Launch / Award Event #57 Governing Identity Online Nations and Technologists

Launch / Award Event #57 Governing Identity Online Nations and Technologists

Session at a glance

Summary

This discussion launched a research project funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech, focusing on the governance of digital identifiers and online identity systems. Upasana Hembram from the Internet Society Foundation explained that digital interactions are fundamentally built on trust and identity authentication, which profoundly influence how transparent, secure, and trustworthy the Internet can be. The research examines how private organizations and government agencies interact in the global governance landscape to deploy online identity systems, particularly studying three specific identifier systems: WebPKI, Legal Entity Identifiers (LEI), and Resource Public Key Infrastructure (RPKI).


Dr. Milton Mueller outlined how digital identifiers require systems of trust and authority, with cyberspace changing traditional authority relationships in new ways. He discussed RPKI as a method for authenticating routing announcements and IP address block ownership, noting government involvement such as the U.S. Federal Communications Commission’s consideration of requiring RPKI implementation. The WebPKI system was highlighted through the European Commission’s EIDAS initiative, which created tension with existing browser-based trust hierarchies controlled by companies like Google, Apple, and Microsoft.


Vagisha Srivastava presented research on Legal Entity Identifiers, which uniquely emerged from a top-down approach by the Financial Stability Board and G20 following the 2008 financial crisis. LEIs address transparency and verification needs for financial entities in cross-border transactions, though the system faces challenges with certificate lapses due to insufficient user incentives for renewal. Benjamin Akinmoyeje provided perspective from Africa, discussing the continent’s rapid digital identity initiatives including World Bank projects and African Union digital transformation strategies, while highlighting concerns about interoperability across different national systems. The research aims to enhance understanding of how different policy decisions within various jurisdictions impact the global Internet governance landscape.


Keypoints

## Major Discussion Points:


– **Launch of Digital Identity Research Project**: Introduction of a new research initiative funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech to study governing online identities and digital identifier systems


– **Three Core Identity Systems Under Study**: Examination of RPKI (Resource Public Key Infrastructure) for routing security, WebPKI for web authentication including EU’s EIDAS controversy with browser manufacturers, and LEI (Legal Entity Identifiers) for financial entity verification


– **Government vs. Technical Community Authority**: Analysis of how state authority intersects with Internet community self-governance, including examples like the FCC’s consideration of RPKI requirements and the European Commission’s clash with existing browser-based trust hierarchies


– **Legal Entity Identifiers (LEI) Challenges**: Discussion of the top-down creation of LEI by financial regulators post-2008 crisis, its mandatory use for cross-border transactions, and the problem of certificate lapses due to lack of user incentives for renewal


– **Global South Perspective on Digital Identity**: Presentation of Africa’s digital identity landscape, including massive inclusion efforts (500+ million people lacking verifiable identity), various continental initiatives, and concerns about interoperability across different national systems


## Overall Purpose:


The discussion serves as a launch event for a comprehensive research project examining how digital identity systems are governed globally. The goal is to understand the complex interplay between technical communities, government agencies, and private actors in managing online identity verification systems, with implications for Internet governance, trust, security, and global digital inclusion.


## Overall Tone:


The discussion maintains an academic and informative tone throughout, characterized by scholarly presentation of research objectives and technical concepts. The tone is collaborative and forward-looking, with speakers building upon each other’s presentations to create a comprehensive overview of the research scope. There’s an underlying sense of urgency about the importance of understanding these “background” systems that are fundamental to digital trust, though the presentation remains measured and analytical rather than alarmist.


Speakers

– **Dr. Milton Mueller**: Internet Governance Project at Georgia Tech (project executor/researcher)


– **Upasana Hembram**: Internet Society Foundation (foundation representative)


– **Dr. Karim Farhat**: Part of the research project, based in the United States, working on legal entity identifiers


– **Vagisha Srivastava**: PhD student at Georgia Tech, handling research on legal entity identifiers (LEIs)


– **Benjamin Akinmoyeje**: Involved in ICANN from Africa perspective, working with digital identifier policy, based in Nigeria


– **Michael Palage**: (mentioned in speakers list but role/expertise not clearly specified in transcript)


Additional speakers:


– **Dr. Johannes Sedlmeyer**: (mentioned multiple times but role/expertise not specified in the provided transcript portion)


Full session report

# Summary: Launch of Digital Identity Governance Research Project


## Introduction and Project Overview


This discussion marked the formal launch of a research initiative examining the governance of digital identifiers and online identity systems. The project is funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech, bringing together researchers from multiple continents to address digital identity governance.


Upasana Hembram from the Internet Society Foundation opened the discussion by establishing that digital interactions are built upon trust and identity authentication. She emphasized that digital identity systems, despite their crucial role in today’s digital economy, remain an understudied area of Internet governance with profound implications for privacy, security, and trust. Hembram argued that these systems should be viewed as instruments of public trust rather than mere background technologies.


## Theoretical Framework


Dr. Milton Mueller provided the theoretical foundation by addressing fundamental questions about authority and trust in cyberspace. He explained that objects in cyberspace cannot be identified without proper identification and authentication systems, making digital identity systems essential infrastructure.


Mueller highlighted how cyberspace is changing authority relationships and posed critical questions about where authority resides in digital identity systems and who can be trusted when authenticating online identity. The research framework focuses on three specific identifier systems: Resource Public Key Infrastructure (RPKI), Web Public Key Infrastructure (WebPKI), and Legal Entity Identifiers (LEI).


## Resource Public Key Infrastructure (RPKI)


Mueller presented RPKI as a method for authenticating routing announcements and verifying ownership of IP address blocks. He noted that the U.S. Federal Communications Commission initially considered requiring RPKI implementation among Internet service providers but ultimately backed away from this requirement due to questions about their authority in this domain.


The research team identified RPKI implementation speed and effectiveness as key areas of investigation, particularly regarding the degree to which governments become involved in either requiring or using RPKI.


## Web Public Key Infrastructure and eIDAS


The WebPKI system was discussed through the European Commission’s Electronic Identification, Authentication and Trust Services (eIDAS) initiative, which created tension with existing browser-based trust hierarchies. Mueller described this as a political clash between governmental authority and established technical community governance structures, where the European Commission attempted to intervene in web authentication processes controlled by major technology companies including Google, Apple, and Microsoft.


## Legal Entity Identifiers: Regulatory Approach


Vagisha Srivastava presented detailed research on Legal Entity Identifiers, which emerged from regulatory mandates following the 2008 financial crisis. The LEI system was created by the Financial Stability Board and G20 to address transparency and verification problems in cross-border financial transactions.


Srivastava explained the LEI governance structure: the Financial Stability Board established the Regulatory Oversight Committee (ROC), which oversees the Global Legal Entity Identifier Foundation (GLEIF), which in turn manages local operating units that issue LEI codes to legal entities.


Her research revealed critical challenges with certificate lapses due to insufficient user incentives for renewal. Financial organizations often fail to maintain current LEI certificates, undermining the system’s verification purposes. This led to the insight that regulatory mandates alone are insufficient – effective systems require user incentives and infrastructural integration for ongoing effectiveness.


## African Perspectives


Benjamin Akinmoyeje began presenting on Africa’s digital identity landscape, noting that over 500 million people in Africa lack verifiable legal identities, creating barriers to accessing essential services. He mentioned multiple initiatives developing across the continent, including the World Bank’s ID for Development project and the African Union’s digital transformation strategy.


*Note: The transcript appears to become incomplete during Benjamin’s presentation and becomes unclear toward the end, limiting the available information about his full contribution to the discussion.*


## Project Significance


The discussion positioned digital identity governance as a critical but understudied component of Internet governance. The research project aims to examine how private organizations and government agencies interact within the global governance landscape to deploy online identity systems, addressing the complex reality where traditional boundaries between public and private authority are increasingly blurred.


The project’s multi-stakeholder approach and focus on three distinct identifier systems provides concrete case studies for examining broader questions about authority, trust, and governance in digital environments. The inclusion of Global South perspectives ensures the research addresses questions of inclusion and digital equity alongside technical governance challenges.


## Conclusion


This launch discussion established the scope and methodology of a research project examining digital identity governance through three specific case studies. The conversation highlighted the complexity of digital identity systems and demonstrated the need for understanding how different governance approaches operate across various contexts and jurisdictions. The research represents an effort to fill a significant gap in understanding how these fundamental systems are governed and their implications for the broader Internet ecosystem.


Session transcript

Dr. Milton Mueller: This is a session on digital identifiers, and it represents a launch of a research project that is being funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech. And I want to begin by introducing Upasana, who is with the Internet Society Foundation, and she will introduce you to the foundation and the way they are supporting research.


Upasana Hembram: Hello, everyone. Good morning to everyone present in Oslo. Good afternoon. Good evening to all those joining virtually. Thank you all for gathering here to attend this session about launching this study on governing online identities. As you all know, the fundamental of our digital interaction these days is essentially built on trust, and a lot of it is dependent on authenticating identity, and this involves several complex technical systems and governance arrangements that are constantly developed in order to assign proof and verify identity. And since these identity systems profoundly influence how transparent, secure, and trustworthy the Internet can be, I don’t think they should be viewed as merely technologies that run in the background, but as a fundamental instrument of public trust. At Internet Society and the Internet Society Foundation, our vision is an Internet for everyone, and we strongly believe that the Internet should be open, secure, safe, trustworthy, and community-centered. Through our various grant programs at the Internet Society Foundation, we have been championing organizations and changemakers who have been working towards this mission, and specifically through our research grant program, we encourage experimentation, innovation, and explorations that can help us deepen our understanding of the critical functions that keep the Internet running, and also help ideate various solutions that can strengthen and safeguard the core principles of an open and trustworthy Internet. So we’ve partnered with the Internet Governance Project at Georgia Tech to do exactly that. The digital identity system, despite the emerging lack of trust in today’s digital world, happens to be an understudied area of Internet governance, but it has deep implications for privacy, security, and trust in today’s Internet economy. And amidst this evolving geopolitical landscape, this study, which has been supported by the Internet Society Foundation’s research grant, will examine how private actor-led organizations and government agencies interact in the global governance landscape to deploy online identity. And our hope with this study is that it can enhance our understanding of the dynamics that are involved, and what that means for the broader Internet ecosystem. This study particularly looks at WebPKI, LEI, and RPKIs, which will be discussed in greater detail by the presenters today. And while these don’t make newsflash, like eyeball-grabbing headlines, they are very critical in shaping some of the most foundational aspects of digital interactions today via trust and safety. Now, why should somebody care about this study, and how does it relate to Internet governance? This study takes a closer look at identity regimes across different jurisdictional contexts, and it sheds light on how the effects of these different policy options within these jurisdictions have implications on the global Internet governance landscape. The insights from these different case studies can help us understand why some decisions were made, how they were made, how they were implemented, and perhaps what are some of the outcomes that they produce, which will eventually help us, especially key decision makers in government and policy, public policy, make decisions on how to allocate resources around investment decisions, et cetera. Lastly, I would like to close off by saying that the future of Internet governance does not mean to be built solely on laws and regulations. It should be through open, multi-stakeholder models that truly reflect the public interest, and this study tries to go deep into the governance of online identity and does exactly that.


Dr. Milton Mueller: Thank you. Let’s go back now to, by the way, that’s Karim Farhat up there. He’s in the United States, and he’s part of the project. So let me just begin by introducing the basic topic. You see these blobs on the left, and that kind of represents objects in cyberspace, which could be any number of things. It could be servers, it could be machines, it could be devices, it could be people. And in cyberspace, you simply do not know what these things are without some kind of a identification and authentication system. So we’re studying that process, and we’re looking at it, how do I change the slides? Like that? Next slide. Okay. So one of the important things about digital identifiers, and they could be, again, for anything, is that they require some kind of system of trust and authority. And the interesting thing about cyberspace is that it is changing the authority relationships in new ways. So where does the authority reside? Who can you trust when you’re authenticating online identity? And so that is three different identifier systems that we have chosen to study. One of them is the RPKI, which is about trusting routing announcements. Another is about the WebPKI. And another is about legal entity identifiers, which is a new system of identifiers being developed by a new international organization. Now, I’m going to talk a little bit about RPKI. We don’t have a lot of time. Obviously, this is a very complex topic. But RPKI is a way of authenticating routing announcements, or actually authenticating who actually is the legitimate holder of an IP address block. The Regional Internet Registry has issued certificates, digital certificates, that allow you to authenticate this. And there’s been some controversy about how quickly this is being implemented and how effective it is as a method of ensuring routing security. And so one of the things that interests us is the degree to which governments get involved in either requiring or using RPKI. And so one of the things we’ll be looking at is a recent U.S. Federal Communications Commission proceeding in which the FCC, for a while, thought it was going to intervene and start requiring RPKI among Internet service providers in the United States, and ultimately backed off and decided it didn’t have the authority to do that. But that’s one of these ways in which state authority is mixing with the The EIDAS is another area in which we will be looking closely at an intersection of government power and Internet community self-governance. This is the web authentication process and recently the European Commission tries to intervene in this by saying we’re going to create a European system of digital certificates and we will decide who you can trust and they clashed with the existing platform-based trust hierarchy primarily centered in the browser manufacturers, that is to say Google, Apple, Microsoft and so on and there was a big political clash over that and so we’re going to be looking at that controversy in detail. And now I’m going to turn it over to, we don’t have time to go into all this, organizational identity. I’ll turn it over to Vagisha Srivastava who is a PhD student at Georgia Tech and she’s handling part of the research on legal identity identifiers.


Vagisha Srivastava: I and Karim, my colleague, who’s online, we are looking at the legal entity identifiers which is kind of a unique choice in our study because this is one of those organizational entity that was not created by the technical community, bottoms up, but it was a top-down approach created by the FSB, the financial standards board in the G20. So one of the problems that led to the creation of this was identified post-financial crisis where a lack of transparency and verification needed for, you know, financial entities was missing. So there was an asymmetric information problem that led to a market failure where especially for cross-border transactions, verification and authentication was very, very difficult. So between 2008 and 2012, G20 convened and they decided that we need an entity identifier norm and regulation which led to the creation of GLEIF, we can go to the next slide. And LEIs basically fill that gap. They provide a standardization requirement for financial entities so that they can be verified which go through a list of procedures and check and then they can participate in local transactions and also cross-border transactions. It’s mandatory for cross-border transactions but not so much for if you want to make domestic transactions. So they did improve transparency and risk mechanisms. So you can see the FSB led to RAC which led to the creation of GLEIF which is like a non-profit entity that then leads to the creation of local operating units that issue LEIs in domestic markets. You can go to the next slide. The current status remains that the uptake is huge, one because it’s compulsory for any entity that wants to participate in cross-border transactions. But one of the problems that we observed was that there’s a lot of lapse certificate which basically means that these financial organizations don’t have the incentive to keep on renewing which means that the information that is associated with these identities gets lapsed and therefore it’s not current which then leads to a problem which we began with that you cannot verify or authenticate these entities with credible information. So LEIs in our cases, and I’ll stop just here, which is LEIs in our case reveal something very important which is global standards need not just regulatory pressure but user incentives and infrastructural integration for them to keep on going and that’s what we are focusing on within this study.


Benjamin Akinmoyeje: Okay. So next we want to bring up Benjamin Akinmoyeje Akinmoye from Nigeria. Benjamin Akinmoyeje is not a researcher for us but he is somebody involved in ICANN from the standpoint of Africa and so he’s been working with digital identifier policy. Benjamin Akinmoyeje, can you talk about your perspective on this for about five minutes? Yes. Thank you very much. Can you hear me? We can hear you. Can you bring his picture up on the screen or is he not showing video? Oh. There we go. Okay. We got you. Yes. Is it possible for me to share my slide? I have a more detailed slide if you don’t mind. I don’t know whether the, yes, you can share your slides. Okay. Thank you. Do you see my screen?


Dr. Milton Mueller: No, we just see you which is perfectly fine. You look great. So.


Benjamin Akinmoyeje: Thank you. Good morning, everybody, and thank you for the opportunity to have me here. So I’m going to be talking about the relevance of digital identifier and the governance around it from the perspective of Global South and from someone living in Africa. So this space is really dynamic because of the enormous innovation going on for primarily for inclusion, access to services, and all of that. And in order to understand what is happening, at least I know that on the continent, statistics show that over 500 million people are yet to have some form of verifiable identity, legal IDs that they can build access to. So from that perspective, and then there’s this huge push for everybody to go online and there’s so much technology optimizing, you know. So there has been interesting projects on the continent. So when you look out some form of research around this, you’re going to find that World Bank has a big project going on, ID for Identification for Development, and it has like 49 countries already on board, and Rwanda and Nigeria are participants of this. And they are really going hard at this and getting more individuals registered, providing the guidelines so that we can have credible identifications that can work online as well. Then there’s this project, ID for Africa. This really goes across the continent, getting different national organizations responsible for either national identifiers like identification schemes to be on board. And then also African Union has their digital transformation strategy. And fundamental, foundational to this is the identifications, legal identification across different countries. So they give like a roadmap. Also regionally, like ECOWAS, you’ll find something like national biometric ID cards. So all of this, I’m just trying to show you how very rapidly moving these things are. Then on top of this, and you can see the motivation for this, because AFICTA, which is Africa Free Trade Agreement, is hoping to build essentially on digital innovations and how can we do trade across the continent. But the major concern is interoperability of this framework, because different countries talking to different vendors, different to get the ID. Benjamin Akinmoyejejamin Akinmoyeje, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer,


Dr. Karim Farhat: Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer,


Michael Palage: Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat,


Dr. Milton Mueller: Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat,


U

Upasana Hembram

Speech speed

114 words per minute

Speech length

565 words

Speech time

295 seconds

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations

Explanation

Hembram advocates for Internet governance approaches that involve multiple stakeholders and serve the public interest, rather than relying exclusively on legal and regulatory frameworks.


Evidence

She references the Internet Society Foundation’s support for research that can help strengthen and safeguard core principles of an open and trustworthy Internet


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Legal and regulatory


Agreed with

– Dr. Milton Mueller
– Vagisha Srivastava

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


Disagreed with

– Vagisha Srivastava

Disagreed on

Top-down vs. Bottom-up Governance Approaches


D

Dr. Milton Mueller

Speech speed

91 words per minute

Speech length

675 words

Speech time

443 seconds

Objects in cyberspace cannot be identified without proper identification and authentication systems

Explanation

Mueller explains that in cyberspace, entities like servers, machines, devices, or people are essentially unknown without some form of identification system to verify what they actually are.


Evidence

He uses visual representation of ‘blobs’ in cyberspace that could represent any number of things – servers, machines, devices, or people


Major discussion point

Digital Identity Systems as Fundamental Infrastructure


Topics

Digital identities | Infrastructure


Agreed with

– Upasana Hembram

Agreed on

Digital identity systems are fundamental infrastructure for trust and security online


Cyberspace is changing authority relationships in new ways, raising questions about where authority resides and who can be trusted

Explanation

Mueller argues that digital identifier systems require trust and authority structures, but cyberspace is fundamentally altering traditional authority relationships, creating new questions about legitimacy and trust.


Evidence

He points to three different identifier systems being studied: RPKI for routing announcements, WebPKI, and legal entity identifiers


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication

Explanation

Mueller describes how the European Commission attempted to create its own system of digital certificates and decide who can be trusted, which conflicted with existing platform-based trust hierarchies centered in browser manufacturers.


Evidence

The EIDAS regulation where the European Commission clashed with existing trust hierarchy primarily centered in browser manufacturers like Google, Apple, and Microsoft


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


The FCC initially considered requiring RPKI among Internet service providers but ultimately backed off due to lack of authority

Explanation

Mueller cites a case where the U.S. Federal Communications Commission considered intervening to require RPKI implementation among ISPs but eventually decided it didn’t have the authority to do so.


Evidence

A recent U.S. Federal Communications Commission proceeding where the FCC initially thought it would intervene in requiring RPKI among Internet service providers


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


The study examines how private actor-led organizations and government agencies interact in global governance to deploy online identity

Explanation

Mueller outlines the research project’s focus on understanding the dynamics between private organizations and government agencies in the global governance landscape for online identity deployment.


Evidence

The study is supported by the Internet Society Foundation’s research grant and focuses on WebPKI, LEI, and RPKIs


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Legal and regulatory


Agreed with

– Upasana Hembram
– Vagisha Srivastava

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


The research focuses on three specific identifier systems: WebPKI, LEI, and RPKI to understand governance dynamics

Explanation

Mueller explains that the research project examines three distinct digital identifier systems to understand how governance works across different contexts and authority structures.


Evidence

RPKI for authenticating routing announcements, WebPKI for web authentication, and legal entity identifiers developed by international organizations


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Infrastructure


V

Vagisha Srivastava

Speech speed

142 words per minute

Speech length

404 words

Speech time

170 seconds

LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems

Explanation

Srivastava explains that Legal Entity Identifiers are distinctive because they were created through a top-down regulatory approach by the Financial Standards Board and G20, contrasting with typical technical community-driven bottom-up development.


Evidence

The system was created by the FSB (Financial Standards Board) in the G20 rather than emerging from technical communities


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Legal and regulatory


Agreed with

– Upasana Hembram
– Dr. Milton Mueller

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


Disagreed with

– Upasana Hembram

Disagreed on

Top-down vs. Bottom-up Governance Approaches


LEIs were created to address transparency and verification problems identified after the 2008 financial crisis

Explanation

Srivastava describes how the 2008 financial crisis revealed problems with asymmetric information and lack of transparency in verifying financial entities, especially for cross-border transactions, leading to the creation of LEIs.


Evidence

Between 2008 and 2012, G20 convened and decided an entity identifier norm and regulation was needed, leading to the creation of GLEIF


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Economic


Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective

Explanation

Srivastava argues that while LEI uptake is high due to mandatory requirements for cross-border transactions, many certificates lapse because organizations lack incentives to renew them, revealing that successful global standards require more than just regulatory mandates.


Evidence

There are many lapsed certificates because financial organizations don’t have incentive to keep renewing, leading to outdated information that defeats the original verification purpose


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Legal and regulatory


B

Benjamin Akinmoyeje

Speech speed

81 words per minute

Speech length

572 words

Speech time

419 seconds

Over 500 million people in Africa lack verifiable legal IDs, creating barriers to accessing services

Explanation

Akinmoyeje highlights the massive scale of the digital identity challenge in Africa, where hundreds of millions of people cannot access services due to lack of verifiable identification in an increasingly digital world.


Evidence

Statistics showing over 500 million people on the continent are yet to have some form of verifiable identity or legal IDs


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Multiple initiatives are rapidly developing across Africa including World Bank’s ID for Development project and African Union’s digital transformation strategy

Explanation

Akinmoyeje describes the dynamic landscape of digital identity initiatives across Africa, with various international and regional organizations working to establish identification systems and digital transformation strategies.


Evidence

World Bank’s ID for Development project with 49 countries including Rwanda and Nigeria, ID for Africa project, African Union’s digital transformation strategy, and ECOWAS national biometric ID cards


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Interoperability remains a major concern as different countries work with different vendors for ID systems

Explanation

Akinmoyeje identifies interoperability as a critical challenge because different African countries are working with different vendors to develop their ID systems, potentially creating compatibility issues for cross-border interactions and trade.


Evidence

The concern is raised in context of AFICTA (Africa Free Trade Agreement) which hopes to build on digital innovations for continental trade


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Agreements

Agreement points

Digital identity systems require complex governance structures involving multiple stakeholders

Speakers

– Upasana Hembram
– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


The study examines how private actor-led organizations and government agencies interact in global governance to deploy online identity


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Summary

All speakers acknowledge that digital identity governance involves complex interactions between various stakeholders including governments, private organizations, and technical communities, requiring multi-stakeholder approaches rather than single-authority solutions


Topics

Digital identities | Legal and regulatory


Digital identity systems are fundamental infrastructure for trust and security online

Speakers

– Upasana Hembram
– Dr. Milton Mueller

Arguments

Objects in cyberspace cannot be identified without proper identification and authentication systems


Digital identity systems profoundly influence how transparent, secure, and trustworthy the Internet can be and should not be viewed as merely background technologies


Summary

Both speakers emphasize that digital identity systems are not just technical tools but fundamental infrastructure that determines the trustworthiness and security of the entire Internet ecosystem


Topics

Digital identities | Infrastructure


Similar viewpoints

Both speakers recognize the tension between top-down governmental/regulatory approaches and bottom-up technical community governance in digital identity systems, highlighting different models of authority and control

Speakers

– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Topics

Digital identities | Legal and regulatory


Both speakers identify implementation challenges in digital identity systems, emphasizing that successful deployment requires more than just regulatory mandates and must address practical issues like user incentives and system compatibility

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Interoperability remains a major concern as different countries work with different vendors for ID systems


Topics

Digital identities | Development


Unexpected consensus

Limitations of purely regulatory approaches to digital identity governance

Speakers

– Upasana Hembram
– Vagisha Srivastava
– Dr. Milton Mueller

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


The FCC initially considered requiring RPKI among Internet service providers but ultimately backed off due to lack of authority


Explanation

Despite representing different perspectives (foundation, academic research, and policy analysis), all speakers converge on the view that regulatory approaches alone are insufficient for effective digital identity governance, requiring broader stakeholder engagement and practical implementation considerations


Topics

Digital identities | Legal and regulatory


Overall assessment

Summary

The speakers demonstrate strong consensus on the fundamental importance of digital identity systems as critical infrastructure, the need for multi-stakeholder governance approaches, and the limitations of purely regulatory solutions. They agree on the complexity of governance challenges and the need for balanced approaches between different authority models.


Consensus level

High level of consensus on core principles and challenges, with complementary rather than conflicting perspectives. This suggests a mature understanding of digital identity governance issues across different stakeholder communities, which could facilitate collaborative approaches to addressing the identified challenges in policy development and implementation.


Differences

Different viewpoints

Top-down vs. Bottom-up Governance Approaches

Speakers

– Upasana Hembram
– Vagisha Srivastava

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Summary

Hembram advocates for multi-stakeholder, bottom-up governance models, while Srivastava presents LEIs as an example of successful top-down regulatory approach, though she notes challenges with this model


Topics

Digital identities | Legal and regulatory


Unexpected differences

Effectiveness of Regulatory Mandates

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Multiple initiatives are rapidly developing across Africa including World Bank’s ID for Development project and African Union’s digital transformation strategy


Explanation

Srivastava’s research shows that regulatory mandates alone are insufficient (citing LEI certificate lapses), while Akinmoyeje presents multiple regulatory initiatives as positive developments, creating an implicit tension about the effectiveness of regulatory approaches


Topics

Digital identities | Legal and regulatory | Development


Overall assessment

Summary

The discussion reveals subtle tensions between different governance philosophies – top-down regulatory approaches versus bottom-up technical community governance, and questions about the effectiveness of mandatory systems versus incentive-based approaches


Disagreement level

Low to moderate disagreement level. This was primarily a research presentation rather than a debate, so disagreements are more implicit and philosophical rather than direct confrontations. The implications suggest ongoing challenges in finding the right balance between regulatory oversight and technical community self-governance in digital identity systems


Partial agreements

Partial agreements

Similar viewpoints

Both speakers recognize the tension between top-down governmental/regulatory approaches and bottom-up technical community governance in digital identity systems, highlighting different models of authority and control

Speakers

– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Topics

Digital identities | Legal and regulatory


Both speakers identify implementation challenges in digital identity systems, emphasizing that successful deployment requires more than just regulatory mandates and must address practical issues like user incentives and system compatibility

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Interoperability remains a major concern as different countries work with different vendors for ID systems


Topics

Digital identities | Development


Takeaways

Key takeaways

Digital identity systems are fundamental infrastructure that should be viewed as instruments of public trust rather than mere background technologies


Cyberspace is fundamentally changing authority relationships, creating new questions about trust and governance between government power and Internet community self-governance


The research project will examine three specific identifier systems (WebPKI, LEI, and RPKI) to understand how private organizations and government agencies interact in global digital identity governance


Legal Entity Identifiers (LEIs) demonstrate that global standards require not just regulatory pressure but also user incentives and infrastructural integration to remain effective


Africa faces significant digital identity challenges with over 500 million people lacking verifiable legal IDs, while multiple rapid development initiatives are creating interoperability concerns


Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than relying solely on laws and regulations


Resolutions and action items

The Internet Society Foundation has funded the Internet Governance Project at Georgia Tech to conduct research on digital identity governance


The research team will examine specific case studies including the FCC’s RPKI proceeding and the European Commission’s intervention in web authentication


Vagisha Srivastava and Karim Farhat will focus on researching Legal Entity Identifiers (LEI) systems


Benjamin Akinmoyeje will provide perspective on digital identifier policy from the African/Global South context


Unresolved issues

The fundamental question of where authority should reside in digital identity systems remains unresolved


Interoperability challenges across different national digital identity systems, particularly in Africa where different countries work with different vendors


The problem of lapsed LEI certificates where financial organizations lack incentives to renew, leading to outdated verification information


How to balance government regulatory authority with Internet community self-governance in digital identity systems


The effectiveness and implementation speed of RPKI as a method for ensuring routing security


Suggested compromises

N


o


n


e


i


d


e


n


t


i


f


i


e


d


Thought provoking comments

In cyberspace, you simply do not know what these things are without some kind of a identification and authentication system… the interesting thing about cyberspace is that it is changing the authority relationships in new ways. So where does the authority reside? Who can you trust when you’re authenticating online identity?

Speaker

Dr. Milton Mueller


Reason

This comment reframes digital identity from a technical problem to a fundamental question of power and authority. It highlights that digital identity systems aren’t just about verification but about who gets to decide what constitutes legitimate identity – a deeply political question that challenges traditional notions of sovereignty and control.


Impact

This framing established the conceptual foundation for the entire discussion, shifting it from technical implementation details to governance implications. It set up the tension between traditional authority structures and new digital power dynamics that would be explored through each case study.


LEIs in our case reveal something very important which is global standards need not just regulatory pressure but user incentives and infrastructural integration for them to keep on going

Speaker

Vagisha Srivastava


Reason

This insight challenges the assumption that top-down regulatory mandates are sufficient for successful digital identity systems. It reveals a critical gap between policy intention and practical implementation, highlighting that compliance alone doesn’t ensure system sustainability or effectiveness.


Impact

This observation introduced a crucial dimension to the discussion – the difference between mandated adoption and meaningful, sustained use. It shifted the conversation from focusing solely on governance structures to considering the practical incentives and infrastructure needed for digital identity systems to actually work in practice.


The digital identity system, despite the emerging lack of trust in today’s digital world, happens to be an understudied area of Internet governance, but it has deep implications for privacy, security, and trust in today’s Internet economy

Speaker

Upasana Hembram


Reason

This comment identifies a significant research gap while simultaneously highlighting the paradox that as trust becomes more critical online, the systems that enable that trust remain poorly understood from a governance perspective. It positions digital identity as foundational infrastructure rather than background technology.


Impact

This framing justified the research project’s importance and established digital identity systems as deserving serious academic and policy attention. It elevated the discussion from technical implementation to strategic Internet governance, setting the stage for examining how these systems shape broader digital interactions.


Statistics show that over 500 million people are yet to have some form of verifiable identity, legal IDs that they can build access to… but the major concern is interoperability of this framework, because different countries talking to different vendors

Speaker

Benjamin Akinmoyeje


Reason

This comment brings a crucial Global South perspective that highlights how digital identity governance isn’t just about managing existing systems but about inclusion and access. It reveals how fragmented approaches to digital identity can perpetuate rather than solve exclusion problems.


Impact

This intervention broadened the discussion beyond the technical governance of established systems to include questions of digital inclusion and the risks of creating incompatible identity silos. It added urgency to the governance questions by showing real-world consequences of poor coordination in digital identity systems.


Overall assessment

These key comments collectively transformed what could have been a narrow technical discussion into a comprehensive examination of power, authority, and inclusion in digital identity governance. Mueller’s framing of authority relationships established the theoretical foundation, while Srivastava’s insight about the gap between regulation and implementation added practical nuance. Hembram’s identification of the research gap legitimized the inquiry’s importance, and Akinmoyeje’s Global South perspective ensured the discussion remained grounded in real-world implications for digital inclusion. Together, these comments shaped a discussion that moved fluidly between theoretical governance questions and practical implementation challenges, demonstrating how digital identity systems sit at the intersection of technology, policy, and social equity.


Follow-up questions

How quickly is RPKI being implemented and how effective is it as a method of ensuring routing security?

Speaker

Dr. Milton Mueller


Explanation

This was identified as a controversial topic that interests the research team, particularly regarding the speed of implementation and effectiveness of RPKI for routing security


What is the degree to which governments get involved in either requiring or using RPKI?

Speaker

Dr. Milton Mueller


Explanation

This represents a key research focus on the intersection of government authority and technical infrastructure governance


Why don’t financial organizations have incentives to keep renewing their LEI certificates, leading to lapsed information?

Speaker

Vagisha Srivastava


Explanation

This addresses a critical problem where the lack of renewal incentives undermines the verification and authentication purpose of LEIs


How can global standards achieve not just regulatory pressure but also user incentives and infrastructural integration for sustainability?

Speaker

Vagisha Srivastava


Explanation

This emerged as a key finding from the LEI case study about what’s needed for global digital identity standards to be successful long-term


How can interoperability be achieved across different African countries’ digital identity frameworks when they’re working with different vendors?

Speaker

Benjamin Akinmoyeje


Explanation

This represents a major concern for digital identity implementation across Africa, where different countries are adopting different technical solutions that may not work together


What are the detailed outcomes and implications of the political clash between the European Commission’s eIDAS system and existing browser-based trust hierarchies?

Speaker

Dr. Milton Mueller


Explanation

This was mentioned as an area the research will examine in detail, representing a significant conflict between government power and Internet community self-governance


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Open Forum #17 AI Regulation Insights From Parliaments

Open Forum #17 AI Regulation Insights From Parliaments

Session at a glance

Summary

This discussion focused on AI regulation from a parliamentary perspective, featuring representatives from the European Union, Egypt, and Uruguay discussing their respective approaches to governing artificial intelligence. The panel was moderated by Arda Gerkens and organized by the Inter-Parliamentary Union, which has been actively tracking AI policy developments across 37 parliaments and recently adopted a resolution on AI’s impact on democracy and human rights.


Axel Voss from the European Parliament explained that the EU AI Act, completed in 2024, primarily focuses on high-risk AI systems including biometric identification, critical infrastructure, education, employment, law enforcement, and democratic processes. He emphasized the need for unified interpretation across EU member states and warned that democratic legislators are often too slow to keep pace with technological developments. Amira Saber from Egypt’s Parliament described introducing the first AI governance bill in her country, emphasizing the importance of data classification, ethical considerations, and balancing innovation with regulation. She highlighted the weaponization of AI in regional conflicts and stressed the need for extensive capacity building among parliamentarians.


Rodrigo Goni Romero from Uruguay outlined his country’s cautious approach, preferring to establish a general legal framework while observing developments in larger jurisdictions before implementing detailed regulations. Multiple participants emphasized the challenge of balancing innovation incentives with necessary protections, particularly regarding deepfakes, misinformation, and the exploitation of vulnerable populations. The discussion revealed common themes across different regions: the need for parliamentary capacity building, multi-stakeholder approaches, youth engagement, and flexible regulatory frameworks that can adapt to rapidly evolving technology while maintaining strong ethical foundations and human rights protections.


Keypoints

## Major Discussion Points:


– **Current State of AI Regulation Across Different Regions**: The panel discussed varying approaches to AI regulation, with the EU having completed the AI Act focusing on high-risk systems, Egypt developing national AI strategy and draft legislation with emphasis on data classification and ethical considerations, and Uruguay taking a slower, consensus-based approach with general legal frameworks to avoid deterring investment.


– **Balancing Innovation with Regulation**: A central theme throughout the discussion was the challenge of creating regulatory frameworks that protect citizens from AI risks while still encouraging private sector investment and technological advancement. Panelists emphasized the need to incentivize AI development in crucial sectors like healthcare, education, and agriculture.


– **Implementation Challenges and Regulatory Bodies**: Participants raised critical questions about which entities should enforce AI regulations, noting that traditional telecommunications regulatory bodies are insufficient. The discussion highlighted the need for specialized AI governance bodies with proper authority and the challenge of creating enforceable regulations that hold up in courts.


– **Global Coordination vs. Local Adaptation**: The conversation addressed the tension between AI being a global technology requiring international coordination and the need for country-specific regulations that reflect local contexts, cultural norms, and institutional capabilities. Participants noted the lack of international AI law similar to cybersecurity frameworks.


– **Capacity Building and Education**: All panelists emphasized the critical importance of educating parliamentarians, policymakers, and citizens about AI technologies. They stressed that effective regulation requires deep understanding of the technology being regulated, and highlighted the need for continuous learning as AI rapidly evolves.


## Overall Purpose:


The discussion aimed to examine the role of parliaments in AI regulation and governance, sharing experiences and best practices across different countries and regions. The forum sought to address practical challenges parliamentarians face when developing AI legislation and to explore how democratic institutions can effectively govern rapidly evolving AI technologies while protecting human rights and promoting innovation.


## Overall Tone:


The discussion maintained a collaborative and constructive tone throughout, with participants openly sharing challenges and learning from each other’s experiences. The tone was serious and urgent, reflecting the gravity of AI’s impact on society, but remained optimistic about finding solutions through international cooperation and knowledge sharing. There was a notable shift toward more technical and practical concerns as the discussion progressed, with audience questions bringing focus to specific implementation challenges, enforcement mechanisms, and real-world harms that need immediate attention.


Speakers

**Speakers from the provided list:**


– **Arda Gerkens**: Moderator of the open forum on AI regulation and parliaments


– **Axel Voss**: German lawyer and politician from the Christian Democratic Union of Germany (CDU), Member of the European Parliament since 2009, Coordinator of the People’s Party Group in the Committee of Legal Affairs (2017), Shadow rapporteur on the AI Act, focuses on digital and legal topics


– **Amira Saber**: Egyptian Member of Parliament, Secretary General of the Foreign Relations Committee, National winner of the 2025 Study UK Alumni Awards (social action category), Alumni of the University of Sussex, Policy leader advocating for climate action, AI governance and youth empowerment, Part of ABNIC (African Parliamentary Network on Internet Governance)


– **Rodrigo Goni Romero**: Politician from Uruguay, Member of Partido Nacional, Represents the department of Salto, President of the Committee of the Future of the Parliament, Engaged with AI and democracy


– **Sarah Lister**: Co-director of governance, peace building and rule of law hub at UNDP, Provided closing remarks


– **Hossam Elgamal**: Private sector representative from Africa, MAG (Multistakeholder Advisory Group) member for four years


– **Yasmin Al Douri**: Co-founder and consultant at the Responsible Technology Hub (first European-led, youth-led non-profit focusing on bringing youth voice to responsible technology policy)


– **Meredith Veit**: Public work and human rights researcher with the Business and Human Rights Resource Center


– **Mounir Sorour**: From Bahrain


**Additional speakers:**


– **Participant** (Ali from Bahrain Shura Council): Mentioned that Bahrain drafted and approved the first AI regulatory law


– **Participant** (unnamed): Made comments about simplifying AI laws and keeping frameworks flexible


– **Participant** (unnamed): Discussed exploitation of children through internet and AI, published article on Ahram Center for Political and Strategic Studies about recruitment of children in extremism through AI and gaming


– **Andy Richardson**: IPU staff member mentioned as contact for AI tracking activities (referenced but did not speak)


Full session report

# Parliamentary Perspectives on AI Regulation: A Comprehensive Discussion Summary


## Introduction and Context


This discussion, moderated by Arda Gerkens, was held as part of the Internet Governance Forum (IGF) and brought together parliamentarians and stakeholders from across the globe to examine the critical role of parliaments in artificial intelligence regulation and governance. The forum was organised by the Inter-Parliamentary Union (IPU), which has been actively developing AI governance initiatives including an October 2024 resolution on AI’s impact on democracy, human rights, and the rule of law.


The IPU announced several concrete initiatives during the discussion: a monthly tracker starting February 2025 covering AI policy developments across 37 parliaments, and an upcoming November 28-30 event organised with Malaysia’s Parliament, UNDP, and the Commonwealth Parliamentary Association. The discussion featured representatives from the European Union, Egypt, Uruguay, and Bahrain, alongside civil society organisations, private sector representatives, and youth advocates, creating a multi-stakeholder dialogue on AI governance challenges.


## Current State of AI Regulation Across Different Regions


### European Union Approach


Axel Voss, representing the European Parliament as a CDU member and shadow rapporteur on the AI Act, provided insights into the EU’s comprehensive approach to AI regulation. The EU AI Act was completed “at the end of last Monday, so in 2024,” representing one of the world’s most ambitious attempts at regulating artificial intelligence through a risk-based approach.


The Act focuses on high-risk AI systems including biometric identification, critical infrastructure, education and vocational training, employment, essential private and public services, law enforcement, migration and border control management, and administration of justice and democratic processes. Voss emphasised concerns about implementation challenges, particularly the need for unified interpretation across EU member states to avoid the confusion experienced with GDPR.


Voss noted ongoing discussions about potentially postponing certain requirements, indicating implementation challenges even for completed legislation. He argued that “the democratic legislator is too slow for the technology developments” and advocated for framework-based approaches rather than detailed technical regulations, calling for legislators to “reduce our normal behaviour” and provide solutions within three months.


### Egyptian National Strategy


Amira Saber, representing Egypt’s Parliament as Secretary General of the Foreign Relations Committee, described her country’s efforts in developing AI governance frameworks. Egypt has developed a national AI strategy, and Saber introduced the first parliamentary draft bill on AI governance in the country, emphasising data classification and ethical considerations as foundational elements.


Saber highlighted the weaponisation of AI in regional conflicts, particularly referencing increased civilian casualties in Gaza due to AI-enhanced military systems. She stressed that “there is no one safe until everyone is safe,” connecting AI governance to broader questions of global security and collective responsibility, drawing parallels to lessons learned from the COVID-19 pandemic.


Her approach emphasises data classification as a prerequisite for effective AI regulation, treating national data as a valuable asset requiring protection and accountability measures. She described Egypt’s establishment of a Supreme Council on Artificial Intelligence and emphasised the need for these bodies to have authority to hold governmental entities accountable.


### Uruguay’s Cautious Consensus Approach


Rodrigo Goni Romero, representing Uruguay’s Parliament as President of the Committee of the Future, outlined his country’s deliberately cautious approach to AI regulation. Uruguay has chosen to establish general legal frameworks whilst observing developments in larger jurisdictions, with Goni Romero explicitly stating that Uruguay prefers to “go slow” and learn from others’ experiences.


This approach prioritises consensus-building and stakeholder engagement over rapid regulatory development, reflecting practical considerations about limited regulatory resources and the need to avoid deterring investment whilst ensuring appropriate oversight. Uruguay also emphasises preparation for AI’s impact on employment through capacity building and training programmes.


### Bahrain’s Regulatory Innovation


A participant from Bahrain’s Shura Council noted that Bahrain has drafted and approved what they described as “the first AI regulator law,” using the EU Act as a benchmark but making it simpler and more streamlined. This contribution highlighted how smaller nations can sometimes move more quickly than larger jurisdictions in developing AI governance frameworks.


## Key Challenges and Debates


### Balancing Innovation with Regulation


Throughout the discussion, the tension between promoting innovation and ensuring adequate protection emerged as a critical challenge. Amira Saber articulated this clearly, emphasising the need to avoid hindering investment whilst ensuring ethical AI use, particularly in sectors such as healthcare, education, and agriculture.


The challenge is particularly acute for developing countries that depend on foreign investment and technology transfer for AI development. Different speakers proposed various approaches to achieving this balance, from Egypt’s emphasis on clear ethical guidelines and data classification to Uruguay’s consensus-based approach and the EU’s comprehensive risk-based framework.


### Implementation and Institutional Capacity


Hossam Elgamal, representing the private sector perspective from Africa, raised critical questions about which entities should enforce AI regulations, noting that traditional telecommunications regulatory bodies are insufficient for comprehensive digital society regulation. He observed that “AI is global, it is not local,” highlighting the mismatch between global technology and national regulatory frameworks.


This institutional gap represents a fundamental challenge, as many countries lack the specialised regulatory bodies needed for effective AI oversight. The discussion revealed that creating effective regulation requires not only appropriate laws but also the institutional capacity to implement and enforce them.


### Democratic Processes and Technological Speed


A significant tension emerged between Axel Voss’s advocacy for faster legislative processes and Rodrigo Goni Romero’s preference for slower, consensus-based approaches. Voss argued that democratic legislators must accelerate their processes to keep pace with technology, whilst Goni Romero defended deliberative approaches that build stakeholder consensus.


This disagreement reflects fundamental differences in regulatory philosophy and the particular challenges faced by different types of countries in the global AI governance landscape.


## Human Rights and Social Impact


### Immediate Harms and Vulnerable Populations


Amira Saber provided vivid examples of AI’s immediate harms, particularly describing deepfake threats to women in conservative communities where AI-generated pornographic content could result in death threats. This powerful illustration demonstrated how AI risks intersect with existing social inequalities and cultural contexts in potentially fatal ways.


The discussion also addressed child exploitation through AI-powered platforms, with one participant describing how gaming platforms are being used for recruitment into extremism and radicalisation. These examples highlighted the urgent need for AI governance frameworks that address current harms rather than focusing solely on potential future benefits.


Meredith Veit, representing the Business and Human Rights Resource Centre, emphasised the importance of addressing actual harms happening now rather than being distracted by industry narratives about potential benefits, highlighting the need to maintain focus on protecting vulnerable populations.


### Generational Perspectives and Assumptions


One of the most significant moments occurred when Yasmin Al Douri, representing youth perspectives through the Responsible Technology Hub, directly challenged assumptions about young people’s digital literacy. When Axel Voss expressed “sorrow” that youth grow up in a world where they cannot rely on what they hear or read, Al Douri responded that “young people are way better at actually seeing what is deepfake and what is not.”


This exchange highlighted broader issues about generational assumptions in policymaking and the importance of including youth voices in AI governance discussions. Al Douri observed that young people are “always deemed as not knowing specific things when we’re actually really good at specific things,” revealing how generational biases can influence policy development.


## Data Governance and Accountability


### Data Classification as Foundation


Amira Saber consistently emphasised data classification as crucial for effective AI regulation, arguing that countries must establish clear frameworks for categorising data according to sensitivity levels before implementing comprehensive AI governance systems. This approach recognises that AI systems are fundamentally dependent on data and that effective AI governance requires robust data governance frameworks.


Hossam Elgamal reinforced this perspective by noting that many countries lack proper data exchange policies needed before implementing AI regulation, highlighting how AI governance builds upon existing digital governance frameworks.


### Accountability Frameworks


The discussion revealed significant challenges in establishing clear accountability frameworks for AI systems. Saber’s question about who should be held accountable when sensitive hospital data is leaked in AI systems illustrates the complexity of assigning responsibility in AI-enabled systems involving multiple actors across development and deployment phases.


## Capacity Building and Education


### Parliamentary Education Needs


All speakers emphasised the critical importance of educating parliamentarians about AI technologies. Amira Saber noted that effective regulation requires deep understanding of the technology being regulated, describing taking courses herself to better understand AI systems.


Axel Voss acknowledged the knowledge gap among current regulators, noting that many lack sufficient technical knowledge to effectively govern AI systems. This educational challenge is compounded by the rapid pace of AI development, requiring continuous learning rather than one-time training programmes.


### Broader Stakeholder Education


The discussion highlighted the need for broader public education about AI systems and their implications. This extends to civil society organisations, private sector actors, and other stakeholders who play important roles in AI governance ecosystems, as the multi-stakeholder nature of AI governance requires that all participants have sufficient understanding to contribute meaningfully.


## International Coordination and Future Directions


### Global Cooperation Challenges


Hossam Elgamal’s observation that “AI is global, it is not local” highlighted the fundamental challenge of governing global technology through national regulatory frameworks. His comparison with cybersecurity, where international law remains underdeveloped despite decades of effort, suggests that AI governance faces similar structural challenges.


Amira Saber proposed creating an “AI policy radar” similar to climate policy tracking systems to help parliamentarians understand global regulatory developments and learn from international experiences. This represents a practical approach to enhancing international coordination without requiring formal treaty arrangements.


### IPU’s Ongoing Role


Sarah Lister, UNDP co-director, emphasised in her closing remarks that AI governance is fundamentally a governance issue, not just a technological one. The IPU’s commitment to tracking parliamentary AI activities across 37 countries provides a foundation for continued knowledge sharing, with Andy Richardson identified as the contact for parliaments wanting to be added to the tracking list.


## Conclusions


The discussion revealed both the complexity of AI governance challenges and the potential for constructive international cooperation. While significant disagreements remain about regulatory timing and approaches, there was broad recognition of the need for capacity building, multi-stakeholder engagement, and frameworks that balance innovation with protection.


Key unresolved challenges include creating appropriate institutional capacity for AI governance, developing effective international coordination mechanisms, and ensuring that regulatory frameworks can address immediate harms while promoting beneficial AI development. The emphasis on youth engagement and multi-stakeholder approaches suggests that effective AI governance will require inclusive processes that incorporate diverse perspectives and expertise.


The IPU’s ongoing initiatives, including the monthly parliamentary tracker and upcoming collaborative events, provide concrete mechanisms for continued cooperation and knowledge sharing as countries navigate these complex governance challenges.


Session transcript

Arda Gerkens: here at the open forum where we will speak about the AI regulation and get some insight from parliaments. You’re not hearing me? Closer. Of course, you have to put your headsets on. This is what the workshop is about, yeah. I’ll give you some seconds to do so. And it’s non-translation, so it’s all English, channel one. Okay, thank you so much. I’m very happy to say that we have a beautiful panel today. Mr. Axel Voss, who is a member of the European Parliament, Miss Amira Saber, who is a member of the House of Representatives of Egypt, and Mr. Gonyi from Uruguay. Before we start, I would like to point out to some of the inter-parliamentarian union activities that have already been done on AI, but also will be happening in future. First of all, in October 2024, the IPU adopted a resolution on the impact of AI on democracy, human rights, and the rule of law. So any parliamentarians in here, or people who are working for any parliament, it’s a very interesting document to look at the resolution that has been adopted in October 2024 on the impact of AI on democracy, human rights, and the rule of law. And since 2025, the beginning of 2025, February, IPU began to publish a monthly tracker that monitors which parliaments are taking action on AI policy. So that’s legislation, committee inquiries… all that tracking is done by the IPU and it currently already covers 37 parliaments. So we we want to know if any parliaments here are missing from that list. If you have activities on AI, you want to be on the tracking list, you can reach out to Mr. Andy Richardson who is sitting here at the corner in front of me and he will add you to that list. And in this year, in November 28 to 20, the 30th of November, there will be a core organized event with the Parliament of Malaysia, UNDP and the Commonwealth Parliamentarian Association and that event is the role of Parliament in shaping the future of responsible AI. This will be published so you can see more about this activity and of course we hope that many parliamentarians will attend. And today from the UNDP is also here Ms. Sarah Lister. She is a co-director of governance, peace building and rule of law hub UNDP and she will make the closing remarks for today. So she won’t be speaking until the end, it’s not because I don’t want her to speak, it’s just because she’s going to listen and then conclude at the end. Okay, that’s for the normal remarks in the beginning. I would like to ask Mr. Axel Vos who is a German lawyer and he’s also a politician from the CDU, the Christian Democratic Union of Germany. He’s actually been serving as a member of the European Parliament since 2009 and you have been a coordinator of the People’s Party Group in the Committee of Legal Affairs in 2017 and you have been focusing your work on digital and legal topics, one of them being the shadow rapporteur on the AI Act. What is the current state of play with regard to AI regulation in Germany? the European Union.


Axel Voss: So, thanks a lot, and also thanks for the invitation and having me here. The situation is as follows. We’ve finished the whole AI Act, yeah, let’s say at the end of last Monday, so in 2024, and now the transition time will pass, so we have an additional part in force at the beginning of August. There’s a kind of discussion going on that this should be postponed and so on. There’s a request also from the American or US side, and so this is one thing, but the other thing is also that our companies need probably more time in adapting these, and so there’s a discussion going on just of focusing on the high-risk AI systems, so that might be postponed. It’s not decided yet, but the discussion is there, and the situation is, of course, we are concentrating in the AI Act, especially on the high-risk systems. This is not forbidden. This is allowed, but we are asking for more requirements for the deployer and also for the system itself, and of course, then it’s quite interesting to see or to notice what is an AI high-risk system, and here we have different options in place, so at first biometrical identification, we consider this as a kind of an AI high-risk system, critical infrastructure, also education and vocational training, so also the question of employment of workers, many and also self-employment, the access and enjoyment of essential private services and benefits, law enforcement also is some of these elements, migration, asylum and border control management is considered in a majority in our house for an AI high-risk system and also administration of justice and democratic processes, also this one is considered as an AI high-risk system and this is also something the whole AI Act is delivering some general additional remarks on AI but focusing more than less on AI high-risk systems and therefore then we are trying also to install or to simplify the lives of our businesses in installing so-called sandboxes. I have still the feeling if I may add this what we shouldn’t do and this is not 100% to my satisfaction that we should have only one interpretation of these provisions of the AI Act. We haven’t done this in the data protection regulation but here in the AI Act it’s extremely important that we have in the European single market only one interpretation of everything and otherwise we will be confused and the companies will be confused and this is quite important. Well I could agree with you more and


Arda Gerkens: also handling the GDPR at sometimes it’s it’s you need to interpret it so it’s very very It’s important that we have clear definitions. I’m looking forward to your work on that. Ms. Amita Saber, you are an Egyptian member of the Parliament and you are serving as the Secretary General of the Foreign Relations Committee. Quite impressive. And you are also a national winner of the 2025 Study UK Alumni Awards, the social action category alumni of the University of Sussex. So it’s quite impressive, right? You are a policy leader, you advocate for climate action, also a very important topic, AI governments and youth empowerment while you’re leading on foreign relations and social development. We’ve just heard from Mr. Axel Vos what’s happening in the European Union, but Europe and somewhere, and maybe you can elaborate a little bit more at what’s happening in your country on AI and regulation.


Amira Saber: Yeah, thank you so much. And it’s a pleasure to be talking on this panel amid esteemed colleagues. Actually in Egypt, we already have a strategy for AI which we have relaunched this year. So there is the boundaries of the national strategy. And I introduced to the Parliament the first draft bill on AI governance, which was very luckily endorsed by 60 other Egyptian MPs. The question of to regulate or not to regulate is a very big debate all across the world. And coming to my background on social democracy, I wanted to tackle the ethical part of which. How we can guarantee that the data is well classified accordingly, how to hold the provider, the entity, the government, everyone accountable according to the sensitivity of the data. Because if it comes to AI, which is basically functioning on the data and the data providers, the national data becomes a huge asset by itself. So if, for example, the data of a hospital in a far place in Egypt is leaked. Who should I hold accountable based on this? So what I tried to do based on the EU Act, by the way, because I introduced this bill like now and a year and a quarter ago, it was March 2024. And what was there in the space back then was the EU Act as the main regulatory bill, which is in the space. And we can like frame on and discuss especially that there was a huge debate between the two big schools of the US and the EU on the regulation. Because when you regulate, there is a constraint somehow on technologies advancement on investing in like crazy innovative ideas, because this might hold you accountable. And accordingly, you may pay fines, this will be a financial burden. So how to balance the innovation and incentivize the private sector to invest? Because we need the AI investments in healthcare in my country to a big deal. We need it in education, we need it in agriculture. And since our esteemed attendees today, many of which are parliamentarians, I’m not just talking about the legislative part of which I’m talking about the scrutinizing part as well. Because here comes the importance of capacitating parliamentarians. If you capacitate and educate parliamentarians on how they can use their tools to ask the different ministries, how they use the AI technologies in the different sectors to advance the work, to benefit as much as we can, the people in their country, this matters a lot. So the basic thing, which I am concerned with also is raising the awareness of the parliamentarians in my country and across the region. Actually, I’m also part of ABNIC, it’s the African Parliamentary Network on Internet Governance, an excellent African network which tries to raise the all the time, the knowledge and the exchange of experiences when it comes to data governance. So again, educate and capacitate, this is crucial. And then we discuss how it worked, because what works for Egypt definitely couldn’t work for other countries and vice versa, but there are experiences which we could always learn from and develop. So actually right away as well, there is another bill which is under progress. It could be governmental, because in Egypt we have the bills either introduced from the parliamentarians or from the government. So actually to my knowledge, there is a very big coordination, a very fruitful one between the Ministry of ICT and the Ministry of Judiciary, the Ministry which is actually concerned with judiciary, to coordinate between each other, how can they release a draft bill or how can they introduce a bill on AI governance. So the question of regulation for me, my priorities of which is how we can make it ethical, how we can focus on the sectors that matters, must and top, and how can we also incentivize the private sector, because my bill has certain incentives to get the private sector interest to invest in certain sectors actually on top of which are the ones which I prioritized during my talk now. So it’s a continuous learning process, but very honestly, after we have seen in the Middle East recently and the political consequences of the usage of AI when it is weaponized, because it has been weaponized recently in the war on Gaza, it has weaponized recently in the different wars in the region, this brings attention much more to how important the regulators, the policy makers, everyone who is a decision maker should be very much aware and capacitated on how. this develops touching the lives of thousands of people. There have been lots of reports circulating that when the IDF uses AI on the war in Gaza, this actually has raised the casualties of civilians being dead. So again, the question is political, the question is social, the question is on every aspect of how AI governance today is one of the most things which affects every aspect of our lives, no matter where we are.


Arda Gerkens: Well, this is a very warm way of saying that, the fact that AI has on our lives and especially in your region. And it’s very good to hear that you’re also there giving advice to other countries in your region and region. So maybe if there’s any parliamentarian here who would like to speak to Amira afterwards and get some advice, please make use of her. And in the meanwhile, I would like to, I hope you can hear me well, because my, okay, and it’s my headphones that not working well. Mr. Rodrigo Coño Romero, you are a politician from Uruguay. From Uruguay. And you belong to the Partido Nacional and you represent the department of Salto, right? Yes. Yes, and you have been engaged with AI and democracy. And also you have highlighted the importance of getting the parliaments in the debate on AI. You think that’s very important. Can you tell me what’s happening with the regulation on AI in your country?


Rodrigo Goni Romero: Yes. As Uruguay is a very small country in South America between biggest, big country, Argentina and Brazil, we are prioritized to be open to investment and focusing promoting, investing in AI. So in Uruguay and in neither country in Latin America have approved a law, an AI law as European Act, but in many countries there are many hundreds and hundreds of drafts. In Uruguay no, in Uruguay we prefer have passed a legal framework approved by all parties which self mandate us to develop regulation with the participation of all sectors and basis of consensus. Like I try to avoid to to do a bad signal for the investment so just approve a very very general legal framework that well we we started running to all stakeholders, academia, companies, technological companies and to develop the process very slow. I prefer go slow. I prefer observe that that they happen in Europe and US and maybe a bigger country like Brazil for


Arda Gerkens: example. Thank you very much. It’s interesting to hear that both of you also highlight the importance of having investment on AI and the dangers that you have. infringing on that investment when you have regulation maybe Axel you can tell a little bit about what progress has been achieved and do you see as apart from this challenges and risks with the AI regulation so we have to be aware


Axel Voss: that the digital future means that everything is more transparent is circular and also digital and this brings us all as a legislator under extreme pressure because it’s a challenge now to adapt the online world to the offline world somehow or vice versa and this of course what we are connecting with AI this is the fundament probably of everything else what is coming next so that’s why it is important to have kind of a frame how far you can go and what might not be part of AI systems so what is forbidden what is high risk and what is low risk and so on and so also there is a kind of a fear for shifting power from humans to machines so that’s why also we need to face these and there’s a thin line only between good purposes and bad purposes so that’s why we have the abilities with AI in widening our human abilities on the one hand side and organizational of societal possibilities the meaning of AI for health and climate change energy traffic administration security education future orientated research this is all what we have in mind that what we should go for And that’s why I would say there are a lot of challenges of having advantages also in using AI. On the other hand, of course, we are facing also a lot of risks because of this thin line. There is a risk for democracies, once again, this fear of loss of control. Then we are facing these arguments of surveillance machines, conspiracies, theories. There might be not an exchange of views and arguments any longer. What is then anti-democratic? The manipulation of the public opinions. This is also something fake news, disinformation for destabilizing countries. So, hurdles of attacking free and democracies and freedom is lower. So, even especially for the young people or youth generation, I would say it’s hard to differentiate what is real and what is not real. So, they can’t trust any longer what they are reading, seeing or hearing. So, that’s why this is a kind of a risk situation. You need to bring this somehow in a balancing situation that you are focusing on these advantages, what you can gain out of it and trying to reduce risks also. And this is what we are trying to do. Thank you, Axel.


Arda Gerkens: You just mentioned that for youth it’s hard to know what’s real, but maybe I’m not youth anymore. Sometimes I also feel it’s hard to know what’s real and what’s not. Amira, can you tell, do you also recognize that? What risks and challenges do you see?


Amira Saber: Absolutely. Actually, one of the biggest challenges is deepfake. Because deepfake is not just about how it affects the political space when it comes to elections and electoral campaigns and the manipulation of some political systems. It comes to everyone’s life, especially in some closed communities or communities which are still having their own strict cultural frameworks. Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed. And actually there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake. So this is affecting everyone’s life. You can ruin someone, you can ruin his life, his career, her life, her career, based on deepfake images, deepfake videos. And now, even during the war, the war in Iran, which is just a few days ago, we were doomed. Everyone was doomed with a massive amount of media, videos, photos, news, with a very fine line on how to verify this is true or not. So in today’s world, what we thought that it would more of empower us towards knowledge and towards edging this knowledge is actually questioning the amount of feeds which we have. Is it true or not? And this again brings a big, important question of how do we verify? And this also applies to education. How do a professor verifies that a certain research is AI generated or it’s done by the personal work of the student? So what is happening now is that I see also developments. on many levels when it comes to the models verification and when it comes to the content verification, is it AI generated or not? And this is why I say all the time, educate, educate, educate, capacitate, capacitate, capacitate. For politicians, for policymakers, and for the people, for everyone. Because it’s a multi-stakeholder thing. Because it’s a multi-stakeholder thing with all the parties involved in the development on this process. Everyone’s life is touched and is altered. And you can’t keep just away from it. However, whatever trials you are exerting in that track, you can’t. It’s embedded in your life. And the good thing now is that the ethical questions are being graced on every international table. I usually hear about different strategies that are now trying to regulate and to have a bold framing, which consequently have some legal responsibilities. If you are dealing with a classified data or you’re dealing with data that is of high risk, this should have immediately a kind of legal liability. Otherwise, it’s a case because it’s already a case which we really need to, it’s a case which is touching everyone’s life, which we really need to regulate. In my country and in my region, the beautiful thing is that there are thousands, I can say millions of young people who are very enthusiastic to get to learn all about AI. I myself, before developing the draftable, I went through different courses, crash ones. I had interviews, definitely because you can’t regulate something which you don’t know. Really good. At least. Take an example of what she did. Very good. You should have a deep dive. Actually, now I can’t pass a day without using at least three apps of AI, at least in my daily work. And it helps a lot. This is the beautiful face of it. But every coin has another side. And this other side, which we as regulators and decision makers should look at thoroughly. We should maximize the benefits of this technology, and we should also look at the risks. And in countries like mine and other countries, in even a position which is having stressful economic situations, the question of AI is the question of electricity, is the question of infrastructure, is a question of capacity building. So the divide is there. I don’t usually like to speak this language, but there is a divide which we all should cross, because this motto, if anyone remembers which of the SDGs, leaving no one behind, we just, you know, we just didn’t remember well as humans the lesson of COVID, when we stated that there is no one safe until everyone is safe. We just forgot about that. This applies to everything else. It applies to AI. There is no one safe until everyone is safe, and we have a responsibility to make it a safe space as possible, because definitely it’s going to be manipulated all the time for different purposes, for different reasons, politically and otherwise. But the real responsibility here is how to make it safe as much as possible. And the good news also is that countries in my region, like Saudi Arabia or UAE or Qatar, they are having a huge potential, like in my country, of young people who are eager to learn, who are eager to get even ahead of the curve of too many competitive setups and environments, which is really appreciated. And I always say that the private sector and the UN agencies have a huge duty to capacitate as much as possible and to get investors to highlight these important tracks, which touches everyone’s life.


Arda Gerkens: Well, thank you very much. I see there’s a question. If you hold on one second, sir, because I would like to pose a question to Mr. Rodrigo and then afterwards I will give the floor to you. So, please go ahead. I was talking about the progress and the challenges and the risks.


Rodrigo Goni Romero: Yes, we are focusing on developing a national strategy of AI to try to involve all the society in the risk, in the challenge, and very focused on capacity. I am the president of the Committee of the Future of the Parliament and I try to awareness to the people the risk of the future of the job. So, we put focus in prepare, capacity. I have to recognize in many perspectives that artificial intelligence have many risks to the job, many changes. So, we have to prepare. There is no magic way to face this risk. Just capacity, capacity, capacity. But many people don’t know about the risk. So, I think it’s our duty of the Parliament to awareness, to ask to prepare and to facilitate the program. Not just to the children, not just to the school, also to the worker. So, we are focusing this.


Arda Gerkens: Very good, thank you very much. The floor, please could you state your name and then your question.


Hossam Elgamal: Yes, my name is Hossam El Gamal. I’m private sector from Africa and I’m a MAG member. I have been MAG member for four years. Well, coming back, AI has been swiftly coming, and in fact it increased a lot the digital gap. We are facing power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability within the AI that would then build capacity for others as well. Many countries are working on building capacity, which is good, putting some strategy is good. But let me just ask a few questions for you to think about and answer. One thing is, what is the regulatory body that will implement? We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation. And going to AI and putting regulation for AI, who is going to implement the regulation? So we need along with building AI regulation to start thinking about the regulator and how we are going to do it. So to incentivize people to work in AI, but at the same time to put limitation to misuse of AI. Now second thing is, AI is global, it is not local, and same as cyber security. Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI, each country will try to start having its own regulation. But how we are going to implement it globally? Because generally data that will be used, whether fake or right. will be a global one. So again, international regulation, how is it going to handle this? And finally, a lot of countries in the South especially, in addition of lacking the power, they did not implement yet data exchange policy. So we need first to pass this point in order to be able to go to the next one. Thank you very much.


Arda Gerkens: Thank you very much. We will take one more question please, yes.


Participant: Thank you so much. My name is Ali from Bahrain Shura Council and I believe that Bahrain have drafted the first and got approved the first AI regulator, sorry, law for regulating the use of AI. We managed to do a framework that it combined a balance, which is that was the challenge between investors, getting investors and believe pushing the innovation and how to regulate the bad side of the use of the AI. But my question, I see in the neighbor’s country like Dubai and Saudi Arabia, like Dubai maybe they have a ministry of AI there currently. I think they are implementing also putting a member, an AI member in the parliament, but I don’t see them that they are regulating the AI. Are we doing a step forward, are we doing it ahead or is it we have to slow down on regulating the thing? That’s the question. Thank you.


Arda Gerkens: And the last question and then we’ll answer them all together because they are very much alike.


Yasmin Al Douri: I’ll keep it short. Good afternoon. My name is Yasmin Aldouri. I’m a co-founder and consultant at the Responsible Technology Hub. We’re actually the first European-led, youth-led non-profit that focuses on bringing the youth voice to responsible technology in the area of policy as well. my question is focused actually on Mr. Axel Voss. So your municipality is actually my hometown, so I’m really happy to see you, but also I had to think a little bit when you said that young people do not really understand or cannot really distinguish between news that might be disinformation or misinformation or can’t distinguish between deepfakes and I would definitely disagree specifically on my work with young people. I would even state that young people are way better at actually seeing what is deepfake and what is not and this shows a little bit the issue that we’re generally facing as a young generation. We are always deemed as not knowing specific things when we’re actually really good at specific things. So my question to you specifically for Europe is how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming? Thank you.


Arda Gerkens: Well very good questions all of them. I actually would like to give Amira first the floor on you know the the question of what regulatory body who is capable of enough of implementing this and also because you’re from the region for some very good points made by behind and it and also it’s it’s a global problem right so how do we make sure that legislation in one country has the same effect in the other and maybe we don’t want to have the same effect so how do you go about with this as a as a parliamentarian? First when it comes to


Amira Saber: the very important question from Mr. Hossam that was a challenge for me but in Egypt actually have recently a body which is the Supreme Council on Artificial Intelligence. By law they didn’t have the authority to actually may I say hold the governmental entities accountable this is what I tried to do in my draft bill to to give them the authority to hold every ministry accountable. And in Egypt, it’s very much intermingled because now, as I said, the Ministry of Justice and the Ministry of ICT, they are collaborating together towards another draft bill. And actually when it comes to every other ministry, was it education, health, whatever, they have also a mandate on advancing their services with AI technologies. So who could be the body? It should be a body which is actually just, you know, having the framework, the strategy, and it should be regulating it amongst all the other players, which in my case, I see in Egypt, the Supreme Council on Artificial Intelligence is a good entity to do that. So it depends a lot on the context, it depends a lot on the institutions and on the stage and the development of these institutions according to each and every country. But in that case, that’s how I see it in Egypt. For the comment and the question of Honorable Ali, first, congratulations. It’s so good music to my ear to hear that another Arab country has walked miles in that way and road because it’s, I see, a matter of sovereignty. It’s, I see, a matter which is touching everyone’s life. So any parliamentarian trial in that track is something which I very much appreciate. And for this, allow me, Arda, to just intensify a recommendation, which I said yesterday at one of the panels that we need to have in the space a kind of a policy radar for AI. That would be extremely knowledgeable for anyone who is accessing that on the level of policymaking to know what is happening in every region, what is happening in every country, and what do they have in place and what do they have in progress. So if we have such kind of radar, there is a climate policy radar. I wish there would be an AI policy radar. Any of the entities could sponsor that and it would be of great benefit for parliamentarians and decision makers so that I know and everyone knows what is happening in other countries. So, should we slow down or this is the question to regulate or not, but let’s at least classify the data. This is what I am very much concerned with because what is not classified couldn’t be easily regulated. So we have like broader things to think about when it comes to classification and to have a legal liability based on which and the other thing is not to slow down at all when it comes to incentivizing the ministries and asking them and doing this chronitizing job of making every ministry up to using AI for the good of the people in their mandate. So it’s like depending on the context, but again, at least the data classification is one crucial thing.


Arda Gerkens: You make a very good point on the data classification and I think that also answers the question. I think it is indeed worrying that there’s a lot of legislation still needed on this data exchange and that’s something that needs to be worked upon simultaneously. I would like to ask Mr. Axel Fos the question, the excellent question, how do we make the reality of youth in the legislation? So how do we connect it? And maybe you can take another question as well because there’s been some online questions, remote questions asked. Can AI help in mitigating the social impact of child abuse and gender related inequalities? It’s kind of a heavy question, but I thought as you are very much into the AIX, maybe you can stipulate something on it. So thank you.


Axel Voss: If I may start with my friend from the Rhineland, I do not, ah, over there. So what I mentioned shouldn’t be a kind of an insult. It was more, I feel sorrow that you are growing up in a world where you are not, can’t rely on something, what is saying or what you’re hearing or what you’re reading. So this is, so I grew up in a different century. So that’s why I would say it was more easy for me to find trust in. some of these elements. But the question of course is the now active regulators probably do not have the knowledge in a way in really understanding what’s going on. And probably sometimes I have the feeling the politicians might be a bigger problem than the technology because we are hindering sometimes some elements and especially if you’re dealing with digital laws then all of a sudden you have a totally different context instead of online laws. So that’s why it’s difficult. I hope that every parliament has someone dealing with these who is understanding a bit more than the average politician. Also if we are coming to this point and saying oh yes digital is very important and we need to develop something then probably nobody knows what to do. So that’s why we need to come forward with it and also to the others. The problem is so I speak for the European Union the democratic legislator is too slow for the technology developments. And so we are always behind. That’s why I’m I would, we can face this problem a bit more if we are saying we need to reduce the normal behavior of a democratic legislator. So meaning there should be a kind of a solution in place after three months. And otherwise we are losing track of this problem and if we are once ready with a law then it might be a kind of a different problem already occurring. So, we need to be faster and we need probably not to be detailed all the time. It’s more a kind of a frame what we should have with ethical aspects or a kind of value-orientated frame and then you might have the time, as everyone knows, if I’m in the frame, everything is okay. If I’m outside the frame, you will face trouble. So this might be a kind of a better way forward. So I’m asking sometimes myself, shouldn’t we instead of focusing on all these risks and avoiding these, shouldn’t we just ask ourselves what we are expecting from AI? This is a more positive approach probably in saying what we are expecting and we do not want to see other things. So that’s why it might help in a kind of a better way. So data exchange policy, what was mentioned, or the second question? Can it help in mitigating the social impact of gender-related abuse and gender-related inequalities? Yes. I would say it can, but of course you need to have a kind of a plan in mind how to do this. I would say it’s not coming as a kind of a stereotype behavior, so no, you have to concentrate on it and also it can help everyone in mitigating these problems, I would say. But of course you need to be very careful in what are the conditions at the end in formulating these.


Arda Gerkens: So, yeah, basically it’s what I hear you say, that as a parliament you should avoid being too detailed. Yes. But make sure that you have a framework here. Also a philosopher comes to mind, Mr. Wittgenstein, who once said, if you don’t know what you’re talking about, you shouldn’t speak on it. I hear both of you say, maybe as a politician, parliamentarian, this time you should put a little extra effort in understanding AI, because it’s so important. Do you think that the parliaments now, it’s a question also from remotes, that they are kind of shaping their own AI policies, or are they just looking at what somebody else is proposing? You already said that you took the AI Act as an example. I depended on too many sources, of which, because it was in the space then as a legislation, I definitely had a deep dive on what the EU Act had. And how about you, Axel, the European Union, they started fresh, or did they look at other examples? No. There are not many examples in there. You were the first. Yeah. They were the first, yeah, but you’re the first. I followed them. You followed them. OK, so. I went to one. Right.


Axel Voss: It’s very detailed, because we are sometimes too complicated and too bureaucratic orientated, but in general, yes, it’s. So for the people who are not hearing this, Bahrain just stated that they have used, they benchmarked their law against the one of the European Commission, and they made it much more simpler. I think that’s what they tried. As a framework. Right. OK. The problem for kind of a rule of law system is at the end, and this was also mentioned with the first question, how to implement and how to enforce all these. Also, yes, the capacity might not be there. So what we are trying now to do is to build up a so-called AI office and also give guidelines and what the provisions should mean and how we might come forward. But at the end, also, you need someone in controlling. and are enforcing all these, and here we are coming to a problem, you need to have something what is also valid in front of a court. So if this is not possible, then it might be very tricky.


Arda Gerkens: You wanted to add something, Ms. Habe?


Amira Saber: Yes. One of the main tools which parliamentarians use is actually the assessment of the legislative impact. It’s still missing to a great extent to assist the legislative impact of the AI bills which are already released. So we are also challenged by the impact of these legislations. So for example, in the EU Act, can I say full mouth 100% that this didn’t affect the amount of private sector investments in the fields of high tech and AI development and that these companies went to the US, for example? It’s not accessible yet. You know, these kind of big questions, it takes time to assess. That’s why the question of regulation when it comes to AI is very challenging. You need to put the regulation now, and you need also to assess the impact, and you need to all the time amend and edit and amend and edit according to the advancement of the technologies and according to what is in place. That’s why I all the time probe the framework and the legal interventions which are regulating the basic thing, which are more towards the data classification, the rights, the ethics, the broader ones. Because when you dive deeply in the details, you get completely doomed. And this is not what the regulator should do.


Arda Gerkens: I see a lot of people nodding in what you’re saying about adding the legislation all the time. So there’s a question from the floor. And if there’s another question, you have to be at the microphone. But first from the lady. Yeah.


Meredith Veit: Hi, thank you. My name is Meredith. I’m the public work and human rights researcher with the Business and Human Rights Resource Center. And it’s really great that we’re having this panel now about AI regulation and the program. Thank you. of it and better understanding what are the impacts because there are governments even here who are touting some very problematic narratives about the dangers of clipping the wings of the potential and everything that AI can do for the benefits of society while ignoring the mountains of evidence that we have about the actual harms that are taking place now that need to be mitigated and dealt with now and justice that needs to happen now so my question from your seats and your positionality is what is needed and what hope do you have in terms of pushing back against this wave and these very problematic narratives as I mentioned in order to hold the line and keep pushing forward on all of the momentum that had been building about AI regulation for quite some time and even keeping the EU AI Act strong and making sure that the AI office is strong in its enforcement and having a really well-tuned regulatory approach that can help continue to set more standards moving


Arda Gerkens: forward thank you so much thank you and another question from behind your


Participant: honorable yeah hi actually it’s not a question just a comment on amending the law I believe the more that what we can do is to simplify the law and just to keep it to another body that they are more of more flexible because changing anything in the law it’s gonna take a long time which we cannot cope as with the developing the fast developing of the AI so this is the only thing come


Arda Gerkens: that’s a very good advice just keep the framework in the law and make sure that you have lower regulation to be able to be flexible I’m gonna take the last question here yes please


Participant: thank you for giving me the floor I’m very happy that I could have touched you especially on this topic exploitation of children through the internet and through artificial intelligence. I have just published a new article on Ahram Center for Political and Strategic Studies about this issue, how young people and children are recruited in extremism and radicalization and terrorism through artificial intelligence. And it was surprising, because I started to study and research about this topic, that they are recruiting children through the games, through the gamings. They recruit children through electronic games on the internet. It is available. So I concluded this study with some recommendations. One of the recommendations, look after your children. Don’t leave them alone with the screens. Don’t do it. They isolate them firstly, then they start to promote their own ideas and radicalization approaches. Then we find some young people doing horrible things. So one of the recommendations is awareness is very important. And the legislation, of course. Thank you. Bye bye.


Arda Gerkens: Thank you very much. And this is really the last question I’m going to take. I’m going to ask you very brief answers, because Sarah will then wrap up.


Mounir Sorour: I’m Mounir Sourour from Bahrain, I would like to thank you and thank all of you. Making regulation is very easy, but at the same time difficult, especially in AI. Because AI, we are working on open space. And every time we do something, I mean, because we are moving and we’re expanding. As Ms. Iman said, we are every time just asking, adapting to ourselves. Can we just say yes to something to be like a main framework? And we are looking for balancing, we don’t look now to make a regulation, we can’t fix a regulation, especially with AI. Can we, I mean, according to the experience of Egyptian, can we just mention what the main framework at least to minimize the risk of the AI?


Arda Gerkens: Thanks. Thank you. A very short answer from Amira first. You’re good? Axel, maybe you want to comment?


Axel Voss: Yes. So thanks for the recommendations. It’s good to hear. To Meredith, yes, so keeping the AI act strong. This is what we are trying to do, but we are in a kind of a trap. We are seeing AI and AI systems and generative AI is creating a lot of wealth. And so we are lagging behind everywhere except two big regions. And this is why we need to support these. But on the other hand, also trying to keep very strong limits and framework.


Arda Gerkens: Thank you. Thank you very much. Thank you all. I would like to give the floor to Miss Sarah Lister, who will give us her closing remarks.


Sarah Lister: Thank you very much. And as we conclude this open forum on AI regulation, I’d like to start by thanking, first of all, all the panelists, the participants, the moderator in person and online for all your insights and the questions and the commitment to inclusive rights-based governance of artificial intelligence. As a personal reflection, I am delighted that there is such a well-attended session focusing on the role of parliaments. In my experience, too often in digitalization discussions, national governance authorities and processes have been forgotten and have been brought too late to the processes. So, today’s discussion has highlighted the practical role of parliaments in ensuring that AI systems are aligned with human rights and normative principles and to ensure that no one is left behind, as the colleague from Egypt said. We have heard that parliaments are on the front lines of some of the most pressing policy issues of our time. How to protect citizens and all people while enabling innovation? And that has been a core theme that has run through our discussion this afternoon. It was raised by the colleague from Egypt and from Uruguay and from the floor. And then how do we ensure oversight in a rapidly evolving technological landscape? What type of regulatory entities do you need? How do you create governance frameworks that are grounded in human rights? And we have heard that to ensure the benefits of AI reach everyone, we must invest in the development, governance and support of responsible and ethical AI, as well as in countries’ capacities to build safe, secure and trustworthy AI systems. Parliaments are key in governing the use of global technologies and ensuring that these truly serve their public’s interests and support the achievements of the SDGs. We have heard that no single actor can shape the governance of AI alone. Effective regulation demands a multi-stakeholder approach, bringing together parliaments, executive branches, civil society, private sector and technical communities. And Uruguay talked about the consensus-based approach that takes place there. We heard from the floor and then in response about the importance of bringing youth voices to the discussions and have asked the question, how can we effectively ensure that multi-stakeholder, including young people’s, approach to this issue? The report of the Secretary General’s High-Level Advisory Body on AI and the Global Digital Compact that was signed on the margins of the General Assembly last year notes that AI governance requires addressing existing gaps in representation, coordination and implementation. Parliaments are key actors in ensuring that. At UNDP, we see AI not only as a technological issue, but as a governance one. We support countries with our partners in navigating both the governance of digitalization and digitalization for governance. And we support countries to develop their potential to transform their public services, build a more open and inclusive public sphere and enhance democratic processes and institutions. We co-host with IPU, an expert group on parliaments and digital policy to try to bring together some of these elements that people have asked for in terms of sharing experiences. And other international organizations join that expert group to help ensure that we pull together. I see that my time has passed, so I would just say once again, thank you very much for being a part of this timely and important conversation. A special thanks to the Inter-Parliamentary Union for their partnership in making this event possible and to the IGF for hosting us. Thank you very much.


A

Axel Voss

Speech speed

120 words per minute

Speech length

1669 words

Speech time

829 seconds

EU AI Act completed in 2024 with focus on high-risk systems and potential postponement discussions

Explanation

The EU has finished the AI Act by the end of 2024, with implementation beginning in August. There are ongoing discussions about potentially postponing certain aspects, particularly focusing on high-risk AI systems, due to requests from the US and companies needing more time to adapt.


Evidence

Mentions specific timeline of completion by end of 2024, implementation starting in August, requests from American/US side for postponement, and companies needing adaptation time


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws

Explanation

The democratic legislative process cannot keep pace with rapid technological developments, causing lawmakers to always be behind. A solution would be to reduce normal legislative timelines to three months and focus on ethical, value-oriented frameworks rather than detailed regulations.


Evidence

States that democratic legislator is too slow for technology developments and suggests three-month solution timeframe, mentions need for ethical aspects and value-orientated frame


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


Agreed with

– Amira Saber
– Participant
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Disagreed with

– Amira Saber

Disagreed on

Detailed vs. framework-based regulation


Regulation should focus on positive expectations from AI rather than just avoiding risks

Explanation

Instead of concentrating solely on risks and how to avoid them, legislators should take a more positive approach by defining what they expect from AI. This would create a clearer framework where anything within expectations is acceptable, and anything outside faces consequences.


Evidence

Suggests asking ‘what we are expecting from AI’ as a more positive approach rather than focusing on avoiding risks


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


Agreed with

– Amira Saber
– Rodrigo Goni Romero
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Difficulty distinguishing real from fake content affects democratic processes and public trust

Explanation

AI makes it increasingly difficult for people, especially young generations, to differentiate between real and fake content. This creates risks for democracy through manipulation of public opinion, fake news, disinformation, and destabilization of countries.


Evidence

Mentions fake news, disinformation for destabilizing countries, manipulation of public opinions, and that young people can’t trust what they’re reading, seeing or hearing


Major discussion point

Risks and Challenges of AI


Topics

Human rights | Sociocultural


Disagreed with

– Yasmin Al Douri

Disagreed on

Young people’s ability to distinguish real from fake content


Need for better understanding among regulators who may not have sufficient technical knowledge

Explanation

Politicians and regulators often lack the necessary knowledge to understand AI technology properly. This creates a situation where politicians might be a bigger problem than the technology itself, as they may hinder beneficial developments due to insufficient understanding.


Evidence

States that ‘politicians might be a bigger problem than the technology because we are hindering sometimes some elements’ and mentions that active regulators ‘do not have the knowledge in really understanding what’s going on’


Major discussion point

Capacity Building and Education


Topics

Development


Agreed with

– Amira Saber
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Requirement for enforceable regulations that are valid in court systems

Explanation

Effective AI regulation requires not just implementation mechanisms but also enforcement capabilities that can withstand legal scrutiny. The challenge lies in creating regulations that are legally sound and can be properly enforced in court systems.


Evidence

Mentions building up ‘AI office’ and giving guidelines, but emphasizes need for ‘something what is also valid in front of a court’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


AI can help mitigate child abuse and gender inequalities but requires careful planning

Explanation

AI has the potential to address social issues like child abuse and gender-related inequalities, but this won’t happen automatically. It requires deliberate planning and careful consideration of the conditions and formulation of such systems.


Evidence

States ‘it can, but of course you need to have a kind of a plan in mind how to do this’ and mentions need to be ‘very careful in what are the conditions at the end in formulating these’


Major discussion point

Human Rights and Social Impact


Topics

Human rights | Children rights


A

Amira Saber

Speech speed

156 words per minute

Speech length

2487 words

Speech time

952 seconds

Egypt has national AI strategy and first parliamentary draft bill on AI governance with focus on ethical data classification

Explanation

Egypt has relaunched its national AI strategy and introduced the first parliamentary draft bill on AI governance, endorsed by 60 MPs. The focus is on ethical aspects, data classification, and ensuring accountability for data providers and entities based on data sensitivity.


Evidence

Mentions relaunching national strategy, first draft bill endorsed by 60 Egyptian MPs, and specific focus on data classification and accountability based on data sensitivity


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory | Data governance


Need to avoid hindering investment while ensuring ethical AI use, especially in healthcare, education, and agriculture

Explanation

There’s a critical balance needed between regulation and innovation incentives. Countries need AI investments in key sectors like healthcare, education, and agriculture, so regulation must include incentives for private sector investment while maintaining ethical standards.


Evidence

Mentions specific sectors: ‘We need the AI investments in healthcare in my country to a big deal. We need it in education, we need it in agriculture’ and discusses including ‘certain incentives to get the private sector interest to invest’


Major discussion point

Balancing Innovation and Regulation


Topics

Economic | Development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities

Explanation

Deepfake technology creates severe risks beyond political manipulation, particularly threatening women in conservative cultural contexts. Fake pornographic images can lead to life-threatening situations, career destruction, and there have been actual incidents of women being killed due to deepfake content.


Evidence

Provides specific example: ‘Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed.’ Also mentions ‘there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake’


Major discussion point

Risks and Challenges of AI


Topics

Human rights | Gender rights online | Sociocultural


AI weaponization in conflicts like Gaza has increased civilian casualties, highlighting political and social implications

Explanation

AI has been weaponized in recent Middle Eastern conflicts, particularly in Gaza, leading to increased civilian casualties. This demonstrates how AI governance affects thousands of lives and has serious political and social consequences beyond technical considerations.


Evidence

States ‘There have been lots of reports circulating that when the IDF uses AI on the war in Gaza, this actually has raised the casualties of civilians being dead’ and mentions AI being ‘weaponized recently in the war on Gaza’


Major discussion point

Risks and Challenges of AI


Topics

Cybersecurity | Cyberconflict and warfare | Human rights


Parliamentarians need education on AI to effectively scrutinize government AI use across sectors

Explanation

Capacity building for parliamentarians is crucial not just for legislation but for their scrutinizing role. Educated parliamentarians can better question ministries about their AI use and ensure technology benefits citizens across different sectors.


Evidence

Emphasizes ‘capacitating parliamentarians’ and mentions using ‘their tools to ask the different ministries, how they use the AI technologies in the different sectors to advance the work, to benefit as much as we can, the people in their country’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Continuous learning and capacity building essential for politicians, policymakers, and citizens

Explanation

AI governance requires ongoing education for all stakeholders – politicians, policymakers, and the general public. This is a multi-stakeholder issue where everyone’s life is affected, making widespread capacity building essential.


Evidence

Repeatedly emphasizes ‘educate, educate, educate, capacitate, capacitate, capacitate’ and mentions taking courses herself: ‘I myself, before developing the draftable, I went through different courses, crash ones’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Need for appropriate regulatory bodies with authority to hold governmental entities accountable

Explanation

Effective AI regulation requires regulatory bodies with proper authority to hold government ministries accountable. In Egypt, the Supreme Council on Artificial Intelligence exists but needs enhanced authority to regulate across all governmental entities.


Evidence

Mentions Egypt’s ‘Supreme Council on Artificial Intelligence’ and explains ‘by law they didn’t have the authority to actually may I say hold the governmental entities accountable this is what I tried to do in my draft bill to to give them the authority’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Need for AI policy radar similar to climate policy radar to track global regulatory developments

Explanation

There should be a comprehensive AI policy radar that tracks regulatory developments across all countries and regions. This would provide valuable knowledge for policymakers to understand global AI governance trends and learn from other jurisdictions.


Evidence

Specifically mentions ‘there is a climate policy radar. I wish there would be an AI policy radar’ and explains it would help parliamentarians know ‘what is happening in every region, what is happening in every country’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


Importance of sharing experiences between countries while recognizing different contexts

Explanation

While what works for one country may not work for another, there are valuable experiences that can be shared and adapted. Countries should learn from each other’s approaches while developing solutions appropriate to their specific contexts.


Evidence

States ‘what works for Egypt definitely couldn’t work for other countries and vice versa, but there are experiences which we could always learn from and develop’


Major discussion point

Global Coordination and International Cooperation


Topics

Development


Legislative impact assessment of AI bills still missing in many jurisdictions

Explanation

There’s a significant gap in assessing the actual impact of AI legislation that has been implemented. It’s unclear whether regulations like the EU AI Act have affected private sector investment or caused companies to relocate, making policy evaluation challenging.


Evidence

Questions whether the EU Act ‘didn’t affect the amount of private sector investments in the fields of high tech and AI development and that these companies went to the US, for example? It’s not accessible yet’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Participant
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Disagreed with

– Axel Voss

Disagreed on

Detailed vs. framework-based regulation


Parliaments should focus on scrutinizing ministerial AI use rather than just legislation

Explanation

Beyond creating laws, parliaments should actively scrutinize how different government ministries use AI technologies. This oversight function ensures that AI implementation serves public interests and advances citizen welfare across sectors.


Evidence

Emphasizes ‘the scrutinizing job of making every ministry up to using AI for the good of the people in their mandate’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


Data classification crucial as foundation for effective AI regulation

Explanation

Proper data classification is fundamental to AI regulation because unclassified data cannot be easily regulated. This involves creating legal liability frameworks based on data sensitivity levels and ensuring accountability for data handling.


Evidence

States ‘what is not classified couldn’t be easily regulated’ and emphasizes ‘at least the data classification is one crucial thing’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Data governance


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


National data becomes valuable asset requiring protection and accountability measures

Explanation

When AI systems function on data, national data becomes a significant asset that requires protection. Clear accountability frameworks are needed to determine responsibility when sensitive data, such as hospital records, is compromised or leaked.


Evidence

Provides specific example: ‘if, for example, the data of a hospital in a far place in Egypt is leaked. Who should I hold accountable based on this?’ and explains ‘the national data becomes a huge asset by itself’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Data governance | Privacy and data protection


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


Need for legal liability based on data sensitivity classification

Explanation

AI governance should establish clear legal responsibilities that correspond to the sensitivity level of data being processed. High-risk data handling should automatically trigger specific legal liability frameworks to ensure accountability.


Evidence

States ‘If you are dealing with a classified data or you’re dealing with data that is of high risk, this should have immediately a kind of legal liability’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Privacy and data protection


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


R

Rodrigo Goni Romero

Speech speed

84 words per minute

Speech length

311 words

Speech time

220 seconds

Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation

Explanation

As a small country between larger neighbors, Uruguay prioritizes being open to investment and avoids sending negative signals to investors. They have passed a general legal framework with multi-party support that mandates developing regulation through stakeholder participation and consensus.


Evidence

Mentions Uruguay is ‘a very small country in South America between biggest, big country, Argentina and Brazil’ and explains they ‘prefer have passed a legal framework approved by all parties which self mandate us to develop regulation with the participation of all sectors and basis of consensus’


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Disagreed with

– Axel Voss

Disagreed on

Speed and approach to AI regulation


Small countries like Uruguay prioritize being open to investment while developing regulation through stakeholder consensus

Explanation

Uruguay’s approach focuses on promoting AI investment while carefully developing regulation through inclusive processes. They prefer to observe what happens in larger jurisdictions like Europe, the US, and Brazil before making detailed regulatory decisions.


Evidence

States they are ‘prioritized to be open to investment and focusing promoting, investing in AI’ and prefer to ‘observe that that they happen in Europe and US and maybe a bigger country like Brazil’


Major discussion point

Balancing Innovation and Regulation


Topics

Economic | Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Future job displacement requires extensive capacity building and preparation programs

Explanation

AI poses significant risks to employment that require proactive preparation through capacity building programs. As president of the Committee of the Future, the speaker emphasizes the need to prepare not just children and students, but also current workers for AI-related job changes.


Evidence

Mentions being ‘president of the Committee of the Future of the Parliament’ and states ‘I have to recognize in many perspectives that artificial intelligence have many risks to the job, many changes’ and emphasizes programs ‘Not just to the children, not just to the school, also to the worker’


Major discussion point

Risks and Challenges of AI


Topics

Economic | Future of work | Development


Continuous learning and capacity building essential for politicians, policymakers, and citizens

Explanation

Addressing AI risks requires extensive capacity building across society. Many people are unaware of AI risks, making it parliament’s duty to raise awareness and facilitate preparation programs for all segments of society.


Evidence

Emphasizes ‘capacity, capacity, capacity’ and states ‘many people don’t know about the risk. So, I think it’s our duty of the Parliament to awareness, to ask to prepare and to facilitate the program’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Amira Saber
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


P

Participant

Speech speed

127 words per minute

Speech length

401 words

Speech time

188 seconds

Bahrain has drafted and approved first AI regulatory law balancing innovation and regulation

Explanation

Bahrain has successfully created and approved what they claim is the first AI regulatory law. Their framework achieves a balance between attracting investors, promoting innovation, and regulating the negative aspects of AI use.


Evidence

States ‘Bahrain have drafted the first and got approved the first AI regulator, sorry, law for regulating the use of AI’ and mentions achieving ‘a balance…between investors, getting investors and believe pushing the innovation and how to regulate the bad side of the use of the AI’


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero

Agreed on

Balancing innovation incentives with regulatory protection


Importance of having flexible lower-level regulations rather than frequently amending laws

Explanation

Rather than constantly amending laws to keep up with AI developments, it’s better to simplify laws and delegate detailed regulation to more flexible bodies. Changing laws takes too long to cope with the fast pace of AI development.


Evidence

States ‘changing anything in the law it’s gonna take a long time which we cannot cope as with the developing the fast developing of the AI’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization

Explanation

Research shows that children are being recruited for extremism and terrorism through AI-enhanced online gaming platforms. The process involves isolating children, then promoting radical ideas, leading to dangerous outcomes.


Evidence

Published article on ‘how young people and children are recruited in extremism and radicalization and terrorism through artificial intelligence’ and explains ‘they are recruiting children through the games, through the gamings…They isolate them firstly, then they start to promote their own ideas and radicalization approaches’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Cybersecurity | Violent extremism | Children rights


Importance of parental awareness and supervision of children’s online activities

Explanation

Parents must actively supervise their children’s screen time and online activities to prevent exploitation. Leaving children alone with screens makes them vulnerable to isolation and radical recruitment through gaming platforms.


