WS #462 Bridging the Compute Divide a Global Alliance for AI

WS #462 Bridging the Compute Divide a Global Alliance for AI

Session at a glance

Summary

This panel discussion focused on “Bridging the Compute Divide” and exploring the need for a global alliance to ensure equitable access to AI computational resources. The conversation was moderated by Fabio Steibel from Brazil’s ITS Rio Institute, who proposed creating a “GAVI for AI” – modeled after the successful Global Alliance for Vaccines and Immunization that has facilitated vaccine access worldwide since 2000.


The panelists included Jason Slater from UNIDO, Elena Estavillo Flores from Centro AI para la Sociedad del Futuro, Ivy Lau-Schindewolf from OpenAI, and Alisson O’Beirne from the Canadian government. They identified several key barriers to equitable compute access, including the concentration of computational power in roughly 30 nations (primarily the US and China), infrastructure gaps creating “compute deserts,” skills shortages, and the compounding nature of digital divides that leave regions further behind over time.


The discussion revealed that the challenge extends beyond inequitable distribution to an overall supply-demand gap affecting even developed nations. Panelists emphasized that solutions require multi-stakeholder collaboration involving governments, private sector, academia, and civil society. They highlighted successful examples like UNIDO’s AI for Manufacturing alliance and OpenAI’s Stargate infrastructure project, which demonstrate how technical, financial, and political partners can work together effectively.


Key lessons from GAVI included the importance of inclusive governance models, corrective mechanisms for historical inequalities, and sustainable financing structures. The panelists stressed that addressing compute access must be coupled with investments in local talent, skills development, and ensuring AI tools are designed responsively for diverse communities. The discussion concluded with calls for multiple collaborative alliances tailored to different communities and contexts, emphasizing that collective action requires genuine listening, compromise, and openness to different perspectives and needs.


Keypoints

## Major Discussion Points:


– **Global Compute Divide and Access Inequality**: The panel highlighted the stark disparity in computational power access between the Global North and South, with Brazil having only 1% of global data centers and 0.2% of computational power. This creates barriers for AI development and perpetuates existing digital divides.


– **Need for Multi-stakeholder Collaboration**: Drawing lessons from GAVI (Global Alliance for Vaccines and Immunization), panelists emphasized the necessity of bringing together governments, private sector, academia, and civil society to address compute access challenges through coordinated purchasing power and resource sharing.


– **Infrastructure vs. Benefits Access**: The discussion explored whether countries need local compute infrastructure or if remote access to AI benefits could suffice. Examples included partnerships between countries for supercomputing resources and making AI tools accessible through platforms like WhatsApp in low-connectivity areas.


– **Sustainable Local Capacity Building**: Panelists stressed the importance of investing in people, local talent, and startup ecosystems rather than just hardware, highlighting how Global South innovation often emerges from creative solutions with limited resources.


– **Governance and Equitable Distribution**: The conversation addressed how to ensure fair distribution of compute resources through inclusive governance models that consider not just technical efficiency but social fairness, involving local institutions in decision-making processes.


## Overall Purpose:


The discussion aimed to explore the feasibility and framework for creating global alliances to address the computational power divide in AI development, specifically focusing on how to ensure equitable access for Global South nations. The panel sought to identify barriers, share lessons from successful global initiatives like GAVI, and propose collaborative solutions for bridging the compute gap.


## Overall Tone:


The discussion maintained a constructive and collaborative tone throughout, with participants building on each other’s ideas rather than debating opposing viewpoints. The tone was solution-oriented and pragmatic, moving from problem identification to concrete examples and actionable proposals. There was a sense of urgency about addressing inequities while remaining optimistic about the potential for international cooperation. The conversation became increasingly focused on practical implementation strategies as it progressed, with panelists sharing specific initiatives and calling for concrete collaborative action.


Speakers

– **Fabro Steibel** – Executive Director of ITS Real Institute for Technology and Society (civil society organization), Panel Moderator


– **Jason Slater** – Chief AI Digital Innovation Officer at UNIDO (United Nations Industrial Development Organization)


– **Elena Estavillo Flores** – Founder and leader of Centro AI para la Sociedad del Futuro (think tank), Former telecommunications regulator in Mexico, Economist


– **Ivy Lau-Schindewolf** – International policy and partnerships at OpenAI, Global affairs team member coordinating work in growth markets (Africa, Latin America, APEC) and multilateral engagements


– **Alisson O’Beirne** – Director of International Telecommunications and Internet Policy, Department of Innovation, Science and Economic Development, Government of Canada


Additional speakers:


None identified beyond the provided speakers names list.


Full session report

# Bridging the Compute Divide: A Comprehensive Panel Discussion Report


## Executive Summary


This panel discussion, moderated by Fabro Steibel from Brazil’s ITS Rio Institute, explored the critical challenge of creating equitable access to artificial intelligence computational resources through global collaboration. The conversation centered on the concept of establishing a “GAVI for AI” – a global alliance modeled after the successful Global Alliance for Vaccines and Immunization.


The distinguished panel brought together perspectives from multilateral organizations, government, private sector, and civil society. Jason Slater, Chief AI Digital Innovation Officer at UNIDO, represented the industrial development perspective; Elena Estavillo Flores provided insights from her experience as both a former telecommunications regulator in Mexico and current think tank leader; Ivy Lau-Schindewolf offered the private sector perspective from OpenAI’s global affairs team; and Alisson O’Beirne contributed the Canadian government’s policy viewpoint on international telecommunications and internet governance.


The discussion revealed that the compute divide represents both a supply shortage affecting all nations and an access inequality that disproportionately impacts the Global South. Panelists identified multiple interconnected barriers while emphasizing that solutions require unprecedented multi-stakeholder collaboration involving governments, private companies, academic institutions, and civil society organizations.


## The Global Compute Divide: Scope and Scale


### Quantifying the Inequality


Fabro Steibel opened the discussion with stark statistics illustrating the magnitude of the global compute divide. According to “EAA numbers released this week,” Brazil possesses only 1% of the world’s data centers (representing half of all Latin America) and a mere 0.2% of worldwide computational power. This disparity demonstrates how even major economies in the Global South face significant barriers to AI development and deployment.


Jason Slater expanded on this theme, noting that nearly 3 billion people remain unconnected globally, with Africa showing only a 25% adoption rate for AI and digital tools. He identified the concentration of computational power in approximately 30 nations, primarily the United States and China, creating what he termed “compute deserts” – regions with minimal connectivity and substantial skills gaps.


### The Compounding Nature of Digital Divides


Elena Estavillo Flores provided crucial insight into how the compute divide creates self-reinforcing cycles of disadvantage. She explained that the barriers are “not only complex, but they’re also compounding, they’re self-perpetuating.” This creates a situation where regions already lacking computational resources fall further behind as global demand increases and investment flows to areas that already possess compute capacity.


Alisson O’Beirne reinforced this analysis, noting that “as folks are left behind and as there’s a lack in compute capacity, those that are already behind the game are going to be left further and further behind.” This temporal dimension suggests that without proactive intervention, market forces alone will continue to exacerbate existing disparities.


### Universal Supply Constraints


Ivy Lau-Schindewolf introduced a crucial reframing by highlighting that “the problem isn’t just inequitable access. The problem is everyone needs more.” She noted that ChatGPT reached 100 million users in one month and now has 500 million weekly active users, illustrating the explosive global demand for AI capabilities that exceeds current supply capacity.


This universal supply constraint means that solutions cannot rely solely on redistributing existing computational resources from developed to developing nations. Instead, addressing the compute divide requires both expanding overall global capacity and ensuring more equitable distribution of resources.


## Barriers to Equitable Access


### Infrastructure and Investment Challenges


Elena Estavillo Flores highlighted particular challenges facing Latin America, where “there’s not enough private investment” and “governments don’t have enough resources for the investments that are needed.” This creates a funding gap where neither private markets nor public resources alone can provide the massive capital investments required for modern AI infrastructure.


Geographic cost differences and market concentration create additional barriers. The concentration of computational resources in specific regions leads to cost advantages that become self-perpetuating, making it increasingly difficult for emerging economies to compete or develop local alternatives.


### Skills and Capacity Gaps


Beyond physical infrastructure, Jason Slater emphasized that compute deserts are characterized not only by lack of connectivity but also by “significant skills gaps.” These capacity constraints mean that even when computational resources become available, many regions lack the technical expertise necessary to utilize them effectively.


Ivy Lau-Schindewolf reinforced this point, noting that “cultivating vibrant startup ecosystems and investing in people through education programmes are essential beyond just hardware infrastructure.”


## Learning from GAVI and Existing Models


### Multi-Stakeholder Collaboration


Jason Slater highlighted how successful global alliances require bringing together diverse stakeholders as trusted conveners. He pointed to UNIDO’s AI for Manufacturing Global Alliance, which includes 140 members from over 40 countries, as an example of effective multi-stakeholder collaboration.


Alisson O’Beirne emphasized how “critical mass through collective action gives countries greater negotiating power than individual efforts.” This insight suggests that coordinated demand from multiple countries can influence market dynamics and pricing in ways that individual national efforts cannot achieve.


### Concrete Examples of Collaboration


Jason Slater presented UNIDO’s Ethiopia coffee project as a practical example of multi-stakeholder collaboration. The project brings together Italy, Ethiopia, Google, NGS, and the International Coffee Organization to address the EU deforestation directive while building local AI capacity.


Ivy Lau-Schindewolf highlighted OpenAI’s Stargate infrastructure project as an example of private sector leadership mobilizing diverse partners for large-scale compute infrastructure development. She also mentioned OpenAI’s Academy training, which has reached 1.4 million people globally, and partnerships with platforms like WhatsApp to provide AI access in low-connectivity environments.


Alisson O’Beirne announced Canada’s collaboration with the UK’s Foreign Commonwealth Development Office through a $10 million commitment from Canada’s IDRC to develop an “equal compute network.”


## Alternative Approaches and Innovation


### Remote Access vs. Local Infrastructure


The discussion explored whether countries require local computational infrastructure or whether remote access could suffice for many applications. Ivy Lau-Schindewolf argued that creative solutions, such as integrating AI capabilities through widely-used platforms, could provide immediate benefits while longer-term infrastructure development proceeds.


However, other panelists emphasized the importance of local infrastructure for enabling indigenous innovation and ensuring technological sovereignty. Elena Estavillo Flores noted that Global South regions have “managed to develop ingenuity and contextual intelligence to find solutions with very limited resources,” suggesting that “if this ingenuity is met with more infrastructure, then there is an opportunity.”


### Building on Local Innovation


Fabro Steibel mentioned that Brazil’s recently released AI national plan includes examples like “Favela GPT and Amazon GPT,” demonstrating local innovation that could be amplified through better infrastructure access.


Alisson O’Beirne expanded the discussion to include “equitability of design and equitability of use,” noting that “if we don’t have AI tools that are designed responsibly and that respond to the needs of local communities, access is not going to be sufficient.”


## Governance and Implementation Challenges


### Balancing Efficiency and Equity


Elena Estavillo Flores emphasized the need for “inclusive governance models with meaningful civil society participation” to ensure that fairness considerations are not subordinated to pure technical optimization. She highlighted that “credible governance models require trust-building mechanisms and fair benefit-sharing to maintain long-term participation and investment.”


### The Importance of Listening and Compromise


Alisson O’Beirne provided perhaps the most crucial insight for implementation, emphasizing that successful collaboration requires “a spirit of listening and openness and a spirit of compromise.” This recognition that technical and financial solutions alone are insufficient without genuine commitment to understanding diverse perspectives provides a foundation for moving from discussion to implementation.


## Concrete Next Steps and Commitments


### Immediate Opportunities


Jason Slater issued a direct call for participants to join UNIDO’s existing AI for Manufacturing Global Alliance, providing an immediate platform for multi-stakeholder collaboration. He also mentioned that the Global Digital Compact provides “a clear framework for action through multi-stakeholder approaches linking digital economy and AI objectives.”


### Committed Resources


Several concrete commitments emerged from the discussion:


– Canada’s IDRC and the UK’s Foreign Commonwealth Development Office have committed $10 million to develop an “equal compute network”


– OpenAI committed to expanding their “OpenAI for countries” programme and Academy training


– UNIDO committed to continuing development of AI lighthouse solutions beyond the Ethiopia coffee project


### Scaling Successful Models


Participants agreed to explore replicating successful consortium models for international compute infrastructure projects, indicating willingness to adapt proven approaches for broader international cooperation.


## Conclusion


The panel discussion revealed both the complexity of addressing global compute access challenges and the potential for meaningful international cooperation. The strong consensus on the need for multi-stakeholder collaboration, combined with concrete examples of successful initiatives and committed resources, suggests viable pathways for implementing global alliance models.


The most significant insight may be the recognition that successful collaboration requires not just technical and financial solutions, but genuine commitment to listening, compromise, and understanding diverse perspectives and needs. The path forward likely requires multiple collaborative approaches tailored to different communities and contexts, coordinated through existing international frameworks, and supported by a combination of public and private resources.


The urgency of action is clear, given the self-perpetuating nature of compute disadvantages and the rapid pace of AI development. However, the discussion suggests that the foundations for effective global cooperation exist, requiring primarily the political will and institutional commitment necessary to translate shared understanding into coordinated action.


Session transcript

Fabro Steibel: So, hello everyone, welcome to the panel. If you are online, welcome. If you are here in front of us, welcome. This is the panel Bridging the Compute Divide, a global alliance for AI. And if you ask if the global alliance or a global alliance, I think it might be a global alliance and even many global alliances as long as we have this idea of global alliance. We’ll introduce shortly the panel and then I’ll pass the words for three rounds of questions and then we open for your comments. So let me explain why we believe we need a global alliance for AI. My name is Fabio Steibel. I’m Executive Director of ITS Real Institute for Technology and Society and it’s a civil society. Last year on the topic of techno diversity, we came with the problem challenge that compute power will be very limited. And this is a different problem for society of information. Brazil has 1% of all data centers of the world. That’s half of Latin America. According to EAA numbers released this week, Brazil has 0.2% of the computational power. And it’s not to say that Brazil or any other country needs to have its own capacity, its own compute power, but the idea is to access. There is a big challenge for access if you look for… the Global North and the Global South bridge or other bridges you can do. This is why we suggest a global alliance for AI, what we call Gavi for AI. So if you’re not familiar with Gavi, it’s the global alliance for vaccination. In 2000, they started to put countries and foundations together to purchase something that was very limited in the market. Same problem we see here with compute power. Might be energy, might be compute parts, but it’s a limited supply of these elements to buy. So together, they could have three groups working. One, that gets the money and make sure everything is accountable. Two, that makes a technical definition of what they should buy. And three, a group that decides on how to share, how to distribute whatever they’re doing. Today, they are responsible for more than a third of the vaccines purchased in the world yearly. They were able to breach the limited supply and were able to increase access to vaccines. Is it the same for compute power? Some yes, some no. What are the lessons to be learned? What are the different approaches we have? So this is the intro. I will pass the word to the speakers. We have very different stakeholders here, which is the best approach to see the problem from different ways. So Jason, I’ll start with you. Jason Slata is the Chief AI Digital Innovation Officer at UNIDO. If you’re not familiar with UNIDO, it’s about industrial development, very important for the topic. Jason.


Jason Slater: Thank you very much for having me here today. Just very briefly, my name is Jason Slater. I’m the Chief AI Innovation and Digital Officer for the United Nations Industrial Development Organization. We’re an organization that’s been around nearly 60 years now. We’re a specialized UN agency with a very specific focus on how can we ensure a sustainable industrial development.


Fabro Steibel: We go for Elena Estavillo Flores. She founded and leads the Centro AI para la Sociedad del Futuro, a think tank that works to build the digital future in an ethical, responsible and inclusive way. Elena, can you hear us?


Elena Estavillo Flores: Yes, yes, I hear you very well. Hello.


Jason Slater: So, please introduce yourself very briefly and then later we go for the two questions.


Elena Estavillo Flores: Introduce myself? Yes, of course. I live in the Centro AI. As you told, this is an independent think tank and we work to foster ethical digital technologies, inclusion, responsibility. And I myself have a long career in regulation, in public policy. I was a regulator for telecommunications in Mexico and I also have taught for many years. I’m an economist.


Fabro Steibel: Thank you very much. I like very much to have economists in the panel. I’ll move now to Ivy. Ivy, Ivy Lau Schindelboff, works in international policy and partnerships at OpenAI. Hi, thank you so much for having me and for moderating and organizing this panel.


Ivy Lau-Schindewolf: My name is Ivy Lau Schindelboff. I am part of the global affairs team at OpenAI, based in our San Francisco headquarter. I wear two hats. One of them is I coordinate our work and growth markets and that means Africa, Latin America and APEC And the other hat I wear is I help lead our multilateral engagements. Pleasure to be here


Fabro Steibel: Thank you very much, Ivy. So now for the fourth participant Alisson O’Beirne is the Director of International Telecommunications and Internet Policy in the Department of Innovation, Science and Economic Development in the Government of Canada Thanks so much. I have a hideously long title. It’s mostly because of our department name. So you did very well there


Alisson O’Beirne: Hi folks, Alisson O’Beirne as as mentioned I’m the Director for International Telecoms and Internet Policy for our little team Within our what is equivalent to the Industry Department in the Government of Canada We have responsibilities for both the ITU and for Internet governance files for Government of Canada And it’s a role that I’ve actually been in for just under a year now So this is my first IGF and I am delighted to be able to experience it Live and in person after hearing about how great this forum is for many years And I had previously spent about five years in our same Industry Department working on AI policy So this is an issue that’s near and dear to my heart for sure


Fabro Steibel: Thank you. And you know Canada was one of the first countries to jump in the AI regulation arena So let’s move to a first question What are the key geopolitical and technical barriers? Preventing equitable access to computational power for AI development and how can International cooperation in particular help to address them. So what the barriers we have to achieve Access Jason, would you like to start?


