internet.

In summary, the discussion highlights the need for inclusivity and the unrestricted use of any language on the internet. Efforts such as universal acceptance, promoting multilingualism, and policies supporting internationalized domain names are important for bridging the digital divide and creating a more equitable and accessible online world. By valuing and embracing linguistic and cultural diversity, we can foster understanding, cultural preservation, and economic growth on a global scale.

Dawit Bekele

Access to the internet is considered a critical need in today’s world, as essential activities such as government services, education, and work increasingly move online. However, it is concerning that more than a third of the global population still lacks access to the internet. This lack of connectivity is particularly pronounced in Africa, where the cost of connectivity serves as a major barrier to online education and meaningful digital participation. In many regions of Africa, the high cost of internet access hinders people from engaging in vital activities like online learning.

Despite these challenges, there has been significant progress in connecting more people to the internet worldwide. Efforts have been made to bridge the digital divide and improve internet accessibility. However, there are still considerable inequalities to address. It is crucial for the global community to work together to tackle digital inequality and ensure that access to the internet is affordable and safe for everyone.

Language barriers further contribute to the digital divide, as certain languages lack suitable digital content and representation on the internet. The digital divide often aligns with linguistic lines and socioeconomic pressures, leading to limited access to internet content in certain languages. Additionally, the lack of devices or platforms that support specific languages can further hamper internet usage. Furthermore, the lack of digital literacy in poorer communities prevents their languages from being fairly represented online.

However, there is hope for creating a fairer internet for all languages through technological advances and focused efforts from stakeholders. For instance, advancements in automatic translation and AI interpretation are making it possible to access content in different languages. Localization, which involves adapting digital content to specific languages and cultures, is being taken more seriously by tech companies, governments, and service providers. Additionally, community networks are emerging as a technological solution to provide connectivity even in remote areas.

An important aspect in addressing language barriers and promoting inclusivity is empowering communities to have control over their languages and how they are used. Currently, tech companies often decide which languages are allowed on their platforms, stifling community decision-making. Communities should have the autonomy to determine how they can use their languages and have more influence in shaping the digital landscape.

Overall, internet access is critical in the modern world. While progress has been made in connecting more people online, there are still significant challenges to overcome, such as the cost of connectivity, digital inequality, and language barriers. By working together and harnessing technological advancements, a fairer internet that is accessible to all languages can be created. Empowering communities to have decision-making power over their languages is also crucial for promoting inclusivity and giving voice to diverse linguistic communities.

Audience

In the analysis, the speakers explored several topics related to the internet. One topic discussed was the relevance of domain names in the context of social media. The speakers questioned the importance of domain names, particularly internationalised domain names (IDNs), in diversifying and making the internet multilingual, given the rise of social media platforms like Facebook and Twitter where domain names are not typically used for identification. They raised the question of whether domain names are still crucial or if they have become less relevant in the age of social media.

Another topic addressed was the impact of content moderation on non-European languages. The speakers noted that while platforms like Facebook have content moderation in around 75 languages, people use these platforms in over 1000 different languages. The lack of content moderation and functional support for smaller languages on the open internet can drive users towards platforms like Facebook, where content moderation may be available in their language. The speakers highlighted the example of Myanmar, where Facebook has become a stand-in for the internet due to its dominance and lack of alternatives.

The linguistic fitness of input methods for internationalised domain names (IDNs) was another point of discussion. One audience member argued that the lack of demand for IDNs could be attributed to the linguistic fitness of input methods. They compared the ease of typing a country code on a keyboard (requiring only three button presses) to using the native language, which could potentially require a dozen button presses. This argument suggested that users will always opt for the shorter and easier option. However, another audience member believed that the introduction of voice or brain input methods could potentially encourage the use of IDNs.

The need for a multilingual and decentralised internet was also emphasised. The speakers argued that the internet should cater to multiple languages and be decentralised to address language and cultural diversity. They highlighted the importance of community networks in creating proper infrastructure and the constraints imposed by current technical and policy limitations on local server and email hosting. They also pointed out that big tech’s protocols and configurations, such as Gmail’s, can pose challenges. To achieve a multilingual internet, they suggested practical measures like facilitating local servers and updating protocols to accommodate diversity.

Convention and iconography were discussed as valuable tools in accessing the internet. Iconography was seen as an entry point or a way to get started, similar to knowing which side of the car the petrol tank is on. The speakers emphasised that established conventions and iconography can aid users in navigating the internet.

The speakers also highlighted the significance of domain names and the Domain Name System (DNS) in language and cultural preservation. They gave the example of “.cat,” a domain name for Catalonia, where the requirement for Catalan content on linked websites led to a significant growth of Catalan content. They argued that domain names and DNS play a crucial role in preserving languages and cultures.

However, there were also observations made that caution against overly relying on the domain name system to solve the context problem of language. The scalability of using domain names to address language context was questioned, and other factors such as identity management were suggested as alternative considerations. Additionally, it was suggested that examining the DNS infrastructure itself for solutions to language-related challenges has been lacking.

In conclusion, the speakers in the analysis touched upon various aspects of the internet, including the relevance of domain names in the age of social media, the impact of content moderation on non-European languages, the linguistic fitness of input methods for internationalised domain names, the need for a multilingual and decentralised internet, the value of convention and iconography, and the role of domain names and DNS in language and cultural preservation. They presented different arguments and perspectives, raising important questions, and proposing practical measures for a more inclusive and diverse internet.