Evidence

Recommends ‘look after your children. Don’t leave them alone with the screens. Don’t do it’ and explains the isolation process that leads to radicalization


Major discussion point

Youth Engagement and Future-Proofing


Topics

Children rights | Cybersecurity


Need for simplified legal frameworks with flexible implementation mechanisms

Explanation

AI regulation should focus on creating main frameworks that minimize risks while allowing for flexible adaptation. Rather than trying to fix detailed regulations that become quickly outdated, countries should establish broad principles that can be adjusted as technology evolves.


Evidence

Asks ‘Can we just say yes to something to be like a main framework?’ and mentions ‘we don’t look now to make a regulation, we can’t fix a regulation, especially with AI’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


H

Hossam Elgamal

Speech speed

129 words per minute

Speech length

342 words

Speech time

158 seconds

Lack of adequate regulatory bodies beyond telecommunications authorities in many countries

Explanation

Most countries only have telecommunications regulatory bodies, which are insufficient for governing digital society and AI regulation. New regulatory frameworks require appropriate institutions capable of implementing and enforcing AI-specific regulations.


Evidence

States ‘We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


AI regulation needs international coordination as AI systems operate globally

Explanation

AI operates on a global scale similar to cybersecurity, making international coordination essential. Individual country regulations will be insufficient since data used in AI systems, whether authentic or fake, operates across borders.


Evidence

Compares to cybersecurity challenges: ‘Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI’ and notes ‘data that will be used, whether fake or right. will be a global one’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory | Cybersecurity


Many countries lack proper data exchange policies needed before implementing AI regulation

Explanation

Countries in the Global South face multiple challenges including lack of computational power, data access gaps, and insufficient scientific capability. Many haven’t implemented basic data exchange policies, which are prerequisites for effective AI regulation.


Evidence

Lists specific gaps: ‘power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability’ and notes ‘a lot of countries in the South especially…did not implement yet data exchange policy’


Major discussion point

Data Governance and Classification


Topics

Development | Data governance | Digital access


Agreed with

– Amira Saber

Agreed on

Data classification and governance as fundamental to AI regulation


Digital divide creates gaps in computational power, data access, and scientific capability

Explanation

AI development has exacerbated existing digital divides, creating gaps in computational power, access to processors, data access, and scientific expertise. These gaps particularly affect countries in the Global South and hinder their ability to participate in AI governance.


Evidence

Specifically mentions ‘power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability within the AI’


Major discussion point

Human Rights and Social Impact


Topics

Development | Digital access


Y

Yasmin Al Douri

Speech speed

161 words per minute

Speech length

210 words

Speech time

77 seconds

Young people are often better at identifying deepfakes and misinformation than assumed

Explanation

Contrary to assumptions that young people cannot distinguish between real and fake content, they are actually better at identifying deepfakes and misinformation. This represents a broader issue where young people’s capabilities are underestimated by policymakers.


Evidence

States ‘I would definitely disagree specifically on my work with young people. I would even state that young people are way better at actually seeing what is deepfake and what is not’ and mentions this ‘shows a little bit the issue that we’re generally facing as a young generation’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Sociocultural | Human rights


Disagreed with

– Axel Voss

Disagreed on

Young people’s ability to distinguish real from fake content


Need to bring youth reality to parliamentarians and ensure future-proof regulation

Explanation

There’s a disconnect between youth capabilities and parliamentarian perceptions that needs to be addressed. Regulation should be designed to be future-proof for coming generations, requiring better integration of youth perspectives in policy-making processes.


Evidence

Asks ‘how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming?’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Legal and regulatory | Human rights


M

Meredith Veit

Speech speed

150 words per minute

Speech length

215 words

Speech time

85 seconds

Need to address actual harms happening now rather than just potential future benefits

Explanation

There are problematic narratives from governments that focus on AI’s potential benefits while ignoring substantial evidence of current harms. Immediate action is needed to address existing problems and provide justice for those already affected by AI systems.


Evidence

Mentions ‘mountains of evidence that we have about the actual harms that are taking place now that need to be mitigated and dealt with now and justice that needs to happen now’


Major discussion point

Human Rights and Social Impact


Topics

Human rights


Importance of maintaining strong regulatory standards despite pressure from industry narratives

Explanation

There’s a need to resist problematic narratives about the dangers of regulating AI and maintain momentum for strong regulatory approaches. This includes keeping the EU AI Act strong and ensuring robust enforcement through institutions like the AI office.


Evidence

Asks about ‘pushing back against this wave and these very problematic narratives’ and mentions ‘keeping the EU AI Act strong and making sure that the AI office is strong in its enforcement’


Major discussion point

Human Rights and Social Impact


Topics

Human rights | Legal and regulatory


S

Sarah Lister

Speech speed

141 words per minute

Speech length

584 words

Speech time

248 seconds

Multi-stakeholder approach essential involving parliaments, civil society, private sector, and technical communities

Explanation

Effective AI governance cannot be achieved by any single actor alone. It requires collaboration between parliaments, executive branches, civil society, private sector, and technical communities, with parliaments playing a key role in ensuring AI serves public interests.


Evidence

States ‘no single actor can shape the governance of AI alone. Effective regulation demands a multi-stakeholder approach, bringing together parliaments, executive branches, civil society, private sector and technical communities’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


M

Mounir Sorour

Speech speed

136 words per minute

Speech length

128 words

Speech time

56 seconds

AI regulation should focus on flexible frameworks rather than fixed regulations due to the open and expanding nature of AI

Explanation

Making AI regulation is both easy and difficult because AI operates in an open space that is constantly moving and expanding. Rather than creating fixed regulations that cannot adapt, there should be main frameworks that can minimize AI risks while allowing for necessary adaptations as the technology evolves.


Evidence

States that ‘AI, we are working on open space. And every time we do something, I mean, because we are moving and we’re expanding’ and asks about creating ‘a main framework at least to minimize the risk of the AI’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Participant

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Need for balanced approach that doesn’t focus solely on regulation but seeks equilibrium

Explanation

The approach to AI governance should prioritize finding balance rather than just creating regulations. This involves looking for ways to achieve equilibrium between different interests and needs rather than simply imposing restrictive measures.


Evidence

States ‘we are looking for balancing, we don’t look now to make a regulation’ and emphasizes that ‘we can’t fix a regulation, especially with AI’


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


A

Arda Gerkens

Speech speed

155 words per minute

Speech length

1705 words

Speech time

659 seconds

IPU has established comprehensive AI tracking and policy initiatives for parliaments globally

Explanation

The Inter-Parliamentary Union has adopted a resolution on AI’s impact on democracy, human rights, and rule of law in October 2024, and launched a monthly tracker monitoring AI policy actions across 37 parliaments. These initiatives aim to coordinate parliamentary responses to AI governance challenges.


Evidence

Mentions specific IPU resolution from October 2024 ‘on the impact of AI on democracy, human rights, and the rule of law’ and monthly tracker that ‘currently already covers 37 parliaments’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


Parliamentarians should invest extra effort in understanding AI due to its critical importance

Explanation

Given AI’s significant impact on society, parliamentarians and politicians need to put additional effort into understanding the technology before attempting to regulate it. This echoes the philosophical principle that one shouldn’t speak about topics they don’t understand.


Evidence

References philosopher Wittgenstein’s principle ‘if you don’t know what you’re talking about, you shouldn’t speak on it’ and suggests ‘as a politician, parliamentarian, this time you should put a little extra effort in understanding AI, because it’s so important’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero

Agreed on

Capacity building and education are essential for all stakeholders


AI makes it difficult for people of all ages to distinguish between real and fake content

Explanation

The challenge of identifying authentic versus AI-generated content affects not just young people but people of all generations. This represents a broader societal challenge that extends beyond generational boundaries.


Evidence

Personal reflection: ‘maybe I’m not youth anymore. Sometimes I also feel it’s hard to know what’s real and what’s not’


Major discussion point

Risks and Challenges of AI


Topics

Sociocultural | Human rights


Agreements

Agreement points

Capacity building and education are essential for all stakeholders

Speakers

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero
– Arda Gerkens

Arguments

Need for better understanding among regulators who may not have sufficient technical knowledge


Continuous learning and capacity building essential for politicians, policymakers, and citizens


Parliamentarians need education on AI to effectively scrutinize government AI use across sectors


Continuous learning and capacity building essential for politicians, policymakers, and citizens


Parliamentarians should invest extra effort in understanding AI due to its critical importance


Summary

All speakers emphasized that understanding AI technology is crucial for effective governance, with particular emphasis on educating parliamentarians, policymakers, and citizens to make informed decisions about AI regulation and oversight.


Topics

Development | Capacity development


Need for flexible regulatory frameworks rather than detailed fixed laws

Speakers

– Axel Voss
– Amira Saber
– Participant
– Mounir Sorour

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Legislative impact assessment of AI bills still missing in many jurisdictions


Importance of having flexible lower-level regulations rather than frequently amending laws


AI regulation should focus on flexible frameworks rather than fixed regulations due to the open and expanding nature of AI


Summary

There is strong consensus that AI regulation should focus on creating flexible frameworks and principles rather than detailed, rigid laws that cannot adapt to rapidly evolving technology.


Topics

Legal and regulatory


Balancing innovation incentives with regulatory protection

Speakers

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero
– Participant

Arguments

Regulation should focus on positive expectations from AI rather than just avoiding risks


Need to avoid hindering investment while ensuring ethical AI use, especially in healthcare, education, and agriculture


Small countries like Uruguay prioritize being open to investment while developing regulation through stakeholder consensus


Bahrain has drafted and approved first AI regulatory law balancing innovation and regulation


Summary

All speakers agreed on the critical need to balance regulatory protection with maintaining incentives for innovation and investment, particularly for smaller countries and developing economies.


Topics

Economic | Legal and regulatory


Data classification and governance as fundamental to AI regulation

Speakers

– Amira Saber
– Hossam Elgamal

Arguments

Data classification crucial as foundation for effective AI regulation


National data becomes valuable asset requiring protection and accountability measures


Need for legal liability based on data sensitivity classification


Many countries lack proper data exchange policies needed before implementing AI regulation


Summary

Both speakers emphasized that proper data classification and governance frameworks are prerequisites for effective AI regulation, with clear accountability measures based on data sensitivity levels.


Topics

Legal and regulatory | Data governance | Privacy and data protection


Similar viewpoints

Both speakers from developing countries emphasized the importance of learning from other jurisdictions while adapting solutions to their specific national contexts, favoring consensus-based approaches over rigid regulatory frameworks.

Speakers

– Amira Saber
– Rodrigo Goni Romero

Arguments

Importance of sharing experiences between countries while recognizing different contexts


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Topics

Development | Legal and regulatory


Both speakers highlighted the serious threats posed by AI-generated fake content, though Voss focused on democratic implications while Saber emphasized personal safety risks, particularly for women.

Speakers

– Axel Voss
– Amira Saber

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities


Topics

Human rights | Sociocultural | Gender rights online


Both emphasized the active oversight role of parliaments beyond just creating laws, including monitoring how AI is used by government entities and protecting vulnerable populations from AI-enabled threats.

Speakers

– Amira Saber
– Participant

Arguments

Parliaments should focus on scrutinizing ministerial AI use rather than just legislation


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization


Topics

Legal and regulatory | Cybersecurity | Children rights


Unexpected consensus

Youth capabilities in identifying AI-generated content

Speakers

– Axel Voss
– Yasmin Al Douri
– Arda Gerkens

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


AI makes it difficult for people of all ages to distinguish between real and fake content


Explanation

While there was initial disagreement about youth capabilities, the discussion revealed an unexpected consensus that the challenge of distinguishing real from fake content affects all age groups, not just young people, suggesting a more nuanced understanding of digital literacy across generations.


Topics

Sociocultural | Human rights | Youth Engagement and Future-Proofing


Need for international coordination despite national sovereignty concerns

Speakers

– Hossam Elgamal
– Amira Saber
– Sarah Lister

Arguments

AI regulation needs international coordination as AI systems operate globally


Need for AI policy radar similar to climate policy radar to track global regulatory developments


Multi-stakeholder approach essential involving parliaments, civil society, private sector, and technical communities


Explanation

Despite speakers representing different national interests and regulatory approaches, there was unexpected consensus on the need for global coordination and information sharing, recognizing that AI governance transcends national boundaries.


Topics

Legal and regulatory | Global Coordination and International Cooperation


Overall assessment

Summary

The speakers demonstrated remarkable consensus on key foundational issues: the critical importance of capacity building and education for all stakeholders, the need for flexible regulatory frameworks rather than rigid detailed laws, the necessity of balancing innovation with protection, and the fundamental role of data governance. There was also strong agreement on the multi-stakeholder nature of AI governance and the need for international coordination.


Consensus level

High level of consensus on fundamental principles with constructive disagreement on implementation details. This suggests a mature understanding of AI governance challenges and creates a strong foundation for collaborative policy development. The consensus spans across different regions (Europe, Middle East, Latin America) and different types of stakeholders (parliamentarians, civil society, private sector), indicating broad-based agreement on core AI governance principles that could facilitate international cooperation and knowledge sharing.


Differences

Different viewpoints

Young people’s ability to distinguish real from fake content

Speakers

– Axel Voss
– Yasmin Al Douri

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


Summary

Axel Voss argued that young people find it hard to differentiate what is real and fake, creating democratic risks. Yasmin Al Douri directly disagreed, stating that young people are actually better at identifying deepfakes and misinformation than assumed, and that this represents a broader issue of underestimating youth capabilities.


Topics

Human rights | Sociocultural


Speed and approach to AI regulation

Speakers

– Axel Voss
– Rodrigo Goni Romero

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Summary

Axel Voss advocated for faster legislative processes (three months) to keep up with technology, while Rodrigo explicitly stated Uruguay prefers to ‘go slow’ and observe what happens in larger jurisdictions before acting.


Topics

Legal and regulatory


Detailed vs. framework-based regulation

Speakers

– Axel Voss
– Amira Saber

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Legislative impact assessment of AI bills still missing in many jurisdictions


Summary

While both agree on avoiding overly detailed regulation, Axel Voss focuses on speed and framework approaches, while Amira Saber emphasizes the need for impact assessment and the challenge of constantly amending detailed regulations as technology evolves.


Topics

Legal and regulatory


Unexpected differences

Generational assumptions about digital literacy

Speakers

– Axel Voss
– Yasmin Al Douri

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


Explanation

This disagreement was unexpected because it revealed a fundamental disconnect between policymaker assumptions and youth advocate perspectives. Yasmin Al Douri’s direct challenge to Axel Voss’s statement highlighted how generational assumptions can influence policy-making, which is particularly significant given that AI regulation will primarily affect younger generations.


Topics

Human rights | Sociocultural


Regulatory timing philosophy

Speakers

– Axel Voss
– Rodrigo Goni Romero

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Explanation

This disagreement was unexpected because both speakers represent democratic systems but had completely opposite philosophies about regulatory timing. Axel Voss argued for urgency due to technological pace, while Rodrigo advocated for deliberate slowness to observe and learn from others, revealing how country size and position can fundamentally shape regulatory philosophy.


Topics

Legal and regulatory


Overall assessment

Summary

The main areas of disagreement centered on regulatory approach and timing, youth capabilities in digital environments, and the balance between innovation and regulation. While speakers generally agreed on fundamental goals like protecting citizens while enabling innovation, they differed significantly on methods and assumptions.


Disagreement level

Moderate disagreement with significant implications. The disagreements reveal fundamental differences in regulatory philosophy, generational assumptions, and approaches to balancing innovation with protection. These differences could lead to fragmented global AI governance approaches, with some jurisdictions moving quickly with framework-based regulation while others take slower, consensus-based approaches. The generational disconnect highlighted by the youth advocate suggests that current AI regulation may not adequately reflect the realities and capabilities of those most affected by these technologies.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers from developing countries emphasized the importance of learning from other jurisdictions while adapting solutions to their specific national contexts, favoring consensus-based approaches over rigid regulatory frameworks.

Speakers

– Amira Saber
– Rodrigo Goni Romero

Arguments

Importance of sharing experiences between countries while recognizing different contexts


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Topics

Development | Legal and regulatory


Both speakers highlighted the serious threats posed by AI-generated fake content, though Voss focused on democratic implications while Saber emphasized personal safety risks, particularly for women.

Speakers

– Axel Voss
– Amira Saber

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities


Topics

Human rights | Sociocultural | Gender rights online


Both emphasized the active oversight role of parliaments beyond just creating laws, including monitoring how AI is used by government entities and protecting vulnerable populations from AI-enabled threats.

Speakers

– Amira Saber
– Participant

Arguments

Parliaments should focus on scrutinizing ministerial AI use rather than just legislation


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization


Topics

Legal and regulatory | Cybersecurity | Children rights


Takeaways

Key takeaways

AI regulation requires balancing innovation incentives with risk mitigation, particularly for investment-dependent developing countries


Data classification and governance frameworks must be established before detailed AI regulation can be effective


Parliamentarians need extensive capacity building and technical education to effectively regulate and oversee AI implementation


Democratic legislative processes are too slow for rapidly evolving AI technology, requiring framework-based rather than detailed regulatory approaches


Multi-stakeholder approaches involving parliaments, civil society, private sector, and technical communities are essential for effective AI governance


International coordination is crucial since AI operates globally, but regulatory approaches must be adapted to local contexts


Youth voices and technical expertise should be better integrated into parliamentary AI policy-making processes


Immediate harms from AI (deepfakes, weaponization, misinformation) require urgent attention alongside long-term governance frameworks


Resolutions and action items

IPU to continue monthly tracking of parliamentary AI activities across 37 parliaments and expand coverage


Parliamentarians encouraged to contact Andy Richardson to be added to IPU’s AI policy tracking list


Upcoming IPU event scheduled for November 28-30 with Parliament of Malaysia, UNDP, and Commonwealth Parliamentary Association on responsible AI


Recommendation to create an AI policy radar system similar to climate policy radar to track global regulatory developments


Need to establish appropriate regulatory bodies with authority to hold governmental entities accountable for AI use


Focus on developing flexible lower-level regulations rather than frequently amending primary legislation


Unresolved issues

Which specific regulatory bodies should implement AI regulation in countries lacking adequate digital governance authorities


How to achieve effective international coordination of AI regulation while respecting national sovereignty and different development contexts


Whether the EU AI Act’s detailed approach will negatively impact private sector investment and innovation


How to effectively measure and assess the legislative impact of AI regulations on innovation and investment


Timing and implementation details for potentially postponing high-risk AI system requirements in the EU


How to bridge the digital divide in computational power, data access, and scientific capability between developed and developing countries


Specific mechanisms for ensuring youth voices are meaningfully integrated into parliamentary AI policy processes


Suggested compromises

Adopt general legal frameworks with broad ethical principles rather than detailed technical regulations to maintain flexibility


Focus regulation on data classification and high-risk AI applications while allowing innovation in lower-risk areas


Implement consensus-based, multi-stakeholder approaches that involve all sectors in developing AI governance


Prioritize capacity building and education for parliamentarians while developing regulatory frameworks simultaneously


Create regulatory sandboxes to allow business experimentation within controlled environments


Establish framework laws with delegated authority to specialized bodies for detailed implementation rules


Balance immediate harm mitigation with long-term innovation goals through risk-based regulatory approaches


Thought provoking comments

However, whatever trials you are exerting in that track, you can’t. It’s embedded in your life. And the good thing now is that the ethical questions are being graced on every international table… There is no one safe until everyone is safe, and we have a responsibility to make it a safe space as possible, because definitely it’s going to be manipulated all the time for different purposes, for different reasons, politically and otherwise.

Speaker

Amira Saber


Reason

This comment is deeply insightful because it reframes AI regulation from a technical/legal issue to a fundamental human security issue. By invoking the COVID-19 lesson of ‘no one safe until everyone is safe,’ she connects AI governance to global solidarity and collective responsibility, moving beyond national regulatory approaches.


Impact

This comment elevated the discussion from technical regulatory details to philosophical and ethical foundations. It influenced subsequent speakers to consider the global interconnectedness of AI risks and led to questions about international coordination and the need for unified approaches across borders.


The democratic legislator is too slow for the technology developments. And so we are always behind… we need to reduce the normal behavior of a democratic legislator. So meaning there should be a kind of a solution in place after three months… It’s more a kind of a frame what we should have with ethical aspects or a kind of value-orientated frame.

Speaker

Axel Voss


Reason

This is a provocative challenge to traditional democratic processes, suggesting that democracy itself may be structurally inadequate for governing rapidly evolving technologies. It raises fundamental questions about the tension between democratic deliberation and technological urgency.


Impact

This comment sparked a crucial debate about regulatory approaches throughout the remainder of the discussion. Multiple participants referenced the framework vs. detailed regulation approach, and it led to practical suggestions about keeping laws simple while delegating flexibility to regulatory bodies.


Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed. And actually there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake.

Speaker

Amira Saber


Reason

This comment is powerfully insightful because it grounds abstract AI risks in concrete, life-threatening realities, particularly for vulnerable populations. It demonstrates how AI harms intersect with existing social inequalities and cultural contexts in ways that can be fatal.


Impact

This visceral example shifted the discussion from theoretical policy considerations to urgent human rights concerns. It influenced later questions about child protection and gender-based violence, and reinforced the need for immediate regulatory action rather than prolonged deliberation.


I would even state that young people are way better at actually seeing what is deepfake and what is not and this shows a little bit the issue that we’re generally facing as a young generation. We are always deemed as not knowing specific things when we’re actually really good at specific things… how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming?

Speaker

Yasmin Al Douri


Reason

This comment is thought-provoking because it directly challenges assumptions made by senior policymakers and flips the narrative about generational digital literacy. It highlights a critical gap in policymaking where those most affected by regulations have the least voice in creating them.


Impact

This intervention created a notable shift in tone, forcing Axel Voss to clarify his earlier statement and acknowledge the problem of excluding youth voices. It introduced the crucial question of intergenerational equity in AI governance and influenced the moderator to emphasize the importance of including youth perspectives.


AI is global, it is not local, and same as cyber security. Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI, each country will try to start having its own regulation. But how we are going to implement it globally?

Speaker

Hossam Elgamal


Reason

This comment is insightful because it identifies a fundamental structural problem: the mismatch between global technology and national regulatory frameworks. It draws a parallel with cybersecurity to show this is a recurring challenge in digital governance.


Impact

This question exposed a critical weakness in the current regulatory approach and led to discussions about the need for international coordination. It influenced Amira Saber’s response about creating an ‘AI policy radar’ and highlighted the limitations of purely national approaches to AI governance.


What is the regulatory body that will implement? We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation. And going to AI and putting regulation for AI, who is going to implement the regulation?

Speaker

Hossam Elgamal


Reason

This comment cuts to the heart of implementation challenges, pointing out that existing regulatory infrastructure is inadequate for AI governance. It highlights the gap between creating laws and having the institutional capacity to enforce them.


Impact

This practical concern grounded the discussion in implementation realities and led to concrete discussions about creating new regulatory bodies, such as Amira Saber’s mention of Egypt’s Supreme Council on Artificial Intelligence and Axel Voss’s reference to the EU’s AI office.


Overall assessment

These key comments fundamentally shaped the discussion by introducing critical tensions and complexities that moved the conversation beyond surface-level policy discussions. Amira Saber’s comments consistently elevated the discourse to address human rights, global solidarity, and life-threatening consequences, while Axel Voss’s observation about democratic processes being too slow created a central tension that influenced much of the subsequent debate. The youth representative’s challenge to generational assumptions and the practical questions about implementation and global coordination forced participants to confront the limitations of current approaches. Together, these interventions transformed what could have been a technical policy discussion into a nuanced exploration of democracy, human rights, global governance, and intergenerational equity in the age of AI. The comments created a cascading effect where each insight built upon others, ultimately revealing AI regulation as a complex challenge requiring fundamental rethinking of governance structures, democratic processes, and international cooperation.


Follow-up questions

How can we have only one interpretation of AI Act provisions across the European single market to avoid confusion for companies?

Speaker

Axel Voss


Explanation

This is crucial for business clarity and consistent implementation across EU member states, unlike the varied interpretations seen with GDPR


Who should be held accountable when sensitive data (like hospital data) is leaked in AI systems?

Speaker

Amira Saber


Explanation

This addresses the fundamental question of liability and responsibility in AI data breaches, especially for sensitive national data


How can we balance AI innovation incentives with regulatory constraints to avoid discouraging private sector investment?

Speaker

Amira Saber


Explanation

This is essential for countries needing AI investments in healthcare, education, and agriculture while maintaining ethical standards


What regulatory body will implement AI regulations, given that current telecommunication regulatory bodies are inadequate for digital society regulation?

Speaker

Hossam Elgamal


Explanation

This addresses the institutional gap in AI governance and the need for appropriate regulatory infrastructure


How can international AI regulation be implemented globally when AI is inherently global but countries are developing separate national regulations?

Speaker

Hossam Elgamal


Explanation

This highlights the challenge of coordinating AI governance across borders, similar to ongoing challenges with international cybersecurity law


Should countries slow down AI regulation or move forward, especially when neighboring countries have different approaches?

Speaker

Ali from Bahrain Shura Council


Explanation

This addresses the strategic timing of AI regulation and whether early adoption provides advantages or disadvantages


How can we bring the reality of youth perspectives to parliamentarians and ensure AI regulation is future-proof for coming generations?

Speaker

Yasmin Al Douri


Explanation

This challenges assumptions about youth capabilities and emphasizes the need for intergenerational input in AI policymaking


Can AI help in mitigating the social impact of child abuse and gender-related inequalities?

Speaker

Remote participant


Explanation

This explores the potential positive applications of AI in addressing serious social issues


How can we assess the legislative impact of AI bills, particularly whether EU AI Act affected private sector investments?

Speaker

Amira Saber


Explanation

This addresses the need for evidence-based policy evaluation to understand the real-world effects of AI regulation


What is needed to push back against problematic narratives that ignore current AI harms while focusing only on potential benefits?

Speaker

Meredith Veit


Explanation

This addresses the need to balance AI regulation discussions with acknowledgment of existing harms requiring immediate attention


What should be the main framework to minimize AI risks while maintaining flexibility for rapid technological changes?

Speaker

Mounir Sourour


Explanation

This seeks practical guidance on creating adaptable regulatory frameworks that can evolve with technology


How can we create an AI policy radar similar to the climate policy radar to track global AI policy developments?

Speaker

Amira Saber


Explanation

This would provide parliamentarians and policymakers with comprehensive knowledge of AI policy developments worldwide


How can we verify AI-generated content and distinguish between real and fake information, including deepfakes?

Speaker

Amira Saber


Explanation

This addresses the critical challenge of content verification in an era where AI can create convincing fake content


How can democratic legislators become faster in responding to technology developments instead of always being behind?

Speaker

Axel Voss


Explanation

This addresses the fundamental challenge of democratic processes being too slow for rapid technological advancement


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #484 Innovative Regulatory Strategies to Digital Inclusion

WS #484 Innovative Regulatory Strategies to Digital Inclusion

Session at a glance

Summary

This workshop discussion focused on innovative regulatory policy and business strategies for achieving equitable digital inclusion, particularly in developing countries and Africa. The session was organized under South Africa’s G20 presidency, building on previous work by Brazil that developed the concept of “meaningful connectivity” beyond basic internet access. The panelists identified that the primary barriers to digital inclusion are demand-side constraints rather than supply-side infrastructure issues, with device affordability being the biggest obstacle to internet access, followed by digital literacy and skills gaps.


The discussion revealed that despite high mobile broadband coverage in many African countries (above 95% in some cases), actual connectivity rates remain below 20%, indicating that coverage alone does not solve the digital divide. Panelists emphasized that 90% of unconnected people live in areas with existing coverage but face other barriers to access. The conversation highlighted how digital technologies amplify existing inequalities, creating multiple tiers of connectivity from the unconnected to those with minimal access to those who can meaningfully participate in the digital economy.


Solutions discussed included reducing regulatory barriers for small operators and community networks, implementing wholesale access regulation to lower backhaul costs, developing innovative device financing schemes, and creating comprehensive digital skills training programs. The panelists stressed the importance of intermediaries like libraries and post offices in supporting digital inclusion, and the need for diverse, locally-relevant solutions rather than one-size-fits-all approaches. The discussion concluded with calls for a fundamental shift from treating people as consumers in a market-driven system to recognizing digital access as a public good and citizen right, requiring cross-sectoral collaboration and whole-of-society approaches to address the underlying structural inequalities that perpetuate digital exclusion.


Keypoints

## Major Discussion Points:


– **The Digital Divide is More Complex Than Just Connectivity**: The discussion reveals that 90% of unconnected people actually live in areas with mobile broadband coverage, indicating the problem isn’t infrastructure but rather affordability, digital skills, and meaningful usage barriers.


– **Device Affordability as the Primary Barrier**: Research shows that for the poorest 20% in sub-Saharan Africa, an entry-level internet-enabled device costs 99% of average monthly income, making device cost the biggest obstacle to internet access rather than data costs.


– **Need for Diverse Ecosystem Solutions Beyond Traditional Operators**: The conversation emphasizes moving from a “few big stones” approach (large mobile operators) to enabling smaller, community-based networks, social enterprises, and alternative business models that can serve “uneconomic” areas.


– **Regulatory and Policy Failures in Addressing Demand-Side Constraints**: Discussion of how current regulatory frameworks focus too heavily on supply-side solutions while neglecting demand-side interventions, wholesale access regulation, and the need for treating digital resources as public goods.


– **Systemic Inequalities Amplified by Digital Technologies**: The panel addresses how digital technologies layer over existing structural inequalities (education, income, gender, rural/urban divides) and amplify rather than reduce these disparities, requiring holistic cross-sectoral approaches.


## Overall Purpose:


This workshop aimed to examine innovative regulatory policies and business strategies for achieving equitable digital inclusion, building on G20 work under South Africa’s presidency. The goal was to shift the global conversation from purely connectivity-focused solutions to addressing the complex demand-side barriers that prevent meaningful internet usage, even where coverage exists.


## Overall Tone:


The discussion maintained a collaborative and solution-oriented tone throughout, with experts building on each other’s insights rather than debating. The tone was analytical and evidence-based, with participants sharing research findings and practical examples. There was an underlying sense of urgency about addressing digital inequalities, particularly given lessons from the pandemic, but the conversation remained constructive and forward-looking, emphasizing the need for systemic change and innovative approaches to digital inclusion.


Speakers

**Speakers from the provided list:**


– **Alison Gillwald** – Workshop moderator, works with Research ICT Africa as knowledge partner to the South African government for the G20, focusing on digital inequality and equitable digital inclusion


– **Carlos Rey-Moreno** – From the Association for Progressive Communication (APC), works on digital inequality, connectivity, inclusion, and community networks, with focus on social enterprises


– **Claire Sibthorpe** – Works with GSMA, specifically in mobile for development and inclusive development, focusing on mobile internet connectivity and digital inclusion


– **Steve Song** – From the Internet Society (previously worked with Mozilla), expert in telecommunications, internet infrastructure, and connectivity solutions


– **Dr Gillian Marcelle** – Independent consultant, extensive experience working across Africa in mobile telephony, policy and regulatory initiatives for universal access, advising operators and regulators


– **Sophie Maddens** – Works with the ITU (International Telecommunication Union), involved with the World Development Telecommunications Conference, focuses on regulatory issues and digital inclusion


– **Audience** – Multiple audience members who asked questions and participated in the discussion


**Additional speakers:**


– **Leandro Navarro** – From eReuse initiative and APC, works on device reuse and refurbishment for digital inclusion


– **Kevin Hernandez** – Works at the Universal Postal Union (UN organization for postal sector), focuses on connecting intermediaries for digital inclusion


– **Peter** – Online moderator/facilitator managing remote participants and questions


– **Leslie** – Technical support person managing online connections


– **Ramune** – Online participant who commented about libraries as intermediaries (mentioned indirectly through Peter)


Full session report

# Workshop Report: Innovative Regulatory Policy and Business Strategies for Equitable Digital Inclusion


## Executive Summary


This workshop, conducted under South Africa’s G20 presidency, brought together leading experts to examine innovative approaches to achieving equitable digital inclusion. The discussion revealed a fundamental shift in understanding the digital divide, moving beyond traditional infrastructure-focused solutions to address complex demand-side barriers that prevent meaningful internet usage even where coverage exists.


The panel identified that whilst mobile broadband coverage reaches above 95% in many African countries, actual connectivity rates remain below 20%, indicating that most unconnected people live in areas with existing coverage but face other barriers to access. This finding challenges conventional approaches and highlights the need for comprehensive solutions addressing device affordability, digital literacy, and systemic inequalities.


## Key Participants


**Alison Gillwald** from Research ICT Africa moderated the session, bringing experience as knowledge partner to the South African government for G20 initiatives. **Sophie Maddens** from the International Telecommunication Union provided regulatory perspectives, whilst **Claire Sibthorpe** from GSMA offered mobile industry insights. **Steve Song** from the Internet Society contributed telecommunications infrastructure expertise, **Dr. Gillian Marcelle** brought independent consulting experience, and **Carlos Rey-Moreno** from the Association for Progressive Communication represented civil society perspectives on community networks.


Additional contributions came from **Leandro Navarro** on device reuse initiatives, **Kevin Hernandez** from the Universal Postal Union on intermediary organisations, and audience members who enriched the discussion.


## Redefining Digital Exclusion


### Beyond Basic Connectivity


**Sophie Maddens** highlighted that 2.6 billion people remain unconnected to the internet, with persistent divides across rural/urban, income, gender, and age demographics. However, **Alison Gillwald** argued that when meaningful connectivity standards are applied—requiring quality, availability, affordability, devices, skills, and security—the number of truly digitally excluded people approaches 4-4.5 billion.


Gillwald explained that meaningful connectivity, building on previous G20 work, requires that people have safe, enriching, and productive online experiences at affordable costs, not merely minimal broadband connections. Under South Africa’s G20 presidency, this framework has been extended to include digital financial transactions, security awareness, data protection, government services access, and digital identity.


### The Plateau Effect


**Steve Song** identified a critical challenge: internet access growth is plateauing as the telecommunications industry has “connected the easy parts,” leaving billions requiring fundamentally different approaches. **Claire Sibthorpe** reinforced this analysis, noting that 90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage.


## Primary Barriers to Digital Inclusion


### Device Affordability as the Dominant Constraint


The panel reached strong consensus that device affordability represents the primary barrier to internet access. **Claire Sibthorpe** presented evidence that for the poorest 20% in sub-Saharan Africa, an entry-level internet-enabled device costs 99% of average monthly income, making device acquisition practically impossible for the most vulnerable populations.


**Alison Gillwald** expanded on this challenge, explaining that even when people acquire devices, they often can only use them for basic functions rather than for business or productive purposes due to both affordability constraints and digital literacy gaps.


### Education and Digital Literacy


**Sibthorpe** identified digital literacy as the second major barrier, closely linked to device affordability in creating compound barriers to access. **Gillwald** provided crucial context by explaining that the main determinants of internet access correlate with education level, which in turn correlates with income and employment opportunities.


This reveals the systemic nature of digital exclusion, where existing inequalities in education and economic opportunity directly translate into digital disadvantage. **Sibthorpe** emphasised that digital skills training must be tailored to mobile devices since those are what people actually use.


### Regulatory and Market Structure Challenges


**Steve Song** argued that current regulatory frameworks focus too heavily on competition policy without adequately addressing inclusion strategies. **Alison Gillwald** provided specific evidence of regulatory failures, noting that market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation that could significantly reduce costs.


The discussion revealed significant regulatory barriers that prevent smaller operators and community networks from entering markets. **Carlos Rey-Moreno** highlighted the vast differences in regulatory requirements across countries, with many African countries imposing high transaction costs that effectively exclude community-based solutions.


## Alternative Models and Solutions


### Community Networks and Social Enterprises


**Carlos Rey-Moreno** presented community networks and social enterprises as crucial alternatives to traditional operator models. These organisations are driven by socially motivated intentions rather than purely commercial objectives, enabling them to serve populations that are economically unviable for traditional operators.


Rey-Moreno emphasised the difference between “transactional” and “transformational” services, arguing that social enterprises provide transformational connectivity that creates local value and addresses community-specific needs through circular economies that maintain money locally.


### Ecosystem Diversity


**Steve Song** introduced a compelling ecological metaphor, arguing that telecommunications ecosystems need diversity like healthy forests, with protection for small operators and encouragement of different business models. This diversity is essential because large mobile network operators, whilst successful in their market segments, cannot economically serve all populations and areas.


### Capacity Building and Local Ownership


**Steve Song** argued for building capacity for communities to create, understand, and control their own network infrastructure, referencing Richard Feynman’s principle that “what I cannot create, I cannot understand.” He warned of the risk that without local ownership, communities become further entrenched as consumers rather than empowered as citizens.


### Intermediary Organisations


**Kevin Hernandez** highlighted the critical role of intermediary organisations such as libraries, post offices, and community centres in supporting digital inclusion. He described UPU initiatives to connect every post office to the internet and leverage postal networks for digital inclusion, demonstrating systematic approaches to supporting intermediary organisations.


## Current Implementation Efforts


Several panellists described ongoing initiatives demonstrating practical progress:


**Sophie Maddens** reported that the ITU has launched the first course in Africa for technical promoters at the community level, focusing on capacity building for local network development.


**Claire Sibthorpe** described GSMA’s mobile internet skills training toolkit, which has trained 75 million people across 40 countries, demonstrating the potential for scaling digital literacy interventions.


**Leandro Navarro** introduced device refurbishment and circular economy approaches as potential solutions to device affordability challenges, connecting unused devices with people who need them.


## Fundamental Tensions and Disagreements


### Systemic vs. Technical Solutions


A fundamental disagreement emerged between **Dr. Gillian Marcelle’s** call for addressing the “extractive economic system” as the root cause of digital exclusion and other speakers’ focus on technical, regulatory, and capacity-building solutions within existing frameworks. Marcelle argued that the shift toward deregulation 25 years ago fundamentally changed how telecommunications policy treats people—as consumers in a market rather than citizens with communication rights.


### Measurement Challenges


The disagreement between traditional metrics citing 2.6 billion unconnected people versus meaningful connectivity definitions suggesting 4-4.5 billion people lack adequate digital inclusion highlights fundamental measurement challenges that could undermine policy coordination and resource allocation.


## Multi-Stakeholder Collaboration


**Claire Sibthorpe** emphasised that addressing digital inclusion requires multi-stakeholder collaboration across sectors, as no single entity can solve these challenges alone. **Sophie Maddens** reinforced this perspective, advocating for cross-sectoral collaboration and whole-of-society approaches that integrate digital inclusion with broader development objectives.


The panel grappled with defining appropriate government roles in digital inclusion whilst supporting community-based solutions, acknowledging the tension between state responsibility and community empowerment.


## Unresolved Challenges


Several critical challenges remain unresolved:


– **Scaling Community Solutions**: Moving from small pilot projects to systematic interventions that can address digital inclusion at population level


– **Regulatory Implementation**: Reducing high regulatory transaction costs whilst maintaining quality and security standards


– **Financing Innovation**: Developing financing models specifically designed for smaller operators and social enterprises


– **Wholesale Access Regulation**: Implementing market reviews and wholesale access regulation to reduce dominance and increase competition


## Conclusion


This workshop revealed the complexity and urgency of achieving equitable digital inclusion. **Alison Gillwald’s** closing observation highlighted that “we are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns,” underscoring the life-and-death consequences of digital exclusion.


The discussion demonstrated strong consensus on the inadequacy of current approaches whilst revealing significant disagreements about solutions. The shift from viewing digital exclusion as primarily an infrastructure problem to recognising it as a complex challenge involving device affordability, digital literacy, regulatory barriers, and systemic inequalities represents a fundamental reframing of the issue.


The panel’s emphasis on ecosystem diversity, community ownership, and transformational rather than merely transactional approaches to connectivity suggests that achieving equitable digital inclusion will require innovative policies, financing mechanisms, and collaborative approaches that go well beyond traditional telecommunications sector interventions.


Most significantly, the discussion highlighted the tension between treating people as consumers in a market-driven system versus recognising them as citizens with rights to communication and digital participation. Resolving this tension may be crucial for developing sustainable, equitable approaches to digital inclusion that can address the needs of billions who currently lack meaningful connectivity.


Session transcript

Alison Gillwald: Thank you very much. This is the workshop on Innovative Regulatory Policy Business Strategies to Digital Inclusion, workshop 484. Sorry, we’re just doing a sound test before we start. Want to talk? Hello, hello. Hi. Hello. More, more, more, more, more. Okay.


Carlos Rey-Moreno: Hello. My name is Carlos. I’m very happy to be in Oslo. Okay. Cool.


Claire Sibthorpe: Hi, my name is Claire.


Alison Gillwald: Okay. Good. Right. Good morning, everyone. For those of you who’ve just joined us and are planning to be part of this roundtable discussion, which it is meant to be, please feel free to come up and join the roundtable so that we can involve you in the discussion. If others of you are here for other reasons, of course, please carry on, but for those of you who’d like to come up here and join us, please do. Right. Okay. Well, we’ll start this session, and perhaps just a little bit by way of background is that this session really and I’m going to be talking about the work that’s been done in the context of the G20 under the South Africa’s presidency, which has one of the core pillars, which is being focused on the Digital Economy Working Group, is on equitable digital inclusion. And this very much builds on the previous G20 work done under Brazil, which looked at extending conceptions and measuring meaningful connectivity as developed by the Broadband Commission and the Digital Cooperation Roadmap work that was done, which was looking at issues very much of affordability in addition to universal access at a period of time. And then, of course, the meaningful connectivity as developed by the ITU and CETIC for the Brazilian G20 presidency was very much looking at what you required besides a sort of minimal broadband connection. And so the concept of meaningful connectivity included for, in the Brazilian case, issues of quality, issues of affordability, and then also some acknowledgement from the really extraordinary demand side work that CETIC does across Latin America, but particularly in Brazil, some of the issues of the kind of digital skills, the basic skills that you would need in order to be able to meaningfully access the Internet. So under the South African G20 presidency, the concept of meaningful connectivity has been extended to include some of those out-of-scope factors that the meaningful connectivity work done under the Brazilian presidency was looking at. And those really included what people did online, which are very extensively covered in the African After Access Surveys done by Research ICT Africa. and who is a knowledge partner to the South African government for the G20 and is working with the ITU on extending this conception under the presidency. So there we’re looking at some of the Brazil out of scope issues which include limitations on people’s ability to transact financially. So issues around… Are you able to hear? Are you able to hear? Okay. Issues around being able to, for example, digital inclusion, to transact digitally online, able to be aware of some of the security threats that might exist online, able to effectively protect your data, those kinds of things. So we look at a lot more things than just the connectivity issues, whether you’re able to access government services, whether you have digital ID. It’s a very extensive beyond connectivity survey, although it fulfills all the requirements of the ITU international standards standardization. So the important part of this complementary aspect to that was saying, despite the evidence that we’ve had of these primary demand side constraints, which are attached to affordability, but are not limited only to affordability issues, especially when you’re talking about digital inclusion, not simply connectivity. So the results of the data, both in Brazil and in Southeast Asia, where it’s been done with partners at Learn Asia and across Africa, shows that the main barrier to accessing the internet is the cost of the device. Okay, so that’s within a whole regulatory business model, that cost of that device, as it currently is, and currently regulated, etc., is unaffordable to the majority of Africans. And in fact, little chance of it being affordable under existing conditions. for a lot of the population. The barriers then for data, which are often made as barriers to access, but the barriers to use are then the price of data. But the main barrier is the price of the device. And there are many things one could do to reduce that device, but the question is whether it could be enough to be affordable. But more importantly, what we see is that when even people when people are online or have access to a device, they are unable to use that device very meaningfully. So for example, in our micro enterprise surveys, we see that although a number of people in the South African case, for example, not all across Africa, actually have a smart device, they’re only able to use it for or they only use it for WhatsApp, they’re unable to use this whole array of small business apps that now exist, for example. And so I think the important part of this is that the because these surveys are nationally representative, and we can model them, we can see that the main drivers of internet access and use, the main determinant of whether you’re going to have access and how you’re going to be able to use it, the intensity of use, the scope of use correlates with education. So your level of education, which correlates with income, of course, employment and income, will determine whether you have access to the internet, and the degree to which you’re able to use it meaningfully, or effectively, or optimally. And certainly, whether you can use it for not just transacting that, but for purposes of production or well being of your home, etc. So the main issue that’s been presented with the ongoing work by multilateral organisations within the Broadband Commission and across the UN, is that there is still a focus in addressing the digital divide on issues of connectivity. Current projects is very, very large, multi million euro projects underway that are trying to establish what existing investment is needed to ensure that the last 8% of the population, only 8% of the population aren’t under current mobile broadband coverage. And so the challenge for us is that we’ve got least developed countries throughout Africa, Rwanda, Uganda, Mozambique with above 95% coverage, some of them 99% coverage, and yet they have less than 20% connectivity. So the challenges for many countries is not a supply side challenge, and I am talking just about digital inclusion, so basic level. Of course those economies need to be able to develop 4G and 5G, all sorts of other business things, but in terms of addressing the inclusion problem, some of our challenges have been that we continue to look at costing 4G, 5G infrastructure that’s needed to get universal coverage at a global level, when in fact we could be getting reasonably meaningful connectivity, even at 3G, but arguably 4G, and we have that across many countries, but people are unable, nevertheless, despite having coverage, to use the internet. They either cannot afford it, or they do not have the educational skills to use it meaningfully, and even very often you’re beyond quite basically. So what we are trying with this initiative under the G20, South Africa’s G20 presidency, is to say let’s respond to this now quite large-scale global south evidence that the primary constraints on internet access are demand-side constraints, and start shifting the discussion on the digital divide from a purely connectivity discussion with possibly a little bit of digital skills, digital literacy. That is not going to be sufficient to systemically move countries towards digital equality. So shifting this discussion purely from a connectivity debate to a non-connectivity debate. to actually saying, how do we firstly identify digital inequality, how do we measure it, and what are the policy responses that we need to redress it? And I think this is the sort of fundamental digital equality paradox, this wicked policy problem that we’ve been facing, that the Global Digital Compact tries to address, that multiple rounds of the G20 under India, Brazil, and South Africa’s developing country economies are trying to address, is that actually as we layer these new technologies over existing structural and other inequalities, we are actually amplifying those inequalities. And unlike the old voice and text kind of environment, where one knew that one was doing that between the connected and the unconnected, it’s not only between the connected and unconnected, of course it’s there, but it’s also between those who are barely connected, who are on tiny bits of data, really not meaningfully connected, and those who are able to transact effectively and participate in the economy, seeing as this is a digital economy working group focus, and then of course those who are able to produce using these technologies. So with that longer than intended introduction, let me turn to our panellists here, and of course our wonderful panellists online, which I shall hopefully, are still online, and should have introduced much earlier on, but in the room here we have Carlos Rey Moreno, who is from the APC, from the Association for Progressive Communication, but worked along intersections with various other NPOs over many years in the area of digital inequality and connectivity and inclusion and community networks specifically, but he’s going to talk about new developments around social enterprises today. And then we also have Clare Sipthorpe, who is with the GSMA, and particularly the mobile for development, inclusive development component of that, is going to speak to us about GSMA’s long-standing work in this area and then we’ve got online Steve Song I’m now from the Internet Society I think many of you might have know Steve very well from Mozilla and various other things before and then we also have Dr Gillian Marcelle Marcelle who is joining us I think from from Germany today but usually not and not there who’s a independent consultant but I think many of us will will be known to many of us as working extensively across Africa especially in the very exciting early days of mobile mobile telephony actually initially and then it’s all happened so fast and then of course very much involved with the policy and regulatory initiatives towards getting universal access both at the in within multilateral organizations but also technically advising operators and regulators across the continent so a very exciting team which is finally we’ve joined by Sophie Maddens who works with the ITU and has been very involved with the World Development Telecommunications Conference which you could also update us on who’ve also been preoccupied with the kind of extensive demands on regulators and you know the extended mandates that they’re facing with these rapidly diversifying technologies and the demands that are arising from those so I think we are just going to start off with Sophie telling us a little bit about what the ITU is doing in this area I think she has also been tracking what we’ve been doing within the G20 with the ITU


Sophie Maddens: Thank you, Alison, and good morning everybody, good morning, good afternoon, wherever you are in the world. Alison, if you permit, I’m going to build on your introductory statements, because really you set the scene in a perfect manner, because we all see how digital has and continues to impact all sector and aspects of our lives. So think of e-health, e-agriculture, e-education and e-government services, innovation opportunities for value creation and the skills needed for adoption and the infrastructure for access, because it’s really about access adoption and value creation. That’s what the digital transformation is all about. But we still have 2.6 billion people not connected to the internet. So there is and must be a sense of urgency with all these people still unconnected. And that really is the core of our work, really that sense of urgency to connect the unconnected, but also to make sure that everybody has a meaningful experience through the connectivity. Our concern is as well that the digital divide still persists in many areas, rural areas, urban areas, across income, across gender, across age groups, and there are deep new divides that have emerged for vulnerable groups. So really addressing that demand side is key, because the challenge, it’s not just one of infrastructure development. And of course, as ITU, we work on infrastructure development, but expanding that connectivity is not enough because having access or being online are not sufficient to benefit fully from the connectivity. And today we see deep divides. So we see the risk of creating a multi-speed digital world, as you yourself mentioned, Allison. And so the fear is that a privileged few, those equipped with infrastructure, with skills, with the resources, with the expensive devices, that they are the ones that drive and benefit from AI innovation, while marginalized or vulnerable communities and groups are left behind. And so that’s why that universal and meaningful connectivity, it’s important to consider and address that. And how do we define it? It’s enabling everyone to enjoy a safe, enriching and productive online experience at an affordable cost. It does not mean everybody must be connected all the time, but it describes a situation, as you said, Allison, where anyone can access the internet, but optimally, affordably, whenever and wherever they need. And that also must be an objective of digital policy. So as you said, UMC is built on six interdependent dimensions, quality of the connection, availability for use, affordability of devices, skills and security. And each of these dimensions contribute to that meaningful digital experience and strength, and one cannot compensate for weakness in the other. So UMC has and must continue to be a vital policy objective. And let me highlight one issue here. Data is key to the success of this policy objective, because you cannot fix what you do not know. Achieving UMC also requires a holistic strategy. So we think of infrastructure development, but also policy frameworks, education initiatives, and of course, the multi-stakeholder engagement. And let’s go even further to ensure that no one is left behind, which brings me to digital inclusion, which is that holistic, intersectional approach. are all working together to build a digitally inclusive world for all, regardless of age, gender, ability or geographic location. And that’s why we at ITU are keen to share best practices, foster regional and global collaboration, so that together we can build those inclusive societies, economies and environments. And we provide assistance to our membership to formulate, implement and promote ICT policies and strategies for digital inclusion. And we also work to empower diverse groups, including youth, women and girls, particularly in rural, remote, underserved and unserved areas and communities, but also including older persons like myself, persons with disabilities and persons with specific needs, and of course indigenous people and communities. That to reduce the digital divide and enable everyone to actively participate in the digital world. I’ll leave it at that for now and come back with more thoughts.


Alison Gillwald: Thank you very much for that, Sophie. And we’ll move on to Steve Song to talk about it, just reminding us that in this round we just want to identify what exactly the problem is, your take on what those problems are, and then we’ll move to solutions in the next round. And then also just to, again, invite the audience who want to participate on the roundtable and post questions or just listen closer by, please do feel free to come up and join the conversation. Steve, over to you.


Steve Song: Thanks, Alison. I think we exist at a particularly critical point at the moment in that with two conflicting trends. One is that the growth of access is plateauing, right? And that is… you know, the reason for that is that we’ve connected the parts that are easy and, you know, affordable to connect and that the people can, you know, there’s a business model to sustain connectivity there. The remaining 2.9 billion are going to require a different approach. At the same time, you know, as you mentioned, Alison, you know, telecommunications and the internet is a force multiplier. It’s an amplifier. And so those 2.9 billion people who are unconnected are falling further behind all the time as those with access actually, you know, profit from the benefits of access. So having a strategy now that focuses on the inclusion of everyone is absolutely critical. And I think this points to regulatory issues where we’ve been focused on, you know, promoting competition. Well, that’s still extremely important, but we need to now go beyond competition and have strategies for inclusion. And the existing models, which have been extraordinarily successful to date, especially mobile networks and their growth, you know, remain a tremendously important mechanism for providing affordable access. But there’s limits to how far they can go and what they can do and whether their business models are viable in the most challenging parts of the world. And the way I like to describe this is, you know, if you think of connectivity as a jar you’re trying to fill, you know, in every country there are typically, you know, two or three or four mobile network operators and they’re like stones you’re trying to fit into that jar. And you can fit, you know, three or maybe four stones in that jar and the jar looks full. But, in fact, if you fill that jar with water, still more than 50% of it remains empty. And what is needed now is regulation that actually accommodates those smaller operators, those differently shaped operators, whether they are municipalities or cooperatives or non-profits or national research and education networks that can fill in those shapes in different ways. Another way of explaining this is to say, you know, you think of it like forest management, you know, monocultures have historically been extraordinarily unsuccessful, very vulnerable and not the way to create a healthy ecosystem. In a healthy ecosystem, we want to protect small plants and new growth to create diversity in the ecosystem. And we need to do the same thing with telecommunications and the internet. We need to protect small operators and encourage their growth so that they create different business models, they challenge affordability paradigms and they go where large operators don’t necessarily want to go. I’ll stop there. Thank you.


Alison Gillwald: Thank you so much for that, Steve. I’ve been biting my tongue trying to, since Sophie spoke, to just urge you to look at the paper where we do, applying the universal meaningful connectivity conception, not even our own more extended equitable digital inclusion conception, point out that that 2.6 unconnected in terms of basic connectivity as previously described, in terms of the application of meaningful connectivity, which the G20 under Brazil very courageously looked at Brazil and their universal access figure previously, their internet penetration figures previously above 80%. when they applied the Meaningful Connectivity formula went right down to 20%. So, using again the same extrapolation, yes, 2.6 people unconnected and, as Sophie points out, such bad data that those could be out by, you know, several hundred thousand, possibly millions. But that’s another part of that we are also trying to promote. But that the figure more like the people who are really not digitally included, substantively digitally included, is much closer to 4, you know, 4 billion or 4.5 billion in terms of that definition that we’ve used before and that we are now using in the South African G20 process. So, it’s getting those unconnected but also those not meaningfully connected online. So, Claire, perhaps if you’d come in there because Steve has mentioned some of the limitations, but despite the success of the mobile operators, especially on the African continent, there are some limitations now in reaching those so-called uneconomic areas or subscribers.


Claire Sibthorpe: Yeah, thanks so much, Alison. And I’m going to talk about, you know, obviously from the mobile perspective because that’s, you know, mobile is the primary way most people and often only way most people access the internet. And I think, you know, we also do these country national representative surveys like Research ICT Africa and find exactly the same things as you’re finding. And if we look at the problem, so if in terms of mobile internet, if 57% of the world is now connected to mobile internet, of the unconnected, if you break it down, there’s only 4% who don’t live in areas without coverage, mobile broadband coverage. So, the majority of those, so 39%, which is 90% of the unconnected, live in areas where there’s covered, but they can’t use it. So, if 90% of the people who are not connected, it’s not a coverage issue. It’s the fact that they have other face, other barriers to using it. And the people who are unconnected, and I think we’ve mentioned, it’s been mentioned already, it’s predominantly people in rural areas, people lowering… lower education, lower income, women, people, persons with disabilities. So we, for example, just published our latest mobile gender gap report, which shows that women in low and middle income countries are 14% less likely than men to use the internet. And in fact, that gender gap has stalled. So we’re not seeing, you know, a great deal of progress in that regard. But in our surveys, we look at, you know, why, why are they, why are people not using the internet or not getting online? And then once they’re online, why are they only using it in these very limited ways, as you said? And, you know, our research has similar findings to you. So the biggest barrier to getting online is the affordability of a device. And you mentioned it, you know, also about how it’s, it’s challenging. And I think if you, you know, I was, I’m always struck by the number from Africa, if you, you know, in our analysis, we looked at if you are in the poorest 20% of people living in Africa, in sub-Saharan Africa, you’re, it’s costing 99% of your average monthly income to buy an entry level internet enabled device. So these are, this is a very significant problem that, you know, needs a lot of thought in terms of how to address it. It’s not an easy solution. The other top, there’s two top barriers to getting online is the affordability of device. And the second is literacy and digital skills. And then once people go online, we ask people, what’s stopping you from using it more? Why is it this sort of limited? And in our research, it’s showing again, safety and security concerns become a big issue, affordability, but more of data at this point also emerges. So, you know, we have to, we have to look at the barriers around affordability, skills, relevance of, you know, relevant content and services, safety and security issues. If we’re really going to move the needle and we’re really going to get people online, not just online, but using it to help meet their life, life needs. And it’s sort of, it’s that usage gap. It’s that, that really is where we need to be focusing our efforts to, to really move the needle. And, and like you, it’s, you know, segments like women who are are you know lower income lower education are disproportionately affecting but we’ve also done you know some analysis that looked at if you held um you know the same women and men of the same income education levels you know there would still be for example a gender gap because things like social norms and and these other factors also play so if you’re wanting to you have to consider you know these structural inequalities as well as social norms and some of these these big barriers um and they need um they need we need to think beyond coverage and we need to think you know and we need to think beyond you know a certain single stakeholder as you know and you know how we can address these these barriers as as has been said repeatedly in this panel you know now it’s only exacerbating inequalities and it’s absolutely critical that we we move this needle.


Alison Gillwald: Thank you so much and um as before we carry on I’m just going to ask the audience um particularly to um sort of prime themselves we’ve been talking about and we’ll continue to talk about a lot of um access solutions regulatory strategies to reduce prices issues of affordability but I think you know a lot of this demand side evidence is demonstrating that we can no longer solve this problem with uh siloed sort of sectoral solutions there’s you know we can we can remove taxes from mobile phones we can do a number of things but actually we really need transversal digital policies that will focus on our education challenges these fundamental challenges that we are facing um human development challenges and that you know the um gender questions as have been historically posed which homogenize you know women um really aren’t helping us with policy interventions that really need to be focused at you know women at the intersection of those multiple other inequalities so if you look overall at issues of um sort of rural deficits in terms of access to the internet and you compare it with gender rural is worse off now obviously there’s also a lot of women concentrated in those rural areas But in fact, if you look at some of our data, it’s an issue of the poor and it’s also issues of kind of location and those kinds of things. So if they were actually, you know, they’re poor men who are worse off than urban poor women just because of their proximity. So we really need sort of far more nuanced interventions, but we also need interventions that are way beyond certainly the telecommunication sector, communication sector, the historical sectors that look at this problem. If we can go to Carlos, Carlos, some of the problem setting has been stated, so please do just add to that. But if you’d also just move to what you see as some of the possible solutions that we could deal here on the access side, and then we’re hoping for some really innovative responses on some of the non-access ways in which we can address this problem as well.


Carlos Rey-Moreno: Thank you so much, Alison, and I want to go back to one of the points that you mentioned in the introduction around costing, how much money is needed to close the digital divide from an infrastructure point of view. And I believe there are way too many conversations about costing, how much does it cost to close the digital divide, and I believe we are going to hear a new figure at some point this year, and not that much about how that investment could be used differently, how to enable other models. Also coming from the G20 in Brazil, the Digital Investment Infrastructure Initiative from the ITU and several second-tier development banks stated that stakeholders should think beyond typical for-profit models to cover 70% of the remaining access gaps. So addressing the same actors, considering the same ways of building infrastructure is leading to some part of this inequality that we see, due to the return on investment that they are seeking, due to other practices. as we’ve heard. But it is surprising to also see that the Global Digital Compact is referring to investing in local networks to close the digital divide, right? Because why it happens that some of these local networks are socially driven models that go way beyond the transactional way that we’ve understood the internet so far. Enterprises are transacting for a price, a service that is internet connectivity, period, right? There are these other models based on socially driven intentions, I would say, or bottom lines, social bottom lines or environmental bottom lines, social enterprises that go beyond those transactional models, sorry, those transactional services. They provide social inclusion services, they provide transformational services that at the end of the day create a circular economy, maintain the money locally to develop other small enterprises that develop the local skills required not only to run that particular local network but to run other businesses in the community that contribute to creating culturally relevant content and services using sensor networks, for instance, and that contribute quite significantly to local innovation. We were talking about innovation before. The amount of innovation that can come from the communities and from the rural areas is astonishing, addressing their own community needs and their own problems. Yet education systems are more proposing that those rural people go and contribute to the economies as we see them in urban areas and not to the problems that they are facing locally. So thinking through how that supply and demand meet with this type of interventions that stimulate circular economies locally, I think it’s also a way of thinking about the equitable digital inclusion. that you alluded to also. Thank you.


Alison Gillwald: Thank you so much. We’ll come back to that. Before we go into speaking a little further on some of the solutions, are there any questions from the room as we also try and gather some questions online? I know we’ve got a number of people online. Are there any questions or comments from the room at this point? Okay, Leslie, what do we have online? If we can turn to Peter for that, but also to hear from Dr Gillian Marcelle as well. Yep, yep. Okay, so while we gather some of those online questions, we are also going to ask Dr Gillian Marcelle to come in. Dr Gillian Marcelle, if you could also add to your extensive experience on what some of the problems are, but also move on to what you see as some of the solutions, which I know you’ve put a lot of thought into. Certainly, and thank you so much, Alison, for the invitation to join this panel with so many pioneers.


Dr Gillian Marcelle: Actually, I want to go in a different direction, if I may, because I think it’s important to actually put a theoretical framing on this question of how do we actually achieve equitable digital inclusion, because all of those premises and all of those words actually matter. And in listening to my colleagues, and I was listening very carefully, what I didn’t hear come up is the root causes that lead to exclusion and that lead to inequity. And the root causes, in my view, are the fact that we have an extractive economic system. on which we are then trying to layer demand and supply side solutions. So, to my mind, equitable digital inclusion will be achieved when laws, regulation, policy, ecosystem strengthening, entrepreneurship, finance and investment take place. But if they do within the status quo, then nothing will change. And we will still have what we’ve called the unconnected last mile problems. And we will still be talking about the things that we’ve been talking about for 25 years. And my own work in this area has been, as Alison mentioned, from the policy and regulatory lens, but I was also deeply involved in financing, and not financing at a small scale, but financing from the pioneers of the African telecoms revolution. And I will say that there was innovation at a narrative level in that time, which is now nearly 25 years ago, because when we were making models to look at whether or not investing in Nigeria was a good thing for MTN to do, there was no data. And so when I hear my colleagues talk about the fact that you can’t get reliable information about the cost of a handset, or what you would price data at, that leaves out a fundamental issue, which is risk. We want to encourage the private sector to take risks and to benefit from a return. And so whatever we do from the policy and regulatory domain should not exclude or leave out the fact that some private sector solutions and providers will succeed and others will fail. And there should not be an attempt to stop that from happening under the presumption that that is the way to connect the unconnected. One final point. If a mobile handset like the one I have here is an asset for production and for well-being, there are in existence alternative collateral models for financing things that people need. And so in looking at the things that we need to be doing, not only from a policy and regulatory side in the telecoms or in the tech sector, we also need to be looking at what are the enabling conditions that would allow for a variety of solutions that tackle all of the very good things that I’ve heard from my colleagues, but do not assume that the direction of change is going to be coming from policy and regulatory only. Because that then leaves out a very important engine of change which has been shown to work and I’ll leave it there for now and say a little bit more about what I think needs to be done so that we don’t end up with a digital society that is anywhere like the United States where you’ve had Silicon Valley and Silicon Valley values and norms produce a digital society that is about as toxic as we could possibly imagine. I’ll leave it there for now.


Alison Gillwald: Thank you so much for that Dr Gillian Marcelle. I’m hoping that we’ll get some responses to that. I did want to draw your attention those of you who had a chance to look at the issues paper to indicate that this is not only a policy and regulatory alternatives. We’re looking at alternative business strategies, we’re looking at cooperatives, social enterprises which we’ll come back to. I think we are though looking at some of the public interest policy and regulatory failures that we’ve seen and I think we are looking at new shifts that are acknowledging that despite the enabling conditions that have been created for the extraordinary investments that we’ve seen by mobile networks on the African continent but also now of course fiber networks across the continent. The creation of these conditions prioritized the supply side valuation of resources and really neglected the demand side valuation of resources that would recognize these critical resources as digital public goods and increasingly global digital public goods that require demand side interventions if they are to serve as critical inputs in the economy and to be universally accessible as we require digital public goods to be and so one of the mechanisms that we think is a real travesty in the long theoretical and economic regulatory competition levers that they’re meant to be is you know the market reviews that have barely been conducted on the African continent and the demonstrate the need to assess dominance in markets and effectively remedy that and I think many you know there’s an extraordinary evidence of the impacts of wholesale access regulation in opening up markets that has been got to the point where it’s meant to be implemented and would have changed the environment very very differently to what it is now and through the ethos of creating the certainty for investors and getting the certainty for investors I would argue Dr Gillian Marcelle there’s been you know an open conversation to that they that commercial supply-side assessment spectrum with anything you know that that’s gone without creating the public value the commons aspects of this that would have allowed greater inclusion and I know Steve your work has also focused on this and now not only kind of wholesale you know leased facilities and those kinds of things but of course very importantly with mobile operators in many parts of the continent actually being the dominant operators no longer the old fixed networks your access to API’s that would have just changed this environment entirely and I just wondered if you want to pick up on that.


Steve Song: Yeah I think a wholesale access is increasingly a massive barrier to the development of affordable access typically in many countries it it costs more to transit inside the country via fiber than it does to connect internationally. And there has to be mechanisms for bringing down the cost of backhaul, which is increasingly the highest burden of cost, especially for small operators in terms of operating costs. Things like structural separation, breaking out the backbone from the incumbents and setting it up as a separate company is a great step forward. But I think there are even better things to do. One of my favourite examples is Corus in New Zealand, who is formerly part of the incumbent and was separated out into a backbone network across New Zealand and who have implemented effectively flat pricing across the country. So anywhere you can connect to a Corus network, you can peer at the same price as if you are in the capital city or very close to it. And that’s a huge issue. We see national research and education networks like Tenet, Sanren in South Africa implementing the same thing so that universities connect to their national backbone network at the same price, no matter where they are, whether they’re rural or urban. If you were to implement those strategies across, say, state-owned backbones, you would unlock competition. You would incentivise small operators to deliver services in rural areas where they simply can’t at the moment because of the cost of backhaul.


Alison Gillwald: Thanks very much for that, Steve. Claire, I was wondering if you wanted to come in on the mobile and the regulatory and possibly what alternatives GSMA is looking at addressing these so-called uneconomic areas. If you do have non-technical or sectoral strategies, if you’re actually supporting educational other initiatives, please I highlight those as well.


Claire Sibthorpe: Yeah, as I said in in sort of the opening comment, I think that the biggest issue in terms of connectivity is, is, you know, not the coverage. I mean, obviously, coverage is important, but it’s not only a coverage issue. And on the coverage point, I think, you know, where those areas where it’s not economical for operators to cover, you know, looking at in how they can be covered. And the different models is really important. But I do think that we need to also really look at these, you know, coverages, the data shows coverage is not going to get people connected and using the internet coverage alone. Obviously, coverage is an important prerequisite, but alone, it’s not as I said, 90% of the people are who are not using it are covered. So what we do need to do is address things like affordability of devices. And I think there’s a range of strategies that can be done there. You know, taxation is a big issue, reducing taxation, looking at innovative device financing schemes, looking at subsidy schemes, because, you know, the cost of these devices is not on its own going to get down to the level that the people who are not connected can can afford. So we need to think about that. But literacy and digital skills are also critical. And again, I think that requires, you know, multi stakeholder multi agency intervention. So we need to be building in digital skills, you know, in with across education and training programs of the government across, you know, and, and, you know, and ensuring that those things that those initiative help highlight, you know, how the internet is relevant for different segments. I think a lot of the time we see in our research, people say this is not for me, because they see role in, you know, maybe in the marketing or awareness campaigns role. I mean, urban men and not not necessarily reflecting themselves and their life needs, but also ensuring that those training campaigns build in elements around how to keep yourself safe and secure online and address all those those issues. And I think in terms of the mobile operators, I think first of all I think it can’t be done by one stakeholder, but mobile operators are doing this, so they’re doing a range of device financing, looking at data that they get from their networks as alternative credit scorings to provide device financing, providing a lot of digital skills training. We have, GSME has created a mobile internet skills training toolkit which is a free open source creative commons training content that can be used to provide people the basic skills to get on to use the internet and use it safely. It’s now been used across 40 countries, been trained, I think 75 million people now at least have been trained, so I think we’re trying, because I think we found a lot of the digital skills campaigns are also focused on laptops and tablets, but those are not the devices people are using their hands, and so they weren’t able to translate that training into ways that they could use in their lives, so we’ve tried to address that, some of that gap, but I think it requires interventions by quite a range of people, and I think we need to be focusing on these sort of, as you say, the demand side barriers, and we need to be thinking across stakeholder groups as to how we do that to make sure that we’re really able for people to get online and get online safely and meet and use the internet to meet their life needs.


Alison Gillwald: So thanks very much Claire. Carlos, could you talk to us a little bit about, we’ve spoken about some of the sort of failures, regulatory failures and those sorts of things, but and in regard to some of the more kind of systemic issues around, you know, that would change things at scale around getting greater competition and through wholesale access and driving down prices, but they’ve also been, I mean when Steve was speaking in the beginning about a few big stones or just like, you know, lots of stones, I think as Steve’s often said, you know, let a thousand flowers bloom kind of models, the ability of niche innovations community services, now social enterprises services to break into the system as you know had relatively high regulatory transaction costs and you know what do you see as the key levers there if one accepts that these are actually the way that one can you know address some of the systemic challenges that we’re facing.


Carlos Rey-Moreno: Thank you, thank you so much Alison. Well I think one of it or the most important one is recognition. Recognition and a deep insight into the value of a diverse diversified ecosystem of actors. We see that still there are you know like this mindset of only traditional large operators countrywide operators can solve certain problems and again those are doing great but only contributing or providing services from that transactional perspective that I was alluding to and not entering in the transformational aspect that the internet could bring into this into this aspect. So that would be the one recognition that other actors are needed and that other actors are contributing because when those actors are provided with an enabling regulatory environment well here in Europe for instance where there is a vast array of small operators providing fiber optics wireless you name it even private mobile network mobile networks in certain areas you just need to declare your activity your provision of telecommunication services. In the Philippines you need a congressional franchise the Congress needs to allow you to deploy infrastructure so reducing the regulatory barriers of what do you need to actually start some sort of a business practice whether social or not certainly is gonna allow to for those smallest stones that Steve was alluding to to actually grow and thrill right. I think also touching a bit on what Dr Gillian Marcelle was saying about that we need to establish innovative financing and investment models that allow this small and localised operators to thrill. I have the feeling that in the financial sector, a lot of the interest has been on supporting the interest of capital and not supporting the interest of people. I think 20 years after Wysys, we need to start recognising the financial models to think through or to understand how we can support smaller operators, smaller ticket sizes, understanding what are the needs of those smaller actors, which of course are critical and there are starting to be some very interesting models around this. And lastly, capacity building. We are super proud to have launched last week the first course with the ITU in Africa for technical promoters at the community level after five editions in Latin America. And I think once you have that regulatory frame, once you have the recognition, once you have the regulatory framework, once you have the innovative financing and investment models in place, if enough skills and enough awareness is around for people to take benefit and advantage of this financing and these regulatory interventions, we see this thrilling. In Kenya, there are 20 community networks already and more will come. In Colombia, there are across the same number. In Brazil, there has been a magnificent collaboration with the regulator. There are more than 50, right? So when those things start to appear, more of those diversified actors and local innovation is going to take place to create those other impacts that I was alluding to in relation to circular economies, local innovation and culturally relevant content and services.


Alison Gillwald: Carlos, I suppose some of the scepticism is kind of scaling us. You know, that yes, great to see that capacity building, but how many people have been trained? How many people can be trained? So, you know, what kind of more systematic… opportunities there are. But I think some of the kind of collective response. So if one, you know, enables all of these smaller providers, if one enables different kinds of capacity building, if one gets curriculum, actually, you know, it’s probably more entrenched in curriculums and stuff. Collectively, we could we could see some outcomes. But I think one of the main challenges, one of the things has been around like demand stimulation, that actually for the people now who are not online, big challenges around awareness of the Internet. These are obviously least educated people. And of course, very little local language content for people. So there seems to be a particular role for these social enterprise organizations, community organizations that have are able to also produce content that could stimulate the Internet take up.


Carlos Rey-Moreno: So someone that was said at a session yesterday was in relation to to fair trade. Right. Was in relation to creating the same environment as has been created for social and solidarity economy in other sectors, agriculture, retail, you name it, to to to really reach the scale that there would be enough products and trainings and whatnot. As you were saying, whole of government approach. If this was a course that every pivot in every country would teach how someone could start a small business in that area around telecommunications as they do with agriculture or with retail or with car mechanics or whatever. Certainly you can you can start creating this type of a scale that you were that you were referring to. And the same with with mechanisms, with financing mechanisms. We were talking this morning at a discussion with someone that in Kenya, you need at least 20 percent of interest to pay in 20 percent of interest rates to get a loan for for for for a small operator, because there is not that understanding. There is not that awareness in the financial sector locally that these small operators can actually do any of this. right so that type of financial sector deepening that type of engaging with local financial institutions so they can make available products that are accessible for small operators and small social enterprises in the country would be very much necessary I think for for that side of scale going again to the thousand flowers blooming that Steve was talking about but we need to look at it ecosystemically if it’s three or four philanthropic organizations giving grants here and we’re not going to tackle any problem whatsoever.


Alison Gillwald: And of course you say a whole of government but, I think some of the problems have been is there’s been a lot of investment focus in government and across government but actually what we need is a whole of society kind of approach that hopefully government will play a more active role in creating that public value kind of environment that we want for this I’m hoping we can go on to some questions before we go back to Dr Gillian Marcelle actually Dr Gillian Marcelle’s got her hand up so let’s take Dr Gillian Marcelle’s question Dr Gillian Marcelle’s response while we look Leslie I’m hoping that you can see Peter or can Peter hear me directly okay so if we can just line up some questions Peter and then we’ve got a question fortunately at our very small round table please do come and join us Dr Gillian Marcelle do you want to go ahead and then we’ll take one from the floor and then we’ll go online


Dr Gillian Marcelle: certainly what I wanted to come back to is the issue of dominance and your point about that the and I am assuming that you’re talking about regulatory agencies in developing countries have not taken the opportunity to look at dominance and industry concentration and so on in the tech sector and of course we know exactly why that is the case because so much of what happens and what called the digital space, gets its way of being from what is happening in the United States. And 25 years ago, a decision was made that deregulation and not even applying, Alison, this will be in your wheelhouse, not even applying broadcast regulations to all of these platform companies. So that the zeitgeist saw regulation and public interest, the notion that tech should serve the public interest, shifted. And it shifted 25 years ago. And so we must acknowledge that. Because the reason that we are struggling with Connectivity Plus and so on is because people are being treated like consumers in a neoliberal framing rather than citizens who have the right to communication and the rights to access. 25 years ago, we would be having a different conversation. 25 years ago, we also had pushed the multilateral organizations into recognizing the concepts that you are speaking about, you know, the global commons, telecoms and so on as global public goods. And we need to get back to that. Because if we don’t, and recognize just how far that shift has happened, unlike when Nelson Mandela was saying in 1996, that there are more fixed lines in all of Manhattan, than they are in all of sub-Saharan Africa. Now, what we can say is there are people in the Bronx in New York who cannot get access to internet. So it is the underlying economic system, not even finance. The economic system says you treat people like consumers in a market for profit maximization and then you layer everything on top of that. So that’s what I wanted to come back to because all of the things that we are talking about, market concentration, regulatory capture, the limits of regulatory power, the sort of the meekness of those interventions also come from that shaping of the frame. And there are things that we can do. We should not accept that it’s a foregone conclusion but we must also see from where this has originated as well.


Alison Gillwald: Thank you so much Dr Gillian Marcelle and we have a question from our roundtable. If you’d introduce yourself and then we’ll see somebody standing up there as well. Please if you want to join us, do. Please go ahead.


Audience: Hi, can you hear me? Yes, so I’m Leandro Navarro. I’m coming from an initiative called eReuse and also from APC and I wanted to highlight, because it’s being discussed, when it comes to talking about inclusion, it makes sense to count in let’s say millions or billions, not unconnected, but when it comes to meaningful connectivity probably you don’t find it on the amount of packets, IP packets that you get, but on what you do. What you do, the labels, the value and so forth. But also as it was commented, I mean I haven’t seen anyone connected directly to the internet if they connect to a device. And so, typically, we’ve been looking in community networks or in network infrastructure to the last mile. But I think it’s important to look at the last meter, because the last meter is when the action happens, when the meaningful part occurs. So imagine that we are talking about water. It’s very important to have water. But it depends if I have a glass or if I have a toilet or if I have a swimming pool. It’s completely different. And that is the meaning there. I’m swimming. I’m doing exercise or I’m eating because I have a pot and I’m cooking my food. So you cannot see it on the network layer. So I think it’s important to look at the last meter. And in the last meter, well, there are devices. It’s not the same. I mean, we have been doing projects in which we go to schools in Uganda and we replace mobile phones by laptops because mobile phone is not useful for learning. But a laptop can be. So it makes a big difference. So once we go beyond the challenge of bringing the Internet there, then the next thing is which device is there. And, you know, it’s interesting to see that there are unconnected people, but also there are unused devices. And then regarding affordability, there is this interesting opportunity that there are devices which are no longer used by one owner, but still they have a lot of years of life span. And then, I mean, refurbish them, refurbish them and collecting them and giving them to people that need a device that shouldn’t be the last model in the market can also help. Connecting the unconnected by supplying them unused devices and helping the environment. So, I mean, there are a lot of potential in the last meter and also in creating affordable devices which do not need to be manufactured again. So, well, I think it’s, yeah, it’s been discussed. I think the user device makes a lot of sense, a lot of meaning to the user. Of course, the user has to know what to do with it, but the device is not the same glass than some input.


Alison Gillwald: Thank you so much for that input. I think the importance of connectivity and the device, these are absolutely necessary conditions. So nobody’s saying that these access issues aren’t absolutely critical. I think the device refurbishment is a nice example. I think we have it in the issues paper, but I think it could be. Brazil, for example, has really very interesting examples of recycling within their circular economy policy and practice that are kind of scalable. Because I think in many of our environments, they’ve been little small project here for retraining people or something like that. So kind of getting those, you know, there’s innovation out of constraint that Africa is famous for. Models more effectively working to get the kind of systemic and scaling. I am hoping that the questions, some questions that we got lined up from the thing in here are also going to deal with some of the non-access issues. But please go ahead anyway.


Audience: Hi, so my name is Kevin Hernandez and I work at the Universal Postal Union, which is the UN organization that deals with the postal sector. And my question is specifically about the non-access issues. So I think, and I want to thank all of you for all the solutions that you put forward on this panel. They’ve all been very interesting. And specifically, I want to thank, I don’t know your name, but the person who mentioned something about community-based organizations. Because I think they also play a very critical role in the last mile, not just in connecting people, but also dealing with the immediate risks of digital exclusion. And what do I mean by that? I mean, in the case when someone is not connected and all the services in their country are digitalized and you can no longer access things in person, where do people usually turn to? They usually turn to a library. and they turned to a post office that might be offering the government services and digital financial services or they might turn to an NGO or they might turn into some other community based organization. But I don’t really hear many solutions that are put forward that kind of focus on connecting these intermediaries because these intermediaries play a big role in ensuring that the immediate effects of exclusion are not are not felt today. So we’re not going to we’re not going to connect all the unconnected anytime soon. There are billions of them. So what do we do now to ensure that these kind of intermediaries are not left in a place where they’re left to fend for themselves without any support? We need to also support these intermediaries. And how do we do that? And also, I just want to flag that I work for the UPU and I work for a project that aims to connect every post office to the Internet and leverage them for digital inclusion. So anybody who would like to learn more, you can come and find me. I have some concept notes about our project. Thank you.


Alison Gillwald: Thank you so much for that very useful input. And to say that, of course, a lot of the work that has been done by APC in this area and Mozilla with Steve. But anyway, I think just to emphasize that if the importance of intermediaries hasn’t been highlighted enough, it absolutely should be. And I think when we were talking about some of the high transaction costs for community services and those kinds of things is precisely to enable that kind of intermediary intervention. I think another interesting policy aspect to that, though, the challenge has been not to allow the state to abdicate its responsibilities to, you know, we’ll just let those communities sort out this little kind of minimalist network there or something, but to actively support them as part of programs. And it’s a state’s responsibility to do that and or to ensure that the licensed operator or whatever actually does serve those communities. So I think it’s an important policy debate. And I’m still hoping for some grand strategy. that’s going to solve the underlying human development challenge, so let’s go online and see what we have there. Peter can you hear me? I keep looking at Leslie thinking that he’s got the connection to you, but can you hear me?


Audience: Thank you, yes I can. There was a useful comment from Ramune about another form of intermediary. I quote, local libraries when equipped with sufficient connectivity and computers for public use contribute effectively to digital inclusion of communities they serve. Besides physical access tackling, also digital literacy, online safety and privacy issues, as well as walking people of all ages to digital learning opportunities. So putting that as a question, would you and the panel agree with that, and are there any other of those forms of intermediary like the post office that we just heard about?


Alison Gillwald: Great, so we’ve actually got a minute for each of the panellists, so I’m going to let them respond to each other, which I think some have already done, and then also just to take that last question if you’d like to. Steve, would you like to go ahead?


Steve Song: Thanks Alison. I think there’s a thread here that strikes me as very important. That relates to intermediaries such as post offices and libraries, but also to community networks, and that is the fact that we focus a lot on the capacity building of the consumer, right, to be able to use the network, but we don’t talk as much about the ability to build the network and capacity building to build and own networks. I came across a lovely quote from Richard Feynman, one of the great physicists of the 20th century. He said, what I cannot create, I cannot understand, and I think this is true of the internet, and it gives me pause when I think about solutions like Starlink, which are… The very remarkableness is kind of also their flaw in the sense that when you connect a Starlink dish you just turn it on and it connects to the internet and that’s it. Which is remarkable, but it also means that you don’t know what an IP address is, you don’t know what an autonomous system number is, you don’t know how to build the network and it is a loss of agency and control as a result. So I think that national research and education networks that are building their own fiber backbones, the same potential exists for post offices and libraries not to just receive connectivity but to be involved in the solution, in the provision of connectivity and I think there’s a huge risk when organizations are not involved, when citizens are not involved in that, you get situations such as we see now with AFRINIC, the agency responsible for assigning IP addresses across African countries, is in crisis because in order to participate in AFRINIC you need to be an internet service provider, you need to have an autonomous system number, you need to be an agent of building networks and if we don’t actually focus and invest in that ability to invest, then we’re further becoming, as Julian says, consumers rather than


Alison Gillwald: citizens in this process. Thanks Steve. Carlos, one minute please. No, less than that.


Carlos Rey-Moreno: Well, we live in a diverse world with diverse societies and in many ways the internet has been homogenized in the way that it’s been provided and I think at the center of this solution for equitable digital inclusion we need to embrace the diversity of solutions because Again, as Leandra was saying, like many people will use the internet differently, and talking to what Steve was saying in relation to autonomy, we need to enable the capacity of diverse ways of engaging, building, using, etc. And neither from the investors, nor from the regulators or the ministries, that ecosystem is there to enable and support that diversity, right? The risk is there, people are willing to take the risk, people are willing to do these interventions, but they don’t have an enabling ecosystem.


Alison Gillwald: Thanks very much. Sophie, please, you’ve got like 25 seconds.


Sophie Maddens: All right. Carlos, you gave me a perfect segue, because I’ve heard, I think all of us agree, we need a different mindset, right? So we need a different mindset to close the gap, that difficult gap. But that different mindset needs a different set of tools, skills and processes. So I think it’s not just about policy and regulation, but really that approach and experimenting, right? We need the variety of solutions and being bold enough to be able to experiment. You think of the regulatory sandboxes. So I think agility is key, boldness is key, having the necessary regulatory skills is key. And I think I’ve also heard that cross-sectoral collaboration, right? We need to think, if you think of digital financial inclusion, that’s automatically the working between the sectors. I think all of that is key.


Alison Gillwald: Thank you so much, Sophie, because that was quite a nice summing up for us that we’re not going to have time to do of highlighting some of those issues. We’ve got offline. Claire, if you want to just give us a 10 second response, please do.


Sophie Maddens: Sure. I mean, I guess I think what we’re all alluding to is there’s no one sort of silver bullet, that everything we do needs to be grounded in the realities of the people we’re trying to connect and connect in a meaningful way. And so I think we need and I think also what is critical is not only understanding people’s needs and barriers, but also taking a kind of holistic approach. It’s not about just giving coverage or giving devices. we need to think about skills, relevant content, that ecosystem that Carlos was talking about, enabling that kind of, you know, so we need to be thinking holistically about the barriers and it needs to be grounded in really the needs and barriers of the different communities and it is different, people communities are different and their needs and barriers are different and and thinking about that in that way.


Alison Gillwald: Okay, I think we don’t have a chance, Dr Gillian Marcelle, unless you have a off, we’re off time, but if you want to have a five second, 10 second response, please go ahead. I think you should trust your own instincts,


Dr Gillian Marcelle: Alison, because I think you know exactly how we should re-centre sustainable development into this agenda for what is being called digital inclusion. So thanks again for your leadership.


Alison Gillwald: Well, thank you so much for joining us, Dr Gillian Marcelle, and for all the pioneering work over so many years. My only thing, again, I can’t help myself, yes, Steve, Starlink does come down and you just switch on the internet, but it also doesn’t come free, even though a lot of the discourse is that this is this incredible free service that’s going to provide all, solve all our universality problems. And the other thing I just want to leave us with, with lots of these really important access solutions, but that are not, you know, that are kind of community or collective access solutions, is that should we face another pandemic, which we inevitably will, but if we should face it this month, this year, we are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns. They could not get to community centres, they could not get to libraries and they could not get to schools and they saw the greatest negative outcomes, death, from being unable to mitigate that risk. digitally. So onwards and forwards with these solutions and I’m still looking forward for some of those non-access solutions that we can take forward into the final G20 equitable digital inclusion responding to evidence of demand side constraints. Thank you so much. Thanks to our fabulous panellists and to the audience. Thank you. Thank you. Thank you.


S

Sophie Maddens

Speech speed

145 words per minute

Speech length

961 words

Speech time

396 seconds

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups

Explanation

Sophie Maddens highlights the scale of digital exclusion globally, emphasizing that billions remain without internet access. She notes that digital divides exist across multiple dimensions including geography, economic status, gender, and age, with vulnerable groups facing particularly deep new divides.


Evidence

Specific figure of 2.6 billion unconnected people


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Human rights


Disagreed with

– Alison Gillwald

Disagreed on

Scale and measurement of digital exclusion


Universal meaningful connectivity requires quality, availability, affordability, devices, skills, and security – not just minimal broadband connection

Explanation

Maddens argues that true connectivity goes beyond basic access to include six interdependent dimensions. She emphasizes that meaningful connectivity means enabling everyone to enjoy a safe, enriching and productive online experience at affordable cost, where one dimension cannot compensate for weakness in another.


Evidence

Definition of UMC built on six interdependent dimensions, with each contributing to meaningful digital experience


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Infrastructure


Disagreed with

– Dr Gillian Marcelle
– Claire Sibthorpe
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


People need safe, enriching, and productive online experiences at affordable costs, not just basic connection

Explanation

Maddens defines meaningful connectivity as more than just being online, but rather having access that is optimal, affordable, and available whenever and wherever needed. She argues this should be an objective of digital policy to prevent creating a multi-speed digital world.


Evidence

Definition that meaningful connectivity does not mean everyone must be connected all the time, but describes situation where anyone can access internet optimally and affordably


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Legal and regulatory


Cross-sectoral collaboration is essential, such as between telecommunications and financial sectors for digital financial inclusion

Explanation

Maddens emphasizes that addressing digital inclusion requires working across different sectors rather than in silos. She specifically mentions the need for collaboration between telecommunications and financial sectors to achieve digital financial inclusion.


Evidence

Example of digital financial inclusion requiring cross-sectoral work


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Economic


Agreed with

– Claire Sibthorpe
– Carlos Rey-Moreno

Agreed on

Multi-stakeholder collaboration is essential for digital inclusion


Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches

Explanation

Maddens argues that closing the digital gap requires a different mindset with new tools, skills and processes. She emphasizes the need for regulatory agility, boldness in experimentation, and having necessary regulatory skills to try variety of solutions.


Evidence

Mention of regulatory sandboxes as example of experimental approach


Major discussion point

Innovation and Financing Models


Topics

Legal and regulatory | Development


S

Steve Song

Speech speed

140 words per minute

Speech length

1068 words

Speech time

457 seconds

Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches

Explanation

Song argues that we are at a critical point where access growth is slowing because the easily connectable areas with viable business models have been addressed. The remaining unconnected population will require fundamentally different strategies and approaches to reach them.


Evidence

Specific figure of 2.9 billion people requiring different approach


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Alison Gillwald
– Claire Sibthorpe

Agreed on

Coverage is not the primary barrier to digital inclusion


Disagreed with

– Dr Gillian Marcelle
– Sophie Maddens
– Claire Sibthorpe

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


Current regulatory focus on competition needs to expand to include strategies for inclusion

Explanation

Song contends that while promoting competition remains important, regulatory frameworks must evolve beyond competition to actively address inclusion. He argues that existing mobile network business models have limits in reaching the most challenging parts of the world.


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Development


Telecommunications ecosystems need diversity like healthy forests – protecting small operators and encouraging different business models

Explanation

Song uses forest management as an analogy, arguing that monocultures are vulnerable and unsuccessful. He advocates for protecting small operators and new growth to create diversity in telecommunications ecosystems, allowing different business models that can challenge affordability paradigms and serve areas large operators avoid.


Evidence

Forest management analogy comparing monocultures to diverse ecosystems; jar analogy where mobile operators are like stones that appear to fill the jar but leave 50% empty space


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Legal and regulatory | Economic


Agreed with

– Carlos Rey-Moreno

Agreed on

Need for ecosystem diversity and alternative models


Wholesale access costs often exceed international connectivity costs, creating barriers especially for small operators

Explanation

Song identifies wholesale access as a massive barrier to affordable access development, noting it often costs more to transit within a country than to connect internationally. He argues this creates particularly high operating cost burdens for small operators.


Evidence

Example of Corus in New Zealand implementing flat pricing across the country; Tenet/Sanren in South Africa providing same-price university connections regardless of location


Major discussion point

Regulatory and Market Structure Issues


Topics

Infrastructure | Economic


Capacity building should include not just using networks but building and owning them to maintain agency and control

Explanation

Song argues that focusing only on consumer capacity building while neglecting the ability to build networks results in loss of agency and control. He cites Richard Feynman’s quote ‘What I cannot create, I cannot understand’ to emphasize the importance of understanding network construction.


Evidence

Richard Feynman quote; Starlink example showing remarkable connectivity but lack of understanding of IP addresses, autonomous system numbers; AFRINIC crisis example


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Infrastructure


C

Claire Sibthorpe

Speech speed

200 words per minute

Speech length

1364 words

Speech time

408 seconds

90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage

Explanation

Sibthorpe presents data showing that the vast majority of unconnected people actually have coverage available but cannot use it due to other barriers. She emphasizes that only 4% of unconnected people lack coverage, while 39% (representing 90% of the unconnected) live in covered areas but face usage barriers.


Evidence

Specific statistics: 57% of world connected to mobile internet, only 4% lack coverage, 39% have coverage but can’t use it


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Alison Gillwald
– Steve Song

Agreed on

Coverage is not the primary barrier to digital inclusion


Disagreed with

– Dr Gillian Marcelle
– Sophie Maddens
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


The biggest barrier to internet access is the cost of devices, not data prices

Explanation

Sibthorpe identifies device affordability as the primary obstacle to internet access based on GSMA’s national representative surveys. She argues that while data costs are barriers to increased usage, the initial barrier to getting online is device cost.


Evidence

GSMA surveys finding device affordability as top barrier; literacy and digital skills as second barrier


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Agreed with

– Alison Gillwald

Agreed on

Device affordability is a major barrier to digital inclusion


For the poorest 20% in sub-Saharan Africa, an entry-level internet device costs 99% of average monthly income

Explanation

Sibthorpe provides stark evidence of device unaffordability by showing that the poorest quintile in sub-Saharan Africa would need to spend nearly their entire monthly income on a basic internet-enabled device. This demonstrates the scale of the affordability challenge.


Evidence

Specific statistic: 99% of average monthly income for poorest 20% in sub-Saharan Africa


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Agreed with

– Alison Gillwald

Agreed on

Device affordability is a major barrier to digital inclusion


Literacy and digital skills are the second biggest barrier to getting online after device affordability

Explanation

Sibthorpe identifies digital skills as a major barrier both for initial access and for meaningful usage once online. She notes that safety and security concerns also become significant barriers once people are online, along with data affordability for increased usage.


Evidence

GSMA research showing literacy and digital skills as second top barrier; safety and security concerns emerging for existing users


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Sociocultural


Agreed with

– Sophie Maddens
– Alison Gillwald

Agreed on

Digital skills and education are critical barriers beyond connectivity


Digital skills training must be tailored to mobile devices since those are what people actually use, not laptops and tablets

Explanation

Sibthorpe argues that many digital skills programs focus on devices people don’t actually use, making the training irrelevant to their daily lives. She emphasizes the need for mobile-focused training that people can actually apply.


Evidence

GSMA’s mobile internet skills training toolkit used across 40 countries, training 75 million people; observation that existing campaigns focused on laptops/tablets that people weren’t using


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Sociocultural


Addressing digital inclusion requires multi-stakeholder collaboration across sectors, not single-stakeholder solutions

Explanation

Sibthorpe emphasizes that the complexity of digital inclusion barriers requires coordinated responses from multiple stakeholders rather than any single organization or sector attempting to solve the problem alone. She advocates for collaborative approaches that address the full range of barriers.


Evidence

Examples of mobile operators doing device financing, digital skills training; GSMA toolkit as multi-country solution


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Legal and regulatory


Agreed with

– Sophie Maddens
– Carlos Rey-Moreno

Agreed on

Multi-stakeholder collaboration is essential for digital inclusion


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches

Explanation

Sibthorpe argues that effective digital inclusion requires understanding that different communities have different needs and barriers. She emphasizes the importance of tailoring solutions to specific community contexts rather than applying universal approaches.


Evidence

Observation that communities are different and their needs and barriers are different


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Sociocultural


A

Alison Gillwald

Speech speed

147 words per minute

Speech length

4590 words

Speech time

1861 seconds

Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem

Explanation

Gillwald presents evidence that coverage is not the primary barrier to connectivity in many African countries. She argues that despite extensive mobile broadband coverage, actual connectivity remains very low, demonstrating that supply-side infrastructure investments alone are insufficient.