Jason Slater: Yeah, thank you very much. Yeah, I Guess I a few things from what we see here that In terms of in terms of AI computing power This is really concentrated in in only a few nations right now. I think it’s roughly around 30 Primarily in US and China, etc and the way that I want to tackle this is really by looking at it from UNIDO’s perspective is who are the member states that we are primarily trying to support and where do we see this digital divide or AI computing divide so we can if we look at Africa for example we still see there that you know roughly globally there’s nearly nearly 3 billion still unconnected this is a huge challenge you see in Africa alone that in terms of AI and digital tools the adoptions in the region of 25% so for me one is of course in terms of you thinking about computing power and we have what we call these compute deserts where we have these these zones where there’s just simply no connectivity we also have to see it from how do we ensure adoption how do we also look at it from a skills perspective so there is a huge skills gap that we’re seeing right now and again if I look at Africa in particular but there’s some positive news and I think we’ll come to that later yeah when our fellow panelists have had a chance to speak so there are those are some of the barriers that we are seeing right now now one of the thing this has been framed very clearly by the global digital compact that was that was endorsed last last September in the United Nations General Assembly I was very fortunate to be there at the ceremony that was was celebrating us coming together under the pact for the future and one of my actual roles in the UN is and that’s what I would use as a call for action today is I’m vice chairing the objective number two on an inclusive digital economy which closely links to objective number five on AI so mine is is that we know what those challenges are which challenges to convert themselves into the barriers and how can we then switch that into a much more positive and solution mode and I’ll hold back on that because I think later on I’d like to talk about some of the things not only we’re doing but with our private sector partners and other stakeholders we’re putting in place.


Fabro Steibel: Yeah thank you very much Jason so Finland has a very good experiences on quantum computing and the challenge to share And the topics you bring also bring us very closely to meaningful connectivity Which is a interesting way to see the problem from ten years today ago to today. So I move now to to Ivy


Ivy Lau-Schindewolf: Yeah, I Keep thinking about the way the phrase Equitable access and what the barriers are and I actually want to like take a step back and and think about like just Barriers to access period and And what comes to mind and I think it’s important. It’s important to like Take a moment to think about The gap between supply and demand that everyone faces It’s actually We have reached we have received a lot of outreach from countries with a question of How much demand there really is like do we actually you know, we have this idea that we need GPUs But how much do we really need it? Can you help us quantify? And to be honest, it is not a question. We have thought a lot about until We have seen how fast our models have the demand for our products have grown when we launched at GPT in 22 or 23 now, I can’t remember it seems like a long time ago We thought it was a low-key research preview that nobody would use and pay attention to But then we actually ended up having a hundred million users in one month And now we have five hundred million weekly active users and our CEO Posted on X saying like our GPUs are melting and a lot of people thought oh my gosh, are they actually melting? They know they were not but like we actually just have seen a huge inference demand And that is not we knew training models would involve a lot of GPUs, but even we ourselves have underestimated how much demand there will be on inference. And as we have seen, the cost has come down, and when the cost of serving these models come down, the demand and the use also went up. And when we plotted out in a model, we realized, oh, no, we are not on a trajectory to meet the demands. And so even we ourselves in the U.S. realize we need access to more GPUs. And that’s why we launched Stargate and why we launched OpenAI for countries, and I’ll share more about that later, but I think I want to throw out the framing that, like, yes, we should think about, you know, the divide and whether the access is equitable, but maybe if we can zoom out a little bit, the problem isn’t just inequitable access. The problem is everyone needs more. How do we solve for the gap between supply and demand everywhere?


Fabro Steibel: Thank you. And I like to think like Brazil, we need to prepare for 5G and no connectivity, and you have to take both paths together because we have both audiences. So I will go online now to Elena.


Elena Estavillo Flores: Yes, thank you. I was also reflecting on the question because when we ask if we have enough access, maybe we’re thinking that there is computational power and the problem is how to access it or how to access it equitably. But in this aspect, we have the problem of not enough computational power. No. So it’s a double question about meeting demand and supply and then having the mechanisms. So. that everybody has, well, everybody in the interesting parties has this equitable access. So it’s not just a case of making sure to access to something that exists, but how to produce it. And then we have many barriers that keep just reinforcing themselves. And I’m thinking mostly of Latin America, the case that I know better, because we don’t have enough access to basic infrastructure, to services, to capacity in those services, now for final users. But then this comes over all of this, the companies, the scientists, the academia, the startups that could produce more services, more AI. They have this barrier because there’s not enough compute power so that they can develop the AI that is focused on the region, culture, needs, ways of deciding on how to use AI for which needs, for which problems to solve. So this is just something, it’s like a circle that keeps reinforcing itself. And I see something that it’s something that makes me reflect on whom makes the necessary investments so that there is more compute power in some countries than in others. And it’s very clear that, for example, in the U.S., mainly investment in compute power comes from companies. This is private investment that is oriented to the market. And we don’t see the same dynamics in many of our countries in Latin America. And we expect much of the investment coming from governments. But governments have not enough resources for these huge investments that we would need. And so that’s where this idea of collaborating for producing this infrastructure, this computing infrastructure regionally, well, this is very attractive because individually governments don’t have these resources. But also it comes to questioning us if this will be enough. We need the other side of the investment side from the private sector. So we also have to work on that. And also we can think of collaborative efforts, but bringing together the private sector so that we can gather these sufficient resources coming from only the governments. I don’t think that those will be sufficient.


Fabro Steibel: Elena, thank you very much for your contribution. Alisson, do you want to go next?


Alisson O’Beirne: Yeah, absolutely. I’ll keep my comments relatively brief because I think my colleagues have done a very good job of covering the ground so far. Maybe just to raise a couple of other things. I think we’ve talked a little bit about. And I really want to pick up on what Elena was talking about with regard to the sort of regional and the geographic differences in terms of access, I think is one of the major challenges that we’re facing. Recognizing that particularly for sort of emerging economies for the global south, there are cost issues that can be associated with, you know, developing or establishing compute capacity, that the cost of creating compute capacity is not the same in every region, that there are issues that come to infrastructure, that come to latency that already exists, that have to be addressed in order to be able to establish compute capacity. There’s also, I want to acknowledge, as I think Elena did as well, that there’s a real concentration of the current compute capacity in the hands of a very few providers who have incentives because of the scale of the demand and because of their proximity have incentives to really focus on sort of North American and Western European markets. So with those barriers that I think various folks on the panel have talked about, the one thing that I want to note is that the real challenge that we face is that some of those barriers are not only complex, but they’re also, they’re compounding, they’re self-perpetuating. So as folks are left behind and as there’s a lack in compute capacity, or in some cases lacking infrastructure, or in some cases even lacking demand side, like we talked about, you know, lacking skills or lacking awareness of the necessity of compute power, those that are already behind the game are going to be left further and further behind because as the demand increases in those places that already have compute capacity, we’re going to see just a continuation of response to that instead of a more equitable approach. So I think that’s, as Elena said, a place where governments and particularly where international discussions and international dialogues are critical because you can’t rely sort of on market forces to be able to correct for that need for equity and access.


Fabro Steibel: Thank you Alison and I think you remember that the legacy of the digital divide keeps going and then we have new challenges and the old challenge all together. Exactly. So I’ll go for the second question of the panel. What lessons can be drawn from Global Public Goods Initiatives, such as GAVI that I mentioned before Lessons to design a multilateral framework that ensures fair distribution of compute resources needed for AI development So Jason, we start with you


Jason Slater: Yeah, thank you Hmm, I Think there’s a lot of positives that we can look at that. I mean we when you talk about Multilateral or multi-stakeholder frameworks, it’s we actually launched a similar thing already Near two years ago now. It’s known as AI for manufacturing. It’s a global alliance and What the purpose of this is is that as a you as a as a UN agency that you actually as a trusted advisor if You like to convene and bring together stakeholders. We have around 140 members now from over 40 countries and it’s a complete mix of academia think tanks private sector we’ve got people such as You know Google Huawei imagining those two sitting around the table and what is it that they’re trying to do is to see and identify how we can Leverage AI that can support manufacturing Primarily in those countries that we want to support. So these are you know developing our middle-income countries? So in terms of how Gavi and what it did in bringing together this framework I think there’s a lot a lot of positives that one can see in it I just see from the perspective of what we’re doing around this aim global alliance not to be confused with the title is We want to make it much more solution orientated so when we talk around here now of digital divide of lack of skills of not on Let’s understand where we need to deploy such solutions, etc. So really become much more solution orientated We hear enough about the problems that are going on when the title here. We’re talking about geopolitical issues We’re in the UN and fully understanding that right now, but let’s get on the front foot. Yeah Because we do know that there are gaps. We know for example when we talk about computing power We know where there are challenges right now when it comes to growing a tomato and getting a tomato in Kenya To the market and how 20% of that is lost and here is perfect a use case for a way I can help it So for me bringing all those stakeholders together from the people who need all the way those who provide and Frankly from the UN to have this convening role that actually is a trusted advisor is a phenomenal thing that we can learn Based on the experiences of what happened with Gabi and that scheme before. Thank you Thank you, Jason, and I love that you bring the tomato from Kenya because it moves away from the prompting user Yeah, normal that resembles rural areas Manufacturing intermediaries sustainability and others. I’m going to talk about coffee as well in a few minutes as well.


Fabro Steibel: So Elena, do you want to go next?


Elena Estavillo Flores: Yes, of course about lessons. I think that we have many lessons one of how that an inclusive governance model works very well and in the sense that decisions were not solely shaped by by Some small group of nations of wealthier nations or a small group of corporate interests but that there were many multistakeholders just looking at a meaningful participation for for these different different actors and a civil society also played a very critical role in bringing transparency in monitoring and keeping this equity in Central to this monitoring know and and making sure that decision-making was very aware of of the need to ensure that distribution was fair. So we can learn from that, in that if we get to build this collaboration, that compute distribution will be not only looking at a technical efficiency, but also on socially fairness to distribute and to give access to this computing power. Also of being very aware of the importance of having corrective mechanisms to address historic inequality. So in this mechanisms that have to be designed, that we bring the factors of correcting and to bringing local institutions and research ecosystems to engage continually with these systems. So that it’s not only of bringing a technology or shipping in equipment to build the centers, but to really understand how compute is used for which needs and that local institutions and organizations are deciding on this.


Fabro Steibel: Thank you, Elena. And thank you for bringing the researchers and universities again to the topic. And I like the position you made from a technical solution to a fairness solution. It’s very difficult to define what fairness is, but it’s certainly something we have to pursue and define. So I like it very much. Ivy, do you want to go next?


Ivy Lau-Schindewolf: Sure. Yeah, it’s kind of hard to go after, you know, Elena. And that was a very, very good point and compelling. You know OpenAIR is just one company in this big world, in this ecosystem, but I think we will share what we see from our own vantage point and experience. I think what I couldn’t agree with more from both the Gavi example and what my co-panelists have shared is importance of working across sectors. And what I mean by that is we as a single company, for example, have learned from our Stargate experience that that definitely could not be accomplished by one party alone. And let me just maybe take a moment to explain what Stargate is and who is involved in it and why that convinced me that this has to be a multi-stakeholder solution. So Stargate is a 500 billion dollar infrastructure project, essentially, over the next four years. And we have started building data centers in Abilene, Texas. And this is who and how it all came together. Like Gavi, there is one group of partners that are technology and operations focused. So that includes OpenAI, Microsoft, NVIDIA, Oracle, ARM. And then we need another group of partners that can be finance focused. And for us, in this case, for Stargate, it’s SoftBank. They take up the financing responsibility. And the third group, very much like Gavi, how the responsibilities are distributed and structured, is the political side. This is something we are working with state governments on. And it extends to what we do internationally. And this is what we have talked to the U.S. government about. And I think another possibility I want to posit here is we have heard from a lot of countries that what they really, really want, or they’re not mutually exclusive. I think they want to make sure there is access to the benefits that compute and compute enabled models bring. And so in addition to thinking about infrastructure, we are also therefore very focused on how we can make access to the solutions that compute enable available. And that’s why when we launched OpenAI for countries, it is not copy paste Stargate everywhere. It actually is much more expansive than that. We think about how we work with different education partners, universities, schools, how we increase AI literacy. So we’re not just investing on the stuff, the hardware, right? We’re investing in people as well. We make our products freely available. We have a partnership with WhatsApp. So in low connectivity settings, people can still access the benefits of intelligence that compute enables. And all of that is something that, you know, like as one company, this is what we’re thinking about doing. But we also know that we need funding partners. We need operations partners, technology partners, political partners, very much like Gavi, so that this is something we can coordinate and offer to the world from very different levels of the stack, at the infrastructure level, at the solutions level, and at like even like a people level, so that we are as a society evolving along with the technology.


Fabro Steibel: Thank you. And that reminds me that bridging the compute power might or might not involve localities. So we can process data remotely. we have done. Brazil has a partnership with Spain for supercomputers. Finland has one. Estonia, I reckon, has one as well. So, we can solve problems where the energy is a possibility, where water is a possibility, but also where the supply and demand, it’s another part of the scale and can be achieved. Thank you. So, I move now to the third question of the panel. So, how can Global South nations shape AI governance and infrastructure policies to reduce dependence of foreign compute providers and build sustainable local AI capacity? What lessons can be learned from the Dipsy case or other cases that kind of rephrase it, how we ask questions about computational power? Jason, you want to start?


Jason Slater: No. No, thank you. I’m still wanting to answer the previous question. Tell us about coffee. Tell us about the coffee. Shall I? Because that may be something that can be, I think it’s actually very relevant to this when you’re talking about the Global South. So, I talked about tomatoes before. What we did last year on the sidelines of the General Assembly, we basically built what we call a Lighthouse solution. It links to AI. It was a consortium of two governments. So, Italy, Ethiopia, Ilia Levatsa, Google with one of its implementing partners, NGS and an international coffee organization. What was it we were trying to solve? There’s roughly around 3 billion cups of coffee drank a day. Ethiopia is the fifth largest coffee producers, the number one coffee producer in Africa. And there’s a new EU directive being issued called deforestation. And so, the challenge was, how can you leverage AI and digitalization to support coffee farmers? So, that’s why we built this consortium and brought everybody together. So, again, back to the GAVI example, the AIM Global, this was a very specific one. And there’s many, many other examples. That’s why it links nicely to what you mentioned with Stargate. It’s a huge case where people came together because you could not possibly Solve it as a UN agency or individually. So that was the coffee example. We brought it together. We have a solution We went to Addis. We actually met and Presented this to the coffee farmers association themselves. They didn’t like it. We had McKinsey present didn’t like it Why because they didn’t understand the incentive our land is not subjected to deforestation Only a couple two percent so but when one understands that in order to comply with this directive that it opens up of Opportunities along the supply chain that openly is about, you know, increasing productivity and what-have-you Then we tapped into the real incentive behind it So that’s another thing when we know that there are I when you when you talk about the usages etc And then GPUs and what-have-you I think about there’s so many faces out there where they don’t yet know how AI And digitalization is going to support them. So that was the very that was the coffee example Where are we now 12 months on? We are now looking to see whether we can actually implement some pilot that within Ethiopia in addition to that that consortium are opening up and an AI initiative in Italy Bringing those examples together primarily in the area of coffee. So that was the specific example. I’ll I’ll answer this question later


Fabro Steibel: I Think I Like very much the coffee example because it’s hands-on and in deforestation we bring the AI and climate Close to each other. So you have wonderful uses for mapping deforestation mapping disasters predicting climate and many other things and If you do it together, if you have elements of these that are open that can be shared It certainly is an asset for global global climate change so Could you go next? Yes.


Elena Estavillo Flores: Well, I’ve already said about something that I wanted to focus on in the importance of investing in people, in investing in local talent, and not just thinking of the hard work and and supporting community-driven research, because countries are innovating despite this infrastructure gaps. And this, I find this very interesting, you know, something that we always are, repeat now in Mexico, but that I believe that it is true of many other countries, is that given that we don’t have many resources, so then we have managed to develop ingenuity and contextual intelligence to find solutions with very limited resources. And I see that this is happening also in AI development, that we look at researchers, small developers in civil society that are experimenting and they are using open source and small scales, hybrid models and finding interesting developments. So I think that this is something to learn from and these are opportunities. And if this ingenuity is met with more infrastructure, because we definitely need it, and we can find these collaborative ways to find this infrastructure, then there is an opportunity to meeting. ingenuity with infrastructure. And and also, I find another thing that I find very interesting is that these regions of the world, not like like Latin America, are are pushing for more plural and justice center vision of AI. And also where we emphasize not only into an individual, but collective rights. And this can also help us build government, a strong governance for AI and reshaping this this AI, this governance for AI in a way that that protects these different models of innovation and different models of of protecting individual and collective rights.


Fabro Steibel: Thank you, Elena. And you remind me of how from the global south, we just have to be creative with scarce resources. We just have to hack it. We just have to to make it happen. If we level up the opportunities for certainly for sure, we’re going to have more better results. So, Ivy, do you want to go next? Sure.