Session transcript

Susan Chalmers:
Doreen Bogdan-Martin, initiatives like that are helping us form the partnerships and mobilize the resources to connect the unconnected around the world. But we know that connectivity and access is just the baseline. We must both establish connectivity and make that connectivity meaningful. Our ultimate goal is to help people thrive online. And that comes to our topic today, which is making sure that people have the ability to use the Internet in their own language. Everyone online deserves access to a digital sphere that is diverse and inclusive and serves their needs. At NTIA, we have some experience now with language and connectivity. Most recently in our Tribal Access Program, our Tribal Broadband Connectivity Program, the program dedicates $3 billion to improving access and adoption on Native American tribal lands. An important part of this program that’s been really interesting for us is that we’re funding remote educational activities, and that includes work to preserve indigenous languages. This is crucial. In the U.S., there are 245 indigenous languages. Sixty-five of them are already extinct. And 75 of them are considered near extinction, with only a few mostly elder speakers left. And our program awardees in this grant program are connecting their tribal language and culture resources to the Internet and digitizing tribal language materials. For example, we’re funding a tribe, the Karuk Tribe in California, that’s offering online classes in Native American learning and traditional skills. We’re doing something similar in Hawaii, where we’ve got a grant for a community that’s hiring Native Hawaiian language specialists to collect and translate and record public records and stories. and put them online where appropriate. In short, what we’re trying to do with this tribal program is to connect Native communities to the internet in the languages that they speak and ensuring that they can engage with the internet in those languages. You know, a lot of times people think this is about making sure that these communities get access to the resources that the internet offers. But one thing that I think we’ve also seen is this is about sharing their culture and their local knowledge with the rest of the world. So this isn’t just about these communities somehow being able to access. It’s also about all of us being able to understand and access their culture. And that’s been incredibly meaningful in this program. So to conclude, I’ll just say we believe that every community deserves this same opportunity to meaningfully connect. Our experience has shown that connectivity to the internet becomes much more rich and meaningful when you can connect in your own language. And while progress has been made, as we know and we’re going to talk about today, the internet is far from multilingual. But together we can change that. And particularly coordination around the promotion of universal acceptance, the technical foundation for a multilingual internet is going to be a critical tool. And universal acceptance is a technical standard that enables domain names and email addresses to function in non-Latin scripts. Promoting it is going to be a foundational element. It is a foundational element of a multilingual internet. So it’s very exciting to be able to participate in this roundtable alongside some of the subject matter experts and institutions who are focused on driving universal acceptance forward. Thank you all for being here. And I’m going to turn it back over to Susan. She can introduce the next speaker. And I will say to the folks in the room, I apologize. I’m going to have to leave shortly. But it is wonderful to be here. And we really appreciate this work together. Thank you. Thank you so much. So I would like to turn next to Ram Mohan, who we had sketched. Oh, online? OK. May we unmute Ram Mohan, who is joining us online. Ram was going to speak to the background and give some context to the evolution of the subject matter of universal acceptance. Susan, thank you so much. I hope you can hear me. Yes, indeed. Hi, Ram.

Ram Mohan:
OK, wonderful. Thank you, and sorry about the technical troubles. Secretary Davidson, thank you for your comments as well. So universal acceptance, if you look at that as a general topic, the way it has been introduced so far, most people think of it as a technology topic, as something that we think of as how to make domain names interact with the domain name system. In reality, however, this is a human problem, and this is really a human topic. How do you make systems, computers, and the way we communicate, how do we make various communication systems interact with each other? You know, I think it is quite remarkable that if you type in your email address to register for a website, that email address sometimes will work, many times it doesn’t. The reason why it doesn’t is not because the email address is wrong or is incorrectly formatted. It’s because somebody somewhere decided that the last part of the email address, the one that ends in .jp or the one that ends in .us, if it is a domain name or an identity, for example, that is the one that I work for, which ends in .digital, somebody decides .digital is not valid and therefore you cannot actually use these systems. So if you look at the, that really is universal acceptance. How do you make all names that are valid on the internet? How do you make them interoperable and work with each other? But there is one level above that, which is the issue of inclusivity. If you have names that don’t interact with each other, if you have systems that don’t work with each other, how can you genuinely say that we are building a internet and a human society that includes all digital natives? And that, ladies and gentlemen, is really the next generation. Everybody who is in the room has learned about the internet, but everybody who is being born today and who’s going to school today, the internet is just a native digital thing for them. How do we make sure that those who have a digitally native Japanese address, a digitally native Arabic address, how do we make sure that they all work and interact together? The solution to that is not technical. The solution to that is that we have to be inclusive. that is something that all of us have to work together to build policy and other governance systems that encourage the universal acceptance of names.

Susan Chalmers:
Thank you, Ram. That was excellent. I really appreciated how you tied all of this together. And just to note that Ram is the chief strategy officer at Identity Digital. My apologies, Ram. I should have introduced you beforehand. I think next we may turn to our colleague, Dawit Bekele, who is the regional vice president, Africa Internet Society. Dawit, are you able to join us? Yes.

Dawit Bekele:
Can you hear me? Yes, we can indeed. I’m sorry. I’m joining from my phone. So I apologize if the sound and picture is not very good. Thank you, Suzanne, for inviting me for this meeting, which I believe is very important. Good afternoon, good morning, everyone. It’s a great pleasure for me to talk about an issue that is very important for me, since I speak one of the languages that are not considered as very prominent on the internet. I believe that access to the internet is a critical need, if not a human right, in today’s world. Long gone are the days where the internet was a nice-to-have tool. It is a must-have tool for almost anyone around the world, since many things that we used to do online, offline, like government services, education, work, are moving online in unprecedented speeds like all around the world. But too many people, more than a third of the world’s population don’t have access to the Internet. Almost equally worrying, too many people amongst the so-called connected don’t have meaningful connectivity. According to the ITU, meaningful connectivity is a level of connectivity that allows users to have a safe, satisfying, enriching, and productive online experience at an affordable cost. For example, in many places in Africa, the cost of connectivity is so high that many people cannot afford to use it for important activities such as learning online. Of course, if the content you want to access is not in a language that you don’t, you understand, your connectivity is meaningless. The world has made great progress on connecting more and more people in the last decades, which is encouraging. We should all work together to connect the unconnected, including those that live in remote areas, in disadvantaged communities like the indigenous people that Mr. Davidson was talking about, that are not interesting for commercial operators. But we should also work to give everyone on this planet meaningful connectivity, that is an Internet access that is affordable, safe, and that she or he can use to improve her or his life. Thank you. Thank you so much, Dawit. Now to continue our opening remarks, I would like to turn to Edmund Chung, Chief Executive Officer of .Asia and ICANN board member. Over to you, Edmund.