Evidence

Examples of Rwanda, Uganda, Mozambique with above 95% coverage, some 99%, but less than 20% connectivity


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Claire Sibthorpe
– Steve Song

Agreed on

Coverage is not the primary barrier to digital inclusion


When meaningful connectivity standards are applied, countries like Brazil saw internet penetration drop from 80% to 20%

Explanation

Gillwald explains how applying meaningful connectivity criteria rather than basic access measures reveals much lower actual digital inclusion rates. She uses Brazil’s experience under the G20 presidency to show how meaningful connectivity assessment dramatically changes understanding of digital inclusion levels.


Evidence

Brazil’s universal access figure dropping from above 80% to 20% when meaningful connectivity formula applied


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Legal and regulatory


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions

Explanation

Gillwald argues that current figures of 2.6 billion unconnected significantly underestimate the scale of digital exclusion. When applying meaningful connectivity standards that include not just basic access but substantive digital inclusion, the number of excluded people is much higher.


Evidence

Extrapolation from meaningful connectivity applications in Brazil, Southeast Asia, and Africa showing much higher exclusion numbers


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Human rights


Disagreed with

– Sophie Maddens

Disagreed on

Scale and measurement of digital exclusion


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment

Explanation

Gillwald presents evidence from nationally representative surveys showing that education is the primary driver of both internet access and the ability to use it meaningfully. She explains how education correlates with income and employment, creating compounding barriers to digital inclusion.


Evidence

Nationally representative After Access Surveys by Research ICT Africa; micro enterprise surveys showing people with smart devices only able to use WhatsApp, not business apps


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Sociocultural


Agreed with

– Sophie Maddens
– Claire Sibthorpe

Agreed on

Digital skills and education are critical barriers beyond connectivity


Even when people have devices, they often can only use them for basic functions like WhatsApp, not for business or productive purposes

Explanation

Gillwald provides evidence that device ownership doesn’t automatically translate to meaningful usage. She shows how people may have smartphones but lack the skills or knowledge to use them for productive activities like running small businesses or accessing various services.


Evidence

South African micro enterprise surveys showing people with smart devices only using WhatsApp, unable to use small business apps


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation

Explanation

Gillwald argues that regulatory authorities have failed to conduct necessary market reviews that would identify dominance and enable wholesale access regulation. She contends this represents a significant missed opportunity to increase competition and reduce costs.


Evidence

Reference to theoretical and economic regulatory competition levers and wholesale access regulation that could have changed the environment


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Economic


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights

Explanation

This argument is actually made by Dr Gillian Marcelle, not Alison Gillwald. It should be attributed to Dr Gillian Marcelle.


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Human rights


C

Carlos Rey-Moreno

Speech speed

149 words per minute

Speech length

1401 words

Speech time

561 seconds

Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation

Explanation

Rey-Moreno argues that community networks and social enterprises go beyond simply providing internet access as a commercial transaction. Instead, they create social inclusion services and transformational experiences that build circular economies, maintain money locally, and foster innovation that addresses community-specific needs.


Evidence

Examples of community networks creating circular economies, developing local skills, culturally relevant content, and sensor networks for local innovation


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Development | Economic


Agreed with

– Steve Song

Agreed on

Need for ecosystem diversity and alternative models


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators

Explanation

Rey-Moreno emphasizes that regulatory frameworks need to recognize and support diverse types of network operators beyond traditional large-scale commercial providers. He argues for reducing regulatory barriers that prevent small operators from entering the market and contributing to digital inclusion.


Evidence

Comparison between Europe where operators just need to declare activity versus Philippines requiring congressional franchise; examples of Kenya with 20 community networks, Colombia with similar numbers, Brazil with 50+ networks


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Legal and regulatory | Development


Agreed with

– Steve Song

Agreed on

Need for ecosystem diversity and alternative models


Alternative financing models are needed that support smaller operators and social enterprises rather than just capital interests

Explanation

Rey-Moreno argues that the financial sector has focused on supporting capital interests rather than people’s interests, creating barriers for small and localized operators. He advocates for innovative financing models that understand the needs of smaller actors and provide appropriate support.


Evidence

Example from Kenya where small operators face 20% interest rates due to lack of understanding in local financial sector


Major discussion point

Innovation and Financing Models


Topics

Economic | Development


Disagreed with

– Dr Gillian Marcelle

Disagreed on

Role of private sector and market mechanisms in digital inclusion


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies

Explanation

Rey-Moreno critiques current educational approaches that primarily prepare rural populations to contribute to urban economies rather than addressing local problems and fostering local innovation. He argues for education that builds capacity to solve community-specific challenges.


Evidence

Observation about innovation from communities and rural areas being astonishing when addressing local needs, contrasted with education systems directing people toward urban economies


Major discussion point

Skills, Education and Digital Literacy


Topics

Sociocultural | Development


D

Dr Gillian Marcelle

Speech speed

117 words per minute

Speech length

1012 words

Speech time

518 seconds

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo

Explanation

Dr Marcelle argues that the root causes of digital exclusion and inequity stem from an extractive economic system. She contends that without addressing these fundamental systemic issues, demand and supply side solutions will not achieve equitable digital inclusion and will perpetuate existing problems.


Evidence

Reference to 25 years of discussing the same issues without fundamental change


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Economic | Development


Disagreed with

– Sophie Maddens
– Claire Sibthorpe
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights

Explanation

Dr Marcelle traces current digital inclusion challenges to a fundamental shift in approach 25 years ago, when deregulation policies began treating people as consumers in a market rather than citizens with rights to communication and access. She argues this shift away from public interest regulation has created many current problems.


Evidence

Historical reference to decision not to apply broadcast regulations to platform companies; comparison between current situation and 25 years ago when there was push for telecoms as global public goods


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Human rights


Risk-taking and innovation should be encouraged in the private sector while ensuring variety of solutions for inclusion

Explanation

Dr Marcelle argues that policy and regulatory approaches should not exclude private sector risk-taking and returns, as some providers will succeed while others fail. She emphasizes that this natural process should not be prevented under the assumption that it helps connect the unconnected.


Evidence

Reference to her experience with financing African telecoms revolution 25 years ago, including work on MTN Nigeria investment models without reliable data


Major discussion point

Innovation and Financing Models


Topics

Economic | Legal and regulatory


Disagreed with

– Carlos Rey-Moreno

Disagreed on

Role of private sector and market mechanisms in digital inclusion


A

Audience

Speech speed

172 words per minute

Speech length

930 words

Speech time

324 seconds

Intermediaries like libraries, post offices, and community organizations play critical roles in supporting those facing immediate digital exclusion

Explanation

An audience member from the Universal Postal Union emphasizes that when people cannot access digitalized services directly, they turn to intermediaries like libraries, post offices, and NGOs. These organizations need support to help address the immediate effects of digital exclusion while broader connectivity solutions are developed.


Evidence

UPU project to connect every post office to internet and leverage them for digital inclusion; mention of libraries equipped with connectivity and computers contributing to digital inclusion


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Infrastructure


Device refurbishment and circular economy approaches can help address affordability by connecting unused devices with those who need them

Explanation

An audience member from eReuse argues that there are many unused devices with years of life remaining that could be refurbished and provided to people who need them but cannot afford new devices. This approach addresses both affordability and environmental concerns.


Evidence

Projects in Uganda replacing mobile phones with laptops in schools; concept of connecting unconnected people with unused devices while helping environment


Major discussion point

Innovation and Financing Models


Topics

Development | Sustainable development


Agreements

Agreement points

Coverage is not the primary barrier to digital inclusion

Speakers

– Alison Gillwald
– Claire Sibthorpe
– Steve Song

Arguments

Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches


Summary

All speakers agree that infrastructure coverage exists in most areas but people cannot access or meaningfully use internet services due to other barriers, indicating that supply-side solutions alone are insufficient


Topics

Development | Infrastructure


Device affordability is a major barrier to digital inclusion

Speakers

– Alison Gillwald
– Claire Sibthorpe

Arguments

The main barrier to accessing the internet is the cost of the device


The biggest barrier to internet access is the cost of devices, not data prices


For the poorest 20% in sub-Saharan Africa, an entry-level internet device costs 99% of average monthly income


Summary

Both speakers identify device costs as the primary financial barrier preventing people from getting online, with specific evidence showing devices are unaffordable for the poorest populations


Topics

Development | Economic


Multi-stakeholder collaboration is essential for digital inclusion

Speakers

– Sophie Maddens
– Claire Sibthorpe
– Carlos Rey-Moreno

Arguments

Cross-sectoral collaboration is essential, such as between telecommunications and financial sectors for digital financial inclusion


Addressing digital inclusion requires multi-stakeholder collaboration across sectors, not single-stakeholder solutions


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators


Summary

All three speakers emphasize that digital inclusion cannot be solved by any single stakeholder or sector, requiring coordinated approaches across multiple actors and sectors


Topics

Development | Legal and regulatory


Digital skills and education are critical barriers beyond connectivity

Speakers

– Sophie Maddens
– Claire Sibthorpe
– Alison Gillwald

Arguments

Universal meaningful connectivity requires quality, availability, affordability, devices, skills and security – not just minimal broadband connection


Literacy and digital skills are the second biggest barrier to getting online after device affordability


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment


Summary

Speakers agree that having access to technology is insufficient without the skills and education needed to use it meaningfully, with education being a fundamental determinant of digital inclusion


Topics

Development | Sociocultural


Need for ecosystem diversity and alternative models

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Telecommunications ecosystems need diversity like healthy forests – protecting small operators and encouraging different business models


Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators


Summary

Both speakers advocate for diverse telecommunications ecosystems that include small operators, community networks, and alternative business models rather than relying solely on large traditional operators


Topics

Legal and regulatory | Development


Similar viewpoints

Both speakers critique regulatory failures and the shift away from public interest regulation, arguing that current approaches prioritize commercial interests over citizen rights and public value

Speakers

– Alison Gillwald
– Dr Gillian Marcelle

Arguments

Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Topics

Legal and regulatory | Human rights


Both emphasize the importance of local agency, control, and capacity building that empowers communities to create and manage their own solutions rather than being passive consumers

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Capacity building should include not just using networks but building and owning them to maintain agency and control


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies


Topics

Development | Sociocultural


Both advocate for flexible, experimental approaches that can be tailored to specific community needs rather than applying universal solutions

Speakers

– Sophie Maddens
– Claire Sibthorpe

Arguments

Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches


Topics

Legal and regulatory | Development


Unexpected consensus

Limitations of current successful mobile network models

Speakers

– Steve Song
– Claire Sibthorpe
– Alison Gillwald

Arguments

Current regulatory focus on competition needs to expand to include strategies for inclusion


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem


Explanation

Despite mobile networks being extraordinarily successful in expanding coverage across Africa, all speakers acknowledge their limitations in reaching universal inclusion, which is unexpected given the typical celebration of mobile success stories


Topics

Development | Infrastructure


Need for systemic rather than sectoral solutions

Speakers

– Dr Gillian Marcelle
– Alison Gillwald
– Carlos Rey-Moreno

Arguments

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment


Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation


Explanation

There is unexpected consensus that digital inclusion requires addressing fundamental economic and social structures rather than just technological or sectoral interventions, suggesting a more radical approach than typically discussed in telecommunications policy


Topics

Economic | Development


Overall assessment

Summary

Strong consensus exists on core challenges (coverage vs. meaningful access, device affordability, need for skills) and the inadequacy of current approaches. Speakers agree on the need for multi-stakeholder collaboration, ecosystem diversity, and moving beyond traditional telecommunications solutions.


Consensus level

High level of consensus with significant implications for policy direction. The agreement suggests a paradigm shift is needed from supply-side infrastructure focus to demand-side, holistic approaches that address education, affordability, and systemic inequalities. This consensus among diverse stakeholders (ITU, GSMA, civil society, academia) indicates potential for coordinated policy action, though implementation challenges remain significant given the systemic nature of required changes.


Differences

Different viewpoints

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change

Speakers

– Dr Gillian Marcelle
– Sophie Maddens
– Claire Sibthorpe
– Steve Song

Arguments

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo


Universal meaningful connectivity requires quality, availability, affordability, devices, skills, and security – not just minimal broadband connection


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches


Summary

Dr Marcelle argues for fundamental economic system change as the root solution, while other speakers focus on technical, regulatory, and capacity-building approaches within existing frameworks


Topics

Economic | Development | Legal and regulatory


Role of private sector and market mechanisms in digital inclusion

Speakers

– Dr Gillian Marcelle
– Carlos Rey-Moreno

Arguments

Risk-taking and innovation should be encouraged in the private sector while ensuring variety of solutions for inclusion


Alternative financing models are needed that support smaller operators and social enterprises rather than just capital interests


Summary

Dr Marcelle supports private sector risk-taking and natural market processes including failures, while Rey-Moreno criticizes financial sector focus on capital interests over people’s interests


Topics

Economic | Development


Scale and measurement of digital exclusion

Speakers

– Sophie Maddens
– Alison Gillwald

Arguments

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions


Summary

Significant disagreement on the actual scale of digital exclusion, with Gillwald arguing the problem is much larger when meaningful connectivity standards are applied


Topics

Development | Human rights


Unexpected differences

Historical framing and root cause analysis

Speakers

– Dr Gillian Marcelle
– Other panelists

Arguments

The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Various technical and policy solutions focused on current barriers


Explanation

Dr Marcelle’s historical analysis of deregulation 25 years ago as the root cause was unexpected given other speakers’ focus on current technical and policy solutions. This fundamental disagreement about whether to address historical policy shifts or current barriers represents a deeper philosophical divide about reform vs revolution approaches


Topics

Legal and regulatory | Human rights


Data reliability and measurement challenges

Speakers

– Sophie Maddens
– Alison Gillwald

Arguments

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions


Explanation

The significant disagreement on basic statistics about digital exclusion was unexpected among experts working on the same issues. This suggests fundamental measurement and definitional challenges that could undermine policy coordination


Topics

Development | Legal and regulatory


Overall assessment

Summary

The discussion revealed moderate to significant disagreements on fundamental approaches (systemic change vs technical solutions), measurement of the problem scale, and the role of market mechanisms, while showing convergence on the need for diverse solutions and multi-stakeholder approaches


Disagreement level

The disagreements are substantial enough to potentially impact policy coordination and resource allocation, particularly the 2.6 billion vs 4-4.5 billion measurement gap and the fundamental divide between reform-oriented technical solutions versus systemic economic transformation approaches. However, the shared recognition of demand-side barriers and need for innovation provides common ground for collaborative action.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers critique regulatory failures and the shift away from public interest regulation, arguing that current approaches prioritize commercial interests over citizen rights and public value

Speakers

– Alison Gillwald
– Dr Gillian Marcelle

Arguments

Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Topics

Legal and regulatory | Human rights


Both emphasize the importance of local agency, control, and capacity building that empowers communities to create and manage their own solutions rather than being passive consumers

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Capacity building should include not just using networks but building and owning them to maintain agency and control


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies


Topics

Development | Sociocultural


Both advocate for flexible, experimental approaches that can be tailored to specific community needs rather than applying universal solutions

Speakers

– Sophie Maddens
– Claire Sibthorpe

Arguments

Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches


Topics

Legal and regulatory | Development


Takeaways

Key takeaways

The digital divide is primarily a demand-side problem rather than a supply-side connectivity issue, with 90% of unconnected people living in areas with mobile broadband coverage but facing other barriers


Device affordability is the biggest barrier to internet access, with entry-level devices costing 99% of monthly income for the poorest 20% in sub-Saharan Africa


Meaningful connectivity requires six interdependent dimensions: quality, availability, affordability, devices, skills, and security – not just basic connection


When meaningful connectivity standards are applied, the number of truly digitally excluded people is closer to 4-4.5 billion rather than the commonly cited 2.6 billion


Education level is the main determinant of internet access and meaningful use, correlating with income and employment opportunities


A diverse telecommunications ecosystem is needed, similar to forest management, with small operators, cooperatives, and social enterprises filling gaps that large operators cannot address economically


Current regulatory frameworks focus too heavily on competition and need to expand to include specific strategies for digital inclusion


The shift toward treating people as consumers rather than citizens with communication rights has contributed to current exclusion patterns


Multi-stakeholder, cross-sectoral collaboration is essential, as no single entity can solve digital inclusion challenges alone


Resolutions and action items

ITU launched the first course in Africa for technical promoters at the community level for capacity building


GSMA created a mobile internet skills training toolkit (Creative Commons) that has trained 75 million people across 40 countries


Universal Postal Union is implementing a project to connect every post office to the Internet and leverage them for digital inclusion


Continued work under South Africa’s G20 presidency to extend meaningful connectivity concepts to include equitable digital inclusion measures


Development of innovative financing models specifically designed for smaller operators and social enterprises rather than traditional capital-focused approaches


Unresolved issues

How to achieve systematic scaling of community networks and social enterprises beyond small pilot projects


Lack of reliable data for measuring digital inclusion progress and device affordability across different regions


High regulatory transaction costs that prevent smaller operators and community services from entering markets


Wholesale access regulation implementation failures across African continent, missing opportunities to reduce backhaul costs


How to address the fundamental ‘extractive economic system’ that underlies digital inequality without just layering solutions on existing structures


Ensuring state responsibility for universal access while supporting community-based solutions without allowing government abdication of duties


Preparing for future pandemic scenarios where collective access solutions (libraries, community centers) may be inaccessible


Suggested compromises

Balancing private sector risk-taking and profit incentives with public interest requirements for digital inclusion


Combining large operator efficiency with small operator innovation through regulatory frameworks that accommodate both


Integrating device refurbishment and circular economy approaches with new device manufacturing to address affordability


Using intermediaries like libraries and post offices to bridge immediate digital exclusion while working toward long-term connectivity solutions


Implementing regulatory sandboxes that allow experimentation with new models while maintaining necessary oversight


Developing whole-of-society approaches that include but don’t rely solely on government intervention


Thought provoking comments

The main barrier to accessing the internet is the cost of the device… But more importantly, what we see is that when even people when people are online or have access to a device, they are unable to use that device very meaningfully.

Speaker

Alison Gillwald


Reason

This comment fundamentally reframes the digital divide discussion by distinguishing between basic connectivity and meaningful use. It challenges the prevailing focus on infrastructure by highlighting that even those with access often cannot use devices effectively due to educational constraints.


Impact

This set the foundational framework for the entire discussion, shifting focus from supply-side (infrastructure) to demand-side constraints. It established the conceptual foundation that other panelists built upon throughout the session.


If you think of connectivity as a jar you’re trying to fill… in every country there are typically two or three or four mobile network operators and they’re like stones you’re trying to fit into that jar… But, in fact, if you fill that jar with water, still more than 50% of it remains empty.

Speaker

Steve Song


Reason

This metaphor brilliantly illustrates why traditional approaches to connectivity are insufficient. It demonstrates how dominant operators, while successful, cannot address the full scope of connectivity needs, making a compelling case for ecosystem diversity.


Impact

This metaphor became a recurring theme, with other speakers referencing the need for diverse solutions and smaller operators. It shifted the conversation toward regulatory frameworks that could accommodate different types of service providers.


I want to go in a different direction… because I think it’s important to actually put a theoretical framing on this question… what I didn’t hear come up is the root causes that lead to exclusion and that lead to inequity. And the root causes, in my view, are the fact that we have an extractive economic system.

Speaker

Dr Gillian Marcelle


Reason

This comment introduced a critical systems-level analysis that challenged the panel to think beyond technical and policy solutions to examine underlying economic structures. It brought historical context and questioned whether incremental solutions could address fundamental inequities.


Impact

This intervention elevated the discussion from tactical solutions to strategic systemic analysis. It prompted other speakers to acknowledge broader structural issues and influenced the conversation toward considering alternative economic models and the need for transformational rather than just transactional approaches.


There are these other models based on socially driven intentions… social enterprises that go beyond those transactional models… They provide social inclusion services, they provide transformational services that at the end of the day create a circular economy, maintain the money locally.

Speaker

Carlos Rey-Moreno


Reason

This comment introduced the crucial distinction between transactional and transformational approaches to connectivity, highlighting how community-based models can address multiple development challenges simultaneously rather than just providing internet access.


Impact

This shifted the discussion toward holistic, community-centered solutions and influenced subsequent conversations about capacity building, local innovation, and the need for regulatory frameworks that support diverse business models.


What I cannot create, I cannot understand… there’s a huge risk when organizations are not involved, when citizens are not involved in that, you get situations… we’re further becoming consumers rather than citizens in this process.

Speaker

Steve Song


Reason

This philosophical insight, referencing Richard Feynman, highlighted the importance of agency and ownership in digital inclusion. It challenged the passive consumer model and emphasized the need for communities to be involved in building, not just receiving, connectivity solutions.


Impact

This comment deepened the discussion about empowerment and self-determination, influencing the conversation toward capacity building for network creation and the importance of technical literacy beyond just usage skills.


We are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns.

Speaker

Alison Gillwald


Reason

This closing comment provided urgent real-world context that demonstrated the life-and-death consequences of digital exclusion. It moved the discussion from abstract policy considerations to concrete human impact, emphasizing the urgency of meaningful connectivity solutions.


Impact

This served as a powerful conclusion that reinforced the entire discussion’s importance and urgency, connecting all the theoretical and policy discussions back to immediate human needs and survival.


Overall assessment

These key comments fundamentally shaped the discussion by progressively deepening and broadening the analysis of digital inclusion challenges. The conversation evolved from identifying problems (device affordability, meaningful use barriers) to proposing systemic solutions (diverse operator ecosystems, community networks) to examining root causes (extractive economic systems) and ultimately connecting back to urgent human needs (pandemic preparedness). The most impactful comments challenged conventional thinking – moving from infrastructure-focused to demand-side approaches, from consumer to citizen models, and from transactional to transformational frameworks. This created a rich, multi-layered discussion that addressed technical, economic, social, and political dimensions of digital equity, with each major intervention building upon previous insights to create a comprehensive analysis of both problems and potential solutions.


Follow-up questions

How can we systematically scale community networks and social enterprises beyond small pilot projects to achieve meaningful impact?

Speaker

Alison Gillwald


Explanation

There is skepticism about scaling community-based solutions from small training programs to systematic interventions that can address digital inclusion at a population level.


What innovative financing models can support small and localized operators with smaller ticket sizes?

Speaker

Carlos Rey-Moreno


Explanation

Current financial sector models focus on supporting capital interests rather than people’s interests, and there’s a need for innovative financing that understands the needs of smaller actors in telecommunications.


How can we create enabling regulatory environments that reduce barriers for small operators while maintaining quality and security standards?

Speaker

Carlos Rey-Moreno


Explanation

Different countries have vastly different regulatory requirements for telecommunications operators, from simple declarations in Europe to congressional franchises in the Philippines, affecting the ability of small operators to enter the market.


What are the most effective wholesale access regulation models that can be implemented to reduce dominance and increase competition?

Speaker

Alison Gillwald and Steve Song


Explanation

Market reviews have barely been conducted on the African continent, and wholesale access regulation could significantly change the competitive environment and reduce costs, especially for backhaul.


How can we better support intermediary organizations like libraries, post offices, and community centers in their role as digital inclusion facilitators?

Speaker

Kevin Hernandez (UPU representative)


Explanation

These intermediaries play a critical role in helping unconnected people access digital services, but there’s insufficient focus on connecting and supporting these organizations.


What capacity building programs are needed to enable communities to not just use but also build and own networks?

Speaker

Steve Song


Explanation

There’s too much focus on training consumers to use networks but not enough on building capacity for communities to create, understand, and control their own network infrastructure.


How can device refurbishment and circular economy models be scaled to address device affordability systematically?

Speaker

Leandro Navarro


Explanation

There are unused devices with years of lifespan remaining that could be refurbished and provided to those who need them, but this needs to move beyond small projects to systematic solutions.


What transversal digital policies are needed that go beyond telecommunications to address fundamental education and human development challenges?

Speaker

Alison Gillwald


Explanation

Siloed sectoral solutions are insufficient; there’s a need for policies that address the intersection of digital inclusion with education, gender equality, rural development, and other structural inequalities.


How can we shift from treating people as consumers in a market to recognizing them as citizens with rights to communication and access?

Speaker

Dr Gillian Marcelle


Explanation

The fundamental economic system treats people as consumers for profit maximization rather than citizens with rights, which affects how digital inclusion policies are framed and implemented.


What alternative business models beyond traditional for-profit approaches can address the remaining 70% of access gaps?

Speaker

Carlos Rey-Moreno


Explanation

The G20 Digital Investment Infrastructure Initiative noted that stakeholders should think beyond typical for-profit models, but there’s insufficient exploration of what these alternative models look like in practice.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #139 Internet Resilience Securing a Stronger Supply Chain

WS #139 Internet Resilience Securing a Stronger Supply Chain

Session at a glance

Summary

This workshop focused on Internet resilience and securing a stronger supply chain, hosted by the Marconi Society’s Internet Resilience Institute at the Internet Governance Forum. Vint Cerf opened the discussion by emphasizing how society’s increasing dependence on the Internet, particularly with AI applications, makes resilience critical, highlighting the importance of supply chain provenance and the integrity of open source software components. Ram Mohan outlined four key challenges to Internet resilience: increasing system complexity with hidden interdependencies, intensifying regulatory pressures creating friction between technical operators and governments, insufficient funding for preventive measures, and supply chain vulnerabilities in software.


Olaf Kolkman illustrated these vulnerabilities through practical examples, showing how complex systems like food delivery depend on Internet connectivity and how backup systems like diesel generators can fail due to overlooked details like fuel management. Anriette Esterhuysen provided a Global South perspective, describing how Internet resilience creates a two-tier system where wealthy individuals and institutions can invest in backup solutions while ordinary users must manage disruptions themselves with multiple SIM cards and batteries. The panel discussed ongoing mapping efforts led by Fiona Alexander to trace Internet packet paths and identify all actors and dependencies in the supply chain ecosystem.


John Crain from ICANN explained how the domain name system has evolved from 13 root servers to 2,000 locations globally through strategic investment in resilience infrastructure. Manal Ismail emphasized the vital role of governments in promoting resilient networks while embracing multi-stakeholder approaches for effective Internet governance. Mark Nottingham shared real-world experiences from Cloudflare, demonstrating how even well-engineered systems with redundancies can fail catastrophically, requiring continuous improvement and transparency about failures. The discussion concluded with recognition that Internet resilience requires cross-sector collaboration, proactive investment, and systemic thinking rather than reactive problem-solving.


Keypoints

## Major Discussion Points:


– **Internet Infrastructure Dependencies and Vulnerabilities**: The discussion emphasized how the internet has become critical infrastructure that society depends on, yet it relies on complex interdependencies (power, water, physical infrastructure) that create single points of failure and cascading risks when disrupted.


– **Supply Chain Security and Provenance**: Speakers highlighted the importance of understanding where internet components come from, particularly open source software libraries, and ensuring their integrity through proper documentation, digital signatures, and tracking of the “bill of materials” used in internet services.


– **Global Inequality in Internet Resilience**: The conversation addressed how internet resilience is unevenly distributed globally, with developed regions having better backup systems and recovery capabilities, while users in the Global South often must create their own workarounds (multiple SIM cards, batteries, etc.) with little communication about outages.


– **Cross-Sector Collaboration Challenges**: Panelists discussed the need for enhanced collaboration between different sectors (internet providers, power companies, governments, etc.) that currently operate in silos, each assuming other critical infrastructure will remain available during their own backup planning.


– **Mapping and Understanding Internet Ecosystem**: The discussion covered ongoing efforts to create comprehensive maps of internet infrastructure dependencies, following the path of IP packets to identify all the actors, institutions, and systems involved in internet connectivity.


## Overall Purpose:


The workshop aimed to raise awareness about internet resilience as a critical global challenge and to foster collaboration across sectors, disciplines, and geographies. The Marconi Society’s Internet Resilience Institute convened experts to discuss current vulnerabilities, develop solutions for supply chain security, and create actionable frameworks for improving internet stability and reliability.


## Overall Tone:


The discussion maintained a serious, urgent tone throughout, with speakers emphasizing that internet resilience is not just a technical issue but a societal and economic imperative. The tone was collaborative and solution-oriented, with experts sharing practical experiences and failures alongside theoretical frameworks. While there were moments of levity (jokes about construction noise, coffee needs for early morning participants), the underlying message remained consistently grave about the potential consequences of internet infrastructure failures. The conversation became more concrete and practical as it progressed from theoretical frameworks to real-world examples and mapping exercises.


Speakers

**Speakers from the provided list:**


– **Moderator (Pablo)** – Supporting the Marconi Society’s Internet Resilience Institute, session moderator


– **Vinton Cerf (Vint)** – Internet pioneer, helping to set the scene for the workshop


– **Ram Mohan** – Digital identity expert, discussing current state of internet resilience


– **Olaf Kolkman** – Internet Society, presenting on system complexity and resilience challenges


– **Anriette Esterhuysen** – Former MAG Chair and APC, discussing Global South perspective on internet resilience


– **Fiona Alexander** – American University, leading internet resiliency mapping exercise and supply chain analysis


– **John Crain** – CTO of ICANN, participating remotely, discussing unique identifiers and DNS resilience


– **Manal Ismail** – From Egypt regulator, former Chair of the Governmental Advisory Committee of ICANN, discussing governmental role in internet resilience


– **Mark Nottingham** – Cloudflare and IETF, sharing real-world experience with internet infrastructure resilience


– **John Janowiak** – President and CEO of the Marconi Society, providing closing remarks


– **Paticipant** – Multiple audience members asking questions (appears to be a generic label for various participants)


**Additional speakers:**


– **Qusayr Shati** – From Kuwait, asking questions about safety and security of internet infrastructure


– **Mallory** – Audience member asking questions about political economy and capitalism’s role in internet resilience


– **Juan** – Audience member asking about economics and revenue flow in internet infrastructure (referenced by Fiona but not explicitly identified in transcript)


Full session report

# Internet Resilience and Supply Chain Security: Workshop Report


## Executive Summary


The Marconi Society’s Internet Resilience Institute convened a workshop at the Internet Governance Forum focused on internet infrastructure resilience and supply chain security. The session brought together experts from across the internet ecosystem to discuss growing vulnerabilities in our internet-dependent society. Despite construction noise and logistical challenges, the interactive workshop revealed that internet resilience has evolved from a technical concern to a fundamental societal imperative requiring unprecedented collaboration across sectors and geographies.


The discussion was structured in three blocks: foundational presentations on internet dependence and system complexity, perspectives from different stakeholder communities, and audience questions that explored economic sustainability, physical security, and systemic challenges. Key themes included cascading failures from hidden interdependencies, regulatory tensions between technical and governmental approaches, chronic underfunding of preventive measures, and supply chain vulnerabilities.


## Opening Framework: Critical Internet Dependence


Vinton Cerf established the foundational framework by highlighting society’s profound dependence on internet infrastructure. “The implication of dependence is that when it doesn’t work there are all kinds of consequences,” Cerf observed, noting that artificial intelligence applications are further intensifying this dependence.


Cerf introduced “provenance” as a central concern – understanding where internet components originate and ensuring their integrity. He emphasized the importance of documenting supply chains, particularly for open source software libraries, and ensuring their integrity through digital signatures and comprehensive “bill of materials” tracking.


## System Complexity and Hidden Dependencies


Ram Mohan identified four interconnected challenges threatening internet stability: increasing system complexity with hidden interdependencies, regulatory pressures creating friction between technical operators and governments, insufficient funding for preventive measures, and supply chain vulnerabilities.


He highlighted dangerous circular assumptions where power companies assume internet availability for communications while internet providers assume reliable power supplies. “We have a systematic bias towards reactive rather than proactive resilience strategies,” Mohan noted, explaining how organizations struggle to secure investment for prevention while post-incident responses receive adequate funding.


Olaf Kolkman from the Internet Society illustrated these complexities with concrete examples. His most memorable anecdote involved a data center with backup diesel generators tested monthly for two hours, but during an actual emergency lasting longer, “the generators failed after five hours because operators had forgotten to refuel the diesel tanks.” He noted this was a case he knew of, demonstrating how human factors can undermine technical systems.


Kolkman explained how seemingly simple services like food delivery actually depend on complex internet connectivity – requiring not just the delivery app but payment processing, GPS navigation, restaurant systems, and driver communications. He advocated for risk-based thinking that identifies coupled risks and cascade effects.


## Stakeholder Perspectives


### Global South and Equity Concerns


Anriette Esterhuysen brought crucial equity considerations, highlighting how internet resilience creates a two-tier system. In many Global South countries, internet resilience operates “like an act of God” for ordinary users who receive no advance warning, no recovery timelines, and no institutional support during outages.


Users develop their own coping mechanisms – maintaining multiple SIM cards, carrying backup batteries, creating informal information networks. This contrasts with wealthy users who can invest in backup connections and redundant systems. Esterhuysen challenged narrow technical definitions of resilience, arguing that physical transmission infrastructure should be included in resilience planning.


### DNS Infrastructure Lessons


John Crain from ICANN, participating remotely, discussed DNS resilience as a model for critical infrastructure. The DNS root system has evolved from 13 original systems to “roughly 2,000 locations globally” through systematic investment. This demonstrates how proactive resilience planning can scale critical systems while maintaining stability.


Crain emphasized that resilience requires continuous improvement as the internet grows, and that global coordination and policy frameworks are essential for managing critical internet functions.


### Government Role and Regulation


Manal Ismail addressed the complex governmental role in promoting resilience, outlining approaches ranging from awareness-building to mandated requirements. She emphasized that effective government involvement requires understanding both technical realities and policy frameworks needed to support resilience investments.


Multi-stakeholder approaches emerged as essential for balancing competing interests. Government responsibilities extend beyond regulation to promoting investment in redundant networks and developing national digital resilience strategies, coordinated internationally since resilience cannot be achieved within national boundaries alone.


### Industry Implementation Challenges


Mark Nottingham from CloudFlare provided front-line operational perspectives, explaining that the internet is “inherently unreliable” and appears reliable only through multiple layers of abstraction and redundancy. Even well-resourced organizations with extensive engineering expertise face unexpected failures from unanticipated system interactions.


Nottingham described recent CloudFlare incidents, including a “Code Orange” event and another incident “about a week ago,” emphasizing the importance of learning from failures and sharing lessons across the industry. He noted that many resilience problems require industry-wide coordination rather than individual company solutions.


### Infrastructure Mapping Efforts


Fiona Alexander described ongoing efforts to map internet infrastructure dependencies by following IP packet paths through the entire ecosystem. The working group is developing these maps collaboratively, with plans for a first draft and subsequent iterations examining specific sectors like energy infrastructure.


Alexander noted that traditional telecommunications models are inadequate for understanding internet infrastructure, explaining that applying historical telephone accounting rate models to internet infrastructure would “fundamentally break the system.”


## Audience Questions and Broader Challenges


The interactive session included several significant questions that expanded the discussion:


**Business Continuity Strategy**: Nandifa Natsaluba asked online about business continuity strategies, prompting discussion of how organizations prepare for internet disruptions.


**Economic Sustainability**: Juan raised detailed questions about international charging arrangements and revenue flows, arguing that shifts away from traditional telephone models had eliminated crucial revenue flows to developing countries. This generated debate about whether current business models support long-term infrastructure sustainability.


**Physical Security in Conflict**: Qusayr Shati asked about infrastructure safety and security in conflict zones, highlighting how internet infrastructure becomes both target and casualty in warfare.


**Systemic Transformation**: Mallory posed a provocative question about whether meaningful resilience progress requires addressing broader systemic issues like capitalism and global power structures, rather than just technical solutions.


## Key Tensions and Unresolved Issues


The workshop revealed several ongoing tensions:


– **Scope of Resilience**: Disagreement about whether physical transmission infrastructure should be universally considered part of internet resilience


– **Economic Models**: Debate about whether current business models and revenue distribution threaten long-term sustainability


– **Systemic vs. Technical Approaches**: Tension between holistic approaches addressing broader infrastructure issues versus achievable technical solutions


– **Regulatory Timelines**: Friction between government demands for immediate solutions and technical communities’ iterative improvement processes


## Next Steps and Action Items


John Janowiak concluded by outlining concrete next steps:


– The working group will produce a first draft of the internet resilience supply chain map by their November meeting


– Participants were encouraged to download the Internet Resilience Report from the Marconi Society website


– Those interested can join the Internet Resilience Advisory Council to contribute to ongoing mapping efforts


– Future mapping iterations will examine specific sectors, beginning with energy and power infrastructure


## Conclusion


The workshop demonstrated that internet resilience challenges are interconnected and require systematic thinking beyond traditional technical boundaries. While participants agreed on fundamental challenges – complex interdependencies, cascading failures, and the need for cross-sector collaboration – disagreements about scope, approach, and solutions reflect the complexity of achieving resilience in practice.


The session’s interactive nature, despite physical challenges including construction noise, illustrated both the collaborative spirit needed for resilience work and the practical difficulties of coordination. The mapping exercise and ongoing collaboration provide concrete mechanisms for translating insights into actionable improvements, recognizing that internet resilience has become a societal imperative requiring sustained commitment across technical, policy, and social domains.


Session transcript

Moderator: Hello, how are you? It is really an honor to welcome you to the workshop Internet Resilience, Securing a Stronger Supply Chain. Just double check that you are in the right room, and you are very welcome. We are on a tight schedule, so we will need to move quickly, but meaningfully. If you are sitting at the back, please don’t be shy and come closer. This is a roundtable by design, so please don’t spare any seat over there. Come and don’t be shy, just take a seat, you are welcome. The closer that we sit, the more resilient our dialogue becomes, you know. I’m Pablo. I’m supporting the Marconi Society’s Internet Resilience Institute. I’m very happy to be here, and I’ll be your moderator for this session. Let’s dive straight into the substance. I’d like to begin by turning to someone that truly needs no introduction, Vint Cerf. He will help us to set the scene, and Vint, are you there? I am here, yes I am. Fabulous. Can you hear me? Yes. Help us to set the scene, Vint, where the idea of this workshop comes from. What would be your advice in terms of what would be the good outcome for this discussion? Put some stress on us.


Vinton Cerf: So in the short summary is that the… Many of us have been asking ourselves very hard questions about internet and its resilience because we’ve become so dependent upon it and with the arrival of new applications of artificial intelligence that dependence is only going to increase and The implication of dependence is that when it doesn’t work there are all kinds of consequences. No serious serious problems This is true of a lot of infrastructure You don’t think about it until it doesn’t work, like when the power goes out, now what doesn’t work or when the roads are all blocked So I’m sure you can, when your mobile doesn’t work, that’s become a very important infrastructure and when it doesn’t work there are consequences So the internet has become so woven into a significant part of our ecosystem that we are very concerned about its resilience and reliability We talked about that in a number of different contexts and the specific one for this meeting has to do with the supply chain Since the internet is composed of many many pieces, coming from many many different sources, a very significant part of the internet is software After all, it’s the protocols that make all these things work, running on, of course, physical equipment that we also depend upon I’m going to suggest to you that the word provenance will turn out to have a very heightened importance in this conversation Where did things come from? How do we know that they have integrity? Have they been altered sort of in flight? Do we know who is responsible for them? Do we know where to turn when things are not working properly? So if we ask ourselves, can we document the supply chain that leads to a particular product or service? Can we know that it has integrity? And this is particularly applicable to open source libraries, which have become a major component of the development of products and services in the internet space. Open source is wonderful because it’s accessible, but it’s also hazardous because sometimes it’s not well maintained. And so we have to ask questions about the bill of materials used to create a product and the order in which those products have been applied. Do we know whether the software is unaltered? Does it have integrity? Has it been digitally designed? Do I know the party who digitally signed it so that I can trust the integrity of that? And second, security is a huge issue as well, not only in open source software, but in all of the components of the internet. How can we be assured that security has been properly attended to, not only in the fabrication of creation of the software, but also its configuration and installation? So tracking all of that, having the ability to audit where things came from and how they were assembled and who assembled them is a very important aspect of supply chain evaluation. So as you know, I have to go off to another meeting soon, but I hope that you will all take copious notes and that there will be something concrete coming out of the discussion that the rest of us can share. So that would be my little opening homily for you, Pablo.


Moderator: Thank you so much. It’s very strange to hear myself. So I think we have a good scene to work on, and let me introduce more or less how this panel is going to work. So we will have, there are a few lines there, but basically we will have three sections. The first one to talk about the current state of internet resilience, the second one to talk about what we mean by internet resilience supply chain, the interdependencies and the developing solutions, and the third part will be real-time experience and practical examples. Our panelists, it’s a stellar group of people and experts and on the first block we will have Ram, we will have Olaf, and we will have Anriette, Ram from digital identity, Olaf from the Internet Society, Anriette, former MAG Chair and APC. Are you? Fiona, American University, John Crain, he’s joining us remotely, he’s the CTO of ICANN. Manal, I hope you are here, welcome. She is from Egypt, from the regulator, former Chair of the Governmental Advisory Committee of ICANN, and we have Mark from Cloudflare and ITF. So we will be having a conversation and you are welcome to join that conversation and we will get straight into it in terms of the current state of internet resilience. Ram, why don’t you start to talk about what has happened recently in this work?


Ram Mohan: Pablo, thank you so much, and just to frame this issue for us, the internet, as Vint said earlier, the internet is no longer just a convenience, it’s an invisible infrastructure that supports nearly every aspect of our lives, from critical services to daily activities. We know this, But we also perhaps don’t understand fully well just how much our modern world is fundamentally built on Internet connectivity, right? From enabling critical services, healthcare or financial transactions, transportation, energy grids, emergency response, a resilient Internet ensures that these vital services remain operational even in the face of disruptions. The other part of the criticality of what we are looking at is economic stability because businesses of all sizes from global corporations to local shops, they rely on the Internet for every aspect of what they do. We also know in the last decade or a little over the last decade that it’s been significant for social communication and for social connectivity. And for all of us who endured the years of COVID, without the Internet would have been quite a different experience altogether. Certainly the Internet is critical for national security and public safety, but it’s also a key part of trust and confidence. When you don’t have a resilient Internet and you have frequent or prolonged Internet outages that erodes both public and business trust in digital systems. And conversely, a resilient Internet, it fosters confidence, it encourages further digital innovation, investment and adoption, right? And finally, it’s about mitigating disruptions, right? Because resilience is not about preventing outages, which are inevitable, but it’s about the ability to withstand, adapt to and rapidly recover. from them, right? So that means the ability to restore services to route traffic around failures and minimize the impact on users, right? Because without resilience, even minor technical glitches or cyberattacks could have disproportionately severe and long-lasting consequences. So the Marconi Society in November of 2024, it convened a group of 30 or so global experts in Washington, D.C. to review the state of internet resilience. And that group provided a report for 2024, the Internet Resilience Report, and that report


Olaf Kolkman: highlights a critical assessment of the internet’s infrastructure. It identifies key threats, and it also offers recommendations. But here are the pressing challenges in internet resilience. There are really four key challenges. The first is just the increasing system complexity with tangled systems. Modern applications and services rely on a vast web of interdependencies, and inside of those interdependencies are often single points of failure, and they’re hidden within complex supply chains. So for an example is dependency on power, dependency on water, or over-reliance on a few APIs, software APIs. A second part is just intensifying regulatory pressures. The relationship between technical operators and government policymakers is becoming strained. Governments demand accountability and quick responses to incidents given the Internet’s critical role in not only national security but the economy and that clashes often with the technical community’s traditional reactive and problem-solving approach. Try what’s going on, solve it, and if it doesn’t work well, try the next thing. In the meanwhile, you have a government regulator saying, I don’t want you to try the next thing, fix it now, right? So, there’s a growing friction, growing clash that’s happening there. The third part is insufficient funding for preventive measures because if you look at funding for resilience, there’s almost none. What happens is that when incidents occur, when problems happen, those things readily attract funding and they readily attract attention. But the crucial work of prevention, which is about good operational practices, proper training, systematic thinking about infrastructure, those things often lack adequate investment. And resilience is a prevention problem and prevention does not attract money. The last part is the supply chain vulnerabilities in software. The reliance on complex software supply chains, it introduces significant points of fragility and the potential for cascading failures if a single link is compromised. And there are a great number of examples of this happening and that are public. There are a great, much greater number of them. that are happening that are not public. So, if you look at all of this, we are at a point where we have, we’re at a moment where it’s not just a technical challenge. Resilience is an increasingly urgent global and political challenge in front of us, which is why we’re here at the IGF to talk about it, right? And what we need is a fundamental mind shift change. We’ve got to be starting to talk about proactive prevention. We have to really start thinking about how can you enhance collaboration, not inside a sector, but across sectors. An anecdotal and funny story is that when you talk to regulators and they talk about how terrific the resilience plan is for internet service providers, the common thread is that they have great backup plans, but then you start to talk to them about what is the common assumption. The common assumption is power will be available, water will be available, air will be available, right? Now, you go to folks in the power sector and you talk to them about their backup plans and how they have resilience planned. They have very good plans in there, but a common assumption for them is that the internet will be available so that they can communicate, right? So, you have this expectation and an assumption that other parts of critical infrastructure are going to be available, except those parts aren’t actually talking with each other, right? So, we need enhanced collaboration across sectors. And really, the last part is a much deeper understanding of the interdependencies. that really sustain global connectivity. So these things are essential and we’ve got to wake up to these challenges now or we’ll wake up to a world that doesn’t have adequate resilience


Ram Mohan: for a foundational part of not just infrastructure but of life.


Moderator: Ram, thank you. Tangled systems, regulatory friction, the funding gap, software, Achilles heel. What I am thanking you for is that you used enhanced collaboration and not enhanced cooperation because if not we were going to get into a lot of trouble. That’s an inside joke but well Olaf, do you want the clicker for your slides or do you want me to do it?


Olaf Kolkman: There it is. First I want to apologize Martin Borteman who was initially scheduled to moderate the panel but he had to leave because of family emergency and that brings us to the matters of life. What you see here on the picture is a staple food for the global minority, bread. This is something that is delivered to our grocery stores and this is a little bit of a global minority description of the issue but this is being delivered to our shops with our groceries on almost a daily basis and I’m telling this a little bit to make the story of resiliency a little bit more, you know, give it a little bit more life. The way this works is that a grocery store will place an order. that order will go into a logistic system. And if you Google for logistic system software, specifically if you do an image search, you will see enormously complicated architectures with all kinds of building blocks of interconnected systems that go all over the place. But that was the interconnectedness that Ram was talking about. One of those blocks fail and your grocery will not be delivered. And all these type of things depend on the internet connecting, not only in the connecting in your locality, not connecting in your city, not connecting between the warehouse and the grocery store, but also connecting to distance APIs that might be hosted somewhere at the other end of the globe. And everybody in that supply chain is doing their best to maintain uptime. Seriously doing their best to maintain uptime. But once systems get more complex, they become more fragile. A webpage nowadays will do about 100, 200 queries before the page is actually visible, going to all kinds of different locations. And these websites are hosted probably in data centers. These data centers rely on electricity. And of course, the internet providers and the data center maintainers are doing their best, next slide, to maintain their power situation. This, my friends, is a Cummings DFLE 1500 kilowatt diesel generator. I got this picture from a secondhand diesel generator site. This model is available for $139,000. And this is the type of thing that sits in a data center. It slurps about 392 liters of diesel per hour to generate 1500 kilowatts of power. That is one truckload, a 30 ton diesel truckload of diesel every three days. If your internet goes down or if power goes down in a data center, it takes three days before these babies are out. Now, of course, these things are tested all over the place. I actually have a story, or I’m telling a story, but I have a sub-story. I know of a case where the diesel was tested every month for two hours. They turned it on, made sure everything was working. And after five, six years, they really had an emergency. They turned the thing on, it worked for five hours, and it was out of diesel. They forgot to refuel the tanks. You laugh about this, but this is important, because this is the type of thing that can go wrong if you don’t think through your system. And if you think about resiliency, I think that that is the main question that we have to ask ourselves in these approaches is, next slide, what can possibly go wrong and what can possibly be broken? And that informs your risk-based approach. That also informs what can I do when things go wrong. Do I have to have a satellite phone so that I can communicate to somebody, to my diesel provider, for instance, so that I can get diesel? Because if the logistic system sits down at the same time… There’s no way I can refuel my generators to keep up time and things will really break down. So these are the things that we need to think about when we think about resiliency. What can possibly go wrong? What can possibly be broken? And take risk-based approaches on the evaluation and understand, for instance, what are risks that might be coupled to each other? What if an anchor goes over the seabed and breaks both the electricity cable as well as the fiber cable? Coupled risks. And with that, I hope I set the stage for the continued discussion.


Moderator: Olaf, thank you very much. Indeed, we’re thinking about you, Martin, if you’re following us. And Martin said to Olaf, could you moderate? And then they agreed that I would moderate, because if not, we would have missed this wonderful presentation that you just did. I think it was awesome. Anriette, I would like if you could thread this into the IGF. Why we’re discussing this in the IGF?


Anriette Esterhuysen: These mics have to be switched on. Thanks, Mark. Because the IGF, I think, is the place where we connect people, the people at the other end of the breakages, to the processes that involve both technical coordination, policy and development, as well as other areas of policy coordination and development, as well as practice, as well as innovation. So, I think this is the place where we try and talk about, how does all of this make a difference or not make a difference in people’s lives? So, you also asked me to say, you know, what is my take coming, you know, from the Global South on internet resilience? And I think I’m from South Africa, so I live in a big city, but it happens to be a big city that has electricity outages, if not every day, you know, every few days. And I live in a region where there’s been drought recently, so all the countries along the Zambezi River, Malawi, Zambia, Zimbabwe, had power outages as a result of drought because they rely on hydro, and if the dam levels are too low, you just don’t have electricity. So I think for many people, internet resilience is something that other people have. And what you have is this divide where you have financial institutions, for example, will make sure that they have backup. Upper middle class people would have moved to solar by now, so when it comes to dealing with these disruptions, which are often not easy to control, there’s a vast difference in how people are able to respond to that. And then when you look at industry and businesses, obviously the larger the company, the better it’s going to be to be able to address disruptions. You have sectors, you have data centres, which communicate very effectively with their clients. The clients would probably get advance warning, or they would be rerouting, and they would manage. But data centres serve a kind of a small sector of the economy, relatively, or they work with the financial institutions. So the banks might carry on working, but if you rely on a mobile network that needs to use a tower that relies on electricity, and the towers just go down. So even though theoretically the bank services are still up, you’re not as an end user able to access it, because your mobile operator, firstly you’re a pay-as-you-go customer, remember that. which means you get no communications from your service provider that there are disruptions. So, it’s like there’s a two-tier system of how, I think as Ram said, what really matters is how do you respond? How do you do recovery? And I think what you have in many countries in the global South is a two-tier system. Some people who just deal with internet resilience, it’s like an act of God. Sometimes you have, sometimes you don’t. And then there are sectors of the economy and society who are empowered enough to invest in routing around it. And I think that’s what’s so frightening in many ways. I think that, I mean you’ve all talked about how the technical community does the routing around the disruptions. I think what happens in many developing countries is that the end user is expected to do the routing. They have to have two SIM cards, three or four SIM cards because there’s different affordability and different coverage in different parts of the country, for example. They have to have backups. They always have to have batteries. And with the undersea cable disruptions that have hit much of Africa, well, much of the world, you know, in the last year, you have no idea. There’s no communication. There’s no information. Unless you’re actually an internet service provider that belongs to an internet service providers association or a pairing point, they’re very good at communicating. But if you’re any other business, never mind an end user, you will not know what the current status is of undersea cable breakages and repair. You basically just have to wait and see and hope for the best. So I think just my last input here, I think, I mean, Ram talked about enhanced collaboration. I mean, I’m very happy saying enhanced. cooperation, by the way, I think enhanced communication. I think we need to at the moment there’s the security sector, the companies that provide the security and the backup are very good at communicating with one another, in fact, and I think there’s a lot of cross-industry, cross-discipline collaboration, but there’s no communication with end users or with, you know, the rest of the world who still, as Ram said, is so dependent and takes for granted that this is going to be available, and I think the result is exactly as Ram said, it breaks trust and I think it disrupts innovation and it just, it disincentivises people from beginning to embed the internet in daily life and daily services on a more routine basis.


Moderator: Thank you, Anriette. We’re just on time, we’re going well, we’re doing well. We have participation online, Nandifa Natsaluba, what a great topic on resilience, do we have a business continuity strategy for unplanned disruption leading to a total global unavailability of the internet? They are very switched on, I would like to know where are you from, but welcome to this panel. I see as well some empty seats, so I welcome people to join us, don’t be shy if you would like to participate at a later time when we open for questions. Let’s go into the second block about the supply chain, the interdependencies and developing solutions, and for that I would like to ask Fiona if you could help us with some mapping and the work that you are doing in terms of identifying the gaps and the policy concerns.


Fiona Alexander: Hi to everyone and thanks Pablo, you’re doing a great job stepping in to moderate, and thanks for the invitation to participate and speak and to John and Aisha and others at Marconi Society for this really interesting project. So Ram talked about the session that we had in Washington last year now. I don’t know, time all flies for me. But from that we’ve been having a couple of different conversations and we have a working group that’s specifically trying to put together an internet resiliency mapping exercise and actually putting together a map of what that supply chain looks like. And the goal of our, I think there might be a slide somewhere, but the goal of our group is to produce a map that identifies the actors, institutions, and dependencies across the internet ecosystem infrastructure supply chain. And as Anriette’s story really highlights, that’s not just what we normally think of. It’s not just traditional telecom, providers, ISPs, DNS players. What we’re hoping to do with this exercise is demonstrate clearly that our internet ecosystem infrastructure supply chain includes everybody. And we’re hoping to do that with this map. Again, our default is to kind of only focus on the people that we think of and some of the people that are here. But we’re really hoping to help go through this exercise and confirm that it’s much broader than that. So not all actors or institutions fully appreciate their role and corresponding responsibilities. Not all these different silos are in a routine habit of talking to each other, back to enhanced communication or whatever, enhanced see where we’re going with this cycle. So I think we’re hoping to do that as well. So what our working group is doing is that we’re trying to do all of this online as well through Google Docs. That will be an interesting test of our ability to work together. But the group’s going to develop a map that follows the path of an IP packet and that a routine internet user action initiates. So I think we’ll figure out what couple of examples might make sense so that this is an accessible tool for everybody and anyone regardless of their technical skill sets. I should also offer the observation that I’m the least technical person in the working group, which is great for me. I get to rely on all these great engineering minds that are part of the group. But we’re going to follow the packet, the route that a packet takes at a 30,000-foot level. And we’re going to try to identify what infrastructure layers the packet hits as it goes from you typing something to getting to its destination and to delivering. what you’ve asked it to do and so I know obviously we’ll probably talk about power and water which I think we all kind of Know and I think was highlighted with the most recent sort of broad-based internet outages We saw in Europe and Spain most recently But we want to see what other parts of and what other sectors of the world that we’re hitting with all of that We did talk about and we have discussed that we want to find a way to acknowledge. There are some cross-cutting issues That we’re not going to address so that we kind of scope this Carefully and don’t try to take on everything at once So we’re not going to try to take on sort of a policy and regulatory landscape at the outset And sort of acknowledge that at the first instance if this works for us, which I’m optimistic that it will We’re hoping to have a first draft of the map for the Marconi Society meeting That’s happening in November And if we think this is useful and we think we’re providing a value-add to the community for doing this and we like the map But by we I mean all of us collectively we like it Then I could envision next iterations of the map that then dig into each bucket Maybe there’s a resiliency map just for energy and one just for power But I think at the outset we’re just trying to get everyone together and get all these smart engineering minds together to figure out Where does a packet go and what might need to work and what happens when those things don’t work? So that’s what our group is doing and I look forward to talking about it more and others that want to be involved in answering Any other questions? But again, I thought it was a really interesting exercise and one worth spending some time on So I’m really happy to be a part of the exercise


Moderator: Thank You Fiona those were a lot of words per second and it’s Always I Will be like you when I grow up and we’ll have that speed of thought Translated into language, that’s amazing. I’m not sure if you have John Crain John is at a very odd hour. So I’m sure he will be much slower than you at this time John is online if you can I am put him on He’s going to talk about I guess one part of that map, which is the unique identifiers. Good morning, John Have you had coffee?


John Crain: Good morning, can you hear me?


Moderator: We cannot hear you, try again. Okay, I am unmuted.


John Crain: Can you hear me when you put your headphone on? Yes, we can hear you. Yes, good. Where are your headphones? So, good afternoon everybody. It’s early morning here in Southern California. So, indeed, I work for an organization called the Internet Corporation for Assigned Names and Numbers. Many of you may have heard of us, often just referred to as ICANN by its acronym, and as tech folks we love our acronyms. So, resilience is interesting, even if you look at the identifier systems and the role of ICANN. ICANN has existed for approximately 25 years, a little bit longer, and our bylaws talk a lot about security and stability. Those are the other two sides, in my mind, of resilience, you know, with resilience being the ability to bounce back once one of those two things don’t happen. Now, identifiers is not just the domain name system, right? So, most people think ICANN, they think DNS, but ICANN is also responsible for the Internet Assigned Numbers Authority, and they register literally thousands of different types of identifiers that are used on the Internet. And for the Internet to work, and for that packet that Fiona was talking about, to get from one place to another, all of those need to have certain attributes. Often that is a uniqueness to the identifier, or it is some other special relevance to the protocols and how all the protocols work. Now the interesting thing is of course that may not be obvious, most end users, the people who use the internet, are blissfully unaware of how the internet works and most of these things. So while we talk about resilience of the network or the internet, it’s important to remember that the users aren’t aware of a lot of what is happening and also that it’s not a internet. You know you’ll often hear people tell you that the internet is actually a network of networks. So that means that even in the identifier space there are many many people that have a role to play. It’s not just ICANN. ICANN’s role is really about administering the top registration databases, the initial information of many of those identifiers. Now if we look at the DNS, the domain name system, and you look at the history and you go back to the early days of ICANN or pre-ICANN, that was a system and you know the root of the DNS is a very critical system for the internet to work. It’s where the domain names start, where the resolution from that web browser to getting you somewhere starts. Back in the late 90s and you know into the early 2000s, you were talking about 13 systems around the globe. Now what the industry was able to do was to notice that that was an issue. We said to ourselves this is an issue that could affect the resiliency and the stability of the ecosystem. New ways of doing routing were developed, something called Anycast, and now you have 2,000 roughly locations around the globe where this infrastructure is. So you can build resilience, but it actually takes you thinking about it, and it takes time. And it takes, what Ram talked about, it takes investment in resilience. You know, building something like this out is not something you just do overnight. Now, ICANN is also interesting because, you know, very early on we realised that this is a global asset or a global ecosystem, and it required global policymaking. So when it comes down to the domain name system, any of you who are familiar with ICANN know that there is actually a global, what we call, multi-stakeholder system for the governance and the policy setting around that. So, you know, in some ways, you know, and I’ve been with ICANN for quite a few years, in some ways we spent a lot of effort and time over the years to develop ways that we can include the user and the ISP and the governments and everybody else in the discussions. But we also worked on the technical side with our technical partners like the IETF, the route server operators and many others to increase resilience. But you don’t just increase resilience and stop. The internet is a growing thing. You have to keep looking at how you’re going to continue to increase and keep that resilience. And you have to be aware of all the things that you rely on for that resilience. And that’s why the Marconi Society’s work is really interesting to me personally. I do sit and think about what if we have a major power outage, what if we have a major code flaw, you know, how will that affect the identifier systems and further how will that affect the internet. So it’s really good that our friends at Marconi and, you know, I thank them for inviting me to take part in this, are looking at the broader scope of what does it take to provide resilient communication, because remember the internet is a communication device, across the globe. So identifiers are a big part of that and it’s what makes myself in my role as the CTO at ICANN lose sleep at night, sitting thinking about how we keep this stuff resilient, but it’s more than just what we do, it’s so much broader, you know, power, water, protocols and just think about everything it takes to not only move a packet like Fiona was saying from one place to another, but actually to do the right thing with that piece of data when it gets to the other end. So I’m looking forward to hearing what the rest speak and I’m going to hang around to answer questions if there are any. Thank you everybody.


Moderator: This is very nice. Thank you John. And this is all about collective risk management in a collaborative way and it’s really good to converge here to discuss these matters. Manal, I’m not sure if you are online, welcome, she’s in Egypt and this is another part of the map, which is the governmental aspect of things and would love if you could talk about the regulatory challenges and the role of governments. Manal? Yes, I am Pablo, can you hear me? Yes. When you put your headset? Okay.


Manal Ismail: I’m ready. Okay, great. Thank you very much, Pablo, and thanks to everyone for the inspiring interventions so far. So, as was already mentioned by everyone, the internet has become more than just a communication tool. It’s part of nation’s critical infrastructure, backbone for digital economies and the fundamental need for society’s development. So, dependency on the internet and its infrastructure is rising exponentially and it’s increasing even more with IoT, AI and other emerging technologies. This growing reliance exposes the need to work on securing the internet against the escalating risks that endanger not only critical services running on the internet, but also the mere functioning of the internet itself. Such risks include unintentional errors like infrastructure failure, power outages, misconfigurations, but also sometimes intentional disruptions such as internet shutdowns, geopolitical tensions resulting in cyber attacks and disruptions caused by wars and weaponization of the internet and the cyberspace. All this, of course, in addition to the very well known natural and climate disasters, as well as crises that may trigger unforeseen traffic spikes like what we have all experienced with the COVID. In this context, the role of governments is both vital and evolving as today’s digital interconnected world poses unprecedented challenges on how nations operate. This role ranges from simple awareness and incentivized encouragement to mandated requirements and enforced regulations. Accordingly, governments, as stewards of national digital infrastructure, should promote conscious investment in resilient networks with built-in redundancy and also benefiting from technology’s diversity, like satellite versus land or undersea cables. Properly secure and redundantly store digital registries, device robust acts, laws, regulations or frameworks that balances national interests with global interoperability. Be aware of and minimize dependencies that were already mentioned. And carefully manage third-party elements in the network, but also encourage keeping local traffic local through IXPs. As we’ve already heard, also cooperation and collaboration with other sectors is extremely important to align efforts towards having a national digital resilience strategy that is constantly being updated. And also not to overlook the human factor, not only in terms of capacity development, but also in terms of changing the culture that Ram already hinted at of taking for granted the Internet’s underlying infrastructure and its ongoing responsiveness. Of course, governments cannot do all this without embracing the expertise and contributions of other stakeholders, depending on the issue and stage we’re at. The Internet is already a global shared resource, and its governance must reflect that reality through what we refer to as multi-stakeholder approaches, where governments, private sector, civil society, technical community, academia, and international organizations all work together in order to reach well-informed, sustainable decisions, devise more effective people-centered regulations, and achieve feasible and realistic solutions that are mindful of the global public interest. On the other hand, stakeholders should also understand and respect government’s concerns in order to be able to reach a constructive way forward. And since processes followed are equally as important as results achieved, in that respect, I would like also to refer to the Sao Paulo multi-stakeholder guidelines that serve as a valuable reference for strengthening internet governance and digital policy processes. They provide comprehensive and operational framework for establishing, implementing, and assessing inclusive, transparent, and accountable multi-stakeholder processes. In conclusion, it’s important to note that the internet was not developed with security in mind, but now the transition to an increasingly digital society and economy prioritizes internet resilience as a pressing technical and policy challenge that is both national and global in nature. Hence, strengthening internet resilience is the responsibility of everyone, caretakers and beneficiaries, and it should be ongoing and proactive in order for the internet to continue to function as we expect. And I leave it at this and hand it back to you, Pablo. Thank you.


Moderator: Thank you, Manal. Wonderful. And it seems that we’re really working on the basis of resiliency in spite of major construction happening at the back. So if you see, Manal, our faces, like a lot is going on in the backdrop of this. I don’t know exactly what. Are they preparing for the music night? I don’t know. OK, that’s that. So imagine a major concert of the Rolling Stones being prepared at the back. And so are the musicians. Let’s be resilient and let’s move on. We are soon to head towards an opening of the conversation. We have Vint stating a provocative question. Then Ram providing some background. Then Olaf providing some what if scenarios. Anriette more on the collaborative and the linkage between the Internet governance arena and the Internet resilience conversation. We have Fiona on the mapping, John on the unique identifiers. We have Manal on a global perspective on government regulatory, but also cooperation, cooperation, cooperation, cooperation. I think that’s what we try to do. Let’s not say how, just cooperation. Let’s get into the real deal with you, Mark. If you could tell us a bit how this works in the real world.


Mark Nottingham: Sure. Hello. I’m going to take my headphones off. So I was asked to talk a little bit about how my company conceptualizes and deals with internet resilience. I work for a company called CloudFlare. And CloudFlare is a company that provides internet infrastructure in a particular way. You know, the internet itself is inherently unreliable. There’s nothing that guarantees that a packet will get to its destination. We build abstractions on top of that so that we can pretend that it is reliable and resilient. We have TCP so that we have connections and we pretend that that is reliable, except sometimes it’s not. Sometimes that abstraction breaks down. And so we do other things. Web browsers will actually retry requests if they fail so that they paper over that unreliability so that the user of the browser has a nice experience. Websites and other services use companies like mine to further provide resilience. So what we are is a global network of servers everywhere providing services to users, whether it’s in the global south, whether it’s in the minority world. They bring content and services closer to the users to improve the resilience and the availability, to improve the security of those services, and also to make them faster, to make them so that they seem like they’re just next door, even though you’re actually talking to someone around the world. And what that does is make the internet more seamless for everyone. That means that resilience is really an existential threat for our business. We have to be available all the time or our customers are very unhappy. And so we use several techniques to make sure that our systems are as available as possible. The core systems, the data plane, are decentralized so that every node, every one of those servers can operate on its own. It doesn’t need connectivity to the rest of our systems. so that if there’s a partial failure somewhere, they can continue serving data. There are some parts of our systems that need to be centralized, and so we use other techniques to make sure that they are fully available. And so usually that’s redundancies and failovers and things like that. So despite all of those efforts, despite all that engineering and hiring some of the best engineers in the world to do this, we still have problems. As has been said a few times, you can never make something perfectly available. We had an incident last year, just as one example. We called Code Orange. It was an alarm bells kind of situation at the company where one of the generators that Olaf was talking about earlier – thank you for that illustration, by the way, Olaf – was used by one of our power suppliers at a key data center, and it failed in a particular way, and then some other systems failed, and that caused a cascade of failures where that data center went offline completely, which shouldn’t happen. Data center operators – we were renting that space from a data center operator – took extraordinary lengths to keep them highly available. So that was one thing that shouldn’t have happened, or a series of events. Because it was that particular data center, those centralized systems that I talked about, the ones that needed to be in one place, also failed. And we had designed them to fail over to another data center when that happened. It turns out that didn’t happen as well as we anticipated. And so it made those control systems unavailable for about a day and a half. Six hours was the length of the real outage there, but it kind of trailed on for about a day and a half where there was partial availability. That’s a horrific situation for a company like ours, and we resolved not to let that happen again. And so we went through this effort to re-engineer our systems, those key systems that were centralized, so that they were more resilient. And that took a couple of months, basically. We had another big incident at the same time that caused some distraction, which I won’t go into. But there were a lot of lessons that we learned from that. Even though we had a lot of very talented eyeballs on these problems, making sure that these systems were redundant, you still have to continuously improve your resiliency and follow the best practices, define what those best practices are, interrogate how you’re using these systems, provision for failure situations, and test the failure. Make sure that you intentionally fail your systems to understand how they behave, and consider what happens when there are these cascading failures. And finally, be transparent about your failures. We are very proud that every time we have one of these incidents, our CEO or our CTO writes a blog entry that explains what happened and why, so that we’re transparent to our customers. We had, indeed, another incident just about a week ago where we did that. But, unfortunately, this is not just an issue that happens within one company. That would be a much simpler problem to deal with. It’s a systemic issue. It’s a whole of Internet issue for resilience. And one example there is around routing security. The routing system is critical to Internet resilience. We need to be able to route packets around the world. And it’s one of those places where everyone has to agree on what the reality of routing is. And so, Cloudflare has spent a tremendous amount of resource. And we’re very committed to RPKI, the routing security issues. We’re collecting routing data about this in our radar platform, which is our kind of Internet observatory for statistics about the Internet that we are able to observe from that worldwide network of servers we have. And that helps us to identify and mitigate these systemic issues. But I think it’s that cooperation that we’ve been talking about across different kinds of businesses and different parts of the ecosystem that’s so key to make sure that, as a whole, we’re able to have those abstractions so that people don’t have to worry about this in most cases.


Moderator: Mark, thank you. We are moving from theory to practice. And I think this is a very good moment to start opening the conversation. I would love to open the floor if you have any questions, and if not, by all means, que gusto, adelante.


Paticipant: If I may, just to tie what Mark was saying to what Ram was saying, basically, the previous failure is always prevented. Gracias, Pablo, and thank you everybody for being here. I just want to ask a question to the panel about a topic that I think the first speaker mentioned about the economics and finance. I’m going to make a brief introduction to put it in context. Before the Internet, you know, the international communication was through the telephone network, and international communication was long-distance telephone calls. And the model, the business model there is that the call, it was originated by the company in one country. It was finalized by some other company, and they shared the revenue of that call. That was a very sound business model in which everybody that cooperated, maybe there was some other intermediary in that call, but everybody got a fair share of the revenue there. By historical reasons that, you know, when Internet first moved out of the continental United States, there was set a rule that those who want to connect have to pay the whole share of the communication. In the last years of the past century, oh my God, it’s passed so many times, this was a big deal. It was called the international Internet communication cost. It was even raised in the ITU, you know, in study group three, the recommendation from those days, the D50 recommendation. And that’s a very big issue, even for some European countries and companies, even for Australia. They were very vocal about that. As the time passed, the companies from these developed countries solved the problem by putting their connection into what is called the core or the backbone in the Internet. And eventually, this communication problem cost has been alleviated in some other places through IXPs and companies like the one that was just put, but alleviated because still the problem is that these revenues are not external to the country. I forgot to say that during the telephone long distance model, those income, especially for developing countries, was the one who financed, that you mentioned, the financing infrastructure development there was billion every year. When the internet came, all those yearly billions that was going from outside to developing countries disappeared. Now that’s not only happening, this uneven distribution of revenue, it’s not only happening through all of the communication infrastructure, also about the information. We see the information, data, even knowledge that is created in many countries, even if it’s flowing two directions, the money is flowing in one direction, and that is no surprise that a few companies, only a few companies has amassed so massive amount of money from resources that comes from everywhere. So my question to the panel is the following. Don’t you think that that uneven flow of revenues could be a cost in the long run of unsustainability of the internet? Thank you.


Moderator: Those were the days, the international charging arrangements for internet services from 1988, and all those debates, it reflects some part of the economics of the infrastructure, and I wonder how… This is linked to internet resilience, so that’s a provocative question for sure. I’m not sure if any of the panellists would like to take it, Fiona, I knew it.


Fiona Alexander: For sure, I’m happy to talk about the telephone accounting rate regime and two decades of arguments that we had, Juan, about accounting rates and how that system and model could not be applicable to the internet, because if you tried to apply the traditional telephone circuit switch model of accounting and revenue to the internet, it would actually require breaking the internet infrastructure that we’re trying to preserve. I would also dispute that all those accounting rate revenue and that passing of money that went to other countries was not always used to build the infrastructure in those countries. So we could talk about that a lot, too, offline. But I will say that in terms of whether or not the sort of IKEA’s debate or the fair share debate, because it’s back again, I can’t believe, is relevant in the context of this, I’m not quite so sure. But I will say that one of the ways of dealing with sort of internet resiliency, and maybe Olaf and others want to talk about the development of IXPs, and Mark wants to talk about peering and other things like that, but the model of traffic exchange in the internet ecosystem is through peering and transit, and that’s the way commercial parties privately resolve these revenue constructs that you’re talking about. There has been a lot of work, I think John Crane talked about the root server instances, and I know there’s been lots and lots of works by ISOC and others to get IXPs deployed, and that has really shifted and changed the traffic patterns. So we no longer see the unequal traffic patterns, the ones we’re talking about from the 1990s, where if you were somewhere in a different part of the world and you wanted something on the internet, it always had to come back to the United States or Western Europe. That’s no longer the case anymore because of all the work people have done on internet resiliency, but in terms of the policy and regulatory stuff, we could talk about this for hours as you know, but maybe the more technical people want to talk about how this relates to the internet resiliency construct. For hours or for decades indeed.


Paticipant: Thank you for a good workshop that we understood a lot about the resilience of the internet infrastructure. My name is Qusayr Shati, I’m from Kuwait and we are located in the Middle East and as you know the circumstances in our region. It’s a question, can we consider the safety and the security of the internet infrastructure part of the resilience or part of the concept of the resilience of the internet itself? When I talk about the safety or the security of the infrastructure, whether it’s a ship anchor that cuts off submarine cable, or whether an area of hostilities where sometimes the communication or the internet infrastructure gets limited into operation or gets halted or gets targeted. So would we consider the safety and the security of the internet infrastructure part of the resilience approach or this is a different angle? It’s just a question to the panellists.


Moderator: Thank you, Anriette. Then Ram.


Anriette Esterhuysen: Qusayr, I have a view on this, it’s not necessarily a broadly accepted view. I was a member of the Global Commission on the Stability of Cyberspace and so was Olaf. So we debated this together and I think we spent a long time talking about is it the logical resources or is it actually the physical transmission infrastructure. We decided it has to include the physical transmission infrastructure and I haven’t even touched on that but I think it really, having, and I think there’s a, I actually also want to react a bit. I think that we have. Resilience is treated differently by different parts of the internet. I think the technical community understands resilience and I think has good practices and procedures for ensuring resilience or striving towards greater resilience. I do not necessarily think that telcos have the same approaches to the internet technical community. I do not think that governments have the same approaches. There are also not even common definitions of what is critical internet infrastructure, what is critical information infrastructure. I think we also see the destruction of infrastructure and conflict. We have the case of Gaza where infrastructure has been completely destroyed. In fact, and where Gaza users, even when they had internet, were restricted to 2G. Now, so there’s so many different factors, but I certainly think that the physical transmission infrastructure does have to be considered because without that, and I think as Mark and others have said as well, even electricity, which is an external factor, but it disables both the physical and the logical resources. So I personally do think that physical transmission infrastructure is part of it, but that’s not a universal view. In fact, we asked the ICANN board a few years ago to look at the public resources, physical infrastructure as being part of that. In fact, even to look at the DNS as being a part of the public core, and even that I think we struggle to achieve.


Moderator: We need to hurry because we have still some content to cover. I would let Mallory to have a question, Ram, a quick response, and then John to wrap the conversation if that’s okay. Mallory. Thanks.


Paticipant: And thanks for hosting this conversation. And Ram, I really liked your first slide. I don’t know if you can go back to it, but I don’t know if folks are like me, but when we were having these conversations in the framing of fragmentation, and now it kind of came up here. Oh, I love the bread picture as well. Thank you, Olaf. We obviously see there’s an interconnection between electricity and food systems and shipping lines. And I feel a bit odd when we have those conversations because it’s really clear that we don’t think the internet is maybe more important than eating or drinking water. But we don’t quite make the connection, in my view, that every single one of these vulnerabilities is actually a crisis of capitalism. And we aren’t thinking holistically in terms of the political economy of the internet. And I can say, if we think that we can solve those problems without solving power or without, you obviously have gotten that, right? Like, we can’t solve these problems without solving electricity and power and other things. We can’t solve these problems without thinking about what happens when some states invade others or there are internet shutdowns. You know, we have to think of it holistically. I wonder if we imagine the project we’re trying to take on together to keep the internet resilient is a project that will transform our global capitalist system or is a project that very much depends on some other sector sorting those things out.


Moderator: Thank you, Mallory. Ram?


Ram Mohan: Thank you, Mallory. That’s a great provocative question. I think it will transcend rather than transform. And I don’t want to talk necessarily about, I mean, I think there’s quite a bit to discuss about the system and whether the system itself is primarily at fault. I will point out that in these resilience problems happen in non-capitalist systems as well. So, that’s just one thing. One very brief response to the gentleman from Kuwait who had the question. He had talked about he’s on the at the table there. You’ve spoken about security and safety. I want to say you should be thinking about security and stability, not safety, because safety is often what the user perceives. Stability is something that you can actually affect as a regulator or as a government.


Moderator: Thank you, Ram. I would love for John Janowiak, the President and CEO of the Marconi Society, to help us wrap this up. Sure.


John Janowiak: Thank you, Pablo. And thank you to the panel and all of you for attending today. This is a near and dear subject to the Marconi Society. I was approached not too long ago by Vint to take this on as one of our core issues for the society. And since we did, you know, we’ve just gotten a great amount of support from the industry. And so this is one of the first readouts that we’re providing publicly. So thank you for attending today’s session. You know, raising the awareness of this critical issue that’s, you know, often unappreciated or is the topic of internet resilience. And, you know, it’s going to take all of us to ensure that this matter gets the attention that’s required. So, again, we look forward to having you all involved. The responsibilities are cross sectors, cross geographies, and cross disciplines, as you heard today. One of the things that we were fortunate to do is we were able to bring together some of the top experts in the internet. And I think, like, we have a photo up here of our activity together in Washington, D.C. last November, where we really sat down and looked at, you know, what are some of the critical issues in resiliency of the network, you know, reliability, stability, and resiliency. And the report that we ultimately came up with is right here, this yellow report that’s on the internet, on our website. Please go ahead and download that report and take a look at it. We welcome your organizations to get involved in this. The more people we get involved in looking at these issues and helping solve these issues, the more resilient the Internet will become. So we’re really looking forward to working with all of you on this issue. So on behalf of this group here, which is all, most of the members on the panel here are part of the Internet Resilience Advisory Council, as well as the Marconi Board of Directors, you know, we look forward to working with all of you on making the Internet more reliable, stable, and resilient. So thank you for attending today.


Moderator: Pablo? With that, I wish we have a really good concert and thank you very much for attending the workshop.


R

Ram Mohan

Speech speed

112 words per minute

Speech length

501 words

Speech time

268 seconds

Internet has become invisible infrastructure supporting all aspects of life, creating critical dependencies

Explanation

The internet is no longer just a convenience but fundamental infrastructure that supports healthcare, financial transactions, transportation, energy grids, and emergency response. This creates critical dependencies where disruptions can have severe consequences across all sectors of society and economy.


Evidence

Examples include critical services like healthcare, financial transactions, transportation, energy grids, emergency response, and the COVID-19 experience showing how essential internet connectivity became


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Development | Economic


Agreed with

– Vinton Cerf
– Manal Ismail
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities

Explanation

Modern internet faces four critical challenges that threaten resilience. These include tangled interdependent systems with hidden failure points, growing friction between technical operators and government regulators, lack of investment in preventive measures, and vulnerabilities in complex software supply chains.


Evidence

Examples include dependency on power/water, over-reliance on few APIs, government demands for immediate fixes conflicting with technical problem-solving approaches, and public examples of supply chain compromises


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Legal and regulatory | Economic


Agreed with

– Anriette Esterhuysen
– Manal Ismail
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Cross-sector assumptions create vulnerabilities where each sector assumes others will remain available

Explanation

Internet service providers assume power and water will be available in their backup plans, while power sector operators assume internet will be available for their communications. This creates circular dependencies where sectors don’t coordinate their resilience planning.


Evidence

Anecdotal example of ISP backup plans assuming power availability while power sector backup plans assume internet availability for communication


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Legal and regulatory


Agreed with

– Olaf Kolkman
– Mark Nottingham
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Growing friction between technical community’s problem-solving approach and government demands for immediate fixes

Explanation

Governments demand accountability and quick responses to incidents given the internet’s critical role, which clashes with the technical community’s traditional approach of trying solutions iteratively. This creates tension between regulatory expectations and technical realities.


Evidence

Example of government regulator saying ‘I don’t want you to try the next thing, fix it now’ versus technical community’s approach of trying solutions sequentially


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure


Security and stability more relevant concepts than safety for regulators and governments

Explanation

When addressing internet resilience from a regulatory perspective, focus should be on security and stability rather than safety. Safety is what users perceive, while stability is something that regulators and governments can actually influence and affect.


Major discussion point

Physical Security and Infrastructure Protection


Topics

Cybersecurity | Legal and regulatory


Resilience issues transcend economic systems, occurring in various political and economic contexts

Explanation

Internet resilience problems are not solely caused by capitalist systems but occur across different economic and political systems. The focus should be on transcending rather than transforming existing systems to address these challenges.


Evidence

Observation that resilience problems happen in non-capitalist systems as well


Major discussion point

Systemic and Holistic Perspectives


Topics

Economic | Legal and regulatory


Disagreed with

– Paticipant

Disagreed on

Root cause analysis – systemic vs technical solutions


O

Olaf Kolkman

Speech speed

119 words per minute

Speech length

1353 words

Speech time

677 seconds

Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure

Explanation

As internet systems become more interconnected and complex, they become more vulnerable to failures. A webpage now makes 100-200 queries to different locations before loading, creating multiple potential failure points that can cascade through the system.


Evidence

Example of bread delivery logistics requiring complex interconnected systems, and modern webpages making 100-200 queries to various locations before loading


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Cybersecurity


Agreed with

– Ram Mohan
– Mark Nottingham
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning

Explanation

Data centers rely on diesel generators that consume massive amounts of fuel and require regular maintenance and refueling. These physical dependencies are often overlooked but represent critical single points of failure for internet infrastructure.


Evidence

Detailed example of Cummings DFLE 1500 kilowatt diesel generator costing $139,000, consuming 392 liters of diesel per hour, requiring one truckload of diesel every three days, and a real case where generators failed due to empty fuel tanks after years of monthly testing


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Cybersecurity


Agreed with

– Anriette Esterhuysen
– Manal Ismail

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


A

Anriette Esterhuysen

Speech speed

150 words per minute

Speech length

1173 words

Speech time

467 seconds

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”

Explanation

In many Global South countries, there’s a stark divide in internet resilience capabilities. Larger companies and financial institutions have backup systems and advance warning of disruptions, while ordinary users, especially pay-as-you-go customers, receive no communication and must manage disruptions on their own.


Evidence

Examples from South Africa with regular electricity outages, drought affecting hydro-powered countries along Zambezi River, financial institutions having backup power while mobile towers go down, and users needing multiple SIM cards as personal backup strategy


Major discussion point

Current State of Internet Resilience


Topics

Development | Infrastructure | Economic


Need for enhanced communication with end users who currently receive no information about disruptions

Explanation

While technical communities and service providers communicate well among themselves about disruptions, end users and businesses outside the technical sector receive no information about outages, repairs, or current status. This lack of communication breaks trust and discourages digital adoption.


Evidence

Example of undersea cable disruptions affecting Africa where only ISPs belonging to associations get information, while other businesses and end users have no knowledge of current status or repair timelines


Major discussion point

Current State of Internet Resilience


Topics

Development | Infrastructure | Sociocultural


Agreed with

– Ram Mohan
– Manal Ismail
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents

Explanation

Internet resilience must include physical transmission infrastructure, not just logical resources. This infrastructure faces threats from conflicts, accidents, and deliberate targeting, as seen in various global conflicts where infrastructure has been destroyed or restricted.


Evidence

Reference to Global Commission on the Stability of Cyberspace work, example of Gaza where infrastructure was completely destroyed and users were restricted to 2G even when internet was available


Major discussion point

Physical Security and Infrastructure Protection


Topics

Cybersecurity | Infrastructure | Human rights


Agreed with

– Olaf Kolkman
– Manal Ismail

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


Disagreed with

– John Crain

Disagreed on

Scope of internet resilience – physical vs logical infrastructure


Different sectors have varying approaches to resilience with no common definitions of critical infrastructure

Explanation

The technical community has good resilience practices, but telcos, governments, and other sectors don’t necessarily share the same approaches. There’s no universal agreement on what constitutes critical internet infrastructure or critical information infrastructure.


Evidence

Reference to asking ICANN board to consider DNS as part of public core and struggles to achieve even that recognition


Major discussion point

Physical Security and Infrastructure Protection


Topics

Infrastructure | Legal and regulatory | Cybersecurity


F

Fiona Alexander

Speech speed

208 words per minute

Speech length

1169 words

Speech time

335 seconds

Need to map actors, institutions, and dependencies across the entire internet ecosystem infrastructure supply chain

Explanation

A comprehensive mapping exercise is needed to identify all actors, institutions, and dependencies in the internet supply chain. This goes beyond traditional telecom and ISP providers to include everyone who plays a role in internet infrastructure, many of whom don’t fully appreciate their responsibilities.


Evidence

Working group developing map through Google Docs as a test of collaborative capability, focusing on making it accessible to people regardless of technical skill level


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Legal and regulatory


Agreed with

– Ram Mohan
– Olaf Kolkman
– Mark Nottingham

Agreed on

Complex interdependencies create cascading failure risks


Working group developing map following IP packet path to identify all infrastructure layers and potential failure points

Explanation

The mapping project will follow the route an IP packet takes from a user action to its destination, identifying all infrastructure layers it touches at a 30,000-foot level. This will help demonstrate the complexity and interdependencies in internet infrastructure.


Evidence

Plan to have first draft ready for Marconi Society meeting in November, with potential for future iterations focusing on specific sectors like energy and power


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Development


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure

Explanation

The historical telephone circuit-switched model of accounting and revenue sharing cannot be applied to internet infrastructure without fundamentally breaking how the internet works. The internet operates on different principles of traffic exchange through peering and transit arrangements.


Evidence

Reference to two decades of arguments about accounting rates and how applying traditional telephone models would require breaking internet infrastructure


Major discussion point

Economic and Structural Challenges


Topics

Economic | Infrastructure | Legal and regulatory


Disagreed with

– Paticipant

Disagreed on

Economic model sustainability and revenue distribution


Traffic exchange through peering and transit has shifted patterns, reducing historical inequalities

Explanation

The development of Internet Exchange Points (IXPs) and peering arrangements has fundamentally changed internet traffic patterns. Traffic no longer needs to route back to the United States or Western Europe, addressing historical inequalities in internet traffic flow.


Evidence

Reference to work by ISOC and others in deploying IXPs, and how this has changed traffic patterns from the 1990s model where all traffic had to route through US or Western Europe


Major discussion point

Economic and Structural Challenges


Topics

Infrastructure | Economic | Development


J

John Crain

Speech speed

141 words per minute

Speech length

977 words

Speech time

412 seconds

ICANN manages critical identifier systems requiring uniqueness and global coordination for internet functionality

Explanation

ICANN manages not just the domain name system but thousands of different types of identifiers through the Internet Assigned Numbers Authority. These identifiers must have specific attributes like uniqueness for internet protocols to function properly, requiring global coordination.


Evidence

ICANN’s 25-year history, responsibility for DNS and IANA functions, management of thousands of identifier types beyond just domain names


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Legal and regulatory


Disagreed with

– Anriette Esterhuysen

Disagreed on

Scope of internet resilience – physical vs logical infrastructure


DNS root system evolved from 13 systems to 2,000 locations globally through investment in resilience over time

Explanation

The DNS root system, critical for internet functionality, was recognized as a potential single point of failure in the late 1990s and early 2000s. Through development of new routing technologies like Anycast and sustained investment, it now operates from approximately 2,000 locations worldwide.


Evidence

Historical progression from 13 root server systems in late 90s/early 2000s to current 2,000 locations globally using Anycast technology


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Cybersecurity


Continuous improvement needed as internet grows, requiring ongoing assessment of dependencies and vulnerabilities

Explanation

Internet resilience is not a one-time achievement but requires continuous attention as the internet evolves and grows. Organizations must constantly evaluate their dependencies and potential vulnerabilities, considering scenarios like major power outages or code flaws.


Evidence

Personal reflection on losing sleep thinking about power outages, code flaws, and their potential impact on identifier systems and broader internet functionality


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Cybersecurity


Agreed with

– Ram Mohan
– Vinton Cerf
– Manal Ismail

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


M

Manal Ismail

Speech speed

106 words per minute

Speech length

630 words

Speech time

355 seconds

Government role ranges from awareness and incentives to mandated requirements and enforced regulations

Explanation

Governments have varying levels of involvement in internet resilience, from simple awareness-raising and providing incentives to implementing mandatory requirements and enforcing regulations. This role is evolving as digital interconnectedness poses unprecedented challenges for national operations.


Evidence

Examples of different government approaches and the range of interventions available to governments


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure


Agreed with

– Ram Mohan
– Vinton Cerf
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Need for multi-stakeholder approaches balancing national interests with global interoperability

Explanation

Internet governance requires multi-stakeholder approaches involving governments, private sector, civil society, technical community, academia, and international organizations. This is necessary because the internet is a global shared resource that requires balancing national interests with global interoperability requirements.


Evidence

Reference to Sao Paulo multi-stakeholder guidelines as framework for inclusive, transparent, and accountable processes


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure | Development


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Governments should promote investment in redundant networks, secure digital registries, and national digital resilience strategies

Explanation

As stewards of national digital infrastructure, governments should actively promote investment in resilient networks with built-in redundancy, ensure secure storage of digital registries, and develop comprehensive national digital resilience strategies that are regularly updated.


Evidence

Examples include promoting technology diversity (satellite vs. undersea cables), encouraging local traffic through IXPs, managing third-party network elements, and capacity development


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure | Development


Agreed with

– Olaf Kolkman
– Anriette Esterhuysen

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


M

Mark Nottingham

Speech speed

169 words per minute

Speech length

1040 words

Speech time

367 seconds

Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable

Explanation

The internet itself provides no guarantees that packets will reach their destination, so multiple layers of abstraction are built on top to create the appearance of reliability. This includes TCP connections, browser retry mechanisms, and services like CloudFlare that provide additional resilience layers.


Evidence

Examples of TCP providing connection abstraction, web browsers retrying failed requests, and CloudFlare’s global network of servers providing content delivery and security services


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity


Even with best engineering practices, failures still occur requiring continuous improvement and transparency

Explanation

Despite hiring top engineers and implementing redundancy measures, failures still happen due to cascading effects and unexpected interactions. Companies must continuously improve their resilience, test failure scenarios, and be transparent about incidents when they occur.


Evidence

Detailed example of Code Orange incident involving generator failure at data center, cascading failures of centralized systems, six-hour outage extending to day and a half of partial availability, and subsequent re-engineering efforts


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity | Economic


Agreed with

– Ram Mohan
– Olaf Kolkman
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Systemic issues require cooperation across different businesses and ecosystem parts, not just individual company solutions

Explanation

Internet resilience cannot be solved by individual companies alone but requires systemic cooperation across the entire ecosystem. Issues like routing security need everyone to agree on reality and work together, as demonstrated by CloudFlare’s investment in RPKI and routing data collection.


Evidence

Examples of routing security challenges, CloudFlare’s investment in RPKI, radar platform for internet statistics, and the need for ecosystem-wide cooperation on routing issues


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity | Economic


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– John Janowiak

Agreed on

Cross-sector collaboration is essential for effective resilience


P

Paticipant

Speech speed

144 words per minute

Speech length

898 words

Speech time

373 seconds

Uneven revenue distribution from historical internet development may threaten long-term sustainability

Explanation

The historical shift from telephone accounting rates to internet connectivity models eliminated billions in annual revenue that previously flowed to developing countries for infrastructure development. Current uneven revenue distribution, where data and knowledge flow globally but money flows in one direction, may threaten internet sustainability.


Evidence

Historical comparison of international telephone revenue sharing model versus internet connectivity costs, reference to ITU study group discussions and D50 recommendation, impact on developing countries losing infrastructure financing


Major discussion point

Economic and Structural Challenges


Topics

Economic | Development | Legal and regulatory


Disagreed with

– Fiona Alexander

Disagreed on

Economic model sustainability and revenue distribution


Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking

Explanation

Internet resilience cannot be separated from broader infrastructure challenges including electricity, water, food systems, and shipping. These vulnerabilities are interconnected and require holistic political economy thinking rather than treating internet resilience as an isolated technical problem.


Evidence

Reference to connections between electricity, food systems, shipping lines, and the need to think about power, state conflicts, and internet shutdowns as interconnected issues


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Economic | Development


Disagreed with

– Ram Mohan

Disagreed on

Root cause analysis – systemic vs technical solutions


J

John Janowiak

Speech speed

144 words per minute

Speech length

364 words

Speech time

151 seconds

Cross-sector, cross-geography, and cross-disciplinary collaboration essential for addressing resilience challenges

Explanation

Internet resilience requires collaboration across different sectors, geographic regions, and academic disciplines. The Marconi Society’s approach brings together top experts from various fields to address these complex challenges that no single organization or sector can solve alone.


Evidence

Reference to Washington D.C. meeting with 30+ global experts, Internet Resilience Report publication, and formation of Internet Resilience Advisory Council with diverse membership


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Development | Legal and regulatory


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


V

Vinton Cerf

Speech speed

153 words per minute

Speech length

551 words

Speech time

214 seconds

Internet dependence is increasing with AI applications, making resilience critical as consequences of failures become more severe

Explanation

The internet has become so woven into our ecosystem that we are very concerned about its resilience and reliability. With the arrival of new applications of artificial intelligence, that dependence is only going to increase, and when it doesn’t work there are serious consequences.


Evidence

Comparison to other infrastructure like power outages, blocked roads, and mobile network failures that have consequences when they don’t work


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Development


Agreed with

– Ram Mohan
– Manal Ismail
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Provenance and integrity of software components, especially open source libraries, are critical for supply chain security

Explanation

The word provenance will have heightened importance in understanding where things come from, how we know they have integrity, and whether they have been altered. This is particularly applicable to open source libraries which are wonderful because they’re accessible, but hazardous because sometimes they’re not well maintained.


Evidence

Questions about bill of materials, digital signatures, and tracking of software assembly and installation processes


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Cybersecurity | Infrastructure


Need for comprehensive supply chain documentation and audit capabilities to ensure security and integrity

Explanation

We need to ask whether we can document the supply chain that leads to a particular product or service and know that it has integrity. Tracking all of that and having the ability to audit where things came from and how they were assembled is a very important aspect of supply chain evaluation.


Evidence

Questions about knowing who digitally signed software, who assembled components, and how they were configured and installed


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Cybersecurity | Infrastructure | Legal and regulatory


M

Moderator

Speech speed

127 words per minute

Speech length

1312 words

Speech time

618 seconds

Internet resilience requires collective risk management through collaborative approaches across sectors

Explanation

The moderator emphasized that internet resilience is fundamentally about collective risk management that requires collaborative approaches. This involves bringing together different stakeholders and sectors to address shared vulnerabilities and dependencies.


Evidence

Reference to the workshop structure bringing together diverse experts and the emphasis on enhanced collaboration throughout the discussion


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Legal and regulatory


IGF provides the appropriate forum for connecting technical coordination with policy development and real-world impacts

Explanation

The moderator positioned the Internet Governance Forum as the ideal venue for discussing internet resilience because it connects people affected by breakages to the processes involving technical coordination, policy development, and practical implementation.


Evidence

Framing of the workshop within IGF context and emphasis on connecting theory to practice through the panel structure


Major discussion point

Systemic and Holistic Perspectives


Topics

Legal and regulatory | Development


Agreements

Agreement points

Internet has become critical infrastructure requiring proactive resilience planning

Speakers

– Ram Mohan
– Vinton Cerf
– Manal Ismail
– John Crain

Arguments

Internet has become invisible infrastructure supporting all aspects of life, creating critical dependencies


Internet dependence is increasing with AI applications, making resilience critical as consequences of failures become more severe


Government role ranges from awareness and incentives to mandated requirements and enforced regulations


Continuous improvement needed as internet grows, requiring ongoing assessment of dependencies and vulnerabilities


Summary

All speakers agree that the internet has evolved from a convenience to critical infrastructure that supports essential services, requiring systematic and proactive approaches to resilience planning rather than reactive responses.