Ivy Lau-Schindewolf: All this talk of infrastructure just reminded me that when I first landed in Oslo Airport and then took the train to the city, I’m like, wow, like when trains work, it is an amazing experience and it is such a great utility. And I wish my home city of San Francisco would offer the same thing. And I mentioned that example, because I think when we talk about chips and compute, sometimes it just, you know, we we might think of it as a different category, as other infrastructure that have built cities and nations. And when you ask the question, Fabio, about what to do about that lack of access. I think it’s kind of how we think about what everyone can do about the gap in supply and demand. How can we solve for the problem of access to the infrastructure and the problem of access to the benefits of infrastructure? If we can’t access to the infrastructure to the same degree, is there a creative way to access the benefits? And I want to maybe offer two more things in addition to talking about data centers. One is I think it’s important to incentivize and cultivate a vibrant local startup ecosystem. If you have chips and you have maybe some people who know how to use a tool, but there aren’t entrepreneurs and if you don’t incentivize and really cultivate that growth, then I feel like we’re not really facilitating access. We’re not facilitating innovation. We’re not facilitating access to the benefits of the technology. So I think that is really important. It’s like one of the prongs of what we offer when we say we’re launching OpenAI for countries. And then the other thing is kind of touching on what Elena also mentioned and what I said earlier about like investing in people. We launched OpenAI Academy earlier this year and we are just starting to scale. And if you haven’t seen some of our videos online already, I encourage you to do that. We have been in production like every week and they are for all sectors and they’re all for all skills levels. And sometimes we offer in-person events as well. And the main point here is not like, look, there are more free videos to watch. They are. And like, we’re proud to say that we have trained 1.4 million people already. But I but I think like to think when we think about access, there needs to be like a very concrete way to apply the technology. And we can’t do that if we don’t actually know what it is and what to do that with. I very much I’m excited that when we move from day zero to day one, well, maybe day one to day two, to be fair about all the progress we have seen already, that there will be a much more sophisticated and maybe even demanding like approach to like how we use the compute and the tools that the compute empower and not just talking about like the stuff itself.


Fabro Steibel: Thanks, Ivy. You reminded me that prompting brings humans able to easily talk to computers. So when you have descriptive AI, you usually need a team of technicians to code something. So we use the result. When we have generative AI, we regain this capacity to be a normal user, to make use of technology, which brings the issue of supply and demand to a great distress, because now we have way more need for technologies and uses. So Alison.


Alisson O’Beirne: Yeah, sure. Thanks. I think the question really is about how we include how we include Global South voices in conversations around AI. And I will continue to make it a policy not to tell the Global South how to do policy. But I will say that I think that one of the effective ways that we ensure that we have voices from the Global South in the conversation, and it really reflects back on what Elena was talking about in the Gavi model, is ensuring that we have. a multi-stakeholder approach and one that thinks about including a whole range of different potential partners. So when we’re talking about something like, you know, a global alliance for artificial intelligence, we have to think about ensuring that we’re talking to large and to small providers and users. We have to think about talking about both public and private space. Like it has to be the big AI institutions, the accelerators, the startups, the governments, all coming into the conversation together. That’ll be the most effective way for us to be able to make progress on ensuring equitable access to what’s needed for compute capacity. I’m going to give a little plug to a Canadian initiative in this regard because I can’t be stopped. What we have from our International Development Research Centre in Canada, IDRC, are working with the UK’s Foreign and Commonwealth Development Office that have committed sort of $10 million to the development of an equal compute network that strives to do exactly this. So strives to bring together a number of different partners and a number of different types of partners to think about equitable access to compute capacity. And one of the things that the network really hopes to achieve is by bringing together a number of different sort of partners from the global south together. It allows the possibility to kind of create a critical mass in order to obtain sort of better rates and better processes as they’re looking to establish compute capacity. When you have a number of different countries or a number of different institutions who are speaking together, they have greater power together than they can each individually have on their own. And that’s sort of the value of both the international or the global alliance model and also of the multi-stakeholder model. So it’s a nice little Canadian piece we’ve got.


Fabro Steibel: I like the Canadian piece. We have time for one last question. And one thing I like about Gavi is that they have a political group on how to share the assets. So imagine you buy 100 units of something and they will have to chip in, contribute, find consensus on how to share. So in the case of Gavi, part of it will go for countries that can pay for vaccines. So the model is sustainable. Part of the vaccines will go to countries that cannot pay for a vaccine so there’s access. Part goes to countries that are doing an effort to be more sustainable or to produce vaccines and so on. And all of these are political questions that address how to share. So if you can purchase, you can buy finance. If you know what we are buying, if it is a commodity that we can have it, there’s a political group that will decide on how to share it and mood stakeholder seems like a good approach to do that. So I’ll go for the last question so you can advance in one of the points that you made. Jason, for example, said a call to action in the first question if you want to bring back. If you want to bring from tomatoes to coffee to something else, feel free. And in case you have questions, I have further questions for you. So Jason, what would you like to expand?


Jason Slater: No, thank you. Well, linking it to what you just mentioned there and Gavi, we have, as I see a global digital compact in place, a pack for the future. We have a very clear way forward with those objectives. So that’s my first. That is a multi-stakeholder approach. That was governments, that was tech, that was academia. We all came together. We’re nearly 12 months in and there’s momentum. We under the objective number two regarding digital economy, which links to objective five AI, have a very clear call for solution to call for action in that links to what I mentioned before. We already have an alliance, a global alliance on AI for manufacturing, which has actually three pillars to it, which is one around smart manufacturing, which is not so much about tomatoes and coffee, but it’s when it starts to get a bit harder, you know, on the shop floor and how can you infuse AI in the production process. Then we have our AI lighthouse solutions that I just mentioned. The one that I, the example I gave was the one around coffee. We’re also building up around other products. I’m hoping we collaborate with open AI, by the way. and the third component and that as I mentioned is around digital economy that links it directly back so our mandate in UNIDO is to make sure that we implement what is being committed under the GDC and last but not least I there’s a point that Elena mentioned before that I also didn’t uh that I that I mentioned and you also mentioned in terms of regulation around um 4G 5G etc coming in is this open innovation we also have this program that supports that that again is not it’s not a UNIDO program it’s an open one that we convene we bring together this multi-stakeholder around innovation how can you help those great ideas those startups those innovators and bring corporates together as well and importantly investment there is a clear funding requirement here we come and go projects end but then so what so that’s basically what I just wanted to mention is in terms of this multi-stakeholder around the GDC the aim global and those components I also think as you mentioned there about this model for Gavi we are also trying to make sure there is a sustainable model in place that ensures that these great ideas that’s going to come becomes something that’s investable and sustainable so that it then can be ultimately replicated not just in Ethiopia on coffee but we can take it to Latin America you know tomatoes are grown in most places how can we come to COP and ensure that we bring a solution in place that helps mitigate climate change so that would be my call for action please please join us and we will do our utmost to promote the solutions that people are working on thank you.


Fabro Steibel: Thank you Jason and I was in Bonn last week for the SB 62 and the issue of how to use technology to advance climate agenda and how to make technology greener is top of mind maybe will be a big team for COP 30 this year so Helena moving to you I think we shared the challenges of talking from the civil society point of view And it’s always an interesting point of view, because we’re not government, we’re not companies, we’re kind of bringing issues to the debate. So what topic would you like to advance?


Elena Estavillo Flores: What topic? Well, governance, we have been talking about governance, but we’re supposing that the system already exists and we also need to create and to maintain the necessary incentives to create the model and then to sustain it. And one of it is to produce a model that is credible, that brings certainty and so that people trust it. No, the people trust it, and then we have this necessary trust to keep it together and to keep investment coming. And and the countries that invest in it have also need this, the right combination of of incentives to continue dedicating resources for this. And this this should come from different expectations. One is to to have a fair share of benefits from the model. And also to by the means of trust and credibility to keep believing now in this model that is bringing benefits to to the region. and Benefits for Inclusive Development and Sustainable Development. And that’s why I believe that the role of civil society as a component of this governance that produces trust and credibility is so important.


Fabro Steibel: Thank you. This reminds me that usually governments have an AI national plan for development. If I’m right, we see the Observatory ranked 81 countries that have a plan of action for AI. Brazil just released it last month. And one key thing is what kind of pillars we have in this development. So what Elena brings is that it needs to be multistakeholder. What you bring is that it needs to have open innovation. It has to be shared. And this is really interesting. So, Ivy, I go to you. I think one interesting point of view is that companies are very different from each other. So we think of them like the big techs or something like that, but they’re very different. The Americans are very different from Europeans, very different from Chinese. And if you look at one country, they’re very different. And all of them are trying to bring solutions for bridging the compute power from the perspective. So what point would you like to advance?


Ivy Lau-Schindewolf: Thank you for framing it that way, because I was sitting here thinking, you know, I really am not qualified to tell other people what to do. Right. We’re just one company. I can’t tell what governments want to do, what other companies to do and what all of global South should do. But from the perspective of just one company based in San Francisco, what I think I want to the one call to action, so to speak, is let’s use this technology to build a tool. And I’m here to talk to you about how we can use our tools to solve hard problems. I think, I don’t know if everyone has to worry about getting chips the same way. If all of us can get the benefits to the chips the same way. To accomplish that end is to make our tools accessible. That’s why we have, like I mentioned earlier, an integration with WhatsApp so that it’s workable even in low connectivity settings. We are rolling out open weights models later this summer. You mentioned the Brazil AI plan. And two of the examples that were mentioned in that plan were Favela GPT and Amazon GPT. Favela, you know, we made the tool usable in a lot of favelas. And we also have a partnership with the university and Amazon. So that our tool is enabling conservation and health insights that are already helping residents. And just to help preserve the largest rainforest on the planet. And this is the kind of story that really excites me. That we really, there is so much more to come. And that progress is, you know, it’s happening today, right now. And so let’s think about how we use what exists and what is to come. And to solve hard problems and advance the benefits of LLMs.


Fabro Steibel: Thanks, Ivy. And if you are online and want to post the questions, or if you are in the audience, please make a queue. After Alison’s contributions, we’re going to open the floor for participation.


Alisson O’Beirne: Perfect, thanks. I think, really following on from Ivy’s point, I think that… There is something very important to be said for international action to support equitability of access to compute capacity. I think that there’s a recognition, even among those who already sort of have good access to compute, there’s a recognition of the value of sort of sovereign abilities or sovereign access to compute capacity, even in kind of Western Europe and North America. And so it’s understandable that the Global South also ought to be able to play into that ecosystem, that there also ought to be an equitability of access there. But going beyond equitability of compute access, I think it’s also true that if we don’t have AI tools that are designed responsibly and that respond to the needs of local communities, access is not going to be sufficient. So having access to compute capacity doesn’t mean anything. If we think about equitability of access, we also have to be thinking about equitability of design, designing AI systems and tools that are free from bias, that reflect linguistic diversity, that are climate conscious in the way that they’re created. And then equitability of use as well, designing AI tools that protect the individuals that are really looking to seek the benefits of the use of artificial intelligence, that protect workers, that support development purposes, and that have benefits beyond kind of a small group that would already have access to kind of privileges in that regard. So I think really, as we think about equitability of access, it has to be part of a broader conversation about equitability in the design and the use of AI systems as well.


Fabro Steibel: Thank you, Alison. Let me check if there is anyone online or in the audience that want to make a comment. No? I’ll check here. So we go for a last question. And I think that I like the climate agenda and the relationship with it. And what you bring, Alison, is that compute power is the start of it. And the governments will have a huge role on how to control it or make it safer. make it more secure. And they have to relate. And there’s a huge challenge now for climate, which was a problem already. Now it’s a bigger problem. So as concluding remarks, what would you like to highlight or call to action?


Jason Slater: Again, I just underline what we’ve all in our different aspects been saying about is, you know, collaboration is absolutely critical in this moment now around AI, understanding what the needs of it are, what the computing power of it is, making sure that we don’t leave the global south, that the divide doesn’t get bigger, etc. So my final comment would just be that that, you know, let’s, let’s join this alliance. Because as Stargate mentioned, and by Ivy, as what’s going on now with the AI factory that’s being opened up in South Africa, collaboration between NVIDIA and Cassava, what’s going on in Italy, what’s happening in the country, I just left a few hours ago in Austria with AI Gigafactory. It is a consortium of people that’s coming together. And yes, taking all of those components around the ethics of AI, making sure that this is equitable, that it is transparent, it’s inclusive, it’s collaborative, it’s reliable, it’s safe, and it ensures privacy. Privacy was a big issue on the coffee example. I didn’t mention that before. So that would be my final one is just I could not underline any further than what we’ve all collectively said on all those various levels. All I would offer is enough from perspective of UNIDO, we do have a platform in place, I don’t say we’re happy to help and to support and join forces. Thank you.


Fabro Steibel: Thank you. Elena, do you want to go for


Elena Estavillo Flores: Yes, yes, of course. And I will build upon concluding remarks or highlights? on the same ideas. Because These technologies tend to concentrate and to build a scale, so countries, smaller countries or countries that have smaller access to resources have to collaborate, have to collaborate to attain enough scale to be part of the movement. Otherwise, we will have bigger gaps in our development. And so this collaboration, I believe that is a must right now, just to bridge gaps and to change this mode of development that has produced so many persistent gaps that will get wider. So that’s why collaboration has to be the new mode of development.


Fabro Steibel: Thank you. And I hope collaboration sparks for the global alliance from what is happening, could happen just outside of here. So Ivy, do you want to go for the concluding remarks?


Ivy Lau-Schindewolf: At the risk of just repeating myself and other people, I will actually still say there’s something maybe to the trifecta of political, financial and technical operational partners as the way we think about who should be at the table. So and I think that is necessary in all countries and in all fora. And so that we can truly, truly collaborate and take into account all the equities. Because we’re talking about a really a massive, massive scale of infrastructure and a massive, massive potential of transformation.


Fabro Steibel: Thank you. Alisson.


Alisson O’Beirne: Thank you. Always dangerous to go last for this thing. I think I really, I want to build on the idea of collaboration, which I think a lot of us have talked about today, and I think is super valuable as we’re discussing how to kind of encourage that sort of equitable access to the benefits of artificial intelligence. And one thing that I want to build on that concept of collaboration at the risk of being controversial is the need for collaboration to be in a spirit of openness and in a spirit of listening. And it doesn’t matter what kind of equitability challenge we’re talking about, whether it’s the sort of global south’s compute access, whether we’re talking about linguistic diversity in the internet or in AI, whether we’re talking about in Canada, Indigenous connectivity and Indigenous data sovereignty, when we are in these equitability conversations and when we are thinking about how we collaborate with partners, one of the biggest challenges that we see is that governments are not immune to this. We will often come to the table in a spirit of collaboration, meaning here’s my idea and everyone must agree with it in order for us to collaborate. And I think there really needs to be in a space like AI, where the technology is evolving and where our understanding of the capacities and the understanding of the benefits is evolving. We have to come in a spirit of listening and openness and in a spirit of compromise as well. If we want to have collective action, we are going to have to have compromise and we are going to have to have a recognition of the needs of others and a recognition that we don’t always understand the needs of folks who are outside our own context in our own community. So I think that is one of like, if I have a call to action, it really is to come to collaboration in a spirit of sometimes recognizing that maybe your own positioning is wrong or that you need to adjust your own approach in order to be able to meet the needs of other communities. If we’re not able to do that, then we won’t be able to take collective action on these equitability issues and they can’t be solved without collective action.


Fabro Steibel: Thank you. So, with this, I’ll do some concluding remarks and end the panel. I started the panel wondering if there is a need for a global alliance, and yes, not the global alliance, but many global alliances, a diversity of global alliances, and the global alliances, they’ll have shared problems, but also different communities, so they need to find this collaboration according to their communities. Maybe the community of IGF is different from COP, which is different from G20, and so on, and collaboration, off-collaboration, is really important. I still hope that we can increase the access to compute power in the global South somehow, either installing compute power locally, but or sharing compute power. I still hope that we can share compute powers amongst countries and in a collaboration, so Brazil has a collaboration with Spain, for example, for supercomputers, and I still hope that the issue of information society becomes enhanced by this access to a technology that can be transformative, but can also place risks and challenges. So, thank you very much for the participation, and we conclude. Thank you.


J

Jason Slater

Speech speed

188 words per minute

Speech length

2152 words

Speech time

686 seconds

Compute power is concentrated in only a few nations, creating compute deserts with no connectivity and significant skills gaps

Explanation

Jason argues that AI computing power is concentrated in roughly 30 nations, primarily the US and China, creating significant digital divides. He emphasizes that there are compute deserts with no connectivity and highlights the adoption challenges, particularly in Africa where AI and digital tools adoption is only 25%.


Evidence

Nearly 3 billion people globally are still unconnected; Africa has 25% adoption rate for AI and digital tools


Major discussion point

Barriers to Equitable Access to Computational Power


Topics

Development | Infrastructure


Agreed with

– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Agreed on

Solutions must go beyond hardware infrastructure to include human capacity building


Multi-stakeholder frameworks like UNIDO’s AI for manufacturing alliance demonstrate the value of bringing diverse stakeholders together as trusted conveners

Explanation

Jason describes UNIDO’s AI for manufacturing global alliance launched two years ago, which brings together around 140 members from over 40 countries including academia, think tanks, and private sector companies. He emphasizes the UN’s role as a trusted advisor to convene stakeholders and focus on solution-oriented approaches.