Edmon Chung:
Thank you, Susan. This is a topic that is very dear to my heart, for those of you who know me. This is a topic that has been championing for the last 25 years. Why is it taking so long? Well, let’s talk about that. And building off from, I guess, what Secretary Davidson mentioned, as I guess really a very important part, which is that the universal acceptance really is a foundation towards digital inclusion. And to impact that a little bit, a foundation towards digital inclusion is a fully multilingual internet. And universal acceptance makes a fully multilingual internet. And today, what is still, I find startling, is that almost 60% of the internet’s content is still in English. And that doesn’t reflect the real world. There are almost 7,000 languages around the world. Many of them are here in Asia, where we are. And really, a multilingual internet is essential for trying to bring the next billion to come online. Because that is the group of people, those are the people where English is definitely not a first language. And in fact, they might not know English very well. So for the next billion to really be able to meaningfully come online, internationalized domain names and the universal acceptance of them is really a foundation towards that. One of the things that I often talk about is that this is, actually building on what Ram said, is that we have gone beyond the technical items. In fact, in the last 25 years, that’s why it took so long. For the first 10, 12 years, we were struggling with, well, not struggling with… struggling and really working hard to build the technology that allows internationalized domain names and email addresses to work on the internet in a secure and stable manner. Then we spent 10, 12 years working through the policies, because the policies are equally important. Using just 26 characters plus the 10 digits for domain names have its own challenges. But try to bring tens of thousands of characters into that system. And there are other linguistic issues that need to be dealt with through policies. And that’s what we did in the last 25 years. So now is the time, I guess, the rubber hits the road, and we need to keep driving it. And the other thing that I always like us to think through is that we really need a kind of movement. Because this is not, there is what I would call a kind of a market failure right now. If you ask people who doesn’t know very much about the domain name system or the internet technologies, when you explain to them they can actually use Japanese, they can use Indian, Hindu, Indic languages to navigate the internet, there’s like, sign me up. But the problem is that that is a latent demand, because they don’t even know that they can demand for it. The other side of the story is also suppliers are also unaware of the impact they’re causing. I’m not saying that suppliers are not aware of the technology part, because that, through the 20 years, I think most of the developers and suppliers of web hosting, registries, and registrars do know. In fact, registries and registrars do provide IDN registrations. But. Are they ready for web hosting? Are they ready for internationalized email addresses? Universal acceptance, readiness is still very low. But the technology part, if you ask Google, Gmail is actually internationalized email address ready. Outlook is also ready. But does that mean the entire suite of Google services? Does that mean the entire suite of Microsoft products are UA ready? Unfortunately, that’s no. What is interesting, adding to my rhetoric about needing a movement, I recently come across, I think Secretary just mentioned a little bit as well, what is called, well he didn’t mention it, but he touched on what is language justice. We must have heard of climate justice. We might have heard of many types of justice. But there is actually language justice as well. And that’s why we need a movement. That’s why a multilingual internet is important. And I think the technical community, some of the technical community, is still resistant. They have been resistant from the very beginning, one of the things being a lot of the technology providers are still very much English centric. And because of that, they are sometimes worried. Well, if someone uses a multilingual email address, am I going to be able to see it? Is the administration going to be problematic? Is it going to be difficult for me? There is a little bit of resistance. But we need to convince them. We need to convince them that their work, their engineering work on all the interfaces, all the display, all the storage, all the processing has an impact on language justice. And also, if you look at the statistics, well, of course, people say. because nobody’s using internationalized domain names, there’s not much abuse, but if you look at the real statistics, DNS abuse is a fraction in terms of internationalized domain names. You know, it’s like a much lower percentage. And more important thing for, to convince the technical community, I believe, is to tell them that a multilingual internet actually makes for a safer internet. You know, my dad, going online, when he looks at the URL bar, he doesn’t understand it, but if it is in Chinese, he’ll be able to figure it out. What, you know, for a normal user, actually a multilingual internet makes for a much safer internet. So I want to start you with this thought, finally. Many people say it’s all about the content and the domain name part and the email address. People don’t even use. But if you think about it, the DNS was introduced in 1983. When was the web introduced? That was 1989. Six years ahead of time. That’s what set the English-only naming system and paved the way for English-dominant web. So maybe it’s a hindsight thing, but if you have a forward-looking perspective, I think you can understand that the foundations of the naming system does pave the way for content and that’s why, without universal acceptance of internationalized domain names, a multilingual internet cannot be realized. And it is a matter of language justice and that is why we need a multilingual internet movement. And I hope I can convince you to start here and this is the community to start that movement.

Susan Chalmers:
Thank you. Thank you so much, Edmund. A number of compelling points there. And in particular, the multilingual internet makes for a safer internet for many, so thank you for that. now to turn to the Senior Vice President of Global Domains and Strategy at ICANN, Teresa Swinehart. Here, Teresa.

Theresa Swinehart:
Thank you. So first of all, it’s a pleasure to be here and to hear the remarks. And Edmund, your passion is fantastic. And the part he didn’t mention is he heads up also the board working group on IDN and UA. So we have an opportunity to work together on quite a few things. So from an ICANN standpoint, we share the importance of the inclusivity and the opportunity for everybody to use any language they want and any script they want. And this is an incredibly important aspect that we’ve heard in the other remarks today. And to the points that have been made, it’s not that the technology isn’t available. It’s actually the ability to use it around the world for whichever languages. And we heard some different statistics, but I’ll throw a little bit more out and then share where we’re coming from as an organization working with the community and the board on this. So apparently, there’s about 5.4 billion people from all different cultures and languages around the world. There’s about 2.6 that have never been online. And there’s reasons they haven’t been online. It might be access to the internet. It may be for any other reason. But the power to use your own language to express yourself in your own language is incredibly important. We all know it if we have to experience a conversation in a language that’s not our own. It’s challenging. It takes a different kind of energy. It takes a different form of recognition of the words and what they mean and the energy. interpretations around it. So if we look at the currently about 6,500 languages that are around the world, but we look at the breakdown, there’s about 2,300 spoken in Asia, 2,100 spoken in Africa, 1,300 in the Pacific, 1,000 in the Americas, and about 280 in Europe, plus what we heard earlier within the United States, even local tribes and linguistics there. It’s not just about people using their own language. It’s also the preservation of languages. It’s part of the global understanding of different cultures. If you then look further, there’s about 1.3 people speaking Chinese, the majority of which approximately 900 million, Mandarin, many of which are outside of China. 610 million people speak Hindi, and another 300 million speak Arabic. This is around the world. These are potential users that may use the internet even more if they can express themselves in their own languages. But to the universal acceptance standpoint, you may have an address. You may have a domain name, but you may not be able to use it on the platforms you want to or ensure that there’s a receipt from the other party. So the work around universal acceptance, the awareness around it, and the opportunities is an incredibly important part. It’s not just an economic aspect. And the statistics around the economics indicate 9.8 billion growth opportunities. That’s from 2017. But it’s also the societal opportunities and the next users from that standpoint. So from an ICANN standpoint, we have a few things that we’ve been engaged in. One is the support for Universal Acceptance Day. And we can talk about that later. That had a large impact. And looking forward to partnering with many different organizations in the future. And then we also have what’s referred to as the next round of. top-level domains, which affords an opportunity for those that wish to, to apply also for a name that is in their own language, in their own script. The application process will open up, there will be opportunities there, hopefully for all the 600 or 6,500 languages in all the different parts of the world, whether they’re small communities. But the important part is that universal acceptance exists so that those names can actually resolve fully at a global level. So I’ll leave it there, and then look forward to talking a little bit more about some details of things that we’re doing.

Susan Chalmers:
Check. I’m all set. Thanks. Thank you so much. So we have just had an excellent, I think, set of introductory remarks that covered the history and background, giving context to universal acceptance, the importance of meaningful connectivity, and thank you to Dawit for defining what that means, that was a very useful definition. The importance of UA to non-English, or non-Latin speaking countries, and also really the foundation of UA towards digital inclusion, some very helpful statistics, I thought those were quite important. So with all of that said, I might ask folks who are in the room, and again, please feel free to come sit at the round table if you’re in the seats, you’re most welcome, but I’d like to just turn it over to attendees to see if there are any reflections or contributions that they would like to make. And then we will move into the first of our three questions. Does anybody have anything they would like to contribute? Yeah, please.