Topics

Infrastructure | Development | Legal and regulatory


Complex interdependencies create cascading failure risks

Speakers

– Ram Mohan
– Olaf Kolkman
– Mark Nottingham
– Fiona Alexander

Arguments

Cross-sector assumptions create vulnerabilities where each sector assumes others will remain available


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Even with best engineering practices, failures still occur requiring continuous improvement and transparency


Need to map actors, institutions, and dependencies across the entire internet ecosystem infrastructure supply chain


Summary

Speakers consistently identified that increasing system complexity creates hidden interdependencies and single points of failure that can cascade across sectors, requiring comprehensive mapping and understanding of these relationships.


Topics

Infrastructure | Cybersecurity


Cross-sector collaboration is essential for effective resilience

Speakers

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– John Janowiak
– Mark Nottingham

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Need for enhanced communication with end users who currently receive no information about disruptions


Need for multi-stakeholder approaches balancing national interests with global interoperability


Cross-sector, cross-geography, and cross-disciplinary collaboration essential for addressing resilience challenges


Systemic issues require cooperation across different businesses and ecosystem parts, not just individual company solutions


Summary

All speakers emphasized that internet resilience cannot be achieved by any single sector or organization alone, requiring enhanced collaboration and communication across technical, governmental, business, and civil society stakeholders.


Topics

Infrastructure | Legal and regulatory | Development


Physical infrastructure dependencies are critical vulnerabilities

Speakers

– Olaf Kolkman
– Anriette Esterhuysen
– Manal Ismail

Arguments

Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning


Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents


Governments should promote investment in redundant networks, secure digital registries, and national digital resilience strategies


Summary

Speakers agreed that physical infrastructure dependencies like power, water, and transmission infrastructure are often overlooked but represent critical vulnerabilities that must be addressed in resilience planning.


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Similar viewpoints

Both speakers emphasized how increasing system complexity creates fragility and hidden failure points, with Ram focusing on the broader challenges including regulatory and funding issues, while Olaf provided concrete technical examples of how complexity leads to cascading failures.

Speakers

– Ram Mohan
– Olaf Kolkman

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Topics

Infrastructure | Cybersecurity


Both speakers highlighted inequality in resilience capabilities and the need for inclusive approaches, with Anriette focusing on the Global South perspective and end-user experiences, while Manal emphasized the governmental role in ensuring equitable resilience through multi-stakeholder governance.

Speakers

– Anriette Esterhuysen
– Manal Ismail

Arguments

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Need for multi-stakeholder approaches balancing national interests with global interoperability


Topics

Development | Legal and regulatory | Infrastructure


Both speakers approached resilience from a technical architecture perspective, with Vint focusing on supply chain integrity and provenance, while Mark explained how multiple layers of abstraction are built to create reliability from inherently unreliable systems.

Speakers

– Vinton Cerf
– Mark Nottingham

Arguments

Provenance and integrity of software components, especially open source libraries, are critical for supply chain security


Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable


Topics

Infrastructure | Cybersecurity


Unexpected consensus

Revenue distribution and economic sustainability concerns

Speakers

– Paticipant
– Fiona Alexander

Arguments

Uneven revenue distribution from historical internet development may threaten long-term sustainability


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure


Explanation

Despite representing different perspectives on internet economics, both speakers acknowledged the complexity of revenue distribution issues while agreeing that historical telephone models cannot be applied to internet infrastructure. This represents unexpected consensus on the technical limitations of applying legacy economic models to internet governance.


Topics

Economic | Infrastructure | Legal and regulatory


Holistic approach to resilience beyond technical solutions

Speakers

– Paticipant
– Anriette Esterhuysen
– Olaf Kolkman

Arguments

Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning


Explanation

Unexpected consensus emerged around the need for holistic thinking that goes beyond technical solutions to address broader systemic issues including economic inequality, infrastructure dependencies, and social factors. This represents a shift from purely technical approaches to more comprehensive socio-technical perspectives.


Topics

Infrastructure | Development | Economic


Overall assessment

Summary

Strong consensus exists on fundamental challenges (complexity, interdependencies, need for collaboration) and the critical nature of internet resilience, with broad agreement on the inadequacy of current approaches and the need for proactive, cross-sector solutions.


Consensus level

High level of consensus on problem identification and general solution directions, with speakers reinforcing each other’s points about system complexity, collaboration needs, and the critical nature of internet infrastructure. The consensus suggests a mature understanding of the challenges and readiness for coordinated action across sectors and stakeholders.


Differences

Different viewpoints

Scope of internet resilience – physical vs logical infrastructure

Speakers

– Anriette Esterhuysen
– John Crain

Arguments

Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents


ICANN manages critical identifier systems requiring uniqueness and global coordination for internet functionality


Summary

Anriette argues for including physical transmission infrastructure as part of internet resilience, noting this is not a universally accepted view and referencing struggles to get even DNS recognized as part of the public core. John focuses primarily on logical identifier systems and their management, representing a more traditional technical community view that separates logical from physical infrastructure.


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Economic model sustainability and revenue distribution

Speakers

– Paticipant
– Fiona Alexander

Arguments

Uneven revenue distribution from historical internet development may threaten long-term sustainability


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure


Summary

The participant argues that the shift from telephone accounting rates eliminated crucial revenue flows to developing countries and that current uneven distribution threatens sustainability. Fiona strongly disputes this, arguing that the telephone model cannot be applied to internet infrastructure and that modern peering/transit arrangements have addressed historical inequalities.


Topics

Economic | Development | Infrastructure


Root cause analysis – systemic vs technical solutions

Speakers

– Paticipant
– Ram Mohan

Arguments

Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Resilience issues transcend economic systems, occurring in various political and economic contexts


Summary

The participant frames resilience problems as fundamentally rooted in capitalist systems requiring transformation of global political economy. Ram argues that resilience problems transcend economic systems and occur across different political contexts, suggesting the focus should be on transcending rather than transforming existing systems.


Topics

Economic | Infrastructure | Development


Unexpected differences

Terminology precision in regulatory contexts

Speakers

– Ram Mohan
– Paticipant

Arguments

Security and stability more relevant concepts than safety for regulators and governments


Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Explanation

This disagreement emerged unexpectedly during a question about physical security. Ram made a specific terminological correction distinguishing ‘security and stability’ from ‘safety’ for regulatory purposes, while the questioner was thinking more broadly about physical protection. This reveals different conceptual frameworks – technical precision vs. holistic security thinking.


Topics

Legal and regulatory | Cybersecurity


Overall assessment

Summary

The discussion showed relatively low levels of fundamental disagreement, with most conflicts arising around scope, approach, and emphasis rather than core principles. Main disagreements centered on: (1) whether physical infrastructure should be included in internet resilience definitions, (2) economic models and revenue distribution impacts, and (3) whether problems require systemic transformation or technical solutions.


Disagreement level

Low to moderate disagreement level. Speakers generally agreed on the importance of internet resilience and need for collaboration, but differed on scope, definitions, and approaches. The disagreements reflect different professional perspectives (technical, policy, academic, regional) rather than fundamental conflicts. This suggests good potential for finding common ground, though definitional and scope issues need resolution for effective collaboration.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasized how increasing system complexity creates fragility and hidden failure points, with Ram focusing on the broader challenges including regulatory and funding issues, while Olaf provided concrete technical examples of how complexity leads to cascading failures.

Speakers

– Ram Mohan
– Olaf Kolkman

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Topics

Infrastructure | Cybersecurity


Both speakers highlighted inequality in resilience capabilities and the need for inclusive approaches, with Anriette focusing on the Global South perspective and end-user experiences, while Manal emphasized the governmental role in ensuring equitable resilience through multi-stakeholder governance.

Speakers

– Anriette Esterhuysen
– Manal Ismail

Arguments

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Need for multi-stakeholder approaches balancing national interests with global interoperability


Topics

Development | Legal and regulatory | Infrastructure


Both speakers approached resilience from a technical architecture perspective, with Vint focusing on supply chain integrity and provenance, while Mark explained how multiple layers of abstraction are built to create reliability from inherently unreliable systems.

Speakers

– Vinton Cerf
– Mark Nottingham

Arguments

Provenance and integrity of software components, especially open source libraries, are critical for supply chain security


Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable


Topics

Infrastructure | Cybersecurity


Takeaways

Key takeaways

Internet resilience requires a fundamental mindset shift from reactive problem-solving to proactive prevention and cross-sector collaboration


The internet supply chain involves complex interdependencies extending far beyond traditional telecom providers to include power, water, physical infrastructure, and all sectors of the economy


A two-tier resilience system exists globally where some organizations and regions have backup solutions while others treat internet availability as unpredictable


Prevention-focused resilience measures struggle to attract funding compared to post-incident responses, creating a systematic investment gap


Physical transmission infrastructure must be considered part of internet resilience, including protection from conflicts, accidents, and natural disasters


Multi-stakeholder governance approaches are essential for balancing national interests with global internet interoperability


Continuous improvement and transparency about failures are necessary as internet complexity and dependencies continue to grow


Enhanced communication with end users is critically needed, as most people remain unaware of internet infrastructure vulnerabilities and current disruption status


Resolutions and action items

Marconi Society working group to produce first draft of internet resilience supply chain map by November meeting, following IP packet paths to identify all infrastructure dependencies


Participants encouraged to download and review the Internet Resilience Report from Marconi Society website


Organizations invited to join the Internet Resilience Advisory Council and contribute to ongoing resilience mapping efforts


Working group conducting mapping exercise through collaborative Google Docs to test online cooperation capabilities


Future iterations of resilience maps planned for specific sectors (energy, power) if initial mapping proves successful


Unresolved issues

No common definitions exist for critical internet infrastructure or critical information infrastructure across different sectors


Funding mechanisms for preventive resilience measures remain inadequate and systematically underdeveloped


Communication gaps persist between technical operators, government regulators, and end users during disruptions


Cross-sector coordination challenges where each sector assumes other critical infrastructure will remain available


Debate continues over whether physical transmission infrastructure should be universally considered part of internet resilience


Economic sustainability concerns regarding uneven revenue distribution in global internet infrastructure development


Regulatory friction between government demands for immediate fixes and technical community’s iterative problem-solving approaches


Suggested compromises

Multi-stakeholder approaches that balance national security interests with global internet interoperability requirements


Scoped mapping exercise starting with high-level packet flow analysis before diving into sector-specific details


Enhanced communication strategies that improve information flow to end users without overwhelming them with technical details


Risk-based approaches to resilience planning that prioritize coupled risks and cascading failure scenarios


Collaborative frameworks that respect both government accountability needs and technical community problem-solving methods


Thought provoking comments

The implication of dependence is that when it doesn’t work there are all kinds of consequences… I’m going to suggest to you that the word provenance will turn out to have a very heightened importance in this conversation. Where did things come from? How do we know that they have integrity?

Speaker

Vinton Cerf


Reason

This comment was foundational because it reframed internet resilience from a purely technical issue to one of trust and accountability in supply chains. Cerf’s introduction of ‘provenance’ as a key concept shifted the discussion from reactive problem-solving to proactive verification and documentation of digital supply chains.


Impact

This set the entire tone for the workshop, establishing the framework that subsequent speakers built upon. It moved the conversation beyond traditional infrastructure concerns to encompass software integrity, digital signatures, and supply chain transparency – themes that resonated throughout the entire discussion.


So you have this expectation and an assumption that other parts of critical infrastructure are going to be available, except those parts aren’t actually talking with each other, right? So, you have folks in the power sector… they have very good plans… but a common assumption for them is that the internet will be available so that they can communicate.

Speaker

Ram Mohan


Reason

This observation revealed a critical blind spot in infrastructure planning – the circular dependency problem where each critical infrastructure sector assumes others will remain operational. It highlighted the dangerous illusion of independence in interconnected systems.


Impact

This comment fundamentally shifted the discussion from viewing internet resilience as an isolated technical challenge to understanding it as part of a complex web of interdependent critical infrastructures. It influenced subsequent speakers to consider cross-sector collaboration and helped frame the mapping exercise that Fiona later described.


So even though theoretically the bank services are still up, you’re not as an end user able to access it… it’s like there’s a two-tier system of how… what you have in many countries in the global South is a two-tier system. Some people who just deal with internet resilience, it’s like an act of God. Sometimes you have, sometimes you don’t.

Speaker

Anriette Esterhuysen


Reason

This comment was particularly insightful because it exposed the inequality inherent in current resilience approaches. It challenged the assumption that technical solutions alone can address resilience, highlighting how socioeconomic factors create vastly different experiences of internet reliability.


Impact

This intervention brought a crucial equity lens to the discussion, forcing participants to consider that resilience isn’t just about technical redundancy but about who has access to backup systems and information. It influenced the conversation to consider end-user communication and the social dimensions of resilience, moving beyond purely technical solutions.


I know of a case where the diesel was tested every month for two hours… after five, six years, they really had an emergency. They turned the thing on, it worked for five hours, and it was out of diesel. They forgot to refuel the tanks.

Speaker

Olaf Kolkman


Reason

This seemingly simple anecdote was profound because it illustrated how human factors and operational oversights can undermine even well-designed technical systems. It demonstrated that resilience failures often occur not from sophisticated attacks but from mundane operational gaps.


Impact

This story became a touchstone for the discussion, with other speakers referencing similar themes about the importance of operational practices versus technical solutions. It helped ground the abstract concepts in concrete, relatable examples and emphasized the human element in resilience planning.


Don’t you think that that uneven flow of revenues could be a cost in the long run of unsustainability of the internet?

Speaker

Participant (Juan)


Reason

This question was thought-provoking because it connected internet resilience to fundamental economic sustainability questions, challenging participants to consider whether current business models might themselves be a threat to long-term internet stability.


Impact

While this comment didn’t dramatically shift the technical focus of the discussion, it introduced important questions about the economic foundations of internet infrastructure. It prompted responses about peering arrangements and IXPs, and connected resilience to broader questions of global digital equity and sustainable financing models.


I wonder if we imagine the project we’re trying to take on together to keep the internet resilient is a project that will transform our global capitalist system or is a project that very much depends on some other sector sorting those things out.

Speaker

Mallory


Reason

This was perhaps the most provocative comment because it challenged the fundamental assumptions underlying the entire discussion. It questioned whether internet resilience could be achieved within existing political and economic structures, or whether it required more fundamental systemic change.


Impact

This comment forced participants to confront the limits of technical solutions and consider whether their resilience efforts were addressing symptoms rather than root causes. While it came near the end, it reframed the entire discussion by questioning whether incremental improvements could address systemic vulnerabilities rooted in broader political-economic structures.


Overall assessment

These key comments collectively transformed what could have been a narrow technical discussion into a rich, multidimensional exploration of internet resilience. Cerf’s opening established the conceptual framework around provenance and supply chain integrity. Ram’s insight about circular infrastructure dependencies shifted the focus to cross-sector collaboration. Anriette’s observations about inequality brought crucial equity considerations into the technical discourse. Olaf’s diesel generator story grounded abstract concepts in human operational realities. The economic sustainability question and Mallory’s systemic critique challenged participants to consider whether their technical solutions were adequate to address the scale of the challenges. Together, these interventions created a discussion that moved fluidly between technical specifics and broader systemic questions, ultimately revealing internet resilience as a complex socio-technical challenge requiring collaboration across sectors, disciplines, and global power structures.


Follow-up questions

Do we have a business continuity strategy for unplanned disruption leading to a total global unavailability of the internet?

Speaker

Nandifa Natsaluba (online participant)


Explanation

This addresses a critical gap in global internet resilience planning – the need for comprehensive business continuity strategies that can handle complete internet failures, which would have catastrophic economic and social impacts.


How can we document the supply chain that leads to a particular product or service and ensure it has integrity?

Speaker

Vinton Cerf


Explanation

This is fundamental to supply chain security and resilience, particularly for open source libraries and software components that form the backbone of internet infrastructure.


How can we be assured that security has been properly attended to, not only in the fabrication of software, but also its configuration and installation?

Speaker

Vinton Cerf


Explanation

This addresses the need for end-to-end security verification throughout the entire lifecycle of internet infrastructure components.


What are risks that might be coupled to each other, and how do we identify and prepare for them?

Speaker

Olaf Kolkman


Explanation

Understanding cascading failures and interdependent risks is crucial for building truly resilient systems, as single events can trigger multiple simultaneous failures.


How can we enhance communication with end users about internet disruptions and recovery status?

Speaker

Anriette Esterhuysen


Explanation

There’s a significant gap in communicating internet resilience status to end users, particularly in developing countries where users are left to manage disruptions without information or support.


How can we develop common definitions of what constitutes critical internet infrastructure across different sectors and stakeholders?

Speaker

Anriette Esterhuysen


Explanation

The lack of common definitions hampers coordinated resilience efforts, as different communities (technical, government, telecom) have varying approaches and understanding of what needs protection.


Should physical transmission infrastructure be considered part of internet resilience, and how do we protect it during conflicts?

Speaker

Qusayr Shati and Anriette Esterhuysen


Explanation

This addresses whether internet resilience should include physical infrastructure protection, especially in conflict zones where infrastructure becomes a target or casualty of war.


Could the uneven flow of internet revenues globally cause long-term unsustainability of the internet?

Speaker

Juan (participant)


Explanation

This explores whether economic imbalances in internet infrastructure financing could undermine global internet resilience, particularly affecting developing countries’ ability to maintain and upgrade infrastructure.


How do we solve internet resilience problems without addressing broader systemic issues like power, water, and political conflicts?

Speaker

Mallory (participant)


Explanation

This questions whether internet resilience can be achieved in isolation or requires addressing fundamental infrastructure and political economy issues that affect all critical systems.


How can we develop next iterations of the resilience map that dig into specific sectors like energy and power?

Speaker

Fiona Alexander


Explanation

This suggests expanding the mapping exercise to create sector-specific resilience maps that would provide more detailed analysis of interdependencies within critical infrastructure sectors.


How do we continue to increase and maintain resilience as the internet continues to grow and evolve?

Speaker

John Crain


Explanation

This addresses the ongoing challenge that resilience is not a one-time achievement but requires continuous adaptation and improvement as the internet ecosystem evolves.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Open Forum #20 WSis+20 High Level Event 2025 Ocp Special Briefing

Open Forum #20 WSis+20 High Level Event 2025 Ocp Special Briefing

Session at a glance

Summary

This discussion focused on the upcoming WSIS Plus 20 high-level event and the evolution of the World Summit on the Information Society (WSIS) forum over the past two decades. Gitanjali Sah from ITU opened the session by outlining the WSIS process, which began in 1998 and has grown to involve over 50 UN entities in a multi-stakeholder framework that includes the Internet Governance Forum (IGF). The WSIS action lines provide a comprehensive framework where different UN agencies implement specific areas based on their mandates, such as FAO handling e-agriculture and ITU managing ICT infrastructure and cybersecurity.


Ambassador Thomas Schneider from Switzerland emphasized the importance of translating dialogue into concrete decision-making and action, noting that while the WSIS structure has helped achieve many goals, there remains work to bridge the gap between discussion and implementation. South Africa’s representative highlighted their country’s commitment as the incoming chair of the high-level event, citing their active participation in internet governance processes and their focus on issues like AI, digital public infrastructure, and capacity building for small businesses through their G20 presidency.


Multiple UN agencies and stakeholders expressed their continued commitment to the WSIS process. UNDP’s Yu Ping Chan stressed the critical importance of capacity building, which remains the top request from governments they serve globally. UNESCO’s representative emphasized their role in facilitating action lines on access to information, e-learning, cultural diversity, and media ethics. The technical community, represented by ICANN, reaffirmed support for the multi-stakeholder model and urged recognition of the technical community as a distinct stakeholder group.


The discussion revealed broad consensus on the continued relevance of WSIS principles, with participants noting that the framework’s ambitious vision of a people-centered, inclusive information society remains more important than ever in addressing current digital challenges and opportunities.


Keypoints

## Major Discussion Points:


– **WSIS Plus 20 High-Level Event Planning and Logistics**: Extensive discussion of the upcoming World Summit on the Information Society (WSIS) Plus 20 high-level event scheduled for July 7-11 in Geneva, including venue details, registration processes, high-level participation (67 ministers confirmed), and the interactive agenda developed through multi-stakeholder consultations.


– **Multi-stakeholder Governance and Implementation Framework**: Emphasis on maintaining the multi-stakeholder DNA of the WSIS process, with various UN agencies, civil society, private sector, and technical community representatives discussing their roles in implementing the WSIS Action Lines and contributing to digital policy development.


– **Bridging Dialogue and Decision-Making**: A recurring theme about the need to translate multi-stakeholder discussions into concrete actions and real-world impact, moving beyond dialogue to actual implementation that affects communities and achieves sustainable development goals.


– **Integration with Global Digital Governance Frameworks**: Discussion of how WSIS connects with other major digital governance initiatives including the Global Digital Compact (GDC), Internet Governance Forum (IGF), AI for Good conference, and various national and regional digital policy frameworks.


– **Capacity Building and Digital Divide**: Focus on addressing digital inequalities through capacity building initiatives, particularly for developing countries, rural communities, and specific sectors like agriculture, with emphasis on meaningful connectivity and inclusive digital transformation.


## Overall Purpose:


The discussion served as a briefing and coordination session for stakeholders preparing for the WSIS Plus 20 high-level event. The primary goal was to update participants on event logistics, encourage broad participation, and align various stakeholder perspectives on the evolution and future direction of the WSIS process as it undergoes its 20-year review.


## Overall Tone:


The tone was consistently collaborative, professional, and forward-looking throughout the conversation. Speakers demonstrated mutual respect and appreciation for each other’s contributions to the WSIS process. There was an underlying sense of urgency about making the upcoming high-level event impactful, combined with pride in the achievements of the past 20 years. The discussion maintained an optimistic and constructive atmosphere, with stakeholders expressing commitment to continued cooperation and shared goals for digital inclusion and sustainable development.


Speakers

**Speakers from the provided list:**


– **Gitanjali Sah** – Session moderator/organizer from ITU, coordinating the WSIS plus 20 high-level event


– **Thomas Schneider** – Ambassador from Switzerland, representing the co-host country of the WSIS plus 20 high-level event


– **Representative of South Africa** – Cynthia, representing South Africa as chair-designate of the upcoming high-level event, with Minister Soli Malatsi as the designated chair


– **Yu Ping Chan** – Representative from UNDP, speaking on behalf of UN organizations co-convening the WSIS Forum


– **Tatevik Grigoryan** – Representative from UNESCO, co-host of the WSIS plus 20 high-level event


– **ICANN representative** – Veni, representing the technical community and ICANN


– **FAO representative** – Dejan, facilitator of WSIS action line on e-agriculture


– **MAG representative** – Bruna, ex-MAG member and co-facilitator of the MAG Working Group on Strategy


– **Anriette Esterhuysen** – Civil society representative from APC (Association for Progressive Communications)


– **WIPO representative** – Richard, representing the World Intellectual Property Organization


– **Inter Parliamentary Union representative** – Andy Richardson, representing parliamentarians in the WSIS process


– **ICC representative** – Meli, representing the International Chamber of Commerce and Business Action to Support the Information Society


**Additional speakers:**


None identified – all speakers mentioned in the transcript were included in the provided speakers names list.


Full session report

# WSIS Plus 20 High-Level Event: Comprehensive Stakeholder Discussion Report


## Executive Summary


This discussion focused on preparations for the World Summit on the Information Society (WSIS) Plus 20 high-level event, scheduled for 7-11 July in Geneva. The session, moderated by Gitanjali Sah from the International Telecommunication Union (ITU), brought together representatives from across the multi-stakeholder community to coordinate event preparations and reflect on two decades of WSIS implementation.


The discussion revealed strong consensus on the continued relevance of WSIS principles and the multi-stakeholder approach, while acknowledging significant challenges in translating dialogue into concrete decision-making and measurable outcomes. With 67 ministers and deputies confirmed to attend, the event represents substantial global recognition of WSIS’s importance, though participants identified critical gaps in measurement frameworks and institutional visibility within broader UN processes.


## Background and Context


### WSIS Evolution and Framework


Gitanjali Sah outlined the evolution of the WSIS process, which began with a proposal in 1998 at ITU’s plenipotentiary conference when Tunisia requested the framework. It has grown into a comprehensive multi-stakeholder framework involving over 50 UN entities. The WSIS action lines provide a structured approach where different UN agencies implement specific areas based on their mandates – for example, the Food and Agriculture Organization (FAO) handles e-agriculture while ITU manages ICT infrastructure and cybersecurity.


The framework has maintained its multi-stakeholder approach throughout its 20-year journey, incorporating the Internet Governance Forum (IGF) as an integral component. This architecture has facilitated inclusive dialogue across governments, civil society, private sector, technical community, and academia, though measuring quantitative impact remains challenging due to the absence of indicators and monitoring frameworks.


### High-Level Event Logistics and Participation


The WSIS Plus 20 high-level event has secured participation from 67 ministers and deputies confirmed across all regions. The event will take place at the Palexpo venue, with an interactive agenda developed through extensive multi-stakeholder consultations. Sah noted that one badge will provide access to both the WSIS event and the AI for Good conference taking place simultaneously.


Additional event features include 72 WSIS champions and 18 winners to be awarded, a youth special track, and a youth party planned for Monday at ITU premises. A hackathon on “hack against hunger” will also take place, though speakers noted the lack of incubators to support innovation beyond the event.


The representative of South Africa expressed honor at their country’s role as chair-designate, with Minister Soli Malatsi designated as chair. She emphasized South Africa’s long-standing commitment to the WSIS process since the 2003 Geneva Summit and highlighted their current leadership of the ITU Council Working Group on WSIS and SDGs.


## Key Stakeholder Perspectives


### Co-Host Country Commitment


Ambassador Thomas Schneider from Switzerland emphasized the critical importance of translating dialogue into concrete decision-making and action. He noted that while the WSIS structure has helped achieve many goals over the past two decades, the biggest gap currently facing the community is ensuring that multi-stakeholder dialogue actually translates into results and decision-making processes.


Switzerland’s commitment extends beyond hosting, with Schneider referencing their non-paper with proposals for building on existing WSIS architecture rather than creating entirely new structures.


### UN Agency Coordination and Implementation


The discussion highlighted extensive coordination among UN agencies through the UN Group on Information Society. Yu Ping Chan from the United Nations Development Programme (UNDP) provided field perspective, noting that capacity building remains the top request from the 170 country offices they serve globally, reflecting the enduring relevance of original WSIS principles.


UNESCO’s representative, Tatevik Grigoryan, emphasized their role in facilitating action lines on access to information, e-learning, cultural diversity, and media ethics. She advocated for principled frameworks rooted in WSIS values of human rights, openness, and accessibility.


The FAO representative, Dejan, provided context for the urgency of digital transformation, noting that 700 million people remain undernourished globally. FAO uses the WSIS process to address agri-food system transformation enabled by technology, highlighting the critical implications of effective digital governance.


### Technical Community and Private Sector Engagement


The ICANN representative reaffirmed strong support for the multi-stakeholder model while urging recognition of the technical community as a distinct stakeholder group. The representative noted that while the IGF was mentioned in the Global Digital Compact as the primary meeting space for Internet policy discussions, the WSIS Forum was omitted from the elements paper for the UN General Assembly review, prompting calls for coordinated stakeholder feedback.


The International Chamber of Commerce (ICC), represented by Meli, demonstrated long-standing private sector engagement since WSIS inception. ICC plans to organize specific sessions including a workshop on July 10th (3-3:45 PM) on “Global Adoption, Global Progress, Managing the Challenges of AI Inclusion” and a Knowledge Cafe on July 9th (12-2 PM) on strengthening multistakeholderism.


### Civil Society and Parliamentary Perspectives


Anriette Esterhuysen from the Association for Progressive Communications (APC) provided a civil society perspective, emphasizing that the WSIS Action Line Framework enables collaborative implementation at country level between governments and stakeholders. She characterized WSIS as more powerful than most other tech-related UN frameworks.


The Inter-Parliamentary Union representative, Andy Richardson, brought the perspective of elected representatives who must balance innovation with citizen protection, adding democratic accountability to technical and policy discussions.


## Major Agreements and Consensus Areas


### Multi-Stakeholder Participation as Core Principle


The discussion revealed unanimous agreement that multi-stakeholder participation represents the core DNA of both WSIS and IGF processes. All speakers consistently emphasized that this inclusive approach has been successfully maintained throughout WSIS evolution, enabling collaborative implementation across different stakeholder groups.


### Complementary Nature of WSIS and IGF Platforms


Speakers demonstrated clear agreement that WSIS Forum and IGF serve complementary rather than competing roles in global digital governance. This complementary relationship is being operationalized through two IGF-focused panels planned for 8 July at the high-level event, addressing both mandate renewal and the next 20 years of IGF development.


### Implementation and Capacity Building Priorities


Multiple speakers emphasized that capacity building and practical implementation represent fundamental needs requiring urgent attention. The UNDP representative’s observation that capacity building is the top request from governments globally resonated across different stakeholder groups, with each providing concrete examples of implementation challenges and solutions.


## Challenges and Areas of Concern


### Dialogue to Decision-Making Gap


The most significant challenge identified was the persistent gap between multi-stakeholder dialogue and actual decision-making by governments and institutions. Ambassador Schneider’s articulation of this challenge as the biggest current gap resonated across multiple subsequent interventions.


This challenge manifests in various ways: excellent discussions in forums that struggle to influence actual policy decisions, capacity building needs identified globally but inadequately addressed, and innovative solutions developed through initiatives like hackathons that lack incubation support to reach implementation.


### Measurement and Accountability Frameworks


Sah acknowledged that WSIS action lines lack indicators and monitoring frameworks, representing a fundamental weakness in the 20-year process. This absence of quantitative measurement capabilities means that while qualitative achievements can be celebrated, systematic assessment of progress and impact remains impossible.


### Institutional Recognition and Visibility


The omission of WSIS Forum from the elements paper for the UN General Assembly review highlighted ongoing challenges in ensuring proper recognition of multi-stakeholder processes within formal UN frameworks. This visibility gap could undermine WSIS influence in broader digital governance discussions.


## Future Directions and Action Items


### Immediate Preparations


All stakeholders were encouraged to submit comments and inputs to the UN General Assembly overall review through the online form available until 15 July. The ITU will work with the Office of the Secretary-General’s Envoy on Technology (ODET) on Global Digital Compact implementation roadmap, requiring a thousand-word document on current implementation to be submitted to the Commission on Science and Technology for Development annual session.


South African Minister Soli Malatsi will submit a chair summary of high-level event outcomes to the UN General Assembly review process.


### Long-term Strategic Development


The discussion identified several areas requiring sustained attention beyond the July event. Developing indicators and monitoring frameworks for WSIS action lines emerged as a priority for enabling quantitative measurement of achievements and impact assessment.


Strengthening the dialogue-to-decision-making pipeline requires systematic attention to how multi-stakeholder discussions translate into policy decisions and implementation. Building on existing WSIS architecture rather than creating entirely new structures offers a pragmatic approach to institutional evolution while maintaining proven multi-stakeholder frameworks.


## Conclusion


The discussion revealed a mature multi-stakeholder community with strong consensus on fundamental principles while honestly acknowledging significant implementation challenges. The upcoming WSIS Plus 20 high-level event represents both celebration of achievements and critical opportunity to address persistent gaps in measurement, decision-making translation, and institutional recognition.


The high level of participation confirmed for July, combined with the collaborative spirit demonstrated throughout this preparatory discussion, suggests a strong foundation for meaningful outcomes. However, success will ultimately be measured not by the quality of dialogue in Geneva but by the concrete actions and decisions that follow in countries and communities worldwide.


The WSIS Plus 20 milestone occurs at a crucial moment when digital governance challenges have never been more urgent or complex. The framework’s vision of a people-centered, inclusive information society remains relevant, but achieving this vision requires moving beyond dialogue to systematic implementation and measurable impact that stakeholders consistently identified as the next frontier for multi-stakeholder digital governance.


Session transcript

Gitanjali Sah: Good morning ladies and gentlemen, thank you for joining us today for this special session on the WSIS plus 20 high-level event and the evolution of the WSIS forum over the years. Since we have it’s a 9 a.m meeting, we would really appreciate if you can join us here so that we can be closer to each other. The audience if you would like us to join in the table that would be really nice so we can be closer together. Okay so basically I wanted to divide this into two parts to kind of update you about the WSIS plus 20 high-level event but also to look at the evolution in the context of the WSIS plus 20 review as well. So we have a very quick presentation which I will go through and then we’ll pass on the floor to our speakers who are actually also our stakeholders who contribute very actively to the WSIS forum and the WSIS process. So as all of you are familiar it’s a UN process WSIS. It started in the evolution started in 1998 in ITU’s plenipotentiary conference when Tunisia as a member state requested that there should be a framework like WSIS. We work with more than 50 UN entities currently and of course it’s a multi-stakeholder process. You can see IGF is part of the WSIS process and you can see the spirit here the multi-stakeholder participation and we are very proud that we could maintain that over the years. So the evolution is clear and I’ll leave this presentation for all of you. I’ll go through it very quickly. 1998 it was proposed, 2001 we took it to the UN, 2003 and 5 we had the two events the summits, 2003 came up with the framework of the WSIS action lines, 2005 was the Tunis agreement where IGF was also born. 2015 our mandate was renewed and then it was still 2025 and hence this is such a milestone year for all of us where we are reviewing the mandate. As you all know we are guided by the framework of the WSIS action lines. It’s a beautiful framework where all UN agencies based on their mandates work together. For example, Dejan from FAO implements the action line on e-agriculture with the multi-stakeholder community. ITU has the action line on ICT infrastructure, cyber security and so on so forth. The WSIS implementation wheel, as we call it, the action lines, the forums, stocktaking, stocktaking database is a huge database where all stakeholders have inputted their projects, really the grassroot projects, based on the action lines, the SDGs, and now we also have an alignment with the global digital compact objectives. Like we mentioned, it’s really multi-stakeholderism is in the DNA of the WSIS process and we’re proud that we’ve been able to maintain it. Now our achievements over the 20 years, one challenge that all of us face is that the WSIS action lines don’t have indicators and monitoring frameworks. So we really can’t measure and tell you that quantitatively this is what we’ve achieved in the WSIS action lines. However, if you look at the qualitative achievements, you can look at how a process like WSIS, a framework like WSIS has improved the lives of people all over the world. So WSIS essentially was about technology benefiting the people on the ground. So 5.5 billion people online. Looking at the Giga mapping, we see that 280,000 plus schools are connected with UNESCO. We figured out that 400 plus languages are accessible, and so on and so forth. So the stocktaking database, all of you must have a look at it. And if you’re looking for examples of implementation of WSIS on the ground, you definitely can use those examples in your presentations, in your case studies, and so on and so forth. It’s a very good repository. We also have WSIS photo contest winners every year out there, so you can use those. The United Nations Group on Information Society, all members of the CEB, the Chief Executive Board, are members of this group. We also have observer members, newcomers like Odette, who are very welcome to the United Nations Group on Information Society. It’s UN in action, and we have been working really well to implement the digital aspects of our work together. This is high-level event. As I look around the table, most of you are coming there. So we really look forward to welcoming you there. We’ve had several briefings for all of you. So the way the agenda and the program is built, it’s through an open consultative process. Most of you have been part of it. And the interactive agenda that you see right now is the result and the outcome of what we’ve done together. We had several consultative meetings, we analysed the inputs that we received, and then we put it together on the forum website. So as you’ll see in these graphs, the contributions to the WSIS Forum open consultation process, they are very, very multi-stakeholder. Also, we are very proud to say that some regions who were not that active in the process in the sense of contribution of inputs, for example, Latin America, it’s really increased over the years. So we are really happy that all regions and all stakeholders are benefiting and contributing towards the process. So I’ll skip all of this because the agenda is already online. This one is important. All the action line facilitators have actually got together and there’s a presentation online, you can find it on the WSIS Forum website, highlighted the achievements, challenges and opportunities of the WSIS action lines. It’s a beautiful, it’s really important work that people have done, where they’ve shown you the evolution of the action line, and these are the experts. So I think you should have a look at it, it’ll really help you with the work that you’re doing as well. So our chair designate is the Minister of South Africa, Excellency Soli Malatsi. Cynthia was supposed to be here representing him, but I think she’s on her way. And he will take over from Switzerland, who was the chair last year. The venue is Pal Expo, it’s very similar actually to this venue. It’s a huge space, and it’s very approachable, Geneva is a small place and it’s easy to travel in Geneva. I hope you’ve registered, especially the people who needed visas, because we’re working closely with the Swiss administration, who’s also helping us with the visas. So as you’re aware, the AI for Good conference is also taking place at the same time. So one badge will take you also to the AI for Good conference. Once you have it, you can also access it. Now in terms of high level participation, we are proud to say that we have 67 ministers confirmed right now, 67 ministers and deputies. This means that not only the G77 countries, EU, but all the regions, they really consider this process so important that they would like to be present in Geneva for it. We have more than 40 regulators coming, of course our UN partners that are very important, and 72 WSIS champions and 18 winners who will be awarded during the conference. high-level event. So I won’t go through the program, you all have seen it. We have a high-level one, we have workshops, we have several WSIS plus 20 consultations. These will happen during lunchtime, during the knowledge cafes as well. So please be there because we really want concrete outcomes. We have limited space at Palexpo, so we will have registration forms, do fill them up as soon as they are available online. We have a youth special track that we will be working on, and if you have youth delegations coming with you, and of course we are all young at heart, so we can all join the youth party that we will have at ITU Maubriant premises on Monday. So please join the youth track also on Monday, 7th of July to kind of get an impression of what the young people are expecting out of us. We have exhibition spaces, but since we are non-commercial, they are not very fancy about what people are doing on the ground. I’m going to skip all of this because, well, I do see many high-level track facilitators around, so I wanted to say that the high-level tracks are moderated by the high-level track facilitators, who are selected from, not selected actually, nominated by the different stakeholder types. So we look forward to, Cheryl is one of them, and I see Valeria, Anaret, so many of you around, thank you so much. I spoke about the, so the outcomes of the high-level event, very important this time because they will be fed into the UNGA overall review. So one would be through the chair summary, so the South African minister who’s going to submit the outcome of the high-level event to the UNGA overall review. Second is, of course, the ITU secretary-general’s WSIS plus 20 roadmap and report, which she will be submitting, and I do hope that all of you, while making your submissions to the UNGA overall review, review will consider the importance of WSIS Forum and IGF in terms of being multi-stakeholder you know platforms for deliberations on digital policy. We of course have seen the elements paper which was released and we were quite surprised to note that the WSIS Forum was not noted on it so we will provide our feedback but if all of you could we would like to encourage all of you also to submit your comments and inputs through the online form which is available until 15th of July. So I’ll stop here now because you know it’s quite I’ll make this available for you but just two points my colleagues from New York also wanted me to highlight is that ITU is also working with ODET in the GDC implementation roadmap. We are supposed to provide a thousand word document on how the GDC is being implemented currently so we encourage you to also submit to us these ideas so we could prepare this thousand word document and this will be sent to the CSTD annual session next year. So I’m gonna stop here and hand over the floor actually to Ambassador Schneider who’s the Switzerland is the co-host of the WSIS plus 20 high-level event they were also the co-chair they were also the chairs last year. Ambassador Schneider thank you for the wonderful evening last night over to you.


Thomas Schneider: Yes thank you Gitanjali and good morning everyone I hope you can hear me with your earphones. Yes we are happy and proud to be the co-host of also this year’s WSIS forum we are also very happy to work together with our friends from South Africa who are chairing the event this year. because we think that WSIS is a very important structure. We had almost 22 years ago where we agreed in Geneva on some principles how to turn this world into an inclusive, people-centred and development-oriented or the other way around, information society. Now we would call it digital society. We have agreed on an action plan and then in Tunis we have complemented whatever was not agreed in Geneva. And we do think that, and we have expressed this on many occasions this week, that this structure has helped us a lot to achieve some of the goals that we set, some of the targets that we set. There’s still some work to do in many others. We’ve had new challenges, new technical developments, new opportunities that this system has been able to take on. We are discussing here at the IGF not only about the same things that we were discussing 20 years ago. We are every year adapting our dialogue to the challenges and opportunities of the time. The same goes not just for the IGF here, it also goes for the WSIS. So we think that this architecture is not perfect, but we have tried to be as inclusive as we can, to allow as many voices to be heard as we can. And the IGF as well as the WSIS Forum are two important components that are complementary because they have a slightly different setting. They are complementary in our view and we are very happy that these two exist and think these are very important elements of the dialogue part. Of course, we all know that dialogue is only a necessary but not sufficient step in getting things done and actually making things happen. So I can again refer to among other inputs to the Swiss non-paper that we have circulated where we try to build on the existing architecture, make some concrete proposals that can be discussed that we hope are useful to actually fill the biggest gap that I think we currently have, which is to help make sure that the dialogue that we’re having is actually turning into result in decision-making for us so that the voices of the people are not just heard here or at the WSIS forum, but they actually heard when and taken into account when decisions are made. I think this is something we all need to work on and we are very happy to see that also this year there will be a big WSIS plus 20 and the AI for Good will be a big meeting but with lots of participants, but also a remarkable number of high-level participants so we also hope that this meeting will be used to get this dialogue to the awareness of high-level people from all stakeholders because this is what we I think need to focus on to make sure that these voices that we try to make heard that they are really have an impact in decisions that are taken, be it in intergovernmental institutions, also by private institutions. I think this is the biggest endeavor so we hope that this discussion here is useful to bring us one step closer to this goal. Thank you very much.


Gitanjali Sah: Thank you very much, Ambassador Schneider and thanks to Switzerland for their support for making this happen. We’re really looking forward to the high-level events 7th to 11th of July and as we look around the room I just mentioned that we know most of them are going to be there with us so thank you so much. I’ll move on to now the chair-designate, South Africa. Cynthia, the floor is yours.


Representative of South Africa: Thank you, Gitanjali and good morning to everyone. and it’s such an honour to be part of this session and to see many familiar faces that we have, I have actually interacted with and we are really looking forward as South Africa to be the chair of the upcoming high level event in Geneva which will then be chaired by our Honourable Minister Soli Malachi. And for South Africa really, we stand firmly and constantly a champion of the WSIS process since its inception from 2005 to, I mean from 2003 to 2005 and many South African delegation has, have actually actively participated in the 2003 Geneva Summit including the 2005 Tunisia Summit and this is a demonstration of the South African commitment to bridging the digital divide and shaping the future for internet governance. As South Africa, we have also played an important role in advancing the civil society and multi-stakeholder participation both in global internet governance process. Its leadership has been visible in both policy development and of course the norm-setting platform helping to ensure that voices of the global South, particularly African stakeholders, are represented in shaping the digital future. For instance, I would say that from a country point of view, we do have a, we all, we have also chaired, I think, through our clear and data, a multi-advisory group of the United Nation IGF and which is another clear recognition of South Africa’s commitment. to Inclusive Internet Governance. But in addition to that, South Africa, we have also, we have what we call the Internet Governance Forum, which is a multi-stakeholder platform that, which unites government, the civil society, the academia, the private sector, and most importantly, the youth. And we do not end there, South Africa, but we also recently have hosted a national IJF forum under the theme, Reviewing South Africa’s Internet Governance Program, progress in the context of WSIS plus 20. And, you know, for us, this was about highlighting alignment with the Global Digital Policy Framework. And of course, we’ve used the forum to access the diverse voices on what we have achieved, the challenges, and again, what lies ahead of us beyond 2020-25. And again, the other, I would say, a classic example of how we are committed to the WSIS Forum, it’s our role as the chair of cancer working group, ITU Cancer Working Group, WSIS and SDGs. And through that platform, again, as a chair, what we have done working together with the ITU, we’ve issued an ITU’s call for both governments and stakeholders to really share their experiences of how they have implemented the WSIS outcomes for over a period of 20 years, and what are the challenges, and what is it that they are envisioning going forward. So this is one of, what I would say, the highlights of showing, again, how South Africa is really taking this process serious. But we did not only end there, but through our G20 presidency, the country is also prioritizing a number of issues. that are actually key, and they are key not only for South Africa, but they are also the issues that are contained in the Global Digital Compact. Issues such as your AI, it’s one of the South African G20 Presidency focus areas, the issue of the digital public infrastructure, and these are some of the things. And also, in addition to the two issues that I’ve mentioned, there’s also the issue of capacity building for SMMEs. That is another element that the South African government is actually prioritizing through its G20 Presidency. And all of these things that I’ve mentioned, they are quite key in the global discussions, and again, in ensuring that we achieve the 2030 Sustainable Digital SDGs. But again, it is also important to also reflect on these issues as we look beyond 2025. Thank you.


Gitanjali Sah: Thank you, Cynthia, and we look forward to welcoming South Africa as the chair of the High Level Event. You’re already the chair of the Council Working Group on Business and SDGs. Thank you so much. We have to be mindful of time. There are 23 minutes left. We can see the timer there. I’ll invite all the stakeholders who wanted to also express themselves. I’ll start with our co-organizers. Yu Ping from UNDP. Yuping, the floor is yours.


Yu Ping Chan: Thank you so much, Gitanjali. And just wanted to say on behalf of the other UN organizations to our co-conveners of the WSIS Forum, UNCTAD, UNESCO, and UNDP, together working closely, of course, with ITU, we really look forward to having you as part of the process, as part of the conversation, because we all know this is a particularly important year. I just wanted to put a plus one and a super plus 1,000, actually, on the points that have been raised on this idea of the translation and delivery of conversations into decision-making and then action. For UNDP, with our 170 country offices around the world, our support to over 120 governments in the area of leveraging digital and AI to achieve the SDGs, this is particularly important. It’s about the impact that we make directly to communities and people that we serve around the world that will make the difference in terms of how we translate digital discussions at the global level into real impact on lives. and economies and communities and so that idea that has already been reiterated by Cynthia from South Africa talking about the importance of capacity building is particularly profound. So for instance for UNDP the number one ask from the national governments and communities that we serve is capacity building and that’s really important and that is actually a principle that has existed and endured from the very beginning of WSIS itself. So this is I think a pertinent example of what Ambassador Schneider says that you know the principles that underlying WSIS are even more relevant today than ever before. I also want to say that’s how UNDP characterizes our participation in WSIS around the action line capacity building that we facilitate. So for instance just last week in Rome we launched the AI help for sustainable development with the Italians that was a product of the G7 presidency that is really aiming to strengthen local AI ecosystems in Africa. Just two weeks ago at the Hamburg sustainability conference we worked very closely with our colleagues from the German government the BMZ the GIZ to launch the Hamburg declaration on responsible AI for the SDGs. This is the first ever completely multi-stakeholder document on this important issue and we now have almost 50 signatories from across the entire multi-stakeholder community some of the major names in the area of AI. I will ask my German colleagues to actually put the link to the chat so that perhaps some of the stakeholders here in the IGF community would be also interested in being an endorser of the Hamburg declaration as well. So all of this I think is precisely that connection that we’re talking about. The connection between a multi-stakeholder conversation to decision-making by policymakers and collectively by the entire multi-stakeholder community then translated into real action on the ground for people everywhere that we serve. So I think I just want to reiterate this importance of this continuing connection between New York, Geneva, South Africa, G20, Hamburg and all these other places in which we’re collectively taking action. Thank you so much.


Gitanjali Sah: Thank you very much, Yuping Chan. I do not see UNESCO in the room.


Tatevik Grigoryan: Thank you very much. I’ll read it to make it quick. So thank you again. Thank you and colleagues and everyone here present. So over the past two decades, the Internet has undergone a remarkable transformation and the vision laid out in WSIS has materialized in ways both inspiring and complex. And we’ve witnessed how the emerging technologies revolutionized our lives both positively and also posing serious threats such as disinformation, misinformation and other harmful content. And this is why UNESCO has continuously advocated for the use of the recognized and principled frameworks such as ROMEX, many of you know it, rooted in the same foundational values as WSIS, human rights, openness, accessibility and multi-stakeholder participation. ROMEX provides a robust tool to assess and guide the development of inclusive rights-based digital environment. We’re confident that the outcomes of the IGF will serve as a strong foundation for the upcoming WSIS plus 20 high-level event which UNESCO is proud to co-host again alongside ITU and Switzerland, the UNDP and UNCTAD. I would like to extend our heartfelt thanks to all WSIS stakeholders who actively contributed to shaping this year’s IGF program through the open consultation process. I would also like to recognize the continued investment of the members of the UN Group on Information Society, which UNESCO had the honor to chair during the last year. This group constitutes the UN level of fundamental backbone to implementation of the WSIS outcomes, ensuring coordination, partnership and complementarity across agencies and programs. Finally and most importantly I’d like to warmly invite you to participate in the discussions around the WSIS action lines, which UNESCO is the facilitator. The action lines are on access to information, e-learning and science, cultural diversity and multilingualism, media, ethics of information society. These action lines are not just thematic areas, they are pillars of digital society that is inclusive, ethical and sustainable. We really do look forward to your contributions in these discussions and look forward to the outcomes of the forum for a renewed… focused action-oriented WSIS 2.0 or plus, accelerating our collective efforts towards reaching the international agreed development goals. Thank you.


Gitanjali Sah: Thank you, Tatevik. You know UNESCO is a very close partner of the UN in the WSIS process and at the ITU actually we have expanded WSIS into information and knowledge societies ensuring that all the work of UNESCO is also discussed when we talk about the WSIS process. So it’s not only about provision of ICT infrastructure but also converting it into knowledge. Thank you so much. I’d now like to hand over the floor to Veni, representing the technical community ICANN. He has a conflicting schedule, so Veni, over to you.


ICANN representative: Thank you. And thank you for organising this session and talking about UNESCO and ITU, ICANN is partnering with both organisations. We just signed an MOU with UNESCO and we have long-term relationships with the ITU in a very positive way. Most recently we had briefings for UN diplomats in Geneva and in New York where we had our president and CEO Curtis Lindquist speaking with Doreen Bogdan-Martin in Geneva and we were co-hosted by Cintia by South Africa and Finland in New York. So we are really having a very good cooperation and we use the opportunity here to meet with people from both organisations. We had a meeting with the Assistant Director General yesterday and we are talking about doing more briefings in the WSIS plus 20 process. Also I took a note from your appeal to stakeholders, Gitanjali, to put in the comments to the elements paper to note that the WSIS plus 20, sorry the WSIS The ITU WSIS Forum is not mentioned and this is an omission obviously, I hope it will be corrected in the zero draft. We had a meeting with the co-facilitators yesterday and we want to reiterate that the WSIS Forum, where we will have a delegation headed by the ICANN President and the leadership of the ICANN Board will be participating as well in 10 days in Geneva. We want to convey the same messages everywhere, which is basically the IGF is a great venue. It’s not a coincidence that it was mentioned last year in the Global Digital Compact as the primary meeting space for discussing Internet related policy issues, questions. And that the technical community is a separate stakeholder which also should be recognized and reaffirmed. And also that the multi-stakeholder model of Internet governance is the one that actually managed to bring all this economy, accessibility, etc. Things that were made possible because of the Internet. So we are hopeful that the Member States of the United Nations will use this opportunity in the WSIS Plus 20 process to update the WSIS Plus 10 outcome document and to use the good language from the Global Digital Compact. We are very thankful to the ITU for organizing this event. We are partnering with you as you know in the WSIS Forum. I was impressed personally by the numbers that you showed in the presentation about how many high-level officials. And I’m sure, I’m not putting any pressure or stress on South Africa, but I’m sure that the chairmanship will be really a successful one. Because obviously you are chairing the Council Working Group on WSIS and SDGs, but also because South Africa has a long time been showing interest in this. area and is one of the countries that is leading the the whole discussions in a very positive way so thanks again for organizing this and looking forward to the event in 10 days in Geneva.


Gitanjali Sah: Thank you very much Veni and you know while discussing with the stalwarts of the WSIS process who actually created it we were asking them that you know what should be the key components going forward and the first thing they said is that this community which is so motivated to make a difference should maintain the ambition like we were very ambitious they said we were very ambitious back then in 1998 and they were because the whole framework of the WSIS action line the concepts in the you know the Geneva Declaration the Tunis agenda they are so relevant even today so we must ensure that we are ambitious we have the momentum of the stakeholder community and that we are making a difference in the right places. Thank you so much. I’ll move on to Dejan who is the facilitator of WSIS action line on e-agriculture. Dejan over to you.


FAO representative: Thank you and good morning to all participants on behalf of food and agriculture organizations the FAO of the UN. So if we look at the reasons why we find WSIS relevant also IGF in a way we still have about 700 million people under nourished so it’s about 1 in 11 even if you look at this room I’m sure everybody will get sense of urgency why we need to do something and and what do we do we we do need to transform agri-food systems and very urgently and one of the key enablers and accelerators is technology and if we look at the key elements that technology offers us for example we know we need connectivity and and here we always discuss meaningful connectivity we also need capacity building but we also need fintech Hey, hi, and there is a long list of opportunities, let’s say technological opportunities we have. And if we pick, for example, just the connectivity side, what we are seeing is that even now, even more than before, rural communities or farmers not connected are completely out of the markets and any possible service we can imagine today. So, when we look holistically into all these elements, we can also see that the digital capabilities, they don’t understand really the opportunities but also challenges. They don’t really understand IGF or WSIS or UNDP or UNESCO or any other players around us. So, what does it take to bring them all together? And we find that WSIS process helped us, I think it’s since 2002 even, to bring this multi-stakeholder forum together for us to discuss and see how to move forward with enabling these elements. We do not see any sort of a top-down or centralized approach working. We very much hope that all the some of the elements that we can hopefully orchestrate together will bring us forward and accelerate solutions needed. So, I’m really grateful for the consultation process. I think we can re-energize WSIS and we are looking forward to be part of this process. So, I thank you.


Gitanjali Sah: Thank you very much, Dejan. With FAO, we’ve also been doing innovative things like we did a hackathon on hack against hunger. And such innovative solutions came out from the ground and from young engineers all over the world, young students of policy. It was really an innovation and we should try to do this more often. But from that perspective, we noticed that there is a lack of incubators. So, once this innovation comes out, we really were struggling, Dayan, to kind of give these young people who have developed these applications some sort of guidance. And when we look at the private sector, I see ICC and USCIB, we definitely need your help in that direction as well to incubate these young talents. I’ll now pass on to Bruna. Bruna is the ex-MAG member. Your views, please, Bruna. Over to you.


MAG representative: Thanks Gitanjali, and also sharing the co-facilitation of the MAG Working Group on Strategy with Chris, Amrita and many others on this, so happy to be here representing the group. Just to also be brief and mention that on the 8th of July, the agenda of the High Level Event will have two panels about the IGF, as we do see it as a core part, right, not just of the plus 20 review, but ensuring that the IGF mandate is not just improved, but is kept as something that’s more stable for the near future. So the first session will be hosted by the IGF Secretariat, that’s called Building Digital Governance Together, will focus solely on the Norway outcomes, and the second one will also be, it’s the one that the Working Group Strategy is organizing, and it’s called Celebrating 20 Years of Multi-Stakeholder Engagement with this forum, IGF, and the road ahead. And for this second panel, we really want to have as open as possible discussion on what the next 20 years of the Internet Governance Forum will look like, not just about the mandate renewal, but also making sure it remains a clearinghouse with its efficient early warning systems and so on. And we, the Working Group Strategy also wants to make sure we have some youth voices joining the conversation above all. So everyone is invited to join, please join us there, it’s on the 8th of July, and it starts at 15.15, and really looking forward to having this open discussion as we do want to take it over from the very beginning and the early days of WSIS until what came to be the IGF, and why this is such a relevant space, and why we should keep pushing for multi-stakeholder participation. So I think I’ll stop here for the sake of time. Thanks, Gitanjali.


Gitanjali Sah: Thank you so much, Bruna, we look forward to continuing this partnership. Of course, all of this is not possible without the civil society, and yet APC has been such a strong voice of implementing and also bringing the voices of the people from the ground into the process. Over to you.


Anriette Esterhuysen: Thanks very much Gitanjali. I’m speaking as someone from civil society. I really urge civil society to participate in the WSIS Forum. I think we’ve had so far three days of a very impactful IGF and I think the message of the importance of renewing the IGF has, I think, been brought across substantially. But I also want to urge the value of the WSIS Forum. What the WSIS Action Line Framework gives all of us, but also gives civil society, is a framework that enables you to work collaboratively on implementation at country level. Collaborate with governments, collaborate with other stakeholders. It also gives civil society a framework and I think, as Gitanjali and Yuping have said, it’s a very ambitious framework. I think the vision of a people-centered, inclusive information society that’s human rights oriented, it’s ambitious, it’s important and I think it gives us something that, in my view, is more powerful than what most other tech-related UN frameworks gives us. So come to the WSIS Forum. It’s an opportunity you will meet regulators, you’ll meet ministries of communications and you’ll meet people that are actually building infrastructure on the ground, that are developing capacity building programs. So it’s extremely complementary with the IGF where we talk so much and intensively about governance challenges. At the WSIS Forum we talk about policy and governments, but we also talk about implementation in a very concrete way and it’s vital, I think, for civil society to be part of that process as well. Back to you, Gitanjali. Thank you.


Gitanjali Sah: Richard from WIPO. WIPO has been a very active participant also in the WSIS process. Richard, over to you.


WIPO respresentative: Thank you very much, Gitanjali, and a very good morning to everyone. Just for a bit of maybe context, just to say that when thinking about intellectual property, of course, the legal framework is is important, but other aspects are equally important that shape that conducive IP system. This includes the infrastructure that helps the innovators and creators more easily protect and manage their IP, and this is about collaboration with academia and industry, this is accessing financing by start-ups and SMEs, and this is of course making sure that everyone everywhere can benefit from the IP system. WIPO serves of course the innovators and creators from across the world in all of these areas, and many, many of our initiatives are contributing to the VCs Action Lines. We’ve submitted of course the VCs, our report for VCs plus 20, and I had three examples I wanted to give you, but because I’m very aware of the ticking clock, I’ll just give you one, but happy to expand on those during the VCs forum. So the one I just wanted to mention is that we’re supporting the ICT applications and IP institutions, so this is about making sure that that infrastructure, that digital infrastructure is available to everyone. So we help national regional IP offices in every corner of the world to enhance the efficiency of their IP registration, and that they can adopt their own digital transformation strategies. This includes among others improving their online services, including search and registry filing systems, and the integration to the regional and international IP systems so that they can more easily exchange data and documents. And since it was launched, already 90 IP institutions from across the world are using one of the modules from our WIPO IP office suite. This is just an example of the many, many things that we are doing that contribute to the VCs Action Lines. Being here in IGF, of course listening to all the many discussions also on AI, let me also mention our WIPO conversation, which is our discussion on the impact of all the frontier technologies on all the IP rights, and we also of course want to bridge the information gap through this forum. Past sessions focused on GNI or data and how those impact intellectual property. So of course we’ll be also speaking about these things further down the road. Seeing that clock, let me say that just as we have done over the past 20 years, WIPO stands ready to support VCs through dialogue as well as through practical outcomes that lead to real world impact. We’ll see you of course in July in Geneva in Palaixco. Like all the past years, we’ll be there contributing to a range of activities together with all our great partners also at this table.


Gitanjali Sah: Thank you, our neighbour from Geneva. They’re just opposite ITU in Geneva. Thank you. If I could please request the producer, the next session is also ours. So if we could please have five minutes. Oh no, we can’t. Okay. So Andy, I missed out the parliamentarians in the high levels who are going to be there with us. We have several parliamentarians joining us. Andy, if you could please.


Inter Parlamentary Union representative: Thank you. So Andy Richardson from the Inter-Parliamentary Union. And yes, thank you for this opportunity for parliaments to contribute to this plus 20 event, which comes as a great compliment to the strong parliamentary track here at IGF. This week, Ambassador Schneider referred to dialogue and decision making, and I think this is why it’s so important to have parliamentarians at the table in addition to the core functions of adopting legislation, carrying out oversight, allocating budgets. Really what parliaments try to do is to balance a range of interests, both supporting innovation and protecting citizens, protecting rights. And they bring a strong perspective on how the information society affects the people that they represent. So we’re happy to work with you. take part in this high-level dialogue with the Secretaries General of the ITU and the IPU and a number of parliamentarians. Thank you.


Gitanjali Sah: Thank you, Andy. And we are closing with Meli.


ICC representative: Okay, this is on. So, just to quickly say, as ICC, we have been participating and engaging with the WSIS process since really the get-go. We are still very much engaged into the process and we will make sure to be present in all instances, including the WSIS Plus 20 high-level event coming up very soon. So, I just wanted to quickly flag that we will have a number of sessions that we are organizing. So, there is an ICC basis workshop. This is the Business Action to Support the Information Society that has been the group of our membership involved with the WSIS process. So, it will be on the 10th of July from 3 to 3.45 on Global Adoption, Global Progress, Managing the Challenges of AI Inclusion. Again, pointing to the fact of the importance of the, let’s say, the neutrality of the WSIS Action Lines and how they can really apply in various challenges, including AI. So, we will be talking a little bit about that. And then, of course, we are also organizing jointly with the United States Council of International Business and Knowledge Cafe that is taking place on the 9th of July from 12 to 2 p.m. that will address the imperative of strengthening multistakeholderism. So, really looking forward to seeing you there in person in a few weeks’ time, a few days’ time rather. Thank you.


Gitanjali Sah: Thank you, Many. Thank you to all of you. The next session starts and it’s going to be ours as well. So, stay back. And thank you to the production team for giving us some time. Thank you very much.


G

Gitanjali Sah

Speech speed

148 words per minute

Speech length

2524 words

Speech time

1018 seconds

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout

Explanation

The WSIS process began in 1998 when Tunisia requested a framework at ITU’s plenipotentiary conference, evolved through UN adoption in 2001, summits in 2003 and 2005, mandate renewal in 2015, and now reaches the milestone year 2025 for review. Throughout this evolution, the multi-stakeholder participation has been maintained as part of WSIS’s DNA.


Evidence

Timeline: 1998 proposed, 2001 taken to UN, 2003-2005 summits, 2015 mandate renewal, 2025 review milestone; works with 50+ UN entities; IGF is part of WSIS process


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


Agreed with

– Thomas Schneider
– ICANN representative
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions

Explanation

The high-level participation includes 67 confirmed ministers and deputies from not only G77 countries and EU, but from all regions globally. This demonstrates that all regions consider the WSIS process so important that they want to be present in Geneva for the event.


Evidence

67 ministers and deputies confirmed, more than 40 regulators coming, participation from G77, EU and all regions


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


UN Group on Information Society with 50+ UN entities demonstrates coordinated approach to WSIS implementation

Explanation

The UN Group on Information Society includes all members of the Chief Executive Board and observer members, representing coordinated UN action. This group works together to implement digital aspects of their work, showing a unified approach to WSIS implementation across the UN system.


Evidence

Works with more than 50 UN entities, all CEB members are part of the group, observer members like newcomers are welcome


Major discussion point

Organizational Partnerships and Coordination


Topics

Development | Legal and regulatory


T

Thomas Schneider

Speech speed

151 words per minute

Speech length

594 words

Speech time

235 seconds

Switzerland proud to co-host event and work with South Africa, emphasizing WSIS structure’s importance in achieving digital society goals

Explanation

Switzerland is happy to co-host the WSIS forum and work with South Africa as the chair. They believe WSIS is an important structure that helped achieve goals set 22 years ago in Geneva for creating an inclusive, people-centered, development-oriented information society.


Evidence

22 years ago agreed in Geneva on principles for inclusive, people-centered, development-oriented information society; structure helped achieve some targets set


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results

Explanation

The WSIS architecture has tried to be as inclusive as possible, allowing many voices to be heard through complementary platforms like IGF and WSIS Forum. However, there’s a gap between dialogue and actual decision-making, as dialogue is only a necessary but not sufficient step in getting things done and making things happen.


Evidence

IGF and WSIS Forum are complementary with different settings; Swiss non-paper circulated with concrete proposals; need to ensure voices are heard when decisions are made by intergovernmental and private institutions


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


Disagreed with

– Yu Ping Chan

Disagreed on

Dialogue versus implementation gap


WSIS Forum and IGF are complementary platforms with different settings, both important for comprehensive digital governance dialogue

Explanation

Both the IGF and WSIS Forum are important components that complement each other because they have slightly different settings. Together they provide comprehensive coverage for digital governance dialogue, adapting each year to address current challenges and opportunities.


Evidence

IGF and WSIS discuss not just same things as 20 years ago but adapt dialogue to current challenges; both platforms allow different voices to be heard


Major discussion point

IGF Integration and Future Vision


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– ICANN representative
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


R

Representative of South Africa

Speech speed

121 words per minute

Speech length

645 words

Speech time

318 seconds

South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit

Explanation

South Africa is honored to chair the upcoming high-level event through Minister Soli Malachi and has been a champion of the WSIS process since its inception. South African delegations have actively participated in both the 2003 Geneva Summit and 2005 Tunisia Summit, demonstrating commitment to bridging the digital divide and shaping internet governance.


Evidence

Active participation in 2003 Geneva Summit and 2005 Tunisia Summit; leadership in advancing civil society and multi-stakeholder participation; chaired multi-advisory group of UN IGF


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


South Africa chairs ITU Council Working Group on WSIS and SDGs, showing commitment through multiple leadership roles

Explanation

South Africa demonstrates its commitment to the WSIS process through multiple leadership roles, including chairing the ITU Council Working Group on WSIS and SDGs. Through this platform, they have issued calls for governments and stakeholders to share experiences of WSIS implementation over 20 years.


Evidence

Chair of ITU Council Working Group on WSIS and SDGs; issued ITU call for sharing experiences of WSIS implementation over 20 years; G20 presidency prioritizing AI, digital public infrastructure, and SMME capacity building


Major discussion point

Organizational Partnerships and Coordination


Topics

Development | Legal and regulatory


Agreed with

– Yu Ping Chan
– FAO representative
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


Y

Yu Ping Chan

Speech speed

192 words per minute

Speech length

522 words

Speech time

162 seconds

UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation

Explanation

UNDP, with 170 country offices worldwide and support to over 120 governments in leveraging digital and AI for SDGs, identifies capacity building as the number one request from national governments and communities. This reflects the enduring relevance of WSIS principles, particularly around capacity building which has existed since WSIS’s beginning.


Evidence

170 country offices around the world; support to over 120 governments in digital and AI for SDGs; launched AI help for sustainable development with Italy; Hamburg declaration on responsible AI for SDGs with almost 50 signatories


Major discussion point

Implementation and Capacity Building Focus


Topics

Development | Capacity development


Agreed with

– Representative of South Africa
– FAO representative
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


Disagreed with

– Thomas Schneider

Disagreed on

Dialogue versus implementation gap


T

Tatevik Grigoryan

Speech speed

124 words per minute

Speech length

356 words

Speech time

171 seconds

UNESCO advocates for principled frameworks like ROMEX rooted in WSIS values of human rights, openness, and accessibility

Explanation

UNESCO has continuously advocated for recognized and principled frameworks such as ROMEX, which is rooted in the same foundational values as WSIS including human rights, openness, accessibility and multi-stakeholder participation. ROMEX provides a robust tool to assess and guide the development of inclusive rights-based digital environments.


Evidence

ROMEX framework rooted in human rights, openness, accessibility and multi-stakeholder participation; provides tool to assess and guide inclusive rights-based digital environment development


Major discussion point

Implementation and Capacity Building Focus


Topics

Human rights | Development


I

ICANN representative

Speech speed

146 words per minute

Speech length

489 words

Speech time

200 seconds

Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility

Explanation

The technical community and multi-stakeholder model of Internet governance is what actually managed to bring about the current digital economy, accessibility, and other benefits made possible by the Internet. ICANN wants to convey that this model should be recognized and reaffirmed as the successful approach.


Evidence

Multi-stakeholder model brought digital economy and accessibility; ICANN partnerships with UNESCO (new MOU) and ITU; briefings for UN diplomats in Geneva and New York


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Infrastructure | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20

Explanation

The IGF was mentioned in the Global Digital Compact as the primary meeting space for discussing Internet-related policy issues and questions. ICANN hopes that UN Member States will use the WSIS Plus 20 process to update the WSIS Plus 10 outcome document and incorporate good language from the Global Digital Compact.


Evidence

IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions; WSIS Forum not mentioned in elements paper which is an omission that should be corrected


Major discussion point

IGF Integration and Future Vision


Topics

Legal and regulatory | Infrastructure


Agreed with

– Gitanjali Sah
– Thomas Schneider
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


F

FAO representative

Speech speed

130 words per minute

Speech length

349 words

Speech time

160 seconds

FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology

Explanation

With 700 million people still undernourished (1 in 11), there’s an urgent need to transform agri-food systems, and technology is a key enabler and accelerator. FAO finds the WSIS process helps bring together multi-stakeholder forums to discuss how to move forward with enabling elements like connectivity, capacity building, and fintech for rural communities and farmers.


Evidence

700 million people undernourished (1 in 11); rural communities not connected are completely out of markets and services; WSIS process since 2002 brings multi-stakeholder forum together


Major discussion point

Implementation and Capacity Building Focus


Topics

Development | Economic


Agreed with

– Yu Ping Chan
– Representative of South Africa
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


M

MAG representative

Speech speed

156 words per minute

Speech length

312 words

Speech time

119 seconds

Two IGF-focused panels planned for July 8th high-level event to discuss mandate renewal and next 20 years vision

Explanation

The high-level event will feature two panels about IGF on July 8th – one hosted by IGF Secretariat focusing on Norway outcomes, and another organized by the Working Group Strategy celebrating 20 years of multi-stakeholder engagement and discussing the road ahead. The goal is to have open discussion about the next 20 years of IGF, including mandate renewal and maintaining its role as a clearinghouse.


Evidence

Two panels on July 8th: IGF Secretariat panel on Norway outcomes, and Working Group Strategy panel starting at 15:15; focus on next 20 years vision and mandate renewal


Major discussion point

IGF Integration and Future Vision


Topics

Legal and regulatory | Development


Agreed with

– Gitanjali Sah
– Thomas Schneider
– ICANN representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


A

Anriette Esterhuysen

Speech speed

139 words per minute

Speech length

260 words

Speech time

111 seconds

Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders

Explanation

The WSIS Action Line Framework gives civil society a framework to work collaboratively on implementation at country level with governments and other stakeholders. It provides an ambitious framework with a vision of people-centered, inclusive, human rights-oriented information society that is more powerful than most other tech-related UN frameworks.


Evidence

WSIS Forum allows meeting with regulators, ministries of communications, and people building infrastructure; opportunity to discuss policy, government, and concrete implementation; vision of people-centered, inclusive, human rights-oriented information society


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Human rights | Development


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


W

WIPO respresentative

Speech speed

165 words per minute

Speech length

471 words

Speech time

171 seconds

WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services

Explanation

WIPO helps national and regional IP offices worldwide enhance efficiency of IP registration and adopt digital transformation strategies. This includes improving online services, search and registry filing systems, and integration to regional and international IP systems for easier data and document exchange.


Evidence

90 IP institutions from across the world using WIPO IP office suite modules; support for online services, search and registry filing systems, integration to regional and international IP systems


Major discussion point

Implementation and Capacity Building Focus


Topics

Legal and regulatory | Infrastructure


Agreed with

– Yu Ping Chan
– Representative of South Africa
– FAO representative

Agreed on

Implementation and capacity building are critical priorities


I

Inter Parlamentary Union representative

Speech speed

134 words per minute

Speech length

146 words

Speech time

65 seconds

Parliamentarians bring perspective on how information society affects constituents and balance innovation with citizen protection

Explanation

Parliamentarians contribute to the dialogue-to-decision-making process through their core functions of adopting legislation, oversight, and budget allocation. They try to balance a range of interests, supporting innovation while protecting citizens and rights, bringing perspective on how the information society affects the people they represent.


Evidence

Core functions include adopting legislation, carrying out oversight, allocating budgets; high-level dialogue with ITU and IPU Secretaries General and parliamentarians


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Legal and regulatory | Human rights


I

ICC representative

Speech speed

187 words per minute

Speech length

233 words

Speech time

74 seconds

ICC has engaged with WSIS since inception and will organize sessions on AI inclusion and strengthening multi-stakeholderism

Explanation

ICC has been participating and engaging with the WSIS process since the beginning and continues to be actively involved. They will organize sessions including an ICC BASIS workshop on Global Adoption and Managing AI Inclusion Challenges, and a Knowledge Cafe on strengthening multi-stakeholderism.


Evidence

ICC BASIS workshop on July 10th on Global Adoption, Global Progress, Managing AI Inclusion Challenges; Knowledge Cafe on July 9th addressing strengthening multi-stakeholderism; Business Action to Support Information Society group involvement


Major discussion point

Organizational Partnerships and Coordination


Topics

Economic | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


Agreements

Agreement points

Multi-stakeholder participation is fundamental to WSIS and IGF processes

Speakers

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Arguments

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout


WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


ICC has engaged with WSIS since inception and will organize sessions on AI inclusion and strengthening multi-stakeholderism


Summary

All speakers consistently emphasized that multi-stakeholder participation is core to the WSIS DNA and has been successfully maintained throughout its evolution, enabling inclusive dialogue and collaborative implementation across different stakeholder groups.


Topics

Development | Legal and regulatory


WSIS and IGF are complementary platforms that work together effectively

Speakers

– Gitanjali Sah
– Thomas Schneider
– ICANN representative
– MAG representative

Arguments

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout


WSIS Forum and IGF are complementary platforms with different settings, both important for comprehensive digital governance dialogue


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20


Two IGF-focused panels planned for July 8th high-level event to discuss mandate renewal and next 20 years vision


Summary

Speakers agreed that WSIS Forum and IGF serve complementary roles with different settings, both being essential for comprehensive digital governance dialogue and policy discussions.


Topics

Legal and regulatory | Development


Implementation and capacity building are critical priorities

Speakers

– Yu Ping Chan
– Representative of South Africa
– FAO representative
– WIPO respresentative

Arguments

UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


South Africa chairs ITU Council Working Group on WSIS and SDGs, showing commitment through multiple leadership roles


FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology


WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services


Summary

Multiple speakers emphasized that capacity building and practical implementation are fundamental needs, with concrete examples of how their organizations are addressing these priorities through the WSIS framework.


Topics

Development | Capacity development


Similar viewpoints

All three speakers emphasized the critical need to move beyond dialogue to actual implementation and decision-making, with concrete action and results being essential for meaningful impact.

Speakers

– Thomas Schneider
– Yu Ping Chan
– Anriette Esterhuysen

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Topics

Development | Legal and regulatory


These speakers shared pride in the global recognition and success of the WSIS process, highlighting high-level participation and long-term commitment as evidence of its effectiveness.

Speakers

– Gitanjali Sah
– Representative of South Africa
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Topics

Development | Legal and regulatory


Unexpected consensus

Human rights and ethical frameworks integration

Speakers

– Tatevik Grigoryan
– Anriette Esterhuysen
– Inter Parlamentary Union representative

Arguments

UNESCO advocates for principled frameworks like ROMEX rooted in WSIS values of human rights, openness, and accessibility


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Parliamentarians bring perspective on how information society affects constituents and balance innovation with citizen protection


Explanation

Unexpectedly, speakers from different sectors (UN agency, civil society, and parliamentary) all emphasized human rights and ethical considerations as central to digital governance, showing convergence on values-based approaches across institutional boundaries.


Topics

Human rights | Development


Technical and policy integration necessity

Speakers

– ICANN representative
– WIPO respresentative
– FAO representative

Arguments

Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services


FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology


Explanation

Technical organizations (ICANN, WIPO) and a development-focused agency (FAO) unexpectedly showed strong consensus on the need for integrated approaches that combine technical infrastructure with policy frameworks to address real-world challenges.


Topics

Infrastructure | Development


Overall assessment

Summary

The discussion revealed strong consensus on multi-stakeholder participation as fundamental, the complementary nature of WSIS and IGF platforms, the critical importance of implementation and capacity building, and surprisingly, the integration of human rights and ethical frameworks across different sectors.


Consensus level

High level of consensus with significant implications for WSIS Plus 20 – the unified support across all stakeholder groups provides a strong foundation for mandate renewal and continued multi-stakeholder governance, while the emphasis on moving from dialogue to implementation suggests a maturation of the process toward more action-oriented outcomes.


Differences

Different viewpoints

Dialogue versus implementation gap

Speakers

– Thomas Schneider
– Yu Ping Chan

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Summary

Schneider emphasizes the gap between dialogue and decision-making as the biggest challenge, while Yu Ping Chan focuses on the translation from global discussions to direct community impact through capacity building


Topics

Development | Legal and regulatory


Unexpected differences

Recognition of WSIS Forum in UN processes

Speakers

– Gitanjali Sah
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20


Explanation

While both speakers advocate for recognition of WSIS processes, there’s an unexpected tension where ICANN representative notes that WSIS Forum was omitted from the elements paper, suggesting institutional recognition challenges despite the high-level participation that Sah emphasizes


Topics

Legal and regulatory | Development


Overall assessment

Summary

The discussion shows remarkably high consensus among speakers with minimal direct disagreements. Most differences are complementary rather than conflicting perspectives on implementation approaches and organizational priorities.


Disagreement level

Very low level of disagreement with high collaborative spirit. The main challenge identified is not disagreement between stakeholders but rather the systemic gap between dialogue and implementation, and ensuring proper recognition of multi-stakeholder processes in formal UN frameworks. This suggests strong alignment on goals with need for better coordination on execution methods.


Partial agreements

Partial agreements

Similar viewpoints

All three speakers emphasized the critical need to move beyond dialogue to actual implementation and decision-making, with concrete action and results being essential for meaningful impact.

Speakers

– Thomas Schneider
– Yu Ping Chan
– Anriette Esterhuysen

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Topics

Development | Legal and regulatory


These speakers shared pride in the global recognition and success of the WSIS process, highlighting high-level participation and long-term commitment as evidence of its effectiveness.

Speakers

– Gitanjali Sah
– Representative of South Africa
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Topics

Development | Legal and regulatory


Takeaways

Key takeaways

WSIS Plus 20 represents a critical milestone year for reviewing and renewing the mandate of the World Summit on the Information Society, with the high-level event scheduled for July 7-11 in Geneva


Multi-stakeholder participation remains the core DNA of the WSIS process, successfully maintained over 20 years with representation from governments, civil society, private sector, technical community, and academia


There is a significant gap between dialogue and decision-making that needs to be addressed – while WSIS and IGF provide excellent platforms for discussion, translating these conversations into actual policy decisions and implementation remains challenging


The WSIS framework has achieved substantial qualitative impact including 5.5 billion people online and 280,000+ schools connected, though quantitative measurement remains difficult due to lack of indicators and monitoring frameworks


Capacity building emerges as the top priority request from governments globally, reflecting the enduring relevance of original WSIS principles


The IGF and WSIS Forum are complementary platforms that should be recognized and strengthened, with IGF already acknowledged in the Global Digital Compact as the primary meeting space for Internet policy discussions


Resolutions and action items

All stakeholders encouraged to submit comments and inputs to the UNGA overall review through the online form available until July 15th


ITU to work with ODET on GDC implementation roadmap, requiring a thousand-word document on current GDC implementation to be submitted to CSTD annual session next year


South African Minister Soli Malatsi to submit chair summary of high-level event outcomes to UNGA overall review


ITU Secretary-General to submit WSIS Plus 20 roadmap and report to the review process


Two IGF-focused panels scheduled for July 8th at the high-level event: one on Norway outcomes and another on the next 20 years of IGF


Stakeholders urged to highlight importance of WSIS Forum and IGF as multi-stakeholder platforms in their submissions to UNGA review


Registration forms for limited space at Palexpo to be completed as soon as available online


Unresolved issues

WSIS Forum was notably absent from the elements paper released for the UNGA review, requiring feedback and advocacy to ensure inclusion


Lack of indicators and monitoring frameworks for WSIS action lines makes quantitative measurement of achievements difficult


The fundamental challenge of translating multi-stakeholder dialogue into actual decision-making by governments and institutions remains unaddressed


Need for more incubators and support systems for young innovators developing digital solutions, particularly in areas like agriculture


How to maintain the ambitious vision and momentum of the WSIS process while adapting to new technological challenges and opportunities


Suggested compromises

Building on existing WSIS architecture rather than creating entirely new structures, as referenced in Switzerland’s non-paper with concrete proposals


Using complementary nature of WSIS Forum and IGF rather than viewing them as competing platforms, recognizing their different but valuable roles


Leveraging the Global Digital Compact language and framework to update and strengthen WSIS Plus 10 outcome document rather than starting from scratch


Thought provoking comments

One challenge that all of us face is that the WSIS action lines don’t have indicators and monitoring frameworks. So we really can’t measure and tell you that quantitatively this is what we’ve achieved in the WSIS action lines.

Speaker

Gitanjali Sah


Reason

This comment highlights a fundamental weakness in the WSIS framework – the inability to quantitatively measure impact after 20 years of implementation. It’s particularly insightful because it acknowledges a critical gap between ambitious goals and accountability mechanisms.


Impact

This observation set a realistic tone for the discussion, moving beyond celebratory rhetoric to acknowledge structural limitations. It influenced subsequent speakers to focus more on concrete implementation challenges and the need for measurable outcomes.


We all know that dialogue is only a necessary but not sufficient step in getting things done and actually making things happen… the biggest gap that I think we currently have, which is to help make sure that the dialogue that we’re having is actually turning into result in decision-making.

Speaker

Thomas Schneider (Ambassador)


Reason

This comment cuts to the heart of a persistent challenge in international governance forums – the translation of discussion into action. It reframes the entire purpose of these gatherings from dialogue-focused to outcome-focused.


Impact

This observation became a recurring theme throughout the session, with multiple subsequent speakers (Yu Ping Chan, Anriette Esterhuysen) explicitly referencing and building upon this dialogue-to-action framework. It shifted the conversation from process celebration to effectiveness critique.


The number one ask from the national governments and communities that we serve is capacity building… this is a pertinent example of what Ambassador Schneider says that the principles underlying WSIS are even more relevant today than ever before.

Speaker

Yu Ping Chan (UNDP)


Reason

This comment provides ground-truth validation from field experience, connecting high-level policy discussions to actual grassroots needs. It bridges the gap between Geneva-based deliberations and real-world implementation challenges.


Impact

This field-based perspective added credibility to the discussion and influenced other speakers to provide more concrete examples of implementation. It reinforced the relevance of WSIS principles while highlighting persistent capacity gaps.


What the WSIS Action Line Framework gives all of us, but also gives civil society, is a framework that enables you to work collaboratively on implementation at country level… it’s a very ambitious framework… more powerful than what most other tech-related UN frameworks gives us.

Speaker

Anriette Esterhuysen (APC)


Reason

This comment reframes WSIS not just as a dialogue platform but as a practical implementation tool, distinguishing it from other UN frameworks. It provides a civil society perspective on why WSIS remains uniquely valuable for collaborative action.


Impact

This intervention shifted the discussion toward the practical utility of WSIS frameworks for stakeholders, moving beyond institutional perspectives to user experience. It reinforced the multi-stakeholder implementation theme while highlighting WSIS’s distinctive value proposition.


We were quite surprised to note that the WSIS Forum was not noted on [the elements paper] so we will provide our feedback but if all of you could we would like to encourage all of you also to submit your comments and inputs through the online form.

Speaker

Gitanjali Sah


Reason

This comment reveals a significant oversight in UN documentation and transforms the session from informational to mobilizational, calling for collective action to address institutional visibility gaps.


Impact

This observation prompted immediate responses from other stakeholders (notably the ICANN representative) who committed to addressing the omission. It shifted the session from passive information sharing to active advocacy coordination.


Overall assessment

These key comments fundamentally shaped the discussion by moving it beyond ceremonial celebration of WSIS’s 20-year history toward critical examination of its effectiveness and future relevance. The dialogue-to-action framework introduced by Ambassador Schneider became the organizing principle for subsequent interventions, with speakers consistently addressing how to translate multi-stakeholder discussions into measurable impact. The acknowledgment of measurement gaps and institutional visibility challenges created a more honest, problem-solving oriented conversation. Rather than simply promoting the upcoming high-level event, the session evolved into a strategic planning discussion about strengthening WSIS’s practical utility and ensuring its continued relevance in global digital governance. The comments collectively established a tension between WSIS’s ambitious vision and implementation realities, which energized participants to think more concretely about solutions and collective action.


Follow-up questions

How to develop indicators and monitoring frameworks for WSIS action lines to enable quantitative measurement of achievements

Speaker

Gitanjali Sah


Explanation

This is a significant gap identified in the WSIS process – the lack of quantitative metrics to measure progress and impact of the action lines over the 20-year period


How to better translate dialogue into decision-making and actual implementation

Speaker

Thomas Schneider


Explanation

Ambassador Schneider identified this as the biggest gap currently – ensuring that voices heard in forums like IGF and WSIS actually influence real decision-making processes


How to develop more incubators for innovative solutions emerging from hackathons and youth initiatives

Speaker

Gitanjali Sah


Explanation

Based on experience with the ‘hack against hunger’ initiative, there’s a need for better support systems to guide young innovators after they develop applications


How to ensure WSIS Forum is properly recognized in UN processes, particularly in the elements paper for UNGA review

Speaker

Gitanjali Sah and ICANN representative


Explanation

Both speakers noted that the WSIS Forum was surprisingly omitted from the elements paper and called for stakeholder feedback to correct this oversight


How to strengthen capacity building mechanisms, particularly for SMMEs (Small, Medium and Micro Enterprises)

Speaker

Representative of South Africa and Yu Ping Chan


Explanation

This was identified as the number one request from national governments and communities, and is a key focus area for South Africa’s G20 presidency


How to better connect rural communities and farmers to markets and services through meaningful connectivity

Speaker

FAO representative (Dejan)


Explanation

With 700 million people still undernourished, there’s urgent need to understand how to leverage technology to transform agri-food systems and connect rural communities


What should the next 20 years of the Internet Governance Forum look like beyond mandate renewal

Speaker

MAG representative (Bruna)


Explanation

This relates to ensuring IGF remains relevant and effective as a clearinghouse with efficient early warning systems for future digital governance challenges


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #271 Data Agency Scaling Next Gen Digital Economy Infrastructure

WS #271 Data Agency Scaling Next Gen Digital Economy Infrastructure

Session at a glance

Summary

This workshop at the Internet Governance Forum focused on scaling next-generation digital infrastructure to enable greater data agency and create a fairer data economy. The discussion was organized by Project Liberty Institute and centered around their Fair Data Economy Task Force recommendations, which propose redistributing economic power from centralized platforms to individuals and communities.


The panelists presented concrete examples of alternative digital infrastructures already operating at scale. Sujith Nair from FIDE described the Beckn Protocol, which enables interoperability in India’s digital commerce through an open network serving millions of users, including taxi drivers and small businesses who can retain control over their data and pricing. Wes Biggs explained how the Decentralized Social Networking Protocol (DSNP) creates universal social graphs and identity systems that allow users to port their data between applications without being locked into single platforms.


A key theme emerged around the importance of demonstrating tangible value to users rather than expecting them to understand technical concepts like interoperability or decentralization. The speakers emphasized that successful adoption requires meeting people where they are and building on existing social structures and relationships. Sujith Nair illustrated this with examples from India’s digital infrastructure projects, such as embedding QR codes in textbooks to create educational portals that teachers and students could easily access.


The discussion also addressed governance challenges and the need for inclusive participation in designing these systems. Wendy Seltzer highlighted the importance of participatory design that includes diverse perspectives and lived experiences, not just technical expertise. Jean-Bertrand Azapmo from the African Union emphasized that governments alone cannot build the necessary infrastructure and that multi-stakeholder partnerships with private sector investment are essential, particularly given that many countries spend more on debt payments than they can invest in digital infrastructure.


The conversation concluded with recognition that scaling these alternative infrastructures requires systemic change across four areas: entrepreneurship and new business models, next-generation digital infrastructure, policy innovation, and strategic capital allocation. The panelists agreed that this represents a multi-trillion dollar opportunity that could significantly contribute to sustainable development goals while ensuring digital sovereignty and data agency for individuals and communities worldwide.


Keypoints

## Major Discussion Points:


– **Fair Data Economy and Alternative Digital Infrastructure**: The discussion centered on moving away from centralized platform-based models toward decentralized protocols that give users agency over their data. Examples included DSNP (Decentralized Social Networking Protocol), Beckn Protocol, and other alternatives that redistribute value and control from big tech platforms back to individuals and communities.


– **Scaling Technical Solutions Through User-Centric Design**: A key theme was bridging the gap between technical innovation and user adoption. Speakers emphasized the importance of meeting users where they are rather than expecting them to understand complex technical concepts, with Beckn Protocol’s success in India (200+ million transactions) serving as a prime example of making interoperability valuable to everyday users like taxi drivers and small shop owners.


– **Interoperability as a Core Enabler**: The panelists discussed how interoperability between different protocols and platforms is essential for breaking network effects that keep users locked into centralized systems. This includes technical interoperability as well as governance frameworks that enable cooperation between different stakeholders.


– **Multi-Stakeholder Investment and Systemic Change**: The conversation highlighted that scaling alternative digital infrastructure requires coordinated action across four pillars: entrepreneurship and new business models, next-generation technical infrastructure, policy innovation, and strategic capital allocation. Government investment alone is insufficient, requiring private sector and philanthropic participation.


– **Global Perspective on Digital Infrastructure**: Speakers addressed how digital public infrastructure could unlock 3-13% GDP growth for emerging economies, with particular focus on Africa’s digital transformation strategy and the need for inclusive governance that represents diverse global perspectives and technical sophistication levels.


## Overall Purpose:


The discussion aimed to explore how alternative digital infrastructures and protocols can be scaled to create a “fair data economy” that gives individuals and communities more control over their data and digital lives, moving beyond the current centralized platform model toward more distributed, interoperable systems.


## Overall Tone:


The tone was consistently optimistic and collaborative throughout, with speakers building on each other’s ideas rather than debating. The conversation maintained a forward-looking, solution-oriented approach, combining technical expertise with practical examples of successful implementations. While acknowledging significant challenges in scaling these alternatives, the overall sentiment was one of possibility and momentum, with concrete examples demonstrating that these concepts are already working at scale in various contexts.


Speakers

– **Sarah Leif**: Project Liberty Institute (moderator/host)


– **Paul Fehlinger**: Project Liberty Institute, Fair Data Economy Task Force coordinator (online participant)


– **Sujith Nair**: CEO and co-founder of FIDE, member of Fair Data Economy Task Force


– **Wes Biggs**: Vice President and Chief Architect of DSNP and Frequency


– **Wendy Seltzer**: DSNP advisor, co-chair of DSNP governance working group


– **Jean-Bertrand Azapmo**: Principal advisor to the African Union Commissioner for Economic Development, Trade, Tourism, Industry and Minerals, member of Fair Data Economy Task Force (online participant)


– **Xianhong Hu**: UNESCO representative (online participant)


– **Audience**:


**Additional speakers:**


– **Veronica**: Youth Pirate Party of Sweden representative


Full session report

# Scaling Next-Generation Digital Infrastructure for a Fair Data Economy: Workshop Report


## Introduction and Context


This workshop at the Internet Governance Forum, organized by the Project Liberty Institute, examined how next-generation digital infrastructure can be scaled to enable greater data agency and create a fairer data economy. The session featured Sarah Leif from Project Liberty Institute as moderator, alongside panelists Paul Fehlinger (Fair Data Economy Task Force coordinator), Sujith Nair (CEO of FIDE), Wes Biggs (Vice President and Chief Architect of DSNP and Frequency), and Wendy Seltzer (DSNP advisor and governance expert). Online participants included Xianhong Hu from UNESCO and Jean-Bertrand Azapmo from the African Union, though technical difficulties prevented Jean-Bertrand from joining until near the end of the session.


Sarah Leif opened by explaining Project Liberty Institute’s “North Star” of giving people “voice, choice and stake in their digital life,” setting the stage for a discussion focused on practical examples of alternative digital infrastructure that preserves user agency while achieving meaningful scale.


## The Case for Digital Infrastructure Transformation


Paul Fehlinger articulated the fundamental problems with current digital economy models, arguing that existing business models and infrastructure create negative externalities affecting market structures, societies, and democracies. He emphasized the need to “rewire the data economy to build a better ecosystem that works for all actors with people having agency over their data.”


The Fair Data Economy Task Force, whose recommendations were published nine months prior to this workshop, proposes a fundamental redistribution of economic power from centralized platforms to individuals and communities. Fehlinger outlined four key areas requiring coordinated action: entrepreneurship and new business models, next-generation digital infrastructure, policy innovation, and strategic capital allocation.


Sarah Leif reinforced this perspective by highlighting how digital infrastructure design fundamentally affects whether economic power becomes concentrated or distributed, and whether innovation is stifled or encouraged.


## Concrete Examples of Alternative Digital Infrastructure


### The Beckn Protocol: Interoperability in Practice


Sujith Nair presented the Beckn Protocol as a compelling example of how alternative digital infrastructure can achieve scale while preserving user agency. The protocol enables interoperability by allowing consumers and providers to transact without being locked into single platforms, giving users control over their data and revenue streams.


The protocol has processed over 200 million transactions across multiple sectors in India, including transportation, retail, and education. Nair provided practical examples of the impact: taxi drivers who can now control their own pricing and data, and small shop owners who can participate in digital commerce without surrendering control to platform intermediaries.


Particularly noteworthy was Nair’s example of embedding QR codes in textbooks to create educational portals. This approach leveraged existing social infrastructure—the widespread availability of textbooks—rather than attempting to replace existing systems. As Nair explained, “We don’t think about society rising up to the level of technology. It’s the other way. We think about taking technology to the level where the society operates.”


### DSNP: Decentralized Social Networking Infrastructure


Wes Biggs outlined how the Decentralized Social Networking Protocol (DSNP) addresses the limitations of centralized social media platforms. DSNP avoids single points of failure and creates consensus mechanisms where no single entity can override the system.


The protocol provides key capabilities including long-lived identity, attestation features, universal social graphs, and social content that can be ported between applications. Biggs emphasized that DSNP maintains the ability for anonymity and pseudonymity online, allowing users to maintain multiple personas across different communication contexts—a crucial feature for protecting user privacy and autonomy.


## User-Centered Design and Adoption


A central theme throughout the discussion was the importance of designing technology around user needs rather than expecting users to adapt to technical complexity. Sujith Nair articulated this principle clearly, noting that users don’t care about technical terms like “interoperability”—they need to see practical value in their daily lives.


This user-centric approach challenges common assumptions in the decentralized technology community about the need for user education on technical principles. Instead, the speakers advocated for hiding technical complexity while preserving user agency and control.


Wes Biggs supported this perspective by emphasizing the need to “create languages where people can express what usefulness means to them and translate that into technical protocol choices.” Sarah Leif acknowledged the ongoing challenge that most users remain on centralized platforms despite available alternatives, indicating that the scalability problem extends beyond technical capabilities to user experience and value proposition design.


## Governance as a Techno-Social Challenge


Wendy Seltzer introduced crucial perspectives on governance, emphasizing that “building sustainable interoperable systems requires aligning incentives across all ecosystem participants, not just technical solutions.” She advocated for participatory design that recognizes expertise in multiple forms, arguing that lived experience is as important as technological or legal expertise in creating equitable systems.