Evidence

AI for manufacturing alliance has 140 members from 40+ countries including Google and Huawei; focuses on supporting manufacturing in developing and middle-income countries


Major discussion point

Lessons from Global Public Goods Initiatives


Topics

Development | Economic


Agreed with

– Ivy Lau-Schindewolf
– Elena Estavillo Flores
– Alisson O’Beirne

Agreed on

Multi-stakeholder collaboration is essential for addressing compute access challenges


Practical solutions like the Ethiopia coffee project show how consortiums can address specific local challenges while building capacity

Explanation

Jason describes a lighthouse solution involving Italy, Ethiopia, Google, and international coffee organizations to help Ethiopian coffee farmers comply with EU deforestation directives using AI. The project demonstrates how multi-stakeholder consortiums can address specific local needs while building AI capacity.


Evidence

Ethiopia is the 5th largest coffee producer globally and #1 in Africa; 3 billion cups of coffee consumed daily; new EU deforestation directive creates compliance challenges; project involved multiple governments, tech companies, and international organizations


Major discussion point

Building Local AI Capacity and Reducing Dependence


Topics

Development | Economic | Infrastructure


Disagreed with

– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Disagreed on

Primary approach to solving compute access – infrastructure vs. access to benefits


The Global Digital Compact provides a clear framework for action through multi-stakeholder approaches linking digital economy and AI objectives

Explanation

Jason emphasizes that the Global Digital Compact endorsed in September provides a clear way forward with specific objectives. He highlights his role in vice-chairing objective number two on inclusive digital economy, which links to objective five on AI, and calls for implementing the commitments made under the compact.


Evidence

Global Digital Compact endorsed in September at UN General Assembly; includes objective 2 on digital economy and objective 5 on AI; involves governments, tech, and academia collaboration


Major discussion point

Governance and Sustainability Models


Topics

Development | Legal and regulatory


I

Ivy Lau-Schindewolf

Speech speed

144 words per minute

Speech length

1923 words

Speech time

796 seconds

The gap between supply and demand affects everyone, with underestimated inference demand creating global GPU shortages

Explanation

Ivy explains that even OpenAI underestimated the demand for inference computing power, initially thinking ChatGPT would be a low-key research preview but ending up with 100 million users in one month and now 500 million weekly active users. She argues that the problem isn’t just inequitable access but that everyone needs more computing power.


Evidence

ChatGPT gained 100 million users in one month; OpenAI now has 500 million weekly active users; CEO posted that ‘GPUs are melting’; inference demand was underestimated compared to training demand


Major discussion point

Barriers to Equitable Access to Computational Power


Topics

Infrastructure | Economic


Multi-sector collaboration is essential, as demonstrated by Stargate’s structure with technology, finance, and political partners

Explanation

Ivy describes Stargate as a $500 billion infrastructure project over four years that requires different types of partners: technology/operations partners (OpenAI, Microsoft, NVIDIA, Oracle, ARM), finance partners (SoftBank), and political partners (state and federal governments). She emphasizes that this multi-stakeholder approach is necessary for large-scale infrastructure projects.


Evidence

Stargate is a $500 billion project over 4 years; involves technology partners (OpenAI, Microsoft, NVIDIA, Oracle, ARM), finance partner (SoftBank), and government partnerships; building data centers in Abilene, Texas


Major discussion point

Lessons from Global Public Goods Initiatives


Topics

Infrastructure | Economic


Agreed with

– Jason Slater
– Elena Estavillo Flores
– Alisson O’Beirne

Agreed on

Multi-stakeholder collaboration is essential for addressing compute access challenges


Disagreed with

– Elena Estavillo Flores

Disagreed on

Role of private sector vs. government investment in compute infrastructure


Cultivating vibrant startup ecosystems and investing in people through education programs are essential beyond just hardware infrastructure

Explanation

Ivy argues that having chips and compute power isn’t sufficient without entrepreneurs and proper incentives for innovation. She emphasizes the importance of investing in people through programs like OpenAI Academy and creating accessible tools that work in low-connectivity settings.


Evidence

OpenAI for countries includes education partnerships with universities and schools; OpenAI Academy has trained 1.4 million people; partnership with WhatsApp for low-connectivity access


Major discussion point

Building Local AI Capacity and Reducing Dependence


Topics

Development | Sociocultural


Agreed with

– Jason Slater
– Elena Estavillo Flores

Agreed on

Solutions must go beyond hardware infrastructure to include human capacity building


Making AI tools accessible through various means, including low-connectivity solutions, can provide benefits without requiring local compute infrastructure

Explanation

Ivy suggests that access to the benefits of compute-enabled AI can be achieved through creative solutions even without local infrastructure. She emphasizes making tools accessible through partnerships like WhatsApp integration and releasing open weights models to enable broader access to AI capabilities.


Evidence

WhatsApp integration for low-connectivity settings; open weights models being released; Brazil AI plan mentions Favela GPT and Amazon GPT as examples of accessible applications


Major discussion point

Governance and Sustainability Models


Topics

Development | Infrastructure


Disagreed with

– Elena Estavillo Flores
– Jason Slater

Disagreed on

Primary approach to solving compute access – infrastructure vs. access to benefits


E

Elena Estavillo Flores

Speech speed

98 words per minute

Speech length

1302 words

Speech time

790 seconds

Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments

Explanation

Elena explains that Latin America faces a reinforcing cycle where lack of basic infrastructure and compute power prevents companies, scientists, and startups from developing region-specific AI solutions. She notes that while the US relies on private investment for compute infrastructure, Latin American governments don’t have sufficient resources for such large investments.


Evidence

In the US, private companies make most compute infrastructure investments; Latin American governments lack resources for large infrastructure investments; creates a reinforcing cycle limiting regional AI development


Major discussion point

Barriers to Equitable Access to Computational Power


Topics

Development | Economic | Infrastructure


Agreed with

– Jason Slater
– Alisson O’Beirne

Agreed on

The compute divide creates self-perpetuating disadvantages that require collective action


Disagreed with

– Ivy Lau-Schindewolf

Disagreed on

Role of private sector vs. government investment in compute infrastructure


Inclusive governance models with meaningful civil society participation ensure fairness over pure technical efficiency

Explanation

Elena emphasizes that successful models like GAVI work because decisions aren’t shaped solely by wealthy nations or corporate interests, but include meaningful multi-stakeholder participation. She argues that civil society plays a critical role in bringing transparency, monitoring, and keeping equity central to decision-making processes.


Evidence

GAVI’s success attributed to inclusive governance preventing domination by small groups of wealthy nations or corporations; civil society provides transparency and monitoring for fair distribution


Major discussion point

Lessons from Global Public Goods Initiatives


Topics

Legal and regulatory | Human rights principles


Agreed with

– Jason Slater
– Ivy Lau-Schindewolf
– Alisson O’Beirne

Agreed on

Multi-stakeholder collaboration is essential for addressing compute access challenges


Local ingenuity and contextual intelligence in resource-constrained environments create opportunities when combined with better infrastructure

Explanation

Elena argues that countries with limited resources have developed ingenuity and contextual intelligence to find solutions, including in AI development using open source and small-scale hybrid models. She sees this as an opportunity where meeting local ingenuity with better infrastructure through collaborative efforts could yield significant results.


Evidence

Researchers and developers in resource-constrained environments are experimenting with open source and small-scale hybrid models; Mexico and other countries develop solutions with limited resources


Major discussion point

Building Local AI Capacity and Reducing Dependence


Topics

Development | Sociocultural


Agreed with

– Jason Slater
– Ivy Lau-Schindewolf

Agreed on

Solutions must go beyond hardware infrastructure to include human capacity building


Credible governance models require trust-building mechanisms and fair benefit-sharing to maintain long-term participation and investment

Explanation

Elena emphasizes that sustainable collaborative models need credibility and trust to maintain participation and continued investment. She argues that countries need the right combination of incentives, including fair benefit-sharing and confidence in the model’s ability to deliver inclusive and sustainable development benefits.


Evidence

Trust and credibility are necessary for maintaining investment and participation; fair benefit-sharing creates proper incentives for continued resource dedication


Major discussion point

Governance and Sustainability Models


Topics

Legal and regulatory | Development


A

Alisson O’Beirne

Speech speed

202 words per minute

Speech length

1596 words

Speech time

473 seconds

Geographic cost differences and market concentration create self-perpetuating disadvantages for emerging economies

Explanation

Alisson explains that the cost of creating compute capacity varies by region due to infrastructure and latency issues, while current compute capacity is concentrated among very few providers who focus on North American and Western European markets. These barriers compound and become self-perpetuating, leaving those already behind further disadvantaged as demand increases in areas that already have capacity.


Evidence

Cost of compute capacity varies by region due to infrastructure and latency; compute capacity concentrated among few providers focused on North American and Western European markets


Major discussion point

Barriers to Equitable Access to Computational Power


Topics

Development | Economic | Infrastructure


Agreed with

– Jason Slater
– Elena Estavillo Flores

Agreed on

The compute divide creates self-perpetuating disadvantages that require collective action


Critical mass through collective action gives countries greater negotiating power than individual efforts

Explanation

Alisson argues that bringing together multiple partners from the Global South creates critical mass that allows for better rates and processes when establishing compute capacity. She emphasizes that countries and institutions have greater power when speaking together than they can achieve individually.


Evidence

Canada’s IDRC and UK’s Foreign and Commonwealth Development Office committed $10 million to equal compute network; network aims to create critical mass for better negotiating power


Major discussion point

Lessons from Global Public Goods Initiatives


Topics

Development | Economic


Multi-stakeholder approaches including diverse partners from public and private sectors ensure Global South voices in AI governance

Explanation

Alisson emphasizes that effective inclusion of Global South voices requires multi-stakeholder approaches that include large and small providers and users, both public and private sectors, including big AI institutions, accelerators, startups, and governments. She advocates for this comprehensive approach to ensure equitable access to compute capacity.


Evidence

Need to include large and small providers/users, public and private sectors, big AI institutions, accelerators, startups, and governments in conversations


Major discussion point

Building Local AI Capacity and Reducing Dependence


Topics

Legal and regulatory | Development


Agreed with

– Jason Slater
– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Agreed on

Multi-stakeholder collaboration is essential for addressing compute access challenges


Equitable access must encompass design and use of AI systems, not just compute capacity, including bias-free and linguistically diverse tools

Explanation

Alisson argues that equitable access goes beyond just compute capacity to include equitable design and use of AI systems. She emphasizes the need for AI tools that are free from bias, reflect linguistic diversity, are climate conscious, protect workers, and support development purposes beyond privileged groups.


Evidence

Need for AI systems free from bias, reflecting linguistic diversity, climate conscious design, worker protection, and broader development benefits


Major discussion point

Governance and Sustainability Models


Topics

Human rights principles | Sociocultural | Development


F

Fabro Steibel

Speech speed

158 words per minute

Speech length

2212 words

Speech time

836 seconds

Brazil has only 1% of global data centers and 0.2% of computational power, highlighting access challenges

Explanation

Fabro presents specific statistics showing Brazil’s limited share of global compute infrastructure, representing half of Latin America’s total. He uses this as evidence of the significant access challenges facing countries in the Global South and the need for solutions to bridge the compute divide.


Evidence

Brazil has 1% of global data centers (half of Latin America’s total) and 0.2% of computational power according to EAA numbers


Major discussion point

Barriers to Equitable Access to Computational Power


Topics

Development | Infrastructure


Political mechanisms for fair distribution of resources are crucial components of successful global alliances

Explanation

Fabro explains that GAVI’s success includes a political group that decides how to share purchased vaccines among different categories of countries – those that can pay, those that cannot pay, and those making sustainability efforts. He emphasizes that these political decisions about fair distribution are essential for any global alliance model.


Evidence

GAVI has three groups: one for funding/accountability, one for technical definitions, and one for distribution decisions; distributes vaccines to paying countries, non-paying countries, and those making sustainability efforts


Major discussion point

Lessons from Global Public Goods Initiatives


Topics

Legal and regulatory | Development


National AI development plans must incorporate multistakeholder governance and open innovation principles

Explanation

Fabro notes that 81 countries have national AI plans according to observatory rankings, with Brazil releasing its plan recently. He emphasizes that these plans need to incorporate multistakeholder governance, open innovation, and sharing mechanisms as key pillars for development.


Evidence

Observatory ranked 81 countries with AI national plans; Brazil released its plan last month; plans need multistakeholder and open innovation pillars


Major discussion point

Building Local AI Capacity and Reducing Dependence


Topics

Legal and regulatory | Development


Collaboration must occur in a spirit of openness and compromise, recognizing diverse community needs across different forums

Explanation

Fabro concludes that multiple global alliances are needed rather than a single one, with different communities requiring different collaborative approaches. He emphasizes that collaboration should be tailored to different forums like IGF, COP, and G20, while maintaining the principle of shared problem-solving across diverse communities.


Evidence

Different communities need different approaches – IGF community differs from COP and G20; Brazil has collaboration with Spain for supercomputers as example of international cooperation


Major discussion point

Governance and Sustainability Models


Topics

Legal and regulatory | Development


Agreements

Agreement points

Multi-stakeholder collaboration is essential for addressing compute access challenges

Speakers

– Jason Slater
– Ivy Lau-Schindewolf
– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Multi-stakeholder frameworks like UNIDO’s AI for manufacturing alliance demonstrate the value of bringing diverse stakeholders together as trusted conveners


Multi-sector collaboration is essential, as demonstrated by Stargate’s structure with technology, finance, and political partners


Inclusive governance models with meaningful civil society participation ensure fairness over pure technical efficiency


Multi-stakeholder approaches including diverse partners from public and private sectors ensure Global South voices in AI governance


Summary

All speakers agreed that addressing compute access requires bringing together diverse stakeholders including governments, private sector, academia, and civil society organizations, with each contributing different capabilities and perspectives


Topics

Development | Legal and regulatory


The compute divide creates self-perpetuating disadvantages that require collective action

Speakers

– Jason Slater
– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Compute power is concentrated in only a few nations, creating compute deserts with no connectivity and significant skills gaps


Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments


Geographic cost differences and market concentration create self-perpetuating disadvantages for emerging economies


Summary

Speakers agreed that the concentration of compute power creates reinforcing cycles of disadvantage where those already behind fall further behind, requiring coordinated intervention to break these patterns


Topics

Development | Economic | Infrastructure


Solutions must go beyond hardware infrastructure to include human capacity building

Speakers

– Jason Slater
– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Arguments

Compute power is concentrated in only a few nations, creating compute deserts with no connectivity and significant skills gaps


Cultivating vibrant startup ecosystems and investing in people through education programs are essential beyond just hardware infrastructure


Local ingenuity and contextual intelligence in resource-constrained environments create opportunities when combined with better infrastructure


Summary

All three speakers emphasized that addressing the compute divide requires investing in people, skills development, and local innovation ecosystems, not just physical infrastructure


Topics

Development | Sociocultural


Similar viewpoints

Both speakers emphasized the critical importance of ensuring Global South voices are meaningfully included in AI governance structures, with Elena focusing on civil society’s role in ensuring fairness and Alisson emphasizing comprehensive multi-stakeholder inclusion

Speakers

– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Inclusive governance models with meaningful civil society participation ensure fairness over pure technical efficiency


Multi-stakeholder approaches including diverse partners from public and private sectors ensure Global South voices in AI governance


Topics

Legal and regulatory | Development


Both speakers provided concrete examples of large-scale collaborative projects that demonstrate how different types of partners (technical, financial, political) must work together to achieve infrastructure goals

Speakers

– Jason Slater
– Ivy Lau-Schindewolf

Arguments

Practical solutions like the Ethiopia coffee project show how consortiums can address specific local challenges while building capacity


Multi-sector collaboration is essential, as demonstrated by Stargate’s structure with technology, finance, and political partners


Topics

Infrastructure | Economic


Both speakers emphasized that sustainable collaborative models require building trust and creating fair mechanisms for participation and benefit-sharing, with collective action providing stronger negotiating positions than individual country efforts

Speakers

– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Credible governance models require trust-building mechanisms and fair benefit-sharing to maintain long-term participation and investment


Critical mass through collective action gives countries greater negotiating power than individual efforts


Topics

Legal and regulatory | Development | Economic


Unexpected consensus

Universal supply and demand gap affecting all regions

Speakers

– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Arguments

The gap between supply and demand affects everyone, with underestimated inference demand creating global GPU shortages


Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments


Explanation

Unexpectedly, both a major AI company representative and a Global South policy expert agreed that the compute shortage is a universal problem rather than just an equity issue, with Ivy noting that even OpenAI faces supply constraints and Elena acknowledging the global nature of insufficient compute power


Topics

Infrastructure | Economic


Importance of local innovation and contextual solutions

Speakers

– Elena Estavillo Flores
– Jason Slater

Arguments

Local ingenuity and contextual intelligence in resource-constrained environments create opportunities when combined with better infrastructure


Practical solutions like the Ethiopia coffee project show how consortiums can address specific local challenges while building capacity


Explanation

There was unexpected consensus between a civil society representative and a UN official on the value of locally-driven innovation, with both emphasizing that solutions must be contextually relevant rather than one-size-fits-all approaches


Topics

Development | Sociocultural


Overall assessment

Summary

The speakers demonstrated remarkably high consensus on the need for multi-stakeholder collaboration, the self-perpetuating nature of the compute divide, and the importance of human capacity building alongside infrastructure development. There was also strong agreement on governance principles emphasizing inclusivity and fairness.


Consensus level

High consensus with complementary perspectives rather than conflicting viewpoints. The speakers represented different sectors (UN, government, private sector, civil society) but shared fundamental agreement on problem diagnosis and solution approaches. This strong consensus suggests viable pathways for implementing global alliance models for AI compute access, with each sector bringing necessary but different capabilities to the collaboration.