Audience:
Hello, my name is Keisuke Kamimura. I’m a linguist by training and profession, and I am not an expert on technology here, but this is my observation. Universal acceptance is important, and it is annoying that you cannot use internationalized email addresses in various applications. So I completely agree with many of you here. But on the other hand, we don’t really use domain names for identifying information and identifying yourself in email. We tend to use Facebook, Twitter, or other forms of social media, where you do not particularly typically use domain names or lengthy identifiers. So my question is, is domain name or internationalized domain name still relevant in making internet more diverse and multilingual information space? And another question is, do users prefer to use internationalized domain names as opposed to other forms of domain names like GTLDs and CCTLDs? I have done a survey on the user behavior on internationalized domain names compared to other types of domain names a couple of years ago. I found out that they have clear, distinct users, have different behaviors over GTLDs and internationalized domain names. So if you talk about universal acceptance, you have to consider how people react to multilingualism on the internet. So this is my observation. Thank you very much.

Susan Chalmers:
Oh, I think we have a hand up online, perhaps, to respond to this question from Ram. So I heard two very interesting questions that you’ve posed. The first relates to the meaning of identity and how that is expressed on social media and other platforms versus a domain name. And then the second pertains to IDNs and GTLDs and ccTLDs. I’m happy to have somebody also address that question, because I’m not sure they’re necessarily so distinct.

Ram Mohan:
But let’s turn to Ram. Thank you, Susan. And thank you for a terrific question. Two things that we should think about. It’s not only about email addresses and a domain name. Think of writing something in a Word document, and you’re typing in an email address or you’re typing in a website address. Today, it automatically becomes a hyperlink if it is validated, if it is supposed to be a real name. However, if those systems do not understand the identity that you’re typing, then your company’s name. your organization’s name that is represented on the internet may simply not convert automatically into a hyperlink. So that is part of universal acceptance. And it, to some extent, is not just about in your language, it is about making sure that whatever it is represented in, whether it is in your local language or whether it is in ASCII, in the Latin script, so long as it is a valid name that is accepted by the authorities on the internet, it ought to just work everywhere, right? So we have to, I think, start thinking about these less and less as identifiers and more and more as ways of communication between human beings. And whether it is a website address, whether it is a domain name address, an email address, or if you go to many of the social media sites that are there right now, they give you the opportunity, if you want to link to your biography, for example, on a site like LinkedIn, they give you the opportunity to type in a URL, a website address. However, if that website address is not recognized due to universal acceptance issues, you are not included into that digital ecosystem anymore. You’re forced to go to a, in many cases, inferior system to represent who you are. Thank you.

Susan Chalmers:
Thank you. Thank you, Ram. And Edmund, please.

Edmon Chung:
Yeah, I just want to add a little bit. I think those are very good questions and raised a number of times. Whether domain names are. still relevant and email address still relevant. So I’d like to say three things, really. One is that search, if you think about search, typing in the local language is not a problem at all. So typing in an IDN has no challenge for the local community. So that is very important. And direct navigation on the internet is still utilizing domain names. And so that, I think, remains relevant. Number two, on email addresses. I think most, if not all, of the cybersecurity training that I’ve given and I’ve listened to starts with email address. The first thing I teach my dad, whether it’s spam or scam, is to look at the email address that is being sent. And that’s why it’s still relevant. And that’s why I think what I mentioned as a multilingual internet makes for a safer internet, because that is the fundamental. Because that’s the first thing you teach an elderly using the internet and say, stop being scammed, is to look at who sent you the email first. So I think that’s important. And the third thing I want to mention is that, in terms of the users, I’m not sure if you saw the ALAC end user survey, the at-large end user survey that was commissioned at ICANN. And the findings are interesting. And I guess that the findings you have is relevant and corroborates. But there is an additional question that was asked that I think was really revealing, which I touched on earlier. For people who don’t know that there is IDNs and don’t know there is an option, when they first heard it through the survey, they were excited about it. about it, they want it. But those who actually know about it says, it’s not so useful. Well, that is a revealing issue, right? The reason why, and that’s why we’re talking about it here, is that they registered and they couldn’t use it. Was the web hosting ready? Was the email ready? The problem is not so much that end users doesn’t want to use it. The problem is it cannot be used very smoothly on the internet. So it’s not set up properly. It cannot be actually used in a good way. And it’s sort of like a second class citizen right now. And that’s, I think, the bigger problem. So that study, I think, is quite revealing when you look at those statistics as well. I couldn’t find it right now, but I’m sure we can dig it up.

Susan Chalmers:
Thank you, Edmund. Theresa, would you like to contribute?

Theresa Swinehart:
Yeah, I’d be really interested to see the study, because the points that are being made are really quite revealing, also from another angle, right? And there’s the question of demand, or why may there not be demand for it, or awareness around it? And then to the points that Ram and Edmund had made, it’s also about the user’s seamless experience. We’ve all had experience with, I don’t know, something online. And then it turns that the interface to something else doesn’t allow it to happen. So you have to go back and do something else, and then go back and make sure it works, whether it’s a payment method or whether it’s something else. And so in the end, it’s really about also ensuring that regardless if the unique identifier is at the front end or in a document or a reference tool, that the experience for the user has the opportunity to be seamless as part of a global internet from that standpoint. And you appreciate there’s… There’s areas that are within ICANN’s remit more specifically, and then there’s things that are not, and obviously enjoy facilitating and being part of conversations and partnering with others around the awareness there. From an overall standpoint, I think that there’s also the elements of how does one contribute to the user awareness? You get a new laptop or you get a new phone and it says, do you want to use English or German or whatever language it might be, and do you want to have, I don’t know, Syrian, do you want to have payment online, and all these different things. Even if there’s just a question of do you want to check whether you can use the device in your preferred language, and is it going to work with others, some forms of questions, it’s the user awareness that they might have the option. This is an area way out of my purview and expertise and certainly not a remit within ICANN, but more generally from a global level, the awareness of what opportunities could I have to do something I think is valuable, and sometimes it’s hard, but it’s about what’s the right thing to do for a global level to enable people to use their languages of their choice. But the study is very interesting, and I’ve sort of gone on, but I think in the end it’s really about the seamless experience for anybody to do what they want to the right of the dot or to use the languages and scripts that they would like to use.