Seltzer framed the challenge as fundamentally “techno-social,” requiring attention to social and economic incentives alongside technical specifications. This perspective challenges traditional hierarchies in technology development and suggests that genuine inclusion of diverse stakeholders is essential for creating equitable systems.


An interesting point emerged around the sequencing of governance and adoption. Sujith Nair advocated for an adoption-first approach, suggesting that demonstrating value to users should precede formal governance structures, which can then be developed to stabilize successful implementations.


## Investment and Economic Models


Paul Fehlinger highlighted the critical importance of capital mobilization, noting that “nothing works without money” and emphasizing the need to mobilize smart capital across private markets with innovative financing mechanisms. He called for creating centers of gravity for impact-focused entrepreneurship that rethinks value distribution and creates new business models.


When Jean-Bertrand Azapmo was able to join the discussion near the end, he provided context from an African perspective, noting that digital public infrastructure can unlock significant economic value. He cited examples like M-Pesa in Kenya to demonstrate how private sector leadership can drive successful digital infrastructure development, particularly important given the resource constraints facing many governments.


## Technical Implementation and Privacy Considerations


The technical discussion revealed key principles for designing scalable alternative digital infrastructure. Both DSNP and Beckn Protocol demonstrate how interoperability can be achieved while preserving user control and data agency, enabling users to port their data and relationships between applications.


A question from Veronica, representing the Youth Pirate Party of Sweden, raised important concerns about preserving anonymity rights in interconnected systems. The challenge of maintaining separate digital personas across different contexts while enabling interoperability represents an ongoing technical and governance consideration that requires careful balance between connectivity and privacy.


## Regional Perspectives and Implementation


Xianhong Hu from UNESCO raised questions about institutional design, asking whether governments should create new institutions for data agency and stewardship or expand existing data protection authorities. This reflects the broader challenge of balancing data protection with harnessing data’s economic potential.


The discussion suggested that government roles should focus on creating enabling environments rather than direct infrastructure provision, though the specific institutional mechanisms for supporting fair data economy development remain an area requiring further exploration.


## Key Insights and Remaining Challenges


The workshop demonstrated both significant progress in developing alternative digital infrastructure and substantial challenges in scaling these solutions. The concrete examples of Beckn Protocol and DSNP show that interoperable, user-controlled digital infrastructure can work at meaningful scale.


Several implementation challenges remain unresolved, including specific mechanisms for bridging existing alternative solutions, strategies for overcoming network effects that keep users on centralized platforms, and detailed approaches for mobilizing private capital at scale.


The speakers agreed on fundamental principles including the need for user agency, the importance of user-centered design, and the necessity of multi-stakeholder collaboration. However, time constraints prevented full exploration of regional variations and detailed discussion of specific implementation strategies.


## Conclusion


This workshop highlighted the potential for alternative digital infrastructure to create more equitable data economies while demonstrating that such systems can achieve meaningful scale. The emphasis on user-centered design, inclusive governance, and sustainable financing models provides a foundation for continued development of fair data economy solutions.


The examples presented show that success requires meeting users where they are rather than expecting them to understand complex protocols, building on existing social structures rather than replacing them, and creating immediate practical value while preserving long-term user agency. The path forward requires continued collaboration across technical, governance, policy, and financing domains, with particular attention to ensuring that solutions serve real user needs rather than abstract technical ideals.


Session transcript

Sarah Leif: Good morning, everyone. Welcome to all onsite and online participants for this workshop where you’ll hear a great set of speakers. We have both online and onsite today. We will dedicate a few minutes at the end for direct exchanges so you can already get ready and prepare your questions and remarks. Digital infrastructure. This is what we’re here to talk about today. Digital infrastructure underpins the economy of today, but also the economy of tomorrow. From broadband network, data centers, cloud services to protocols and standards that ensure interoperability of tech platform services and system. How digital infrastructure is designed affects the degree to which economic power is concentrated or distributed, how innovation is stifled or encouraged and prosperity is available to the many or to a few. The stakes for digital infrastructure have never been higher. Rapid advances in technologies, in particular, generative AI, are not only transforming the nature of work and everyday life, but also it is redefining the meaning of sovereignty on the individual level, but also for communities and countries across the globe. So making data agency is all the more necessary. And at Project Liberty Institute, we are guided by a North Star, giving people a voice, a choice and stake in their digital life. And a technical solution to allow such a scenario need to be built, scaled, but also, most importantly, adopted. So our common grounds between the IGF theme this year is building, building sustainable and responsible innovation, building digital. trust, resilience, and so on. And the good news today is that we have many builders around the table. Builders of alternative digital infrastructures, of protocols, of business models, of governance approaches. And all of what we are doing, and which you’ll hear about today, resonates with what we call the Fair Data Economy, and particularly the Fair Data Economy Recommendations. They were developed last November by Project Liberty Institute and its impressive task force. So I will now hand it over to my colleague Paul Fellinger to kick off the discussion and tell us more about this concept of a fair data economy. And Paul will be online today.


Paul Fehlinger: Hello, greetings to all of you. Good morning. I wish I could be there in person in Norway on this 20th anniversary Internet Governance Forum. So the Fair Data Economy Task Force is really a foundational initiative for Project Liberty Institute. The task force launched its recommendations about nine months ago at the Project Liberty Summit that took then place in Washington DC. And it followed six months of really intense international multi-stakeholder work. And the Fair Data Economy Task Force is composed of 18 distinguished members, spanning all stakeholder groups, international organizations, governments, innovators, entrepreneurs, investors, builders of technical infrastructure, as well as leading academics, and even Darren Acemoglu, who won last year the Nobel Prize in Economics. In total, the task force spanned members from 10 countries all around the world. And as Sarah said in her opening remarks, the current status quo of the digital economy has negative externalities, on-market structures, on the very fabric of societies and, well, our democracies. And to a large extent, this is linked to the business models and the underpinning infrastructure that enables it on the internet. And the current status quo is not really great for entrepreneurs. It is not really great for people and users of technology. And it’s really not great for majority of investors either. So the question is, how could we rewire the data economy? Can we build a better ecosystem that works for all different actors? And how can we build a better data economy where people have agency over their data that is on firm economic grounds that can scale? So to do this, the task was published its blueprint for innovation and growth across four areas, next generation digital infrastructure as a key enabler, business model innovation and entrepreneurship, policy innovation and capital allocation. And we are very pleased that we have in this distinguished panel that you will get to know in just a second, two members of the Fair Data Economy Task Force. We have with us today Jean-Bertrand Azapmo, who’s the principal advisor to the African Union Commissioner for Economic Development, Trade, Tourism, Industry and Minerals. He should be online, but he is not online yet. So we will see if he can join us momentarily. So I would like to start and give the floor to Sujith Nair Nair, who’s the CEO and co-founder of FIDE. And in many ways, FIDE is implementing already in the market at incredible scale in India, what the Fair Data Economy Task Force has been talking about in its recommendations, which is business model innovation really powered by next generation digital infrastructure. So Sujith Nair, I would like to start with you and give you the floor. Can you tell us a bit more about the back end? And how it embodies this approach of a fair data economy and what is the role of the infrastructure protocol backend in enabling a better data economy?


Sujith Nair: Thank you, Paul. So backend essentially, of course, is an open protocol that embodies interoperability fundamentally. This idea of backend protocol was to an attempt to reimagine how in an online economy we move value, how we put people, communities, and businesses at the center of their own sort of economic, social, commercial lives by giving them agency on how they hold and keep data and share data, but more importantly, translate data into value. So backend protocol does fundamentally allow a transaction, exchange of value, how you express, discover, engage, contract, and fulfill an offtake value between any consumer and a provider. As actors, how do you do that? And it’s an imagination that tries to make a departure from this very incumbent thinking of a platform-based movement of value. In fact, what you see with the platforms and marketplaces as we are seeing today, and it’s a rapid sort of evolution in the last two decades, is a way for both consumers and providers to be necessarily on the same platform managed by one platform intermediary and in the pretext of discovering, sharing goods and services or any form of value on that platform, you have this model of both having to be on the same platform, operated as a closed platform and allowing the value to remain on the platform as a capture of value rather than a free flow of value. So from a fair data economic principles, what Becken protocol does is fundamentally unlock that agency for any consumer and provider. It could be a taxi driver. We have about half a million taxi drivers in India, not necessarily on these big ride-hailing platforms, but use Becken to, A, discover rides and service those rides and keep the entire revenue to themselves. There is no big commissions by the intermediate platforms because there’s no such platform using Becken protocol. It’s an open network where everybody brings their end of the node to this and the drivers also get to have the holdership of their own data. Today when the drivers have to move from one platform to the other, they don’t have access agency to keeping their data, be it their ride reputation or ride history and things like that. Becken protocol allows you to port that data to any other platform and continue from the new platform they’ve opted to be part of. So this ability to retain holdership of data, expressing data and services, goods and services, and ability to discover parties who would like to do transactions business with you and therefore amplify your economic value of the work and the services you offer is essentially a way of thinking with Becken protocol. And that’s how we are trying to bring some of this fair data economic principles making into the fundamental architecture of how we think about value exchange happens in an online economy. Paul, back to you.


Paul Fehlinger: We’re still waiting for Jean Bertrand to join it. I hope he doesn’t have major technical problems to connect, but maybe, Sujith Nair, can I ask you the question, sort of, what for you is the main takeaway and message to the entire ecosystem gathered here at the Internet Governance Forum worldwide, the builders, the investors, the entrepreneurs? the consumers, the policy makers that came out of this intense international multi-stakeholder work that we did together in the Fair Data Economy Task Force. Yeah, sure. I think one of the remarkable outcomes of that effort is how we have seen agreement on some universal principles of how we think a fair data economy of the future should operate, the principles of moving agency to the ends, allowing, like I said, peoples and business to be in the center and not the big platforms, and reimagining the possibilities of how we create value. When we take this departure from having these models of lone heroes as big platforms trying to solve problems for the whole of humanity, but this idea that with these principles you can distribute that ability to solve, distribute that agency, and allow everybody to participate in their own way, retaining their agency and autonomy, for me is something fundamental. And it’s heartening to see there are protocols like the DSNP protocol of Project Liberty, Beckham protocol, all of them aligning to those principles and vision and taking that forward. Of course, it also is a wake-up call to see how we need to do a lot more beyond the formulations of the principles that the task force has put together, but to put them into practice and drive. Civil society, market players, policymakers all come and fundamentally think about this as the core central principles of how we think about the evolution of the online economy and make it contextually relevant to the varying needs and cares of different regions. I’m here in Oslo also to have some conversations around the whole coming opportunity and the challenge of energy transition and what does it mean to to make countries in Africa and India and in Europe sort of build reliable, secure agency and energy independence as an individual, as an economy. And these are some of the conversations which also fundamentally need to bring aspects of fair data principles into the conversation for how we think about future of energy. I mean, I’m trying to make an example out of energy, but the idea is that it’s so fundamental that it cuts across multiple sectors, not just commerce, not just some part of digital payments, but more foundational aspects of our society like access to energy. So I think it’s a very pertinent set of principles that we must consider in all walks of life as we become increasingly digitally native in our lives. Yeah. Thank you, Paul. Thank you so much, Sujith Nairh and all of you at the IGF. You can find the recommendations of the Fair Data Economy Task Force on the website ProjectLiberty.io. And Sujith Nairh, you gave the perfect segue. This is about scaling next generation digital infrastructure for data agency, which is the title of our session today. And with this perfect segue, I want to give it back to Sarah on site in Norway to continue the discussion and introduce us to our next speaker. Thank you very much, Paul.


Sarah Leif: So you mentioned actually, Sujith Nairh, and thank you for that, the DSNP. So I’d like to hand it over to Vice President and Chief Architect of DSNP and Frequency, Wes Biggs. We talked about transparency. We talked about redistributing value. We talked about giving people more power over their data. So it seems that data agency is probably the core component and the common ground that we’re talking about today. And it seems also that data agency is a core architecture principle of the decentralized social. networking protocol. So Wes, could I turn to you and to tell the room here in person and online how technically does the DSNP work? How does it embody this principle of data agency for its almost two million users today?


Wes Biggs: Thanks Sarah and great to see everyone here. As you mentioned I’m a technology architect and contributor to DSNP, consensus seeker perhaps with our diverse set of technologists, academics, civil society advisors working on the protocol. It is a protocol stewarded by the Project Liberty Institute under an open governance model that I think you’ll hear more about. And the origin of DSNP is really the realization, and I think this is very much tied to this fair data economy piece, that the web 2.0 model which did great things for people, connect people in new and fundamental ways, but it was mediated always by centralized platforms. And those platforms have been designed and optimized to extract the value of the network effects that are created in these systems by the participants. So from a fundamental point of view, DSNP is about taking the network effects out of the network and sharing that value between all the stakeholders that are participating. And to do that we start at the very low level, at the protocol level, where we want to talk about not applications but how systems can communicate with one another on a fundamental level. And that means data and the operations on that data and how that flows across connected spaces. We start with DSNP by challenging that simple assertion of the centralized system. And I’ll quote from the specification, to ensure decentralization, a DSMP system must avoid having any single point of failure, and must avoid having any single entity that can override its consensus mechanisms. So we talk about a consensus system, which is a technical term that has evolved very rapidly over the past decade or so. You fit blockchains and other systems within that, public permissionless blockchains, for example, and it creates a system where no single business, company, computer is in charge of the way the system operates. Starting with that fundamental principle, we can build things on top of that. We can build affordances for starting with identity, and identity being something that can be long lived for users of social networking services. It can be human friendly, it doesn’t have to be a cryptographic wallet that everyone has to remember their password for. It can be, however, cryptographically strong with these systems in order to provide control and agency over the data that is then attached and accumulated with this identity over time in the public space. One of the core things that comes quickly after identity is this idea of attestation, the idea of having verified attributes that can be part of one’s identity in the social spaces, and that might be professional credentials, that might be simply proof of your own humanness versus an AI or a bot. These things can go into the protocol, and then we move to more abstract ideas that underpin the social fabric that we’ve seen across lots of different applications, but in unconnected ways. We want to create a universal social graph. that can establish connections that are long lived outside the context of one application that can then be ported and used interoperably between many applications that participate using the same protocol. That social graph can be, you know, your friendships, your connections, your followings on social media, and those are all now relationships that can live on outside the life cycle of any particular application that you use to access your social network. And finally, there are affordances around social content, social media, that we’ve seen across all the varying and often quickly evolving areas of social media as well, so this is not fundamentally just about text or video or anything like that, but a protocol for any of those types of communications that we want to connect our social networks with over time. And really, you know, overall this comes back to this economic principle that we are allowing, with this protocol layer, an innovation of economic models for the applications that participate in the social networking sphere, and that can move away then from a focus that drives toward always an ad tech surveillance model, so there’s value exchange for all the participants involved.


Sarah Leif: Thank you very much, Wes. So, with the example of FIDE, with Backend, with DSNP, and all those protocols, and there are many others that are existing, I’m thinking of the AT protocol and others, these examples exist. They’re in practice, and people can use them. So, many alternative governance models, technical innovation, they’re today available for use. However, it seems that most users are still kind of stuck on the platforms of the centralized digital economy. So let me turn over to Wendy. Wendy, as a DSNP advisor and the co-chair and the chair of the DSNP governance working group, you’ve been thinking about these questions of governance a lot for these last years. I have a more governance and technical question at the same time for you, which is how can we bridge all these solutions that are existing somewhere on the ecosystem, but somewhat not scalable enough to gather enough users? What’s missing today for this solution to truly collaborate better to represent this scalable alternative to a centralized digital economy? Is this something that we’re doing wrong or something that we’re still not doing about this?


Wendy Seltzer: Thank you very much, Sarah, and thank you to our hosts and everyone here. I think it’s tempting to answer your question with the universal computer science answer. Take a hard problem, add another layer of abstraction, and you have the answer. So among all of the existing protocols and places where people are today, you could say add another layer above of an interchange layer, add standards for data exchange among them, import and export of data, make regulation to enforce the availability of those. You might get there, and there’s promising work in standards development for interoperability. There’s promising work from regulators thinking about how to make platforms provide for their end-users, for the individuals, the ability to take their own data and have control of where they express it. And there’s work in cooperation frameworks, governance frameworks, to think about what would it take to give people confidence that when they took their data from one platform to another, they would be able to preserve the terms they wanted for that and not just be turning it over to different terms of control by another proprietary system. And yet, I think we need to look at this as a techno-social challenge, that it’s not just a matter of building interoperable tech and the people will come and the solutions will come out of that. It’s also a matter of figuring out how we as society and as builders of ecosystems will align the incentives so that there are stable configurations that preserve interoperability. And one of the values of these multi-stakeholder dialogues is as opportunities to find solutions that serve the needs of the various participants in the ecosystem. It’s not enough for the end-users to be supplicants to businesses saying, please, please give us our data. they should also be able to present themselves as as customers, as collaboratives, as communities on equal footing to say we bring value to the ecosystem by our participation there and we will only bring it on terms where we have the privacy that we expect, the autonomy to enforce terms of our choosing and it it’s easier to say that than to do that it requires organizing it requires cooperation and and you know it’s it’s not as easy for for individuals as simply taking an app that’s offered to them in the App Store and for free advertising supported and saying go ahead but it’s a matter of building toward a more empowering experience long term. So I think in the you know in the work that DSNP is doing in the work that others are doing to help build sort of empowered end-user participation in in governance to find cooperation and collaboration to find cooperation experiences that recognize the value of commercial incentives the value of individual autonomy, the value of non-commercial and social interchange, the value, the interests of government participation, the interests of technical and scientific development. And we can work toward frameworks that have a longer term sustainable interoperable data interchange.


Sarah Leif: So interoperability is also a big part of the response towards scaling those digital infrastructure that we’re talking about, especially because network effects are really strong out there. And they’re probably one of the main reasons why we’re not able today to bring most users into a technical solution that protects better their data, better their privacy, and so on. So Sujith Nairh, to what extent is this component of interoperability particularly important for you to beat the network effect? You’ve been talking about already millions of users on Beckon. How do you work with that kind of component on top of data agency?


Sujith Nair: Yes, and Sarah, if you allow me to sort of use the remarks from Wes to sort of build on as a way to answer your question on interoperability. And I think some very interesting remarks from Wes on the idea of this natural tendency, this urge for us to think about this abstracting and creating protocols and putting this sort of very elaborate formal governance structures around that idea of a tech protocol idea. And it’s one thing, therefore, to sort of bake interoperability as a principle into the technical designs. but to the point that Wes is in, and I fully echo with that. When we started the Beckham Protocol effort as a foundation about five years ago, we had this urge to sort of build this protocol, build a global community around governance of the protocol, and then talk about, and then think about seeing, okay, how do we make this, put this in work, and let people see value? But one of the sort of the early sort of, when I retrospectively think about right now, wise things we could do is to not wait for the governance and the protocol to actually take off. We actually put the idea of interoperability in the hands of people. It’s very remarkable that in the very early years of Beckham, you don’t normally expect taxi drivers to talk about protocols. But when they see that, when I got a call, literally got a call from a few of the taxi drivers in the city of Bangalore from the unions, and saying, we understand the protocol because we live the problem. We live the problem of not having this power of interoperability to amplify agency because we are stuck in these big walled gardens of ride-hailing platforms, and they onboard us as partners, but now they treat us like as if they are a boss and go through what they have to make us go through. I think then they said that for me, the value of Beckham Protocol was to give me that sense of control about where I want to be, how I make myself discoverable as a taxi driver to a rider in the city and offer my own terms of price and be fair in that process, and then let my own ability to serve the customer with the ride be the reason why I get recognized for more rides and build trust as a service provider. And that idea of that value, discovering that value with this principles of interoperability, for me would be the first significant step we should think about. And the interoperability… for me has to be seen as value in the eyes of those beholders, right, whether it’s taxi drivers. Today, we moved on, we kind of expanded that ability to perceive value with this idea from taxi drivers to about 200,000 small mom-and-pop shops in India. It’s operating in 1,000 cities. We have about close to 1 million SKUs available from goods and services available on one big, massive, interoperable open network of commerce in India called ONDC, Open Network for Digital Commerce. I think of it like India’s own commerce, open internet, and not a platform. And every day, we see conversations around how it is unlocking value for people whom it matters. We have a small list of artisans able to ship products to customers thousands of miles away at a very low cost of the things we talk about, customer acquisition, customer transaction servicing, and able to therefore expand their business. And we are able to do that to find a girl child in the remote part of India, find scholarship, just to be taking an exam, online exam, finding scholarship through the same network, discovering financing support, opportunity to find jobs. So, one of the things about interoperability is to think about how we can straddle value in multiple layers and let users see value. Most often, the perception of value comes from the exact service they operate and they get stuck in these apps. But you need to put interoperability as a core value manifestation in the ads. You work from the value backwards to why interoperability is a way to unlock that vis-a-vis the other closed platforms. So, that’s one of the things. And we have realized that by driving adoption. more than formalizing governance. We were able to achieve a lot more articulation for why interoperability is useful. And now, given that we have a fairly reasonable scaled adoption in India, we have done over 200 million transactions on this protocol. We now realize that it can now stabilize, protect those investments that users and the user platforms are making onto this protocol. And to stabilize that and give it a more consistent evolution, we are now formalizing some of the governance structures around it. So adoption preceding governance, value enablement and value articulation and visibility is one of the things we think about how interoperability has to reach the people. Sometimes otherwise we just keep losing this conversation in a more techno and a policy circles, but how does it matter in the hands of people is something that I think is a very important aspect of how we talk about interoperability and demonstrate interoperability.


Sarah Leif: So that’s very interesting because we often hear that in all those technical alternative spaces, especially the decentralized web community, the open source community, often the technical aspiration and assumption are sometimes disaligned with what users are actually expecting. Many people from that community are often expecting also users to have a certain level of technical ability and to understand things that is part of their language only. And so there’s often this obstacle to scalability. So you touched on this and you showed exactly that all of these technical terms are actually translating into usefulness in the daily life. And you could go back on this, but I would like to hear also Wes on this specific part. How do we go beyond those obstacles? of technically assuming people have a certain level or ability to understand technically what is a decentralized social graph, for instance, in the case of DSNP, or what is even interoperability? How do we demonstrate the value to them? I think Becken has done a great job at this. What is the perspective of DSNP on that front?


Wes Biggs: Yeah, it’s a great question. I think Sujith Nairh made that point really articulately, that people are not wowed by these terms. You go out in the street and say, do you want interoperability? Do you want a data agency? That’s not top of mind. Perhaps to me, because I’m a technologist, but not everyone is thinking about the usefulness of the internet in those terms. I think it’s interesting to look at how these alternatives have evolved as well, and in the social media and social networking space, things like the AT Protocol and Blue Sky, the Mastodon and Fediverse community. Many alternative models have been pioneered by essentially marginalized communities that have had strong needs for safe spaces unmediated by centralized controllers. There’s almost a natural suspicion of interoperability in some of these spaces as needing to give something up, because historically, that’s been the case. It’s been a choice between reach and scale of this big room idea of social media on one hand, and then data agency and control and the ability to express oneself authentically on the other. That’s also a very constraining way of thinking about a choice of communication modes. That’s created challenges of interoperability and bridging across both the protocols, but also the content communities, the spheres of content that we think about when we interrogate the internet. we are we’re good at navigating that spectrum as human beings in our real life so we’re used to having spaces of all different sorts of sizes that we can participate in you know from a family space to a classroom to our towns and communities and you know public public speaking and spaces as well so you know I think there’s a real challenge when we think about you know these technical affordances and how how do we take them mainstream and I don’t mean that in simply just creating one big space but how do we create a way to connect this social graph that underpins things like DSMP and and utilize that in a very useful way across the many spheres that I participate in and you participate in so if an empowering protocol can give access to all these levels of control and details and so on you think about this very complicated machine and and how do everyday internet users then operate that machine that’s you don’t want to you want to meet people you know where they are and where their understanding of how they can extract the usefulness from these platforms can be and I think there’s several ways to do that obviously you need that underlying underlying you know kind of protocol and governance layer that’s going to protect that ability but I think strong defaults and nudges at the intersection of the user experience and the protocol are very important there you need to create an environment that kind of naturally fits the way people are used to interacting and communicating and and I think there’s a real opportunity there as we move forward in the agendic AI era to help translate these human needs and the ability for humans to express how they want to participate in these spaces and translate those into the technical choices that are embodied in these protocols so I think it’s about creating languages where where people can express what usefulness means to them and have that you know embodied and expressed as it goes down the stack to the protocol level.


Sarah Leif: I’m very interesting about one thing and I’ll hand it over to Paul after this but I would like to ask the three of you especially if you have different opinion that might be interesting. Do you think in an ideal world that users should know about all this technicalities and about the protocols and know we’re very excited about all these things here because we’re basically internet nerds or is it completely fine if they don’t know anything about it but yet they have the transparency maybe to have a look if they’re interested in it. Is there like a strong vision that you have on the level of technical savviness that your users would need to have to use the protocol?


Sujith Nair: I think if I can speak for everybody here I don’t think there’s a difference in the view but I think I would like to bring certain nuances from my own experience as to how does that translate into a real executable you know action on ground to sort of allay those concerns we have with this old technical aspects, fine aspects of interoperability and putting it to work. I think one of the principles and I speak not just about our efforts with backend protocol which has been a five-year effort as a foundation FIDE we’ve been working on across 15-20 different sectors using the value of interoperable peer-to-peer transaction protocol that backend is but I also speak from the experience that we have garnered over the last 15 years of doing some population scale open interoperable infrastructure designs in a country like India touching a billion people through multiple times five so six different transformation projects we had our friends talking about in the other panel a few minutes ago and I think what one of the principles we have learned from that is very very important is A, interoperability is a very natural tool to solve for complexity at a population scale. You know, how do you distribute that ability to solve and allow people to come up with their own contextually relevant cares and solutions to fulfill that care needs interoperability. But to make that happen, we don’t think about society rising up to the level of technology. It’s the other way. We think about taking technology to the level where the society operates. And I’ll give you a few quick examples of how we have manifested that. You know, during the COVID time, of course, all the public-aided schools did not have digital infrastructure to get students back to schooling, whether it’s from the confines of their home during the pandemic. And it was very natural, like with a typical, you know, Valley startup or a Bangalore tech startup to think of, well, let’s build this cool app and get everybody online and get into these online screens. But one of the ways we thought differently about how technology made society is to ask this question about what is already abundant in the society around which we can think of technology. And it was very obvious for us to know that what is abundant are the textbooks. It’s been there for generations. It’s something that everybody keeps and carries. It’s a key sort of a medium of interaction between the pupil and the teacher. And the pupil and the teacher is the relationship, that societal relationship of trust that comes with pupil and teacher is abundant. So why don’t we use that abundance and think of technology around it? So instead of building this big app, what we have done is to create a very, very simple, interoperable QR code, you know, with a digitally signed QR code and plant it in the textbooks. Think of this as a digital portal from that area of abundance, from that area where the agency is already available for the students and the teachers. And what was remarkable is that, you know, to this portal, of course, we could bring them access to a whole other lot of content and teaching mechanisms and methods and learning, whether it’s from Khan Academy or any other such tools, who it allowed market to also participate on that portal rather than trying to do their creating say siloed platforms. They came to that QR code enabled infrastructure for them to offer more learning content. And just to complete this anecdotal example, what was truly remarkable in that experience is we started seeing the scans not happening during the day, during the schooling hours, but in the nights. And we are seeing those scans in the night because we discovered that for the first time, the teachers who are generally incapacitated and lack motivation to prepare for their classes were actually scanning content themselves to access to new contents, new pedagogy styles from other teachers from the community and actually use that to teach better. And it immediately allowed for it to be a teacher capacity building tool. Same infrastructure, but we could see unforeseen value. And that’s where we thought technology is meeting the society and not the other way. And I can give you many more such examples we have discovered. India could have gone the credit card way for the scale that it is. It could have done another 60 million, this big clunky POS machines as a way to drive electronic payments for safety, security and creating your data exhaust for your own agency. But we did not go for this big clunky machines. We started printing QR codes and said, what is the abundance here? The abundance is everybody’s going to have a mobile phone in India and India has 900 million smartphones. So we said, rather than making this complicated technology go at scale, we make the scale with technology itself work at scale, not scale what works. And we put this QR codes and you put mobile phones in today with UPI, which is the other example of a protocol that we built in India before back in does about 18 billion transactions per month. We did that. We got there in eight years. So this way of thinking about putting technology at the where you can meet the society already is how we should think about technology design in the first place. And we believe in this principle of not scaling what works. like scaling an Uber for the rest of the world to actually think like internet of what works at scale and then manifest value in areas where there is enough societal abundance of trust and relationships and use that to harness technology to unlock more value. So these are some of the things about, like I said, a little nuance and long winding answer, Sarah, but thank you for giving me this opportunity.


Sarah Leif: No worries. I’m also super happy to see that Jean-Bertrand has joined us online and you already start mentioning examples about functioning at scale digital infrastructure that brings value to citizens. So I’ll hand it over to Paul to hand it over to Jean-Bertrand.


Paul Fehlinger: Thank you. And Jean-Bertrand, I’m very happy that you can connect. Can you hear us correctly? We don’t see your video feed yet. If you can unmute and just tell us if you’re. Maybe we give Jean-Bertrand just a few more moments so that he can talk from the perspective of the African Union Commission about this, how to scale next generation digital infrastructure for more data agency. I wanted to, I love the discussion about how to create incentives. Jean-Bertrand, are you there?


Jean-Bertrand Azapmo: Wonderful. I hope my video will also pick up. We can hear you well. We see your virtual background. We don’t see you yet. Okay. Perhaps give me a few more minutes. I may switch the device. Okay. Let me try and fix my video. Yeah. Sorry for that.


Paul Fehlinger: No problem at all. We hope Jean-Bertrand can join us. This is part of the beauty of remote participation. So I was really fascinated listening to the remarks about the incentives. You talked a lot about the user incentives and the design, user-centric design of technology, which I believe is so important. I want to share a bit of this ecosystem, this systemic thinking approach that emerged from the Fair Data Economy Task Force. Because the core question was as well the same that we discuss here of how can we scale this new approach, this next generation approach to a digital economy. And the answer is on firm economic grounds. And for this to work, we need not only product market fit in the design of things, but we need to really think systemic. And the systemic sort of actions reside on four pillars that I mentioned in the beginning. And I just want to dig a bit deeper because I think it’s very important to visualize this almost like a system with small clock wheels that have to be turned almost at the same time. There’s not a re-sequencing of one after the other. All has to happen at the same time for this to work, is what the Fair Data Economy Task Force said. The first thing is on entrepreneurship and new business models. What is right now still missing a bit in the world is centers of gravity for impact-focused entrepreneurship that rethinks the value distribution that gives birth to new, very innovative business models that blend economic growth with data agency. So we really need to think about how to create those new centers of gravity of entrepreneurship to innovate at the business level. the business model level. We talked a lot about next generation digital infrastructure and here again it’s very important to probably, this is what the Fair Data Task Force told us, to think about it like a foundational step. So there are digital ID systems, there are data architecture pieces and very important protocols like DSMP, like Beck and like others to enable the widespread adoption and drive this mainstream impact. And in addition at the same time we also need policy innovation and frameworks because what is needed is the regulatory enabling environment. So what we need is forward-thinking policies that one, safeguard data ownership, that give, defer the right to data agency to users or also businesses, corporate actors, while stimulating innovation and competition to create really a high-performing digital economy that has a sort of leveling the playing field to allow new market entrants with new ideas that really have this product market fit and correspond to this desire of users for better technology with powerful and scalable business models that allow them to really reach mainstream adoption. And the last piece of the puzzle is something that especially at the Internet Governance Forum is not a topic that is talked about a lot, which is a shame because it’s very important, which is strategic capital allocation. Nothing works without money. So we really need to find ways to mobilize smart capital across private markets. There’s also a part of public investment especially on digital infrastructure projects the government has to play a part, but how do we also mobilize private market capital, venture capital and other forms of capital to scale high potential fair data economy ventures and enabling technologies at the infrastructure level. And how do we complement this by more innovative financing mechanisms? So, I really invite all of us to think about it in a systemic way. And with this, I want to see if Jean-Bertrand… Fantastic, we see you. So, without further ado, I want to hand it over to Jean-Bertrand with the question of what are your key takeaways as a member of the Fair Data Economy Task Force from this effort? And what role does digital infrastructure and data agency play on the African continent and for your digital strategy in Africa? Jean-Bertrand, can you hear us?


Jean-Bertrand Azapmo: Hello, yes, I hear you. Yes, I think everything is almost perfect now. Hello, can you hear me?


Paul Fehlinger: Perfectly.


Jean-Bertrand Azapmo: Can you also see me?


Paul Fehlinger: Yes, we can, Jean-Bertrand.


Jean-Bertrand Azapmo: Yes, sincerest apologies. I think I messed up the time zones. You know, I travel from at least to South Africa for this G20 meetings and I completely got lost in the middle of these various time zones. But I really want to thank you, Paul, and thanks to the Project Liberty Institute for organizing this session on such an important topic at the 2025 Internet Governance Forum. It was indeed a privilege to serve as a member of the Fair Data Economy Task Force established and facilitated by the Project Liberty Institute. on Fair Data Economy, alongside, as we all know, 17 other distinguished task force members with great minds, including Professor Teron, who, as most of you know, is one of the 2024 Nobel Economic Prize recipients. And we were given the chance, the unique opportunity, to really reflect on how to create the conditions to unlock the multi-trillion dollar opportunity that the digital landscape represents, actually. And you will agree with me that with the acceleration of AI economy, which basically relies and builds on the same public digital infrastructure, you will agree that it was actually a very forward-looking exercise that was initiated by the Project Liberty Institute back then. So, really, thanks, Paul, and thanks, Bell, you know, all the great mind behind this project. Now, there were some, there are some very important recommendations in the work we did, and most of which actually resonate with the digital transformation strategy for Africa that we are championing at the level of the African Union. And it’s also part, there are some elements of it in the AI for Africa that South Africa is championing as part of its G20 presidency. So, everything is coming together. And the key question, there are some key questions, you know. The first one is the recognition of the gaps that we are still experiencing five years into 2030, which is the target date for the sustainable development goals. There is the recognition of the fact that digital public infrastructure carries an immense potential that could really help unlock some of the economic growth that we need to be able to achieve the SDGs. There are some estimates but let me just give you this one from Harvard University. It says that digital public infrastructure can unlock value equivalent to 3 to 13 percent GDP with an average improvement which means additional 6 percent improvement for emerging economy. Now, just to put it into perspective, Africa needs 7 percent, 7 to 10 percent of economic growth over a period of 30 to 40 years to achieve emerging market status. So, if we were to, you know, implement to invest and be able to reap the benefits of public digital infrastructure, you can see that we will be able to reach those targets in a very short period of time because if you accumulate 13 and 6, you’re basically at 19. If you make an average of it, you’ve got what you need to be able to unlock the immense opportunity that, you know, the digital landscape offers and now the digital economy. Now, the issue is our government cannot do this alone because we are also living in an era where close to 3 billion people or 3.3 billion people to be very specific according to Antart, live in countries that spend more on debt interest payment. So, they therefore do not have the resources to be able to invest in digital public infrastructure. This is the dilemma. We know what digital public infrastructure will help achieve, but the government are constrained. What does that mean? It means a new approach is needed. This is where multi-stakeholderism really holds a great potential. And looking at multi-stakeholderism, it’s not really based on, you know, just some philanthropic. No, it’s based on self-enlightened interest. It is to say the businesses themselves, they stand to benefit from investing in digital public infrastructure, because it will then help unlock all these potential that we are talking about. And the private sector will be the first beneficiary. So we are actually saying in the context of the digital transformation strategy for Africa, in the context of the AI initiative for Africa, let us invest massively in digital public infrastructure because of the immense potential that it holds, but also because it will help create a win-win situation for all the stakeholders. The businesses, they need to continue growing. And the only way to grow is to invest in those places that are lagging behind. So what is the alternative? The alternative is a fragmented world. The New York Times Magazine released an article that clearly shows that AI is creating a two-phase world, the half and the no half. So the question is, do we want to continue entertaining it? I think the platforms like the Internet Governance Forum actually provide an opportunity to reflect on what needs to be done, building on the work that the organizations, institutions like Project Liberty Institute are doing, and say, let’s choose the right answer. Let’s not aim for, you know, a divided world where we have people sitting at the periphery of the system and people, you know, that are moving at a regular pace. The consequence will be continued growing nationalism that we are witnessing because there would be a lot of people that are disenfranchised and this is not happening only in the developing world or in the least the most impoverished countries. No, these gaps are also in some of the developed countries. So there is really a need to focus on delivering a digital public infrastructure that works for everyone, that is sustainable, that is inclusive and that can really help the world move towards achieving the SDG, at least getting closer because, you know, today it’s very clear with 17% of the SDG on target there is very little we can do, but at least if we do the right thing we can close the gap a little bit and then going forward we will be able to do more. So let me stop here for now, Paul, and looking forward to either the next round of interventions or, you know, contributing to other aspects of the discussions. Thank you and sincerest apologies once again for the mess up, yeah.


Paul Fehlinger: Very happy that you could connect, Jean-Bertrand. I hand it over back to Sarah Leif in Norway. Thank you very much, Jean-Bertrand. I


Sarah Leif: think you made it clear that scalability won’t be achieved without substantial investment and I wish we could talk about investment much more and we would need probably another session dedicated only to this, but that’s a substantial and a key component of also the scalability of digital infrastructure. But you also mentioned something that interests me is that it needs to work for After Wendy’s response, I’ll open the floor to everybody in person, and we’ll start with the first question online after Wendy. So, Wendy, over to you.


Wendy Seltzer: Thank you, and I’ll try to keep it short so that we can get to those questions, even though it’s a deep and challenging question, because I think we reach for the essence of participatory design and governance, and to be building with the participation of those who are affected by the systems and ecosystems. And as was referenced earlier, we have people who are at all levels of technological sophistication, all levels of engagement with the technology, those who are designers and builders, those who are users, those who are not yet users because they don’t have access to the technology, and finding ways to include all of those perspectives and give people real options for participation and not just the semblance of inclusion. It’s a real challenge. And so I think, you know, what we can try to do is to work progressively and to ensure that, you know, the structures that we’re constructing are as inclusive as we can make them to represent the experiences of participants from all walks of life. It’s important in participatory design to recognize that expertise can take a variety of forms and that lived experience of a particular background is as important as technological expertise or legal expertise to making an equitable techno-social construction that works for people. But we also recognize we can’t do everything at once. And so building a sense of temporary-ness in the early stages, recognizing that while we can try to do the best we can at inclusive governance, when people come and say they are not yet represented, being open to hearing from them and expanding to be more inclusive is important. I think the… where there are, you know, resource inequities and imbalances. We need to start by being conscious of that and taking extra steps that what we’re designing isn’t just, you know, enshrining an existing balance of power but making space for those who don’t have, you know, the same economic advantage right now. And that’s not just an altruistic perspective. You know, it’s, you know, if we’re really talking about how we grow the data economy, it’s looking to people who will be participants if given opportunities. And, you know, those have to be real opportunities. It’s not just the opportunity to be a consumer, but the opportunity to share ideas, to be entrepreneurs, to be social entrepreneurs, and to participate in governance. So those are some of the principles that I put in place and, you know, we’re working in places like the DSNP governance frameworks to put those into action and I hope we’ll have opportunity to engage more on that in questions and answers.


Sarah Leif: Wonderful. Thank you. Thank you, Wendy, for those final insights. So I’d like to ask Xianhong from UNESCO to ask her question. She is online and then we’ll take your question in person. We’ll take them together and then we’ll ask the panel to respond to it as well as you, Jean-Bertrand, if you’re still with us. So Xianhong, the floor is yours. Thank you, Sarah. And


Xianhong Hu: thank you, Paul. Actually, congratulations for having successfully raised this important aspect on the data economy, which I didn’t see much debates at IDF, because we’re talking about the data governance from more political angles. So that’s really such a value added to the entire IDF. And as you know, we are here working with other governments. So what strikes me is that what do the panelists think that this can imply or the implications for the governments? What should they do? I mean, in face of this, such a multi-trillion dollar data economy for sustainable development prospect, but also facing so many risks and challenges. And what should we do for governments? Because in the past years, in my work, I’ve been promoting maybe a more conservative approach that data protection, protecting rights, privacy, but maybe we didn’t put equal attention on the harnessing the potential of data. But now the data is new opportunities for any country to want to prosper in the digital age. And at the institutional level, I mean, the capacity building, I mean, the new approach, as you just touched upon, what do we should do? Because to my knowledge, we had already having maybe 120 countries who have created their data protection authority. If we want to make sure the government cannot miss this opportunity, can put in place the right framework and regulation or policy strategy to encourage this digital infrastructure development and the economy, can we recommend them to create new institutions for the kind of data agency or data stewardship? Or should we also encourage the existing data authority to expand, enhance their capacity to cope with the challenge of the data economy? That’s my question for you. Also, I appreciate the panelists in terms of geographic diversity. If you can share more about the regional perspective, that would be also useful for me. I imagine that the situation and the challenges in Asia and Africa, Latin America, might be quite different stories. So thank you. I really look forward to learning more from you. Thank you.


Sarah Leif: Thank you, Xianhong. So we have very government-oriented questions for the panel. Could you please introduce yourself and then ask your question? And then the panel can take Xianhong’s question and your questions. Yes, thank you.


Audience: My name is Veronica. I am with the Youth Pirate Party of Sweden. And I have a question that’s not very governmental, more a philosophical question about the future of social networking. I and my party recognize the wills of many people to want to remain anonymous online. And I wonder with the advent of this, for example, DSNP, the future of an interconnected internet where, for example, your workplace may use the same account as your political opinions on a different social network. Is there any plans to go forward to recognize the right for people to want to remain anonymous on this new internet? Thank you.


Sarah Leif: Thank you very much, Veronica. Thank you, Xianhong. So two questions, two very different yet complementary questions, I believe, one technical and one philosophical and one more governmental. To the panel, you can go ahead knowing that you have three minutes left to respond to all of this. Who would like to go first?


Wes Biggs: I’ll go first to address Veronica’s question. And from a DSMP perspective, I think it’s important to maintain that ability to have anonymity or pseudonymity online and not not just in in kind of a social communication space, but in all aspects of how we engage online in in a digital economy as well so I think there are affordances within the DSMP protocol and many others to do that to not be bound to a single identity to be able to have multiple personas across different aspects of what we do and I think it’s also important to distinguish that from say a governmental identity, which I think is appropriate for certain uses, but not necessarily for all the spheres of communication that people want to participate in


Sarah Leif: Maybe Jean-Bertrand for the governmental question if you want to take that one


Jean-Bertrand Azapmo: Can you hear me? Yes Yes Well, thank you so very much for those comments and questions. What is very clear, like I said, is that there is only that much the government can do, but there is what they can do. For instance, what we are doing in Africa, we are laying the foundation, the legal foundation for you know, digital public infrastructure to expand and for the digital economy to thrive. For instance, we had the what is known as the Malabo Convention on data protection, which was there. Of course, it needs to be updated and to take into consideration the evolving environment. We recently, as last year, our heads of state adopted the AFCFDA African Continental Free Trade Area the other elements of what would be considered as a conducive enabling environment. You know, in some instances for digital public infrastructure, you need even physical infrastructure itself. So, the government needs to put in place other legislations, ancillary legislations that are needed. There are also instances where it’s just to guarantee, you know, the investment to provide the necessary guarantees for investment to step in and deploy the resources that are needed. But what is very clear is that whether governments in some places can do it or not, we still see the opportunity for philanthropics, for the private sector to step in. And this is on account of, you know, the huge opportunities that are there and that they stand to harness if they were to invest. Now, if you just take digital public infrastructure as a road, you know, all of us, we use roads every day without Realizing That Someone Builded It, It’s Only When It’s Not There That All Of A Sudden We Realize That Oh It’s Actually Critical. So I Think In Areas In Sectors Like Minerals There Are Examples Of You Know Public Private Partnership To Build Public Infrastructure This Can Be Replicated In The Digital In The Data Economy. We Have Like I Said Private Sector That Have Gone Alone Or Solo To Do It. The M-Pesa Revolution In Kenya For Instance It Was All Private Sector Led.


Sarah Leif: I’m Sorry Jean-Bertrand, I’m Very Sorry We’re Out Of Time. There Was Also A Question Online That We Didn’t Manage To Respond To. So This Just Prove Also All The More How This Conversation Is Important And How It Needs To Include Everybody In The Discussion. So I Wanted To Thank You All So Much Because We Have To Leave The Room For The Next Session Unfortunately. But We Can Definitely Continue This Discussion. As We Mentioned You Can Go On ProjectLiberty.io And You Can Find The Fair Data Economy Recommendation. You Can Also Find Our Recent Digital Infrastructure For Data Agency Report. And Later Today At 2pm For Those In Person We Will Have A Closed Door Session To Continue And Deep Dive On Those Discussions. So If There Is Anybody Interested In Joining Please Come To Us And We Will Make That Happen. And In The Meantime Please Join Me In Thanking This Wonderful Panel Today And Thank You All.


P

Paul Fehlinger

Speech speed

149 words per minute

Speech length

1850 words

Speech time

742 seconds

Current digital economy has negative externalities on market structures, societies, and democracies due to existing business models and infrastructure

Explanation

The current status quo of the digital economy creates harmful effects on market structures, the fabric of societies, and democratic institutions. These negative impacts are largely linked to the business models and underlying infrastructure that enables the current internet economy.


Major discussion point

Fair Data Economy and Digital Infrastructure Transformation


Topics

Economic | Legal and regulatory | Sociocultural


Agreed with

– Sarah Leif
– Sujith Nair

Agreed on

Current digital economy model is fundamentally flawed and needs transformation


Need to rewire the data economy to build a better ecosystem that works for all actors with people having agency over their data

Explanation

There is a need to fundamentally restructure how the data economy operates to create a system that benefits entrepreneurs, users, and investors alike. This new ecosystem should be built on firm economic grounds that can scale while giving people control over their data.


Evidence

The Fair Data Economy Task Force published a blueprint for innovation and growth across four areas: next generation digital infrastructure, business model innovation and entrepreneurship, policy innovation, and capital allocation


Major discussion point

Fair Data Economy and Digital Infrastructure Transformation


Topics

Economic | Human rights | Legal and regulatory


Agreed with

– Sujith Nair
– Wes Biggs
– Wendy Seltzer

Agreed on

User agency and data control are fundamental principles for fair digital economy


Scaling requires systemic approach across four pillars: entrepreneurship/business models, digital infrastructure, policy innovation, and strategic capital allocation

Explanation

To achieve scale in the new data economy, all four components must work together simultaneously rather than sequentially. This includes creating centers of gravity for impact-focused entrepreneurship, building foundational digital infrastructure, developing enabling regulatory frameworks, and mobilizing smart capital across private and public markets.


Evidence

The Fair Data Economy Task Force identified these four pillars as foundational steps that must happen at the same time, like clock wheels that have to be turned almost simultaneously


Major discussion point

Investment and Economic Models


Topics

Economic | Infrastructure | Legal and regulatory


Agreed with

– Wendy Seltzer
– Jean-Bertrand Azapmo

Agreed on

Multi-stakeholder collaboration is essential for scaling digital infrastructure


Need centers of gravity for impact-focused entrepreneurship that rethinks value distribution and creates new business models

Explanation

The ecosystem currently lacks sufficient hubs for entrepreneurship that focuses on social impact while rethinking how value is distributed. These centers should give birth to innovative business models that blend economic growth with data agency.


Major discussion point

Investment and Economic Models


Topics

Economic | Development


S

Sarah Leif

Speech speed

146 words per minute

Speech length

1555 words

Speech time

638 seconds

Digital infrastructure design affects whether economic power is concentrated or distributed, and whether innovation is stifled or encouraged

Explanation

The way digital infrastructure is designed has fundamental implications for economic power distribution and innovation. It determines whether prosperity is available to many or just a few, and whether innovation flourishes or is constrained.


Evidence

Examples include broadband networks, data centers, cloud services, protocols and standards that ensure interoperability of tech platform services and systems


Major discussion point

Fair Data Economy and Digital Infrastructure Transformation


Topics

Infrastructure | Economic | Development


Agreed with

– Paul Fehlinger
– Sujith Nair

Agreed on

Current digital economy model is fundamentally flawed and needs transformation


Most users remain stuck on centralized platforms despite available alternative solutions, indicating scalability issues

Explanation

While many alternative governance models and technical innovations exist today, including various protocols, most users continue to use centralized digital economy platforms. This suggests that current alternative solutions face significant scalability challenges in attracting mainstream adoption.


Evidence

Examples of existing alternatives mentioned include FIDE with Beckn, DSNP, AT protocol and others


Major discussion point

User Adoption and Scalability Challenges


Topics

Infrastructure | Economic | Sociocultural


S

Sujith Nair

Speech speed

165 words per minute

Speech length

2383 words

Speech time

865 seconds

Beckn protocol enables interoperability by allowing consumers and providers to transact without being locked into single platforms, giving users control over their data and revenue

Explanation

Beckn protocol reimagines online economy transactions by enabling direct value exchange between consumers and providers without requiring them to be on the same platform managed by an intermediary. This allows users like taxi drivers to keep entire revenue without platform commissions and maintain ownership of their data including ride reputation and history.


Evidence

About half a million taxi drivers in India use Beckn to discover rides and service them while keeping entire revenue; drivers can port their data including ride reputation and history to any other platform


Major discussion point

Protocol Design and Technical Implementation


Topics

Infrastructure | Economic | Human rights


Agreed with

– Paul Fehlinger
– Wes Biggs
– Wendy Seltzer

Agreed on

User agency and data control are fundamental principles for fair digital economy


Technology should meet society at its level rather than expecting society to rise to technology’s complexity

Explanation

Instead of building complex technological solutions and expecting society to adapt, technology should be designed around existing social abundance and trust relationships. This approach leverages what is already available and trusted in society as the foundation for technological innovation.


Evidence

During COVID, instead of building complex apps for schools, they created simple QR codes in textbooks leveraging the abundant teacher-student relationship and existing textbooks; UPI in India used QR codes and mobile phones rather than complex POS machines, achieving 18 billion transactions per month


Major discussion point

User Adoption and Scalability Challenges


Topics

Development | Infrastructure | Sociocultural


Agreed with

– Wes Biggs
– Wendy Seltzer

Agreed on

Technology should be designed around user needs rather than technical complexity


Users don’t care about technical terms like “interoperability” – they need to see practical value in their daily lives

Explanation

Technical concepts like interoperability must be translated into tangible benefits that users can experience directly. The value of these principles should be demonstrated through practical applications rather than technical explanations.


Evidence

Taxi drivers called to say they understood the protocol because they lived the problem of being stuck in walled gardens of ride-hailing platforms; 200,000 small shops in India operating in 1,000 cities through ONDC with close to 1 million SKUs available


Major discussion point

User Adoption and Scalability Challenges


Topics

Economic | Sociocultural | Development


Adoption should precede formal governance structures – demonstrating value to users first, then stabilizing with governance frameworks

Explanation

Rather than waiting for elaborate governance structures to be established before implementation, it’s more effective to drive adoption first by showing practical value to users. Once reasonable scale is achieved, formal governance can be implemented to stabilize and protect user investments.


Evidence

Beckn protocol achieved 200 million transactions before formalizing governance structures; early focus was on putting interoperability principles in the hands of people rather than building global governance communities


Major discussion point

Governance and Multi-stakeholder Collaboration


Topics

Legal and regulatory | Economic | Infrastructure


Disagreed with

– Wendy Seltzer

Disagreed on

Sequencing of governance versus adoption in protocol development


Beckn protocol has achieved scale in India with 200 million transactions across multiple sectors, demonstrating real-world viability

Explanation

The protocol has successfully expanded beyond taxi services to include 200,000 small shops across 1,000 cities in India, operating through ONDC (Open Network for Digital Commerce). This demonstrates that alternative protocols can achieve significant scale and real-world impact.


Evidence

Close to 1 million SKUs available on the network; examples include artisans shipping products thousands of miles away at low cost, girl child in remote India finding scholarships and jobs through the same network


Major discussion point

Regional Perspectives and Government Role


Topics

Economic | Development | Infrastructure


W

Wes Biggs

Speech speed

146 words per minute

Speech length

1408 words

Speech time

577 seconds

DSNP challenges centralized systems by avoiding single points of failure and creating consensus mechanisms where no single entity can override the system

Explanation

DSNP is built on the fundamental principle that decentralized systems must not have any single point of failure or any single entity that can override consensus mechanisms. This creates a system where no single business, company, or computer is in charge of how the system operates.


Evidence

Uses public permissionless blockchains and other consensus systems as the technical foundation


Major discussion point

Protocol Design and Technical Implementation


Topics

Infrastructure | Cybersecurity


DSNP provides affordances for long-lived identity, attestation, universal social graph, and social content that can be ported between applications

Explanation

The protocol creates technical capabilities for persistent user identity that doesn’t depend on cryptographic wallets, verified attributes like professional credentials or proof of humanness, social connections that exist outside any single application, and social media content that can work across different platforms. This enables users to maintain their digital relationships and content independently of specific applications.


Evidence

Identity can be human-friendly while cryptographically strong; social graph includes friendships, connections, and followings that live outside the lifecycle of particular applications


Major discussion point

Protocol Design and Technical Implementation


Topics

Infrastructure | Digital identities | Human rights


Agreed with

– Paul Fehlinger
– Sujith Nair
– Wendy Seltzer

Agreed on

User agency and data control are fundamental principles for fair digital economy


Need to create languages where people can express what usefulness means to them and translate that into technical protocol choices

Explanation

There’s an opportunity to develop interfaces that allow humans to express their needs and preferences in natural ways, which can then be translated into the technical configurations of protocols. This is particularly relevant in the era of agentic AI, where technology can help bridge the gap between human intentions and technical implementation.


Major discussion point

User Adoption and Scalability Challenges


Topics

Sociocultural | Infrastructure | Interdisciplinary approaches


Agreed with

– Sujith Nair
– Wendy Seltzer

Agreed on

Technology should be designed around user needs rather than technical complexity


Protocols should maintain ability for anonymity and pseudonymity online, allowing multiple personas across different communication spheres

Explanation

It’s important to preserve users’ ability to remain anonymous or use pseudonyms online, not just in social communication but across all aspects of digital economy engagement. People should be able to have multiple personas across different aspects of their online activities, distinct from governmental identity which may be appropriate for certain specific uses.


Major discussion point

Protocol Design and Technical Implementation


Topics

Human rights | Privacy and data protection | Digital identities


W

Wendy Seltzer

Speech speed

91 words per minute

Speech length

953 words

Speech time

625 seconds

Building sustainable interoperable systems requires aligning incentives across all ecosystem participants, not just technical solutions

Explanation

Creating lasting interoperable systems is a techno-social challenge that requires more than just building interoperable technology. It involves aligning incentives across all stakeholders and finding stable configurations that preserve interoperability while serving the needs of various participants in the ecosystem.


Evidence

Need for cooperation frameworks and governance frameworks to give people confidence when moving data between platforms; importance of multi-stakeholder dialogues to find solutions serving various participants


Major discussion point

Governance and Multi-stakeholder Collaboration


Topics

Legal and regulatory | Economic | Infrastructure


Agreed with

– Paul Fehlinger
– Jean-Bertrand Azapmo

Agreed on

Multi-stakeholder collaboration is essential for scaling digital infrastructure


Disagreed with

– Sujith Nair

Disagreed on

Sequencing of governance versus adoption in protocol development


Participatory design must include expertise from lived experience alongside technical expertise to create equitable systems

Explanation

Effective participatory design and governance requires including people at all levels of technological sophistication and engagement, from designers and builders to users and non-users. Lived experience from particular backgrounds is as important as technological or legal expertise in creating equitable techno-social constructions.


Evidence

Need to represent experiences of participants from all walks of life; importance of recognizing that expertise can take various forms


Major discussion point

Governance and Multi-stakeholder Collaboration


Topics

Human rights | Development | Sociocultural


Agreed with

– Sujith Nair
– Wes Biggs

Agreed on

Technology should be designed around user needs rather than technical complexity


J

Jean-Bertrand Azapmo

Speech speed

128 words per minute

Speech length

1489 words

Speech time

695 seconds

Digital public infrastructure can unlock value equivalent to 3-13% of GDP, which could help Africa achieve necessary economic growth for emerging market status

Explanation

According to Harvard University estimates, digital public infrastructure can unlock value equivalent to 3-13% of GDP with an average 6% improvement for emerging economies. Since Africa needs 7-10% economic growth over 30-40 years to achieve emerging market status, digital infrastructure investment could significantly accelerate this timeline.


Evidence

Harvard University estimates showing 3-13% GDP value unlock with 6% average improvement for emerging economies; Africa’s need for 7-10% economic growth over 30-40 years for emerging market status


Major discussion point

Fair Data Economy and Digital Infrastructure Transformation


Topics

Economic | Development | Infrastructure


Multi-stakeholderism based on enlightened self-interest can drive investment in digital public infrastructure

Explanation

Since governments are constrained by debt payments (3.3 billion people live in countries spending more on debt interest than available for infrastructure), a new approach based on multi-stakeholder collaboration is needed. Private sector investment is justified by self-interest since businesses will be the first beneficiaries of the economic opportunities unlocked by digital infrastructure.


Evidence

3.3 billion people live in countries that spend more on debt interest payments than they have available for investment; private sector stands to benefit from investing in digital public infrastructure


Major discussion point

Governance and Multi-stakeholder Collaboration


Topics

Economic | Development | Legal and regulatory


Agreed with

– Paul Fehlinger
– Wendy Seltzer

Agreed on

Multi-stakeholder collaboration is essential for scaling digital infrastructure


Governments are constrained by debt payments, requiring private sector and philanthropic investment in digital public infrastructure

Explanation

Many governments cannot invest adequately in digital public infrastructure due to high debt service payments. This creates a need for alternative funding sources including private sector investment and philanthropic contributions to bridge the investment gap.


Evidence

Close to 3.3 billion people live in countries that spend more on debt interest payments than available for infrastructure investment


Major discussion point

Investment and Economic Models


Topics

Economic | Development | Legal and regulatory


Private sector stands to benefit from investing in digital public infrastructure due to immense economic opportunities

Explanation

Businesses have strong economic incentives to invest in digital public infrastructure because they will be the primary beneficiaries of the economic growth and opportunities it creates. This creates a win-win situation for all stakeholders rather than relying on philanthropic motivations alone.


Major discussion point

Investment and Economic Models


Topics

Economic | Development


Governments should create legal foundations and enabling environments for digital public infrastructure while recognizing their limitations

Explanation

Governments have important roles in establishing legal frameworks like data protection laws, trade agreements, and investment guarantees that create conducive environments for digital infrastructure development. However, they must also recognize their financial limitations and work with other stakeholders.


Evidence

Malabo Convention on data protection in Africa; African Continental Free Trade Area (AFCFDA) adoption; examples of public-private partnerships in sectors like minerals that can be replicated in digital economy


Major discussion point

Regional Perspectives and Government Role


Topics

Legal and regulatory | Development | Infrastructure


Examples like M-Pesa in Kenya show private sector can lead digital infrastructure development independently

Explanation

The M-Pesa mobile payment revolution in Kenya demonstrates that private sector initiatives can successfully develop and deploy digital infrastructure solutions without waiting for government leadership or extensive public investment.


Evidence

M-Pesa revolution in Kenya was entirely private sector led


Major discussion point

Regional Perspectives and Government Role


Topics

Economic | Infrastructure | Development


X

Xianhong Hu

Speech speed

143 words per minute

Speech length

347 words

Speech time

144 seconds

Need for governments to balance data protection with harnessing data’s economic potential, possibly through new institutions or expanding existing data authorities

Explanation

Governments have traditionally focused on data protection and privacy rights, but now need to equally emphasize harnessing data’s potential for economic development. This may require creating new institutions for data agency/stewardship or expanding the capacity of existing data protection authorities to handle data economy challenges.


Evidence

120 countries have already created data protection authorities; recognition that equal attention hasn’t been given to harnessing data potential compared to protection


Major discussion point

Regional Perspectives and Government Role


Topics

Legal and regulatory | Human rights | Economic


A

Audience

Speech speed

130 words per minute

Speech length

108 words

Speech time

49 seconds

Need to recognize and protect the right for people to remain anonymous online in interconnected internet systems

Explanation

With the advent of interconnected protocols like DSNP where workplace and political social networks might use the same account, there’s a concern about maintaining anonymity rights. The question addresses whether future internet infrastructure will accommodate people’s desire to keep different aspects of their digital lives separate and anonymous.


Evidence

Example given of workplace potentially using same account as political opinions on different social networks


Major discussion point

Protocol Design and Technical Implementation


Topics

Human rights | Privacy and data protection | Digital identities


Agreements

Agreement points

Current digital economy model is fundamentally flawed and needs transformation

Speakers

– Paul Fehlinger
– Sarah Leif
– Sujith Nair

Arguments

Current digital economy has negative externalities on market structures, societies, and democracies due to existing business models and infrastructure


Digital infrastructure design affects whether economic power is concentrated or distributed, and whether innovation is stifled or encouraged


Beckn protocol enables interoperability by allowing consumers and providers to transact without being locked into single platforms, giving users control over their data and revenue


Summary

All speakers agree that the current centralized platform-based digital economy creates harmful concentrations of power and negative impacts on society, requiring a fundamental shift toward more distributed, user-controlled systems.


Topics

Economic | Infrastructure | Sociocultural


User agency and data control are fundamental principles for fair digital economy

Speakers

– Paul Fehlinger
– Sujith Nair
– Wes Biggs
– Wendy Seltzer

Arguments

Need to rewire the data economy to build a better ecosystem that works for all actors with people having agency over their data


Beckn protocol enables interoperability by allowing consumers and providers to transact without being locked into single platforms, giving users control over their data and revenue


DSNP provides affordances for long-lived identity, attestation, universal social graph, and social content that can be ported between applications


Building sustainable interoperable systems requires aligning incentives across all ecosystem participants, not just technical solutions


Summary

There is strong consensus that giving users control over their data and digital identity is essential for creating a fair data economy, with multiple speakers advocating for protocols that enable data portability and user agency.


Topics

Human rights | Infrastructure | Economic


Technology should be designed around user needs rather than technical complexity

Speakers

– Sujith Nair
– Wes Biggs
– Wendy Seltzer

Arguments

Technology should meet society at its level rather than expecting society to rise to technology’s complexity


Users don’t care about technical terms like ‘interoperability’ – they need to see practical value in their daily lives


Need to create languages where people can express what usefulness means to them and translate that into technical protocol choices


Participatory design must include expertise from lived experience alongside technical expertise to create equitable systems


Summary

All speakers emphasize the importance of user-centered design that prioritizes practical value and accessibility over technical sophistication, recognizing that users need to see tangible benefits rather than understand complex protocols.


Topics

Development | Sociocultural | Infrastructure


Multi-stakeholder collaboration is essential for scaling digital infrastructure

Speakers

– Paul Fehlinger
– Wendy Seltzer
– Jean-Bertrand Azapmo

Arguments

Scaling requires systemic approach across four pillars: entrepreneurship/business models, digital infrastructure, policy innovation, and strategic capital allocation


Building sustainable interoperable systems requires aligning incentives across all ecosystem participants, not just technical solutions


Multi-stakeholderism based on enlightened self-interest can drive investment in digital public infrastructure


Summary

There is consensus that successful scaling of alternative digital infrastructure requires coordinated efforts across multiple stakeholders including government, private sector, and civil society, with aligned incentives rather than relying on any single actor.


Topics

Legal and regulatory | Economic | Infrastructure


Similar viewpoints

Both speakers advocate for a pragmatic approach where implementation and value demonstration come before formal governance structures, with examples from developing countries showing successful private sector-led initiatives.

Speakers

– Sujith Nair
– Jean-Bertrand Azapmo

Arguments

Adoption should precede formal governance structures – demonstrating value to users first, then stabilizing with governance frameworks


Examples like M-Pesa in Kenya show private sector can lead digital infrastructure development independently


Topics

Legal and regulatory | Economic | Development


Both emphasize the importance of preserving user privacy and anonymity rights in interconnected digital systems, allowing people to maintain separate digital personas across different contexts.

Speakers

– Wes Biggs
– Audience

Arguments

Protocols should maintain ability for anonymity and pseudonymity online, allowing multiple personas across different communication spheres


Need to recognize and protect the right for people to remain anonymous online in interconnected internet systems


Topics

Human rights | Privacy and data protection | Digital identities


Both speakers see the private sector as a key driver of digital infrastructure development, with business incentives aligned with social impact through new economic models and value distribution approaches.

Speakers

– Paul Fehlinger
– Jean-Bertrand Azapmo

Arguments

Need centers of gravity for impact-focused entrepreneurship that rethinks value distribution and creates new business models


Private sector stands to benefit from investing in digital public infrastructure due to immense economic opportunities


Topics

Economic | Development | Infrastructure


Unexpected consensus

Governance should follow adoption rather than precede it

Speakers

– Sujith Nair
– Wendy Seltzer

Arguments

Adoption should precede formal governance structures – demonstrating value to users first, then stabilizing with governance frameworks


Participatory design must include expertise from lived experience alongside technical expertise to create equitable systems


Explanation

This represents unexpected consensus between a protocol implementer and a governance expert, both agreeing that formal governance structures should be built after demonstrating practical value to users, rather than the traditional approach of establishing governance frameworks first.


Topics

Legal and regulatory | Development | Sociocultural


Technical complexity should be hidden from users while preserving their agency

Speakers

– Sujith Nair
– Wes Biggs
– Sarah Leif

Arguments

Users don’t care about technical terms like ‘interoperability’ – they need to see practical value in their daily lives


Need to create languages where people can express what usefulness means to them and translate that into technical protocol choices


Most users remain stuck on centralized platforms despite available alternative solutions, indicating scalability issues


Explanation

There’s unexpected consensus among technical implementers that users should not need to understand technical concepts to benefit from them, which challenges the common assumption in decentralized technology communities that user education about technical principles is necessary.


Topics

Infrastructure | Sociocultural | Development


Overall assessment

Summary

The speakers demonstrate remarkably high consensus on fundamental principles including the need for user agency, the flaws of current centralized systems, the importance of user-centered design, and the necessity of multi-stakeholder collaboration. There is also strong agreement on practical approaches like demonstrating value before formalizing governance and hiding technical complexity from users.


Consensus level

Very high consensus with no significant disagreements identified. This strong alignment suggests the fair data economy movement has achieved substantial conceptual unity across different stakeholder groups (technical implementers, governance experts, policy makers, and regional representatives). The implications are positive for coordinated action and scaling efforts, as the main challenge appears to be implementation and adoption rather than fundamental disagreements about direction or principles.


Differences

Different viewpoints

Sequencing of governance versus adoption in protocol development

Speakers

– Sujith Nair
– Wendy Seltzer

Arguments

Adoption should precede formal governance structures – demonstrating value to users first, then stabilizing with governance frameworks


Building sustainable interoperable systems requires aligning incentives across all ecosystem participants, not just technical solutions


Summary

Sujith Nair advocates for adoption-first approach where governance follows after demonstrating value, while Wendy Seltzer emphasizes the need for governance frameworks and aligned incentives from the beginning to ensure sustainability


Topics

Legal and regulatory | Economic | Infrastructure


Unexpected differences

Limited disagreement on fundamental approaches despite different regional contexts

Speakers

– Sujith Nair
– Jean-Bertrand Azapmo
– Wes Biggs

Arguments

Technology should meet society at its level rather than expecting society to rise to technology’s complexity


Digital public infrastructure can unlock value equivalent to 3-13% of GDP, which could help Africa achieve necessary economic growth for emerging market status


DSNP challenges centralized systems by avoiding single points of failure and creating consensus mechanisms where no single entity can override the system


Explanation

Despite representing very different regional contexts (India, Africa, global protocol development), speakers showed remarkable alignment on core principles. The lack of significant disagreement between regional approaches was unexpected given the different economic and infrastructure contexts they represent


Topics

Development | Infrastructure | Economic


Overall assessment

Summary

The discussion showed strong consensus on fundamental principles with only minor disagreements on implementation approaches, particularly around governance timing and stakeholder coordination strategies


Disagreement level

Very low level of disagreement. The speakers demonstrated remarkable alignment on core principles of data agency, interoperability, and the need for systemic change. The few disagreements were primarily about tactical approaches rather than strategic goals. This high level of consensus suggests either a well-aligned community of practice or potentially indicates that more diverse viewpoints were not represented in the discussion. The implications are positive for advancing the fair data economy agenda, as there appears to be strong foundational agreement among key stakeholders, though broader stakeholder engagement may be needed to surface additional perspectives and potential challenges.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers advocate for a pragmatic approach where implementation and value demonstration come before formal governance structures, with examples from developing countries showing successful private sector-led initiatives.

Speakers

– Sujith Nair
– Jean-Bertrand Azapmo

Arguments

Adoption should precede formal governance structures – demonstrating value to users first, then stabilizing with governance frameworks


Examples like M-Pesa in Kenya show private sector can lead digital infrastructure development independently


Topics

Legal and regulatory | Economic | Development


Both emphasize the importance of preserving user privacy and anonymity rights in interconnected digital systems, allowing people to maintain separate digital personas across different contexts.

Speakers

– Wes Biggs
– Audience

Arguments

Protocols should maintain ability for anonymity and pseudonymity online, allowing multiple personas across different communication spheres


Need to recognize and protect the right for people to remain anonymous online in interconnected internet systems


Topics

Human rights | Privacy and data protection | Digital identities


Both speakers see the private sector as a key driver of digital infrastructure development, with business incentives aligned with social impact through new economic models and value distribution approaches.

Speakers

– Paul Fehlinger
– Jean-Bertrand Azapmo

Arguments

Need centers of gravity for impact-focused entrepreneurship that rethinks value distribution and creates new business models


Private sector stands to benefit from investing in digital public infrastructure due to immense economic opportunities


Topics

Economic | Development | Infrastructure


Takeaways

Key takeaways

The current centralized digital economy creates negative externalities and concentrates power, requiring a shift toward fair data economy principles that give people agency over their data


Technical solutions like Beckn protocol and DSNP demonstrate that interoperable, decentralized alternatives can work at scale – Beckn has processed 200 million transactions in India across multiple sectors


User adoption requires meeting people where they are rather than expecting technical sophistication – technology should adapt to society’s level, not vice versa


Scaling next-generation digital infrastructure requires a systemic approach across four pillars: entrepreneurship/business models, technical infrastructure, policy innovation, and strategic capital allocation


Digital public infrastructure can unlock 3-13% of GDP value, making it crucial for developing economies like Africa to achieve growth targets


Multi-stakeholder collaboration based on enlightened self-interest is essential since governments alone lack resources to invest in digital public infrastructure


Interoperability and data agency must translate into visible daily value for users rather than remaining abstract technical concepts


Participatory governance must include diverse forms of expertise, including lived experience alongside technical knowledge


Resolutions and action items

Continue discussions in a closed-door session at 2pm for interested participants to deep dive on the topics


Refer participants to ProjectLiberty.io for Fair Data Economy Recommendations and Digital Infrastructure for Data Agency Report


Demonstrate adoption before formalizing governance structures – show value to users first, then stabilize with governance frameworks


Create legal foundations and enabling environments for digital public infrastructure development


Develop centers of gravity for impact-focused entrepreneurship that rethinks value distribution


Unresolved issues

How to bridge existing alternative solutions to achieve greater collaboration and scalability beyond individual protocol successes


Whether governments should create new data agency institutions or expand existing data protection authorities to handle data economy opportunities


How to balance data protection with harnessing data’s economic potential across different regional contexts


Specific mechanisms for mobilizing private capital and innovative financing for digital public infrastructure at scale


How to ensure anonymity and pseudonymity rights are preserved in interconnected digital infrastructure systems


Regional differences in challenges and approaches across Asia, Africa, and Latin America were requested but not fully addressed due to time constraints


Suggested compromises

Technology should meet society at its current level rather than expecting users to become technically sophisticated


Balance between providing technical control/agency and creating simple, intuitive user experiences with strong defaults


Combine private sector investment with government enabling frameworks rather than relying solely on either approach


Allow multiple identity personas within protocols to balance connectivity with privacy/anonymity needs


Start with demonstrating practical value to users while building toward more formal governance structures over time


Thought provoking comments

Sometimes otherwise we just keep losing this conversation in a more techno and a policy circles, but how does it matter in the hands of people is something that I think is a very important aspect of how we talk about interoperability and demonstrate interoperability.

Speaker

Sujith Nair


Reason

This comment cuts to the heart of a fundamental disconnect in tech development – the gap between technical capabilities and real-world user value. It challenges the common assumption that technical excellence alone drives adoption and highlights the need for value-first design.


Impact

This shifted the conversation from abstract protocol discussions to concrete user experience considerations. It prompted Sarah to directly address the ‘technical savviness’ question and led to deeper exploration of how to bridge the gap between technical innovation and user adoption.


I think we need to look at this as a techno-social challenge, that it’s not just a matter of building interoperable tech and the people will come and the solutions will come out of that. It’s also a matter of figuring out how we as society and as builders of ecosystems will align the incentives so that there are stable configurations that preserve interoperability.

Speaker

Wendy Seltzer


Reason

This reframes the entire discussion from a purely technical problem to a complex socio-economic challenge. It introduces the critical concept that technology alone cannot solve adoption problems – social and economic incentives must be aligned.


Impact

This comment elevated the discussion beyond technical specifications to systemic thinking about incentive structures. It influenced subsequent speakers to address governance, economic models, and multi-stakeholder approaches rather than just technical features.


We don’t think about society rising up to the level of technology. It’s the other way. We think about taking technology to the level where the society operates… what is abundant are the textbooks… So why don’t we use that abundance and think of technology around it?

Speaker

Sujith Nair


Reason

This fundamentally inverts the traditional tech development paradigm. Instead of expecting users to adapt to technology, it advocates for technology to adapt to existing social structures and behaviors. The textbook/QR code example provides a concrete illustration of this principle in action.


Impact

This comment provided a practical framework for thinking about technology adoption that influenced the entire panel’s perspective on scaling solutions. It demonstrated how successful digital infrastructure can leverage existing social abundance rather than trying to replace it.


Close to 3 billion people or 3.3 billion people… live in countries that spend more on debt interest payment. So, they therefore do not have the resources to be able to invest in digital public infrastructure. This is the dilemma… It means a new approach is needed. This is where multi-stakeholderism really holds a great potential.

Speaker

Jean-Bertrand Azapmo


Reason

This comment introduces stark economic realities that constrain government-led digital infrastructure development, particularly in developing nations. It reframes the scaling challenge from a technical or adoption problem to a fundamental resource allocation and financing challenge.


Impact

This shifted the conversation to acknowledge the critical role of financing and multi-stakeholder approaches in scaling digital infrastructure. It grounded the discussion in real-world economic constraints and highlighted why traditional government-led approaches may be insufficient.


We really need to find ways to mobilize smart capital across private markets… Nothing works without money. So we really need to find ways to mobilize smart capital… And how do we complement this by more innovative financing mechanisms?

Speaker

Paul Fehlinger


Reason

This directly addresses the elephant in the room – that all the technical innovation and governance frameworks are meaningless without adequate funding mechanisms. It challenges the tech community to think beyond building to consider sustainable financing models.


Impact

This comment forced the discussion to confront the economic realities of scaling alternative digital infrastructure. It highlighted that technical solutions need to be coupled with viable business models and investment strategies to achieve meaningful scale.


It’s important in participatory design to recognize that expertise can take a variety of forms and that lived experience of a particular background is as important as technological expertise or legal expertise to making an equitable techno-social construction that works for people.

Speaker

Wendy Seltzer


Reason

This challenges traditional hierarchies of expertise in technology development and advocates for genuine inclusion of diverse perspectives, not just token representation. It suggests that technical expertise alone is insufficient for creating equitable systems.


Impact

This comment reinforced the theme of user-centered design and influenced the discussion toward more inclusive governance models. It provided a framework for thinking about how to genuinely include diverse stakeholders in protocol development and governance.


Overall assessment

These key comments fundamentally shifted the discussion from a technology-centric conversation to a holistic examination of the socio-economic challenges of scaling alternative digital infrastructure. The most impactful insights challenged common assumptions in the tech community: that technical excellence drives adoption, that users should adapt to technology rather than vice versa, and that governance and financing are secondary concerns. Sujith Nair’s practical examples from India provided concrete evidence for these alternative approaches, while Wendy Seltzer’s framing of techno-social challenges provided the theoretical foundation. Jean-Bertrand’s economic realities grounded the discussion in global development constraints, and Paul’s emphasis on financing highlighted often-overlooked practical barriers. Together, these comments created a more nuanced understanding of what it actually takes to scale fair data economy solutions – moving beyond protocol specifications to address user value, economic incentives, inclusive governance, and sustainable financing models.


Follow-up questions

How can we bridge all these solutions that exist in the ecosystem but are not scalable enough to gather enough users? What’s missing today for these solutions to truly collaborate better to represent a scalable alternative to a centralized digital economy?

Speaker

Sarah Leif


Explanation

This addresses the core challenge of scaling alternative digital infrastructure solutions beyond their current limited adoption to compete with centralized platforms.


How do we work with interoperability to beat network effects when most users are still stuck on centralized platforms?

Speaker

Sarah Leif


Explanation

This explores the technical and strategic approaches needed to overcome the powerful network effects that keep users locked into existing centralized platforms.


How do we go beyond the obstacles of technically assuming people have a certain level of ability to understand decentralized technologies? How do we demonstrate value to users who don’t understand technical terms?

Speaker

Sarah Leif


Explanation

This addresses the user experience challenge of making complex decentralized technologies accessible and valuable to non-technical users.


Do you think users should know about all the technicalities and protocols, or is it fine if they don’t know anything about it but have transparency to look if interested? What level of technical savviness should users need?

Speaker

Sarah Leif


Explanation

This philosophical question explores the balance between user empowerment through technical understanding versus seamless user experience that abstracts away complexity.


What are the implications for governments in face of the multi-trillion dollar data economy? What should governments do regarding institutional capacity building and new approaches?

Speaker

Xianhong Hu (UNESCO)


Explanation

This addresses the policy and governance challenges governments face in supporting fair data economy development while protecting citizens’ rights.


Should we recommend governments create new institutions for data agency/stewardship, or encourage existing data protection authorities to expand their capacity?

Speaker

Xianhong Hu (UNESCO)


Explanation

This explores institutional design questions for how governments can best support fair data economy principles through appropriate regulatory structures.


Is there any plan to recognize the right for people to remain anonymous on interconnected networks where workplace and political accounts might be linked?

Speaker

Veronica (Youth Pirate Party of Sweden)


Explanation

This addresses privacy and anonymity concerns in interconnected protocol systems where different aspects of users’ lives might become linked.


How can we mobilize smart capital across private markets and innovative financing mechanisms to scale fair data economy ventures?

Speaker

Paul Fehlinger


Explanation

This addresses the critical funding gap for scaling alternative digital infrastructure and fair data economy solutions.


How can we create centers of gravity for impact-focused entrepreneurship that rethinks value distribution and creates new business models blending economic growth with data agency?

Speaker

Paul Fehlinger


Explanation

This explores the ecosystem development needed to support entrepreneurs building fair data economy solutions.


How do we align incentives so there are stable configurations that preserve interoperability in techno-social systems?

Speaker

Wendy Seltzer


Explanation

This addresses the governance challenge of maintaining interoperability when different stakeholders have competing interests.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Open Forum #29 Advancing Digital Inclusion Through Segmented Monitoring

Open Forum #29 Advancing Digital Inclusion Through Segmented Monitoring

Session at a glance

Summary

This discussion focused on advancing digital inclusion through improved segmentation of data collection for better and more targeted decision-making. The panel, moderated by Morten Meyerhoff Nielsen from UNU eGov, brought together experts from UNESCO, Research ICT Africa, the Global Digital Inclusion Partnership (GDIP), and CETIC Brazil to address the challenge that about one-third of the world’s population remains excluded from meaningful internet access.


The panelists emphasized that current frameworks for measuring digital inclusion are often supply-oriented, focusing on basic questions like “have you used the internet in the last 12 months” rather than examining the quality and type of digital activities. Guilherme from UNESCO highlighted their Internet Universality Indicators based on five pillars: rights, openness, accessibility, multi-stakeholderism, and cross-cutting elements like gender. Onica from GDIP stressed the importance of understanding gender-specific barriers through both quantitative and qualitative research, noting that national averages often fail to serve women and marginalized communities effectively.


The discussion revealed that segmented data collection helps identify hidden gaps and context-specific barriers that wouldn’t emerge from general surveys. For example, research in South Africa showed that digital centers built for rural women went unused due to safety concerns and incompatible operating hours with women’s daily routines. Fabio from CETIC Brazil shared how their multi-stakeholder approach to data collection, funded through domain name registry profits, allows for continuous monitoring and policy-relevant insights.


Key challenges identified included ensuring data privacy and dignity for marginalized communities, preventing data from reinforcing existing inequalities, and making research sustainable and accessible. The panelists agreed that effective digital inclusion requires moving beyond individual-focused metrics to understand collective and household-level dynamics, while balancing innovation with rigorous traditional methodologies to create actionable insights for policymakers.


Keypoints

## Major Discussion Points:


– **Need for Better Data Segmentation**: The panel emphasized moving beyond basic “have you used the internet” metrics to more nuanced segmentation by gender, income levels, geography, education, age, and disability status. This granular data is essential for identifying specific barriers and designing targeted interventions rather than one-size-fits-all solutions.


– **Qualitative vs. Quantitative Approaches**: There was strong consensus that quantitative data alone is insufficient. The discussion highlighted the importance of combining statistical data with qualitative research, policy ethnography, and community engagement to understand the lived experiences and contextual barriers that prevent meaningful digital inclusion.


– **Privacy and Ethical Data Collection**: A significant portion focused on balancing the need for detailed segmentation with privacy protection and dignity of marginalized communities. The panel discussed using anonymized data, local participation in data collection, and decolonized research approaches to build trust and ensure ethical practices.


– **Institutional Models and Sustainability**: The conversation explored different funding and organizational models for sustained data collection, including Brazil’s CETIC model funded by domain registry fees, partnerships with telecommunications companies, and the challenge of making segmented data collection financially sustainable long-term.


– **From Data to Policy Action**: The panel addressed the critical gap between collecting good data and translating it into effective policy interventions. They emphasized the need for capacity building among policymakers, accountability frameworks, and ensuring that data insights actually reach and benefit the communities being studied.


## Overall Purpose:


The discussion aimed to explore how improved segmentation of data collection can advance digital inclusion by enabling better-targeted decision-making. The panel sought to identify best practices for collecting, analyzing, and utilizing granular data to address the digital divide more effectively, while ensuring ethical approaches that respect marginalized communities.


## Overall Tone:


The discussion maintained a collaborative and constructive tone throughout, with panelists building on each other’s insights rather than debating. The tone was professional yet passionate, reflecting the participants’ deep commitment to digital inclusion. There was a notable shift toward more cautionary and nuanced thinking as the conversation progressed, particularly around privacy concerns and the potential for data to reinforce existing inequalities. The panel became increasingly focused on practical implementation challenges and sustainability concerns as the discussion evolved.


Speakers

**Speakers from the provided list:**


– **Morten Meyerhoff Nielsen** – Moderator from UNU eGov (United Nations University eGovernance programme)


– **Guilherme Canela De Souza Godoi** – From UNESCO’s Information for All Program (IFAP)


– **Pria Chetty** – From Research ICT Africa, lawyer with expertise in data collection and digital inclusion research


– **Onica Makwakwa** – From Global Digital Inclusion Partnership/Program (GDIP), works on gender-focused digital inclusion research


– **Fabio Senne** – From CETIC Brazil (Brazilian Internet Steering Committee’s Center for Studies on Information and Communication Technologies), focuses on digital inclusion data and statistics


– **Carmen Ferri** – Online moderator from Global Digital Inclusion Program


– **Audience** – Various audience members who asked questions during the session


**Additional speakers:**


– **Kiho Oshima** – Master’s student at University of Bremen in Germany, studying digital media and society


Full session report

# Advancing Digital Inclusion Through Improved Data Segmentation: A Comprehensive Panel Discussion Report


## Introduction and Context


This panel discussion, moderated by Morten Meyerhoff Nielsen from the United Nations University eGovernance programme (UNU eGov), brought together leading experts to address one of the most pressing challenges in digital development: how to advance digital inclusion through improved segmentation of data collection for better and more targeted decision-making. With approximately one-third of the world’s population remaining excluded from meaningful internet access, the discussion focused on moving beyond traditional binary connectivity measures to develop more nuanced approaches to understanding and addressing digital divides.


The panel featured distinguished speakers from key international organisations: Guilherme Canela De Souza Godoi from UNESCO’s Information for All Program (IFAP), Pria Chetty from Research ICT Africa, Onica Makwakwa from the Global Digital Inclusion Partnership (GDIP), and Fabio Senne from CETIC Brazil. Carmen Ferri served as online moderator, facilitating questions from virtual participants. It should be noted that Guilherme left early in the session, so later discussions primarily involved the remaining three panelists.


## Current Limitations of Digital Inclusion Measurement


### The Inadequacy of Basic Connectivity Metrics


The discussion began with a fundamental critique of existing digital inclusion measurement frameworks. Morten established the central problem by highlighting that current frameworks are predominantly supply-oriented, focusing on basic questions such as “have you used the internet in the last 12 months” rather than examining the quality and type of digital activities that constitute meaningful connectivity.


Fabio Senne provided compelling evidence of this measurement gap through Brazil’s experience. While Brazil reports 90% basic internet access, their meaningful connectivity indicators reveal a starkly different reality: only 22% of the total population meets the criteria for meaningful connectivity when factors such as device availability, connection quality, affordability, and digital skills are considered. This dramatic difference between surface-level statistics and deeper analysis became a cornerstone of the discussion, demonstrating how conventional metrics can mask significant inequalities.


### The Problem with National Averages


Onica Makwakwa articulated a particularly powerful critique of aggregate data approaches, stating that “national averages are just simply not serving women. They are not serving everyone else as well.” She provided concrete examples from South Africa, explaining that any affordability analysis conducted without stratifying income quantiles would produce over-inflated outcomes that fail to represent those at the bottom of income distributions, noting that more than half of the population lives on less than half of the gross national income.


This observation highlighted how statistical methodology itself can perpetuate inequality by masking the experiences of the most vulnerable populations. The critique extended beyond simple statistical concerns to fundamental questions about whose experiences are made visible or invisible through data collection choices.


## Institutional Models and Frameworks


### UNESCO’s Comprehensive Approach


Guilherme Canela De Souza Godoi presented UNESCO’s work through three main areas. First, the Internet Universality Indicators based on five pillars: rights, openness, accessibility, multi-stakeholderism, and cross-cutting elements including gender. Second, mandatory monitoring exercises that provide member states with evidence-based frameworks for policy development. Third, guidance documents that help countries implement comprehensive digital inclusion measurement approaches.


The UNESCO framework represents an attempt to standardise comprehensive digital inclusion measurement while maintaining flexibility for local contexts, moving beyond simple connectivity measures to encompass the broader ecosystem of factors that enable meaningful digital participation.


### Brazil’s Multi-Stakeholder Model


Fabio Senne described CETIC Brazil’s innovative institutional model, which uses a multi-stakeholder approach with expert groups to define measurement priorities and adjust data production to meet decision-maker demands. Significantly, this model is funded through domain name registry profits, providing sustainable financing that enables continuous monitoring and policy-relevant insights.


The Brazilian model demonstrates how institutional design can support comprehensive data collection by creating stable funding mechanisms and ensuring that research priorities align with policy needs. Fabio also mentioned their C-MAT system for testing broadband quality in Brazilian schools, providing real-time connectivity quality monitoring.


### International Recognition and Coordination


Fabio noted that the G20 has recognised the need for segmented monitoring beyond basic connectivity, mentioning reports produced during both Brazilian and South African presidencies that require disaggregation by demographic, economic, and geographic variables. This international recognition suggests growing consensus among major economies about the limitations of traditional connectivity metrics.


## The Case for Segmented Data Collection


### Gender-Disaggregated Analysis


The panel devoted considerable attention to gender-specific barriers that emerge only through segmented data collection. Onica shared research findings showing that while overall figures might suggest minimal gender gaps in basic internet access, segmented analysis reveals significant disparities. Fabio mentioned that Brazil shows a 10% gap between women and men in meaningful connectivity despite similar basic access rates.


More importantly, segmented data collection reveals gender-specific barriers that regular surveys miss entirely. These include affordability constraints that disproportionately affect women, safety concerns about accessing digital services, and monitoring by family members that restricts women’s digital autonomy. Onica provided a striking example of digital centres built for rural women that went unused because they failed to account for women’s daily schedules and safety concerns about walking to the centres.


### Geographic and Socioeconomic Segmentation


The discussion revealed sophisticated thinking about geographic classification that moves beyond simple rural-urban binaries. Onica noted that peri-urban populations often experience challenges similar to rural communities due to urban inequality, requiring more nuanced geographic classification systems.


Fabio added that geographic disaggregation within cities reveals unexpected patterns, providing an example from São Paulo where they found neighborhoods with high connectivity but low socioeconomic status, challenging assumptions about urban digital inclusion. Perhaps most surprisingly, Fabio revealed that most disconnected people are actually located in urban areas due to population concentration, fundamentally challenging conventional wisdom about where digital exclusion occurs.


### Revealing Hidden Barriers Through Qualitative Approaches


The speakers consistently emphasised that quantitative data alone is insufficient for understanding digital inclusion challenges. Onica advocated for qualitative approaches and policy ethnography to surface hidden gaps and context-specific barriers that quantitative surveys cannot capture. Pria described Research ICT Africa’s after-access research, which combines quantitative and qualitative methods to understand usage patterns, digital literacy levels, and trust issues that affect meaningful connectivity.


These qualitative approaches reveal barriers that would never emerge from standard surveys, such as cultural norms around technology use, intergenerational dynamics affecting device access, and community-specific safety concerns that influence digital participation.


## From Individual to Collective Approaches


### Rethinking the Unit of Analysis


Fabio Senne introduced a significant shift by arguing that digital inclusion should be viewed as collective rather than individual challenges. He noted that most research interviews one individual and tries to think about digital inclusion as an individual characteristic, but “most of the problems are collective problems.”


CETIC Brazil has begun calculating ratios of people per device and examining what percentage of household income is required for device access, thinking of “the household as a collective of people rather than individual.” This approach reveals important dynamics like device-sharing patterns and income allocation decisions that individual-focused measures miss entirely.


### Community Networks and Collective Solutions


The collective approach extends beyond households to consider community networks, schools, and libraries as digital inclusion infrastructure. Onica provided an example of successful collective intervention: a tablet per household programme in Uganda that successfully empowered female-led households, with unexpected benefits for children’s education. This example demonstrated how household-level interventions can create ripple effects that benefit multiple family members.


## Methodological Innovation and Alternative Data Sources


### Combining Traditional and Innovative Approaches


The panel explored various approaches to methodological innovation while maintaining rigorous standards. Fabio advocated for combining surveys with geospatial data and other sources, highlighting the potential of citizen-generated data and satellite data as complementary sources that can be combined with traditional surveys.


However, the speakers consistently emphasised the importance of balancing innovation with traditional rigorous methodologies. Pria warned that there are “high levels of interest in the data, but not always in the process to collect the data,” highlighting the risk that methodological shortcuts could undermine data quality and community participation.


### Leveraging Existing Data Infrastructure


Onica identified national census data as an underutilised resource that could include digital-related questions with proper engagement of census bureaus. This approach could leverage existing, well-funded data collection infrastructure that occurs regularly across countries, potentially reducing the burden and cost of separate digital inclusion surveys.


The speakers also discussed the potential for partnerships with telecommunications operators, who hold valuable segmented data that could support policy decisions through partnerships with regulators. However, these partnerships raise questions about data governance and ensuring that commercial interests align with public good objectives.


## Ethical Considerations and Community Participation


### Privacy and Dignity Concerns


A significant portion of the discussion focused on balancing the need for detailed segmentation with privacy protection and dignity of marginalised communities. Carmen Ferri posed a critical question: “How can we ensure that the segmented data collection respects the privacy and dignity of marginalised communities?”


Pria explained that while anonymised data collection for policy purposes typically falls outside personal data protection regulations, it should still follow ethical standards. She advocated for local participation in data collection to address privacy concerns and ensure willing participation from communities. However, she also expressed caution about data aggregation, noting the potential for “massive harm” when data is brought together inappropriately.


### Decolonised Research Approaches


Onica strongly advocated for decolonised approaches to data collection, emphasising the importance of working with local partners rather than having external researchers study communities. She provided a striking critique of problematic research narratives, specifically mentioning studies that compare mobile phone ownership to toothbrush ownership in ways that expose “the ignorance of the researcher themselves” by failing to recognise alternative approaches to dental health.


This critique highlighted how researchers’ cultural blind spots can lead to problematic narratives about the communities they study. Onica consistently emphasised that communities should be involved in leading data collection processes rather than being passive subjects of external research.


### Preventing Data Misuse


Kiho Oshima, a master’s student from the University of Bremen, raised important questions about preventing segmented data from being used to reinforce marginalisation. This concern reflects the fundamental tension between needing data about vulnerable populations to help them while simultaneously protecting them from potential harms.


Onica provided a concrete example of this risk, describing how South Africa’s COVID-19 tracking app led to people receiving political SMS messages, demonstrating how well-intentioned data collection can be misused. The speakers acknowledged this tension but emphasised that ongoing vigilance and community participation in data governance are essential.


## Sustainability and Implementation Challenges


### Funding and Incentive Structures


Pria identified sustainability as a critical challenge, noting the disconnect between high levels of interest in data and limited willingness to invest in rigorous collection processes. She warned that without building compelling incentive structures for private sector participation, “this work will not be sustainable, because it will be replaced by quicker technical measures that don’t necessarily have the rigour attached to it.”


The discussion explored various funding models, with Brazil’s domain registry funding serving as one successful example of sustainable financing. However, most countries lack similar dedicated funding mechanisms, creating ongoing challenges for maintaining comprehensive data collection efforts.


### Building Private Sector Partnerships


Despite typical concerns about private sector data control, there was consensus that partnerships with private sector entities, particularly telecommunications companies, are essential for sustainable and comprehensive data collection. However, building these partnerships requires creating compelling incentive structures that align commercial interests with public good objectives.


## Key Areas of Agreement and Ongoing Tensions


### Methodological Consensus


The speakers demonstrated strong consensus on fundamental methodological issues. All agreed that traditional binary connectivity measures are insufficient and that comprehensive segmented data collection is essential. There was strong alignment on the importance of qualitative approaches and local context in data collection, with consistent emphasis that quantitative data alone cannot capture the complexity of digital inclusion challenges.


### Approaches to Data Integration


The main area of tension emerged around data aggregation and sharing approaches. Pria expressed strong caution about bringing data together, warning about the potential for “massive harm” and vulnerabilities in data lakes, emphasising the need for deliberate and well-intentioned processes with robust accountability mechanisms.


In contrast, Onica advocated more optimistically for mapping and coordinating existing data sources, focusing on the practical benefits of reducing survey burden and improving research efficiency. This disagreement reflects different risk tolerances and approaches to data coordination.


## Practical Recommendations and Next Steps


### Immediate Actions


Morten noted that the panel discussion would be summarised and shared online, with panellists having the opportunity to comment on the draft. Participants were encouraged to reach out to panellists and their organisations for further questions and collaboration.