Differences

Different viewpoints

Primary approach to solving compute access – infrastructure vs. access to benefits

Speakers

– Ivy Lau-Schindewolf
– Elena Estavillo Flores
– Jason Slater

Arguments

Making AI tools accessible through various means, including low-connectivity solutions, can provide benefits without requiring local compute infrastructure


Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments


Practical solutions like the Ethiopia coffee project show how consortiums can address specific local challenges while building capacity


Summary

Ivy emphasizes making AI tools accessible without necessarily requiring local infrastructure, focusing on creative solutions like WhatsApp integration. Elena and Jason emphasize the need for actual infrastructure development and local capacity building, with Elena particularly stressing the investment challenges in Latin America.


Topics

Development | Infrastructure | Economic


Role of private sector vs. government investment in compute infrastructure

Speakers

– Ivy Lau-Schindewolf
– Elena Estavillo Flores

Arguments

Multi-sector collaboration is essential, as demonstrated by Stargate’s structure with technology, finance, and political partners


Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments


Summary

Ivy presents a model where private sector leads with companies like OpenAI, Microsoft, and SoftBank taking primary roles, while Elena argues that Latin America lacks sufficient private investment and governments don’t have adequate resources, suggesting need for different collaborative models.


Topics

Economic | Development | Infrastructure


Unexpected differences

Framing of the core problem – supply shortage vs. access inequality

Speakers

– Ivy Lau-Schindewolf
– Elena Estavillo Flores
– Fabro Steibel

Arguments

The gap between supply and demand affects everyone, with underestimated inference demand creating global GPU shortages


Infrastructure barriers are compounded by lack of private investment in Latin America, where governments lack sufficient resources for necessary investments


Brazil has only 1% of global data centers and 0.2% of computational power, highlighting access challenges


Explanation

Unexpectedly, there’s disagreement on whether the fundamental issue is global supply shortage (Ivy’s position) versus unequal distribution and access (Elena and Fabro’s position). This is significant because it affects whether solutions should focus on increasing overall supply or redistributing existing capacity.


Topics

Infrastructure | Economic | Development


Overall assessment

Summary

The main areas of disagreement center on: 1) Whether to prioritize infrastructure development vs. tool accessibility, 2) The appropriate balance between private sector leadership vs. government/multilateral coordination, and 3) Whether the core problem is supply shortage vs. access inequality


Disagreement level

Low to moderate disagreement level. While speakers have different emphases and approaches, they share fundamental agreement on the need for collaboration and addressing compute access challenges. The disagreements are more about strategy and implementation rather than fundamental goals, which suggests potential for finding common ground and complementary approaches rather than conflicting solutions.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasized the critical importance of ensuring Global South voices are meaningfully included in AI governance structures, with Elena focusing on civil society’s role in ensuring fairness and Alisson emphasizing comprehensive multi-stakeholder inclusion

Speakers

– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Inclusive governance models with meaningful civil society participation ensure fairness over pure technical efficiency


Multi-stakeholder approaches including diverse partners from public and private sectors ensure Global South voices in AI governance


Topics

Legal and regulatory | Development


Both speakers provided concrete examples of large-scale collaborative projects that demonstrate how different types of partners (technical, financial, political) must work together to achieve infrastructure goals

Speakers

– Jason Slater
– Ivy Lau-Schindewolf

Arguments

Practical solutions like the Ethiopia coffee project show how consortiums can address specific local challenges while building capacity


Multi-sector collaboration is essential, as demonstrated by Stargate’s structure with technology, finance, and political partners


Topics

Infrastructure | Economic


Both speakers emphasized that sustainable collaborative models require building trust and creating fair mechanisms for participation and benefit-sharing, with collective action providing stronger negotiating positions than individual country efforts

Speakers

– Elena Estavillo Flores
– Alisson O’Beirne

Arguments

Credible governance models require trust-building mechanisms and fair benefit-sharing to maintain long-term participation and investment


Critical mass through collective action gives countries greater negotiating power than individual efforts


Topics

Legal and regulatory | Development | Economic


Takeaways

Key takeaways

There is a critical need for multiple global alliances for AI compute access, similar to GAVI’s model for vaccines, but adapted to different communities and contexts


The compute divide is both a supply problem (insufficient global capacity) and an access problem (inequitable distribution), affecting even developed nations


Multi-stakeholder collaboration involving technology, finance, and political partners is essential for addressing compute access challenges


Local capacity building must go beyond infrastructure to include skills development, startup ecosystems, and culturally relevant AI solutions


Equitable access encompasses not just compute power but also equitable design and use of AI systems that reflect linguistic diversity and local needs


Alternative approaches like remote compute access and tool accessibility can provide AI benefits without requiring local infrastructure investment


Civil society plays a crucial role in ensuring governance models remain credible, transparent, and focused on fair benefit distribution


Successful collaboration requires openness, compromise, and recognition of diverse community needs rather than imposing single solutions


Resolutions and action items

Jason Slater called for joining UNIDO’s existing AI for manufacturing global alliance with 140 members from 40+ countries


Participants encouraged to engage with the Global Digital Compact framework for implementing multi-stakeholder AI solutions


OpenAI committed to expanding their ‘OpenAI for countries’ program and Academy training (already reaching 1.4 million people)


Canada’s IDRC and UK’s Foreign Commonwealth Development Office committed $10 million to develop an ‘equal compute network’


UNIDO to continue developing AI lighthouse solutions beyond the Ethiopia coffee project to other regions and use cases


Participants agreed to explore replicating successful consortium models like Stargate for international compute infrastructure projects


Unresolved issues

How to quantify actual compute demand versus perceived need in different regions and sectors


Specific mechanisms for fair distribution of compute resources among participating countries in a global alliance


Sustainable financing models that balance private investment with public sector participation in developing countries


Technical standards and interoperability requirements for shared compute infrastructure across borders


Governance structures that can effectively balance efficiency with equity in resource allocation decisions


How to address the climate impact of increased compute infrastructure while meeting development needs


Specific metrics and accountability mechanisms for measuring equitable access and benefit distribution


Integration challenges between different national AI development plans and international collaboration frameworks


Suggested compromises

Accepting that not every country needs local compute infrastructure if they can access benefits through remote processing and tool accessibility


Balancing market-driven efficiency with equity considerations through hybrid public-private partnership models


Combining infrastructure investment with people-focused programs (education, startups, local innovation) rather than hardware-only approaches


Allowing for diverse governance models across different regional alliances while maintaining interoperability and shared principles


Recognizing that collaboration requires adjusting individual country positions and approaches to meet collective needs


Accepting that multiple global alliances may be needed for different communities rather than seeking one universal solution


Integrating climate considerations with development needs rather than treating them as competing priorities


Thought provoking comments

The problem isn’t just inequitable access. The problem is everyone needs more. How do we solve for the gap between supply and demand everywhere?

Speaker

Ivy Lau-Schindewolf


Reason

This comment fundamentally reframed the entire discussion by challenging the basic assumption that the issue is primarily about distribution of existing resources. Instead, it highlighted that even developed nations face compute scarcity, shifting the focus from a North-South divide to a universal supply-demand crisis.


Impact

This reframing influenced subsequent speakers to acknowledge the dual nature of the problem – both scarcity and inequitable access. It moved the conversation away from a simple redistribution model toward more complex solutions involving capacity building and creative access mechanisms.


We don’t have enough access to basic infrastructure… But then this comes over all of this, the companies, the scientists, the academia, the startups that could produce more services, more AI. They have this barrier because there’s not enough compute power so that they can develop the AI that is focused on the region, culture, needs… So this is just something, it’s like a circle that keeps reinforcing itself.

Speaker

Elena Estavillo Flores


Reason

This insight identified the self-perpetuating nature of the compute divide, showing how lack of access creates a vicious cycle that prevents local innovation and cultural adaptation of AI technologies. It connected infrastructure gaps to broader issues of technological sovereignty and cultural representation.


Impact

This comment deepened the discussion by introducing the concept of compound disadvantages and helped other panelists recognize that the problem extends beyond mere access to include innovation capacity and cultural relevance. It influenced later discussions about the need for local talent development and community-driven research.


Given that we don’t have many resources, so then we have managed to develop ingenuity and contextual intelligence to find solutions with very limited resources… if this ingenuity is met with more infrastructure… then there is an opportunity to meeting ingenuity with infrastructure.

Speaker

Elena Estavillo Flores


Reason

This comment flipped the narrative from deficit-focused to asset-based thinking, highlighting how resource constraints in the Global South have fostered innovation and creativity. It suggested that the solution isn’t just about providing resources but about amplifying existing capabilities.


Impact

This perspective shift influenced the conversation to consider Global South countries not just as recipients of aid but as sources of innovation. It contributed to a more nuanced understanding of collaboration that values different forms of intelligence and problem-solving approaches.


Some of those barriers are not only complex, but they’re also, they’re compounding, they’re self-perpetuating. So as folks are left behind and as there’s a lack in compute capacity… those that are already behind the game are going to be left further and further behind because as the demand increases in those places that already have compute capacity, we’re going to see just a continuation of response to that instead of a more equitable approach.

Speaker

Alisson O’Beirne


Reason

This comment introduced a temporal dimension to the inequality problem, showing how current disparities will exponentially worsen over time without intervention. It highlighted the urgency of action and the inadequacy of market-based solutions alone.


Impact

This insight reinforced the need for proactive international cooperation and helped justify why market forces alone cannot solve the equity problem. It strengthened arguments for coordinated global action and influenced the discussion toward more interventionist approaches.


Going beyond equitability of compute access… if we don’t have AI tools that are designed responsibly and that respond to the needs of local communities, access is not going to be sufficient. So having access to compute capacity doesn’t mean anything. If we think about equitability of access, we also have to be thinking about equitability of design… and equitability of use as well.

Speaker

Alisson O’Beirne


Reason

This comment expanded the scope of the discussion beyond infrastructure to include the entire AI development and deployment pipeline. It introduced the concept that true equity requires consideration of design, cultural relevance, and end-user needs, not just computational resources.


Impact

This broadened the conversation significantly, moving from a narrow focus on compute resources to a holistic view of AI equity. It influenced other speakers to consider the full ecosystem of AI development and helped establish that technical solutions alone are insufficient without addressing social and cultural dimensions.


We have to come in a spirit of listening and openness and in a spirit of compromise as well… We are going to have to have a recognition of the needs of others and a recognition that we don’t always understand the needs of folks who are outside our own context in our own community.

Speaker

Alisson O’Beirne


Reason

This comment addressed the meta-challenge of how to actually achieve meaningful collaboration, acknowledging that good intentions aren’t enough and that successful partnerships require humility and genuine openness to different perspectives and needs.


Impact

This served as a crucial reality check for the entire discussion, grounding the technical and policy conversations in the practical challenges of cross-cultural and cross-sector collaboration. It provided a framework for how the proposed global alliances should actually operate.


Overall assessment

These key comments fundamentally transformed the discussion from a relatively straightforward resource allocation problem into a complex, multi-dimensional challenge requiring systemic thinking. The conversation evolved from initial assumptions about redistribution of existing compute resources to a more sophisticated understanding that encompasses supply creation, cultural adaptation, innovation ecosystems, and collaborative governance. The most impactful insights came from reframing the problem (universal scarcity vs. just inequity), recognizing systemic barriers (self-reinforcing cycles), and identifying assets in unexpected places (Global South ingenuity). These comments collectively elevated the discussion from technical solutions to broader questions of equity, sovereignty, and sustainable development, ultimately making the case for why simple technology transfer is insufficient and why genuine partnership and systemic change are necessary.


Follow-up questions

How much compute demand do countries really need and can this be quantified?

Speaker

Ivy Lau-Schindewolf


Explanation

OpenAI has received outreach from countries asking for help quantifying their actual compute needs, indicating this is a critical gap in understanding that affects planning and resource allocation


How can we measure and address the gap between supply and demand for compute power globally?

Speaker

Ivy Lau-Schindewolf


Explanation

Even developed countries like the US are struggling with compute shortages, suggesting the problem extends beyond just inequitable distribution to overall supply constraints


What are the most effective mechanisms for ensuring fair distribution of compute resources while maintaining technical efficiency?

Speaker

Elena Estavillo Flores


Explanation

There’s a need to balance technical optimization with social fairness in compute distribution, requiring research into governance models that can achieve both goals


How can we design corrective mechanisms to address historic inequalities in compute access?

Speaker

Elena Estavillo Flores


Explanation

Historical digital divides are compounding with AI compute divides, requiring specific interventions to prevent further marginalization of already disadvantaged regions


What is the optimal balance between local compute infrastructure and remote access to compute resources?

Speaker

Fabro Steibel


Explanation

The discussion raised questions about whether countries need local compute capacity or if remote access through partnerships (like Brazil-Spain collaboration) could be sufficient


How can we better integrate private sector investment with government resources for compute infrastructure in developing countries?

Speaker

Elena Estavillo Flores


Explanation

Government resources alone are insufficient for the massive investments needed, requiring research into public-private partnership models for compute infrastructure


What are the most effective ways to cultivate local startup ecosystems and entrepreneurship around AI in the Global South?

Speaker

Ivy Lau-Schindewolf


Explanation

Access to compute infrastructure alone is insufficient without local innovation ecosystems to utilize it effectively


How can we measure and replicate the ‘ingenuity with limited resources’ innovations happening in the Global South?

Speaker

Elena Estavillo Flores


Explanation

There’s recognition that resource constraints are driving innovation in the Global South, but more research is needed on how to scale and support these approaches


What are the most effective models for multi-stakeholder governance in global compute resource allocation?

Speaker

Alisson O’Beirne


Explanation

The complexity of compute resource allocation requires bringing together diverse stakeholders, but the optimal governance structures need further development


How can we ensure AI tools are designed to reflect linguistic diversity and local community needs?

Speaker

Alisson O’Beirne


Explanation

Equitable access to compute must be coupled with equitable design of AI systems, requiring research into inclusive AI development practices


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Lightning Talk #91 Inclusion of the Global Majority in C2pa Technology

Lightning Talk #91 Inclusion of the Global Majority in C2pa Technology

Session at a glance

Summary

This discussion focused on C2PA (Coalition for Content Provenance and Authenticity), an open standard for content authenticity and provenance, presented by BBC Media Action and BBC R&D representatives along with international media partners. Muge Ozkaptan from BBC Media Action introduced the session, explaining how their organization supports media outlets in 30 countries with digital transformation and AI adoption, particularly through their “Pursuit of Truth” initiative supporting 30,000 media professionals and 1,000 media outlets in fragile environments.


Charlie Halford from BBC R&D explained that C2PA addresses the growing problem of disinformation by attaching cryptographic signatures to content, similar to website security certificates, allowing users to verify the origin and authenticity of media. He demonstrated how fake BBC content has been created simply by adding BBC logos and graphics to misleading information, highlighting the need for content verification technology. The BBC’s research showed that when audiences were provided with C2PA transparency data about content origins, they demonstrated significantly higher trust levels, particularly among users who weren’t regular BBC website visitors.


International perspectives came from media partners facing real-world challenges with disinformation. Khalifa Said Rashid from Tanzania’s Chanzo digital outlet described problems with brand impersonation and out-of-context video content being recycled during crisis situations. Kyrylo Lesin from Ukraine’s Suspilne public service media explained how they face aggressive disinformation campaigns, particularly since Russia’s invasion, and view C2PA as crucial for helping audiences distinguish trustworthy content from other sources.


The discussion concluded with recognition that broader adoption requires platform support, improved media literacy, and continued development of security procedures and AI content labeling capabilities.


Keypoints

**Major Discussion Points:**


– **C2PA Technology Overview and Implementation**: Charlie Halford explained C2PA (Coalition for Content Provenance and Authenticity) as an open standard that uses cryptographic signatures to verify content authenticity and origin. The BBC has been piloting this technology, attaching verification data to content to help audiences distinguish genuine news from disinformation.


– **Global Disinformation Challenges**: Multiple speakers highlighted how media organizations worldwide face brand impersonation and content manipulation. Examples included fake BBC-branded content and recycled videos taken out of context during crises, particularly affecting outlets in Tanzania and Ukraine during wartime.


– **Media Literacy and User Trust Research**: The BBC conducted studies showing that when audiences were provided with C2PA provenance data, they demonstrated significantly higher trust levels in the content, especially among users who weren’t already familiar with the BBC brand.


– **Platform Adoption and AI Content Labeling**: Discussion covered how social media platforms like TikTok are beginning to integrate C2PA standards, particularly for detecting and labeling AI-generated content from tools like OpenAI, though broader adoption across platforms remains limited.


– **Barriers to Global Implementation**: Key challenges identified include the need for device-level integration, security procedures for private key management, platform cooperation, and extensive media literacy education to help users understand and utilize provenance information effectively.


**Overall Purpose:**


The discussion aimed to present C2PA as a promising solution for combating disinformation and building content authenticity, while gathering insights from international media partners about practical implementation challenges and needs in diverse global contexts.


**Overall Tone:**


The tone was consistently optimistic and collaborative throughout. Speakers maintained an educational and forward-looking approach, acknowledging current limitations while expressing confidence in the technology’s potential. The discussion emphasized partnership and collective action rather than dwelling on problems, with participants sharing practical experiences and research findings in a constructive manner.