Susan Chalmers:
Thank you, Teresa. Now I’d like for us to move into our policy questions, and the first question here is what are the barriers that are keeping people from using the internet in their own language? And I’d just like to turn first to Dawit, and then we will turn to our colleague Akinori Maimura. who is the General Manager, Internet Development of the Japan Network Information Center. So we’ll first hear from Dawit and then Akinori.

Dawit Bekele:
Thanks, Susan. Unfortunately, many barriers contribute to the challenges people face in using the internet in their own language. Here are some of the most important ones, my opinion. First, if you don’t have access to the internet or you can’t afford it, you can’t choose the internet in any language. And the digital divide is very often on linguistic lines. For example, as you have heard at the opening, indigenous people often lack connectivity that has an impact on the use of their languages on the internet. Second, some languages have limited digital content due to social, economic, and political reasons. For example, most of the more than 2,000 languages that Teresa mentioned in Africa are not recognized as official languages in their own countries, limiting the support for content development in those languages. Third, the barrier can be technological. I will mention only two of these technological barriers that used to be barriers for my own mother tongue, that uses the Ethiopic script. The Ethiopic script was not included in Unicode until about the year 2000. This means before that, it was close to impossible to have an Amharic content that everybody can read easily. Thankfully, Ethiopic and many other scripts and alphabets are now part of Unicode, but this is not the case of all scripts and alphabets. Another major technical barrier is the lack of support for many languages by devices and platforms. There are many people who are literate in their own language only, for which their devices. and or the platform they want to use are not localized, which limits their use of the Internet. The fourth barrier is the lack of digital literacy. Unfortunately, the poorer the community, the less it is digital literate. Thus, poorer communities tend not to have their languages fairly represented on the Internet. There are, of course, many other barriers for which I don’t have time to discuss in detail here. Those barriers include but are not limited to limitations of IDNs as it has been said by other speakers, lack of relevant content, Internet shutdowns and restrictions, the saturation of the Internet with the so-called global languages such as English. But to end with some positive note, even though the barriers are many and are often huge, there are some hopes. Technological advances are making access to content in other languages possible through automatic translation, and we have seen it with AI recently, even interpretation. Governments, tech companies, and other service providers are taking more and more seriously the issue of localization. There are more and more technical advances and solutions, such as community networks that can provide connectivity even for the most remote communities. Therefore, if governments and tech companies, local communities, civil societies, and international organizations, and many other stakeholders work together, we can create a fairer Internet for all languages. Thank you.

Susan Chalmers:
Thank you so much, Dawit. I just want to pause to look around the room and to see if anybody has any similar kind of experiences that Dawit had just outlined and would like to share. Yes, Roberto, please.

Speaker:
Yeah, thank you. Roberto Gaetano from European User Association. I would like to add a point because when we think about underserved communities in terms of languages, I think that most of us think also situations like Africa that was presented or South America or… I would like to make an example that is related to my country, that is Italy. In Italy, we have several languages. I’m not talking about dialects. I’m talking about real languages that are not officially recognized. Most of them are not, a couple are, but I’m talking about Furlan. I’m talking about Sardo. I’m talking about Arberesh. And those are local communities. And I think that there’s a role that even in a developed country, or supposed to be like Italy, that there is a role that the internet can play in terms of allowing, favoring local contact, favoring the distribution of information in that language. A few years ago, we had at the IGF Italy a session about this, about what is the impact of the internet on local communities who speak a language that is… is not recognized. And that was quite interesting. Why is this a policy question? Because without, for instance, help by the governments, without also the awareness of the community, this cannot be done. I’m talking about these languages, I call them endangered languages, because also with the globalization, the community that speak that language is going to shrink unless we support this. And I think that the richness, the diversity of culture has to be preserved. And there’s a role that the internet can play in this.

Susan Chalmers:
Thank you so much, Roberto. And now, oh, here, please, go ahead. If you could introduce yourself, that would be great.

Audience:
Hello. My name is Rafik. I work at Internews. And one of the topics that I work on is content moderation in non-European languages. And I think that there’s a kind of an issue where you have, when you don’t have a lot of content on the open internet in a specific language, it tends to drive people towards platforms, Facebook, most obviously. I spent a lot of years living in Myanmar, which is kind of the textbook case for Facebook becoming the kind of stand-in internet. And I think that that’s a really important phenomenon in this wider discussion, because to Edmund’s point about a multilingual internet being a safer internet, in these smaller languages, you don’t have functional content moderation. I think a platform like Facebook has content moderation in maybe 75 languages. But you do have people using those platforms in 1,000 different languages. languages, and you have very robust communities using those platforms instead of the open internet, but in effectively an unmoderated way, but still with all of the kind of amplification and things that you see through those platforms. So I don’t know if that’s kind of within the remit of this discussion, but I think it’s a really important point. Thank you.

Susan Chalmers:
I think that your point kind of dovetails with our question earlier from our linguist colleague, and so that adds a really interesting dimension to the discussion. So much appreciated. Thank you. Oh, yes, please. You’re welcome to…

Audience:
Thank you. I want to share a view from a regular user’s perspective. One of the main barriers is actually a lack of demand due to, I would say, like linguistic fitness of input methods. I would like to say, for example, I use a country code as an example. If I type it on the keyboard, there’s only three buttons, and I solve the problem. If I use my native language, I would use a dozen. I would have to press a dozen buttons. So for any regular users, if three buttons can solve the problem, why would he or she go for a dozen? So it’s a simple question for the regular users, which is the linguistic fitness to our input method, which is a linguistic technical issue. So for any language that is easier to transfer into alphabetic, can be contained in a small keyboard, it will be easier to promote IDN. But for any language that is not very fit to the alphabetic, that will… would be difficult. And consider today, how to say, the most majority input method is still alphabetic keyboard. So that would create the lack of demand to regular users, since shorter and easier would be always the choice. It’s a simple concept. And if in the future, like a vocal input or even brain input got promoted, that would be much more easier. Thank you.

Susan Chalmers:
Thank you. Thank you. And I think the question of practicalities is a useful one. And on that note, I was wondering if Akinori might be able to turn to you. OK, thank you very much.