### Methodological Innovations


The speakers suggested several practical approaches: using layered data approaches where national-level data provides ‘heat maps’ to identify problem areas before diving deeper with contextual analysis; combining multiple data sources rather than relying on single collection methods; and engaging with national census bureaus to include digital-related questions.


### Governance and Ethics


The discussion pointed toward applying data protection standards to non-personal data as a precautionary measure, even when not legally required. There was emphasis on creating data mapping exercises within countries to coordinate existing data sources rather than centralising all data in one location.


## Conclusion


This comprehensive panel discussion revealed both the urgent need for and the significant challenges involved in advancing digital inclusion through improved data segmentation. The speakers demonstrated remarkable consensus on the inadequacy of current measurement approaches and the necessity of moving toward more nuanced, community-participatory, and ethically grounded data collection methods.


The discussion successfully challenged fundamental assumptions about how digital inclusion should be measured and understood, from questioning the value of national averages to advocating for collective rather than individual approaches to analysis. The speakers provided compelling evidence that current frameworks mask significant inequalities and fail to capture the lived experiences of marginalised communities.


However, the discussion also revealed the complexity of implementing better approaches. Questions about sustainability, privacy protection, preventing data misuse, and balancing innovation with rigour remain ongoing challenges. The tension between the need for detailed segmentation and the protection of vulnerable communities represents a continuing challenge that requires sustained attention and innovation.


The panel’s emphasis on decolonised approaches, community participation, and collective solutions suggests that the field is moving toward more equitable and effective approaches to addressing digital divides. However, translating these insights into sustainable, scalable, and ethically sound data collection systems remains the critical challenge for advancing digital inclusion in practice.


Session transcript

Morten Meyerhoff Nielsen: So, welcome everybody. My name is Morten. I’m from UNU eGov. I’ll be moderating the next 19 minutes. We’re just going to wait a couple of minutes because we see that the coffee breaks are still on. But then we’ll line up. Just a little bit of household. We’ll have an online moderator, so please don’t hesitate to put questions or observations into the chat. And Carmen, our colleague, will chime in when she’s prompted with highlighting some of the questions and observations that we can then discuss in this panel. We will have a couple of rounds of discussion. We will start with the panel, obviously, but we’ll subsequently open up the floor both here in Lilleström and online. Okay. some more people coming in, but let’s get cracking. So again, welcome to this open forum. We’ll be looking at ways to advance digital inclusion through improved segmentation of data collection for better and more targeted decision-making. We have a number of excellent panelists, two of which unfortunately will not join us. Helani from Lina Asia is unfortunately stuck somewhere in space because of issues with flights over the Middle East and Waleed Hamdi from the African Union’s Information Systems Department unfortunately has similar challenges with getting from A to B due to some Middle Eastern conflict issues. So they sent their sincere apologies, but they will be commenting on the report and the feedback of this session after the fact. We have an excellent panel otherwise. We have from the far left, we have Guilherme, he’s from UNESCO. Then we have Pria, she’s from Research ICT Africa. We have Onica from the Global Digital Inclusion in Partnership, or is it program? GDIP. GDIP. And then we have also Fabio from CETIC Brazil. My name is Morten, I’ll be basically facilitating. Now, a couple of things that I’d like to start to set the scene. I think we all agree the internet is not new. It’s been around since the previous millennium even, but really took off in the late 1990s, early 2000s. That said, about a third of the world’s population is not yet meaningfully included in the World Wide Web or the opportunities of such. Now, we see that there’s some segmentation differences on that. We see that generally in the Global South. low-income households, rural areas, seniors, people who are in unique situations or have physical disabilities or even gender segmentation are factors in relation to that, and we’ll dive into that. Similarly, we see that most frameworks promoting digital inclusion tend to recognize the problem but not really measuring it. We see a little bit of a hen and an egg situation that in communities that have the biggest potential community of excluded people are the ones that have the weakest data. This is particularly emerging economies, low-income countries in particular. We also see that these frameworks are often looking at annual assessment cycles. We’ve had some earlier workshops this week already with examples of how to increase that segmentation or those cycles to be more active in terms of giving quicker snapshots for decision makers to target the initiatives. But what they have in common is that they’re still very much supply orientated, as in have you used the internet in the last 12 months, yes or no, limited focus on the type of activities, the type of demands that we’re looking for in terms of gauging the inclusion or the degree of people’s use of digital opportunities. So again, without this knowledge, how can we as decision makers from the public sector, the private sector, from civil society or research community propose more targeted initiatives that meaningfully aim to include those who are not yet included? If we don’t know who they are, where they live or their features, how can we develop policy initiatives or charity initiatives or technical initiatives or capacity initiatives to get them included? So this is some of the elements that we are looking at. We will have an active discussion on this in the coming hour or so. But let’s get cracking with some questions to the panel. Guilherme, from the IFAP program at UNESCO, you are developing a set of data segments to monitor not just digital inclusion or exclusion, but also other things. How do UNESCO promote that as a global standard? And what are the type of things that you find is really interesting to compare across different national contexts or socio-economic contexts from your perspective? And do you have an example of how that has led to better policy initiatives?


Guilherme Canela De Souza Godoi: Thank you, Martin. I’m very glad to be here, first and foremost, because I do think these dynamic coalitions under the umbrella of IGF is also a sort of multilateral policy concrete tool for these kind of interactions. If you see the members of these coalitions, some of them are the speakers here, but many others that are not in this room necessarily, they provide different pieces to this puzzle. Therefore, these kind of discussions and also the concrete outputs that this can generate are already something very relevant for this. But on your concrete question, the Information for All Program is an intergovernmental program under the umbrella of the broader UNESCO governing bodies. And, of course, what the program does is to leverage the different aspects of the multilateral policy that is approved by our different governing bodies, our member states. So I could speak here a lot on different elements that could help to respond to your question. Let me take two or three minutes. . So, let’s start with three examples that are in a way complementary. So, the first one that’s probably more well-known is the Internet universality indicators. Something that was approved many years ago by all UNESCO member states have been refined in different moments. I guess Fabio will speak about that. So, this is a concrete set of indicators based on these five pillars, rights, openness, accessibility, multi-stakeholderism, and the acts are very several cross-cutting elements, gender, children, and so on. And so, this is a concrete set of indicators proposed and validated by a multi-lateral organization like UNESCO, but does not necessarily mean that UNESCO needs to apply it. What we are offering is something that then the different actors can use, either if they are governments and they want to use that to prepare and produce better policies, evidence-based, or if they are a civil society that wants to hold governments accountable, to tell them, you are not doing what yourselves are saying for, like, UNESCO in Paris, or in the UN in New York, or Geneva, and so on, and then, in some cases, we are inviting them to apply it. So, this is a concrete set of indicators, and we are using this set of indicators that are provided by our member states to help with the implementation. But the first thing is this, comprehensive set of indicators. I’m using the example of the ROM-X, but there are several other things connected with meaningful connectivity, sorry, for the redundancy, for example, the RAMs, the readiness assessment methodology for the information, the recommendation of the IGFs that are completed in Oslo, but I don’t want to put it as it is. There is this very important historic issue of the RIVE convention connecting all of these issues with a diversity of cultural expression. So, this is one type of logic. The other type, I will use the title is contact resolution strategy, basically. is when we have mandatory monitoring with our member states based on the things they have approved. So, for example, there is a 2003 recommendation on the multilingualism on the cyberspace. We know that multilingualism is also a critical element of meaningful connectivity. So, this recommendation, every four years, the member states need to report back to UNESCO what they are doing. So, it’s not a concrete data set per se, but what we collect from this mandatory exercise can become that and then be used by the different stakeholders as they see. For example, right now we are in the middle of the international decade of indigenous languages. This kind of data we collect through the 2003 recommendation or the World Atlas of Languages, etc., are fundamental for that. There are other recommendations like that. For example, there is one on documental heritage. So, all the issues of preserving digital heritage, every four years, the member states also need to report back on that. And then finally, there is the guidance related to this need to keep monitoring and evaluating and producing, for example, risk assessments and so on. More recently, UNESCO launched this document that I’m sure several of you heard about that is the Guidelines for the Governance of Digital Platforms. That document is suggesting concrete ways for the different stakeholders to produce risk assessments, to look into what’s happening in the digital ecosystem from that perspective of protecting and promoting freedom of expression. So, in a nutshell, and I finish, we have a concrete set of indicators, we have the mandatory monitoring exercises, and we have this guidance for them. I could keep speaking here on different ways that this impacted reality, but I must say that in the the 40 countries that already have implemented their own acts, several of them used this to change legislation, to then fulfill the gaps that were identified by the application of these kind of indicators, for example. The last thing I want to say to all of you is good news and bad news. The bad news is that I need to leave because I need to open another session. The good news is that this will offer more time for more intelligent people than myself to discuss with you. But thank you very much.


Morten Meyerhoff Nielsen: Thank you, Guilherme. And thank you for warning us before we started. Fully understandable that you’re going to be hectic. I’ll take the opportunity to quickly jump to another angle. And that’s for you, Onica. So from the perspective of the GDIP, how can segmented data, particularly related to gender and things like affordability, safety and trust concerns, digital literacy, but also classical literacy, how can we be better at that? And what are you doing at the GDIP in order to promote that segmentation of data collection for better and more targeted decisions? Yeah, good question.


Onica Makwakwa: Thank you very much for that. And good day to everyone here and online. You know, our premier research that we’ve done in this area is the Connected Resilience Report that looks at gendered experiences of women through meaningful connectivity, taking an approach of both quantitative research as well as qualitative and doing some policy ethnography as well to really understand what’s happening with women. This segmented framework actually became a powerful tool for us to be able to detect and address very gender-specific barriers that women are experiencing through meaningful connectivity, such as affordability. and many others. So, I would like to start by saying that we have seen a lot of connectivity, safety concerns, as well as digital literacy issues that came up quite strongly in that report. And, you know, ensuring that the programs that are then implemented truly focus on women and digital technologies are targeting the needs that women have identified to effectively address the inequities that women have identified. And the second area for us that the segmentation actually has shown importance in is that it helps us to surface hidden gaps that we may not have otherwise been fully aware of, especially the qualitative approach. I think it’s helped us really, truly understand what the hidden gaps may be. So, I would like to start by saying that we have seen a lot of connectivity issues, as well as monitoring and surveillance of women’s activities online by, sometimes, family members. That’s something that, when you just do a regular survey, asking people, are you online, are you not online, all you would find out is that, no, I’m not online, but not really understanding what are the drivers behind that. You know, it could be affordability, it could be safety, and more and more, it could be, you know, the accessibility of women, and, you know, what are the other hidden factors that influence their access, as well as being able to identify some very context-specific barriers. You know, we tend to classify, for example, women as, you know, just that one monolithic group, you know, or even urban and rural, but what we are learning also is that there’s an opportunity for women to be able to have access to information, to be able to communicate with their families and those who are offline. But including the ones that are connected, there is a difference in how they are connected. being able to have a segmented approach in understanding the classifications around age, gender, income, rural, peri-urban, you know, we tend to do this rural urban, but peri-urban populations will tend to actually look closer to the experiences of rural communities because of resources and urban inequality that exists, especially when you look at a country like South Africa is a really good example where within the urban sector you can’t just take the population as is, right? And then one other one that I want to highlight is, you know, being able to tailor interventions and resources. You can’t do that without having very specific, you know, information from that particular population. National averages are just simply not serving women. They are not serving everyone else as well. And I’ll give you an example from South Africa in particular where we continue to be the most unequal society with more than half of the population living on less than half of this GNI. So anything around affordability that you are going to do in South Africa without stratifying the income quantiles, you are always going to get an over-inflated outcome that does not fully represent those who are at the bottom of the income quantiles. And women also tend to be very much over-represented in those lower levels of income. You know, so in order for us to be able to recommend gender-specific and gender-responsive policy interventions, it’s important for them to be informed by lived experiences of women. And that segmentation helps us with that. That leads me to a follow-up question if we have a bit of extra time. Have you got any good examples of where either your program has been able to do better recommendations for policymakers or where policymakers have made better decisions, more targeted, pinpointing initiatives based on better segmented data for gender, for instance, or affordability in that context? Yes, certainly. So, one of the things that we did with the Connected Resilience Report is to introduce a method that we termed policy ethnography, where we actually also brought policymakers together to understand how they make decisions and what informs them. So, one particular country, and please allow me to withhold the name of the country, had gone out to build these digital centers in rural areas because women did not have their own personal devices at home and they did not have a way to connect. So, the idea was that these digital centers that were actually funded through the Universal Service and Access Funds would enable women to be able to have access to connectivity. And over time, they realized that women were just simply not going to these centers. And it was actually through assisting them to do stakeholder consultations and to meet with women and be informed by women that we learned several things. One was that the hours that the center was available for just did not work for the women in that community who have to wake up very early, fetch wood, take care of children, get children to school, come back from the market before kids come back from school. But also, the other issue was the issue of safety, for them to then walk in a direction that is not as well populated by people that they would feel comfortable walking past, for them to be able to utilize the center. So, it had very little to do with, you know, You know, whether they have the skills or interest or any of that, it was really predicated around their own safety and their own lived experience navigating that community that had not been factored into this huge investment of building the centers with the aim and purpose of women being able to use the centers to access. So we’ve got quite a few of similar examples in our reports as well that just really shows how when you design for women and with women at the center, you have to actually design with them informing you so that they are part of that solution.


Morten Meyerhoff Nielsen: Excellent. We’ve spoken a bit about the South African context in the last example, so we’ll move to another country that has similar challenges in some ways and similar success stories. But Fabio, CETIC Brazil is increasingly segmenting their data for the Brazilian context. We’re talking about different types of segmentation already, but what are the ones that you’re finding particularly useful for decision makers in Brazil, both at local but also at the regional state or federal level? And is there a difference between the type of segments that those decision makers need in order to do better policy?


Fabio Senne: Thank you, Morten. Thank you very much for the invitation, it’s a pleasure to be with partners in this discussion. Before answering to your question, I think it’s interesting, Omnica just was very comprehensive in making the case of the advantages of having this type of information. I’d like just to describe a little bit the institutional model that we have in Brazil that I think is useful, and I think other governments are having this as a reference, because CETIC is a non-profit. So, we have a model that is based on NIC.PR, which is a non-profit organization that is funded by the .PR domain name registry. So, we have a model that the authority for the .PR, the NIC.PR, is responsible for the service, the public interest services, and this allows us to have a specific center, which is the TIC.BR, focused on producing this type of data and sharing it with policymakers. So, I think first of all, this strategy is allowing us to have the continuity of surveys and other types of research and to make the case of the relevance of this for the government and the society as a whole. And another thing that is in our DNA that I think is very relevant is that we are not only multi-stakeholder in the process of the organization, but we are also multi-stakeholder when we do research. So, every time, and I think this is a useful thing for other experiences, every time you will start an investigation and start a new survey, we invite what we call a group of experts around a multi-stakeholder group of people who will first define what to measure, what are the topics that we need to measure, what are the demand for data that we have in the government, in the private sector, in the other sectors. So, this is useful because we can adjust the data production to the demand of the decision makers, and this is very useful to us. And just to mention that this type of agreement has growing relevance among governments, we have been participating in this. So, we have been in the G20 processes for the past two years, so last year we had the Brazilian presidency of the G20, and we supported, along with ITU, a report that G20 launched, this report that was just connecting the idea of meaningful connectivity and the need for segmented monitoring. So, just to mention, in this report we argued that we cannot only use two axes, but we need to understand connection quality, availability for use, affordability, device, digital skills, and safety and security, so also in the G20 members recognizing that there are a lot of other dimensions that need to be monitored, and more importantly, that these data need to be disaggregated by demographic variables such as age, gender, household size, and others, economic variables like income, employment, status, and others, and geographic disaggregation, because you know that countries are not, are also, the digital inequalities is also expressed in the territory, and you can find differences between, so in this, in this year, in 2025, we also, along with Research ICT Africa, we supported another paper on this discussion on the G20 South African presidency, and stressing a little bit more about the funding issues, how you can, we need also to guarantee that countries have funds to do this type of research. So, we can discuss more after the…


Morten Meyerhoff Nielsen: I think it’s a very interesting… It was just to say that this institutional and consultative part is very important for… I think it’s a very interesting, CETEC Brazil is a very interesting funding model. And it’s a little bit of a sidetrack from the discussion, and we can maybe come back to it. But we see that often telco licensing and the auctioning leads to a logical profit maximization attempt from the government, particularly the Ministry of Finance. And I used to work for the Danish Ministry of Finance, so I have to put that disclaimer in. But it tends to often result in slower rollout of next generation technology. Then after the license is secured, the telcos will want to make a profit. This is logical, but they will then sacrifice either the rollout of that technology or underserve less attractive areas in remote areas, rural communities, urban communities that are not seen as profitable, or the price is transferred to the customer, which is in fact, yes, helping the government to profit maximize, but kills other government objectives and targets for digital inclusion, affordability and reliability. So there’s some interesting elements, and the Universal Access Fund is often seen as an ability to try and then reinvest the profits from the license into that, like in CETIC’s case for research, or in Tanzania, where it’s then to fix gaps in the infrastructure in remote areas or increase the volume of hotspots or free Wi-Fi hotspots, etc., with all the pros and cons they have. So there’s some interesting elements around that, but will data really help us in that regard?


Fabio Senne: That is maybe more of an open question. So a little bit of a sidetrack, but what are the type of tricks you have at CETIC in terms to nuance the data collection? Is there alternative sources, rather than just one? in the classical, we go and collect, we do surveys, etc. Are there any tricks to the trade, so to speak, from your perspective and your experience that could help increase the segmentation? Yes, I think, of course, methodological innovation can do a lot in this type of exercise. It’s not, surveys cannot take care of everything. So we are trying to mix methods, to integrate more geospatial data and other sources of data to combine with surveys. I can give a few examples. For instance, in the field of connectivity in schools, and NIC.br has a system that is called C-MAT, which is a system for a software that you install anywhere you want to test the quality of the broadband of this organization or household or so on. And in agreement with the Ministry of Education, we put this, we installed this software in more than the 70,000 schools in the country, having real time data on the quality of the connectivity. And we can cross this with the survey data that CETIC has also on the what teachers are doing in the same schools and so on. So here’s an example of you can combine different sources of information to provide more granular information. Another example that I like in terms of geographical disaggregation that I think is interesting. We did some, we tend to think that the urban areas are always well connected, but this is not the case. If you take the number of disconnected, for instance, most of them are in urban areas, very close to because the population is also concentrated in these areas. So, we had one study that we did a few years ago, that we could disaggregate, combining different sources of data. The city of São Paulo, which is the largest city in Brazil, we could disaggregate the data, combining socio-demographical and digital inequalities data. And then, for instance, we understood that one particular neighborhood in the city tends to be very high connectivity, but low level of socio-economic status. What’s happening there? So, we can refine more. And we discovered that because there was a road passing through, close to this area, across to different other sources, there was a very, there are a lot of young people living in this area, and young couples, and we could track the differences that we have


Morten Meyerhoff Nielsen: in this particular area because of the data. So, having this type of data, of course, you can lead to policies that are more attached and focused on different perspectives. Just to close the first round before we open up to the floor, also online. So, Priya, at Research ICT Africa, you’re also working with segmented data, obviously. But what are some of the examples that, again, you find particularly useful for your research, but also for policy recommendation that your center is doing on a regular basis? And, again, how does that become helpful in identifying these location or community-specific or user group-specific digital divides? Are they, again, around gender? Is it around income quartiles? Is it education? and all, what do you see from your perspective? Yeah, thank you very much, and thank you for the opportunity to be on this panel.


Pria Chetty: For us, this work is core to our organization, and so we’ve been running for a number of years our after-access research, where we’ve prioritized segmented data. So we collect data directly from individuals and households, and we ask them very specific questions. And I think our findings really reinforce what Onica mentioned about the value of qualitative analysis and what Fabia mentioned about those insights that come from when you are uniquely able to combine the data. But we ask questions around their access. Do you have a smartphone, computer, broadband at home, or affordability? And then we also ask questions about their usage patterns. So what do they use the internet for? Is it social media, work, education, health, government services? And I think this is to combat some of the assumptions that we make about who’s using what. We also ask questions about their preferred platforms. And then we ask questions about the level of digital literacy and skills that we’re dealing with. And so, you know, what are they able to do? And can they send emails, use online banking? And then some questions around trust. And I think it also reveals very, very specific nuances. And then, you know, I think when it comes to the question of barriers, this is where that contextual information really, really becomes valuable. So we ask questions about, you know, why don’t you use the internet anymore? And is it because you don’t have a need for it? Is it about safety concerns? And then, of course, in our data, we have that valuable demographic segmentation. So that’s by gender, age, income level, education, location. Anika mentioned to include the peri-urban category in there, but also disability status and language as well. So this allows us to draw out very specific insights. And the work that we’ve been doing is now absorbed globally into UN reports by the ITU, OECD, and so on. And then more regionally to define indicators that are set for specific targets. So it’s now producing, I think, for the continent, these insights that can never go away. So inputs into the ecosystem that just have to be longstanding. So at the very minimum, we can confirm that data costs are a primary barrier, but we can do that in a granular way. So in South Africa, 70% of our respondents cited affordability issues. When compared to Uganda, it was 61% that cited affordability. And we’ve got now some contrasts between the different countries. But then we also pull out these additional… traditional barriers, and one of them could be even just the lack of perceived need for some of the services that are on offer. And now we can get quite contextual about the association between what’s on offer and the demand. The digital literacy gaps at a granular level, barriers such as electricity access, privacy concerns. And it brings out, I suppose, the multidimensional element that comes from these contextual nuances that isn’t just about the segmentation, in fact, but in fact, these multidimensional qualities and these insights importantly need to inform very specific recommendations. So I suppose the segmentation and the approach and the methodology, that’s a big learning, but then how to present this information in a way in which it can be absorbed and utilized effectively. So we know that education and income, as Onica mentioned, are key drivers of digital access and use. But it means that we need targeted policies to address these. And our recommendations themselves need to be nuanced as to how this will actually take place and who would be the custodians of those kinds of efforts. So it broadens, in fact, our policy engagement audience. So while it’s not strictly, I suppose, data samples, I think there’s also that value, as Onica mentioned, in understanding the lived experiences, particularly in our context where we’re seeing this huge variation. We also need to understand attitudes across the ages and across the different segments, cultural barriers, specific use cases that draw particular people in. And then also what they consider trusted community channels. And are we exploiting that to the extent that we can? We know that cultural and linguistic barriers in schools with Internet connectivity place additional constraints. So while we might have focused on getting schools connected, are we really seeing some of those linguistic barriers and those cultural barriers that are preventing children from being able to meaningfully leverage online services? And we also know that digital exclusion… is now coming out of this data, and I suppose it’s longitudinal value, is compounded when these factors intersect. And I suppose that’s one of the challenges we take into this conversation, and I hope we return to the funding conversation because that’s an important one. But as we progress and as we get more adaptive in this space, I think we need to be able to deal with this data in a way in which we appreciate the value of the intersectional data that’s coming out and the range of inequalities that we’re seeing and how they intersect, especially for women, as Onica mentioned. But now we also know that there are intersections between drivers and barriers. So, for instance, young people in informal settlements access the internet through shared phones because they might be hungry for job


Morten Meyerhoff Nielsen: content or maybe to access bursaries, but they’re also accessing it at much higher costs. And what do we do with that information? So, I suppose, without sounding like a data geek, the data is very telling, but I suppose the challenge for us is what do we do with the data? What I hear, and correct me if I’m wrong, from all of you, including Gillian, and also reflects a little bit of the discussion we have internally at the office, is you can look at data in different levels. The national level data will be basically a heat map, the classical data. Have you used it for X, Y, Z? What’s your feature? What’s your user profile on a high level? Gives us a heat map that then allows us to say, oh, here we don’t have to worry. Everything is bright green. Here there’s something going on, but let’s wait and see. But here’s something flashing red. We need to dive into that, and based on that heat map, you know, okay, it seems to be around a socioeconomic fragment in this geographical region that has these such and others. We look at the context and see what is it really going on. But it means that we can target our decision-maker. So we layer our data and we dive in where we see the red lights flashing sort of speak, but where everything is green, we don’t have to worry. Is that correctly sort of pulled out on sort of the logic in terms of the data segmentation when it comes to the granularity, or did I misunderstand you a little bit? Any thoughts? I would say, Morten, maybe to challenge it, that it’s a


Pria Chetty: dynamic space. And so I would also exercise caution around the green. And as you mentioned, I think when you started the session, you said there’s value in the timing. And at the moment, the cycles, they’re long. And so how long does the green stay green? And what are the variations impacting the green? I mean, we’ve learned lessons coming out of the pandemic. So, you know, you’ve got, yeah, so we have to be cautious with the green. Oh, yeah, for sure. Yeah. I think at best, the segmentation just really allows us to be able to monitor, you know, what’s happening, but also to begin to think about frameworks of accountability, right? Because a lot of these divides happen within the context of a slew of policies that are there to drive inclusion, you know, whether we are doing it using the universal service and access funds, or we have broadband policies that actually are very explicit about closing the digital divides. But, you know, I think that this segmentation really helps us to be able to monitor, are we truly being effective? Are we being targeted in this? And what is the accountability framework after 20 years of this? Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. I think it’s really important to have a broadband policy that says this, and yet the results on the ground look starkly different from that. It’s not a silver bullet, you know, I think as we were talking also about just how do we fund this data collection, I was just thinking about just sort of an underutilized resource that exists in data collection right now, but it’s underutilized because it requires a lot of transformation, and that is national census data. You know, every 10 years, with no fail, most countries find money to collect national census data, but how many of us have engaged with the national census bureaus to get them to transform their line of questioning, to begin to collect even digital-related data? We’re successful with Mozambique, but then once that happens, you have another challenge, so you’ve collected all this incredible data about use of digital technologies within the country, then what? That’s another resource to invest in analyzing the data and being able to make sure that it truly is utilized to inform intervention strategies, to inform policymaking, so it’s a continuous cycle, I think it’s one of those where we have to continue to work while chewing


Morten Meyerhoff Nielsen: gum at the same time. I’m smiling because I was studying in the UK back in 1999-2000, and I was counted twice for the census back then because I happened to have been on two different addresses when they came knocking on the door, and I wasn’t actually formally registered as living in the UK at the time, so, you know, there’s also a bit of data clearance, and being Danish, we haven’t actually had a census for, I think, 50 years because we don’t need to do it. Our population registry is 99.9% proof. So, they do a sampling and they do a direct survey out with all these things on an annual basis. So, again, different context means that your data methodology and your data collection may vary. And I think that’s a key thing. But I agree that censuses can be one tool, but again, it’s a snapshot every 10 years, and the data is already outdated the next day because things change, as you’re saying. Anyway, Fabio, before we open up to and ask Carmen for any reflections online and then to the audience here, any thoughts?


Fabio Senne: No, yes, I agree with this discussion of the cycle. It’s interesting because if you take, there’s a very strong correlation between the GDP of countries and the availability of statistics on digital matters. And, of course, you can ask, is it because the statistics help countries to develop or, on the other side, because they are developed, they have money to fund the statistics? I think it’s both. And what Onica was saying that I think is very key to us is sometimes with more segmentation you can make the green area very not green. And one example is the discussion on meaningful connectivity in Brazil. Because we had, if you take our general figures, we are about to complete 90% of the population having online services or any connection to the internet. So, you can say that we are, the country is in a green line that we only have 10% disconnected. But when you go to the, when you include devices and availability of the connection and affordability and skills and other things, our figure is much worse. We only have 22% of the total population that we consider in our indicator with meaningful connectivity. So, including these hidden gaps, this also works for gender. So, if you take an overall picture, there’s not much difference, there’s not significant difference between women and men in terms of basic access to the Internet. But when we go to the indicators of meaningful connectivity, we see a 10% gap in the country in comparison of women and men in terms of meaningful connectivity. So, this closure in these gaps, I think it’s very important for this type of research. But of course, the connection with good data and good policy is not immediate. So, we understood this in CETIC, so that’s why we do also capacity building along with UNU and other partners. We do capacity building for civil servants and other strategies because we know that it’s not sufficient to have good data and the policies will get better immediately. So, you need to invest also in this connection.


Morten Meyerhoff Nielsen: I think there’s some interesting observations over the years on also statistical feedback that points in different directions. For instance, I think it was about 10 years ago, we were looking at second generation digital divides from a strategical perspective, sort of econometrics and statistical analysis. And in sub-Saharan Africa, there were more people with access to the Internet than access to reliable electricity. And electricity is a precondition for charging your device and your router. So, you know, what does that mean? You need to dive into the context and see how many people have alternative access to electricity. But it’s also quite a positive signal about how inventive people can be in order to have access to electricity. in order to assure they get access to something where they see a perceived value, which is something that we talked about earlier. Anyway, I’d like to just hand over to Carmen, who’s our online moderator. She’s also from the Global Digital Inclusion Program. And Carmen, is there any observations or questions from the online audience that you’d like to bring to our attention? I think Carmen is saying something, but it’s not coming up on the audio. Could we maybe turn up the sound for Carmen online? Hi. Can you hear me now? Yes. Okay, great. Sorry about that.


Carmen Ferri: So, we have one question in the chat, which is, how can we ensure that the segmented data collection respects the privacy and dignity of marginalized communities? Anyone from the panel that’d like to tackle that one?


Pria Chetty: And in the meantime, if there’s any questions for the audience, please raise your hand. So, maybe everyone’s looking at me because they know that I’m a lawyer. But let me start with that. I think that, I mean, there’s many facets to this, and they aren’t just the legal regulatory aspects. And so, at the very outset, I suppose, in defining the data that you’re collecting and understanding the value of the segmentation, it doesn’t necessarily include personally identifiable information. And so, in some ways, you are freed from the data protection legislation or the privacy legislation to the extent that you are not collecting personally identifiable information. So, I think that’s the first cautionary. The element that’s beyond just the legal and regulatory elements and the concerns around privacy and the perceptions around privacy… and the willingness to participate in this. I think our methodological learning has been the value of having local participation in the collection of the data. And so what you need is also buy-in for the process, and I suppose to distinguish good data from bad data, that you’ve got a willing data provider that is willing to give you the data that you need. And so by using local researchers who are able to also deal with language gaps, understand maybe the concerns of the community in participating on such a survey, you’re likely to address not just the privacy concerns


Onica Makwakwa: but the overall concerns about participation in the data collection itself. I would actually also say, just stepping away a little bit from even regulatory and legal issues, I think ethics, coming from a continent that for the most part we feel overly searched, there’s sort of this gaze on Africa in general around our way of living and all of that. It’s really important to make sure that we are working with local partners and not coming in from a global organization to study these people. We’ve got a history and a baggage that comes with that very approach, and so maybe also just assuming a decolonized approach towards collecting the data so that people consent, people understand also how we are going to utilize this data, and you bring them along so that they are part of the program as well and understand why you are collecting the data. I would like to give you an example about the number of people who are connected to the internet vis-à-vis the number of people with electricity. Because I think one of the studies that raised a huge gasp was one that compared to the number of people with mobile phones and toothbrushes. And it’s those type of narratives that, you know, when we step back and look at them, like, what exactly are you trying to argue, you know, in comparing number of mobile phones and number of toothbrushes? Because if anything, it actually exposed the ignorance of the researcher themselves, because there’s other ways of keeping dental health that’s not just only a Western toothbrush and toothpaste kind of methodology, right? So local context is not just kind of coming in and having taken me out for coffee and having a conversation with me over coffee, but it’s also really about allowing me to also within the community lead some of that collecting of research. So we’re not just kind of swooping in and, you know, having the consultants that we have, but, you know, empowering local communities also to be part of that data collection process


Fabio Senne: as well. Okay. Yeah, no, just, I think those questions are discussed a lot in the data community debates we have. UN has a UN data forum, which is a space where those types of topics are discussed. And it’s interesting because there are some trends related to what my colleagues just said. For instance, there is a concept of citizen generated data, which is now trendy in a lot of contexts where in specific contexts, you can have the citizens involved in the process of generating data with more quality, less costs, and so on. So this is a trend. So, one discussion that I think is relevant for this is that when, with the spread of mobile connections and increasing the number of internet users and digital platforms, there was a general expectation, especially among governments, that the problems of data will be solved because everybody is connected to some device and there will be traces, we know where people go, what they do online, and we have plenty of data, in a data-fied society, we have plenty of data, we don’t need monitoring or surveys anymore because the problem is solved. And now the data communities, there’s a pushback in the discussion, okay, we need complementary sources of data, sometimes we did not solve yet the thing of the digital platforms, much of the data are private and not shared for policy purposes, so there’s a discussion on how to access those types of data. Now you have satellites that provide other types of very interesting data and can be combined, so I think the data community is now in a process of, okay, we need to combine different sources to get the better solutions from cities and generate the data to more technological tools that can provide the best information you can for policymaking. I just want to double check, is there anyone in the audience that have any observations or questions that they would like to highlight? If so, please feel free. I see no one moving. Yes, please come up to the microphone. And please introduce yourself.


Morten Meyerhoff Nielsen: Thank you.


Audience: Hi, I’m Kiho Oshima and I’m a master’s student in the University of Bremen in Germany and I’m studying digital media and society. And I was wondering, you mentioned about privacy of citizens and how do you see the consent to the use of data for citizens, so especially those who are marginalized systematically, like maybe there are people who of course would not like to share their data because of the sensitivity, and also there are cases like those data are used to profile them and expect criminals or something like that, and that’s used in a way that reinforces marginalizations again. how maybe would you consider like including digital rights education and also providing like opt-in and opt-out options so that they know that not only their rights but also how to exercise their rights or would that be too big scale or to implement or something like that? And another thing is yeah so how do we prevent the use of segmented data to be interpreted or used in the way that could reinforce? So when we use data how do you prevent and


Morten Meyerhoff Nielsen: those kind of use in a way that would reinforce marginalization? Yes I would like to. Excellent questions I think particularly we can start with the privacy but I particularly like the sort of how do we use data so we don’t reinforce insisting patterns of exclusion for instance is really really interesting. Anyone want to? No I think these are very good questions


Fabio Senne: from the perspective of privacy we have a very interesting survey that we did with individuals in Brazil asking them about what they perceive about their privacy online and data protection and so on. This survey is very interesting because from one side there’s a growing concern among citizens about how the data are collected and uses. The main topic in the case of Brazil is face facial recognition for instance or when there are this type of data collection is considered the more the one that they are more concerned and also health data so health data is ultra sensitive and people feel worried about those two particular types of sensitive data. But it’s also interesting that still there is not much literacy on understanding how digital platforms collect data from people. So, there’s more concern regarding, for instance, financial frauds or something that has to do with payments. Then, when you go to a social media and put your photos, there’s not much understanding of how this model of data collection works. But when it comes to financial data and frauds, they are more concerned because it’s very objective. Very, very interesting. If we’re looking at addressing or collecting data to address the digital divide, do we need that level of that type of personal data as in what have I paid for, what is my health data? No, no. We do not, do we? Yes, I think there are two different. Traditionally, typically, in the data for policies collection, you have anonymized data even for survey or for administrative. You know, for instance, in Denmark, you know that you have so sophisticated administrative data that you even don’t need to ask people things because you have… It becomes a political risk assessment whether or not we want to use it. And there’s a discussion, there are different solutions, whether in some countries you cannot ask for ethnicity issues because there is concern of this can… So, each society will have different solutions. I can speak about the case of Brazil. There is not a distrust, a necessary distrust. When you provide information to the government, for instance, we have a very important social income program that is national, and to be in this program the government needs to know where the poor people are, so there is this trust in some cases you have to provide data. It is also the case of public health, so public health data can ensure that you are focusing on the right person. But there are some discussions on what type of data needs to be collected. Because that is a very interesting topic for discussion on access to actual opportunities through technology,


Morten Meyerhoff Nielsen: access to banking services online, access to the benefit of shopping online, government services online. And that is a very interesting element. I like that question because I think it is important for us, especially in platforms like this, to continue to raise awareness about this as a major concern for digital consumers in particular.


Onica Makwakwa: I think it is an indication of the trust deficit that exists even amongst all of the stakeholders and even an entity like IGF, for example. One example I will give is during COVID-19, most countries adopted COVID-19 tracking apps where you were encouraged to download something on your phone. I just know that for a lot of people in my country personally, we have learned that after we signed up for something related to COVID-19, we started receiving SMSs from a particular political party for the next local election campaigns that happened immediately after COVID-19. So, there really is that bridge of data privacy, right? But what I also want to encourage us as digital rights advocates is that when it comes to data, the offline and the online should not be any different. All of us probably, I don’t think it happened here in Norway, but in most countries, when we visit and you check it at a hotel, including in your own country, the receptionist takes your passport and makes a photocopy of it, and you leave and leave that photocopy of your passport behind when you check out, right? You know, let’s ask this question around data privacy and safety even in these offline instances where a security officer at a building asks for a copy of your passport or your ID number and all of that. All of those are interrelated and they’re not just unique to data, and I think we’ll make better progress in educating people around also protecting themselves in terms of their data. But as far as the data collected for research, GDIP as well uses anonymized data, so there’s really no way to be able to track who or what, but certainly from an exclusion and location point of view, certain communities could come out as vulnerable, right? And I think we need to be honest and open to exploring some of that. You know, the challenge, though, is that if you don’t count it, then it really doesn’t exist and no one has the opportunity to actually address some of these gaps. Priya, you’ve been indicating you have something to say here, so I’ll let you continue on this track. Yes. This is so close to, I suppose, the work that excites me the most, and it’s in the data


Pria Chetty: for good space, and I think your question really, for me, triggered this question about data for good or data for bad and, you know, how do we manage that? And so, you know, we said that this kind of data might fall outside of the data protection kind of regulatory space, but I want to say that even for non-personal data, there is no reason why we can’t. can’t exercise some of those standards that we would apply to personal data. And so, you know, if you’re collecting personal data, you are limited by the purpose for which you collected it, and you need to use it within those confines of why you collected it. You’ve got to uphold certain security standards. You’ve got to exercise a level of restraint and collect only what you need. And so there are valid principles that can be taken into how we do this kind of work, because I, you know, to Fabio’s point about the technology running away from us and citizen-generated data, we have to get very serious about, you know, not just personal data protection, but the protection of data sets, even the aggregated ones, because there are those harms attached to it, and there are those opportunities also linked to it. And so something that we’re working on is just trying to understand, you know, in the way that the data sets are compiled and made available and the value that sits in them, who actually gets value from it? And what about the citizen and the communities that have contributed their data? To what extent can they also then have access to it? So one of the questions we can ask ourselves is that, you know, have we meaningfully engaged with the community when we receive the results to, you know, to talk, to have a conversation with them about what this means and the decision set that they have to improve their digital inclusion, you know, characterization? And so do we take that data back to them, and do we allow them to use it? There may be budding entrepreneurs in the communities, and, you know, once they have access to this data, to know who’s connected and using what, maybe there are, you know, some level of enterprise that can emerge locally. There are many cases like this where we have to force ourselves to think about, you know, when we have the data, what do we do with it? And have we created a pathway to go back to the community and back to the citizen and make sure some of those benefits sit there? I think Annika and Fabio mentioned in some ways that the digital inclusion problem globally in the development world is big business. And so, in some ways, you know, we’ve got a willing buyer for this kind of data. But I think that doesn’t excuse us from the freedom to say,


Audience: how can we use this data responsibly, but also to get value locally from the data. It was actually a very… Do you have a follow-up? It’s really intriguing to me that to balance approaching marginalized groups, and to do that, we need to use the data. But at the same time, they need to be protected because they are marginalized at the same time. And I think I’m really intrigued to see this balance, and how it will be realized, or maybe it’s really difficult. Because even for me, looking at terms and conditions, I would skip or I would not read every sentence. But I also think that those designs can be improved. So, it’s really user-friendly. And I would just see in one site that, okay, this I would want to say yes, but this no. Also for the cookies.


Morten Meyerhoff Nielsen: It’s interesting. It comes back to that layering of data, I think. And there was an interesting example here in Norway a couple of years ago, where the journalists at the national broadcasters went and bought data from the World Wide Web, marketing data from social media, from the banks, etc. And they could basically layer it, and they identified a Ministry of Defense employer to his local commute from his home, his place of work, who he was married to, where his kids get to school, when he dropped off the kids and when the wife dropped off the kids. And it was really interesting in terms of that anonymized data, but when you have a specific objective in mind and you start layering, they could actually identify it. and many others. So, how do we identify those types of patterns from this individual? I mean, it was obviously a journalistic investigation, but it raises some concern even around anonymized data. But how do we take and build that into some of these sort of regional and global frameworks? How much data do we need also to compare ourselves? Country to country or region to region, city to city? So, how do we do that? And how do we do that in a way that we can make sure that the data we have are really key in order to ensure that we get as many people online so they can enjoy the opportunities of the World Wide Web and similar while minimizing the negative impacts of the data collection? Onica?


Onica Makwakwa: I would add to that, I mean, I think this brings us back to for my ears around open data, right? So, I think the question is, how do we leverage open data for a community? So, they may be looking at, you know, beyond access in terms of digital skills, but I might be interested in something closely related to that, maybe women specifically, but they’ve desegregated their data. They’ve collected the data. I think the other question is, how do we leverage existing data sets amongst the people who are in the digital world, and how do we do that in a way that’s, you know, we’ve


Morten Meyerhoff Nielsen: got this fragmentation of desegregation of populations and all these factors so that not everyone has to collect the same data from the same group of people as well? It’s a very interesting challenge. We had this discussion with our colleagues in Brazil when we were doing a study on youth and young adults, so the under-18-year-olds and the young-adults were defined as size 12-year-olds and other under-again It’s 15 to 18 year olds. So, you know, there was some data variation and we see the same actually in some internal research We’re doing on the digital gender divide where even if there is data collection by research teams They they segmented they do excellent work excellent data collection But they forgot to use the same age groups as for instance the National Statistical Data Agency Which means that it makes it data work and the data analysis more time-consuming or less impactful because there were some small mistakes or small missed Opportunities in alignment of data from different sources. So are there some some some national regional or even global sort of Standards or rules of thumb that you would recommend when it comes to segmentation


Fabio Senne: We’ve talked about age and income levels. We’ve talked about activities online Are there any ones that you think are almost like universal that you would would recommend that you look at? What I can comment is that I agree there are different levels of data that that you can And with etc. We try to do both. So For one side, there is a global discussion on minimal standards of data there is the the UN partnership on measuring STT for development with set meaningful rules for And and because of that we can compare data from Brazil and other countries. So we more or less follow this This this international standards and there are debates on What to measure and how to measure including a list of Disaggregations. I’ve also mentioned the G20 case where there are also recommendations for disaggregating the meaningful connectivity data. So, this is at a global level. But, what I think is important is that, different from the past, when we normally have all the data from one country concentrated in one national institute of statistics or institution. Nowadays, there is an ecosystem of data. The data is not only in public settings, but also in civil society, in the private sector. And, coordinating these efforts, I think it’s key. And, also within governance, sometimes we have silos that don’t talk to each other. So, educational data is not linked to financial data and you cannot cross this type of thing. So, more or less, we believe that this is a discussion on an ecosystem that manages data that is not only public, but public and private. It’s key for making solutions. And, of course, the data that one municipality wants for planning urban mobility is totally different from a national ministry of education planning. So, this type of granularity will come depending on the policy need you have.


Morten Meyerhoff Nielsen: Freya, Onica Makwakwa?


Pria Chetty: It’s very clear from the discussion we’re having today that, even though it’s not broad-based, the segmentation work is reaching a particular level of sophistication and maturity. But, as Onica Makwakwa mentioned, we’re not comparing notes. And so, the opportunity, if there was any kind of regional collaboration or there was an initiative at a global level, is to bring the key players together to understand the different methodologies. And, UNESCO has set up some tools and indicator sets that can be leveraged. But, what is it that has come from this qualitative work and from these unique combinations that we mentioned and these intersections that also add to those frameworks that exist? And, how can we develop it so that the data is more reliable and more accessible? I think what we’re being challenged to do as an organization now is make the data more accessible to people who have questions that we never conceived of. And, I think, to also anticipate that they aren’t researchers and they aren’t policy experts, but they will have data. very unique requirements from the data set and how can you create something that is accessible and allows them to use that data in ways that you haven’t conceived of. So imagining that it’s going beyond this community and it’s being used in new ways because that’s what we’re seeing now that we can’t really identify how the data will be used but we want to make it accessible for uses that we didn’t conceive of. I want to exercise, yeah, I suppose some caution I would say in bringing the data together. I think it needs to be very deliberate and very well intentioned because there’s the potential and propensity there for massive harm if the data is, you know, brought together in ways that we lose that element of control or accountability for why we initially brought it and put the data together. And there’s so many examples where, you know, data lakes have gone badly and introduces just a range of vulnerabilities. So it isn’t, I’m not


Morten Meyerhoff Nielsen: sharing an excitement to bring all the data together without thinking through very carefully what is the process that we use and how do we get a little more adaptive, I suppose, in the way that we… We hear some very interesting reflections also from policymakers and civil servants including in regions like East Africa where you have these massive drives for data lakes but without having a data classification scheme that says this is data that you can easily rely on because it’s high quality. This is not as high quality because that defines how will I interpret the results.


Onica Makwakwa: Just one of the exercises we did in Ghana several years ago and that was to create a data and research working group where they mainly focused on kind of mapping where existing ICT data was within the country, so that as researchers, they kind of talk to each other, they know who has what data and what frequency, you know, how frequent is that data updated, including some level of success at bringing some of the operators, the mobile operators, in place. They are obviously also sitting with tons of data that we may or may not find useful, right? But it wasn’t about bringing all the data in one place, but just really having a sense of a mapping of, you know, who has what data and, you know, being able to also negotiate some openness for researchers who may be interested in doing research and looking at particular issues to be able to know, you know, where they can rely on. It also reduces the size of household surveys that you have to do when you realize that you don’t need 40 questions because this particular


Morten Meyerhoff Nielsen: operator, you know, the three operators within the country can tick off maybe 10 of those. I’m loving that because it was actually the topic of some recommendations CETIC and UNUEGOV did in a G20 policy brief last year under the Brazilian presidency, as in, in 155 countries you must present legal identity in order to get a mobile phone or internet connection. Is there ways and models that we can use that and the telco licensing for the telco providers to provide us a snapshot on gender, on age groups, on basic elements that are anonymized to the telco regulator so they get that snapshot but then also provide certain usage data like on certain types of IP addresses like online commerce, banking, again, so you get that data in snapshots but anonymized. to create sort of the initial heat maps, lower the burden of data collection that then allows you to also dive into the context of the green flashing lights but it gives, it’s a new model and and with the telco regulators you can potentially create those type of partnerships by making it part of the operational responsibility to provide certain types of data so decision makers can address the digital divide and spend more time on on diving into the specific challenges in the context rather than these blanket decisions. So they are some potential models at play there. I would just checking the audience to see if there’s another set of questions before I raise the last question to the audience. I’ve seen online, there’s no more questions online but if you were gonna do one recommendations that you would ideally like to see happen in the segmentation of data collection to address the digital divide, to make those better decisions, what would that one recommendation be for the next 12 months?


Fabio Senne: Well I can start, this is a very difficult question but I think there’s one thing that we kind of discussed but I would like to reinforce is that for a long time that’s because we do mostly surveys or they interview one individual so we try to think about digital inclusion as an individual characteristic. So you take gender and age and all these factors and you think we are talking about individuals but most of the problems are collectives, collective problems. So there’s lots of discussion on community networks, how how communities can build innovative models for digital inclusion. Schools are also important in this debate. In Brazil, we have libraries as one of the most spread public infrastructure that also need to be engaged. So, I do think that, try to think more in collective measures or collective exercise to understand better the situation. One small example, in this meaningful connectivity study, apart from having one indicator, does the household have a computer, which is a traditional indicator that everybody measures. We decided to calculate, okay, but if the household has one person and one computer, you are okay, but if you have one computer and ten people living there fighting from the same device, what will be the quality of the use? So, we decided to calculate a ratio of people per device, or you can do this with income, what’s the percentage of the income of the device. So, this type of thing thinks the household as a collective of people rather than individual. So, I think facing the collective challenges is useful for policy in digital inclusion.


Morten Meyerhoff Nielsen: I won’t answer the question, but I’ll just pick up on what you just said around looking at household v. individual.


Onica Makwakwa: And that’s because we actually did an evaluation of a model, a subsidy model of one tablet per household in Uganda, which was very successful. They focused mainly on female-led households, used USF funds to actually… provide a tablet per household. And very interesting stories, please do look it up on our website, on how that actually helped to empower, you know, the least suspected subject for that intervention. And, you know, even though the focus was mainly with the women in the households, it’s the children who actually benefited the most, and it’s education that was highly impacted by that initiative. So, I really like that notion that, you know, it’s really important for us to also just sort of look at communities the way they are organized.


Morten Meyerhoff Nielsen: I mean, there was some interesting discussions between the ITU and the Arab regions technical working group for statistics, where actually the recommendations from the Arab group on the definition of a household got changed by ITU, because it wasn’t, it was based on a traditional nuclear family, you know, global north concept, and not on multi-generational or alternative household structures that you see all over the world, even in the global north. So, it was really, really interesting in that regard. But I’m taking away the time from Priya to either address the same question, or come up with an actionable suggestion for the


Pria Chetty: next 12 months. Yeah, maybe I suppose, maybe put differently, what is the question that keeps me up at night for this kind of work? And I would say it’s about the sustainability of the work, and the adaptation maybe of methodologies, and how we do it. And, I mean, it takes a long time, and it’s quite costly, and to do it well, you’ve got to really have the local participation, and so on. So, how do we build on the current methodologies, and how do we make it more sustainable? And how do we make sure that there’s continued interest in the process to get this data, because there’s high levels of interest in the data, but not always in the process to collect the data. And linked to that sustainability question for me is, then, what is the compelling way? in which we approach the sharing and exchange of data. And as you spoke about the opportunity with the telecoms firms, I would say to you the biggest challenge, because they would probably be doing that analysis already and have all that kind of segmentation there. They have different reasons for it. But to get them to share it as data for good, how do we present a compelling case to them? How do we build those incentive structures? And if we don’t figure that out, I feel that this work will not be sustainable, because it will be replaced by quicker technical measures that don’t necessarily have the rigour attached to it. So yes, we’ve got to balance innovation with some of the traditional methodologies. We’ve got to adapt it. But how are we going to do that to make sure we don’t ever lose these insights?


Morten Meyerhoff Nielsen: Thank you. Just to try and summarise a little bit on the key takeaways that I’ve seen is that there’s a general consensus that we need better segmented data around gender, income levels, location, education and so forth. But there’s also a recognition that will only get us so far. To address the digital divide, we need to then go down and analyse the contextual, which becomes, to paraphrase Onica Makwakwa, is more of a qualitative assessment. It is not a statistical empirical assessment. And there’s also, I think, more or less a consensus on the panel and with the audience that, yes, we need to balance this sort of anonymisation with privacy when we start layering data across different elements. And then lastly, that there are some opportunities for different types of partnerships for data collection, both with the private sector, and many others. We have been working with a number of partners, particularly telcos, but also with local communities and getting them involved in driving the decisions in order to also target the more tailored initiatives that will include them and give them the opportunities for being digitally included and benefit from that. And we’ll also focus on that. We’ve also now managed to offer an effect things in multiple styles with combination divides in there that doesn’t just go by genetic or income level but are cross-cutting – I forgot what you called it, Pria. Inter odpowiagonal, both on the divide and the inclusion. And we’ve now managed to offer a combination of both of those styles. We have a lot of information on there and details. We will be summarising the discussion of this panel and provide it online in the next couple of weeks. Obviously, the panellists will have a chance to also comment on that draft. But we’ll be sharing that. In the meantime, don’t hesitate to reach out to any of us or to our organisations if you have further questions. We hope that still, in the near future, more discussion of airline logistics can take place. Thank you very much, and enjoy the next couple of days of IGF. Thank you. .


G

Guilherme Canela De Souza Godoi

Speech speed

161 words per minute

Speech length

880 words

Speech time

327 seconds

UNESCO provides comprehensive indicator sets like Internet Universality Indicators based on five pillars (rights, openness, accessibility, multi-stakeholderism) that member states can use for evidence-based policies

Explanation

UNESCO’s Information for All Program offers validated multilateral indicators that governments and civil society can use either to prepare better evidence-based policies or to hold governments accountable. These indicators are based on five pillars with cross-cutting elements like gender and children.


Evidence

The Internet universality indicators have been approved by all UNESCO member states and refined over time. In 40 countries that have implemented their own acts, several used these indicators to change legislation and fill gaps identified through their application.


Major discussion point

Digital Inclusion Data Collection Frameworks and Standards


Topics

Development | Legal and regulatory


Agreed with

– Fabio Senne
– Onica Makwakwa
– Pria Chetty
– Morten Meyerhoff Nielsen

Agreed on

Need for segmented data collection beyond basic connectivity metrics


F

Fabio Senne

Speech speed

135 words per minute

Speech length

2760 words

Speech time

1223 seconds

Brazil’s CETIC model uses multi-stakeholder approach with expert groups to define what to measure, adjusting data production to decision-maker demands

Explanation

CETIC Brazil operates under a non-profit model funded by domain registry that invites multi-stakeholder expert groups before starting any investigation. This approach allows them to adjust data production to match the actual demand from government, private sector, and other stakeholders.


Evidence

CETIC is funded by NIC.BR through .BR domain name registry, providing continuity. They invite expert groups to define measurement topics and have a multi-stakeholder DNA in both organization and research processes.


Major discussion point

Digital Inclusion Data Collection Frameworks and Standards


Topics

Development | Legal and regulatory


Agreed with

– Guilherme Canela De Souza Godoi
– Onica Makwakwa
– Pria Chetty

Agreed on

Need for multi-stakeholder and collaborative approaches to data collection


G20 has recognized the need for segmented monitoring beyond basic connectivity, requiring disaggregation by demographic, economic, and geographic variables

Explanation

G20 members have acknowledged that meaningful connectivity monitoring requires multiple dimensions beyond simple access metrics. The framework includes connection quality, availability, affordability, devices, digital skills, and safety, all disaggregated by various demographic and geographic variables.


Evidence

CETIC supported G20 reports in 2024 and 2025, with the Brazilian presidency launching a report connecting meaningful connectivity to segmented monitoring. The framework argues for disaggregation by age, gender, household size, income, employment status, and geographic location.


Major discussion point

Digital Inclusion Data Collection Frameworks and Standards


Topics

Development | Economic


Agreed with

– Guilherme Canela De Souza Godoi
– Onica Makwakwa
– Pria Chetty
– Morten Meyerhoff Nielsen

Agreed on

Need for segmented data collection beyond basic connectivity metrics


Meaningful connectivity indicators show much lower inclusion rates than basic access statistics – Brazil has 90% basic internet access but only 22% meaningful connectivity

Explanation

When moving beyond simple access metrics to include devices, availability, affordability, and skills, the picture of digital inclusion becomes much worse. This reveals hidden gaps that basic connectivity statistics mask, including significant gender disparities.


Evidence

Brazil shows 90% population with basic internet connection but only 22% with meaningful connectivity. Gender analysis reveals no significant difference in basic access between men and women, but a 10% gap in meaningful connectivity favoring men.


Major discussion point

Segmentation Methodologies and Hidden Barriers


Topics

Development | Gender rights online


Agreed with

– Guilherme Canela De Souza Godoi
– Onica Makwakwa
– Pria Chetty
– Morten Meyerhoff Nielsen

Agreed on

Need for segmented data collection beyond basic connectivity metrics


Geographic disaggregation within cities reveals unexpected patterns, such as high connectivity but low socioeconomic status in specific neighborhoods

Explanation

Detailed geographic analysis can uncover counterintuitive patterns within urban areas by combining different data sources. This granular approach helps identify specific local factors that influence connectivity patterns.


Evidence

In São Paulo, combining socio-demographic and digital inequality data revealed a neighborhood with high connectivity but low socioeconomic status, which was explained by proximity to roads, young population demographics, and young couples living in the area.


Major discussion point

Geographic and Socioeconomic Segmentation


Topics

Development | Infrastructure


Agreed with

– Onica Makwakwa
– Pria Chetty

Agreed on

Importance of qualitative approaches and local context in data collection


Most disconnected people are actually in urban areas due to population concentration, challenging assumptions about urban connectivity

Explanation

While rural areas may have lower connectivity rates, the absolute number of disconnected people is higher in urban areas because that’s where most of the population lives. This challenges common assumptions about where digital divide interventions should focus.


Evidence

Analysis shows that if you count the total number of disconnected people rather than percentages, most are concentrated in urban areas due to population distribution patterns.


Major discussion point

Geographic and Socioeconomic Segmentation


Topics

Development | Infrastructure


Methodological innovation should combine surveys with geospatial data and other sources, such as real-time connectivity quality monitoring in schools

Explanation

Traditional surveys cannot capture everything, so mixing methods and integrating different data sources provides more comprehensive insights. This approach combines real-time technical data with survey responses about usage patterns.


Evidence

CETIC installed C-MAT software in over 70,000 schools across Brazil to provide real-time broadband quality data, which they cross-reference with survey data about what teachers are doing in the same schools.


Major discussion point

Alternative Data Sources and Innovation


Topics

Development | Infrastructure


Citizen-generated data and satellite data provide complementary sources that can be combined with traditional surveys

Explanation

The data community is moving toward combining multiple sources rather than relying solely on traditional surveys or expecting digital platforms to solve all data needs. This includes leveraging citizen participation and satellite technology.


Evidence

UN Data Forum discussions show trends toward citizen-generated data where citizens are involved in producing higher quality, lower cost data. Satellite data and other technological tools are being integrated with traditional methodologies.


Major discussion point

Alternative Data Sources and Innovation


Topics

Development | Infrastructure


Modern data ecosystems span public, private, and civil society sectors, requiring coordination rather than relying solely on national statistics institutes

Explanation

Unlike the past when data was concentrated in national statistics institutes, today’s data ecosystem is distributed across multiple sectors. Coordinating these efforts and breaking down silos between different government departments is essential for effective policymaking.


Evidence

Educational data is often not linked to financial data due to government silos. Private sector holds significant data that isn’t shared for policy purposes, requiring new coordination mechanisms.


Major discussion point

Sustainability and Data Ecosystem Coordination


Topics

Development | Legal and regulatory


Agreed with

– Guilherme Canela De Souza Godoi
– Onica Makwakwa
– Pria Chetty

Agreed on

Need for multi-stakeholder and collaborative approaches to data collection


Digital inclusion should be viewed as collective rather than individual challenges, considering community networks, schools, and libraries as infrastructure

Explanation

Most digital inclusion problems are collective issues that require community-level solutions rather than focusing solely on individual characteristics. This includes leveraging existing public infrastructure like schools and libraries for broader access.


Evidence

In Brazil, libraries represent one of the most widespread public infrastructures that should be engaged for digital inclusion. Community networks offer innovative models for collective digital inclusion solutions.


Major discussion point

Collective vs Individual Approaches


Topics

Development | Infrastructure


Agreed with

– Onica Makwakwa

Agreed on

Recognition of collective rather than individual nature of digital inclusion challenges


Household-level analysis reveals important dynamics like device-sharing ratios and income allocation that individual-focused measures miss

Explanation

Moving beyond individual indicators to household-level analysis reveals quality of access issues. The ratio of people to devices and percentage of household income spent on connectivity provide better insights than simple ownership statistics.


Evidence

CETIC calculates ratios like people per device in households – one computer for one person versus one computer for ten people fighting over the same device represents very different access quality.


Major discussion point

Collective vs Individual Approaches


Topics

Development | Economic


Agreed with

– Onica Makwakwa

Agreed on

Recognition of collective rather than individual nature of digital inclusion challenges


Privacy concerns about data collection exist alongside limited understanding of how digital platforms actually collect personal data

Explanation

Brazilian survey data shows growing privacy concerns, particularly around facial recognition and health data, but limited literacy about how social media platforms collect data. People are more concerned about obvious financial risks than subtle data collection practices.


Evidence

CETIC survey found Brazilians are most concerned about facial recognition and health data collection, and financial fraud risks, but show less understanding of how social media platforms collect personal data through photos and posts.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Privacy and data protection | Human rights principles


M

Morten Meyerhoff Nielsen

Speech speed

142 words per minute

Speech length

3559 words

Speech time

1499 seconds

Current frameworks are supply-oriented, focusing on basic usage rather than meaningful connectivity and demand-side activities

Explanation

Existing digital inclusion frameworks primarily measure supply-side indicators like whether someone used the internet in the last 12 months, with limited focus on the types of activities or demands that indicate meaningful digital participation. This approach fails to capture the quality and purpose of digital engagement.


Evidence

Most frameworks use annual assessment cycles asking basic yes/no questions about internet usage, without examining the type of activities or the degree of people’s use of digital opportunities.


Major discussion point

Digital Inclusion Data Collection Frameworks and Standards


Topics

Development | Digital access


Agreed with

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Onica Makwakwa
– Pria Chetty

Agreed on

Need for segmented data collection beyond basic connectivity metrics


Without knowing who is excluded, where they live, and their characteristics, targeted policy initiatives cannot be effectively developed

Explanation

Effective policy interventions require detailed knowledge about excluded populations to design appropriate solutions. Generic approaches fail because they don’t address the specific barriers and contexts of different excluded groups.


Evidence

About a third of the world’s population is not meaningfully included in digital opportunities, with segmentation differences in Global South, low-income households, rural areas, seniors, people with disabilities, and gender-based exclusions.


Major discussion point

Policy Impact and Targeted Interventions


Topics

Development | Digital access


Telecoms operators hold valuable segmented data that could support policy decisions through partnerships with regulators

Explanation

In 155 countries where legal identity is required for mobile/internet connections, telecom operators possess valuable demographic and usage data that could be anonymized and shared with regulators to create policy-relevant snapshots without additional data collection burden.


Evidence

Legal identity requirements for mobile phone connections in 155 countries create opportunities for anonymized data sharing on gender, age groups, and usage patterns for online commerce and banking through telco licensing partnerships.


Major discussion point

Alternative Data Sources and Innovation


Topics

Infrastructure | Legal and regulatory


O

Onica Makwakwa

Speech speed

153 words per minute

Speech length

2256 words

Speech time

883 seconds

Segmented data collection reveals gender-specific barriers like affordability, safety concerns, and monitoring by family members that regular surveys miss

Explanation

GDIP’s Connected Resilience Report uses both quantitative and qualitative approaches to detect gender-specific barriers that wouldn’t be captured by simple yes/no connectivity questions. This includes family surveillance of women’s online activities and safety concerns that prevent access.


Evidence

Regular surveys asking ‘are you online’ miss underlying drivers like affordability, safety, and family monitoring. The segmented framework revealed that women face monitoring and surveillance of their online activities by family members.


Major discussion point

Segmentation Methodologies and Hidden Barriers


Topics

Gender rights online | Development


Agreed with

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Pria Chetty
– Morten Meyerhoff Nielsen

Agreed on

Need for segmented data collection beyond basic connectivity metrics


Qualitative approaches and policy ethnography help surface hidden gaps and context-specific barriers that quantitative data alone cannot capture

Explanation

Policy ethnography involves bringing policymakers together to understand their decision-making processes while also conducting stakeholder consultations with affected communities. This reveals barriers that wouldn’t appear in standard surveys.


Evidence

GDIP introduced policy ethnography methodology to understand how policymakers make decisions and what informs them, revealing context-specific barriers through direct community engagement.


Major discussion point

Segmentation Methodologies and Hidden Barriers


Topics

Development | Gender rights online


Agreed with

– Pria Chetty
– Fabio Senne

Agreed on

Importance of qualitative approaches and local context in data collection


Peri-urban populations often experience challenges similar to rural communities due to urban inequality, requiring more nuanced geographic classification beyond rural-urban

Explanation

Traditional rural-urban classifications miss important distinctions within urban areas. Peri-urban populations face resource constraints and urban inequality that make their experiences closer to rural communities than urban centers.


Evidence

South Africa exemplifies how urban sectors cannot be treated uniformly due to urban inequality, where peri-urban populations experience challenges similar to rural communities because of resource limitations.


Major discussion point

Geographic and Socioeconomic Segmentation


Topics

Development | Digital access


National averages fail to serve women and marginalized groups, particularly in highly unequal societies like South Africa where income stratification is essential

Explanation

In highly unequal societies, national averages mask the experiences of those at the bottom income levels where women are over-represented. Affordability analysis without income quantile stratification produces over-inflated outcomes that don’t represent the most vulnerable.


Evidence

South Africa is the most unequal society with more than half the population living on less than half the GNI. Women are over-represented in lower income quantiles, making income stratification essential for gender-responsive policy.


Major discussion point

Geographic and Socioeconomic Segmentation


Topics

Gender rights online | Economic


Segmented data enables gender-responsive policy interventions informed by lived experiences rather than assumptions

Explanation

Effective policy interventions must be informed by women’s actual lived experiences rather than assumptions about their needs. Segmentation helps identify what women themselves have identified as barriers to meaningful connectivity.


Evidence

The Connected Resilience Report focuses on gendered experiences through meaningful connectivity, ensuring programs target needs that women have identified rather than assumed needs.


Major discussion point

Policy Impact and Targeted Interventions


Topics

Gender rights online | Development


Digital centers built for rural women failed because they didn’t account for women’s daily schedules and safety concerns when walking to centers

Explanation

A country built digital centers in rural areas funded through Universal Service and Access Funds, but women weren’t using them. Stakeholder consultations revealed the centers’ hours didn’t match women’s schedules and the locations posed safety risks.


Evidence

Women’s daily routines include waking early, fetching wood, caring for children, going to market, and returning before children come home from school. The centers were located in areas women felt unsafe walking to, and operated during inconvenient hours.


Major discussion point

Policy Impact and Targeted Interventions


Topics

Gender rights online | Development


Agreed with

– Pria Chetty
– Fabio Senne

Agreed on

Importance of qualitative approaches and local context in data collection


One tablet per household programs in Uganda successfully empowered female-led households, with unexpected benefits for children’s education

Explanation

A subsidy model providing one tablet per household, focusing on female-led households and funded through Universal Service Funds, had unexpected outcomes. While targeting women, children benefited most, particularly in education.


Evidence

The Uganda program focused on female-led households using USF funds. Despite targeting women, children were the primary beneficiaries, with education being the most highly impacted area.


Major discussion point

Policy Impact and Targeted Interventions


Topics

Gender rights online | Development


Agreed with

– Fabio Senne

Agreed on

Recognition of collective rather than individual nature of digital inclusion challenges


Decolonized approaches to data collection are essential, working with local partners rather than external researchers studying communities

Explanation

Africa has a history of being over-researched by external organizations, creating ethical concerns about extractive research practices. Decolonized approaches involve local community leadership in data collection and ensuring communities understand and consent to how data will be used.


Evidence

Africa feels ‘overly searched’ with a ‘gaze on Africa’ around ways of living. Historical baggage exists around external organizations studying communities rather than working with local partners and empowering local communities to lead data collection.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Human rights principles | Development


National census data represents an underutilized resource that could include digital-related questions with proper engagement of census bureaus

Explanation

Every 10 years, most countries fund national census data collection, but few engage with census bureaus to include digital-related questions. This represents a missed opportunity for comprehensive digital inclusion data, though it requires investment in analysis and utilization.


Evidence

GDIP was successful with Mozambique in getting digital questions included in census data. However, collecting the data is only the first step – analysis and utilization for policy intervention requires additional investment.


Major discussion point

Alternative Data Sources and Innovation


Topics

Development | Legal and regulatory


Mapping existing data sources within countries reduces survey burden and helps researchers know what data is available from different stakeholders

Explanation

Creating data and research working groups to map existing ICT data within countries helps researchers coordinate efforts and avoid duplication. This includes engaging mobile operators who hold valuable data that could reduce household survey requirements.


Evidence

Ghana exercise created a data and research working group mapping existing ICT data, including frequency of updates and some success bringing mobile operators into the process. This reduced the need for 40-question household surveys when operators could provide 10 data points.


Major discussion point

Sustainability and Data Ecosystem Coordination


Topics

Development | Infrastructure


Agreed with

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Pria Chetty

Agreed on

Need for multi-stakeholder and collaborative approaches to data collection


Disagreed with

– Pria Chetty

Disagreed on

Data aggregation and sharing approaches


Communities should be involved in leading data collection processes rather than being passive subjects of external research

Explanation

Local context requires more than superficial consultation – it means empowering local communities to lead data collection processes. This goes beyond having coffee meetings with consultants to actually involving communities in the research design and implementation.


Evidence

The toothbrush vs. mobile phone comparison study exposed researcher ignorance about local dental health practices. True local context means allowing communities to lead data collection, not just having consultants conduct brief consultations.


Major discussion point

Collective vs Individual Approaches


Topics

Development | Human rights principles


Agreed with

– Fabio Senne

Agreed on

Recognition of collective rather than individual nature of digital inclusion challenges


Online privacy concerns should be connected to offline data protection practices to provide comprehensive education

Explanation

Data privacy issues exist both online and offline, but people often don’t make these connections. Educating people about protecting themselves should address both digital and physical data sharing practices, like leaving passport copies at hotels.


Evidence

During COVID-19 in South Africa, people who signed up for COVID-19 tracking apps later received SMS messages from political parties during election campaigns, showing data privacy breaches. Offline examples include leaving passport photocopies at hotel receptions.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Privacy and data protection | Human rights principles


P

Pria Chetty

Speech speed

148 words per minute

Speech length

2687 words

Speech time

1088 seconds

Research ICT Africa’s after-access research combines quantitative and qualitative methods to understand usage patterns, digital literacy levels, and trust issues

Explanation

The after-access research prioritizes segmented data by collecting specific information from individuals and households about their access, usage patterns, digital literacy capabilities, and trust levels. This comprehensive approach reveals nuances that single-method approaches miss.


Evidence

They ask specific questions about smartphone/computer/broadband access, usage for social media/work/education/health/government services, preferred platforms, digital literacy skills like email and online banking, and trust-related barriers.


Major discussion point

Segmentation Methodologies and Hidden Barriers


Topics

Development | Digital access


Agreed with

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Onica Makwakwa
– Morten Meyerhoff Nielsen

Agreed on

Need for segmented data collection beyond basic connectivity metrics


Anonymized data collection for policy purposes typically falls outside personal data protection regulations but should still follow ethical standards

Explanation

While segmented data for policy purposes may not include personally identifiable information and thus fall outside data protection legislation, researchers should still apply high standards including purpose limitation, security measures, and data minimization principles.


Evidence

Non-personal data doesn’t require data protection compliance, but principles like collecting only what’s needed, using data within collection purposes, and maintaining security standards should still apply to aggregated datasets.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Privacy and data protection | Legal and regulatory


Local participation in data collection addresses privacy concerns and ensures willing participation from communities

Explanation

Using local researchers who understand language gaps and community concerns helps address privacy perceptions and overall participation concerns. This methodological approach distinguishes good data from bad data by ensuring willing data providers.


Evidence

Local researchers can deal with language barriers and understand community concerns about participating in surveys, leading to better quality data from willing participants rather than reluctant or suspicious respondents.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Development | Human rights principles


Agreed with

– Onica Makwakwa
– Fabio Senne

Agreed on

Importance of qualitative approaches and local context in data collection


Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing

Explanation

While there’s high interest in segmented data results, there’s less interest in funding the collection process. Sustainability depends on creating compelling incentives for private sector data sharing, particularly with telecoms who already have segmented analysis capabilities.


Evidence

Telecoms firms likely already do segmentation analysis for their own purposes but need compelling incentives to share it as ‘data for good.’ Without solving this, traditional rigorous methodologies may be replaced by quicker but less rigorous technical measures.


Major discussion point

Sustainability and Data Ecosystem Coordination


Topics

Development | Economic


Agreed with

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Onica Makwakwa

Agreed on

Need for multi-stakeholder and collaborative approaches to data collection


Disagreed with

– Onica Makwakwa

Disagreed on

Data aggregation and sharing approaches


A

Audience

Speech speed

141 words per minute

Speech length

330 words

Speech time

140 seconds

Consent mechanisms need improvement to be more user-friendly and allow granular choices about data sharing

Explanation

Current consent mechanisms like terms and conditions are not user-friendly, leading people to skip reading them entirely. There’s a need for better design that allows users to easily understand and make granular choices about what data they’re willing to share.


Evidence

The audience member noted that even they skip reading terms and conditions entirely, and suggested that cookie consent mechanisms could be improved to allow users to easily say yes to some data uses and no to others.


Major discussion point

Data Privacy and Ethical Considerations


Topics

Privacy and data protection | Consumer protection


Agreements

Agreement points

Need for segmented data collection beyond basic connectivity metrics

Speakers

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Onica Makwakwa
– Pria Chetty
– Morten Meyerhoff Nielsen

Arguments

UNESCO provides comprehensive indicator sets like Internet Universality Indicators based on five pillars (rights, openness, accessibility, multi-stakeholderism) that member states can use for evidence-based policies


G20 has recognized the need for segmented monitoring beyond basic connectivity, requiring disaggregation by demographic, economic, and geographic variables


Meaningful connectivity indicators show much lower inclusion rates than basic access statistics – Brazil has 90% basic internet access but only 22% meaningful connectivity


Segmented data collection reveals gender-specific barriers like affordability, safety concerns, and monitoring by family members that regular surveys miss


Research ICT Africa’s after-access research combines quantitative and qualitative methods to understand usage patterns, digital literacy levels, and trust issues


Current frameworks are supply-oriented, focusing on basic usage rather than meaningful connectivity and demand-side activities


Summary

All speakers agree that traditional binary connectivity measures (connected/not connected) are insufficient and that comprehensive segmented data collection is essential to understand the true nature of digital inclusion and exclusion


Topics

Development | Digital access


Importance of qualitative approaches and local context in data collection

Speakers

– Onica Makwakwa
– Pria Chetty
– Fabio Senne

Arguments

Qualitative approaches and policy ethnography help surface hidden gaps and context-specific barriers that quantitative data alone cannot capture


Digital centers built for rural women failed because they didn’t account for women’s daily schedules and safety concerns when walking to centers


Local participation in data collection addresses privacy concerns and ensures willing participation from communities


Geographic disaggregation within cities reveals unexpected patterns, such as high connectivity but low socioeconomic status in specific neighborhoods


Summary

Speakers consistently emphasize that quantitative data alone is insufficient and that qualitative methods with strong local participation are essential to understand the real barriers and contexts affecting digital inclusion


Topics

Development | Human rights principles


Need for multi-stakeholder and collaborative approaches to data collection

Speakers

– Guilherme Canela De Souza Godoi
– Fabio Senne
– Onica Makwakwa
– Pria Chetty

Arguments

Brazil’s CETIC model uses multi-stakeholder approach with expert groups to define what to measure, adjusting data production to decision-maker demands


Modern data ecosystems span public, private, and civil society sectors, requiring coordination rather than relying solely on national statistics institutes


Mapping existing data sources within countries reduces survey burden and helps researchers know what data is available from different stakeholders


Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Summary

All speakers agree that effective data collection requires collaboration across sectors and stakeholders, moving beyond traditional single-institution approaches to leverage diverse data sources and expertise


Topics

Development | Legal and regulatory


Recognition of collective rather than individual nature of digital inclusion challenges

Speakers

– Fabio Senne
– Onica Makwakwa

Arguments

Digital inclusion should be viewed as collective rather than individual challenges, considering community networks, schools, and libraries as infrastructure


Household-level analysis reveals important dynamics like device-sharing ratios and income allocation that individual-focused measures miss


One tablet per household programs in Uganda successfully empowered female-led households, with unexpected benefits for children’s education


Communities should be involved in leading data collection processes rather than being passive subjects of external research


Summary

Speakers agree that digital inclusion is fundamentally a collective challenge requiring community-level solutions and household-level analysis rather than focusing solely on individual characteristics


Topics

Development | Infrastructure


Similar viewpoints

Both speakers emphasize the critical importance of gender-disaggregated data and the inadequacy of national averages for understanding women’s experiences with digital technologies, particularly in highly unequal societies

Speakers

– Onica Makwakwa
– Pria Chetty

Arguments

Segmented data collection reveals gender-specific barriers like affordability, safety concerns, and monitoring by family members that regular surveys miss


National averages fail to serve women and marginalized groups, particularly in highly unequal societies like South Africa where income stratification is essential


Research ICT Africa’s after-access research combines quantitative and qualitative methods to understand usage patterns, digital literacy levels, and trust issues


Topics

Gender rights online | Development


Both speakers advocate for methodological innovation that combines traditional surveys with new data sources and technologies, while recognizing the sustainability challenges of comprehensive data collection

Speakers

– Fabio Senne
– Pria Chetty

Arguments

Methodological innovation should combine surveys with geospatial data and other sources, such as real-time connectivity quality monitoring in schools


Citizen-generated data and satellite data provide complementary sources that can be combined with traditional surveys


Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Topics

Development | Infrastructure


Both speakers emphasize the ethical dimensions of data collection, advocating for decolonized approaches that prioritize local participation and community leadership in research processes

Speakers

– Onica Makwakwa
– Pria Chetty

Arguments

Decolonized approaches to data collection are essential, working with local partners rather than external researchers studying communities


Local participation in data collection addresses privacy concerns and ensures willing participation from communities


Anonymized data collection for policy purposes typically falls outside personal data protection regulations but should still follow ethical standards


Topics

Human rights principles | Privacy and data protection


Unexpected consensus

Private sector data partnerships as essential for sustainability

Speakers

– Fabio Senne
– Pria Chetty
– Morten Meyerhoff Nielsen
– Onica Makwakwa

Arguments

Citizen-generated data and satellite data provide complementary sources that can be combined with traditional surveys


Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Telecoms operators hold valuable segmented data that could support policy decisions through partnerships with regulators


Mapping existing data sources within countries reduces survey burden and helps researchers know what data is available from different stakeholders


Explanation

Despite typical concerns about private sector data control and privacy, there was unexpected consensus that partnerships with private sector entities, particularly telecoms, are essential for sustainable and comprehensive data collection. This represents a pragmatic recognition that traditional survey methods alone are insufficient and costly.


Topics

Development | Economic


Limitations of urban-rural binary classifications

Speakers

– Onica Makwakwa
– Fabio Senne

Arguments

Peri-urban populations often experience challenges similar to rural communities due to urban inequality, requiring more nuanced geographic classification beyond rural-urban


Most disconnected people are actually in urban areas due to population concentration, challenging assumptions about urban connectivity


Geographic disaggregation within cities reveals unexpected patterns, such as high connectivity but low socioeconomic status in specific neighborhoods


Explanation

There was unexpected consensus that traditional rural-urban classifications are inadequate for understanding digital divides. This challenges conventional wisdom about where digital exclusion occurs and suggests more nuanced geographic analysis is needed.


Topics

Development | Infrastructure


Overall assessment

Summary

The speakers demonstrated remarkably high consensus on fundamental issues around digital inclusion data collection, including the need for segmented data beyond basic connectivity, the importance of qualitative and local approaches, multi-stakeholder collaboration, and viewing digital inclusion as collective challenges. There was also unexpected agreement on pragmatic issues like private sector partnerships and the limitations of traditional geographic classifications.


Consensus level

Very high consensus with strong alignment on both methodological approaches and policy implications. This suggests a mature field where practitioners have converged on best practices through experience, creating a solid foundation for advancing digital inclusion measurement and policy interventions globally.


Differences

Different viewpoints

Data aggregation and sharing approaches

Speakers

– Pria Chetty
– Onica Makwakwa

Arguments

Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Mapping existing data sources within countries reduces survey burden and helps researchers know what data is available from different stakeholders


Summary

Pria Chetty expressed caution about bringing data together due to potential for massive harm and vulnerabilities in data lakes, while Onica Makwakwa advocated for mapping and coordinating existing data sources. Pria emphasized the need for deliberate and well-intentioned processes with accountability, whereas Onica focused on practical coordination benefits.


Topics

Development | Privacy and data protection


Unexpected differences

Risk tolerance for data integration

Speakers

– Pria Chetty
– Onica Makwakwa

Arguments

Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Mapping existing data sources within countries reduces survey burden and helps researchers know what data is available from different stakeholders


Explanation

This disagreement was unexpected because both speakers are from organizations focused on digital inclusion research and might be expected to have similar approaches to data coordination. Pria’s strong caution about data lakes and integration risks contrasted with Onica’s more optimistic view of data mapping and coordination benefits.


Topics

Development | Privacy and data protection


Overall assessment

Summary

The discussion showed remarkable consensus among speakers on the need for better segmented data collection, the importance of qualitative approaches, and the value of local community involvement. The main area of disagreement was around data integration approaches, with differing views on risk tolerance and coordination strategies.


Disagreement level

Very low level of disagreement. The speakers largely complemented each other’s perspectives rather than conflicting. This high level of consensus suggests a mature field where practitioners have converged on core principles, but may indicate a need for more diverse perspectives to challenge existing approaches and drive innovation in digital inclusion data collection methodologies.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasize the critical importance of gender-disaggregated data and the inadequacy of national averages for understanding women’s experiences with digital technologies, particularly in highly unequal societies

Speakers

– Onica Makwakwa
– Pria Chetty

Arguments

Segmented data collection reveals gender-specific barriers like affordability, safety concerns, and monitoring by family members that regular surveys miss


National averages fail to serve women and marginalized groups, particularly in highly unequal societies like South Africa where income stratification is essential


Research ICT Africa’s after-access research combines quantitative and qualitative methods to understand usage patterns, digital literacy levels, and trust issues


Topics

Gender rights online | Development


Both speakers advocate for methodological innovation that combines traditional surveys with new data sources and technologies, while recognizing the sustainability challenges of comprehensive data collection

Speakers

– Fabio Senne
– Pria Chetty

Arguments

Methodological innovation should combine surveys with geospatial data and other sources, such as real-time connectivity quality monitoring in schools


Citizen-generated data and satellite data provide complementary sources that can be combined with traditional surveys


Data collection sustainability requires building incentive structures for private sector participation and making compelling cases for data sharing


Topics

Development | Infrastructure


Both speakers emphasize the ethical dimensions of data collection, advocating for decolonized approaches that prioritize local participation and community leadership in research processes

Speakers

– Onica Makwakwa
– Pria Chetty

Arguments

Decolonized approaches to data collection are essential, working with local partners rather than external researchers studying communities


Local participation in data collection addresses privacy concerns and ensures willing participation from communities


Anonymized data collection for policy purposes typically falls outside personal data protection regulations but should still follow ethical standards


Topics

Human rights principles | Privacy and data protection


Takeaways

Key takeaways

Better segmented data collection is essential for addressing digital divides, requiring disaggregation by gender, income, location, education, age, and other demographic variables rather than relying on national averages


Qualitative research and policy ethnography are crucial for understanding hidden barriers and context-specific challenges that quantitative surveys alone cannot capture


Meaningful connectivity indicators reveal much lower digital inclusion rates than basic access statistics – highlighting the gap between having internet access and being able to use it effectively


Current digital inclusion frameworks are predominantly supply-oriented, focusing on basic usage rather than demand-side activities and quality of digital engagement


Local community participation in data collection is essential for addressing privacy concerns, ensuring cultural sensitivity, and obtaining reliable data from marginalized populations


Digital inclusion should be viewed as a collective challenge requiring household and community-level analysis rather than purely individual metrics


Data privacy and ethical considerations must be balanced with the need for segmented data, requiring anonymization, consent mechanisms, and decolonized research approaches


Alternative data sources including telecoms data, census information, geospatial data, and citizen-generated data can complement traditional surveys and reduce collection burden


Resolutions and action items

Panel discussion results will be summarized and shared online within the next couple of weeks, with panelists having opportunity to comment on the draft


Participants encouraged to reach out to panelists and their organizations for further questions and collaboration


Implicit commitment to continue developing segmented data collection methodologies and sharing best practices among organizations represented


Unresolved issues

How to ensure long-term sustainability and funding for comprehensive segmented data collection efforts, particularly in developing countries


How to create compelling incentive structures for private sector (especially telecoms) to share data for public good while maintaining commercial interests


How to prevent segmented data from being used to reinforce existing patterns of marginalization and exclusion


How to balance the need for detailed segmentation with privacy protection, particularly when layering multiple data sources


How to standardize segmentation categories globally while maintaining relevance to local contexts and needs


How to make segmented data more accessible to non-researchers and enable uses that weren’t originally conceived by data collectors


How to coordinate data collection across the ecosystem of public, private, and civil society actors to avoid duplication and gaps


How to adapt methodologies to be more sustainable and cost-effective while maintaining rigor and local participation


Suggested compromises

Using layered data approach where national-level data provides ‘heat maps’ to identify problem areas, then diving deeper with contextual analysis only where red flags appear


Combining multiple data sources (surveys, administrative data, telecoms data, satellite data) rather than relying on single collection methods


Applying data protection standards to non-personal data as a precautionary measure, even when not legally required


Engaging with national census bureaus to include digital-related questions rather than conducting separate comprehensive surveys


Creating data mapping exercises within countries to coordinate existing data sources rather than centralizing all data in one location


Focusing on anonymized, aggregated data for policy purposes while maintaining individual privacy protections


Balancing innovation in data collection methods with traditional rigorous methodologies to ensure reliability


Using household-level indicators alongside individual metrics to capture collective aspects of digital inclusion


Thought provoking comments

But when you go to the, when you include devices and availability of the connection and affordability and skills and other things, our figure is much worse. We only have 22% of the total population that we consider in our indicator with meaningful connectivity… if you take an overall picture, there’s not much difference, there’s not significant difference between women and men in terms of basic access to the Internet. But when we go to the indicators of meaningful connectivity, we see a 10% gap in the country in comparison of women and men in terms of meaningful connectivity.

Speaker

Fabio Senne


Reason

This comment fundamentally challenges the conventional understanding of digital inclusion by revealing the stark difference between basic connectivity statistics and meaningful connectivity. It demonstrates how surface-level data can be misleading and mask significant inequalities.


Impact

This shifted the discussion from focusing on simple access metrics to understanding the complexity of digital inclusion. It reinforced the panel’s central argument about the need for segmented data and influenced subsequent discussions about the limitations of national averages and the importance of looking beyond basic connectivity measures.


National averages are just simply not serving women. They are not serving everyone else as well… anything around affordability that you are going to do in South Africa without stratifying the income quantiles, you are always going to get an over-inflated outcome that does not fully represent those who are at the bottom of the income quantiles.

Speaker

Onica Makwakwa


Reason

This comment powerfully articulates why aggregate data fails marginalized communities and provides a concrete example of how statistical methodology can perpetuate inequality by masking the experiences of the most vulnerable populations.


Impact

This comment became a cornerstone argument for the entire discussion, establishing the fundamental problem with current data collection approaches. It led to deeper exploration of intersectionality and influenced the conversation about policy ethnography and community-centered research approaches.


I think for a long time that’s because we do mostly surveys or they interview one individual so we try to think about digital inclusion as an individual characteristic… but most of the problems are collectives, collective problems… We decided to calculate a ratio of people per device, or you can do this with income, what’s the percentage of the income of the device. So, this type of thing thinks the household as a collective of people rather than individual.

Speaker

Fabio Senne


Reason

This comment introduces a paradigm shift from individual-focused to collective-focused analysis of digital inclusion, challenging the fundamental assumptions underlying most digital divide research and policy interventions.


Impact

This reframed the entire approach to data collection and analysis, leading to discussions about household dynamics, community networks, and collective solutions. It influenced Onica’s follow-up about successful household-based interventions and changed how participants thought about designing both research and policy interventions.


It’s those type of narratives that, you know, when we step back and look at them, like, what exactly are you trying to argue, you know, in comparing number of mobile phones and number of toothbrushes? Because if anything, it actually exposed the ignorance of the researcher themselves, because there’s other ways of keeping dental health that’s not just only a Western toothbrush and toothpaste kind of methodology.

Speaker

Onica Makwakwa


Reason

This comment brilliantly exposes the colonial and culturally biased assumptions embedded in development research, using a specific example to illustrate how researchers’ cultural blind spots can lead to problematic narratives about communities they study.


Impact

This comment elevated the discussion to address power dynamics, colonial legacies, and cultural sensitivity in research. It reinforced the importance of local participation and decolonized approaches, influencing the subsequent conversation about ethics, community engagement, and the need for local researchers to lead data collection processes.


How can we ensure that the segmented data collection respects the privacy and dignity of marginalized communities?

Speaker

Carmen Ferri (online moderator)


Reason

This question introduced a critical tension at the heart of the discussion – the need to collect detailed data about vulnerable populations while simultaneously protecting them from potential harm through that same data collection.


Impact

This question fundamentally shifted the discussion from technical and methodological considerations to ethical ones, sparking a rich conversation about privacy, consent, power dynamics, and the potential for data to reinforce marginalization. It led to discussions about decolonized research approaches and the balance between data utility and community protection.


There’s high levels of interest in the data, but not always in the process to collect the data… How do we build those incentive structures? And if we don’t figure that out, I feel that this work will not be sustainable, because it will be replaced by quicker technical measures that don’t necessarily have the rigour attached to it.

Speaker

Pria Chetty


Reason

This comment identifies a fundamental sustainability challenge in the field – the disconnect between demand for insights and willingness to invest in rigorous data collection processes, highlighting the risk of losing methodological rigor for convenience.


Impact

This comment brought the discussion full circle to practical implementation challenges and long-term sustainability. It influenced the final recommendations and highlighted the need for innovative partnerships and funding models, connecting back to earlier discussions about telco partnerships and alternative data sources.


Overall assessment

These key comments fundamentally shaped the discussion by progressively deepening and complicating the conversation about digital inclusion data. The discussion evolved from technical considerations about data segmentation to profound questions about methodology, ethics, power dynamics, and sustainability. Fabio’s insights about meaningful connectivity versus basic access established the empirical foundation for why current approaches are inadequate. Onica’s comments about national averages and cultural bias elevated the conversation to address systemic inequalities and colonial legacies in research. The privacy question introduced crucial ethical dimensions, while Pria’s sustainability concerns brought practical implementation challenges into focus. Together, these comments transformed what could have been a technical discussion about data collection into a nuanced exploration of how research methodology intersects with social justice, cultural sensitivity, and long-term impact. The comments built upon each other to create a comprehensive critique of current approaches while pointing toward more equitable and sustainable alternatives.


Follow-up questions

How can we ensure that the segmented data collection respects the privacy and dignity of marginalized communities?

Speaker

Online audience member (via Carmen Ferri)


Explanation

This addresses the critical balance between collecting necessary data to address digital divides while protecting vulnerable populations from potential harm or exploitation through data collection processes.


How can we prevent the use of segmented data to be interpreted or used in ways that could reinforce marginalization?

Speaker

Kiho Oshima (University of Bremen student)


Explanation

This highlights the risk that data intended to help marginalized communities could inadvertently be used to profile or further discriminate against them, requiring careful consideration of data governance and usage protocols.


How do we balance approaching marginalized groups with data collection needs while protecting them because they are marginalized?

Speaker

Kiho Oshima (University of Bremen student)


Explanation

This explores the fundamental tension between needing data about vulnerable populations to help them while simultaneously protecting them from potential harms of data collection and usage.


How can we build compelling incentive structures for private sector data sharing, particularly with telecommunications firms?

Speaker

Pria Chetty


Explanation

This addresses the sustainability challenge of data collection by exploring how to motivate private companies to share valuable data for public good purposes, which could significantly improve data availability and reduce collection costs.


How can we make segmented data collection more sustainable and adapt methodologies for long-term viability?

Speaker

Pria Chetty


Explanation

This focuses on the practical challenge of maintaining high-quality, locally-participatory data collection processes over time, given their high costs and resource requirements.


How can we leverage open data for communities and reduce fragmentation of data collection efforts?

Speaker

Onica Makwakwa


Explanation

This explores opportunities to maximize the utility of existing datasets and avoid duplicative data collection efforts while ensuring communities can benefit from and access relevant data about themselves.


How can we engage with national census bureaus to transform their data collection to include digital-related questions?

Speaker

Onica Makwakwa


Explanation

This identifies an underutilized opportunity to incorporate digital inclusion metrics into existing, well-funded national data collection infrastructure that occurs regularly across countries.


How can we develop regional collaboration frameworks to compare methodologies and improve data reliability and accessibility?

Speaker

Pria Chetty


Explanation

This addresses the need for coordination among organizations doing similar work to share best practices, standardize approaches where appropriate, and make data more accessible to diverse users with varying technical expertise.


How can we create data mapping exercises to identify existing ICT data sources within countries?

Speaker

Onica Makwakwa


Explanation

This suggests a systematic approach to cataloging available data sources, including from mobile operators and other private entities, to reduce survey burden and improve research efficiency.


How can we develop collective measures for digital inclusion rather than focusing solely on individual characteristics?

Speaker

Fabio Senne


Explanation

This challenges the traditional approach of measuring digital inclusion at the individual level and suggests exploring household, community, and collective indicators that better reflect how digital access and use actually occurs in practice.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Day 0 Event #161 Preparing Your Internet to Power the Digital of Tomorrow

Day 0 Event #161 Preparing Your Internet to Power the Digital of Tomorrow

Session at a glance

Summary

This Day Zero session at the Internet Governance Forum focused on preparing internet infrastructure to support tomorrow’s digital economy, featuring speakers from regulatory bodies, technical organizations, and international development agencies. The discussion emphasized that robust internet infrastructure is a strategic necessity rather than a luxury, requiring collaboration across multiple stakeholder groups.


Norway’s representative highlighted their comprehensive approach, including 99.1% broadband coverage at 100+ Mbps, extensive 5G deployment, enhanced cybersecurity regulations aligned with EU directives, and infrastructure resilience through multiple autonomous transmission networks. Croatia’s regulator discussed the importance of balancing economic efficiency with security resilience, noting the challenge of justifying investments in redundant infrastructure that may only be needed during emergencies. The session emphasized agile regulation that supports innovation while maintaining security and trust.


Technical experts from ICANN and the Number Resource Organization stressed the critical role of multi-stakeholder collaboration in maintaining internet stability. They highlighted the importance of routing security through technologies like RPKI (Resource Public Key Infrastructure), which adds cryptographic verification to internet routing but remains underadopted globally. Smart Africa’s representative showcased continental initiatives like the One African Network project, which aims to eliminate roaming charges across 11 countries and demonstrates successful multi-stakeholder cooperation.


The UNDP presented their Digital Professional Development initiative for the Arab region, addressing the fact that 30% of the region remains unconnected. Their approach focuses on three pillars: promoting IPv6 adoption, supporting Internet Exchange Points (IXPs) for sustainable connectivity, and implementing RPKI for security. Throughout the discussion, speakers consistently emphasized that capacity building, education for general users, and long-term partnerships between governments, private sector, and technical communities are essential for creating resilient internet infrastructure that can support emerging technologies like AI and IoT while bridging the digital divide.


Keypoints

## Major Discussion Points:


– **Infrastructure Investment and Connectivity Goals**: Discussion of national broadband strategies, with Norway achieving 99.1% household coverage at 100+ Mbps and targeting universal gigabit access by 2030, while addressing the challenge that 30% of the Arab region (100+ million people) remains unconnected to the internet.


– **Cybersecurity and Regulatory Frameworks**: Examination of comprehensive security approaches including alignment with EU directives (NIS2, Cyber Resilience Act), implementation of sectoral CERT coordination models, and the balance between economic efficiency and national security resilience requirements.