Speakers

– **Muge Ozkaptan** – Senior Product and AI Lead at BBC Media Action, supports country offices and media organizations for digital transformation and AI adoption with focus on responsible and ethical approaches


– **Charlie Halford** – Principal Research Engineer at BBC R&D, works on C2PA technology implementation and content authenticity solutions


– **Khalifa Said Rashid** – Editor-in-Chief of the Chanzo, a digital media platform in Tanzania focusing on public interest journalism, public accountability and investigation


– **Kyrylo Lesin** – Senior Product Manager at Suspilne (public service media from Ukraine), works on digital transformation and journalism delivery


– **Audience** – Participant asking questions during the Q&A session


**Additional speakers:**


– **Amy Mitchell** – From Center for News Technology Innovation, researcher focusing on public service aspects of news technology


Full session report

# Comprehensive Discussion Report: C2PA Technology for Content Authenticity and Global Media Challenges


## Introduction and Context


This discussion centred on the Coalition for Content Provenance and Authenticity (C2PA), an open standard for content authenticity and provenance, presented by representatives from BBC Media Action and BBC R&D alongside international media partners. The session brought together diverse perspectives from global media organisations to examine how technological solutions can address the growing challenges of disinformation and content manipulation.


Muge Ozkaptan from BBC Media Action opened the session by establishing the organisation’s global reach and mission. BBC Media Action operates in 30 countries with content in 50 languages, focusing particularly on supporting media organisations in fragile environments. Ozkaptan emphasised the importance of bringing diverse voices into technology discussions, noting that “when we talk about technology generally, we talk about specification and applications, but it’s important that bringing those diverse voices and understand their actual needs, how they work, what kind of challenges that they are facing in their day-to-day life and work, and how C2PA innovation solutions like C2PA can fit in that area.”


## Technical Overview of C2PA Technology


Charlie Halford from BBC R&D provided a comprehensive explanation of C2PA technology and its implementation. As Halford explained, “C2PA itself is a standard, a technical standard. And what it does is it describes how you attach a signature, a cryptographic signature, the same kind that you might use on a website to give it that green lock.” The technology addresses the growing problem of disinformation by attaching verification data to content, allowing users to confirm the origin and authenticity of media they encounter.


Halford demonstrated the practical challenges facing media organisations by showing examples of fake BBC content. He explained that sophisticated artificial intelligence isn’t always necessary for effective disinformation: “These aren’t pieces of AI disinformation. This is just somebody with a video editor. They found the BBC logo. They found the BBC font. They know what the BBC’s graphics look like. And they’ve put out what the footage underneath them isn’t fake. They’ve just changed the message.” This observation highlighted how simple brand impersonation can be highly effective in misleading audiences who trust established media brands.


The BBC has conducted research into C2PA implementation, working with partners including IPTC for publisher certificates. The technology currently works with existing software and tools, including various cameras and content creation applications. Halford also explained the concept of “redaction” within C2PA systems, which allows for the removal of sensitive information like location and time data that could endanger subjects or photographers while maintaining content authenticity verification.


## Global Perspectives on Disinformation Challenges


### Tanzania: Brand Impersonation and Crisis Communication


Khalifa Said Rashid, Editor-in-Chief of the Chanzo, a digital media platform in Tanzania focusing on public interest journalism and accountability, provided crucial insights via recorded audio about the challenges facing media organisations in developing countries. The Chanzo struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content regularly.


Rashid explained the particular vulnerability that brand trust creates: “And it have been very difficult for us to deal with a situation like that because many people trust our brand and when they see content online with our logos and brand colours, they can be very difficult for average reader to tell whether it’s real or not.” This perspective illustrated how established media brands become targets for manipulation precisely because of the trust they have built with their audiences.


### Ukraine: Wartime Disinformation and Hybrid Warfare


Kyrylo Lesin, Senior Product Manager at Suspilne, Ukraine’s public service media, brought a unique perspective shaped by operating under wartime conditions. Suspilne, established eight years ago and recognised by independent watchdog organisations for delivering trustworthy journalism, faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since Russia’s invasion.


Lesin highlighted how disinformation campaigns affect content distribution systems: “For example, as Google discover all of these products, they operate, at some extent, as black boxes, and there are really lack of signals and parameters they can embrace to arrange the content with the most value for the end user.” This observation introduced an important dimension to the C2PA discussion—the potential for authenticity signals to influence algorithmic content distribution, helping platforms prioritise trustworthy content over manipulated material.


## Research Findings and Platform Implementation


The BBC’s research into user response to C2PA technology has involved multiple studies with different methodologies. Charlie Halford presented findings showing that users respond positively to additional transparency data, with research indicating that around 80% of users found extra data more useful, even without recognising the C2PA brand specifically. This finding was particularly significant because it suggested that the mere presence of verification information builds trust, regardless of technical literacy or brand recognition.


A separate study conducted by the University of Bergen expanded on the BBC’s research, providing additional validation of user interest in content authenticity features. However, as Amy Mitchell from the Center for News Technology Innovation pointed out, important questions remain about the distinction between user interest in authenticity features versus actual behavioural change in content consumption patterns.


Regarding platform adoption, Halford reported mixed progress. Social media platforms show positive but limited response, primarily adopting C2PA for AI-generated content labelling rather than general content verification. TikTok, for example, has begun integrating C2PA standards, particularly for detecting and labelling AI-generated content from tools like OpenAI and Microsoft, though broader adoption across platforms remains limited.


Major technology companies including Adobe, Microsoft, Google, Meta, and OpenAI are part of the C2PA coalition, and the technology works with existing software and cameras currently available. However, broader implementation faces several challenges, including the need for device-level integration, security procedures for private key management, platform cooperation, and extensive media literacy education.


## Implementation Challenges and Media Literacy


Despite the consensus on C2PA’s value, speakers identified several significant barriers to global implementation. Media literacy education emerged as a crucial requirement, with Charlie Halford noting that “you can’t just put this information in front of people and expect them to understand it so we have to use our products we have to use our journalism to explain to people what this means.”


The discussion revealed that while users respond positively to transparency data, C2PA as a brand lacks public recognition. This creates a challenge for implementation, as the technology’s effectiveness depends partly on user understanding and trust in the verification system itself.


Technical implementation challenges include the need for broader device and tool integration to make C2PA automatic rather than requiring special procedures. Media organisations also need to develop robust security procedures for managing the private keys required for C2PA implementation, ensuring the integrity and trustworthiness of the system.


## Audience Engagement and Future Development


The session included interactive elements, with audience participation facilitated through Slido Q&A system and QR codes for real-time questions. Participants raised important questions about regulatory integration, asking about plans for integrating C2PA into existing regulations for information integrity such as the EU Digital Services Act or UK Online Safety Act.


The discussion concluded with several concrete action items and future development plans. BBC Media Action committed to continuing support for global media organisations through workshops and conversations to include diverse voices in C2PA development. A pilot implementation is planned between BBC and Suspilne to integrate C2PA into end-to-end web publishing processes, providing a practical test case for the technology in a challenging operational environment.


## Ongoing Challenges and Considerations


Several significant issues remain unresolved and require continued attention. Limited social media platform adoption beyond AI content labelling represents a major challenge, as platforms show mixed response to general content verification features. The lack of public recognition of the C2PA brand itself requires significant media literacy education efforts to achieve meaningful adoption.


The challenge of scaling adoption across diverse media environments with varying technical capabilities remains substantial. Implementation needs to account for different levels of technical infrastructure and resources available to media organisations in different regions.


There are also ongoing questions about achieving broader device and tool adoption so that C2PA becomes built into cameras and content creation tools by default, making the technology seamless rather than requiring special technical knowledge from users. Additionally, the need for better AI-generated content detection and improved reliability of AI labelling in C2PA was acknowledged, as current AI detection methods are not completely reliable.


## Conclusion


The discussion demonstrated strong consensus among diverse stakeholders about the value of C2PA technology for addressing global challenges in content authenticity and disinformation. The perspectives from media organisations operating in different contexts—from the BBC’s established presence to the Chanzo’s work in Tanzania to Suspilne’s wartime operations—illustrated both universal challenges and context-specific needs.


The conversation successfully balanced technical capabilities with practical implementation concerns, emphasising that successful C2PA adoption requires not just technical standards but also media literacy education, platform cooperation, and understanding of diverse global media environments. The planned pilot implementations and continued research efforts indicate positive momentum towards broader adoption of content authenticity standards in the global media landscape.


Session transcript

Muge Ozkaptan: Let me see who is here. Hello everyone, I’m Muge Ozkaptan, Senior Product and AI Lead at BBC Media Action. And I support our country offices and media organisations for their digital transformation and AI adoption, especially for responsible and ethical point of view. We also support the innovation solutions including C2PA, being sure that it’s scalable, practical and impactful. So I’d like to introduce my colleagues from the BBC, Charlie Halford, which is Principal Research Engineer at the BBC R&D, and we have Krylo Iesin, he’s a Senior Product Manager, and we also have Khalifa Said Rashid, who is Editor-in-Chief from the Chanso, the Chanso is a digital outlet in Tanzania. He couldn’t come here today, but he’s attending through a recorded audio, and we will hear from him about his thoughts about C2PA. I’d like to talk about BBC Media Action a little bit, and then BBC Media Action’s approach on C2PA, and then I will hand over to Charlie, and then Charlie will talk about what is C2PA in detail and in action, and how the BBC is using it. And then we will hear from our media partners, Suspine and the Chanso, about their reflections and needs around C2PA. We will have some Q&A at the end, but if you’d like to join online, we have Slido, so you can see the QR code on the screen, and also you can type 3710912 for your questions, or you can ask it directly here. So BBC Media Action is BBC’s international charity, we work in 30 countries, and co-create content in 50 languages. We are fully funded by donors and our supporters. We are a front line of the global challenges like disinformation, and also declassification and violating public trust. We support media organisations, media professionals to enhance their abilities, make them more strengthened, resilient for fragile environments. And we believe that C2PA is a very crucial, very important development in the open standards, and we are really interested in being part of these global conversations from now on. And C2PA is an open standard for content authenticity and prominence, offers one promising approach to help audiences verify where the content comes from and how or where it’s altered. We believe that including the voices from the global majority to make these standards more applicable and relevant to the global audience. When we talk about technology generally, we talk about specification and applications, but it’s important that bringing those diverse voices and understand their actual needs, how they work, what kind of challenges that they are facing in their day-to-day life and work, and how C2PA innovation solutions like C2PA can fit in that area. So this is where we are focusing on. And at BBC Media Action, we launched an initiative called Pursuit of Truth. We are supporting a cohort of 30,000 media professionals and 1,000 vital media outlets, especially work and serve audiences in fragile environments. And as part of this commitment, we want to provide tools, technology, and innovation solutions for them to gather the facts and deal with the external pressures and give a platform to diverse voices. And C2PA is sitting perfectly in that branch, including other open standards in that field. And also draw on world-class expertise and innovation to advance the ethical use of AI and content verification in media around the world. And we are also providing a big commitment to supporting research to understand how this information spreads and how to respond it more effectively. So I want to hand over to Charlie. So Charlie, what is C2PA in action and how the BBC is using it?


Charlie Halford: Thank you very much. Hello, everybody. Yes, I’m Charlie, as Miguel has let you all know by now. So yeah, I’m just going to take you through what C2PA is, how we’re using it at the BBC, and how we’d love to see C2PA adopted, I guess, around the world and across the media ecosystem. And some of the challenges that we see in that area and how maybe we can all work together to make it work. So let’s first start with part of our problem. So these are three examples of disinformation that have had the BBC logo attached to them. These aren’t pieces of AI disinformation. This is just somebody with a video editor. They found the BBC logo. They found the BBC font. They know what the BBC’s graphics look like. And they’ve put out what the footage underneath them isn’t fake. They’ve just changed the message. They’ve changed the message. They’ve put something on there that the BBC hasn’t published. And so this kind of problem is the one that we really wanted to address with C2PA. So when the origin of content is really hidden, maybe on a social media platform, all content can look the same. You might think all content is equally trustworthy. So in this world of disinformation, as a group of media organizations and other people across the world, how can our commitment to accuracy make a difference? So that was one of the problems that we tried to think about when we were looking at creating a new technology in BBC research and development. So what are some of the others? So answering this question, is the media I see genuine or authentic is the general thing we’re trying to solve. So we know that there’s no real way to securely understand what or who created a piece of content. The existing metadata that we have, which can be really useful, is very easily faked. Anybody can add to it. Anybody can manipulate it. The media itself, as we just saw, is very easily manipulated, and there’s no guarantee that it’s original. And there’s no clear way, if you wanted to see it, to understand the journey of that content. What’s happened to it when it’s left the camera? Who’s changed it? Who’s added what? Who’s modified what? And so C2PA was really created to address some of those problems. These are some of the people that were involved, and it’s really grown to be a pretty huge coalition at this point. So you can see along the top there, I’ve included some of the tech companies and product organizations in there. So Adobe are a huge driver in this, but so are Microsoft, Google, Meta, OpenAI, Sony, all part of the C2PA board. And then I’ve added some of the news organizations that are getting involved, because this problem is one that we’re really trying to solve. So WDR, BBC, CBC, Radio Canada, AFP, France TV. Many people are involved in this process. There’s many more on that list that I’ve not added. So I just wanted to do a…before I get into this in detail, understand how many people in our audience here are sort of technical, have a technical background? Yeah, got a few people there. So C2PA itself is a standard, a technical standard. And what it does is it describes how you attach a signature, a cryptographic signature, the same kind that you might use on a website to give it that green lock. How you attach that cryptographic signature to a piece of content. So it goes inside a file and binds to the image or the video or the audio to let you understand where that piece of content has come from. So we use a hash to link it to the video and the audio, and we then use a signature across that. So when we started working on this, we tried to understand, we wanted to ask our users if this kind of thing makes sense. makes an actual difference. And so we’ve run a few studies. There’s recently been one run, I think, by the University of Bergen that’s expanded on this. But when we did it, we asked people, we gave them two sets of content, the same kind of content, and then one had no provenance on it, the other one had this C2PA data on it, and we said, do you trust, what’s your level of trust in each of these pieces of content? And the significant one there was that when we added extra transparency data, when we told people where this stuff had come from, they were more inclined to trust that content. And the important thing for other media organizations here is it was the people that didn’t use our website already that were the most affected by that. And so we then ran a trial. So this is a piece of content. We ran, that came into our verification team, BBC Verify. They then did manual verification checks. And what we wanted to do is take the output of their verification checks and add it into the content, so attach it to the content, and then we showed that to our audiences. We did that with about five pieces of content as our trial. Gives you much more detail when you click that blue button to expand it. And we did the same thing. We asked people if they would find it more trustworthy, and they came back about, I think it was about 80% of the people said they found that piece of content, that extra data more useful, and it added more trust to the story. And then what we’ve also been doing is working with an organization called the IPTC to establish a way for publishers to get a certificate that proves who they are, so that people can’t impersonate you. So the BBC or AFP, in this example, gets a certificate from GlobalSign. They send it to the IPTC, and then we add that to a list of not trusted organizations. It’s actually just verified organizations, organizations whose identity has been verified. So if you wanted to know how can you use it now, all of these pieces of software, and in some cases cameras, are available right now to make use of it. So if any of these are in use by you today, I’d encourage you to go and check them out. More are being developed. And with that, who are we handing to first?


Muge Ozkaptan: Yeah. We’ve been close to working with the BBC since last year, and we included the diverse voices from our partners to the workshops and the global conversations. And we want to show you one of the talks from the Chanzo Editor-in-Chief Khalifa Said Rashid is sharing with us about his challenges in Tanzania around mis-disinformation and how the C2PA is relevant to his work.


Khalifa Said Rashid: Hello. My name is Khalifa Said Rashid. I am the Editor-in-Chief of the Chanzo. The Chanzo is a digital media platform based here in Jerusalem, Tanzania, focusing on public interest journalism and public accountability and investigation. The major problem that we face here in Tanzania with regard to misinformation and disinformation includes but not limited to impersonification of brands, a phenomenon that have affected many media outlets here in Tanzania, including the Chanzo, where we have been forced on numerous accounts to come to public and deny the content that have been shared on social media platform, impersonating our brands. And it have been very difficult for us to deal with a situation like that because many people trust our brand and when they see content online with our logos and brand colors, they can be very difficult for average reader to tell whether it’s real or not. But another types of disinformation or misinformation is we have seen, especially during the time of crisis, for example, all the video taken out of context resurfaced on social media, purported to be about the events that are happening during that week or day. And we have been battling with these problems where you have multiple media outlets in Tanzania, which have produced a number of content, it may be two or three years ago, but they are not dated. And when, if for example, they are related to demonstrations or protest, and if there is a protest on that day, this video resurfaces on social media, purporting it to be happening on that day. And so in this context, we are very optimistic that a technology like C2PA offers such a huge potential for us as editors and journalists to counter misinformation and disinformation because it allows the user to tell if the content is real or not because the technology allows media content in partnership with the platforms like Twitter, and now Facebook and others to sign their content that allows users to tell that this is really from the chance or this is really from this particular media outlet and not an impersonation. And of course, we are also happy to work with the BBC Media Action, which is helping us better understand this technology and apply it in our day-to-day operations. Thank you, but goodbye.


Muge Ozkaptan: Well, thank you, Khalifa. I want to turn to you, Krylo. And can you talk about Suspilne a little bit? Who is Suspilne and what do you do? And what are your challenges? And then what do you think about C2PA in your day-to-day work? Why is it relevant to you?