Akinori MAEMURA:
My name is Akinori Maemura from Japan Network Information Center. Great to be here. The discussion until now is already overwhelmingly exciting to pick up the various aspects of the idea and the universal acceptance. The barrier for using the internet in our own languages, it’s quite a good question. And then I would like to talk about a little bit past situation. 30 years ago, we started using the internet and started using the PC. At the time, I remember that my PC, my system, system itself, OS and some other environment which I used, is not really good to handle the Japanese. And then there is a lot of funny. funny characters in my display, for example, the black square, that means that there’s some character which the system cannot handle. So it is really hard to use the Internet by Japanese because of that kind of errors, and then it actually overcome later, and then we don’t have almost virtually no problem to use my own language, which is Japanese, in the PC and IT systems, so it is improved. And then actually Professor Kamimura, who made the intervention before, is the professional for such inclusion of the languages to the IT, he could make a good input for that, but in such way that the PC system, for example, the OS, and then the computer system gradually include a lot of languages to our own use, so now as well as Japanese, many languages are available in the PC. And then for the domain names, I need to tell that, yes, IDN is already ready, and then for example, for the .jp domain name, we can use the Japanese label at the second level .jp, that’s available. But not popular, because the domain name is, for us, the normal Japanese people has no problem to read and write the alphabets, that they are already our own, within our own knowledge and then it’s actually preferred to use the alphabet for that kind of identifiers. It’s simple, the very compact set of the characters, 26 plus alpha character to identify something, actually suffices. And simple and sometimes cool, Japanese feel like that. So the ASCII character is preferred for that kind of use. It is not a natural language, you know. For example, literature. Literature, we definitely need the Japanese. A lot of Han characters, that’s exceeding the 10,000, needed for the smooth and fine literature. But that’s an identifier. So it’s quite, you know, good enough with using the 26 characters. But that’s one of the points. But I completely understand inclusion is important and Edmond pointed out a very good point of the language justice. That’s, we need to do, you know. For example, I am now telling something in English, but I’d like to do that in Japanese. And then you understand correctly my, including my nuance. Then it is, I would feel very included in the situation. I try very hard to use English for this kind of international situation. So my point is, with that, the language inclusion is very important. And then not everyone can use the English, but only use their own language. But for example, I was serving for ICANN board and at that time, my point is that we need to include everyone, everyone who use the various languages and then we need to be prepared for that. And then, employing that kind of system is just left to the operators and the IT vendors, so we try to ask them to use that. So that’s actually the effort of the universal acceptance. So my point is, the barrier should be, for example, as the PC system, the computer system includes the various languages, then the people who use the computer system can use their own language. However, such kind of environment, the computer system and then, for example, the IT system to accept the e-commerce enrollment and then order should be able to handle such multilingual input. They are not created and developed by the software house, but in most cases, that kind of system provided, the platform is provided by the very big vendors. So we need such a very big vendor for the platform which is widely used to employ the universal acceptance, then everyone in the world can be included by using their own languages. That’s my point. Thank you.

Susan Chalmers:
Thank you, Akinori. I have some reactions to that. But I just want to check around the room first to see if anybody else would like to respond to Akinori. So it seems that the ultimate objective, of course, is being able to offer everybody the option and to build upon a new status of connecting and using the internet in their own language and their own script. But just recognizing that some communities have already kind of adapted to the ASCII-only system that has been built up over several years. And there have been some kind of patterns and business practices that have been built around the existing system. With that said, I don’t think it’s certainly I don’t think that’s a counter-argument to UA, but it’s just something that might be useful to note as part of the discussion. So thank you very much for that, Akinori. Our next question is, how can we surmount the barriers that we have just discussed through technical and policy coordination? Ram, during his opening intervention, had mentioned that it’s, and Edmund, I believe you mentioned this as well, it’s not so much a technical problem because the work has been done. It’s a coordination problem, and it’s a policy problem, and it’s a visibility problem, I think, for governments. And so my next question goes to you, Edmund, is how can we surmount barriers through technical and policy coordination? Thanks.

Edmon Chung:
Thank you, and yes, I guess as both Ram and I mentioned, we are at a very low level. technical part, which is the protocols and those kind of things, we are beyond that. But the technical implementation is still a big challenge, and we’ve heard from different parties. In fact, one of the things that is important is to convince the technical community that it is an important thing, and just to rely on market forces I believe is not enough, because I think the market has spoken a little bit in saying that we tried this, we offered this, but nobody is using it. But why is nobody using it? Because they can’t use it smoothly. So we’re in a chicken and egg situation right now, and that comes to the policy part. The fundamental policies for enabling internationalised email addresses and domain names are there. So there is the IDN tables, there is the different language policies for registrations of these unique identifiers. Those are there. But what is not there are policy interventions that would motivate suppliers to flesh out the implementation for universal acceptance, ensure that everything is as easy to use for a multilingual email address than not. Just as a good example, many registries I actually don’t know in China or Japan do allow, for example, Chinese and Japanese domain registrations, but what if the user uses a Chinese email address to register that domain? Does your system support that? Maybe, maybe not. I would guess not today. Those are the things that, you know, once you use it, you don’t, you know, can’t. So I think the technical part… is trying to convince technical people that this is important. And on the policy side, it is about having policy intervention to motivate suppliers to actually put it in place. And I think it was a little bit touched on by Secretary earlier, but there’s also the international decade of indigenous languages that is there, the sustainable development goals that touch us on innovation and heritage and local culture. Those are the things that we need to tell people that it’s not just about, well, we can also use these cool ASCII domains. But when we talk about choice, the other side is important as well. Yes, we can choose these cool names, but what if I want to choose a local name? Right now, it’s difficult. So choice, yeah, that’s the market side. One last thing that I want to touch on is in response to, I’m guessing the speakers from Chinese, because they’re talking about input methods. I even put method in Chinese as well. And so yeah, maybe a few more keyboard strokes. But ask any Chinese or ask Baidu. Do they have problems searching in Chinese? I don’t think they search in English, right? I mean, even for just a few more keystrokes, they would search in Chinese. And so navigating should not be a problem. And the other thing about, I guess, in terms of ICANN and the top-level domains, the speaker mentioned that just three keystrokes can type a top-level domain. Why would you bother? Well, that is why single-character Chinese domain names and single-character Chinese top-level domains is so important. Because one single character in Chinese means a word. And that can be done in two, three strokes. So hopefully, that adds.

Susan Chalmers:
Absolutely, it does, thank you. And I wanna see if we can turn to Ram.