– **Technical Security Standards and Best Practices**: Focus on routing security through RPKI (Resource Public Key Infrastructure) adoption, with current statistics showing 50-60% prefix coverage but less than 25% of networks fully protected, plus discussion of emerging privacy technologies like encrypted DNS and encrypted client hello.


– **Multi-stakeholder Collaboration Models**: Emphasis on partnerships between governments, regulators, private sector, and technical communities, with examples including Smart Africa’s One African Network project spanning 11 countries and various capacity building initiatives across regions.


– **Capacity Building and Digital Skills Development**: Recognition of the need for both basic digital literacy for general users and specialized technical expertise for network operators, with organizations running hundreds of workshops and training programs to address regional-specific needs.


## Overall Purpose:


The discussion aimed to address how internet infrastructure can be prepared to support tomorrow’s digital economy, focusing on the strategic necessity of technical preparedness rather than treating it as a luxury. The session sought to explore connectivity, security, and policy frameworks needed to create robust internet ecosystems globally.


## Overall Tone:


The discussion maintained a consistently professional and collaborative tone throughout. Speakers demonstrated expertise while acknowledging challenges, and there was a strong emphasis on partnership and shared responsibility. The tone remained constructive and forward-looking, with participants sharing concrete examples and actionable recommendations. Technical difficulties with some remote participants briefly interrupted the flow but didn’t detract from the overall positive and solution-oriented atmosphere.


Speakers

– **Chafic Chaya** – Regional Manager for Public Policy and Government Affairs for the RIPE NCC for the Middle East region, Session moderator


– **Frank Stien** – Representative from Norway’s regulator (Norwegian Communication Authority, NKOM), National CERT background


– **Sofia Silva Berenguer** – Representative from the NRO (Number Resource Organization), coordinates activities of the five RIRs


– **Adiel Akplogan** – Representative from ICANN


– **Rodrigue Guiguembde** – Representative from Smart Africa


– **Zdravko Jukic** – Representative from Croatia’s regulator, currently at BEREC (Body of European Regulators for Electronic Communications), member of Cyber Security and Resilience Working Group


– **Dany Wazen** – Online moderator from Jordan, handles UNDP activities in the region


– **Vinicius Fortuna** – Works at Google Jigsaw on internet access, resilience and privacy


– **Audience** – Unidentified audience member asking questions


Additional speakers:


– **Danny Wazin** – Mentioned as online moderator colleague from Jordan (appears to be the same person as Dany Wazen, possibly different spelling)


– **Ilka** – Mentioned as session reporter


Full session report

# Preparing Internet Infrastructure for Tomorrow’s Digital Economy: A Comprehensive Discussion Report


## Executive Summary


This Day Zero session at the Internet Governance Forum brought together representatives from regulatory bodies, technical organisations, and international development agencies to examine how internet infrastructure can be prepared to support tomorrow’s digital economy. The session was moderated by Chafic Chaya and featured speakers from Norway’s telecommunications regulator (NKOM), Croatia’s regulatory authority, ICANN, the Number Resource Organisation, Smart Africa, and UNDP.


Technical connectivity issues affected several online speakers throughout the session, highlighting the practical challenges of global digital participation. Despite these difficulties, the discussion covered key themes including national regulatory approaches, cybersecurity frameworks, routing security challenges, multi-stakeholder collaboration models, and capacity building initiatives. The session concluded with concrete next steps, including a new partnership between UNDP and RIPE NCC focused on IPv6 adoption, Internet Exchange Points (IXPs), and RPKI implementation in the Arab region.


## National Regulatory Approaches


### Norway’s Infrastructure Strategy


Frank Stien from Norway’s telecommunications regulator (NKOM) presented Norway’s comprehensive approach to digital infrastructure development. He reported that Norway has achieved 99.1% household broadband coverage at speeds exceeding 100 Mbps, with 96.2% having access to gigabit speeds. The country aims for universal gigabit access by 2030, supported by 85% geographic coverage with 4G and 5G networks built on extensive fibre infrastructure.


Stien emphasized that Norway’s cybersecurity approach includes sectoral CERTs across 15 different sectors, all coordinated by the national NCSC. He noted that densely populated areas require at least three independent transmission networks to ensure critical redundancy, and highlighted how national roaming capabilities combining all operational network parts can maintain connectivity during emergencies.


### European Regulatory Coordination


Zdravko Jukic from Croatia’s regulatory authority discussed the European perspective on balancing economic efficiency with security resilience. He articulated a fundamental challenge in infrastructure planning: while regulators typically avoid duplication for economic reasons, resilience requires building connections that may only be used during emergencies—investments that are not economically justified by themselves but are essential for national security.


Jukic highlighted Croatia’s work with BEREC (Body of European Regulators for Electronic Communications), noting that the organization renamed its working group to emphasize resilience. He mentioned Croatia’s early transposition of the EU’s NIS2 directive and the use of the 5G toolbox as an example of flexible European cooperation that provides common standards while allowing national customization.


## Technical Security and Routing Challenges


### RPKI Implementation Gaps


Sofia Silva Berenguer from the Number Resource Organisation addressed critical gaps in routing security, specifically regarding RPKI (Resource Public Key Infrastructure) implementation. Despite RPKI technology being available for over a decade, she reported that while 50-60% of prefix origin pairs are covered by route origin authorizations, less than 25% of networks implement full protection.


Silva Berenguer emphasized that RPKI adds cryptographic verification to BGP announcements, providing essential protection against route hijacking. She noted that implementation gaps often exist between technical teams who understand RPKI’s importance and decision-makers who control budgets and priorities. She also promoted the MANRS initiative as a reputation-based approach to improving routing security.


### DNS Privacy Concerns


Vinicius Fortuna raised concerns about DNS privacy, emphasizing the need to promote encrypted DNS and encrypted client hello technologies. He highlighted serious privacy vulnerabilities where domain names leak in plain text even with HTTPS encryption, creating detailed profiles of user behavior that can be analyzed by AI systems.


## Multi-stakeholder Collaboration and Regional Initiatives


### Continental Approaches


Rodrigue Guiguembde from Smart Africa described the organization’s work representing 40 countries and 1.6 billion people working toward a single digital market vision. He highlighted the success of the One African Network project, which has eliminated roaming charges across 11 countries, demonstrating concrete results from multi-stakeholder collaboration.


Guiguembde emphasized that no single actor can build African digital infrastructure alone due to the complexity of challenges including connectivity gaps, regulatory fragmentation, climate imperatives, and security risks. Smart Africa’s approach includes developing sovereign and green data centers that integrate environmental standards with connectivity goals.


### Global Technical Coordination


Adiel Akplogan from ICANN emphasized that the multi-stakeholder model has been critical for DNS stability over 40 years. He provided a crucial framework for understanding implementation challenges, describing the internet as “a global network made of small independent networks that are connected and operated at the local level.”


Akplogan noted that ICANN conducts over 200 workshops annually with regional focus and ongoing operational support, recognizing that partnership approaches are necessary to reach areas that single organizations cannot cover effectively.


## Development Initiatives and Capacity Building


### UNDP Regional Programs


Danny Wazen from UNDP, participating online from Jordan and serving as online moderator, presented new initiatives addressing digital infrastructure gaps in the Arab region. He reported that 30% of the Arab region’s population—representing over 100 million people—remains unconnected to the internet.


To address this gap, UNDP announced the launch of a Digital Professional Development initiative focusing on three critical pillars: promoting IPv6 adoption, supporting Internet Exchange Points (IXPs) for sustainable connectivity, and implementing RPKI for enhanced security. This initiative includes a new partnership with RIPE NCC for awareness campaigns and capacity building specifically in the Arab region.


### Skills Development Approaches


The discussion revealed different perspectives on appropriate knowledge levels for various stakeholders. Jukic argued that the general population needs basic cybersecurity awareness rather than expert-level technical knowledge, noting that simple practices can resolve 90% of security issues for typical users.


Stien offered a complementary view, emphasizing that broad foundational knowledge combined with specialized expertise through collaboration is essential. He noted the importance of understanding internet fundamentals to identify weak links in complex systems while acknowledging that no individual can understand everything.


## Session Challenges and Q&A Highlights


### Technical Connectivity Issues


The session experienced significant technical difficulties with online speakers, including Sofia Silva Berenguer, Adiel Akplogan, and Rodrigue Guiguembde. These connectivity challenges ironically highlighted the practical importance of the infrastructure resilience being discussed, though moderator Chafic Chaya managed to maintain session flow despite the technical problems.


### Audience Engagement


During the Q&A session, audience members raised important questions about IoT infrastructure management and ensuring that digital transformation projects reach remote areas rather than concentrating on urban centers. An audience member highlighted challenges facing rural communities including poor infrastructure, high data costs, and lack of access to digital devices.


Questions were also raised about appropriate digital skills levels for different populations and the methodology for balancing economic viability for operators with national security requirements for network resilience.


## Key Outcomes and Next Steps


### Concrete Partnerships


The most significant concrete outcome was the announcement of a new partnership between UNDP and RIPE NCC focused on addressing routing security and infrastructure development in the Arab region. This partnership will focus specifically on IPv6 adoption, IXP development, and RPKI implementation through awareness campaigns and capacity building.


### Ongoing Initiatives


Smart Africa committed to continuing expansion of the One African Network beyond its current 11 countries to eliminate roaming charges across the continent. ICANN will continue its extensive workshop program with enhanced regional focus, while the promotion of MANRS and other routing security best practices will continue through regional support.


### Final Speaker Recommendations


In their concluding one-minute summaries, speakers emphasized several key priorities:


– Frank Stien stressed the importance of redundancy and resilience in critical infrastructure planning


– Zdravko Jukic highlighted the need for balanced approaches to economic efficiency and security requirements


– Sofia Silva Berenguer emphasized urgent action on routing security implementation


– Rodrigue Guiguembde called for continued multi-stakeholder collaboration at continental scale


– Danny Wazen outlined the three-pillar approach of the new UNDP initiative


## Conclusion


Despite technical connectivity challenges that affected the session flow, this discussion demonstrated both the complexity of preparing internet infrastructure for tomorrow’s digital economy and the potential for concrete multi-stakeholder collaboration. The session moved beyond problem identification to establish specific partnerships and initiatives, particularly the UNDP-RIPE NCC collaboration focused on the Arab region.


The diversity of perspectives—from national regulators implementing comprehensive frameworks to development organizations addressing digital divides—highlighted common challenges across different contexts while providing practical examples of successful approaches. The emphasis on IPv6, IXPs, and RPKI as foundational technical priorities, combined with the recognition that no single actor can address complex infrastructure challenges alone, provides a framework for continued cooperation.


The session’s practical focus on balancing economic efficiency with security resilience, regional customization of global standards, and multi-level capacity building offers concrete approaches for addressing digital infrastructure development challenges. The partnerships and initiatives established provide mechanisms for sustained progress toward resilient, inclusive internet infrastructure capable of supporting sustainable digital development globally.


Session transcript

Chafic Chaya: On behalf of RIPE NCC and our esteemed speakers, I would like to welcome you to this Day Zero session, Preparing Your Internet to Power the Digital Economy of Tomorrow. My name is Shafiq Shaya, I am the Regional Manager for Public Policy and Government Affairs for the RIPE NCC for the Middle East region, and I will be joined by my colleague Danny Wazin as online moderator from Jordan. Today this session will seek to unpack a critical but often under-emphasized question. How can we ensure that the internet infrastructure is robust enough to support the digital ambition of tomorrow? So the discussion today will be grounded in the belief that technical preparedness is not a luxury but is a strategic necessity. We will discuss connectivity, routing security, IPv6, IXPs, RPKI, collaborative policy framework, capacity building, all these issues that create a robust internet ecosystem. Without any further ado, so please let me introduce and welcome our speakers online and on-site. We have Mr. Frank Steen from Norway. We have Ms. Sofia Silva Berenguer from the NRO. We have Mr. Adiel Aplogon from ICANN. We have Mr. Rodrigue Guagamboide from Smart Africa. And we have Mr. Stravaco Stravic from Croatia. Once again, welcome and thank you for my colleague Ilka who will be the reporter of this session. So I will begin with Mr. Frank, good morning and thanks for hosting the IJF in Norway. My first question for you is how Norway today is addressing the scalability and the security of the internet infrastructure. And we know that you are coming from the regulator from Norway. So we’d like to have your insights to kick off this discussion today.


Frank Stien: Thank you Tjafik. Welcome to Norway everyone. Today we discuss a very critical topic, preparing our internet infrastructure for tomorrow’s digital economy. Norway recognizes that a robust digital infrastructure, both fixed and cellular, is crucial for leveraging emerging technologies such as artificial intelligence, the internet of things and digital services. Firstly, Norway is significantly investing in providing broadband internet to everyone. Today Norway provides at least 100 megabit per second broadband coverage to 99.1% of households with gigabit coverage reaching 96.2%. The ambition is that everyone shall have access to gigabit infrastructure by 2030. 85% of our geographic area has 4G or 5G coverage and practically all households have immediate access to 5G or 4G connectivity. Our extensive fiber optic infrastructure complemented by an aggressive 5G rollout ensures high speed. has already said that the Internet of Things is essential to all bandwidth intensive and latency sensitive applications of AI and IoT. Secondly, cyber security remains paramount. Norway’s government has enhanced regulatory frameworks including aligning with the EU’s NIST2 Directive and the new Security Act. Additionally, starting August this year, the revised Radio Equipment Directive will mandate rigorous cyber security standards for IoT devices such as smartphones, smartwatches and connected toys. Requirements should also include robust authentication, secure storage, encryption and secure update mechanisms. The forthcoming Cyber Resilience Act, the CRA, will further strengthen our cyber security landscape, ensuring resilient and trustworthy digital products. Thirdly, infrastructure resilience is key. We work in close collaboration with the major network operators to actively strengthen the transmission networks with enhanced network redundancy and ensuring multiple autonomous nationwide transmission networks. Specifically, emphasis is laid down in ensuring that densely populated areas will be served by at least three independent transmission networks, providing critical redundancy. Mobile operators are encouraged to diversify their traffic across these networks, significantly boosting reliability. Moreover, proactive spectrum management is crucial in mitigating wireless interference, particularly as IoT adoption expands and our society is increasingly becoming more dependent on it. on wireless communication services both from land and satellite. By effectively detecting and removing unauthorized devices and signal jammers, the spectrum in Norway maintains clean and dependable wireless communications. And finally, regarding AI regulation, Norway has recently defined clear responsibility among Norwegian Communication Authority, NKOM, Norwegian Digitalization Agency, Digdir and Data Protecting Authority, and this collaboration will ensure effective implementation and oversight of the AI Act, fostering responsible AI integration across sectors. So, in conclusion, Norway’s approach combining ambitious infrastructure expansion, comprehensive cybersecurity regulation and robust network resilience and clear regulatory governance for emerging technologies will position us to strongly to power tomorrow’s digital economy, driving innovation and benefit across our nation. Thank you.


Chafic Chaya: Thank you so much, Mr. Frank. Thanks for those insights and remarks. And yeah, this is a good example of how governments with the different stakeholder groups can work hands on hands. Thank you. We’ll stay with the governments and with the regulator and I’ll go to Mr. Zdravko Jukic from Croatia. So, to chain with the same subject, how can agile regulation support internet development in safeguarding the trust and resilience?


Zdravko Jukic: Yes, thanks. Can you hear me? Yes. Okay, excellent. So, you will hear now another regulatory view on this topic. I’m currently at BEREC. BEREC is the body of European regulators, so all national Regulatory authorities are represented there from the European Union, from the candidate countries and some EEA countries. So in BEREC we have several working groups, one of them is Cyber Security Working Group and we recently changed the name of this group to Cyber Security and Resilience Working Group, just to stress the importance of this issue of the resilience. Because normally when you look at the economy and competition from the regulatory point of view, you look at how to motivate market players to cooperate, not to build the double infrastructures, not to duplicate infrastructure which is the most expensive part of the networks. But when it comes to resilience, there we do exactly the opposite, we try to build some connections that should be used maybe in some emergency situation. So they are not economically, let’s say, justified by itself. So this is a really hot topic that at BEREC, Cyber Security and Resilience Working Group, we will be looking at. We have some really good examples among BEREC members, one of them is Iceland, another one is Norway, of course, who have developed some rules and what we would like to do is to develop some kind of methodology that would be really a set of recommendations on how to balance this issue of what is economically safe for operators to invest and what is safe for a country. Because there are several levels of investment. First one is the investment of the operators. They invest network to be optimally to get the return on their investment as fast as possible to earn a lot of money. And if they lose and Zdravko Jukic Jukic. The European Union is a member state. It is not possible to develop any kind of mandatory requirements or regulations at the European Union level without consensus of all member states. Also, one important point, the NIS2 directive in Croatia has been fully transposed. We were one of the first member states to do that. Also, the 5G toolbox is also a good example of this cooperation at the European level, how to develop something that each member state can apply in its national market, so that you have a solution which is flexible, which is agreed by all, and which can be modified. for national situation. One also important topic is the trusted vendor issue and there as regulatory authorities we can only help other authorities in each member state like national security agencies when they do the assessments of which equipment is safe in the national market. So I think that would be to start our panel all from my side for now. Thanks.


Chafic Chaya: Thank you so much. This is a lot to digest. We know that you are busy with all this regulation and policies and you mentioned a lot of interesting topics and issues. Balance, collaboration, agile regulation. So this will be a good start to see or to chain with other stakeholder group, the technical community, with our colleague Sophia from the number resource organization, the organization which coordinates the joint activity between the five RIRs. Sophia, you are with us. We can’t hear you. Can you speak? Still I can’t hear Sophia. So awaiting to fix this technical issue, I will stay with the technical community but with the ICANN with our colleague Mr. Adiel. So Mr. Adiel, to chain with what Mr. Frank and Mr. Zdravko Jukic mentioned now, what role does ICANN for this collaboration with governments and other stakeholders in fostering connectivity and in encouraging the agile regulation and policies. No sound, please. Control room, we can’t hear Mr. Adiel. Can you speak?


Adiel Akplogan: So, thank you again for the question. So, the short answer first is that the multi-stakeholder model is critical for sustaining for a stable, secure and resilient internet infrastructure globally. For us, we can say that because, as you know, one of the critical missions that ICANN has is to coordinate the unique identifier system globally, including the DNS. And the multi-stakeholder model has been at the center of that coordination. And the DNS has been operating for more than 40 years and it has been stable, sustainable, resilient over those years. Which shows that when we bring different parties, different actors around the table to discuss issues related to those critical infrastructures, it works. The DNS glue those identifiers together, of course, and I can, in its operation, as a facilitator and coordinator of policy related to those identifiers, and the DNS particularly, use the different constituencies it has to identify issues related to the resiliency and the security of the DNS, discuss them and translate them into policy, then that operators implement or follow voluntarily. So we’ve seen that it has helped protect that infrastructure globally. The DNS, we usually explain it or define it as a simple address book, but it’s more complex than that. And not only that, over the 40 past years, the DNS has evolved significantly, adding layer of security, privacy, addressing some abuse channels and challenges. But the multi-stakeholder approach has helped work around those issues. Being from the ITF, where new evolution of the DNS has been developed to be implemented on the base DNS to make it more secure, to add privacy to it. Being from its users’ perspective or registration perspective by tackling abuse, for instance. All those evolutions have been developed through a very wide multi-stakeholder approach. So again, it shows that bringing different parties around complex issues helps build solutions that do not disrupt. the stability of the global infrastructure. That is at the global level. But to go back to the context of the previous intervention, that approach needs also to be translated to the local level in how policies are defined locally, because the same complexities apply at the local level. Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas and to look at what are the different aspects of implementing or addressing challenges that can be seen. So we, from ICANN’s perspective, continue to promote that multi-stakeholder approach in how we address those issues, but also how we engage at the local level with different operators to ensure that the DNS and the infrastructure in general, the unique identifier operation, remain stable, secure and resilient.


Chafic Chaya: Thank you, Adiel. Thank you so much for these remarks and for highlighting the importance of the multi-stakeholder in working with governments and regulators to secure the Internet infrastructure. So, I’ll go back to Sofia. Let’s see if we have Sofia back online. Can you hear me, Sofia? Sofia? No. No, we can’t hear you. Okay, let me check online if we are okay. Danny, can you hear me? Dany, can you hear me? I believe we have a problem with our online colleagues. We can’t hear them. I will follow up and check with Mr. Rodrigue, Smart Africa, maybe we are lucky if you can say some words to check the voice. No. No. Okay. So I will go back to my esteemed colleagues here and follow up and change with some discussion with you. I go back to Mr. Frank. So we know that you are coming from the national CERT from Norway. How ECOM CERT is coordinating infrastructure security across public and private sectors?


Frank Stien: In Norway we have a bit strange solutions when it comes to CERTs with national coverage and responsibility. We have sectorial CERTs within something like the 15 most important sectors and they are all coordinated by the national NCSC, the national CERT. The reason we are doing that is that we think that the CERTs need sector specific knowledge and they also need to know the sector and also different sectors are different. So these sectorial CERTs are also very, very different. but at the same time we are cooperating the different sectorial search very closely. One advantage is that we can handle incidents and attacks on a very low level, when we don’t need to extend it outside a certain sector. So this helps with scalability. But when attacks or problems are hitting multiple sectors, they will then work together. And of course it’s also very important that the different sectorial search work together, so we’re doing that online more or less all the time. When critical incidents are happening and we need to escalate, then typically the national search will take lead and get support from these sectorial search with all their knowledge and competence about different sectors. So we think that this combination really helps us to combine the private and the public sectors as well as government, important government functions, and it really enables us to handle sophisticated threat actors and sophisticated threats. So this is how we’re doing it here.


Chafic Chaya: Perfect, thank you. And this is how it should be done in collaboration with, once again, you as a regulator, with the other stakeholder group that you are working with. Going to Croatia. The same question, but I want to just reframe it. Can you give us some examples how this works on the ground?


Zdravko Jukic: One of the examples could be, for example, the situation where you have an emergency situation. Some network is down, like there was a situation with big floods in neighboring Slovenia, I think two years back. And then it was very important to enable national roaming for all subscribers in the country, because then you can combine all the parts of the network that are still operating. And it is crucial, it can be life-saving in such situations. So I think we need to have such mechanisms for emergency situations. It is always that you have to build something for an event that happens very rarely but has a huge impact. And then we need to plan in advance and have good measures and tools to deal with that.


Chafic Chaya: Thank you. We know that the awareness can come from the end users, and then this awareness can be encouraged and can be put by the regulators. Is there any collaboration or any, let’s say, education or webinars with the Croatian population, or with the Croatian community or society?


Zdravko Jukic: Yes, indeed we have a lot of such actions in Croatia together with our partners, with the Croatian Academic Network, with the police, with the Ministry of Interior. And we give courses, really, even from HACOM, from the national regulator, regularly to schools, to primary schools, to secondary schools, and to local governments in different counties. in Croatia because as you said it is very important to to have this broad awareness and not just among experts and people working at the operators and they know it is their work it is their job but also among the general populations and the users of the of the


Chafic Chaya: electronic communications services. Thank you, I will take this and go to Sofia. Sofia, can you hear me now? I can hear you. Okay, perfect, thanks, thank you. So once again, Sofia is from the Number Resource Organization, the organization that coordinates the activities of the five RIRs and my question for Sofia is we are talking about security, about resilience, so what you can tell us on the NRO global collaboration on routing security on RPKI


Sofia Silva Berenguer: and how this works with governments? Thank you, Jafik. So I would like to start by setting the context about why it’s necessary to secure the internet routing before I can introduce what RPKI is. As Adiel mentioned, the internet is a network of networks and BGP, Border Gateway Protocol, is the protocol used by those networks to decide where to send the traffic in order for it to reach its destination and the way that networks learn where other networks are is through BGP announcements. The thing is that this protocol, BGP, was not designed with security in mind so there is a need for a layer of security to be added on top to ensure that the traffic reaches its intended destination and that all the systems in the digital economy of today that rely on the internet can still work. So RPKI, which stands for Resource Public Key Infrastructure, adds that missing BGP piece of security and it does that by allowing that prefix holders issue cryptographically verifiable statements on the route intentions and then that information can be used by the routers that receive BGP announcements to verify whether those announcements are legitimate. And so this allows to stop routing issues and stop that routing is redirected or intercepted. RPKI was standardized more than 10 years ago and it is available through each RIR region in the world. However, many organizations have yet to adopt and deploy this technology. A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations that are the objects in RPKI used to for establishing that route intention on the origin of routes. And then the other side of things that is using that information to verify BGP announcements is what we call route origin validation and the statistic as of a few weeks ago was that less than 25 percent of those networks in the internet that we call autonomous systems less than 25 percent were fully protected by route origin validation. So as you can see there’s still room for more adoption of the technology to achieve maximum benefit of it and adoption can be encouraged in different ways. Through support, through reputation based approaches like for example the MANRS initiative some people may have heard of through regulation based approaches like the White House’s roadmap to enhancing routing security. In particular the RIRs are supporting adoption through providing training, technical support and resources. Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic


Chafic Chaya: Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic Sofia Berenguer, David Huberman, Rodrigue Guiguembde, Zdravko Jukic Jukic


Rodrigue Guiguembde: Yes, thank you very much. And thank you so much for this question. Sorry about this disconnection earlier. I think at Smart Africa, we believe that the multi-stakeholder partnership, the foundation for this inclusive digital development in Africa, we trust on it. And the alliance currently brings, as you know, 40 countries, 40 member states, representing 1.6 billion people. 1 billion African citizens, all committing on the same vision to create a single digital market. One of the flagship we have currently I wanted to sort out here is the One African Network. It’s a project which currently includes 11 countries and this initiative is still ongoing. And this initiative aims to eliminate roaming, charge and promote cross-border interconnection. It’s jointly developed by regulator, ministries, telcos and regional economic communities. So this is a real good model on this multi-stakeholder approach. It’s an example on that. We are also developing a program for a sovereign data center and green data center. This is another one we can give in terms of example. Building partnership with private and public sectors and designed to meet environmental standards. These projects of course integrate technical, economical, legal and climate resilience consideration which are crucial for Africa data sovereignty. So this is another example. All this one is just to tell you that we are putting in the center this multi-stakeholder approach. And of course currently for the internet governance parts, because the internet is the base of everything, we are trying to launch initiatives called CAIGA, the Council of Internet Governance Authorities. This council we start to build it since 2024. This is a unique mechanism. We wanted to bring the government, regulators, academia, technical experts and civil society to sort of and to make some action for the


Chafic Chaya: Thank you so much, these are great examples and I will come back to you to ask you about how we can balance between the different levels of advancement in the African countries. But I’ll go to my colleague Danny online. So once again, for our audience on site and online, if you would like to ask any question, please put your question in the chat room or just raise your hand. At the end, we’ll have a Q&A session and we’ll be happy to answer your questions. So Danny, any comments, anything we have online? And I’ll leave it for you. I know that you are handling the UNDP activities in the region and you have announcement or you can share with us your plans that’s related to what we are talking about in this session. For you, Danny.


Dany Wazen: Thank you very much, Shafiq, and it’s a pleasure to be on this very esteemed and very important panel to discuss this topic. I see online we have two insights and one question, which is really important, the first insight brought by Timothy and could be a question to the panel. So asking about would it be good if there is an infrastructure to ensure the communication of the IOTs? So to be able to be managed by the owner of the IOTs itself, it could be great if we can have this option. And another question, which is very much related, what are What are the needed digital skills and what are the essential digital skills in the internet-driven future? So we’re talking about all these perspectives and dimensions on how connectivity can prepare for the future. So what are the skills?


Chafic Chaya: Gentlemen, anyone want to take these questions before I give the floor back to Danny?


Frank Stien: Well, I can start with the last one about the skills. I think we will always need people with broad knowledge. My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything. So I think to have specialists in different areas and make those experts working together will always be very, very important and probably more important than actually a few people knowing very much.


Chafic Chaya: Mr. Zdravko Jukic, please.


Zdravko Jukic: Okay, thanks. Just to continue on this line, so I think not everybody has to be really a cyber security expert and know all the techniques and how to hack computers and systems, but what is needed for the general population, for general users, to know some basics. because what problems we face in Croatia and other European member states and I guess everywhere in the world that people receive simple short message like the old short message service and then the message says this is very important that you type in your credit card number and they do it so some basics should be applied and everybody should understand what it means then we will resolve I don’t know maybe 90% of the cases if a very advanced hacker comes into your system by some backdoor that is another issue that is the issue of this company if they have all the methodologies and all the rules in place if they are taking their business seriously because it can happen we will never have absolute security in any corporation in any company but we have to do our best and try to mitigate as much as we can


Chafic Chaya: well stated I think Adel I can do a lot in capacity building so maybe you can share something on this


Adiel Akplogan: yeah definitely we are pretty much engaged on capacity building I just want to mention as well that there are two challenges in capacity building there is one about the usage of the internet that is a more broader capacity and awareness that is needed for users to know that the same questions that they apply in their real life is also something important to bring into the virtual world because it’s not always clear in the mind of the people that capacity needs to be reinforced and the second is the operational part the operating the network making sure that people who operate the network also develop and gradually increase particularly coming from developing and emerging nation beef up their knowledge and expertise on this complex technology in operation so that to be able It is possible to have security and resilience in mind when operating and designing the network. From ICANN’s perspective, we put a lot of emphasis on that. Last year we have run more than 200 workshop and capacity building activities on technical implementation of best practices around the DNS particularly for registry. It is something that we continue doing and we don’t do it at the global level only. We try to bring in a regional flavor to it because we know that the needs are not the same across all the regions, all the countries, the challenges are not the same. So we try to translate our engagement to focus on the need that we see in each region, in each country. And what we have seen bringing more and more positive effort is to beyond the capacity building also providing support to those who are particularly operating those infrastructures that we think are critical for the overall stability to support them throughout their navigation of implementing those best practices. So it’s key to bridge that gap, but it’s also important to us to take it from different angles, local and user and global.


Chafic Chaya: Thank you. You mentioned a lot of interesting, let’s say, words, regional flavor, local capacity building. I go back to Danny with the UNDP and your initiative, which is the main pillar in your initiative that UNDP is now leading, is capacity building and infrastructure development. Can you give us just some or sum up what you are doing and how you are dealing with what Adil said, regional flavor? Yes, thank you very much. I think we may need a very interesting insight. So in UNDP, we have in the Arab region, we have launched recently a new initiative called Digital Professional Development. And as its name says, it’s how we can harness the power of digitalization to advance the SDGs agenda and the different countries and to accelerate the achievement of the goals. And what is it about? It’s a network of partners with convening partners from government, private sector, public sector, NGOs, academia, experts to come together, brainstorm and put and develop together impactful projects for the Arab region. And under each goal, like what can we do on digitalization? And the connectivity and infrastructure is really a delaying foundation for any digital transformation, we can build the most advanced solutions, but without a secure, safe, inclusive connectivity, we cannot advance. And if we look into our region, the Arab region is one of the least connected among the other regions in the world. And 30% of the Arab region, which means more than 100 million are not connected to the internet. And in order to advance this, we have recently launched two initiatives. One of them we are planning now with RIPE NCC as a partnership. So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability, which means scalable connectivity in order to be more inclusive. Second is allow sustainability for this connectivity through a different approach, and thirdly, is a safe and secure connectivity. For the Pillar 1, we want to promote the adoption of IPv6 with the mobile telecom operator and other internet providers in the countries by conducting awareness capacity building and support the transition of this toward the IPv6. On the second pillar, in terms of sustainability, we want to promote, as we heard from our colleague on the panel, the IXPs and the role of this internet exchange points in order to provide less or lower cost, but also reduce the dependence on international links and make further connectivity, and we are planning to support countries as models in the region between UNDP and RIPAC. And finally, the RPKI, as we’ve heard, the security, which is very much important, and we’re looking through this initiative to engage further with more partners on launching awareness campaigns and doing the capacity building for the security of the connectivity. So basically, this is a project that literally will be impactful for the region to increase the connectivity. Another entry point that we are working on for the connectivity and inclusion, digital inclusion, is a new framework, regulatory framework, that we are designing with different partners, the GSMA, Orido Mobile Telecom Operator, and others. It’s basically how we can give countries a legal framework, digital policies framework, that can support the country advancing on their digital economy by investing or designing policies and regulations for the connectivity and for the data centers and using also the data and AI. So basically these are like two main or two key interventions that we are planning into the Arab region and definitely we’re looking to engage further with partners in order to implement it in different contexts. Thank you Danny, thank you so much for this insight. Yes just I want to highlight here that there are some countries in the Middle East and African region that they don’t have yet the basic infrastructure. While here we are discussing AI and Internet of Things and the cloud computing, we still have countries without basic infrastructure and that’s why we are working with the UNDP to just make these countries join the developing countries. So we still have 10 minutes, I see that we have a question but I will give for each speaker one minute to just recap and give me one priority based on the discussion that we have during this session. So Mr. Frank your final remark for one minute please.


Frank Stien: Yes I probably should say something about regulation but my heart is in cyber security. So I think we have addressed for a couple of years the need for intelligence and information sharing among peers and among people across borders and I think we have a way to go in that field. It’s improving, everything goes better but I think I think still there is lots of work to do to cooperate and share information and intelligence, so that would be my point.


Chafic Chaya: Thank you. Mr. Radiel?


Adiel Akplogan: Yeah, I think I will highlight the fact that having a multi-stakeholder approach, bringing different parties around the table to discuss this complex issue, are important. Not only at the global level, and I will put the emphasis on that, we need to translate those into regional and local level in designing each aspect of regulation or technical design that will impact the global stability of the Internet. Capacity building is key. Best practices are also very important. Framing them in a way that people can actually implement them is another key. Sophia mentioned manners. There is also another one for the DNS, which is kindness, which tries to bring those best practices in the framework that can easily be implemented, that will help small operators that don’t have the same resources as a bigger one to look at everything and decide what to do. They can have a simple and easy entry point. The third point I want to highlight is the partnership. Beyond the multi-stakeholder approach, partnership between different players is key in helping advance those. We hear about the UNDP and the RIPE NCC partnership. ICANN has the Coalition for Digital Africa, which is also a very broad framework for partnership for the Africa region. Our partnership with UNESCO and IDN and so on and so forth are a way to actually mutualize our resources to make sure that what we are preaching and what we are advancing reaches an area that one organization alone cannot reach. Let’s continue strengthening this multi-stakeholder approach, and I think we will all contribute to a stable, resilient and stable Internet globally.


Chafic Chaya: Thank you so much. I believe we will have some takeaways from what you said now, but I will give the mic to Mr. Zdravko Jukic.


Zdravko Jukic: Yes, from our discussions it seems like this education for general population and users and capacity building for everyone seems to be very, very important. For us regulators, I would like to stress again, we will be very busy now in the coming days and months with this resilience issue and how to build more resilient networks, how to develop this, what I mentioned, methodology which will enable all national regulators to apply some rules to have more resilient, redundant networks in the end. And also what we can expect, some more discussions at the European level on the issue of trusted vendors, something similar to what we had with the 5G toolbox. So development of some technical and strategic measures, agreeing those measures at the union level, and then each member state would apply them according to the national situations and national judgments and geopolitical situation. So I think that’s all. Thanks.


Chafic Chaya: Thank you. So it’s a collaboration between stakeholders and regulators and collaboration amongst regulators themselves. Sofia, I’ll give you the one minute for you.


Sofia Silva Berenguer: Thank you. I guess from my side, what I would suggest prioritizing is the implementation of best practices. For example, in the space of routing security, to join a program like MANUS, to engage with the RIR for your region and seek support. Also, there’s lots of good documents in the space of IETF documenting best practices. We call them BCP, best common practice documents, because what we’ve heard is that sometimes, although technical people may be very convinced of the importance of technologies like RPKI, it’s hard to convince non-technical decision makers or even commercial sectors, commercial areas within some organizations, because the benefits may not be evident, may not be immediate. So, there is a need, and as the other panelists mentioned, for more capacity building, for more awareness raising. So, yeah, any efforts in that space that will help bridge that gap between very technical content and not so technical content that will allow decision makers to understand the importance of implementing best practices.


Chafic Chaya: Thank you, Sofia. Mr. Rodrigue?


Rodrigue Guiguembde: Yes, thank you very much. We have a lot of things to say, but last year we didn’t. Okay, one minute, sorry. I think that as we are looking for the future, one thing is clear, I think. No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach. This is very important. At Smart Africa, we are committed to turning vision into action by aligning government, the private sector, developing partners, and communities around concrete, high-impact solutions. Whether it is true, it could be true on African networks or in data centers. as I already said, and Armonized Spectrum challenges. We see these partners, not, we see the partnership, sorry, the code, sorry. Yes, we see this partnership not as a choice but a necessity, this is very important. So finally, if we want to prepare our infrastructure for this demand of tomorrow digital economy, we must invest not only in fiber and data centers but also in trust coordination and local capacity. Let’s move forward together with ambition and with purpose. Thank you very much.


Chafic Chaya: Thank you for these words, we’ll keep it in mind. Sorry for keeping you waiting, we have one question in the room, please go ahead. Please, can you introduce yourself? Hello, hello. Can you hear me? Yes, go ahead.


Vinicius Fortuna: My name is Vinicius Fortuna, I actually work at Google Jigsaw on internet access, resilience and privacy. And currently, when you use, even when you use a HTTPS, encrypted HTTP, like your domain name goes in plain text and it leaks. And that’s like with the advancement of AI, that’s becoming a very serious threat. I actually ran an experiment analyzing my own domain names and put it on LLM and create a profile about me and it’s scary, like you can tell the person’s employer, the health conditions, political associations, religion, sexual preferences and gender and all sorts of things. So, and there are two technologies to solve this, like encrypted DNS and encrypted client hello. So I’m wondering like what your organizations can do to help promote an adoption of these technologies by online services or the internet service.


Chafic Chaya: Thank you so much. As we don’t have any more time, I believe we’ll take this after the session ends and I’ll be here with my colleagues to answer your question. But I see another question, please go ahead, for 30 seconds please. But be sure that we’ll answer your questions after the session.


Audience: So, my question is basically going straight to you, NDP and Smart Africa. I was following with a very keen interest, more especially on the projects that are underway to bridge the digital divide, especially in the remote areas. Now, most of the projects, when they are being scaled, they are being done in the urban areas. So, I would really want to find out what are the policies or the laws that you have put in place to make sure that when you are scaling these things about the projects to do with digital transformation, you are channeling these initiatives to reach to the people that are living in the remote areas, because these are the people that are suffering from the poor infrastructure when it comes to internet. At the same time, even the data cost is very costly, which they cannot manage to access. And at the same time, they are also having the issue to do with the digital gadgets. So, that’s my question that I really want to get an answer. Thank you so much.


Chafic Chaya: Thank you so much. I’ll, once again, I will be here with our panelists to answer your question and I’ll be sure to give you the contact of my colleague Danny Wesson, so you can be in direct contact with him. Once again, thanks again for everyone, for our audience in the room, for our audience online, for our speakers. It was a really interesting discussion. We will have some takeaway and some recommendation, but just to summarize, collaboration, partnership, IPv6, RPKI, MANRS, the NSSEC should be in the public infrastructure plan, and the last one is long term investment in capacity building. Once again, thank you so much, and I believe I’m on time. Thank you. Thank you.


F

Frank Stien

Speech speed

106 words per minute

Speech length

882 words

Speech time

496 seconds

Norway provides 99.1% broadband coverage at 100+ Mbps with goal of gigabit access for all by 2030

Explanation

Norway has achieved extensive broadband coverage with high-speed internet access for nearly all households. The country has set an ambitious target to provide gigabit infrastructure to everyone by 2030, demonstrating significant investment in digital infrastructure.


Evidence

Today Norway provides at least 100 megabit per second broadband coverage to 99.1% of households with gigabit coverage reaching 96.2%


Major discussion point

Infrastructure Development and Investment


Topics

Infrastructure | Development


85% of Norway’s geographic area has 4G/5G coverage with extensive fiber infrastructure

Explanation

Norway has achieved comprehensive mobile network coverage across most of its territory, complemented by robust fiber optic infrastructure. This combination ensures high-speed connectivity for bandwidth-intensive and latency-sensitive applications including AI and IoT.


Evidence

85% of our geographic area has 4G or 5G coverage and practically all households have immediate access to 5G or 4G connectivity. Our extensive fiber optic infrastructure complemented by an aggressive 5G rollout ensures high speed


Major discussion point

Infrastructure Development and Investment


Topics

Infrastructure | Development


Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response

Explanation

Norway has established a unique cybersecurity structure with specialized Computer Emergency Response Teams for different sectors, all coordinated by the national CERT. This approach allows for sector-specific knowledge and expertise while maintaining coordination for cross-sector incidents.


Evidence

We have sectorial CERTs within something like the 15 most important sectors and they are all coordinated by the national NCSC, the national CERT. The reason we are doing that is that we think that the CERTs need sector specific knowledge


Major discussion point

Cybersecurity and Network Resilience


Topics

Cybersecurity | Infrastructure


Disagreed with

– Zdravko Jukic

Disagreed on

Approach to cybersecurity organizational structure


Enhanced regulatory frameworks including EU NIST2 Directive and new Security Act strengthen cybersecurity landscape

Explanation

Norway has implemented comprehensive cybersecurity regulations aligned with EU standards, including new requirements for IoT devices. These frameworks mandate security features like authentication, encryption, and secure update mechanisms for connected devices.


Evidence

Norway’s government has enhanced regulatory frameworks including aligning with the EU’s NIST2 Directive and the new Security Act. Additionally, starting August this year, the revised Radio Equipment Directive will mandate rigorous cyber security standards for IoT devices


Major discussion point

Cybersecurity and Network Resilience


Topics

Cybersecurity | Legal and regulatory


Agreed with

– Adiel Akplogan
– Rodrigue Guiguembde
– Zdravko Jukic

Agreed on

Multi-stakeholder collaboration is essential for internet infrastructure development and governance


Densely populated areas require at least three independent transmission networks for critical redundancy

Explanation

Norway emphasizes infrastructure resilience by requiring multiple independent transmission networks in populated areas. This redundancy ensures continued connectivity even if one or two networks fail, with mobile operators encouraged to diversify traffic across these networks.


Evidence

Specifically, emphasis is laid down in ensuring that densely populated areas will be served by at least three independent transmission networks, providing critical redundancy. Mobile operators are encouraged to diversify their traffic across these networks


Major discussion point

Cybersecurity and Network Resilience


Topics

Infrastructure | Cybersecurity


Agreed with

– Zdravko Jukic

Agreed on

Network resilience and redundancy are fundamental for critical infrastructure


Norway defined clear AI regulation responsibilities among multiple agencies for effective oversight

Explanation

Norway has established a collaborative governance structure for AI regulation by clearly defining roles among different agencies. This multi-agency approach ensures comprehensive oversight and effective implementation of AI regulations across various sectors.


Evidence

Norway has recently defined clear responsibility among Norwegian Communication Authority, NKOM, Norwegian Digitalization Agency, Digdir and Data Protecting Authority, and this collaboration will ensure effective implementation and oversight of the AI Act


Major discussion point

Regulatory Frameworks and Policy Development


Topics

Legal and regulatory | Infrastructure


Broad foundational knowledge combined with specialized expertise through collaboration is essential

Explanation

Frank argues that while broad understanding of internet fundamentals is crucial for identifying vulnerabilities, no single person can master everything. The key is having specialists in different areas working together collaboratively.


Evidence

My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything


Major discussion point

Capacity Building and Digital Skills


Topics

Development | Cybersecurity


Agreed with

– Adiel Akplogan
– Zdravko Jukic
– Sofia Silva Berenguer

Agreed on

Capacity building and digital skills development are critical priorities


Disagreed with

– Zdravko Jukic

Disagreed on

Level of technical knowledge required for general population


R

Rodrigue Guiguembde

Speech speed

124 words per minute

Speech length

494 words

Speech time

237 seconds

Smart Africa’s One African Network project eliminates roaming charges across 11 countries through multi-stakeholder collaboration

Explanation

Smart Africa has developed a flagship project that removes roaming charges and promotes cross-border interconnection across 11 African countries. This initiative demonstrates effective multi-stakeholder collaboration involving regulators, ministries, telecommunications companies, and regional economic communities.


Evidence

One of the flagship we have currently I wanted to sort out here is the One African Network. It’s a project which currently includes 11 countries and this initiative is still ongoing. And this initiative aims to eliminate roaming, charge and promote cross-border interconnection. It’s jointly developed by regulator, ministries, telcos and regional economic communities


Major discussion point

Infrastructure Development and Investment


Topics

Infrastructure | Development | Economic


Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision

Explanation

Smart Africa operates as a continental alliance bringing together 40 member states representing a massive population with a unified vision. The organization aims to create a single digital market across Africa, demonstrating the scale and ambition of pan-African digital cooperation.


Evidence

And the alliance currently brings, as you know, 40 countries, 40 member states, representing 1.6 billion people. 1 billion African citizens, all committing on the same vision to create a single digital market


Major discussion point

Multi-stakeholder Governance and Collaboration


Topics

Development | Economic | Infrastructure


No single actor can build African digital infrastructure alone due to complexity of challenges

Explanation

Rodrigue emphasizes that the challenges facing African digital infrastructure are too complex for any single organization to address independently. Issues like connectivity gaps, regulatory fragmentation, climate concerns, and security risks require coordinated efforts from multiple stakeholders.


Evidence

No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach


Major discussion point

Multi-stakeholder Governance and Collaboration


Topics

Development | Infrastructure | Legal and regulatory


Agreed with

– Adiel Akplogan
– Frank Stien
– Zdravko Jukic

Agreed on

Multi-stakeholder collaboration is essential for internet infrastructure development and governance


Smart Africa developing sovereign and green data centers integrating environmental standards

Explanation

Smart Africa is working on data center projects that address both data sovereignty and environmental concerns. These initiatives involve partnerships between public and private sectors and are designed to meet environmental standards while supporting Africa’s digital infrastructure needs.


Evidence

We are also developing a program for a sovereign data center and green data center. This is another one we can give in terms of example. Building partnership with private and public sectors and designed to meet environmental standards


Major discussion point

Technical Standards and Best Practices


Topics

Infrastructure | Development | Economic


Z

Zdravko Jukic

Speech speed

128 words per minute

Speech length

1066 words

Speech time

496 seconds

BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements

Explanation

BEREC has shifted focus to include resilience alongside cybersecurity, recognizing the need to balance economic considerations with security requirements. This represents a challenge as resilience often requires investments that may not be economically justified but are necessary for national security.


Evidence

We recently changed the name of this group to Cyber Security and Resilience Working Group, just to stress the importance of this issue of the resilience. Because normally when you look at the economy and competition from the regulatory point of view, you look at how to motivate market players to cooperate, not to build the double infrastructures, not to duplicate infrastructure which is the most expensive part of the networks. But when it comes to resilience, there we do exactly the opposite


Major discussion point

Cybersecurity and Network Resilience


Topics

Cybersecurity | Legal and regulatory | Infrastructure


Disagreed with

– Frank Stien

Disagreed on

Approach to cybersecurity organizational structure


Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation

Explanation

Croatia has successfully implemented EU cybersecurity directives and demonstrates how European cooperation can work effectively. The 5G toolbox serves as a model for developing flexible solutions that can be adapted to national circumstances while maintaining EU-wide coordination.


Evidence

The NIS2 directive in Croatia has been fully transposed. We were one of the first member states to do that. Also, the 5G toolbox is also a good example of this cooperation at the European level, how to develop something that each member state can apply in its national market, so that you have a solution which is flexible, which is agreed by all, and which can be modified for national situation


Major discussion point

Regulatory Frameworks and Policy Development


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Agreed with

– Adiel Akplogan
– Rodrigue Guiguembde
– Frank Stien

Agreed on

Multi-stakeholder collaboration is essential for internet infrastructure development and governance


Trusted vendor assessments require collaboration between regulatory authorities and national security agencies

Explanation

Zdravko explains that regulatory authorities have a supporting role in trusted vendor assessments, working alongside national security agencies. This collaborative approach ensures that equipment safety evaluations consider both regulatory and security perspectives.


Evidence

One also important topic is the trusted vendor issue and there as regulatory authorities we can only help other authorities in each member state like national security agencies when they do the assessments of which equipment is safe in the national market


Major discussion point

Regulatory Frameworks and Policy Development


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Emergency situations like floods require national roaming capabilities combining all operational network parts

Explanation

Zdravko provides a practical example of network resilience during natural disasters, where national roaming becomes critical for maintaining communications. This demonstrates how regulatory frameworks must prepare for rare but high-impact events that can be life-saving.


Evidence

One of the examples could be, for example, the situation where you have an emergency situation. Some network is down, like there was a situation with big floods in neighboring Slovenia, I think two years back. And then it was very important to enable national roaming for all subscribers in the country, because then you can combine all the parts of the network that are still operating. And it is crucial, it can be life-saving in such situations


Major discussion point

Cybersecurity and Network Resilience


Topics

Infrastructure | Cybersecurity | Development


Agreed with

– Frank Stien

Agreed on

Network resilience and redundancy are fundamental for critical infrastructure


General population needs basic cybersecurity awareness rather than expert-level technical knowledge

Explanation

Zdravko argues that widespread cybersecurity education should focus on basic awareness for the general public rather than technical expertise. Simple knowledge about common threats like phishing can prevent the majority of security incidents.


Evidence

I think not everybody has to be really a cyber security expert and know all the techniques and how to hack computers and systems, but what is needed for the general population, for general users, to know some basics. because what problems we face in Croatia and other European member states and I guess everywhere in the world that people receive simple short message like the old short message service and then the message says this is very important that you type in your credit card number and they do it so some basics should be applied and everybody should understand what it means then we will resolve I don’t know maybe 90% of the cases


Major discussion point

Capacity Building and Digital Skills


Topics

Development | Cybersecurity | Sociocultural


Agreed with

– Frank Stien
– Adiel Akplogan
– Sofia Silva Berenguer

Agreed on

Capacity building and digital skills development are critical priorities


Disagreed with

– Frank Stien

Disagreed on

Level of technical knowledge required for general population


S

Sofia Silva Berenguer

Speech speed

137 words per minute

Speech length

595 words

Speech time

258 seconds

RPKI adds cryptographic verification to BGP announcements but adoption remains low at 25% for route origin validation

Explanation

Sofia explains that RPKI provides essential security for internet routing by allowing cryptographic verification of route announcements. However, despite being available for over 10 years, adoption rates remain concerning with less than 25% of networks implementing full protection.


Evidence

A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations that are the objects in RPKI used to for establishing that route intention on the origin of routes. And then the other side of things that is using that information to verify BGP announcements is what we call route origin validation and the statistic as of a few weeks ago was that less than 25 percent of those networks in the internet that we call autonomous systems less than 25 percent were fully protected by route origin validation


Major discussion point

Routing Security and RPKI Implementation


Topics

Infrastructure | Cybersecurity


Agreed with

– Dany Wazen
– Chafic Chaya

Agreed on

RPKI adoption is crucial but remains insufficient globally


50-60% of prefix origin pairs covered by route origin authorizations, showing room for improvement

Explanation

While there has been progress in RPKI deployment with over half of prefix origin pairs now covered by route origin authorizations, Sofia indicates there is still significant room for improvement. This partial adoption limits the overall security benefits of the technology.


Evidence

A few weeks ago when I checked statistics around 50 to 60 percent of the unique prefix origin pairs were covered by route origin authorizations


Major discussion point

Routing Security and RPKI Implementation


Topics

Infrastructure | Cybersecurity


Implementation of best practices requires bridging gap between technical and non-technical decision makers

Explanation

Sofia identifies a key challenge in cybersecurity adoption: the difficulty of convincing non-technical decision makers about the importance of technologies like RPKI. The benefits may not be immediately evident or commercially obvious, requiring better communication and awareness efforts.


Evidence

Although technical people may be very convinced of the importance of technologies like RPKI, it’s hard to convince non-technical decision makers or even commercial sectors, commercial areas within some organizations, because the benefits may not be evident, may not be immediate. So, there is a need, and as the other panelists mentioned, for more capacity building, for more awareness raising


Major discussion point

Technical Standards and Best Practices


Topics

Development | Infrastructure | Cybersecurity


Agreed with

– Frank Stien
– Adiel Akplogan
– Zdravko Jukic

Agreed on

Capacity building and digital skills development are critical priorities


A

Adiel Akplogan

Speech speed

123 words per minute

Speech length

1089 words

Speech time

530 seconds

Multi-stakeholder model critical for DNS stability over 40 years, bringing different parties together for policy development

Explanation

Adiel argues that the multi-stakeholder approach has been fundamental to the DNS’s success and stability over four decades. This model brings together diverse stakeholders to discuss complex infrastructure issues and translate them into implementable policies.


Evidence

The multi-stakeholder model has been at the center of that coordination. And the DNS has been operating for more than 40 years and it has been stable, sustainable, resilient over those years. Which shows that when we bring different parties, different actors around the table to discuss issues related to those critical infrastructures, it works


Major discussion point

Multi-stakeholder Governance and Collaboration


Topics

Infrastructure | Legal and regulatory | Development


Agreed with

– Rodrigue Guiguembde
– Frank Stien
– Zdravko Jukic

Agreed on

Multi-stakeholder collaboration is essential for internet infrastructure development and governance


Local implementation of multi-stakeholder approach needed since internet is global network of local operations

Explanation

While the internet is global, Adiel emphasizes that it consists of many small independent networks operated locally. Therefore, the multi-stakeholder approach must be applied at local levels to address the specific challenges and needs of different regions and countries.


Evidence

Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas and to look at what are the different aspects of implementing or addressing challenges that can be seen


Major discussion point

Multi-stakeholder Governance and Collaboration


Topics

Infrastructure | Legal and regulatory | Development


ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support

Explanation

ICANN has implemented extensive capacity building efforts with over 200 workshops annually, emphasizing regional customization. The organization recognizes that different regions have different needs and challenges, requiring tailored approaches to capacity building.


Evidence

Last year we have run more than 200 workshop and capacity building activities on technical implementation of best practices around the DNS particularly for registry. It is something that we continue doing and we don’t do it at the global level only. We try to bring in a regional flavor to it because we know that the needs are not the same across all the regions, all the countries, the challenges are not the same


Major discussion point

Capacity Building and Digital Skills


Topics

Development | Infrastructure | Sociocultural


Agreed with

– Frank Stien
– Zdravko Jukic
– Sofia Silva Berenguer

Agreed on

Capacity building and digital skills development are critical priorities


Partnership approach necessary to reach areas single organizations cannot cover effectively

Explanation

Adiel emphasizes that partnerships between different organizations are essential for maximizing reach and impact. Single organizations have limited resources and scope, but through partnerships, they can mutualize resources and extend their influence to areas they couldn’t reach alone.


Evidence

Our partnership with UNESCO and IDN and so on and so forth are a way to actually mutualize our resources to make sure that what we are preaching and what we are advancing reaches an area that one organization alone cannot reach


Major discussion point

Multi-stakeholder Governance and Collaboration


Topics

Development | Infrastructure | Legal and regulatory


D

Dany Wazen

Speech speed

140 words per minute

Speech length

143 words

Speech time

61 seconds

30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions

Explanation

Dany highlights a significant digital divide in the Arab region where over 100 million people remain unconnected to the internet. This represents 30% of the regional population and demonstrates the urgent need for inclusive connectivity solutions.


Evidence

And if we look into our region, the Arab region is one of the least connected among the other regions in the world. And 30% of the Arab region, which means more than 100 million are not connected to the internet


Major discussion point

Infrastructure Development and Investment


Topics

Development | Infrastructure | Digital access


UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion

Explanation

UNDP has launched a comprehensive digital development initiative targeting three key areas: scalable connectivity through IPv6 adoption, sustainable connectivity through Internet Exchange Points, and secure connectivity through RPKI implementation. This initiative involves partnerships with organizations like RIPE NCC.


Evidence

We have recently launched two initiatives. One of them we are planning now with RIPE NCC as a partnership. So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability, which means scalable connectivity in order to be more inclusive. Second is allow sustainability for this connectivity through a different approach, and thirdly, is a safe and secure connectivity


Major discussion point

Infrastructure Development and Investment


Topics

Development | Infrastructure | Economic


UNDP partnership with RIPE NCC promotes RPKI adoption through awareness campaigns and capacity building

Explanation

As part of the broader digital inclusion initiative, UNDP is specifically working with RIPE NCC to promote routing security through RPKI implementation. This involves conducting awareness campaigns and capacity building activities to improve internet security in the region.


Evidence

And finally, the RPKI, as we’ve heard, the security, which is very much important, and we’re looking through this initiative to engage further with more partners on launching awareness campaigns and doing the capacity building for the security of the connectivity


Major discussion point

Routing Security and RPKI Implementation


Topics

Development | Cybersecurity | Infrastructure


Agreed with

– Sofia Silva Berenguer
– Chafic Chaya

Agreed on

RPKI adoption is crucial but remains insufficient globally


UNDP developing regulatory framework with GSMA for digital policies supporting connectivity and data centers

Explanation

UNDP is creating a comprehensive regulatory framework in partnership with GSMA and mobile operators to help countries develop digital economy policies. This framework covers connectivity, data centers, and data/AI usage policies to support national digital transformation efforts.


Evidence

Another entry point that we are working on for the connectivity and inclusion, digital inclusion, is a new framework, regulatory framework, that we are designing with different partners, the GSMA, Orido Mobile Telecom Operator, and others. It’s basically how we can give countries a legal framework, digital policies framework, that can support the country advancing on their digital economy by investing or designing policies and regulations for the connectivity and for the data centers and using also the data and AI


Major discussion point

Regulatory Frameworks and Policy Development


Topics

Legal and regulatory | Development | Economic


V

Vinicius Fortuna

Speech speed

132 words per minute

Speech length

141 words

Speech time

63 seconds

DNS privacy concerns with encrypted DNS and encrypted client hello technologies need promotion

Explanation

Vinicius raises concerns about privacy leakage through unencrypted domain names, even when using HTTPS. He demonstrates how AI can analyze domain name patterns to create detailed personal profiles, highlighting the need for encrypted DNS and encrypted client hello technologies.


Evidence

Currently, when you use, even when you use a HTTPS, encrypted HTTP, like your domain name goes in plain text and it leaks. And that’s like with the advancement of AI, that’s becoming a very serious threat. I actually ran an experiment analyzing my own domain names and put it on LLM and create a profile about me and it’s scary, like you can tell the person’s employer, the health conditions, political associations, religion, sexual preferences and gender and all sorts of things


Major discussion point

Technical Standards and Best Practices


Topics

Cybersecurity | Human rights | Infrastructure


A

Audience

Speech speed

156 words per minute

Speech length

180 words

Speech time

69 seconds

Remote areas suffer from poor infrastructure and high data costs requiring targeted policy interventions

Explanation

An audience member highlights the persistent digital divide affecting remote areas, where poor internet infrastructure combines with high data costs and lack of access to digital devices. They question what specific policies are being implemented to ensure digital transformation initiatives reach these underserved populations.


Evidence

Most of the projects, when they are being scaled, they are being done in the urban areas. So, I would really want to find out what are the policies or the laws that you have put in place to make sure that when you are scaling these things about the projects to do with digital transformation, you are channeling these initiatives to reach to the people that are living in the remote areas, because these are the people that are suffering from the poor infrastructure when it comes to internet. At the same time, even the data cost is very costly, which they cannot manage to access. And at the same time, they are also having the issue to do with the digital gadgets


Major discussion point

Digital Inclusion and Access


Topics

Development | Infrastructure | Economic


C

Chafic Chaya

Speech speed

116 words per minute

Speech length

2081 words

Speech time

1076 seconds

Technical preparedness is not a luxury but a strategic necessity for supporting digital ambitions

Explanation

Chafic emphasizes that robust internet infrastructure is essential for supporting tomorrow’s digital economy. He frames technical preparedness as a fundamental requirement rather than an optional enhancement, highlighting the critical nature of infrastructure investment.


Evidence

So the discussion today will be grounded in the belief that technical preparedness is not a luxury but is a strategic necessity


Major discussion point

Infrastructure Development and Investment


Topics

Infrastructure | Development | Economic


Comprehensive internet ecosystem requires connectivity, routing security, IPv6, IXPs, RPKI, and collaborative policy frameworks

Explanation

Chafic outlines the multiple technical components necessary for a robust internet ecosystem. He identifies key areas including connectivity infrastructure, security protocols, next-generation internet protocols, and collaborative governance frameworks as essential elements.


Evidence

We will discuss connectivity, routing security, IPv6, IXPs, RPKI, collaborative policy framework, capacity building, all these issues that create a robust internet ecosystem


Major discussion point

Technical Standards and Best Practices


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Some Middle East and African countries lack basic infrastructure while others discuss advanced technologies

Explanation

Chafic highlights the significant digital divide where some countries in the region still lack fundamental internet infrastructure. This creates a challenging situation where advanced technologies like AI and IoT are being discussed while basic connectivity remains unavailable in certain areas.


Evidence

Yes just I want to highlight here that there are some countries in the Middle East and African region that they don’t have yet the basic infrastructure. While here we are discussing AI and Internet of Things and the cloud computing, we still have countries without basic infrastructure


Major discussion point

Digital Inclusion and Access


Topics

Development | Infrastructure | Digital access


Key takeaways include collaboration, partnership, IPv6, RPKI, MANRS, DNS security, and long-term capacity building investment

Explanation

Chafic summarizes the essential elements identified during the discussion for building robust internet infrastructure. He emphasizes both technical implementations and collaborative approaches as necessary components for future-ready digital infrastructure.


Evidence

We will have some takeaway and some recommendation, but just to summarize, collaboration, partnership, IPv6, RPKI, MANRS, the NSSEC should be in the public infrastructure plan, and the last one is long term investment in capacity building


Major discussion point

Technical Standards and Best Practices


Topics

Infrastructure | Cybersecurity | Development


Agreed with

– Sofia Silva Berenguer
– Dany Wazen

Agreed on

RPKI adoption is crucial but remains insufficient globally


Agreements

Agreement points

Multi-stakeholder collaboration is essential for internet infrastructure development and governance

Speakers

– Adiel Akplogan
– Rodrigue Guiguembde
– Frank Stien
– Zdravko Jukic

Arguments

Multi-stakeholder model critical for DNS stability over 40 years, bringing different parties together for policy development


No single actor can build African digital infrastructure alone due to complexity of challenges


Enhanced regulatory frameworks including EU NIST2 Directive and new Security Act strengthen cybersecurity landscape


Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation


Summary

All speakers emphasized that complex internet infrastructure challenges require collaboration between governments, private sector, technical community, and other stakeholders. They provided examples of successful multi-stakeholder initiatives and stressed that no single entity can address these challenges alone.


Topics

Legal and regulatory | Infrastructure | Development


Capacity building and digital skills development are critical priorities

Speakers

– Frank Stien
– Adiel Akplogan
– Zdravko Jukic
– Sofia Silva Berenguer

Arguments

Broad foundational knowledge combined with specialized expertise through collaboration is essential


ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support


General population needs basic cybersecurity awareness rather than expert-level technical knowledge


Implementation of best practices requires bridging gap between technical and non-technical decision makers


Summary

Speakers agreed that capacity building must occur at multiple levels – from basic user awareness to specialized technical expertise. They emphasized the need for regional customization and bridging the gap between technical and non-technical stakeholders.


Topics

Development | Cybersecurity | Infrastructure


Network resilience and redundancy are fundamental for critical infrastructure

Speakers

– Frank Stien
– Zdravko Jukic

Arguments

Densely populated areas require at least three independent transmission networks for critical redundancy


Emergency situations like floods require national roaming capabilities combining all operational network parts


Summary

Both speakers emphasized the importance of building redundant network infrastructure that can withstand failures and emergency situations. They provided specific examples of how redundancy saves lives and maintains connectivity during crises.


Topics

Infrastructure | Cybersecurity


RPKI adoption is crucial but remains insufficient globally

Speakers

– Sofia Silva Berenguer
– Dany Wazen
– Chafic Chaya

Arguments

RPKI adds cryptographic verification to BGP announcements but adoption remains low at 25% for route origin validation


UNDP partnership with RIPE NCC promotes RPKI adoption through awareness campaigns and capacity building


Key takeaways include collaboration, partnership, IPv6, RPKI, MANRS, DNS security, and long-term capacity building investment


Summary

Speakers agreed that RPKI is essential for routing security but current adoption rates are inadequate. They emphasized the need for awareness campaigns and capacity building to increase implementation.


Topics

Infrastructure | Cybersecurity


Similar viewpoints

Both speakers from regulatory backgrounds emphasized the importance of coordinated cybersecurity responses involving multiple agencies and sectors, with clear roles and responsibilities defined for different stakeholders.

Speakers

– Frank Stien
– Zdravko Jukic

Arguments

Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response


Trusted vendor assessments require collaboration between regulatory authorities and national security agencies


Topics

Cybersecurity | Legal and regulatory


Both speakers highlighted the massive scale of digital divide challenges in their respective regions and the need for coordinated regional approaches to address connectivity gaps affecting hundreds of millions of people.

Speakers

– Rodrigue Guiguembde
– Dany Wazen

Arguments

Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision


30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions


Topics

Development | Infrastructure | Digital access


Both speakers emphasized the critical role of partnerships between international organizations to maximize reach and impact, particularly in addressing digital development challenges in underserved regions.

Speakers

– Adiel Akplogan
– Dany Wazen

Arguments

Partnership approach necessary to reach areas single organizations cannot cover effectively


UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion


Topics

Development | Infrastructure | Legal and regulatory


Unexpected consensus

Balance between economic efficiency and security redundancy in network infrastructure

Speakers

– Zdravko Jukic
– Frank Stien

Arguments

BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements


Densely populated areas require at least three independent transmission networks for critical redundancy


Explanation

It was unexpected to see regulators explicitly acknowledging the tension between economic optimization and security requirements, with both speakers recognizing that resilience investments may not be economically justified but are necessary for national security. This represents a sophisticated understanding of the trade-offs involved in infrastructure policy.


Topics

Cybersecurity | Legal and regulatory | Infrastructure


Regional customization of global technical standards and policies

Speakers

– Adiel Akplogan
– Zdravko Jukic
– Dany Wazen

Arguments

ICANN conducted 200+ workshops focusing on regional needs and providing ongoing operational support


Croatia fully transposed NIS2 directive and uses 5G toolbox as example of flexible European cooperation


UNDP developing regulatory framework with GSMA for digital policies supporting connectivity and data centers


Explanation

There was unexpected consensus across different types of organizations (technical, regulatory, development) on the need to adapt global standards to local contexts. This suggests a mature understanding that one-size-fits-all approaches don’t work for complex technical infrastructure challenges.


Topics

Legal and regulatory | Development | Infrastructure


Overall assessment

Summary

The speakers demonstrated strong consensus on fundamental principles including the necessity of multi-stakeholder collaboration, the critical importance of capacity building, the need for network resilience and redundancy, and the urgency of improving RPKI adoption. There was also agreement on the challenges of balancing economic efficiency with security requirements and the importance of regional customization of global standards.


Consensus level

High level of consensus with significant implications for internet governance. The agreement across different stakeholder groups (regulators, technical community, development organizations) suggests that there is a shared understanding of the challenges and potential solutions. This consensus provides a strong foundation for coordinated action on internet infrastructure development, particularly in addressing the digital divide and improving cybersecurity. The alignment between different perspectives indicates that multi-stakeholder initiatives are likely to be more effective and sustainable.


Differences

Different viewpoints

Approach to cybersecurity organizational structure

Speakers

– Frank Stien
– Zdravko Jukic

Arguments

Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response


BEREC renamed working group to emphasize resilience, balancing economic efficiency with redundancy requirements


Summary

Frank advocates for a decentralized sectorial CERT approach with specialized knowledge per sector, while Zdravko focuses on centralized European coordination through BEREC working groups that balance economic and resilience considerations


Topics

Cybersecurity | Infrastructure | Legal and regulatory


Level of technical knowledge required for general population

Speakers

– Frank Stien
– Zdravko Jukic

Arguments

Broad foundational knowledge combined with specialized expertise through collaboration is essential


General population needs basic cybersecurity awareness rather than expert-level technical knowledge


Summary

Frank emphasizes the importance of broad foundational knowledge of internet fundamentals, while Zdravko argues that basic awareness is sufficient for the general population and can resolve 90% of security issues


Topics

Development | Cybersecurity | Sociocultural


Unexpected differences

Privacy and encryption priorities

Speakers

– Vinicius Fortuna
– Other panelists

Arguments

DNS privacy concerns with encrypted DNS and encrypted client hello technologies need promotion


Various arguments focused on infrastructure, routing security, and basic connectivity


Explanation

Vinicius raised advanced privacy concerns about DNS leakage and AI profiling capabilities, which was unexpected given that most panelists were focused on basic infrastructure development and traditional security measures. This highlighted a gap between advanced privacy considerations and fundamental connectivity challenges


Topics

Cybersecurity | Human rights | Infrastructure


Overall assessment

Summary

The discussion showed remarkably high consensus among speakers, with most disagreements being tactical rather than strategic. Main areas of difference included organizational approaches to cybersecurity (centralized vs. decentralized), required knowledge levels for general population, and specific methods for promoting technical standards adoption


Disagreement level

Low to moderate disagreement level with high strategic alignment. The implications are positive as speakers shared common goals of robust internet infrastructure, multi-stakeholder collaboration, and capacity building. The tactical differences actually complement each other and suggest multiple viable approaches to achieving shared objectives. The main challenge identified is bridging the gap between advanced technical capabilities and basic infrastructure needs in developing regions


Partial agreements

Partial agreements

Similar viewpoints

Both speakers from regulatory backgrounds emphasized the importance of coordinated cybersecurity responses involving multiple agencies and sectors, with clear roles and responsibilities defined for different stakeholders.

Speakers

– Frank Stien
– Zdravko Jukic

Arguments

Norway implements sectorial CERTs across 15 sectors coordinated by national NCSC for specialized threat response


Trusted vendor assessments require collaboration between regulatory authorities and national security agencies


Topics

Cybersecurity | Legal and regulatory


Both speakers highlighted the massive scale of digital divide challenges in their respective regions and the need for coordinated regional approaches to address connectivity gaps affecting hundreds of millions of people.

Speakers

– Rodrigue Guiguembde
– Dany Wazen

Arguments

Smart Africa represents 40 countries and 1.6 billion people working toward single digital market vision


30% of Arab region population (100+ million people) lacks internet connectivity, requiring scalable solutions


Topics

Development | Infrastructure | Digital access


Both speakers emphasized the critical role of partnerships between international organizations to maximize reach and impact, particularly in addressing digital development challenges in underserved regions.

Speakers

– Adiel Akplogan
– Dany Wazen

Arguments

Partnership approach necessary to reach areas single organizations cannot cover effectively


UNDP launching Digital Professional Development initiative focusing on IPv6 adoption and IXP promotion


Topics

Development | Infrastructure | Legal and regulatory


Takeaways

Key takeaways

Multi-stakeholder collaboration is essential for internet infrastructure development, with successful examples like Smart Africa’s One African Network and UNDP-RIPE NCC partnerships


Infrastructure resilience requires balancing economic efficiency with redundancy – densely populated areas need at least three independent transmission networks


Capacity building must address both general user awareness (basic cybersecurity practices) and technical expertise for network operators


RPKI adoption remains critically low at 25% for route origin validation despite being available for over 10 years, requiring increased awareness and implementation


Regional approaches are necessary as internet challenges vary significantly – 30% of Arab region lacks connectivity while developed countries focus on AI and IoT infrastructure


Sectorial CERT coordination (like Norway’s 15-sector model) provides specialized knowledge while enabling scalable incident response


Regulatory frameworks must be agile and collaborative, with examples like EU’s NIS2 directive and 5G toolbox showing flexible implementation approaches


No single actor can address complex digital infrastructure challenges alone – partnership between government, private sector, and technical communities is mandatory


Resolutions and action items

UNDP to launch Digital Professional Development initiative with three pillars: IPv6 adoption, IXP promotion, and RPKI security implementation


UNDP and RIPE NCC partnership to conduct awareness campaigns and capacity building for routing security in Arab region


BEREC to develop methodology for balancing economic investment with network resilience requirements across European member states


Smart Africa to continue One African Network expansion beyond current 11 countries to eliminate roaming charges


Continued promotion of MANRS initiative and best practices implementation through RIR regional support


Development of regulatory framework by UNDP with GSMA for digital policies supporting connectivity and data centers


ICANN to continue 200+ annual workshops with regional focus and ongoing operational support for DNS operators


Unresolved issues

Technical connectivity problems during session prevented full participation from some online speakers


Question about IoT infrastructure management by device owners remained unanswered due to time constraints


Privacy concerns regarding DNS leakage and need for encrypted DNS/encrypted client hello adoption not fully addressed


Specific policies for ensuring digital transformation projects reach remote areas rather than just urban centers


How to address high data costs and digital device access barriers in underserved communities


Detailed methodology for trusted vendor assessments and implementation across different national contexts


Specific mechanisms for intelligence and information sharing across borders for cybersecurity threats


Suggested compromises

Balance between economic efficiency and network redundancy through BEREC’s proposed methodology allowing flexible national implementation


Sectorial CERT approach combining specialized knowledge with coordinated national response capabilities


Multi-level capacity building addressing both basic user awareness and advanced technical skills rather than expecting universal expertise


Regional flavor in global initiatives allowing local adaptation while maintaining international coordination


Flexible regulatory frameworks like EU’s 5G toolbox that provide common standards while allowing national customization


Partnership-based resource sharing to reach areas single organizations cannot cover effectively


Thought provoking comments

But when it comes to resilience, there we do exactly the opposite, we try to build some connections that should be used maybe in some emergency situation. So they are not economically, let’s say, justified by itself.

Speaker

Zdravko Jukic


Reason

This comment highlighted a fundamental paradox in infrastructure planning – the tension between economic efficiency and resilience. It challenged the typical regulatory approach of avoiding duplication and introduced the complex concept of investing in ‘economically unjustified’ redundancy for security purposes.


Impact

This observation shifted the discussion from technical solutions to the deeper economic and policy challenges of building resilient infrastructure. It introduced the theme of balancing economic optimization with security needs, which became a recurring thread throughout the session.


Although the Internet is a global network, it’s a global network made of small independent networks that are connected and that are operated at the local level. So, applying the same multi-stakeholder approach, ensuring that different parties are impacted by the Internet in general, but its operation specifically, are around the table to think, to share ideas…

Speaker

Adiel Akplogan


Reason

This comment provided a crucial conceptual framework that bridged global and local perspectives. It reframed the internet from a monolithic global entity to a collection of interconnected local networks, emphasizing that global solutions must be implemented locally.


Impact

This perspective fundamentally shaped how other speakers approached their responses, leading to more nuanced discussions about regional variations, local capacity building, and the need for context-specific implementations of global best practices.


And in order to advance this, we have recently launched two initiatives… So basically, the initiative is about connectivity for digital inclusion and to address these challenges. We wanted to work on bipartite access. The first one is related to scalability… Second is allow sustainability… and thirdly, is a safe and secure connectivity.

Speaker

Dany Wazen


Reason

This comment was insightful because it provided a concrete, structured approach to addressing digital divides while integrating the theoretical concepts discussed earlier. The three-pillar framework (scalability, sustainability, security) offered a practical model for implementation.


Impact

This intervention grounded the discussion in real-world application and demonstrated how multi-stakeholder partnerships translate into actionable programs. It shifted the conversation from problem identification to solution implementation, inspiring other speakers to provide more concrete examples.


My experience from cyber security, as you already know, it’s important to understand the fundamentals because the internet is really complex and in order to find weak links, when you’re putting up a stable, scalable system, is really to understand how this works. But at the same time, no one will ever be able to understand everything.

Speaker

Frank Stien


Reason

This comment addressed a critical paradox in cybersecurity and internet governance – the need for both deep technical understanding and collaborative expertise. It acknowledged the inherent complexity while advocating for collaborative approaches to knowledge gaps.


Impact

This observation influenced the discussion on capacity building and skills development, leading other speakers to elaborate on different levels of expertise needed (from basic user awareness to technical specialization) and reinforcing the importance of multi-stakeholder collaboration.


No single actor can build African digital infrastructure alone. The complexity of the challenge we are facing, connectivity gaps, regulatory fragmentation, climate imperative, and endless risk, require a united, agile, and inclusive approach.

Speaker

Rodrigue Guiguembde


Reason

This comment powerfully synthesized the session’s themes while adding the crucial dimension of climate considerations and regional fragmentation. It elevated the discussion beyond technical and regulatory issues to encompass environmental and geopolitical realities.


Impact

This statement served as a compelling conclusion that tied together all the session’s themes – multi-stakeholder collaboration, capacity building, infrastructure resilience, and regional cooperation – while emphasizing the urgency and complexity of the challenges faced by developing regions.


Overall assessment

These key comments fundamentally shaped the discussion by introducing critical tensions and frameworks that elevated the conversation beyond technical specifications to strategic thinking. Zdravko’s economic paradox established the complexity of infrastructure planning, while Adiel’s global-local framework provided a conceptual foundation for understanding implementation challenges. Dany’s practical three-pillar approach demonstrated how theoretical concepts translate into actionable programs, and Frank’s expertise paradox reinforced the need for collaborative approaches. Finally, Rodrigue’s synthesis brought urgency and comprehensiveness to the discussion. Together, these comments created a rich dialogue that moved from problem identification through conceptual frameworks to practical solutions, while consistently emphasizing the interconnected nature of technical, economic, regulatory, and social challenges in building resilient internet infrastructure.


Follow-up questions

Would it be good if there is an infrastructure to ensure the communication of the IoTs so that they can be managed by the owner of the IoTs itself?

Speaker

Timothy (online participant)


Explanation

This question addresses the need for dedicated infrastructure for IoT device management and communication, which is crucial as IoT adoption expands and becomes more critical to digital infrastructure


What are the needed digital skills and what are the essential digital skills in the internet-driven future?

Speaker

Online participant (via Dany Wazen)


Explanation

This question seeks to identify the specific competencies required for the future digital economy, which is essential for capacity building and workforce development planning


How can organizations promote adoption of encrypted DNS and encrypted client hello technologies to address privacy concerns with domain name leakage?

Speaker

Vinicius Fortuna (Google Jigsaw)


Explanation

This addresses a serious privacy and security concern where domain names leak in plain text even with HTTPS encryption, potentially revealing sensitive personal information when analyzed by AI systems


What policies or laws are in place to ensure digital transformation projects reach remote areas rather than just urban centers?

Speaker

Audience member


Explanation

This question addresses the digital divide and the need for inclusive policies that ensure connectivity initiatives benefit underserved rural populations who face poor infrastructure, high data costs, and lack of digital devices


How to develop methodology for balancing economic viability for operators with national security requirements for network resilience?

Speaker

Zdravko Jukic


Explanation

This represents a key challenge for regulators in determining optimal investment levels for network redundancy that balance commercial interests with national security needs


How can countries balance different levels of digital advancement within regions like Africa?

Speaker

Chafic Chaya


Explanation

This addresses the challenge of coordinating digital development across countries with varying levels of infrastructure and technological advancement


How to improve intelligence and information sharing among cybersecurity peers across borders?

Speaker

Frank Stien


Explanation

This identifies a gap in international cybersecurity cooperation that needs further development to enhance global internet security


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Day 0 Event #251 Large Models and Small Player Leveraging AI in Small States and Startups

Day 0 Event #251 Large Models and Small Player Leveraging AI in Small States and Startups

Session at a glance

Summary

This discussion, presented by IGF 2025 host country Norway, focused on how small states and startups can leverage AI to compete with larger players in the global AI landscape. The session explored whether smaller actors are sidelined by AI’s resource demands or positioned for unique opportunities through agility, trust, and strategic collaborations.


Norwegian Minister Karianne Tung outlined Norway’s ambitious goal to become the world’s most digitalized country by 2030, highlighting investments in national AI infrastructure, including the new Olivia supercomputer and free Norwegian language models. She emphasized that small states can lead through flexibility and value-based approaches rather than despite their size. Jan-Marcus Lervig from Cognite demonstrated how startups can compete by focusing on specific domains where they possess more relevant data than tech giants, citing Cognite’s leadership in industrial data management.


Professor Ole-Christopher Granmo presented the Settling Machine as an energy-efficient alternative to deep learning, using up to 10,000 times less electricity while maintaining accuracy and explainability. Dr. Chinasa Okolo emphasized opportunities for smaller nations to lead in ethical AI development through contextual innovation, data sovereignty, and peer-to-peer collaboration, particularly in the global majority regions.


Industry representatives Jeff Bullwinkel from Microsoft and Kojo Boake from Meta discussed how large platforms support smaller players through open infrastructure and models. Esther Kunda from Rwanda shared insights from the AI playbook for small states, emphasizing capability building and trusted environments for innovation.


The panelists agreed that success requires focusing on creating value first, then implementing appropriate governance frameworks, while avoiding over-regulation that could stifle innovation. The discussion concluded that small players can become strategic shapers of AI’s future through smart partnerships, domain expertise, and leveraging unique national advantages like renewable energy and specialized knowledge.


Keypoints

## Major Discussion Points:


– **Small States and Startups Leveraging AI Innovation**: The discussion explored how smaller nations and companies can compete with tech giants by focusing on domain expertise, agility, and unique advantages rather than trying to match the scale of hyperscalers. Examples included Norway’s focus on industrial data, Rwanda’s AI policy leadership, and Estonia’s digital government initiatives.


– **Energy-Efficient and Alternative AI Technologies**: Significant attention was given to developing sustainable AI solutions, including Professor Granmo’s Settling Machine as an energy-efficient alternative to deep learning, and Norway’s advantage in green energy for AI infrastructure. The discussion highlighted the environmental costs of current AI models and the need for more efficient approaches.


– **Open Source vs. Closed AI Models**: The debate centered on democratizing AI access through open-source models (like Meta’s Llama) versus proprietary systems, with speakers discussing how open-source approaches can level the playing field for smaller players and enable local customization and fine-tuning.


– **AI Governance and Regulation Frameworks**: Extensive discussion on balancing innovation with responsible AI development, including the EU AI Act implementation, regulatory sandboxes, and the need for context-appropriate governance frameworks that don’t stifle innovation while ensuring ethical AI deployment.


– **Data Sovereignty and Local Context**: The importance of countries maintaining control over their data and developing AI solutions that reflect local values, languages, and societal needs, rather than relying solely on models trained on Western data and perspectives.


## Overall Purpose:


The discussion aimed to explore how smaller nations, startups, and underrepresented regions can effectively participate in and shape the global AI landscape despite resource constraints. The session sought to identify strategies for leveraging unique advantages, fostering innovation ecosystems, and creating inclusive AI development that serves diverse global needs rather than being dominated by a few major tech companies.


## Overall Tone:


The discussion maintained an optimistic and collaborative tone throughout, with speakers emphasizing opportunities rather than limitations. There was a strong sense of partnership and shared purpose among panelists from different sectors (government, academia, industry). The tone was pragmatic yet aspirational, acknowledging challenges while focusing on actionable solutions. Speakers consistently reinforced themes of cooperation, innovation, and the potential for smaller players to make significant contributions to the AI ecosystem. The atmosphere remained constructive and forward-looking, with minimal tension despite representing different perspectives on AI development and governance.


Speakers

**Speakers from the provided list:**


– **Natalie Becker Aakervik** – Moderator for the session


– **Karianne Tung** – Norway’s Minister of Digitalization and Public Governance


– **John M Lervik** – Entrepreneur and strategist from Cognite, described as one of the leading voices in Norway’s startup ecosystem


– **Ole Christopher Granmo** – Professor at University of Agder and Director of CAIR (Centre for Artificial Intelligence Research), expert in Tsetlin Machine approach to AI


– **Chinasa T. Okolo** – Fellow at the Center for Technology Innovation at the Brookings Institute, recognized as one of the world’s most influential people in AI by Time, expert at the intersection of AI, equity and global governance


– **Esther Kunda** – Director General of Innovation and Emerging Technologies (from Rwanda)


– **Jeff Bullwinkel** – Deputy General Counsel for Microsoft EMEA


– **Kojo Boake** – Vice President of Public Policy for Africa, the Middle East, and Turkey at META


– **Daniel Dykes** – (Role/expertise not clearly specified in transcript)


– **Noel Hurley** – (Role/expertise not clearly specified in transcript)


– **Rishad A. Shafik** – (Role/expertise not clearly specified in transcript)


**Additional speakers:**


None identified beyond the provided speakers names list.


Full session report

# Small States and Startups in the Global AI Landscape: IGF 2025 Discussion Report


## Introduction and Context


This IGF 2025 session, hosted by Norway, examined how small states and startups can leverage artificial intelligence to compete in the global AI landscape. Moderated by Natalie Becker Aakervik, the hybrid session brought together government ministers, industry leaders, academics, and policy experts to explore whether smaller actors face insurmountable challenges from AI’s resource demands or can find unique opportunities through strategic positioning.


The panel featured Norway’s Minister of Digitalization and Public Governance Karianne Tung, entrepreneur John M Lervik from Cognite, Professor Ole Christopher Granmo from the University of Agder, AI governance expert Chinasa T. Okolo from the Brookings Institution, Rwanda’s Director General of Innovation Esther Kunda, Microsoft’s Jeff Bullwinkel, and Meta’s Kojo Boake.


## National AI Strategies and Strategic Positioning


### Norway’s Comprehensive Digital Vision


Minister Karianne Tung outlined Norway’s ambitious strategy to become the world’s most digitalized country by 2030. This vision is supported by substantial investments including the new Olivia supercomputer and development of Norwegian language models. Tung emphasized that Norway’s approach focuses on creating value through flexibility and values-based approaches rather than competing purely on scale.


The Norwegian government has allocated 1.3 billion Norwegian kroners to AI research through six newly selected research centers beginning operations in summer 2025. Norway is also implementing the EU’s AI Act with a national supervisory authority and launching the AI Norway initiative, which includes regulatory sandboxes to foster innovation while ensuring responsible development.


Tung articulated a fundamental principle: “AI must not become a playground for the powerful, it must serve the public good. And small players are often well positioned to drive innovation with purpose.”


### Rwanda’s Innovation Laboratory Approach


Esther Kunda shared Rwanda’s comprehensive AI strategy, highlighting the country’s collaboration with Singapore on an AI Playbook for Small States and partnerships with Carnegie Mellon University for talent development. Rwanda has developed regulatory sandboxes and positioned itself as an innovation laboratory with agile regulatory frameworks.


Kunda emphasized Rwanda’s focus on three key areas: access to high-performance computing, quality data governance including data sharing policies, and skilled workforce development. She noted that Rwanda participates in the Digital FOSS platform of 108 small states established in 1992, demonstrating long-standing commitment to collaborative digital development.


## Energy-Efficient AI Technologies


### The Tsetlin Machine Alternative


Professor Ole Christopher Granmo presented the Tsetlin Machine as a revolutionary energy-efficient alternative to current AI technologies. He provided stark statistics about AI energy consumption: “One query with ChatGPT… is the same amount of energy as it takes to light one light bulb for 20 minutes. Furthermore, every month, ChatGPT produces more than 260,000 carbon CO2… equal to the emission of 260 flights from New York to London.”


The Tsetlin Machine offers significant energy savings while maintaining explainability—a critical advantage over current “black box” AI systems. Granmo argued that “if we don’t understand the AI, the AI controls us,” emphasizing the importance of maintaining human agency over artificial intelligence systems.


### Norway’s Green Energy Advantage


John M Lervik highlighted Norway’s unique position combining 100% clean energy with cold climate, creating natural advantages for sustainable AI infrastructure. Combined with Norway’s expertise in industrial data, this positions the country to lead in sustainable AI development. A salmon farming demonstration video showcased practical applications of AI in Norway’s key industries.


## Strategic Approaches for Smaller Players


### Domain Expertise Over Scale


Lervik shared Cognite’s success story, demonstrating how startups can compete by focusing on areas where they possess more relevant data than large technology companies. He advocated for strategic focus: “Small players should focus on particular problems and ensure they’re sufficiently big that large companies also care about them to create competitive tension.”


This approach creates competitive dynamics that benefit smaller players while addressing substantial market needs, rather than attempting to compete with tech giants on general-purpose AI.


### Contextual Innovation and Local Solutions


Chinasa T. Okolo emphasized opportunities for smaller nations to lead through contextual innovation, data sovereignty, and peer-to-peer collaboration. She highlighted the importance of addressing AI bias in non-Western contexts, noting that current AI fairness literature focuses primarily on Western concepts while more research is needed on discrimination based on social identities relevant to global majority countries, such as caste or tribal affiliation.


Okolo argued that smaller nations can lead by focusing on contextualized AI approaches rather than trying to build general AI models that compete directly with tech giants.


## Industry Platform Strategies


### Open Source as Democratization Tool


Kojo Boake from Meta discussed how open source models like Llama enable smaller players to fine-tune AI for local purposes while reducing compute costs and increasing transparency. Meta’s approach has enabled applications reaching 3 million students through educational tools and providing agricultural SMS services for farmers.


Boake emphasized that open source models democratize AI access by allowing smaller players to customize solutions for their specific contexts without requiring massive resources to train models from scratch. He also advocated for avoiding “cookie-cutter regulatory approaches,” supporting frameworks suited to local contexts.


### Microsoft’s Sovereign AI Commitment


Jeff Bullwinkel outlined Microsoft’s three-part European digital commitment: expanding sovereign cloud services, enhancing cybersecurity programs, and supporting digital skills development. This approach aims to give smaller nations more control over their digital infrastructure while maintaining responsible AI principles including privacy, security, and ethical frameworks as foundational elements.


## AI Governance and Regulatory Innovation


### Avoiding One-Size-Fits-All Approaches


Multiple speakers agreed that smaller nations should develop governance frameworks suited to their contexts rather than simply copying larger jurisdictions’ regulations. Okolo argued: “Just as we shouldn’t rely on these big tech companies to be the standard of AI development, we also should not rely on these bigger regional blocks or countries to also be the model for AI governance.”


### Balancing Innovation and Responsibility


A nuanced discussion emerged around the appropriate balance between enabling innovation and ensuring responsible AI development. While there was consensus on the importance of both objectives, speakers emphasized different priorities in achieving this balance.


Lervik suggested focusing on value creation first: “We are starting with the cart in front of the horse in many ways. We started to talk about ethical use and privacy… We need to start with understanding how do we create value from AI?”


Other speakers emphasized building responsible AI principles from the beginning, with Bullwinkel stressing Microsoft’s commitment to maintaining data privacy and security as foundational elements.


## Multi-Stakeholder Collaboration


### Essential Partnerships


Strong consensus emerged on the importance of multi-stakeholder collaboration involving companies of all sizes, governments, academia, and civil society. Boake emphasized that “multi-stakeholder collaboration involving big players, medium companies, small regional operators, and academics is essential for effective AI governance.”


This collaborative approach recognizes that effective AI governance requires diverse perspectives and expertise that no single actor possesses.


### Data Sovereignty and Independence


The discussion highlighted data sovereignty as critical for smaller countries seeking to maintain independence from big tech dominance. Okolo emphasized that “data sovereignty, contextual innovation, and peer-to-peer collaboration can help smaller countries control digital resources and increase independence.”


## Key Areas of Consensus


### Strategic Advantages Over Scale


All speakers agreed that small states and companies can compete effectively in AI by leveraging unique advantages like agility, specialized focus, and strategic positioning rather than trying to match the scale of large players.


### Sustainability Imperative


Multiple speakers emphasized the urgent need for energy-efficient AI solutions, with growing awareness of sustainability challenges across the AI community.


### Collaborative Approaches


All speakers emphasized the importance of collaborative approaches to AI development, whether through public-private partnerships, multi-stakeholder governance, or international cooperation.


## Practical Commitments and Next Steps


The session generated concrete commitments: Norway committed to implementing the EU’s AI Act with national supervisory authority and continuing its AI Norway initiative. Meta invited collaboration on using Llama models for national problem-solving and encouraged participation in their Impact Accelerator Program. Microsoft announced its European digital commitments including sovereign cloud services. Rwanda committed to continuing partnerships with academia and other countries for AI talent development.


## Conclusion


The discussion revealed optimism about smaller players’ potential to shape AI’s future through smart partnerships, domain expertise, and leveraging unique national advantages. Rather than being sidelined by AI’s resource demands, smaller players can find opportunities through agility, trust, and values-driven approaches that serve public good.


The session successfully reframed the conversation from defensive survival strategies to empowering leadership approaches in AI development through sustainability, explainability, local context, and collaborative governance. However, significant challenges remain in translating strategic insights into practical implementation, particularly around infrastructure development and maintaining the balance between innovation and responsibility that all speakers recognized as essential.


The collaborative spirit and mature understanding of AI challenges across different stakeholder groups suggests potential for more coordinated and effective AI governance and development strategies globally.


Session transcript

Natalie Becker Aakervik: Hello, everybody. Welcome back. We hope you had a lovely lunch and got to meet and connect with and explore some conversations of people you’ve met. I know the speakers have also been in the networking or rather the lunch session, so if you would have wanted to chat with them, we hope that you got the opportunity to do so. Welcome back. I hope that you’re energized and ready for the next session. Now, good afternoon also to our guests from watching globally from online, welcoming you back as well to this session presented by IGF 2025 host country, Norway. You heard earlier on that Norway was the second country in the world to get connected to the Internet. That’s an important fact. So, we’re looking at large models and small players leveraging AI in small states and startups. I’m Natalie Becker-Arkovic and I’ll be your moderator for this session. Now, over the past few years, we have witnessed something truly extraordinary. AI has moved from the research lab to the boardroom, to the factory floor, to the hospital and increasingly to the center of political and economic power. But, here’s the paradox. As AI becomes more accessible in some ways, it’s also becoming harder to compete. So, the biggest models demand enormous data, compute, investment and resources which are often concentrated in the hands of a few major players. what does this mean for the rest of us? Well, for small estates or for startups and for those not operating at hyperscale, are we sidelined or are we in fact standing at a unique point of opportunity? That is the question. Because here’s what we do know, for example, innovation doesn’t always come from size. It comes from agility, it comes from trust, it comes from deep knowledge and from smart, sometimes surprising collaborations. And today we’re going to explore how small actors can play a big role in shaping the future of AI. We’ll talk about regulation that enables, about startups that outmaneuver giants, about AI systems that work where bandwidth and budgets are limited, but creativity is not. And most of all, we’ll talk about partnerships. Very important word, collaboration has come up very strongly today. Partnerships has come up very strongly today, so we should take note and take that as an actionable takeaway, one of the many. And also partnerships, the kind that really makes innovation inclusive and global and sustainable. In other words, how can we move from being small players to being strategic shapers of the digital world? First, we’ll hear from Karin Tung, Norway’s Minister of Digitalization and Public Governance. Minister Tung will share her vision for how small states like Norway can shape AI policy in a way that not only protects values like fairness and transparency, but also prioritizes countries like hers as competitive innovation hubs in the global AI landscape. So a warm round of applause, please. Minister Tung, the floor is yours. Thank you. Thank you. Thank you.