Kyrylo Lesin: Yeah, thank you, Mirko. Hello, everyone. So I represent Suspilne. This is public service media from Ukraine. It was established as an independent media institution eight years ago. And since that time, specifically five years ago, we started intense digital transformation. And there are a lot of outputs of this process, like organizational, content-wise, and BBC Media Action and other partners invest a lot of their time and resources to support us on this journey. And specifically, five years ago, our flagship digital news platform was launched. It is called Suspilne.media, and you can access it through any browser. And using this platform and our other digital channels, we deliver high-quality journalism. What does it mean? So we recognize our main mission is to empower citizens’ decision-making by providing them with high-quality journalism. And our output is recognized by independent watchdog organization as one of the most trustworthy journalistic products, meaning that we totally adhere to journalistic standards. And operating in Ukrainian media context and global context, we encountered, obviously, really aggressive competition for the attention of our audiences. And specifically, now we’re countering hybrid warfare and disinformation that has been identified severely since the full-scale Russia invasion to Ukraine. Also, it’s affected the operational conditions, both for audience and for media. For example, only this night, Russia launched more than 370 drones and missiles in total. So also, another take of media sphere that get us tackling these challenges is the rise of AI-supporting, AI-powered systems. Also, algorithmic-based newsfeeds. For example, as Google discover all of these products, they operate, at some extent, as black boxes, and there are really lack of signals and parameters they can embrace to arrange the content with the most value for the end user. And talking about C2P technology and the pilot we would like to run with the BBC and the process that now leading by Charlie is to get this technology incorporated into the end-to-end process of web publishing so we can provide our audience with at least one additional mean to draw a distinctive line between the trustworthy content and kind of other content. So the value is huge, and it might sound boring when it comes to C2P. recognized as some standard but in general for APBC we recognize it as the innovation vibe so some piece of code can just dramatically change the way content appears into the screens of our end users and they can end up with a change in their behavior recognizing the high quality content and you know put the preferences on that compared to to some other resources so yeah this is a value.


Muge Ozkaptan: Thank you so much and Charlie I want to ask you where do you see this technology is going next and how actually we can make it broader adoption especially by the global majority


Charlie Halford: okay hopefully where we will see the technology going next is expansion in where it’s being used so we’re really hoping that we’re going to see more media organizations using it we’re really hoping to be to be able to put a pilot in place with the Spillner that would be fantastic there’s lots of other people that are involved we’d also love to see more support from platforms social media platforms I think most media organizations get a lot of their traffic of the lots of their audiences come via me social media platforms that might be tick-tock it might be YouTube it might be Facebook lots of them and then there’s also a few other considerations I guess to help us get that broader adoption so there’s a concept called redaction in C2PA so that’s the idea that you want to show people as much information as possible right to help them make a decision about is this trustworthy but sometimes that information can hurt people maybe it could hurt the subject of the photo maybe it could hurt the the person taking it so location and date and time so having the ability to remove those things where somebody might be put at risk is really important that’s redaction so we need to see that implemented we’ve got device and tool adoption so we can’t we need to get to a place where it’s possible for any organization or any person taking a picture with their camera that it’s just built in they don’t need to do anything special I think that’s starting to happen but we need that to roll out more we also need if you’re going to be part of this as a media organization you need to be able to look after your private key that’s the thing that’s going to be really important to you so developing security procedures we’ve talked about platforms pilots so I think really it’s about finding the right use case what’s the best the best thing that helps you out maybe it’s showing users on your platform more detail about your content maybe it’s telling people on social media that this is really from you from you another one is considering how content comes into your organization if lots of people send you images maybe images and videos from users being able to detect maybe whether they are genuine is really important so do that at that point and then media literacy is probably one of the the biggest ones on this list helping your users understand what all of this means you can’t just put this information in front of people and expect them to understand it so we have to use our products we have to use our journalism to explain to me people what what this means and thank you very much and how c2p works for AI generated content okay so on AI generated content a few organizations now so open AI and Microsoft are actually putting AI labels into their content and they’re using c2p a and so if you click through to the next slide I think if some social media companies are now using that so if you click through again this is an example of tick-tock and where they detect and a c2p a AI label they actually let users know and we’re hoping this will become more broadly adopted as we go forward if you click yet so that’s just the AI label and then I think this next one just a little video so if you click play on that so this is a prototype that we’re working on and so here I’ve added an AI image and I’m just in the background I’m inspecting the c2p a label and because it was produced by one of those tools you can see that that’s been AI generated they’re not bulletproof at the moment we still need to use other techniques to detect whether something’s AI generated but this is a good first start at that


Muge Ozkaptan: thank you very much we have some time for questions and please fire up and we like to hear from you your thoughts and any experiences any challenges that you’re facing and do you think c2p a is important to you so please go in and I’m also checking slider if anything comes up on online just a second I think there is a question from from there this is


Audience: great and I’m such a I’m a big supporter of the c2p a but I wanted to ask a couple questions on the public side of it in terms of the public response and recognition of it I’m Amy Mitchell with Center for news technology innovation and look a lot at sort of how do we think about really public service in these kinds of things and there can be value in internal kinds of signals that maybe aren’t meant for public facing purposes but in the space where you’re looking to really have the public benefit and understand the integrity in your research and tests have you seen them wreck it you know recognize the sig the sign the print the content label that’s on there and respond positively in choice or is it more at this point about interest in it you know interest in having something like that be a sign I’d be I’d be curious Charlie would


Charlie Halford: like yeah sure thank you that’s a yeah that’s a really good question so when we the research I showed there we we showed people without any any extra data and we showed them with it with the extra data we showed them a like a c2p a logo we didn’t get any comments back about any recognition yet so as a brand I don’t think the c2p a has much public recognition so I think in terms of media literacy that’s a job for us to do but in terms of us giving them the extra data that was a big trust indicator so that that had a direct impact not just on interest but on how trustworthy people found the content itself


Muge Ozkaptan: Thank you we have a question on slider is there any plan to integrate c2p a to existing regulations for information integrity such as EU DSA or online safety act of the UK


Charlie Halford: so I I guess there there’s it’s been looked at by many different organizations many regulatory bodies around the world I’m not sure if it has been named directly in any of them but there’s quite a lot of regulation that’s starting to come out that’s talking about the need to label things particularly from an AI perspective so you’re getting a lot more AI labeling requirements whether we would ever push to get c2p a as a technology embedded into legislation I’m not sure I it might be it might be useful to get some movement but then if there’s standard changes at a later date maybe we’d want some flexibility but the idea of provenance the idea of labeling I think would be really great.


Muge Ozkaptan: I think we have time for one more question if you want to ask any from the room I just want to ask last question about the social media platforms how they’re adopting so far and what’s the response in detail.


Charlie Halford: so I think the response has been mixed but positive so most of the adoption we see are in social media platforms using c2p a to understand whether something has been labeled as AI they’re most interested in that in that situation we’ve seen less adoption for people interested in labeling things as from the BBC from sys bilna or maybe showing you more detail about your media but we’re hopeful that the more content we see the more we publish the more social media organizations will start to adopt and really it’s it’s for us to request that of those platforms I think


Muge Ozkaptan: well thank you so much we are at the end of session now but if you’re interested investing into this standards and if you want to have questions or sharing ideas they’re just here and just come and then join to a conversation thank you very much thank you


C

Charlie Halford

Speech speed

155 words per minute

Speech length

2132 words

Speech time

823 seconds

C2PA is an open standard that uses cryptographic signatures to verify content authenticity and provenance, addressing problems where media can be easily manipulated or impersonated

Explanation

C2PA describes how to attach cryptographic signatures (similar to website security certificates) to content files, binding to images, videos, or audio to show their origin. This addresses the problem that existing metadata is easily faked and there’s no secure way to understand what or who created content.


Evidence

Examples of BBC logo being used in fake content with manipulated messages; demonstration that anyone with video editing software can impersonate media brands; involvement of major tech companies like Adobe, Microsoft, Google, Meta, OpenAI, Sony as part of C2PA board


Major discussion point

Content authenticity and verification technology


Topics

Digital standards | Content policy | Liability of intermediaries


Agreed with

– Khalifa Said Rashid
– Kyrylo Lesin

Agreed on

C2PA technology offers valuable solutions for content authenticity verification


BBC has conducted trials showing that content with C2PA provenance data increases user trust by about 80%, particularly among users who don’t regularly use BBC’s website

Explanation

BBC ran studies comparing user trust levels between content with and without C2PA provenance data, finding significant increases in trust when transparency data was added. They conducted trials with BBC Verify team’s verification checks attached to content, which users found more useful and trustworthy.


Evidence

User study results showing 80% of people found extra provenance data more useful and trustworthy; specific mention that people who didn’t use BBC website were most affected by the additional transparency


Major discussion point

User trust and content verification effectiveness


Topics

Content policy | Consumer protection | Digital identities


C2PA works with existing software and cameras that are available now, with major tech companies like Adobe, Microsoft, Google, Meta, and OpenAI being part of the coalition

Explanation

The technology is currently implementable through existing tools and devices, with widespread industry support from major technology companies. The coalition has grown significantly and includes both tech companies and news organizations working together on the standard.


Evidence

List of software and cameras currently supporting C2PA; mention of tech companies (Adobe, Microsoft, Google, Meta, OpenAI, Sony) and news organizations (WDR, BBC, CBC, Radio Canada, AFP, France TV) as coalition members


Major discussion point

Technology adoption and industry collaboration


Topics

Digital standards | Digital business models | Convergence and OTT


BBC faces impersonation problems where fake content uses BBC logos and branding, making it difficult for audiences to distinguish authentic content

Explanation

The BBC regularly encounters disinformation that uses their visual branding, logos, and fonts to create fake content that appears legitimate. This creates confusion for audiences who cannot easily distinguish between authentic BBC content and impersonated content on social media platforms.


Evidence

Three specific examples of disinformation with BBC logos attached; explanation that these weren’t AI-generated but created with basic video editing tools using BBC branding elements


Major discussion point

Brand impersonation and media authenticity challenges


Topics

Content policy | Intellectual property rights | Liability of intermediaries


Agreed with

– Khalifa Said Rashid

Agreed on

Brand impersonation is a major challenge for media organizations


Broader adoption requires expansion to more media organizations, increased platform support, device integration, and better security procedures for managing private keys

Explanation

For C2PA to be effective globally, it needs wider implementation across media organizations, better support from social media platforms, built-in camera/device integration, and robust security procedures. The technology also needs concepts like redaction to protect sensitive information while maintaining transparency.


Evidence

Mention of redaction concept for protecting location/date/time data that could hurt subjects; need for device integration so cameras automatically include C2PA without special procedures; importance of private key security management


Major discussion point

Technology scaling and implementation challenges


Topics

Digital standards | Network security | Privacy and data protection


Media literacy education is crucial for helping users understand what C2PA information means, as the technology itself doesn’t have much public recognition yet

Explanation

While users respond positively to additional transparency data, they don’t yet recognize the C2PA brand or understand what the information means. Media organizations need to use their platforms and journalism to educate users about content provenance and verification.


Evidence

Research showing users didn’t recognize C2PA logo but responded positively to extra transparency data; acknowledgment that C2PA as a brand has little public recognition


Major discussion point

Public education and technology literacy


Topics

Online education | Content policy | Multilingualism


Social media platforms show mixed but positive response, primarily adopting C2PA for AI-generated content labeling rather than general content verification

Explanation

Social media platforms are beginning to implement C2PA technology, but mainly focus on detecting and labeling AI-generated content rather than broader content verification. There’s less adoption for showing detailed media provenance or publisher verification.


Evidence

Examples of TikTok detecting C2PA AI labels and notifying users; mention of OpenAI and Microsoft putting AI labels into content using C2PA; demonstration of prototype detecting AI-generated images


Major discussion point

Platform adoption and AI content labeling


Topics

Content policy | Digital standards | Liability of intermediaries


Disagreed with

– Kyrylo Lesin

Disagreed on

Platform adoption priorities and effectiveness


K

Khalifa Said Rashid

Speech speed

130 words per minute

Speech length

387 words

Speech time

178 seconds

The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content

Explanation

The Chanzo faces two main disinformation challenges: impersonation using their logos and brand colors, and old video content being taken out of context and reshared during current events. These problems are particularly difficult because readers trust their brand, making fake content appear credible.


Evidence

Specific examples of having to publicly deny impersonated content; description of old protest/demonstration videos resurfacing during current events without proper dating; explanation of how trusted brand recognition makes fake content more believable


Major discussion point

Regional media challenges with disinformation


Topics

Content policy | Intellectual property rights | Freedom of the press


Agreed with

– Charlie Halford
– Kyrylo Lesin

Agreed on

C2PA technology offers valuable solutions for content authenticity verification


K

Kyrylo Lesin

Speech speed

123 words per minute

Speech length

441 words

Speech time

214 seconds

Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion

Explanation

Suspilne operates in an environment of hybrid warfare where disinformation is used as a weapon, with conditions severely affected since Russia’s full-scale invasion. They face aggressive competition for audience attention while trying to maintain journalistic standards and provide trustworthy content.


Evidence

Mention of 370+ drones and missiles launched in a single night; description of hybrid warfare and disinformation intensifying since Russian invasion; recognition by independent watchdog organizations as trustworthy journalism


Major discussion point

Media operations during wartime and hybrid warfare


Topics

Cyberconflict and warfare | Content policy | Freedom of the press


Agreed with

– Charlie Halford
– Khalifa Said Rashid

Agreed on

C2PA technology offers valuable solutions for content authenticity verification


Disagreed with

– Charlie Halford

Disagreed on

Platform adoption priorities and effectiveness


Suspilne is Ukraine’s public service media established eight years ago, focusing on digital transformation and delivering trustworthy journalism recognized by independent watchdog organizations

Explanation

Suspilne was established as an independent media institution that has undergone significant digital transformation, launching their flagship digital platform Suspilne.media. Their mission is to empower citizens’ decision-making through high-quality journalism that adheres to professional standards.


Evidence

Specific timeline of 8 years since establishment and 5 years of digital transformation; launch of Suspilne.media platform; recognition by independent watchdog organizations as trustworthy journalism; support from BBC Media Action and other partners


Major discussion point

Public service media digital transformation


Topics

Digital business models | Online education | Freedom of the press


Agreed with

– Muge Ozkaptan

Agreed on

Media organizations need support for digital transformation and capacity building


M

Muge Ozkaptan

Speech speed

131 words per minute

Speech length

952 words

Speech time

435 seconds

BBC Media Action works in 30 countries with content in 50 languages, focusing on supporting media organizations in fragile environments through their ‘Pursuit of Truth’ initiative

Explanation

BBC Media Action is BBC’s international charity that operates globally to support media organizations and professionals in challenging environments. They focus on enhancing capabilities and resilience of media organizations facing disinformation and threats to public trust.


Evidence

Specific numbers: 30 countries, 50 languages, fully funded by donors; description of working on frontline of global challenges like disinformation; focus on fragile environments and global majority voices


Major discussion point

International media development and support


Topics

Capacity development | Cultural diversity | Freedom of the press


The organization supports 30,000 media professionals and 1,000 media outlets, providing tools and technology to deal with external pressures and gather facts

Explanation

Through the Pursuit of Truth initiative, BBC Media Action provides comprehensive support including tools, technology, and innovation solutions to help media professionals work effectively under pressure. They aim to advance ethical AI use and content verification while supporting research on disinformation.


Evidence

Specific numbers: 30,000 media professionals and 1,000 media outlets; mention of providing tools, technology, and innovation solutions; commitment to supporting research on how disinformation spreads


Major discussion point

Media capacity building and technology support


Topics

Capacity development | Digital access | Online education


Agreed with

– Kyrylo Lesin

Agreed on

Media organizations need support for digital transformation and capacity building


A

Audience

Speech speed

160 words per minute

Speech length

161 words

Speech time

60 seconds

Research shows public interest in content integrity signals, with users responding positively to additional transparency data even without recognizing the C2PA brand specifically

Explanation

Questions were raised about public recognition and response to C2PA technology, specifically whether users recognize the content labels and respond positively in their choices or if it’s more about general interest in integrity signals. The focus is on understanding the public benefit and service aspect of the technology.