Ram Mohan:
Thank you, Susan. So as Edmund said, the core technical challenges and the core technical contours of this problem are already solved. How to make these identifiers work with each other is already a known thing. That is not something that we ought to be focusing time and effort on. In the real world, this is really for an organization of any size and scope, this is a little bug, a little thing that has to be resolved. The reason, in my opinion, why universal acceptance, multilingualism and digital inclusion of this kind has not yet become an automatic default is because we need a bit more policy coordination. We need a bit more on the side of incentives. Because if you look at it, the problem that we’re talking about is so small relative to large issues that organizations and technical firms have to deal with that they shrug their shoulders and say, this is just a little thing and nobody is complaining. So, so long as there are no complaints, it’s all right, we can just move forward. But imagine a world where for every procurement that every government does, imagine a world where the procurement says. that universal acceptance and vendors who have demonstrated that their systems have universal acceptance and are ready for universal acceptance, that those vendors will get a preference. Let me say this, in the world that we live in, those kinds of incentives that can be driven by policy development, that can be driven by economic incentive creation, that don’t really cost a whole lot for the organizations or the governments or the procuring organizations that do the procurement, but it really provides an impetus and a prompt to those who are competing for business to say, we need to prioritize universal acceptance and the resolution of universal acceptance are an important priority for this organization. Otherwise, it just falls in the priority scheme. That’s one thing. The other thing that we ought to consider is, should we continue to look at this and talk about this as domain names, as internationalized domain names, as internationalized email addresses? Because I don’t know about you, but for me, I’m a technical person, but even for me as a technical person, when I hear IDNs or our EAI or acronyms like that, eyes glaze over, right? Should there not be a simplification of what we are actually trying to solve for? We’re trying to solve for a global economy. We’re trying to solve for a global economy that is a global economy. We’re trying to solve for a global economy that is a global economy. not just the ability to access parts of the internet, ability to be able to communicate in your own language, but we’re also solving for accessibility, right? So perhaps we ought to start thinking about changing the dialogue, the terms of the dialogue from internationalization and from these technical terms that were invented 20, 25 years ago. I was a part of it, so I’m guilty of one of the people who has perpetuated it, but I think it’s time to start talking about what the users of the internet actually value, which is access in my own language, right? So it’s about digital accessibility, digital inclusion, and I think that universal acceptance is an internationalized domain names, that entire area fits underneath that, and I think it’s time to elevate the dialogue and focus on policy-based initiatives that can actually drive that kind of digital inclusion.

Susan Chalmers:
So it seems to me that there is definitely a space for some marketing wizards as we move to promote this whole issue set. Ram, I did wanna note that and emphasize Ram’s point about the role of governments and procurement policies. I think this has been consistently one of the recommendations that has been made by the community that is focused on universal acceptance. Oh, I see we have a hand, please.

Audience:
I think it’s a very interesting debate, but my question goes a bit, is this about acceptance of multilingualism, or is it also about the construction and co-creation of multilingual Internet? So, my point would be, are we aiming at making more languages available on platforms, or are we also looking on how can we build a more decentralized Internet from bottom-up, so to say, and the experience, what I want to share is working a lot with community networks, and there’s also a need to make more languages available on platforms, and there’s also a need to, or like a vision to create its proper infrastructure, for instance, to why not host a local server, why not host a local e-mail server, and the problem I think is twice-fold, because I would say there’s an intersectionality between language, but also between big tech and the acceptance not only of language, but also of communication, and I think it’s a policy issue, but if you would like to run a local server even before, and with a local web hosting, maybe even before to touch the language base, it would be just blocked because there’s a protocol that is not updated, or it goes into spam, because automatically, for some reasons, configurations of Gmail or whatever, this is not shown and I think this is a very important intersection, and so my question would be, I agree, it’s not only about domain names, it goes a lot deeper maybe on this level, and yeah, well, question, if you see this like in a similar way, or how do you also think if we think of a diverse internet also in terms of technology and the policies that should provide for them. Thank you. Thank you. I’d like to turn to one of our speakers,

Susan Chalmers:
expert speakers, to see if they might be able to respond to that question or anybody else. Oh, Dawit has his hand up. And then, so Dawit and then Edwin.

Dawit Bekele:
Thank you. This is an excellent question or comment. I completely agree. One of the frustrations of many communities is that they are less and less, you know, empowered to decide on what they can, how they can use their languages, especially, for example, platforms might decide which languages should be, you know, allowed on their platforms. And you have to wait for someone else to decide when your language will be available. So, I completely agree that we need to empower communities to decide what is important for their languages, what should be supported, and not someone else. Unfortunately, this is easily said than done. Very often, you know, these platforms and other tech companies are becoming more and more powerful and decide on our lives. So, in a way, we had more possibilities to decide for ourselves before than we do today. So, I don’t know how this will happen, but I completely agree that it is important that, you know, the communities have a say on what is available only. Thank you.

Edmon Chung:
Yeah, I think it’s a great idea. In fact, I don’t know whether you intended it as an idea, but bringing up the community networks, I think it’s a really good model to learn from and work with, because that would be a group that is just building up the infrastructure for themselves. And obviously, local language makes a lot of sense in that case as well. But back to your question part, is it acceptance or co-creation? I think it’s both. It’s co-creation for a multilingual internet, which is to work with local communities to build up a multilingual internet for them, and domain names and email addresses being the fundamental parts of that multilingual internet. And the acceptance part, as you really pointed out, the acceptance part is the big tech and the other systems around the internet so that it remains one internet, and for them to accept as well. Yeah, of course, you can build some complete separate infrastructure for multilingual spots of internet, but we want one interoperable internet, and that’s the acceptance part. So I think that’s a very good and interesting way to think about it, and definitely is one of, I don’t know why I’ve never thought about it, but the community networks group initiatives are really something we can learn from and work with.

Susan Chalmers:
Thank you so much. Just in the interest of time, I’d like for us to move on to the last question, which is, in what ways does internet multilingualism support the broader goal of digital inclusion? I feel like we have canvassed a lot of this already, but I think it’s a very crucial question. that we should examine, and so I’d like to turn to Theresa Swinehart.

Theresa Swinehart:
Sure. So I think we actually covered quite a few areas of what this entails, and I really like the conversations about the local community networks and some of the challenges also that have been experienced at different points of using the internet or using multilingual content around that. I think it also demonstrates no one entity can face this alone, but the broader awareness of the dependencies amongst each other of the different systems, whether it’s the underlying technology, the domain name system, internationalized domain names, or the ability to access the content and how that works. So I think, you know, to reiterate the opportunity here around more and more awareness to this, and so as we look at some ways to help support this, you know, there had been, last year we had the opportunity around the Universal Acceptance Day, and really quite a remarkable level of participation by the community, by the global community around that, and there will be another one this coming year. But listening to this conversation, there’s actually, I think, an opportunity to look at it not just as a Universal Acceptance Day in awareness, but actually awareness about all the different elements that contribute to it, the local community networks, the ability to have certain content online, the partnerships with different entities and different organizations around that. So that’s certainly one area that we’ll be looking at, and I think we’ll certainly help support the broader aspect about the inclusivity. It’s all very nice to talk about the inclusivity, but there’s different roles and responsibilities around it, and those roles and responsibilities, in many ways, are driven either by economics or demand or… passion, or whatever it might be. And I think the examples of procurement, government procurement options, we’ve seen that in IPv6 and other things, to be successful. And I think we can see it in other areas as well. So in addition to the universal acceptance, awareness building, and really creating that awareness, I think the other area, and we touched upon this briefly, we have the opening of the next round. We’re still developing some of the policies around that. Some of the policies actually do go towards the internationalized domain name elements or applications that might be coming in in different forms around that. So that work is still underway. And the guidelines for the actual taking of applications is still underway. And when it opens up, hopefully that affords another tool in the kitchen cabinet, if I could put it that way, and another resource and opportunity to contribute towards the broader elements of a global Internet. And I think the terminology of acceptance and co-creation and contributing towards that. So I’ll leave it with that. But really, this has been an invaluable conversation.