Karianne Tung: Good afternoon, everyone. It is a pleasure being here and to start this very interesting discussion on leveraging. artificial intelligence to increase business competitiveness and also to create better public services. I think we all can agree that AI will transform industries and markets as well as individual lives and our whole society. Because managed and prioritized correctly, it can be the tool we need to solve many of the complex challenges that we are up against today. And at the same time, quite understandably, I must say many people feel uncertain and concerned. It’s evident that the AI revolution raises many dilemmas and questions and concerns that we need to address. And as digitalization knows no borders, we need to work together to find the best solutions. Artificial intelligence is no longer just a technological issue, it is a matter of geopolitics. AI must not become a playground for the powerful, it must serve the public good. And small players are often well positioned to drive innovation with purpose. Many groundbreaking and impactful AI innovations come from small labs, agile startups and public agencies. Through some received support or investment from big tech, their creativity and flexibility are essential forces behind AI’s rapid progress. As nations race to harness the power of AI, the development of international standards is emerging as a key strategic tool. By shaping the rules and norms that govern AI, we are not only ensuring safety and trust, but also asserting our values and in a rapidly evolving global landscape. For many, the rise of large AI models feels like a race between giants. And indeed, the largest models today are backed by the largest companies drawing on massive data, infrastructure and funding. Being a representative for a small country, I know both the challenges but also the advantages that come with size. We do not have limitless resources. But in fact, many small states are already global leaders in digitalization, cybersecurity and tech regulations. These are not accidental achievements. These stem from long-term national strategies that prioritize innovation, citizen trust and smart governance. I would now like to take the opportunity to share with you some perspectives about how Norway is taking significant steps to harness AI in a responsible and innovative way. Our main goal towards 2030 as set out in our national digitalization strategy is for Norway to become the most and best digitalized country in the world. It is ambitious, but I believe it’s not impossible. We want the business sector to have favorable framework conditions for developing and using AI. And we want all our public sector to utilize AI for greater efficiency and to create better services for our citizens already by 2025, but also for 2030 and the future. To support these ambitious goals, we are now building a national infrastructure for artificial intelligence that can be used for research, for business development and for a more modern world. modern public sector, thus placing Norway at the forefront of ethical and safe AI use. We have allocated to the National Library, in cooperation with the state company Sigma2, to train and to make available, free of charge, Norwegian and Sámi language models. These are based on our Norwegian data and our societal values. We are developing our national infrastructure for high-performance computing, and this will support both public sector and private entities in their effort to develop AI application and utilize AI within different sectors of the economy, but also society. And just last week, we switched on our newest supercomputer. It is called Olivia. It will have 17 times greater computational power than the infrastructure we used until now. And of course, we are also working on the implementation of EU’s Artificial Intelligence Act, with a goal to make it applicable in Norway at the same time as the rest of the EU. The proposal for the necessary legislation will be sent out for public consultation before this summer. To comply with the requirements that we can find in the AI Act, we are also establishing a national supervisory authority and launching what we called AI Norway. AI Norway will be placed in our digitalization agency, and this will be an arena for collaboration, sharing of experience, and also experimenting with AI solutions within different sectors. AI Norway will also, among other things, manage our regulatory sandbox, where Norwegian public sector organizations and companies, especially the SMEs, can experiment with and develop and train AI systems within safe legal frameworks. Also, a couple of weeks ago we allocated 1.3 billion Norwegian kroners to AI-related research. Six newly selected research centres will focus on various societal and technical aspects of developing and applying AI in different fields. The centres will start their operation this summer. The Norwegian School of Economics has also recently published a report on Norwegian AI tool landscape. The rankings in this report offers a unique perspective on the Norwegian AI company landscape, showcasing both established players and emerging companies. Over 350 Norwegian AI tools and companies are described in this report. 30% of these have been founded in 2022 or later, 49 of the companies have 10 or less than 10 employees. So as you see, Norway has a vibrant AI environment and many startups to contribute to this environment with their ideas and their knowledge. We just need to create and sustain favourable conditions for these companies to thrive. Support for early-stage ventures including access to data, talent and sandboxes is critical in that respect, as well as the demand from the public sector to utilise AI in developing better services and solving tasks more efficiently. But we also need to focus on international cooperation, knowledge and sharing and strategic partnerships. Our common goal should be a balanced and inclusive technological landscape that benefits everyone. To conclude, small players can be leaders in this technological shift. not despite the size, but because of their flexibility and innovation capacity, as well as a value-based approach to AI. So, let’s don’t miss up on this opportunity. Let’s work together and build a future that is open, that is fair for the many, not for the few. Thank you for your attention.


Natalie Becker Aakervik: Thank you, Minister Tung. Thank you so much. How small scales can promote innovation and regulation in AI. Thank you for those insights. Now, we’re joined by an entrepreneur and strategist and one of the leading voices in Norway’s startup systems or startup ecosystems, and you’ll recognize him right away. John will show us that size doesn’t have to limit ambition, especially when startups focus on domain strength, agility, and trust. And with concrete examples, he’s going to explain how small players can collaborate with large platforms and sometimes even out-innovate them. That’s an idea. And I’m talking about Jan-Marcus Lervig, who I’m going to introduce in a second and invite onto stage, and he will be followed by Professor Ole-Christopher GrannmÃ¥l. And Professor GrannmÃ¥l will give us a quick tour of the Settler machine, which is a lightweight, high-accuracy model ideal for smaller actors and edge applications. So it’s a reminder that you don’t need to be a superpower to do powerful AI. You need smart, interpretable design. So now, without further ado, a warm round of applause, please, for Mr. Jan-Marcus Lervig from Cognite. Please. Thank you. Thank you. I have a few slides, I think, so if you could put them up, it would be appreciated.


John M Lervik: Yes, excellent. So Cognite was founded at the beginning of 2017, and at that time, we saw a fundamental… need to improve the world’s industries. You know we have a growing world population, we have a climate crisis and also you know lately we have seen the geopolitics which basically creates a demand for us to produce more but using less. So produce more goods, more energy but with less emission. This is really the problem that Cognite is about to solve. How can we make our industries more efficient and more sustainable and safer? Eight years later we are Norway’s first unicorn but not only that we’re also a company that delivers data and AI technologies across the world, across industries. As you can see both in the energy sector, life sciences, pharma sector and many other areas. In many ways we have created a new product category for industrial data management and we are the leader in that. You can say a particular market. So then what do we do when it comes to AI? Yes we use AI in our technology to be more efficient, to make our software more intelligent and also to be able to access data, industrial data in this case, through new and better ways. In the same way that you use chat GPT for your personal lives, basically Cognite provides software and AI to access and use data to optimize how you operate industrial facilities. But we’re not happy with that. We’re not happy to be a global leader in that area. How can we take it to the next level? And of course we all know about the giants in California, you know OpenAI for example, they built chat GPT. There’s also many others that have built large language models which is basically large foundational AI models that use huge training sets from text and grammar to build these large LLMs, so large language models that we all use every day. Going forward you also have companies like Meta or Facebook. They’re also building their own foundation model, both for text, but also for images. They’re investing now $15 billion into scale AI to basically create context for images so you can create large foundational models for images. Of course, there’s no way Cognite, or I would say also Norway, can compete with that scale. It requires too much investments, resources, talent that we can compete. But if you go into a sector like industry, we see Cognite, small Cognite, if you will, have a lot more data than the large players on industrial data. We have three orders of magnitude more than NVIDIA and all of these other cloud providers. So there’s an opportunity for us to create foundational models for industrial data because we have industrial data with context. And then you can start to create another category of AI models beyond the, let’s say, consumer models for text, images, videos, et cetera, and also do the same for industrial data. And with that, you can then also start to optimize industrial assets to make them more efficient, more sustainable in new and better ways without using the conventional machine learning approaches and writing advanced software applications. And also we know, of course, that if you look at the graph to the right, it shows how quickly the cost efficiency of different technologies, the blue one is electricity. It took a number of decades. The second one was internet. And the third one is basically generative AI, how quickly the price curve goes down. So if you have access to unique data, the price curve for using those unique data to build new models is very attractive and can enable us to create something very unique. But again, it’s very hard for the conventional, largest companies in the world to compete with. So what does this mean? for Norway or for another small country for that sake. I think you know one key learning you need to stay close to the problem. Of course in our case the problem is industry, asset intensive industries, which you can argue it’s 30-40% of the world’s GDP but still it’s a particular problem and we have particular competence in Norway around industries, process industries etc. Again as I mentioned we have also access to data, not more text than open AI or more images than Facebook, but we have access to much more industrial data than any of them that we can then use with our competence and in our context. Then of course, so number one and two I believe Norway and Cognite in particular have pretty good control over, then of course we need access to compute. We need GPUs, we need ability to really train these models and continue to retrain them, so that’s also one key area. I heard the minister talking about buying into some large computers which is great but we need a lot more and of course to run these computers we also need energy and that’s another area where I would argue Norway is in a very unique position where we have essentially 100% access to 100% clean energy, green energy and this is something we have to nurture and in particular up north you know the energy is also very cheap, it’s cold so you don’t need as much cooling. So we have an opportunity in Norway by using our unique strengths you could say and fair advantages to build technologies that make us, can be world champions even in some of the bigger and more important areas in the world. Thank you.


Natalie Becker Aakervik: you


Ole Christopher Granmo: the settling machine approach to artificial intelligence my base The mission is to perform groundbreaking artificial intelligence research that transforms society.


Noel Hurley: The business world invests in the Settling Machine approach to AI, the alternative to deep learning. The big challenge that we see in AI is it’s computationally incredibly complex.


Daniel Dykes: That’s really what we’re looking at, right? We’re looking at something that is cheaper, it’s cheaper to train, it’s cheaper to run, up to 10,000 times less electricity used per inference per decision.


Rishad A. Shafik: Settling Machine as an algorithm has intrinsic properties based on logic which makes it really interesting in terms of developing new types of AI algorithms and applications that are by nature energy efficient. It is accurate, it is explainable, and it uses very little energy.


Ole Christopher Granmo: Now is the time to join the new AI paradigm creating breakthroughs and powerful applications. We are watching a revolution going on in real time. It’s a revolution driven by machine learning. It’s powerful algorithms that can learn to perform tasks from data in health, in legal, in public sector, everywhere. And the technology has become so powerful that you can solve almost any task with high accuracy. It’s very tempting to use this for all purposes. Thank you. Also very recently, we have seen large language models. I have been a skeptic for a very long time. I haven’t found the real use for it. But a few weeks ago, when I used DeepSeek to dissect my settle machine, I knew the game had changed. It was scarily good. So if you can live with the hallucinations, it’s truly a powerful tool. I would almost say super intelligent in some cases. However, when you scale up, it breaks down completely. So it can solve the complex task, but still very powerful technology. So we are now in an extremely exciting place in human history. But I have some concerns, which I want to talk about today. And I call these concerns betrayals. And I’m going to talk about three betrayals. The first one, betrayal one, is energy. Because one query with ChatGPPT, it’s extremely energy hungry. It is the same amount of energy as it takes to light one light bulb for 20 minutes. Furthermore, every month, ChatGPPT produces more than 260,000 carbon CO2. So that’s equal to the emission of 260 flights from New York to London. So this is… immense. It’s a huge environmental problem and it raises concerns because we are running out of energy and it’s not good for the planet. So that’s the first betrayal because we are endangering our future. The second betrayal is transparency. Because for the first time in human history we are bringing in technology to use that we do not fully understand. Who would fly a plane that the engineers didn’t understand? The deep learning models, the models that are driving chat GPT and other large language models, they are so complex that we cannot understand what’s going on inside them. And we know that they are unpredictable and they are full of biases and discrimination and so on. And still it’s taken into use. For instance in US algorithms are used to decide the length of sentences and the judges don’t understand them. And we know that studies show that these models are discriminating. For instance black people are automatically flagged as high-risk without any context. Furthermore, another example from India, they use AI to decide who’s going to get welfare. And thousands of legitimate receivers were removed by the AI because of faulty or weak algorithms. So extremely powerful technology but we have to be careful because are endangering the freedom and the rights of people by using it. And the last betrayal, betrayal three, is power. Because suddenly it’s the big tech companies that are becoming extremely powerful because they have produced this technology, they are owning it, and we have to use it. So we are in the pockets of big tech, in my opinion. And that affects everyone because kids have to learn to adapt to the algorithms, to get likes and to be accepted. Governments adapt to the technology they use, for instance for automatic policy, which and then calling it objective by using the AI, which we know is biased, which we know have all these weaknesses. So this is very gloomy, but I also have the solution. Because in Norway we have a new kind of artificial intelligence based on a completely new principle. It goes back to a hidden gem in the history of science. It’s from 1961. It’s a very elegant, extremely efficient model of learning that was invented by a Soviet mathematician Michael Settlin. And it’s kind of hidden and lost, but I saw immediately that this was what I was looking for when I invented the Settlin machine. And it had some very interesting properties. So I took that learning mechanism and then I combined it with propositional logic from philosophy because logic is understandable and that became the second machine. So it’s an efficient and new way to do machine learning and right now we are outperforming deep learning in sepsis alerting, in understanding lung disease, in understanding heart disease and in several domains and this is just the start. Deep learning got this decade, now watch this space. Thank you.


Natalie Becker Aakervik: Thank you so much. Right, thank you also to Jan Lervig for the presentation and then also to Professor Olay Christopher Granmore, professor at University of Agder and director of CAIR. So now I would like to introduce our next keynote speaker who’s also going to be delivering a presentation here. She’s a fellow at the Center for Technology Innovation at the Brookings Institute and one of the world’s most recognized voices here today at the intersection of AI, equity and global governance. Chinassa has been recognized as one of the world’s most influential people in AI by Time. Please join me in giving a warm Oslo welcome to Dr. Chinassa T. Okolo. The stage is yours.


Chinasa T. Okolo: All right, so really happy to be here today and thank you again for the opportunity to speak and so I’ll present briefly on how smaller countries, particularly those in the global majority, also known as Africa, Asia, Latin America, the Caribbean and Oceania, can really advance how they pursue AI and how to really make the most of it. So I’m going to introduce Dr. Chinassa T. Okolo who is a professor at the Center for Technology Innovation at the Brookings Institute and one of the world’s most recognized voices here today at the intersection of AI, equity and global governance. Please join me in giving a warm Oslo welcome to Dr. Chinassa T. Okolo who is a professor at the Center for Technology Innovation at the Brookings Institute and one of the world’s most renowned voices here today at the Brookings Institute. and communities. So first, we know that the global AI divide shows disproportionate impacts in these regions, whether it be from labor, climate, social, and economic risk. There’s been much work published on this by the UN and other entities. I was very fortunate to write for the International AI Safety Report that was steered by Professor Yoshua Bengio, who’s the most cited computer scientist alive. We also know that 50% of AI research is produced from the US and China. This map is from Digital Science. And also, the Stanford AI Index indicates that 80% of all VC funding for AI companies is allocated to just these two countries. Again, looking at this map and many others, we see that this also excludes many countries and regions, like Latin America, Asia, Africa, and beyond. We also know that despite these disparities in infrastructure, education capacity, and talent concentration, this marginalization is actually breeding innovation. We see that small and emerging nations aren’t relegating themselves to the sidelines in a global AI ecosystem. They’re redefining and developing new models for how AI should work for them and their respective needs. While Silicon Valley debates topics like AI alignment and also catastrophic risk, smaller nations like Estonia, Rwanda, and Singapore are reshaping AI development, research, and governance on their own terms. For example, Estonia has built an AI-powered digital government, one of the most prominent in the world. It prioritizes citizens, reduces bureaucracy, and also it advances and engages public sector engagement. Next, we see that Rwanda has led development of the first AI policy and that strategy on the African continent. And they’ve done a really great job in increasing their international engagement and cooperation through efforts like the Global AI Summit on Africa that was hosted in April of this year in Kigali and had the fortune of attending and it was a really great event. And finally, we see that Singapore has really made lots of great efforts to steer regional cooperation throughout ASEAN and beyond and have also really steered these really interesting scientific breakthroughs, particularly when it comes to building LLMs and also through these critical evaluation approaches through red teaming and benchmarking. And this is just only a few. So to end this presentation, I’ll present three pillars that can help enable global transformation, particularly for smaller countries and also those in these marginalized regions. However, this is not exhaustive and also can be applied to larger companies, countries, and institutions as well. So first, data sovereignty can be essential in helping small nations, organizations, et cetera, control the digital resources and increase independence from large tech corporations. Estonia has done a really great job in adapting this and integrating this into the digital government, particularly in redefining how they make contracts with large tech companies and also encouraging regional and local talent to help provide services that their government needs. Next, contextual innovation is really important and something that is promoted in approaches like human-centered computing and interaction more broadly. We know that AI design with local context can leverage efficient methods, for example, benchmarking evaluations and also even small models, which is something that lots of organizations and even companies are pivoting to because they notice that these models actually are more efficient and more accurate in many contexts. And again, it’s really important that we understand that these models and efforts should be integrated with indigenous values and knowledge. And finally, peer-to-peer collaboration is essential for ensuring that we can develop regional networks that bypass these traditional power hierarchies and combine resources to optimize AI development. And these resources can include computing infrastructure and even educational infrastructure by distributing different networks and also research centers as well, so countries and organizations can collaborate and ensure again that they’re creating AI that meets their needs. So thank you so much for listening and looking forward to the panel presentation later.


Natalie Becker Aakervik: Thank you for a great presentation Chinassa, wonderful insights there as well. And we’re really looking forward to diving deeply into the panel discussion with the insights that our speakers have given us today. But now we have a speaker who is going to be talking about or really focusing on AI playbook for small states and what are the main conclusions, looking at the playbook, how can Rwanda be in the forefront to shape the future for AI, and how can data sovereignty, innovation and collaboration unlock opportunity. And she is the Director General of Innovation and Emerging Technologies and she is Esther Kunda. So Esther is coming through. There we go, Esther. Thank you so much. Please, a warm round of applause, we know it’s digital, but please welcome Esther Kunda. Thank you very much. I cannot see the screen on the presentation, but if we can definitely start.


Esther Kunda: Thank you for having me, and let me first thank Shinasa for also talking about Rwanda in her previous presentation. To quickly start, when we did this AI playbook for small states, one of the key considerations, we collaborated with Singapore to work on this particular playbook, and the idea is that small states in this playbook around AI have different key takeaways, but also we have different challenges that we are tackling. If you can go to the next slide, please. So the AI playbook, the digital force, which is a form of small states, on the next slide, thank you. So the digital force was established in 1992 by Singapore, and it’s a platform of 108 small states that discuss common interests, and the digital part of it was actually introduced in October 2022 to ensure that we also continue to collaborate on that. So when we started the playbook in 2023, one of the key areas that we were looking at was to ensure that this serves as a compilation of best practices and experiences from force members on implementing AI strategies and addressing challenges that we face. As small nations, I think one of the key areas that we would all appreciate is that we don’t have the same challenges that everyone has, and what we were looking at is to really understand how small states can navigate these opportunities and the risks that AI poses, but also provide actionable guidance based on global governance, but also best practices from other member states. We were also trying to see if we can, amongst ourselves, create this learning and collaboration and peer collaboration. to address challenges, especially on data, compute resources, funding, and as well as the fact that one of the biggest key drivers for small steps is around small domestic markets, and in some instances also being landlocked countries. If you can go to the next, please. In some of the key recommendations that we came up in the playbook in itself, what we were looking at was capability for countries to build foundational AI capabilities for themselves, and this will look at human resource development. So, how do we upscale our workforce, especially in our workforce in public sector or in the existing workforce, and how do we make sure that we have the right in the existing workforce, because this is one of the key areas where when we talk about AI is going to take jobs from different demographics, this is one of the key areas that everyone talks about. And then we also look at infrastructure development, access to high performance computing and the quality of the data that is available to states, and how do we innovate around that. And lastly, sustainability concerns. I think a couple of speakers have also talked about energy, and this is also one of the key concerns that we looked at and looked at best practices towards that. In terms of the second area we looked at is promoting AI development and use, and here we looked at different areas and different best practices in countries where we, where communities are driving AI co-creation and transparent and fair use and inclusivity. Thirdly, we also looked at how we foster trusted environment, and I believe the Honorable Minister who started talked about Norway creating its own sandbox, and I think this is one of the key areas that are very important. So, interoperability. open research, knowledge exchange, and continuously promote these platforms for all of us. And lastly, I think this is also why we’re here, global partnership and corporations in terms of AI standards, AI systems, and explainability and transparency of the AI systems that we do have. So in Rwanda, how we are doing that, if we can go to the next slide, in Rwanda, what we are looking at today is, we’ve spent the last two years with a strategy that really looks at laying a groundwork for what we want to do as a country. So, first of all, we put in place a strategy and a policy that really puts Rwanda as an innovation lab and continues for it to be an innovation lab. Second, we’re trying to do assessment and work around infrastructure and ecosystem readiness. So we’ve been working very hard in ensuring that we have data that is available. Today, when you also look at connectivity and availability of affordable data, this is also something that we are working on. And recently, actually, government passed a data sharing policy that will enable us to easily share data, but also avail this data to the private sector in one way or the other, so that AI models can be able to be trained on data that is Rwandan and that serves Rwanda. Thirdly, as a country, we continue to be a truthful concept. So we’ve positioned ourselves as a country that wants to allow innovators to test in an environment that is agile, because for us, what we understand is that the technology is evolving very fast. So we have to, as policy makers, we have to work with how fast it is evolving and ensure that as we put a regulation in place, we are aligning with how it is evolving. is going. And lastly, of course, we are ensuring that we have the talent and the skills that is required. And that’s why we continue to partner with academia like Connecticut Mellon University, Africa Leadership University, and our own universities to really create the talent that we need and ensuring that in the next few years you can find AI talent within Rwanda. Lastly, if I go to the last slide, we’re also working in ensuring that data is available, as I was mentioning, and then also pouring into our innovation ecosystem and startups and also continue to make partnerships with other countries, other institutions to ensure that AI is viable and useful to every citizen in Rwanda. Thank you very much.


Natalie Becker Aakervik: Thank you so much, Esther, for those great insights and for your presentation. And now we’re going to be introducing our next two speakers. We’re very pleased to welcome Jeff Bullwinkle. He is the Deputy General Counsel for Microsoft EMEA. Jeff will offer insights into how large platforms like Microsoft are working with small markets and governments to build innovation ecosystems and how regulation and responsibility can go hand in hand. After Jeff has done his remarks, we will hear from Kojo Boyake, VP or Vice President of Public Policy for Africa, the Middle East, and Turkey in META. Kojo brings a valuable perspective on how small players and global platforms can co-create inclusive tech futures, especially in regions where connectivity and access and local innovation all intersect. But please first join me in giving a warm welcome and a round of applause to Microsoft. Jeff, the stage is yours.


Jeff Bullwinkel: Well, thank you very much, Natalie. It’s great to be here in Oslo. Welcome to everybody here in the room. Good afternoon, good morning, good afternoon, good evening to anybody who is following online. And thanks to all of you for the opportunity to offer a couple of perspectives at what I think really is a momentous point in time, a very important moment in history in technology. It is the era of AI, as has been talked about already today. But as we think about that and reflect upon what’s happening in this era of AI, it’s worth, I think, also reflecting on history of technology over the course of time. Think about the moment at which the Amul-type printing press was perfected in the mid-15th century, leading to innovation over the course of time that has really changed the course of humanity in so many positive ways. These innovations over the course of time, the steam engine, ultimately, electricity, of course, as well, the telephone, the combustion engine. Naturally, you get into the era of the PC, the intranet, mobile telephony, the smartphone, and of course, ultimately, now what really is cloud and cloud in the era of AI. These have been the building blocks, really, that have defined what is today a modern civilization. But the focus really is, at the moment, not surprisingly, on this era of artificial intelligence. Of course, we think about that and must recognize that AI is really nothing new. We’ve talked about this at least for 75 years, since Alan Turing devised the famous Turing test back in the 50s, but it really is the moment in time over the past few years, perhaps two and a half years, when I think, as Natalie said at the opening, AI has entered the boardroom. In the era of generative AI, the conversation really has changed. That’s why, as you can see, the adoption curve here changing this very dramatic way. You see things here today that really are. At this point, taken entirely for granted, the internet, the mobile phone, Facebook as a platform, Meta as a platform, Meta is here today as well. These technologies took up to many, many years to reach 100 million users, not so with ChatGPT, which really is the one you see here at the end. It’s a straight line. Practically three months only to reach 100 million users for ChatGPT, when it was first launched into the world about two and a half years ago. It’s not perhaps surprising to think about that because it is, after all, a GPT. Not as in ChatGPT, but a general purpose technology. That is a technology that has the ability to reshape, to reinvent, to improve in so many ways every aspect of the economy. Unlike a single purpose technology, which is very good at one particular thing, like a sewing machine, GPTs, like generative AI, do have the ability, again, to reshape every field of human endeavor in dramatic and exciting ways. We’re also finding, though, as we think about this moment we’re in, that there is this additional technology stack that gets created, a stack that has three fundamental layers to it. One is the infrastructure layer. Of course, you need land. You need power, as has been talked about as well today. You need advanced chips and GPUs. Of course, you need data center infrastructure, including what Microsoft and other companies like Meta are building across Europe, across the global north, across the global south as well. That is the infrastructure layer. But also you have, of course, the model layer, the foundation model layer, which includes, of course, data, the new lifeblood, as they say, the new oil of today’s economy. You have the models themselves, whether large language models or smaller language models. Ultimately, of course, you have tooling as well. You have this model layer as well. Then beyond that, above that, you have, of course, the application layer, the various things that people can do with technology that animates in different ways so many aspects of life in really very exciting ways, and ultimately, of course, end users. Now, when you think about this, you realize there is opportunity for growth, for innovation, for progress in so many ways, up and down every layer of this stack. And I think it is very helpful to think about what Minister Tong said at the beginning in her remarks, because she captured it so well in terms of the ability for a small country, a medium-sized country, a large country, for an individual entrepreneur, for a small company, for a large company, for a non-profit, for a hospital, for a school, all to benefit in remarkable ways from this technology, which is really exciting to think about. And, of course, because we are here in Norway, I’ll just have up on the slide here various things that reflect the ways in which companies involved in logistics, in financial services, in healthcare, in IT, professional services, all are doing very exciting things here in Norway with these new technologies. So that really is remarkable for us to think about in terms of, again, every different aspect of human endeavor. At the same time, though, it’s also worth reflecting on the fact that trust is key. And we are, after all, living in an era of geopolitical volatility. Trust has become an issue. Trust in technology, perhaps, has become an issue as well. And that does mean that companies like Microsoft have to make sure they recognize the responsibilities that come with the role that we occupy. And this is a global audience here in Oslo and online, to be sure. But equally, because we are here in Europe, I thought I’d spend a moment talking about how we’ve thought about our responsibilities in the European context through the announcement quite recently, about a month and a half ago, of a new set of European digital commitments that have these five different elements to them you see in the slide. The first really is a recognition of the fact that we have the opportunity, the responsibility to support a Cloud and AI ecosystem that is broad and diverse. That definitely includes the infrastructure that Microsoft itself is building as a company across the Global North and across the Global South as well. But equally, it involves our work in supporting local European providers as well, and local technology companies and other markets in which we operate around the world. We want a broad and diverse AI ecosystem on a Cloud infrastructure. The second element of our digital commitments is really focused on the need for us to be able to provide what I’ll describe as digital resilience even in an era of geopolitical volatility. This commitment has three different elements to it for us here in Europe where these concerns have become particularly pronounced over the past little while. The first is our commitment that as a company, we will in fact oversee and manage our AI data center infrastructure through boards of directors that are comprised exclusively of European nationals. That’s our number one. A second element of this commitment to resilience is making sure we are committing to our customers, to our partners, to government stakeholders, our preparedness to push back against any order from any government to either cease or suspend Cloud services. This actually has become a fairly common point in conversations that we have. Microsoft, what would you do in the event you were ordered to cease or suspend Cloud services? Through this commitment, we essentially commit, and we will do so contractually to national European governments to resist to fight back against any such order, including with litigation if that proves necessary. The third element of this commitment, however, is focused on our need to more than that. So a customer might come to us and say, Microsoft, thank you for committing to resist an order and for litigating that. What if you lose? What then? And so what we just said here essentially is that we will have a mechanism by which we can provide business continuity in the very unlikely event of that happening. And here we’ve talked about our plan to create a repository of software code sitting in Switzerland that will be overseen by third-party providers that will be able to, again, provide continuity in the event, again, of a very, very unlikely scenario such as the one people are now talking about. A third commitment we have here really is building on what has been years of focusing on the need to protect the privacy, the security, the sovereignty of data in Europe and really data around the world. In Europe, we have already taken significant steps to make sure that our customers’ data is being processed and stored within the European Union and other countries as well, including here in Norway. So that’s been a longstanding investment we’ve made over the course of time. Beyond that, though, we’re doing additional things as well to make sure that we are building in sovereign controls to our own cloud services to address what really are very natural, understandable concerns and questions people have in this moment of geopolitical volatility. And in fact, some may have seen that our CEO, Satya Nadella, was in Amsterdam just last week on Monday, and he gave a speech at that time in which he announced a new set of sovereignty-related controls that you can read about online in a blog written by Justin Althoff, focusing on our commitment to provide a sovereign public cloud, a sovereign private cloud, and also, in some cases, national partner cloud. So that really is our third focus here in terms of making sure we are always focused on the need for sovereignty. Now, cybersecurity also, of course, is top of mind. It is for us and has been for some time. It is also for everyone here, I’m sure, in the room. online, recognizing the increasingly pernicious, malicious threats and attacks in cyberspace, often from nation-state actors. We see this frequently as a company. We have the ability at Microsoft to be able to aggregate data, by the way, using AI, looking at 77 trillion signals every single day to detect how threat vectors are evolving over the course of time and how we can defend against attacks before they become problems for the communities that we serve. We also then, following our initial announcement of these commitments that we made back in April, announced a new European security program focused on making sure we’re doing even more to share threat intelligence and work with governments and other stakeholders in a way that will reduce the threat environment online. And finally, what I would say here that we’re also very focused on is the need to make sure that we are committed to openness. And here, we have a commitment to make sure we’re also doing even more to support open source software development in the context of this era of AI. We announced about a year and a half ago at the Mobile World Congress in Barcelona a set of AI access principles that really can be summarized in three words. One, again, is access. Here, the conversation is very much about making sure that everyone can have access to infrastructure needed to benefit from AI in the way that everyone needs to benefit from AI. So access is number one. Fairness is number two. Making sure that once we are giving access to people to use our infrastructure, we’re treating them fairly and doing so in the context of interoperable open standards as well. And finally, there’s an element there of responsibility. Making sure, again, that we as a company are rising to the challenge of responsibility that comes with the role that we occupy, including in relation to developing our own set of principles around responsible and ethical AI, but ultimately making sure we’re being adherent and compliant with laws that governments enact around the world. So I’ll pause there and look forward to the conversation. in the panel, and with that, invite Kojo to follow me. Thank you.


Kojo Boake: Thank you. Hi, everyone. As some people have mentioned, my name is Kojo Bwachi, I’m the Vice President of Public Policy for Africa, the Middle East, and Turkey here with META. It’s extremely hard to follow these speakers. I thought Dr. or Professor Chanasa’s presentation was fantastic, so I’m going to try my very, very best. Be gentle with me. I have to admit also that I was thrown by the question posed to all the panelists. What do they mean by small states, I thought, in part because I’m mindful that the region I look after, Africa, the Middle East, and Turkey, is full of what some people might deem small states, but they punch well above their weight. The United Arab Emirates had the first AI minister friend, Minister al-Ulema, in 2017, and I’m told people laughed when they said they appointed an AI minister. People have seen what KSA are doing, and from my unique vantage point, I’ve seen all the work that’s being done in places like Nigeria, Ethiopia, and South Africa on AI. So I have a small bias here. I’ll probably be speaking more to small companies and startups than I will to small states. How do we as a company, Meta, think about this era of AI? Our view is that we need to level the playing field, that no one company or government can own the future and the promise of AI, and we attempt to do that by open sourcing our models. Since 2023, we’ve launched Lama models, and now on Lama 4, that have been downloaded one billion times, more than that now, and we believe that the unique advantages and differences between closed models and open models shouldn’t be seen as binary. We know some are more open than others. But the unique differences, most notably things like transparency and the fact that you have access to the weights and can fine-tune as you wish, create advantages that are good for the world, for meta, yes, but for good for many of the small startups and small states that wish to use them and are using them. The advantage of lower compute costs, the advantages of being able to fine-tune as you would to meet your local purpose, national purpose, commercial purpose is amazing. The fact that you can actually see under the hood of how these models are created and as we think about the risks of AI, the fact that we can learn from other people’s attempts to get behind the back of it and use it in uneven means but also to share their learnings in respect of cyber security. I said I would have a bias towards some of the small players that are using open AI and certainly LLAMA to meet national goals and increasingly continental ones. In education and in public health we’ve seen ourselves partner with the Africa Union Development Agency to create Akili AI and in part this was because we were told as a company across the Africa region that small to medium businesses that characterize the region didn’t understand how they might scale or grow or work in other countries, how they might take advantage of the new Africa continental trade agreement and work in Ghana and Nigeria or Kenya and Estuani. Enabling this to happen through an app that they can access information on has proved critically important already and we hope to grow this with more governments. I’m also mindful that Fundimate created as an educational app that now reaches more than 3 million students enabling many to go from primary school or lower school to junior school, upper school and on to university. has proved incredibly successful using LLAMA and the fact that we open-sourced it has been a key driver in that incredible development. Digital Green, again, an SMS service backed up by LLAMA AI is helping farmers across Kenya and other parts of East Africa increase yields and increase outcomes. And Jacaranda Health, cited by many as a stunning example of open-source use and traditional technologies, is helping mothers across Kenya in Swahili and now across Ghana with the Ghanian National Health Service and I’m sure other countries as it grows is helping to create much, much safer outcomes in terms of maternal health. A quick video from Fundamate. I always felt it was better if someone else speaks to some of the advantages rather than I, if it plays. I’m hoping tech might be able to help. Is there someone from tech who can help with my amazing video? Sorry, you’re going to have to miss that one. I’m telling you, it’s a blockbuster. That’s Fundamate explaining how they’ve used open AI, not only to meet the needs of students, as I mentioned, students in junior school, students who want to go to university, and the fact that they’ve been able to scale. And this idea of scaling is super, super important, as you can appreciate. I’ll take a bit more time to quickly say that much of this is done through our investments in a holistic way. Obviously, the billions we spend on infrastructure and developing models is critically important. You’ll hear that from many of the big players. But also, stimulating through the Lama Impact Grant, which has enabled startups from around the world receive thousands of applications launched in 2023 and enable startups from around the world to get onto Lama, use Lama, and to grow their businesses. But also, from things that my team in the African, Middle East, and Turkey region have developed. And if you’re quick enough, you can apply for the Lama Impact Accelerator Program, which will see us have mentorship and skills development for organizations, small organizations that wish to use Lama and open source AI to grow their businesses and accelerate their efforts to meet some of the national and local challenges that they face. Of course, this is my 19th IGF. I’m surprised. None of you say, you meant to say you don’t look old enough to have done 19 IGFs. I didn’t hear that. But this is my 19th IGF. I know a lot is being decided this year on the IGF. And I’m mindful that there are not just me, but a number of staff from Meta here who are here to engage and to collaborate and to build partnership. I’m also mindful that this era of AI, the promise that AI holds, as well as the risks that many of us are concerned about and negating those risks, will only come about if we collaborate and if we build the multi-stakeholder partnerships. I’m here till Thursday, as are many of the team here from Meta. We very much look forward to engaging with you, and I look forward to the panel. Thanks ever so much. Appreciate your time. So we hope you enjoyed these really exciting presentations from our esteemed speakers who’ve once again traveled from far and wide to be here with us today and to give their presentations and their insights.


Natalie Becker Aakervik: Now we are again going to take a deeper dive into what they’ve touched upon during their exciting presentations and we’re going to invite them back on stage for a panel discussion. So lots of new insights to work with here, setting the foundations to explore it more deeply. I would like to invite back on stage Chinasa Teokolo, John Lerwick, Jeff Bullwinkle, Ole Christopher Granmore and Koyo Boyake. Hello, I have to ask you, what on earth is going on here? So you see the role that technology does play in our everyday lives. Norway, of course, is known for its salmon. You would know that from all parts of the world and recognized for that globally. And of course, technology and innovation plays a large part in making that a sustainable industry. So we hope that you enjoyed that video as well, where technology and AI is helping to save the Atlantic salmon. Now, as we have our esteemed speakers and presenters here on stage, we’re going to dive right into the panel discussion. And I would like to start with a question to you, Chinasa. What opportunities do you see for smaller nations and underrepresented regions to really lead in ethical and inclusive AI development?


Chinasa T. Okolo: Great question. And thank you. So many opportunities. I would say for me, something that I mentioned in the presentation, you know, thinking about smaller models. And I think, again, because of the benefits that they hold, particularly when it comes to domains or regions where there are data deserts, I think that can help kind of solve the gap a little bit. And some of the issues that we see currently in terms of current approaches to AI development. And then also, I think just in general, many opportunities to really focus on these contextualized approaches and not really trying to build these general AI models again, which I don’t find or seem to see most beneficial for many contexts. And then I would say finally, again, in terms of leveraging smaller models, also taking advantage of some other approaches like model quantization, edge computing, et cetera, which can really help provide many more opportunities, not only for these rural areas or regions in these. you know, global majority communities, but also in the US, you know, where I’m based, we do have rural communities, and also like more marginalized contexts. And I think these approaches pioneered by smaller countries can actually be more beneficial across the global north, quote unquote, and global south, more equally as well.


Natalie Becker Aakervik: Janessa, thank you so much for your kind feedback on that question. Jon, over to you. From a startup perspective, how can small tech companies compete or collaborate with hyperscalers to create a unique value? We have one here, of course. I think the obvious part of it is, of course, that you have to focus on something particular and be really good at it.


John M Lervik: That’s, let’s say, the easier part. And of course, again, as I talked about, we in Cognite have focused on asset-intensive industries. But the other part of it, I think, is a little bit more particular, maybe. You also need to focus on a problem that is sufficiently big that he cares. Because in most cases, they are not focused, they will be just focused on their own things. So the problem we focus on needs to be sufficiently big. So Microsoft, or whether it’s Amazon, Google, or others, or Metafore, let’s say, also care about it. So you get some, also some good competitive tension, which is, I think, exactly what we have in Microsoft. It’s a fantastic partnership, but also a little bit tension now and then, where they see that we do things that they would like to do, and vice versa. I think that’s the recipe for success.


Natalie Becker Aakervik: Thank you so much for that answer, John. And then, Jeff, how can large companies, tech companies like Microsoft, as John nudged you earlier on, support innovation ecosystems in small states while ensuring fair competition and responsible AI development?


Jeff Bullwinkel: Well, I pick up on the point, I think that John made so well, which is that larger companies, despite that question of scale, in fact, ultimately are platform companies. Microsoft is now and really always has been, first and foremost, a platform technology company. And so we do have a lot of work we’ve done, of course, at the infrastructure layer with data center capacity we’ve built here across Europe, indeed in Africa, across the Americas and Asia as well. And at the infrastructure layer, on top of which you have the model layer and then the application layer. And we’re just very excited about the amount of innovation you’re seeing up and down that stack. And so certainly as a company, one thing that we are clearly focused on trying to do, as I mentioned earlier, is to make sure that there is that broad access that we can provide and that we operate in a way that allows for openness and operability across systems as well. So you have these small, exciting companies that are building on our stack and achieving great success, whether in small states or large states. And indeed, you see this across Africa, which has been talked about a bit today, and I’ve had the privilege of spending some time in Africa over the past year, in Kenya and Tanzania, Rwanda, Egypt. That was just two weeks ago, actually, in Nigeria. And the amount of excitement you see across these countries and the innovation happening in these countries with highly localized applications or models is pretty exciting to see.


Natalie Becker Aakervik: Thank you so much. Thank you so much for your response to that, Jeff. And then, like Christopher, massive AI models demand massive resources. So how can small states, for example, like Norway, leverage energy-efficient AI, like the Settlin model, or the Settlin machine, rather, to compete without relying on big tech’s infrastructure?


Ole Christopher Granmo: So my vision is to build completely sovereign technology, and that involves building things from scratch. And we have two very exciting projects with the Supreme Court of Norway and the Parliament, where we’re going to build a fully Settlin machine stack, and it will solve the black box problems in the critical areas. in society. So by making flagship projects that can inspire others and show that it’s possible, that’s my main strategy. Thank you so much. Now, coming to you Kojo, what are your thoughts


Kojo Boake: on what opportunities do you see for smaller nations, underrepresented regions to lead in ethical and inclusive AI developments? I think I spoke to some of it. I wanted to say a quick shout because I think you asked a great question about small companies and what they seek to do with big players. And I think the answer from my learned friend to the right was to create things that big players are interested in and therefore sparked by competition. I want to give a shout out to those small players that aren’t interested in that. They’re actually interested in resolving, making viable businesses or resolving local issues and contextual issues that may never interest Meta, Microsoft, ChatGPT or whatever else at this point in time, but are extremely interesting to their locality or their nation as a business or as a solution provider. So I just want to kind of give a shout out. It may be very different to Norwegian players than it might be to a player from Djibouti or Mauritania or Ghana at times as well. In terms of what we can do to stimulate or to answer your question, I think hopefully I did a reasonable job of outlining how I think Meta as a company and others who believe in the use of open source, Jeff has spoken about the applications layer and people building on that piece, how we’re enabling small players and states by providing this openly. We’re investing 65 billion this year in infrastructure. As I hope my slide made a good point of doing it, it means that the cost of compute, which is obviously the debilitating barrier that many face, isn’t there. We’re making our weights available so that people can create solutions using our models. We’re enabling people to fine-tune, but at the same time we’re also making telling investments as well. The Lama Impacts grant, which was launched by the company in 2023, saw thousands of applications, two from our region that I mentioned. The team is continuing to be invest through programmatic efforts to work with small companies and, increasingly in the future, governments. So if you’re in the room and you’re interested in using Lama to solve your national problems, come and see us. They can tell any investments to do that as well. So I hope our approach, this idea that we can level the playing field by making massive investments on behalf of the company to provide open source AI is really what’s key there. Thank you so much for those


Natalie Becker Aakervik: insights, Koyo, and for the clarity. Then also, in terms of, let’s say, meta, we’ll come back to that question. I wanted to ask you, like Christopher again, Norway has renewables and you’re energy-sipping AI, right? How do we turn this combo into a global


Ole Christopher Granmo: blueprint, okay, for equitable AI growth, would you say? Yes, great question, and hardware is a key component here. And all the hardware today from NVIDIA and others is rigged for deep learning, matrix multiplications, but we have this pioneering work going on in that University of Newcastle. They build settled machine hardware. And Edge, like you said, extremely promising and measurements. And to really build up green technology, we have to create an alternative to the NVIDIA technology, for instance, from the bottom up. So if you can manage to do that, that would be like a big breakthrough in the energy area, yes. Thank you so much for answering


Natalie Becker Aakervik: that question. Chinansa, I want to pose a question to you as well. How do you see these countries and regions potentially avoiding the challenges experienced by larger countries and


Chinasa T. Okolo: companies in scaling AI development? Yeah, great question. I think it’s a bit tough to say because we, again, do see disproportionate impacts occur in these smaller countries that are really just trying to have a foot in the AI race. I don’t like to use that term, but more broadly. And so I would say really it’s just that, again, really focusing on these contextualized models, and then also understanding how AI can benefit different sectors within their respective countries or regions. Again, AI doesn’t need to be and should not be adopted for every little single thing. In many cases, these basic general algorithms can work much better than AI-optimized ones or just straight AI models in general. And then also, I would say, again, it’s just understanding that there’s the different downstream impacts, whether it relates to labor, which we’ve seen these disproportionate impacts in Latin America, East Africa, particularly in Kenya, and also throughout Southeast Asia, and trying to shift away from these extractive models to more so community-centered models. Again, that center and value these indigenous frameworks that understand community, and I would say value building and et cetera, et cetera.


Natalie Becker Aakervik: Thank you so much for that. Do you want to add anything in terms of, let’s say, ethical concerns differing between smaller nations and larger ones as it pertains to AI research and development?


Chinasa T. Okolo: Yeah, and so something I mentioned a lot is that because when we consider the computer science, fairness literature, I’m an academic by training, we see that a lot of these issues are focused on, let’s say, Western concepts. And so when we consider things like race, which isn’t relevant in many African countries, aside from South Africa, and also throughout global majority countries, I think that this also provides a limited understanding of how AI models can exacerbate bias in these respective settings. And so there’s a lot of interesting work emerging on caste, particularly within the South Asian context. excuse me, which I think can really provide interesting insights into how we can ensure that these models don’t discriminate on this respective social identity aspect, along with other things around gender, tribal affiliation, and the intersections, which is something that’s really important because these societies are so diverse. And so this is why I’m really in favor of these countries. As you consider investing in AI development or forthright, you also have to bolster your respective academic ecosystem to support the socio-technical research that can really understand all these dimensions of AI development.


Natalie Becker Aakervik: Thank you, Chinansa. And now talking about policy and framework, Jeff, over to you. How should smaller nations and underrepresented regions adapt their governance frameworks to meet their local contexts? Well, it’s interesting to see how the global conversation about AI regulation is developing.


Jeff Bullwinkel: I would say, for starters, that as a company, we certainly recognized before the AI Act in Europe was even part of the conversation, our own responsibility to make sure that we’re developing and deploying solutions that are adherent to a set of clear principles that equate to responsible AI. Things like fairness, of course, transparency, accountability, safety, security, reliability, these sorts of things for us are paramount in what we do and how we do it. Equally, we’re just one company in one sector, and it’s ultimately up to governments to tell us what the rules are. And so there has been a lot of discussion globally that seems to be leading towards something of a consensus in this area. A group of seven countries a couple of years ago in the so-called Hiroshima process during the Japanese presidency developed some really good ideas in this respect that were then built on during the Italian presidency and now Canada as well. That’s helping to drive also a bit of a global conversation. The OECD, the UN itself more broadly, has been involved in a way that is, I think, very helpful in getting us closer to what would be sort of a global cohesive approach to AI. regulation that is based upon a risk framework that will create the right guardrails, but ultimately be pragmatic and allow for AI adoption. And this is something again, as I’ve had the benefit of meeting with policymakers across countries in Africa, for instance, you see what is a strong interest in what’s happening in Europe. Is that the right model or not? Do we want to make sure there’s a model that’s going to create the right rules, again the right safety frameworks, but also not hinder adoption? And one comment earlier was made, I think by Chinasa, in relation to what’s happening in Singapore, where the government has taken, in fact, a fairly light-touch approach relative to some countries in Europe, which might indeed become what you see happening elsewhere in the world too, so people don’t really hinder diffusion of AI, which is so critical. Thank you so much for that input, Geoff. And now, John, over to you. I may


Natalie Becker Aakervik: combine two questions, and you can speak to the parts of them that you would like to. Opportunities, which of them do you see for smaller nations and underrepresented regions to lead an ethical inclusive AI development? And then also the question is, what constraints should these countries be aware of as they aim to increase their participation in the global AI ecosystem? You want to share a reflection? Good questions. I think also as a follow-up to


John M Lervik: what you just said, I think I would say to generalize a little bit, here in Europe, we are starting with the cart in front of the horse in many ways. We started to talk about ethical use and privacy and stuff like that, and it’s a fact that our friend to the left would never have been there if they started with privacy. You know, Facebook is not a privacy company. They basically create a value. So, you know, I think about it like doing things right versus doing the right thing. So, we need to start with understanding how do we create value from AI? This is also what Microsoft did when they invented Azure and all these things, right? How do we create value, not how do you support, you know, privacy, if you will. So, I think this is super important. Also, you know, to comment about Singapore. We need to focus on the value and then of course we need the guardrails but not opposite because then we will never get to the value. Secondly, I think also referring to the comment from my friend here in Meta which I agree to, of course there’s tons of value to be had in small countries like Norway by sitting on the shoulders of the giants, the two of you. We as a nation we need to leverage that and improve the efficiency of the Norwegian government, of companies, all those things. But I think also we need to have, my last point is, we need to aspire beyond that as well. We cannot just be a country which leverages other people’s IP. So that’s why I also, of course we are lucky in Norway, we have a lot of energy, both green and brown if you will. We export all the brown one or all the gases more or less to Europe. But we also need to take those unfair advantages, industry, energy, and convert that into our own value IP as well in the future where we can also export. Absolutely. And not just sit on the shoulders of Microsoft and Meta which we are very happy to do but we


Kojo Boake: want to do more. Absolutely. Thank you so much. Just to make that super clear, the only thing I


Natalie Becker Aakervik: was trying to bring was balance. I don’t want to fly BA82 or 74 back to Ghana or Nigeria and be lambasted for saying we only want to solve local problems. There are obviously companies that want to go much broader and compete with us and we welcome that competition. But I did want to flag because it’s missing from this particular panel that there are small companies as well. Can I just


Kojo Boake: quickly add a couple of things? Please because you were next. I wanted to ask you, you had a


Natalie Becker Aakervik: choice of a question. How is Meta prioritizing local capacity building research and development when building open source models for the global AI ecosystem? However, I see that you want to respond. I think that would, if I answered that question I’d be at a


Kojo Boake: risk of repeating. Okay, so. Which helps. Please go ahead and respond to some of the points made by Jeff and my friend to the right about how we ensure we don’t have a cookie cutter approach. I think he was, Jeff was extremely diplomatic about some of the problems. And my friend was about some of the problems Europe has faced by what Mr. Draghi calls overregulation, whether that be in respect of GDPR or, or AI and the threat of AI. And we saw very recently that huge players, and I suspect small ones, had seen so much uncertainty by that form of regulation that they held off launching some of the products that would be so valuable. So, for example, Meta delayed the launch of Meta AI on WhatsApp and Facebook and whatever until it had more clarity. So, I think when I travel around and I speak to regulators and heads of state and ministers, whether that be in the Middle East, Africa, Turkey, Azerbaijan, they’re very mindful that they need, they don’t want a cookie cutter approach. So, that’s really, really important. The other piece, and I think this is what the IGF lends itself to and why I’m always so eager to come here, is that to really tackle those ethical problems and challenges and create the value that we think AI can have or believe it can have, we need to have multi-stakeholder conversations like this. Impactful ones, you have the kind of ones that don’t go anywhere, but the super impactful ones need to involve the big players, the CSOs, the medium-sized companies that want to be big players, and the small-sized companies just want to operate in their region and solve their issues, and Dr. Okolo, the academics and everybody else that needs to get involved as well, and I think that’s really, really important. I just want to stress that point. Thank you so much, and with five minutes left, I’m going to give you each 30 to 60


Natalie Becker Aakervik: seconds for last thoughts, parting words to leave the audience with, if you would like to. Where shall I start? Any takers? Okay, so, does anybody want to touch on the opportunity? Opportunities, also frameworks. I see that we’ve covered a lot of ground here, actually. Everybody’s been really good with time. Okay, 30 seconds. No, but I think my perspective is that AI is changing everything and we need to lean in, whether it’s from global companies like Microsoft or nations like Norway or industrial companies and there’s no time to lose. You know, this is happening. Thank you. Jeff.


Jeff Bullwinkel: I might build on John’s comment by saying that I’m reading a book currently by a professor called Jeffrey Ding in Washington, D.C. called Technology and the Rise of Great Powers. And his premise in the book fundamentally is that it may not be so much about where a particular technology originated, where it was invented for the very first time, but rather the degree to which a country is successful in adopting it, integrating it across every aspect of society and leading to this widespread diffusion. That’s what you hear people wanting to do and talking about across the world, whether the global north or the global south. It’s up to us as companies to provide for that, up to governments to create clarity in relation to the regulatory environment and we hope a level of pragmatism for sure. And also up to everyone to work together in making sure you have also the right level of skills to make sure people can actually embrace these technologies in the way that they want to.


Natalie Becker Aakervik: Thank you, Jeff. Other Christopher, anything you’d like to add to the conversation? So I will add a critical point and that is the essence.


Ole Christopher Granmo: Today we don’t fully understand the AI. If we don’t understand the AI, the AI controls us. We have to turn it around. We have to fully understand the AI so they become a tool for us so that we are in control.


Natalie Becker Aakervik: That is essential. Yes. Thank you for that. Chinasa.


Chinasa T. Okolo: I didn’t get to speak much on governance, which is my focus as a fellow at Brookings. But again, I think there are also many opportunities not just to solely innovate in the actual development of AI, but really understanding how it can and should be governed, particularly for smaller nations. Just as we shouldn’t rely on these big tech companies to be the standard of AI development, we also should not rely on these bigger regional blocks. or countries to also be the model for AI governance as well. And so I think there are many opportunities to innovate in that sector as well.


Natalie Becker Aakervik: Thank you so much. Kodwo, do you want the last word?


Kojo Boake: Not much to add. It’s one of those panels where everybody’s almost in complete agreement about the promises that AI hold and the fact that we need to create policy frameworks and commercial ones, opportunities and stuff that enable us to seize those promises. Even as I understand it, Tom, those who think those promises may come from a different technology. We’re all in agreement on that piece. And I think what that means for me is ultimately what we just discussed, that we don’t want to get in the way of seizing those opportunities. And as my own bias, I’ve been doing policy and regulation for 22 years now, 23, going 23. Again, no one says you don’t look old enough, so it shows I do. We just don’t want that to get in the way. And I think that’s what’s most important at this point in time. That’s why I’m so thankful to have a forum like this, the Internet Governance Forum, and to be sitting amongst such learned people as I am. And I hope to find solutions to whatever concerns, fears, challenges may get in the way of us seizing that promise.


Natalie Becker Aakervik: Kodwo, thank you so much. Thank you, Ander Christopher. Thank you, Jeff. Thank you, John. Thank you, Chinasa. We really appreciate your input. A big round of applause for our wonderful panel, ladies and gentlemen. Thank you so much for this great conversation. Before you leave the stage, we’re going to ask you to please stand here for a group photo. Thank you so much. And I’ll make some announcements as to what is happening in the rest of the day. But thank you. I know a photographer is in the house, so we’re going to have a group photo. OK. There we go. We have a number of photographers. Right. And then, ladies and gentlemen, we invite you back to our conference hall for the rest of the week. Sessions presented by IGF host country, Norway. meet us right back here for the rest of the week and very engaging conversations as you have seen. We’re also invited to explore, thank you so much, a rich and diverse program of sessions covering a wide spectrum of crucial topics from AI and sustainability. Don’t forget to visit the open village just outside the hall and all, for everything else, the panels, the workshops, the networking opportunities, please check out the IGF 2025 app for the latest updates. On behalf of the organizing team and our hosts here in Norway, we wish you a rewarding and inspiring and thought-provoking week of dialogue and insight and collaboration, continuing to build digital governance together. Thank you so much. Thank you. ♪


K

Karianne Tung

Speech speed

123 words per minute

Speech length

1036 words

Speech time

504 seconds

Small states can become global leaders in digitalization and tech regulation through long-term national strategies that prioritize innovation, citizen trust and smart governance

Explanation

Minister Tung argues that despite limited resources, many small states are already global leaders in digitalization, cybersecurity and tech regulations. These achievements stem from deliberate long-term national strategies rather than being accidental.


Evidence

Norway’s goal to become the most digitalized country in the world by 2030, allocation of 1.3 billion Norwegian kroners to AI research, establishment of six research centers, and over 350 Norwegian AI tools and companies described in a recent report


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Development | Legal and regulatory


Agreed with

– John M Lervik
– Chinasa T. Okolo
– Esther Kunda
– Natalie Becker Aakervik

Agreed on

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints


AI must serve the public good rather than become a playground for the powerful, with small players often well-positioned to drive innovation with purpose

Explanation

Minister Tung emphasizes that AI should not be dominated by powerful entities but should serve broader public interests. She argues that small players, including labs, startups, and public agencies, are particularly well-positioned to drive meaningful innovation.


Evidence

Many groundbreaking and impactful AI innovations come from small labs, agile startups and public agencies, though some receive support from big tech


Major discussion point

Trust, Transparency and Responsible AI Development


Topics

Human rights | Legal and regulatory


Agreed with

– Jeff Bullwinkel
– Kojo Boake
– Chinasa T. Okolo
– Natalie Becker Aakervik

Agreed on

Collaboration and partnerships are essential for AI development and governance


J

John M Lervik

Speech speed

167 words per minute

Speech length

1458 words

Speech time

523 seconds

Small players should focus on particular problems and ensure they’re sufficiently big that large companies also care about them to create competitive tension

Explanation

Lervik argues that startups need to focus on specific, substantial problems that are large enough to attract attention from major tech companies. This creates beneficial competitive tension and partnership opportunities.


Evidence

Cognite’s focus on asset-intensive industries and their partnership with Microsoft, which creates both collaboration and competitive tension


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Economic | Development


Agreed with

– Karianne Tung
– Chinasa T. Okolo
– Esther Kunda
– Natalie Becker Aakervik

Agreed on

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints


Small companies can leverage unique data access in specific domains like industrial data to compete with giants who have more general consumer data

Explanation

Lervik explains that while small companies cannot compete with the scale of large tech companies in general data, they can excel by having superior access to specialized data in particular sectors. This allows them to create foundational models for specific industries.


Evidence

Cognite has three orders of magnitude more industrial data than NVIDIA and other cloud providers, enabling them to create foundational models for industrial data


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Economic | Infrastructure


Norway’s combination of 100% clean energy and cold climate creates unique advantages for energy-efficient AI development

Explanation

Lervig argues that Norway has distinctive advantages for AI development through its access to 100% clean, cheap energy and cold climate that reduces cooling needs. These natural advantages should be leveraged to build world-class AI technologies.


Evidence

Norway has essentially 100% access to clean energy, particularly cheap energy up north, and cold temperatures that reduce cooling requirements for data centers


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Infrastructure | Development


Agreed with

– Daniel Dykes
– Ole Christopher Granmo
– Noel Hurley
– Rishad A. Shafik

Agreed on

Energy efficiency in AI is a critical concern requiring alternative approaches


AI regulation should focus on creating value first rather than starting with privacy and ethical constraints, as value creation enables proper governance

Explanation

Lervig argues that Europe has approached AI regulation backwards by prioritizing privacy and ethics before establishing value creation. He suggests focusing first on how to create value from AI, then adding appropriate guardrails.


Evidence

Facebook/Meta would never have succeeded if they started with privacy concerns, as they fundamentally create value first. Microsoft similarly focused on creating value with Azure before adding privacy protections


Major discussion point

AI Governance and Regulatory Frameworks


Topics

Legal and regulatory | Economic


Agreed with

– Jeff Bullwinkel
– Kojo Boake
– Chinasa T. Okolo

Agreed on

AI governance should be pragmatic and avoid hindering innovation while ensuring responsible development


Disagreed with

– Jeff Bullwinkel

Disagreed on

Approach to AI regulation – value creation first vs. ethics first


D

Daniel Dykes

Speech speed

149 words per minute

Speech length

33 words

Speech time

13 seconds

The Tsetlin Machine offers an energy-efficient alternative to deep learning, using up to 10,000 times less electricity per inference while maintaining accuracy and explainability

Explanation

Dykes presents the Tsetlin Machine as a revolutionary alternative to current AI approaches that is significantly more energy efficient. This technology offers comparable accuracy while being much cheaper to train and operate.


Evidence

The Tsetlin Machine uses up to 10,000 times less electricity per inference per decision compared to traditional deep learning approaches


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Infrastructure | Development


Agreed with

– John M Lervik
– Ole Christopher Granmo
– Noel Hurley
– Rishad A. Shafik

Agreed on

Energy efficiency in AI is a critical concern requiring alternative approaches


O

Ole Christopher Granmo

Speech speed

108 words per minute

Speech length

1027 words

Speech time

565 seconds

Current AI technology like ChatGPT is extremely energy hungry, with one query consuming the same energy as lighting a bulb for 20 minutes

Explanation

Granmo highlights the massive energy consumption of current AI systems as a major environmental concern. He presents specific data showing the enormous carbon footprint of popular AI services.


Evidence

One ChatGPT query uses the same energy as lighting a light bulb for 20 minutes, and ChatGPT produces more than 260,000 tons of CO2 monthly, equivalent to 260 flights from New York to London


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Development | Infrastructure


Agreed with

– John M Lervik
– Daniel Dykes
– Noel Hurley
– Rishad A. Shafik

Agreed on

Energy efficiency in AI is a critical concern requiring alternative approaches


Alternative hardware designed specifically for Tsetlin machines could provide a breakthrough in green AI technology

Explanation

Granmo argues that current hardware from companies like NVIDIA is optimized for deep learning, but new hardware designed specifically for Tsetlin machines could create a fundamental breakthrough in energy-efficient AI.


Evidence

University of Newcastle is building Tsetlin machine hardware that shows extremely promising measurements for edge computing applications


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Infrastructure | Development


Current AI systems are black boxes that we don’t fully understand, creating risks when deployed in critical areas like criminal justice and healthcare

Explanation

Granmo warns about the dangers of deploying AI systems that are too complex to understand fully. He argues this creates serious risks of bias and discrimination in critical applications.


Evidence

US algorithms used to decide sentence lengths discriminate against Black people who are automatically flagged as high-risk without context; AI systems in India removed thousands of legitimate welfare recipients due to faulty algorithms


Major discussion point

Trust, Transparency and Responsible AI Development


Topics

Human rights | Legal and regulatory


Understanding and controlling AI technology is essential – if we don’t understand AI, then AI controls us rather than serving as our tool

Explanation

Granmo emphasizes the fundamental importance of maintaining human control over AI systems through understanding. He argues that incomprehensible AI systems reverse the proper relationship between humans and technology.


Major discussion point

Trust, Transparency and Responsible AI Development


Topics

Human rights | Legal and regulatory


Disagreed with

– Kojo Boake

Disagreed on

Technology transparency and control philosophy


C

Chinasa T. Okolo

Speech speed

152 words per minute

Speech length

1516 words

Speech time

598 seconds

Smaller nations can lead by focusing on contextualized AI approaches rather than trying to build general AI models

Explanation

Okolo argues that smaller countries should avoid trying to compete in building general AI models and instead focus on developing AI solutions tailored to their specific contexts and needs. This approach can be more beneficial and achievable.


Evidence

Smaller models and approaches like model quantization and edge computing can benefit rural areas and marginalized contexts in both global majority and global north communities


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Development | Infrastructure


Agreed with

– Karianne Tung
– John M Lervik
– Esther Kunda
– Natalie Becker Aakervik

Agreed on

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints


The global AI divide shows disproportionate impacts on regions like Africa, Asia, and Latin America despite these areas breeding innovation through marginalization

Explanation

Okolo describes how certain regions face disproportionate negative impacts from AI development while being excluded from its benefits. However, she notes that this marginalization is actually spurring innovative approaches to AI development.


Evidence

50% of AI research comes from US and China, 80% of VC funding goes to these two countries, yet marginalized regions are developing new models for AI that work for their needs


Major discussion point

Global AI Equity and Inclusive Development


Topics

Development | Human rights


Small and emerging nations are redefining AI development on their own terms rather than relegating themselves to the sidelines

Explanation

Okolo argues that despite infrastructure and resource disparities, smaller nations are not accepting a passive role in AI development. Instead, they are actively creating new approaches that work for their specific contexts and needs.


Evidence

Estonia built an AI-powered digital government, Rwanda developed the first AI policy on the African continent, Singapore is leading regional cooperation and scientific breakthroughs in LLMs


Major discussion point

Global AI Equity and Inclusive Development


Topics

Development | Legal and regulatory


Data sovereignty, contextual innovation, and peer-to-peer collaboration can help smaller countries control digital resources and increase independence

Explanation

Okolo presents three key pillars that can enable smaller countries to transform their AI capabilities while maintaining control over their digital resources and reducing dependence on large tech corporations.


Evidence

Estonia has integrated data sovereignty into digital government and redefined contracts with large tech companies; contextual innovation leverages efficient methods and indigenous values; peer-to-peer collaboration creates regional networks that bypass traditional power hierarchies


Major discussion point

Global AI Equity and Inclusive Development


Topics

Legal and regulatory | Development


Agreed with

– Karianne Tung
– Jeff Bullwinkel
– Kojo Boake
– Natalie Becker Aakervik

Agreed on

Collaboration and partnerships are essential for AI development and governance


Countries should innovate in AI governance models rather than solely relying on bigger regional blocks or countries as standards

Explanation

Okolo argues that just as smaller countries shouldn’t rely solely on big tech companies for AI development standards, they also shouldn’t simply copy governance models from larger countries or regional blocks. Innovation in governance is equally important.


Major discussion point

AI Governance and Regulatory Frameworks


Topics

Legal and regulatory | Development


Agreed with

– John M Lervik
– Jeff Bullwinkel
– Kojo Boake

Agreed on

AI governance should be pragmatic and avoid hindering innovation while ensuring responsible development


E

Esther Kunda

Speech speed

144 words per minute

Speech length

1006 words

Speech time

416 seconds

Small states should position themselves as innovation labs and testing environments with agile regulatory frameworks

Explanation

Kunda argues that small states can leverage their agility advantage by positioning themselves as testing grounds for AI innovation. This requires regulatory frameworks that can evolve quickly alongside rapidly advancing technology.


Evidence

Rwanda has positioned itself as an innovation lab and created agile regulatory frameworks; government passed a data sharing policy to enable AI model training on Rwandan data


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Legal and regulatory | Development


Agreed with

– Karianne Tung
– John M Lervik
– Chinasa T. Okolo
– Natalie Becker Aakervik

Agreed on

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints


Rwanda has developed a comprehensive AI strategy focusing on data sharing policies, regulatory sandboxes, and partnerships with academia

Explanation

Kunda outlines Rwanda’s systematic approach to AI development, which includes policy frameworks, infrastructure development, and talent development through academic partnerships. This represents a holistic national strategy for AI adoption.


Evidence

Rwanda has an AI strategy and policy, data sharing policy, partnerships with Carnegie Mellon University and Africa Leadership University, and assessment of infrastructure and ecosystem readiness


Major discussion point

National AI Strategies and Infrastructure Development


Topics

Development | Legal and regulatory


Countries need access to high-performance computing, quality data, and skilled workforce development to build foundational AI capabilities

Explanation

Kunda identifies the key building blocks that countries need to establish before they can effectively leverage AI. She emphasizes that foundational capabilities must be developed systematically across multiple areas.


Evidence

Rwanda is working on connectivity, affordable data access, data sharing policies, partnerships with universities for talent development, and infrastructure readiness assessments


Major discussion point

National AI Strategies and Infrastructure Development


Topics

Infrastructure | Development


J

Jeff Bullwinkel

Speech speed

175 words per minute

Speech length

2861 words

Speech time

977 seconds

Large platforms should provide broad access, fair treatment, and interoperable open standards while maintaining responsibility

Explanation

Bullwinkel outlines Microsoft’s approach to supporting smaller players through their AI access principles. He emphasizes that large platforms have a responsibility to enable broad participation in AI development while maintaining ethical standards.


Evidence

Microsoft’s AI access principles focus on three areas: access to infrastructure, fairness in treatment with interoperable open standards, and responsibility in developing ethical AI principles and legal compliance


Major discussion point

Open Source AI and Platform Collaboration


Topics

Infrastructure | Legal and regulatory


Agreed with

– Karianne Tung
– Kojo Boake
– Chinasa T. Okolo
– Natalie Becker Aakervik

Agreed on

Collaboration and partnerships are essential for AI development and governance


Large tech companies must build sovereign controls, resist government orders to suspend services, and maintain data privacy and security

Explanation

Bullwinkel describes Microsoft’s commitments to digital resilience, including governance structures, resistance to government interference, and data sovereignty measures. These commitments address concerns about geopolitical volatility and trust in technology.


Evidence

Microsoft commits to European-only boards of directors for AI infrastructure, contractual commitments to resist orders to cease services, business continuity mechanisms through Swiss code repositories, and sovereign cloud options


Major discussion point

Trust, Transparency and Responsible AI Development


Topics

Legal and regulatory | Cybersecurity


Disagreed with

– John M Lervik

Disagreed on

Approach to AI regulation – value creation first vs. ethics first


Success in AI adoption may depend more on widespread diffusion and integration across society rather than where the technology originated

Explanation

Bullwinkel references research suggesting that the key to benefiting from AI may not be inventing the technology first, but rather successfully adopting and integrating it throughout society. This perspective offers hope for countries that are not AI originators.


Evidence

Reference to Jeffrey Ding’s book ‘Technology and the Rise of Great Powers’ which argues that successful adoption and diffusion matters more than original invention


Major discussion point

Global AI Equity and Inclusive Development


Topics

Development | Economic


Agreed with

– John M Lervik
– Kojo Boake
– Chinasa T. Okolo

Agreed on

AI governance should be pragmatic and avoid hindering innovation while ensuring responsible development


K

Kojo Boake

Speech speed

164 words per minute

Speech length

2185 words

Speech time

796 seconds

Open source models like Llama enable smaller players to fine-tune AI for local purposes while reducing compute costs and increasing transparency

Explanation

Boake argues that Meta’s open source approach levels the playing field by providing access to AI models that can be customized for local needs. This approach offers advantages in cost, transparency, and flexibility that are particularly beneficial for smaller players.


Evidence

Llama models have been downloaded one billion times; advantages include lower compute costs, ability to fine-tune for local purposes, transparency through access to model weights, and shared learning on cybersecurity


Major discussion point

Open Source AI and Platform Collaboration


Topics

Infrastructure | Development


Disagreed with

– Ole Christopher Granmo

Disagreed on

Technology transparency and control philosophy


Meta’s open source approach has enabled applications like educational tools reaching 3 million students and agricultural SMS services for farmers

Explanation

Boake provides concrete examples of how open source AI models are being used to create impactful applications in education, agriculture, and healthcare across Africa. These examples demonstrate the practical benefits of open source AI for development.


Evidence

Fundimate educational app reaches 3 million students; Digital Green SMS service helps farmers in Kenya increase yields; Jacaranda Health helps mothers in Kenya and Ghana with maternal health in local languages; Akili AI partnership with African Union Development Agency


Major discussion point

Open Source AI and Platform Collaboration


Topics

Development | Sociocultural


Smaller nations should avoid cookie-cutter regulatory approaches and develop frameworks suited to their local contexts rather than copying larger regions

Explanation

Boake warns against simply copying regulatory frameworks from larger jurisdictions like Europe, noting that overregulation can delay valuable AI deployments. He advocates for context-appropriate regulation that doesn’t hinder innovation.


Evidence

Meta delayed launch of Meta AI on WhatsApp and Facebook in Europe due to regulatory uncertainty; regulators and heads of state in Middle East, Africa, and Turkey are mindful of avoiding cookie-cutter approaches


Major discussion point

AI Governance and Regulatory Frameworks


Topics

Legal and regulatory | Development


Agreed with

– John M Lervik
– Jeff Bullwinkel
– Chinasa T. Okolo

Agreed on

AI governance should be pragmatic and avoid hindering innovation while ensuring responsible development


Multi-stakeholder collaboration involving big players, medium companies, small regional operators, and academics is essential for effective AI governance

Explanation

Boake emphasizes that addressing AI’s ethical challenges and realizing its value requires inclusive collaboration across all types of stakeholders. He argues that the Internet Governance Forum provides an ideal platform for such multi-stakeholder engagement.


Evidence

Need for impactful conversations involving big players, CSOs, medium-sized companies, small regional companies, academics, and other stakeholders; IGF provides platform for such collaboration


Major discussion point

AI Governance and Regulatory Frameworks


Topics

Legal and regulatory | Development


Agreed with

– Karianne Tung
– Jeff Bullwinkel
– Chinasa T. Okolo
– Natalie Becker Aakervik

Agreed on

Collaboration and partnerships are essential for AI development and governance


N

Natalie Becker Aakervik

Speech speed

148 words per minute

Speech length

2247 words

Speech time

908 seconds

Innovation doesn’t always come from size but from agility, trust, deep knowledge and smart collaborations

Explanation

Aakervik argues that while the biggest AI models require enormous resources concentrated in few major players, innovation can still emerge from smaller actors through their unique advantages. She emphasizes that small actors can leverage agility, trust-building capabilities, specialized knowledge, and strategic partnerships to compete effectively in the AI landscape.


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Development | Economic


Agreed with

– Karianne Tung
– John M Lervik
– Chinasa T. Okolo
– Esther Kunda

Agreed on

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints


Small actors can move from being small players to strategic shapers of the digital world through partnerships and collaboration

Explanation

Aakervik emphasizes that partnerships and collaboration have emerged as key themes and actionable takeaways from discussions. She argues that through the right kind of partnerships, small actors can transform from passive participants to active shapers of digital innovation that is inclusive, global, and sustainable.


Evidence

Partnerships and collaboration have come up very strongly as actionable takeaways throughout the day’s discussions


Major discussion point

Small States and Startups Leveraging AI Opportunities


Topics

Development | Economic


Agreed with

– Karianne Tung
– Jeff Bullwinkel
– Kojo Boake
– Chinasa T. Okolo

Agreed on

Collaboration and partnerships are essential for AI development and governance


Technology and AI play crucial roles in making traditional industries like salmon farming sustainable

Explanation

Aakervik highlights how Norway’s globally recognized salmon industry benefits from technology and AI integration to maintain sustainability. This demonstrates how AI can be applied to traditional sectors to solve environmental and operational challenges.


Evidence

Video showing how technology and AI is helping to save the Atlantic salmon, with Norway being globally known for its salmon industry


Major discussion point

AI Applications in Traditional Industries


Topics

Development | Infrastructure


N

Noel Hurley

Speech speed

110 words per minute

Speech length

29 words

Speech time

15 seconds

The Tsetlin Machine approach offers a computationally simpler alternative to deep learning that is cheaper to train and operate

Explanation

Hurley presents the Tsetlin Machine as a revolutionary alternative to current AI approaches that addresses the major challenge of computational complexity in AI. This technology offers significant cost advantages in both training and operational phases while maintaining effectiveness.


Evidence

The Tsetlin Machine is cheaper to train, cheaper to run, and uses up to 10,000 times less electricity per inference per decision compared to traditional approaches


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Infrastructure | Development


Agreed with

– John M Lervik
– Daniel Dykes
– Ole Christopher Granmo
– Rishad A. Shafik

Agreed on

Energy efficiency in AI is a critical concern requiring alternative approaches


R

Rishad A. Shafik

Speech speed

132 words per minute

Speech length

45 words

Speech time

20 seconds

The Tsetlin Machine algorithm has intrinsic logic-based properties that make it naturally energy efficient, accurate, and explainable

Explanation

Shafik argues that the Tsetlin Machine’s foundation in logic gives it inherent advantages over other AI approaches. These properties make it particularly suitable for developing new types of AI algorithms and applications that prioritize energy efficiency without sacrificing performance or interpretability.


Evidence

The algorithm is based on logic which makes it energy efficient, accurate, and explainable by nature


Major discussion point

Energy-Efficient and Alternative AI Technologies


Topics

Infrastructure | Development


Agreed with

– John M Lervik
– Daniel Dykes
– Ole Christopher Granmo
– Noel Hurley

Agreed on

Energy efficiency in AI is a critical concern requiring alternative approaches


Agreements

Agreement points

Small states and players can leverage unique advantages and agility to compete in AI despite resource constraints

Speakers

– Karianne Tung
– John M Lervik
– Chinasa T. Okolo
– Esther Kunda
– Natalie Becker Aakervik

Arguments

Small states can become global leaders in digitalization and tech regulation through long-term national strategies that prioritize innovation, citizen trust and smart governance


Small players should focus on particular problems and ensure they’re sufficiently big that large companies also care about them to create competitive tension


Smaller nations can lead by focusing on contextualized AI approaches rather than trying to build general AI models


Small states should position themselves as innovation labs and testing environments with agile regulatory frameworks


Innovation doesn’t always come from size but from agility, trust, deep knowledge and smart collaborations


Summary

All speakers agreed that small states and companies can compete effectively in AI by leveraging their unique advantages like agility, specialized focus, and strategic positioning rather than trying to match the scale of large players


Topics

Development | Economic


Energy efficiency in AI is a critical concern requiring alternative approaches

Speakers

– John M Lervik
– Daniel Dykes
– Ole Christopher Granmo
– Noel Hurley
– Rishad A. Shafik

Arguments

Norway’s combination of 100% clean energy and cold climate creates unique advantages for energy-efficient AI development


The Tsetlin Machine offers an energy-efficient alternative to deep learning, using up to 10,000 times less electricity per inference while maintaining accuracy and explainability


Current AI technology like ChatGPT is extremely energy hungry, with one query consuming the same energy as lighting a bulb for 20 minutes


The Tsetlin Machine approach offers a computationally simpler alternative to deep learning that is cheaper to train and operate


The Tsetlin Machine algorithm has intrinsic logic-based properties that make it naturally energy efficient, accurate, and explainable


Summary

Multiple speakers emphasized the urgent need for energy-efficient AI solutions, with several promoting the Tsetlin Machine as a viable alternative to current energy-intensive approaches


Topics

Infrastructure | Development


Collaboration and partnerships are essential for AI development and governance

Speakers

– Karianne Tung
– Jeff Bullwinkel
– Kojo Boake
– Chinasa T. Okolo
– Natalie Becker Aakervik

Arguments

AI must serve the public good rather than become a playground for the powerful, with small players often well-positioned to drive innovation with purpose


Large platforms should provide broad access, fair treatment, and interoperable open standards while maintaining responsibility


Multi-stakeholder collaboration involving big players, medium companies, small regional operators, and academics is essential for effective AI governance


Data sovereignty, contextual innovation, and peer-to-peer collaboration can help smaller countries control digital resources and increase independence


Small actors can move from being small players to strategic shapers of the digital world through partnerships and collaboration


Summary

All speakers emphasized the importance of collaborative approaches to AI development, whether through public-private partnerships, multi-stakeholder governance, or international cooperation


Topics

Development | Legal and regulatory


AI governance should be pragmatic and avoid hindering innovation while ensuring responsible development

Speakers

– John M Lervik
– Jeff Bullwinkel
– Kojo Boake
– Chinasa T. Okolo

Arguments

AI regulation should focus on creating value first rather than starting with privacy and ethical constraints, as value creation enables proper governance


Success in AI adoption may depend more on widespread diffusion and integration across society rather than where the technology originated


Smaller nations should avoid cookie-cutter regulatory approaches and develop frameworks suited to their local contexts rather than copying larger regions


Countries should innovate in AI governance models rather than solely relying on bigger regional blocks or countries as standards


Summary

Speakers agreed that AI governance should prioritize enabling innovation and value creation while being tailored to local contexts rather than copying one-size-fits-all approaches


Topics

Legal and regulatory | Development


Similar viewpoints

Both speakers expressed concerns about the risks and inequities of current AI systems, emphasizing the need for more transparent and inclusive approaches to AI development

Speakers

– Ole Christopher Granmo
– Chinasa T. Okolo

Arguments

Current AI systems are black boxes that we don’t fully understand, creating risks when deployed in critical areas like criminal justice and healthcare


The global AI divide shows disproportionate impacts on regions like Africa, Asia, and Latin America despite these areas breeding innovation through marginalization


Topics

Human rights | Legal and regulatory


Both speakers advocated for specialized, domain-specific approaches to AI rather than trying to compete in general-purpose AI development

Speakers

– John M Lervik
– Chinasa T. Okolo

Arguments

Small companies can leverage unique data access in specific domains like industrial data to compete with giants who have more general consumer data


Smaller nations can lead by focusing on contextualized AI approaches rather than trying to build general AI models


Topics

Development | Economic


Both representatives from major tech companies emphasized their commitment to enabling smaller players through open access, fair treatment, and transparent approaches

Speakers

– Jeff Bullwinkel
– Kojo Boake

Arguments

Large platforms should provide broad access, fair treatment, and interoperable open standards while maintaining responsibility


Open source models like Llama enable smaller players to fine-tune AI for local purposes while reducing compute costs and increasing transparency


Topics

Infrastructure | Development


Unexpected consensus

Tech industry representatives advocating for regulatory restraint

Speakers

– John M Lervik
– Jeff Bullwinkel
– Kojo Boake

Arguments

AI regulation should focus on creating value first rather than starting with privacy and ethical constraints, as value creation enables proper governance


Success in AI adoption may depend more on widespread diffusion and integration across society rather than where the technology originated


Smaller nations should avoid cookie-cutter regulatory approaches and develop frameworks suited to their local contexts rather than copying larger regions


Explanation

Unexpectedly, both large tech company representatives and startup leaders agreed on the need for more flexible, innovation-friendly regulatory approaches, suggesting industry-wide concern about overregulation hindering AI development


Topics

Legal and regulatory | Economic


Academic and industry alignment on alternative AI technologies

Speakers

– Ole Christopher Granmo
– Daniel Dykes
– Noel Hurley
– Rishad A. Shafik
– John M Lervik

Arguments

Current AI technology like ChatGPT is extremely energy hungry, with one query consuming the same energy as lighting a bulb for 20 minutes


The Tsetlin Machine offers an energy-efficient alternative to deep learning, using up to 10,000 times less electricity per inference while maintaining accuracy and explainability


Norway’s combination of 100% clean energy and cold climate creates unique advantages for energy-efficient AI development


Explanation

There was unexpected consensus between academic researchers promoting alternative AI technologies and industry practitioners on the urgent need for energy-efficient AI solutions, suggesting broader recognition of sustainability challenges


Topics

Infrastructure | Development


Overall assessment

Summary

The discussion revealed strong consensus on several key themes: the potential for small states and companies to compete effectively in AI through strategic focus and partnerships; the critical importance of energy-efficient AI development; the need for collaborative, multi-stakeholder approaches to AI governance; and the importance of pragmatic regulation that enables innovation while ensuring responsible development


Consensus level

High level of consensus with remarkable alignment between different stakeholder groups (government, industry, academia, civil society) on fundamental principles. This suggests a mature understanding of AI challenges and opportunities across the community, with implications for more coordinated and effective AI governance and development strategies globally


Differences

Different viewpoints

Approach to AI regulation – value creation first vs. ethics first

Speakers

– John M Lervik
– Jeff Bullwinkel

Arguments

AI regulation should focus on creating value first rather than starting with privacy and ethical constraints, as value creation enables proper governance


Large tech companies must build sovereign controls, resist government orders to suspend services, and maintain data privacy and security


Summary

Lervik argues Europe has approached AI regulation backwards by prioritizing privacy and ethics before establishing value creation, suggesting value should come first then guardrails. Bullwinkel emphasizes Microsoft’s commitment to responsible AI principles from the start, including privacy, security, and ethical frameworks as foundational elements.


Topics

Legal and regulatory | Economic


Technology transparency and control philosophy

Speakers

– Ole Christopher Granmo
– Kojo Boake

Arguments

Understanding and controlling AI technology is essential – if we don’t understand AI, then AI controls us rather than serving as our tool


Open source models like Llama enable smaller players to fine-tune AI for local purposes while reducing compute costs and increasing transparency


Summary

Granmo advocates for complete understanding and control of AI systems, warning against black box technologies. Boake promotes open source as sufficient transparency, arguing that access to model weights and fine-tuning capabilities provide adequate transparency without requiring complete understanding of internal mechanisms.


Topics

Human rights | Legal and regulatory | Infrastructure


Unexpected differences

Role of competition with large tech companies

Speakers

– John M Lervik
– Kojo Boake

Arguments

Small players should focus on particular problems and ensure they’re sufficiently big that large companies also care about them to create competitive tension


Multi-stakeholder collaboration involving big players, medium companies, small regional operators, and academics is essential for effective AI governance


Explanation

Unexpectedly, Lervik advocates for creating competitive tension with large tech companies as a strategy for small players, while Boake emphasizes collaboration and partnership. This disagreement is surprising given that both represent the startup/platform ecosystem and might be expected to have similar views on industry dynamics.


Topics

Economic | Development


Sufficiency of current AI transparency approaches

Speakers

– Ole Christopher Granmo
– Jeff Bullwinkel

Arguments

Current AI systems are black boxes that we don’t fully understand, creating risks when deployed in critical areas like criminal justice and healthcare


Large platforms should provide broad access, fair treatment, and interoperable open standards while maintaining responsibility


Explanation

Granmo fundamentally rejects current AI approaches as insufficiently transparent and dangerous, while Bullwinkel suggests that responsible AI principles and governance frameworks are adequate. This disagreement is unexpected given both speakers’ technical backgrounds and shared concern for AI safety.


Topics

Human rights | Legal and regulatory


Overall assessment

Summary

The main areas of disagreement center on regulatory philosophy (value-first vs. ethics-first), the level of transparency and control required for AI systems, and whether small players should compete with or collaborate with large tech companies. Most speakers agreed on the potential for small states and companies to succeed in AI through specialized approaches.


Disagreement level

The level of disagreement was moderate but philosophically significant. While speakers largely agreed on goals (enabling small players in AI, ensuring responsible development), they had fundamental differences on approaches and priorities. These disagreements reflect deeper tensions in the AI ecosystem between different models of development, governance, and industry structure that could significantly impact how AI develops globally.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers expressed concerns about the risks and inequities of current AI systems, emphasizing the need for more transparent and inclusive approaches to AI development

Speakers

– Ole Christopher Granmo
– Chinasa T. Okolo

Arguments

Current AI systems are black boxes that we don’t fully understand, creating risks when deployed in critical areas like criminal justice and healthcare


The global AI divide shows disproportionate impacts on regions like Africa, Asia, and Latin America despite these areas breeding innovation through marginalization


Topics

Human rights | Legal and regulatory


Both speakers advocated for specialized, domain-specific approaches to AI rather than trying to compete in general-purpose AI development

Speakers

– John M Lervik
– Chinasa T. Okolo

Arguments

Small companies can leverage unique data access in specific domains like industrial data to compete with giants who have more general consumer data


Smaller nations can lead by focusing on contextualized AI approaches rather than trying to build general AI models


Topics

Development | Economic


Both representatives from major tech companies emphasized their commitment to enabling smaller players through open access, fair treatment, and transparent approaches

Speakers

– Jeff Bullwinkel
– Kojo Boake

Arguments

Large platforms should provide broad access, fair treatment, and interoperable open standards while maintaining responsibility


Open source models like Llama enable smaller players to fine-tune AI for local purposes while reducing compute costs and increasing transparency


Topics

Infrastructure | Development


Takeaways

Key takeaways

Small states and startups can compete in AI by focusing on specific domains where they have unique data advantages and deep expertise, rather than trying to match the scale of tech giants


Energy-efficient AI alternatives like the Tsetlin Machine offer opportunities for smaller players to develop sovereign AI capabilities using significantly less computational resources


Success in AI adoption depends more on widespread integration and diffusion across society than on where the technology was originally invented


Open source AI models enable smaller players to fine-tune solutions for local contexts while reducing costs and increasing transparency


AI governance frameworks should prioritize value creation first, then add appropriate guardrails, rather than starting with restrictive regulations that may hinder adoption


Multi-stakeholder collaboration involving companies of all sizes, governments, academia, and civil society is essential for inclusive AI development


Data sovereignty, contextual innovation, and peer-to-peer collaboration can help smaller countries maintain independence from big tech dominance


Small nations can lead in AI governance innovation by developing frameworks suited to their local contexts rather than copying larger regional approaches


Trust and transparency in AI systems are critical – current black box models create risks when deployed in sensitive areas like justice and healthcare


Resolutions and action items

Norway committed to implementing EU’s AI Act with national supervisory authority and AI Norway initiative including regulatory sandboxes


Norway allocated 1.3 billion Norwegian kroners to AI research through six newly selected research centers starting operations in summer


Meta invited governments and organizations to collaborate on using Llama models for national problem-solving


Microsoft announced European digital commitments including sovereign cloud services and cybersecurity programs


Rwanda committed to continuing partnerships with academia and other countries to develop AI talent and innovation ecosystem


Participants encouraged to apply for Meta’s Llama Impact Accelerator Program for mentorship and skills development


Unresolved issues

How to balance AI regulation that ensures safety without hindering innovation and adoption, particularly for smaller countries


The challenge of developing truly explainable AI systems that can be understood and controlled rather than operating as black boxes


How to address the massive energy consumption of current AI systems and scale energy-efficient alternatives


The question of whether smaller countries should focus primarily on leveraging existing AI platforms or invest in developing sovereign AI capabilities


How to ensure equitable global AI development when 80% of VC funding goes to just the US and China


The tension between open source AI benefits and potential security/misuse risks


How to develop AI governance frameworks that are contextually appropriate rather than one-size-fits-all approaches


Suggested compromises

Small countries should both leverage existing AI platforms from tech giants AND develop their own sovereign capabilities in areas of competitive advantage


AI regulation should focus on risk-based frameworks that create appropriate guardrails while allowing pragmatic adoption and innovation


Large tech companies should provide open access and interoperability while maintaining responsibility for safety and security


AI development should combine the scale advantages of large companies with the agility and contextual knowledge of smaller players through strategic partnerships


Countries should collaborate through peer-to-peer networks and regional cooperation while maintaining data sovereignty and local control


Thought provoking comments

AI must not become a playground for the powerful, it must serve the public good. And small players are often well positioned to drive innovation with purpose.

Speaker

Karianne Tung (Norway’s Minister of Digitalization)


Reason

This comment reframes the entire AI discussion from a technical competition to a values-based imperative. It challenges the assumption that bigger is necessarily better and positions small actors as potentially more aligned with public interest rather than just market dominance.


Impact

This set the moral and strategic foundation for the entire session, establishing that the conversation wasn’t just about competing with tech giants, but about creating AI that serves broader societal needs. It influenced subsequent speakers to focus on purpose-driven innovation rather than just scale.


Today we don’t fully understand the AI. If we don’t understand the AI, the AI controls us. We have to turn it around. We have to fully understand the AI so they become a tool for us so that we are in control.

Speaker

Ole Christopher Granmo


Reason

This comment cuts to the heart of a fundamental paradox in AI development – we’re deploying technology we don’t fully comprehend. It challenges the entire premise of black-box AI systems and introduces the concept of explainable AI as not just desirable but essential for human agency.


Impact

This comment introduced a critical tension into the discussion about transparency versus performance. It shifted the conversation from ‘how can we compete’ to ‘how can we maintain control,’ adding a philosophical dimension that influenced other speakers to address the transparency and governance aspects of AI development.


We are starting with the cart in front of the horse in many ways. We started to talk about ethical use and privacy and stuff like that… We need to start with understanding how do we create value from AI?

Speaker

John M Lervik


Reason

This comment challenges the European approach to AI regulation and suggests a fundamental reordering of priorities. It’s provocative because it suggests that focusing on ethics first might actually hinder innovation and value creation.


Impact

This sparked a nuanced discussion about the balance between regulation and innovation. It led other speakers, particularly Jeff Bullwinkel and Kojo Boake, to address the ‘overregulation’ concern and discuss how to create frameworks that enable rather than constrain AI development.


Just as we shouldn’t rely on these big tech companies to be the standard of AI development, we also should not rely on these bigger regional blocks or countries to also be the model for AI governance as well.

Speaker

Chinasa T. Okolo


Reason

This comment extends the sovereignty argument beyond technology to governance itself, suggesting that smaller nations shouldn’t just copy existing regulatory frameworks but should innovate in governance approaches tailored to their contexts and values.


Impact

This deepened the discussion beyond technical capabilities to include governance innovation as a competitive advantage. It reinforced the theme that small players can lead rather than just follow, and influenced the conversation toward more nuanced approaches to AI policy.


I want to give a shout out to those small players that aren’t interested in [competing with big tech]. They’re actually interested in resolving, making viable businesses or resolving local issues and contextual issues that may never interest Meta, Microsoft, ChatGPT… but are extremely interesting to their locality or their nation.

Speaker

Kojo Boake


Reason

This comment challenges the assumption that all innovation should aim to compete with or attract big tech. It validates local, contextual solutions as valuable in their own right, not just as stepping stones to global scale.


Impact

This comment broadened the definition of success in AI development and validated different paths to innovation. It helped shift the conversation from a binary view of ‘compete or collaborate with big tech’ to recognizing multiple valid approaches to AI development.


One query with ChatGPT… is the same amount of energy as it takes to light one light bulb for 20 minutes. Furthermore, every month, ChatGPT produces more than 260,000 carbon CO2… equal to the emission of 260 flights from New York to London.

Speaker

Ole Christopher Granmo


Reason

This comment provides concrete, relatable metrics that make the abstract concept of AI’s environmental impact tangible and shocking. It reframes AI development as an environmental justice issue, not just a technological one.


Impact

This introduced environmental sustainability as a critical factor in AI development strategy, influencing other speakers to address energy efficiency and green computing as competitive advantages for smaller nations with renewable energy resources.


Overall assessment

These key comments fundamentally shaped the discussion by challenging conventional assumptions about AI development and competition. Rather than accepting that small players must simply adapt to big tech’s paradigms, the speakers collectively built a case for alternative approaches based on values, sustainability, explainability, and local context. The comments created a progression from identifying the problem (AI as playground for the powerful) to proposing solutions (energy-efficient models, contextual innovation, governance innovation) to validating different definitions of success (local solutions vs. global competition). This transformed what could have been a defensive conversation about ‘how to survive’ into an empowering discussion about ‘how to lead’ in AI development.


Follow-up questions

How can Norway and other small countries build sufficient compute infrastructure and access to GPUs needed for training AI models?

Speaker

John M Lervik


Explanation

Lervig identified compute access as a critical need beyond having unique data and competence, noting that while Norway has advantages in industrial data and clean energy, more computing infrastructure is needed to compete globally in AI development.


How can smaller nations develop AI governance frameworks that avoid over-regulation while still ensuring ethical AI development?

Speaker

Kojo Boake and Jeff Bullwinkel


Explanation

Both speakers highlighted the challenge of creating regulatory frameworks that don’t hinder AI adoption and innovation, with Boake specifically mentioning how European over-regulation has caused delays in product launches.


What specific mechanisms can enable effective peer-to-peer collaboration between smaller countries in AI development?

Speaker

Chinasa T. Okolo


Explanation

Okolo mentioned peer-to-peer collaboration as essential for bypassing traditional power hierarchies, but the specific implementation mechanisms for such collaboration networks need further exploration.


How can the Tsetlin Machine hardware development at University of Newcastle be scaled to create a viable alternative to NVIDIA’s deep learning-optimized hardware?

Speaker

Ole Christopher Granmo


Explanation

Granmo identified the need to build alternative hardware from the ground up to support energy-efficient AI, but the path to scaling this pioneering work into a commercial alternative requires further research.


How can smaller countries effectively balance leveraging existing big tech platforms while developing their own sovereign AI capabilities?

Speaker

John M Lervik


Explanation

Lervig emphasized that Norway cannot just ‘sit on the shoulders’ of Microsoft and Meta but needs to develop its own IP and value creation, raising questions about the optimal strategy for this balance.


What are the specific socio-technical research needs for understanding AI bias in non-Western contexts, particularly around caste, tribal affiliation, and other local social identities?

Speaker

Chinasa T. Okolo


Explanation

Okolo highlighted that current AI fairness literature focuses on Western concepts like race, but more research is needed on how AI models can discriminate based on social identities relevant to global majority countries.


How can the regulatory sandbox model be optimized to support SMEs and startups in AI development across different national contexts?

Speaker

Karianne Tung and Esther Kunda


Explanation

Both speakers mentioned regulatory sandboxes as important tools, but questions remain about best practices for implementation and how to make them most effective for small players.


What are the practical steps for implementing data sovereignty while maintaining international collaboration in AI development?

Speaker

Multiple speakers including Jeff Bullwinkel and Esther Kunda


Explanation

While data sovereignty was identified as crucial, the specific mechanisms for achieving it while still enabling beneficial international partnerships and data sharing need further exploration.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.