Susan Chalmers:
Thank you so much. Len.

Audience:
It was a very fascinating conversation. And I might toss in a couple of other thoughts. One is, and I learned this, I guess, just coming to Japan and trying to figure out how the remote control works or how to get money out of the ATM or even most other things in terms of navigating. But one is, I think we should, and I think it was mentioned earlier, we shouldn’t discount the role of iconography in this whole discussion. there’s been a lot of, especially as an entry point to get either access to the internet or get started somewhere. To me, it’s like driving a car. I mean, I just think about small things like knowing which side of the car the gas tank is on. You know, just little things like that, I think, that have built up as convention over the years. And I think so convention and iconography can be a valuable tool, I think, here. The other one is, as I watched, especially since the, certainly the beginning of the pandemic, of the use of, you know, just not typing anything, but just pointing your phone at something, or even speaking something that at least gets you through some sort of artificial intelligence that says, I recognize this language, I’m gonna convert everything. So I guess my main point is here is, and I know it’s the topic of the conversation, but I think, you know, relying on the domain name system, if you will, and domain names to solve the context problem of language is probably not very scalable in the long run, because there’s gonna be so many other things that we’re gonna have to do with the internet that are gonna rely on that context. So I would make a case for saying, let’s look at the efforts going on in identity management and some of those contexts to be able to help, because we’ll have a lot of technology to throw at this. We’ll have a lot of stuff to be able to say within one or two phrases, I know what language you’re speaking, no matter where you are in the world, and then be able to adapt that. And then the content and everything else gets kind of set, or I arrive, even as an email address, maybe even the email address system relies more on identity management. I gave a talk a long time ago, back when I worked for a telephone company. that we should just forget about using phone numbers at all because my daughter knew none of her friends had phone numbers. She relied on some other context for that through whatever platform she was on. And you gotta realize that people are gonna have more than one presence on the internet, maybe based on their social network or their business network or something else like that. So anyway, it’s just a thought, but I would say that we should look for other ways to take care of this problem other than the domain name system. And I’m not discounting making it a good working domain name system in the context of language and characters, but still I think we shouldn’t get over reliant on that as a solution. So thank you. Hi, Pat Kane with Verisign. So this morning when we started off, what came up was preservation of cultures, preservation of languages. And we’ve drifted into domain names and DNS. And I think the example with the two coming together over the last 20 years is .cat for Catalon. And so when you talk about .cat, they bid for new TLD and they had one policy, which was if your cat linked to a website, you had to have Catalon content on it. Catalon content grew tremendously in that timeframe. So Catalon, 26 characters in their alphabet. They do have the Sidiya on the keyboard so they can do other words in their language. But that’s really the opportunity here. But when we talk about creating a movement for universal awareness, we’re talking about spending a lot of money to solve a problem at the edge of the internet that is thwarted every day by the core of the internet. And that’s the ASCII problem that we have that DNS handles that. What I don’t think we’ve done recently is taken a look at the DNS infrastructure itself. terms of resolution software, what happens at recursive servers, what happens at authoritative servers. I do know that, you know, that years ago when we launched IDNs at Verisign at .com, we did use a wildcard at the authoritative server to interpret UTF-8 and UTF-16 so that we didn’t have to do just ASCII. It worked clunky but it was initial implementation and then we had a wildcard prohibition put in place for a lot of reasons. But have we thought about solving it at the core so that we don’t have these limitations that we have at the edge today or should we?

Susan Chalmers:
Thank you. Well, just recognizing the time, I’d like to make a few points to conclude and if any of our speakers would like to consider maybe a very brief intervention or a winding up point, please do. But I would just say that this has been a tremendously vibrant and dynamic conversation. I know we aren’t many in this room but that hasn’t limited the kind of diversity of thoughts and perspectives that have been contributed to this conversation. We had intended to focus on the collaboration between different institutions moving forward to promote universal acceptance but we’ve run out of time. I would just say that in the upcoming Council Working Group on Internet at the ITU, there have been multiple submissions from different countries on this very subject, on universal acceptance. So those submissions will be discussed on October 18th. So I think that this discussion was quite timely. And I’ll wrap it up there, but I see Akinori, you would like to say something, and I don’t know if anybody else would like to, too, but let me just say thank you so much to our expert speakers for their time, and thank you also to everybody who’s joined us today, but Akinori, over to you.

Akinori MAEMURA:
Thank you very much. I’m really impressed with this discussion, and I am thinking about it’s quite a multi-stakeholder process to make a digital inclusion, and then, you know, in the part of the setup, the identifiers policy, I can do still a job with the community, the great variety of the community effort, and then many, many language community have been involved in setting the level of generation role, and then I can still do the policies for the new GTAD program, so that’s quite a big effort. And then, as I said, it is really integral part is the platform vendor who cover the multilingual, the IDN and the universal acceptance ready, and then that’s the crucial part, because the platform, the common platform manufacturer, if they are UA ready, then almost all the system are UA ready, then that’s a really crucial part. And then the public policy will encourage a lot of the end user system move forward for the universal acceptance, so that’s really important. So this is a quite everyone need to do their own job for advancing the data inclusion, which is really like a multi-stakeholder approach of the Internet. Thank you.

Susan Chalmers:
Thank you. And just one last important point. So the organizers of this session will pore over the transcript and the contents and create a synthesis of the discussion and develop a report. And you can probably anticipate that coming out in maybe December. So we want to take some great care with how we treat the content of this session. So please look for that on the IGF website. All right. Thanks, everybody, and have a great day.

Akinori MAEMURA

Speech speed

112 words per minute

Speech length

1015 words

Speech time

543 secs

Audience

Speech speed

157 words per minute

Speech length

2002 words

Speech time

765 secs

Dawit Bekele

Speech speed

141 words per minute

Speech length

1169 words

Speech time

499 secs

Edmon Chung

Speech speed

159 words per minute

Speech length

2631 words

Speech time

991 secs

Ram Mohan

Speech speed

138 words per minute

Speech length

1488 words

Speech time

646 secs

Speaker

Speech speed

134 words per minute

Speech length

311 words

Speech time

140 secs

Susan Chalmers

Speech speed

151 words per minute

Speech length

2220 words

Speech time

884 secs

Theresa Swinehart

Speech speed

166 words per minute

Speech length

1735 words

Speech time

626 secs