Evidence

Reference to research by Center for News Technology Innovation; distinction between internal signals versus public-facing purposes; question about recognition of signatures and positive response in choice behavior


Major discussion point

Public awareness and response to content verification technology


Topics

Consumer protection | Online education | Content policy


Agreements

Agreement points

Brand impersonation is a major challenge for media organizations

Speakers

– Charlie Halford
– Khalifa Said Rashid

Arguments

BBC faces impersonation problems where fake content uses BBC logos and branding, making it difficult for audiences to distinguish authentic content


The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content


Summary

Both BBC and The Chanzo face significant challenges with their brands being impersonated through fake content using their logos and visual branding, creating confusion for audiences who trust these brands


Topics

Content policy | Intellectual property rights | Liability of intermediaries


C2PA technology offers valuable solutions for content authenticity verification

Speakers

– Charlie Halford
– Khalifa Said Rashid
– Kyrylo Lesin

Arguments

C2PA is an open standard that uses cryptographic signatures to verify content authenticity and provenance, addressing problems where media can be easily manipulated or impersonated


The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content


Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion


Summary

All speakers recognize C2PA as a promising technology solution that can help media organizations verify content authenticity and combat disinformation challenges they face in their respective contexts


Topics

Digital standards | Content policy | Cyberconflict and warfare


Media organizations need support for digital transformation and capacity building

Speakers

– Muge Ozkaptan
– Kyrylo Lesin

Arguments

The organization supports 30,000 media professionals and 1,000 media outlets, providing tools and technology to deal with external pressures and gather facts


Suspilne is Ukraine’s public service media established eight years ago, focusing on digital transformation and delivering trustworthy journalism recognized by independent watchdog organizations


Summary

Both speakers emphasize the importance of supporting media organizations through digital transformation initiatives, providing tools and technology to enhance their capabilities


Topics

Capacity development | Digital business models | Online education


Similar viewpoints

Both speakers emphasize the critical importance of education and capacity building – Charlie focuses on media literacy for users to understand C2PA technology, while Muge focuses on supporting media organizations globally with tools and knowledge

Speakers

– Charlie Halford
– Muge Ozkaptan

Arguments

Media literacy education is crucial for helping users understand what C2PA information means, as the technology itself doesn’t have much public recognition yet


BBC Media Action works in 30 countries with content in 50 languages, focusing on supporting media organizations in fragile environments through their ‘Pursuit of Truth’ initiative


Topics

Online education | Content policy | Capacity development


Both media organizations operate in challenging environments where they face sophisticated disinformation campaigns that threaten their credibility and require active countermeasures

Speakers

– Khalifa Said Rashid
– Kyrylo Lesin

Arguments

The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content


Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion


Topics

Content policy | Freedom of the press | Cyberconflict and warfare


Unexpected consensus

User trust increases with transparency even without brand recognition

Speakers

– Charlie Halford
– Audience

Arguments

BBC has conducted trials showing that content with C2PA provenance data increases user trust by about 80%, particularly among users who don’t regularly use BBC’s website


Research shows public interest in content integrity signals, with users responding positively to additional transparency data even without recognizing the C2PA brand specifically


Explanation

It’s somewhat unexpected that users would respond so positively to technical transparency data (C2PA provenance information) even when they don’t recognize or understand the specific technology brand. This suggests that the mere presence of additional verification information builds trust, regardless of technical literacy


Topics

Consumer protection | Online education | Content policy


Global media challenges are remarkably similar across different contexts

Speakers

– Charlie Halford
– Khalifa Said Rashid
– Kyrylo Lesin

Arguments

BBC faces impersonation problems where fake content uses BBC logos and branding, making it difficult for audiences to distinguish authentic content


The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content


Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion


Explanation

Despite operating in vastly different contexts (UK public broadcaster, Tanzanian digital outlet, Ukrainian public media during wartime), all three organizations face remarkably similar challenges with brand impersonation and content manipulation, suggesting these are universal problems in the digital media landscape


Topics

Content policy | Freedom of the press | Digital standards


Overall assessment

Summary

There is strong consensus among all speakers that content authenticity and brand impersonation are critical challenges facing media organizations globally, and that C2PA technology offers a promising solution. All speakers agree on the need for capacity building, education, and technological solutions to combat disinformation.


Consensus level

High level of consensus with no significant disagreements identified. The implications are positive for C2PA adoption, as there appears to be unified support from diverse stakeholders (technology developers, international media development organizations, and media outlets from different regions). This consensus suggests strong potential for collaborative implementation and scaling of the technology across different contexts and regions.


Differences

Different viewpoints

Platform adoption priorities and effectiveness

Speakers

– Charlie Halford
– Kyrylo Lesin

Arguments

Social media platforms show mixed but positive response, primarily adopting C2PA for AI-generated content labeling rather than general content verification


Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion


Summary

Charlie presents a measured view of platform adoption focusing on AI content labeling, while Kyrylo emphasizes the urgent need for broader content verification tools due to wartime disinformation challenges. Their perspectives differ on the adequacy of current platform responses.


Topics

Content policy | Liability of intermediaries | Cyberconflict and warfare


Unexpected differences

Public readiness versus technology deployment

Speakers

– Charlie Halford
– Audience

Arguments

Media literacy education is crucial for helping users understand what C2PA information means, as the technology itself doesn’t have much public recognition yet


Research shows public interest in content integrity signals, with users responding positively to additional transparency data even without recognizing the C2PA brand specifically


Explanation

While both acknowledge positive user response to transparency data, there’s an unexpected tension between Charlie’s emphasis on the need for extensive media literacy education and the audience member’s research suggesting users already respond positively without brand recognition. This reveals disagreement about whether public education should precede or accompany technology deployment.


Topics

Online education | Consumer protection | Content policy


Overall assessment

Summary

The discussion shows minimal direct disagreement, with most differences stemming from varying operational contexts rather than fundamental philosophical disputes about C2PA technology


Disagreement level

Low level of disagreement with high consensus on C2PA’s value. The main tensions relate to implementation priorities, urgency levels, and sequencing of education versus deployment. This suggests strong foundational agreement that should facilitate collaborative implementation, though coordination may be needed to address different regional and operational priorities.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasize the critical importance of education and capacity building – Charlie focuses on media literacy for users to understand C2PA technology, while Muge focuses on supporting media organizations globally with tools and knowledge

Speakers

– Charlie Halford
– Muge Ozkaptan

Arguments

Media literacy education is crucial for helping users understand what C2PA information means, as the technology itself doesn’t have much public recognition yet


BBC Media Action works in 30 countries with content in 50 languages, focusing on supporting media organizations in fragile environments through their ‘Pursuit of Truth’ initiative


Topics

Online education | Content policy | Capacity development


Both media organizations operate in challenging environments where they face sophisticated disinformation campaigns that threaten their credibility and require active countermeasures

Speakers

– Khalifa Said Rashid
– Kyrylo Lesin

Arguments

The Chanzo in Tanzania struggles with brand impersonation and out-of-context video content being reshared during crisis situations, forcing them to publicly deny fake content


Suspilne in Ukraine faces aggressive disinformation campaigns as part of hybrid warfare, particularly intensified since the Russian invasion


Topics

Content policy | Freedom of the press | Cyberconflict and warfare


Takeaways

Key takeaways

C2PA is a promising open standard for content authenticity that uses cryptographic signatures to verify media provenance and combat disinformation


Research demonstrates that C2PA significantly increases user trust in content, with 80% of users finding provenance data more useful and trustworthy


Media organizations globally face similar challenges with brand impersonation and content manipulation, from BBC’s logo misuse to Tanzania’s Chanzo dealing with fake branded content


The technology is currently available and being implemented by major tech companies, but broader adoption requires coordinated effort across platforms, devices, and organizations


Media literacy education is crucial for public understanding and adoption, as users respond positively to transparency data even without recognizing the C2PA brand


C2PA shows particular promise for AI-generated content labeling, with platforms like TikTok already implementing detection and labeling systems


Resolutions and action items

BBC Media Action will continue supporting global media organizations through workshops and conversations to include diverse voices in C2PA development


A pilot implementation is planned between BBC and Suspilne to integrate C2PA into end-to-end web publishing processes


Media organizations need to develop security procedures for managing private keys required for C2PA implementation


Continued research and user studies are needed to understand public response and optimize implementation strategies


Unresolved issues

Limited social media platform adoption beyond AI content labeling – platforms show mixed response to general content verification features


Lack of public recognition of the C2PA brand itself, requiring significant media literacy education efforts


Need for broader device and tool integration to make C2PA automatic rather than requiring special procedures


Implementation of redaction capabilities to protect sensitive information while maintaining transparency


Uncertainty about regulatory integration with existing information integrity laws like EU DSA or UK Online Safety Act


Challenge of scaling adoption across the global majority and diverse media environments with varying technical capabilities


Suggested compromises

Flexible approach to regulatory integration that allows for standard changes while promoting provenance labeling requirements


Gradual implementation starting with specific use cases (like AI content labeling) before expanding to general content verification


Balancing transparency with safety through redaction capabilities that can hide sensitive location, date, or personal information when needed


Thought provoking comments

When we talk about technology generally, we talk about specification and applications, but it’s important that bringing those diverse voices and understand their actual needs, how they work, what kind of challenges that they are facing in their day-to-day life and work, and how C2PA innovation solutions like C2PA can fit in that area.

Speaker

Muge Ozkaptan


Reason

This comment is insightful because it highlights a critical gap in technology development – the tendency to focus on technical specifications without adequately considering the real-world needs of diverse global users. It challenges the typical tech-centric approach and emphasizes the importance of inclusive design.


Impact

This comment set the foundational framework for the entire discussion, establishing that the session would prioritize voices from the global majority rather than just technical implementation. It directly led to featuring perspectives from Tanzania and Ukraine, demonstrating practical challenges in different contexts.


These aren’t pieces of AI disinformation. This is just somebody with a video editor. They found the BBC logo. They found the BBC font. They know what the BBC’s graphics look like. And they’ve put out what the footage underneath them isn’t fake. They’ve just changed the message.

Speaker

Charlie Halford


Reason

This observation is thought-provoking because it reframes the disinformation problem beyond AI-generated content to include simple brand impersonation. It demonstrates that sophisticated AI isn’t always necessary for effective disinformation, making the problem more accessible and widespread.


Impact

This comment shifted the discussion from focusing solely on AI-generated content to broader authenticity challenges. It provided concrete context that resonated with the media partners’ experiences, particularly Khalifa’s later description of brand impersonation issues in Tanzania.


And it have been very difficult for us to deal with a situation like that because many people trust our brand and when they see content online with our logos and brand colors, they can be very difficult for average reader to tell whether it’s real or not.

Speaker

Khalifa Said Rashid


Reason

This comment is particularly insightful because it illustrates how brand trust, typically an asset, becomes a vulnerability in the disinformation landscape. It shows the real-world impact on media organizations in developing countries where resources for combating impersonation may be limited.


Impact

This comment provided crucial validation for the C2PA initiative by demonstrating actual harm experienced by media organizations. It moved the discussion from theoretical benefits to concrete use cases, strengthening the argument for C2PA adoption.


For example, as Google discover all of these products, they operate, at some extent, as black boxes, and there are really lack of signals and parameters they can embrace to arrange the content with the most value for the end user.

Speaker

Kyrylo Lesin


Reason

This comment is thought-provoking because it identifies a systemic problem with algorithmic content distribution – the lack of quality signals that algorithms can use to prioritize trustworthy content. It suggests that C2PA could serve as a quality signal in algorithmic systems.


Impact

This comment expanded the discussion beyond direct user verification to consider how C2PA could influence content distribution algorithms. It introduced a new dimension of impact – not just helping users identify trustworthy content, but potentially helping platforms prioritize it.


You can’t just put this information in front of people and expect them to understand it so we have to use our products we have to use our journalism to explain to people what this means.

Speaker

Charlie Halford


Reason

This comment is insightful because it acknowledges that technical solutions alone are insufficient – they require accompanying education and communication strategies. It recognizes the responsibility of media organizations to bridge the gap between technical capability and user understanding.


Impact

This comment introduced the critical element of media literacy as essential for C2PA success. It shifted the conversation from technical implementation to user education, highlighting that adoption requires both technological and educational components.


In the space where you’re looking to really have the public benefit and understand the integrity in your research and tests have you seen them recognize the sign the print the content label that’s on there and respond positively in choice or is it more at this point about interest in it?

Speaker

Amy Mitchell (Audience)


Reason

This question is thought-provoking because it challenges the distinction between user interest in authenticity features versus actual behavioral change. It probes whether C2PA creates measurable impact on user decision-making or remains at the level of expressed preference.


Impact

This question prompted important clarification about the current state of C2PA recognition and effectiveness. It revealed that while users respond positively to additional transparency data, C2PA as a brand lacks public recognition, highlighting the need for better communication strategies.


Overall assessment

These key comments collectively shaped the discussion by establishing a human-centered rather than technology-centered approach to C2PA adoption. The conversation evolved from technical specifications to real-world applications, then to implementation challenges, and finally to the critical importance of user education and platform adoption. The diverse perspectives from different global contexts (UK, Tanzania, Ukraine) demonstrated both universal challenges (brand impersonation, content authenticity) and context-specific needs (operating under warfare conditions, resource constraints). The discussion successfully balanced technical capabilities with practical implementation concerns, ultimately emphasizing that successful C2PA adoption requires not just technical standards but also media literacy, platform cooperation, and understanding of diverse global media environments.


Follow-up questions

How can we achieve broader adoption of C2PA, especially by the global majority?

Speaker

Muge Ozkaptan


Explanation

This addresses the need to expand C2PA implementation beyond current adopters to include more diverse global voices and organizations, particularly those in fragile environments and developing countries


How do we get more support from social media platforms for C2PA implementation?

Speaker

Charlie Halford


Explanation

Platform adoption is crucial since most media organizations get significant traffic through social media, and broader platform support would increase the technology’s effectiveness


How can we improve public recognition and understanding of C2PA branding and signaling?

Speaker

Amy Mitchell (audience member)


Explanation

Research showed that while extra data increased trust, there was no recognition of C2PA as a brand, indicating a need for better public awareness and media literacy efforts


What are the plans for integrating C2PA into existing regulations for information integrity such as EU DSA or UK Online Safety Act?

Speaker

Online participant (via Slido)


Explanation

Understanding regulatory integration could help accelerate adoption and provide legal framework support for the technology


How can we implement redaction capabilities in C2PA to protect people who might be at risk?

Speaker

Charlie Halford


Explanation

This addresses the need to balance transparency with safety, allowing removal of sensitive information like location and time data that could endanger subjects or photographers


How can we develop better security procedures for media organizations to manage their private keys?

Speaker

Charlie Halford


Explanation

Private key management is critical for maintaining the integrity and trustworthiness of the C2PA system for media organizations


How can we achieve device and tool adoption so C2PA is built into cameras and content creation tools by default?

Speaker

Charlie Halford


Explanation

Seamless integration into content creation workflows is essential for widespread adoption without requiring special technical knowledge from users


How can we better detect AI-generated content and improve the reliability of AI labeling in C2PA?

Speaker

Charlie Halford


Explanation

Current AI detection methods are not bulletproof, and improving these capabilities is crucial as AI-generated content becomes more sophisticated


How can we develop effective media literacy programs to help users understand what C2PA information means?

Speaker

Charlie Halford


Explanation

Simply providing technical information isn’t enough; users need education to understand and effectively use provenance data for decision-making


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #280 the DNS Trust Horizon Safeguarding Digital Identity

WS #280 the DNS Trust Horizon Safeguarding Digital Identity

Session at a glance

Summary

This workshop at the Internet Governance Forum focused on DNS trust and safeguarding digital identity, examining two key challenges: blockchain identifiers integration with DNS and online harm mitigation. The session was jointly organized by the Dynamic Coalition on DNS Issues and the Dynamic Coalition on Data and Trust, with discussions framed around UN Sustainable Development Goal 9 regarding resilient infrastructure and innovation.


The first topic addressed blockchain identifiers and their responsible integration with the existing DNS system. Speakers emphasized that while blockchain technologies offer potential benefits for digital identity, they present significant challenges including name collisions, governance issues, and threats to the single authoritative root principle that underpins DNS stability. Research revealed actual collisions between blockchain identifiers and existing domain names, with some blockchain providers creating top-level identifiers that conflict with established gTLDs and ccTLDs. Panelists stressed the importance of responsible integration rather than replacement of DNS, advocating for multi-stakeholder collaboration to develop standards and best practices that preserve DNS security while enabling innovation.


The second discussion focused on online harm mitigation, particularly addressing scams, fraud, and DNS abuse. Speakers shared various approaches, including Norway’s .no registry model that requires identity verification and limits domain registrations per holder, which has proven effective in reducing abuse. The Global Signal Exchange was presented as a new initiative to improve threat intelligence sharing across sectors, processing hundreds of millions of threat signals to enable faster response times. Multiple panelists emphasized that combating online harms requires coordinated action across the entire internet infrastructure stack, from registries and registrars to hosting providers and content platforms. The discussion concluded with recognition that these challenges require ongoing multi-stakeholder engagement and innovative approaches to maintain trust in digital infrastructure while supporting legitimate innovation.


Keypoints

## Major Discussion Points:


– **Blockchain Integration with DNS Systems**: The panel extensively discussed the challenges and opportunities of integrating blockchain-based naming systems with the traditional DNS infrastructure. Key concerns included name collisions between blockchain identifiers and existing domain names, the need for responsible integration rather than replacement of DNS, and maintaining the single authoritative root principle that ensures DNS stability.


– **Multi-stakeholder Governance and Coordination**: A recurring theme was the critical need for multi-stakeholder engagement to address both blockchain integration and online harm mitigation. Speakers emphasized that no single entity – whether government, private sector, or civil society – can solve these complex issues alone, and that established forums like ICANN and IGF provide essential venues for this coordination.


– **Online Harm Mitigation and DNS Abuse**: The discussion covered various forms of DNS abuse including phishing, malware, spam, domain spoofing, and cyber-squatting. Panelists shared different approaches to combating these harms, from Norway’s strict identity verification requirements for .no domains to Meta’s efforts to combat brand impersonation and the Global Signal Exchange’s cross-sector threat intelligence sharing platform.


– **Data Sharing and Real-time Threat Detection**: Multiple speakers highlighted the importance of improved data sharing mechanisms for combating online fraud and scams. The discussion covered initiatives like the Global Signal Exchange’s “Quick Factors” (quantity, immediacy, quality) approach and the need for faster mitigation times, currently averaging four days from detection to action.


– **Technical Standards and Best Practices**: The conversation addressed the need for developing technical standards for responsible DNS integration with blockchain systems, including work being done in IETF working groups, and the importance of maintaining DNS security through existing mechanisms like DNSSEC while considering future enhancements.


## Overall Purpose:


The workshop aimed to examine how the Domain Name System needs to evolve to address emerging challenges in digital trust and identity, specifically focusing on blockchain identifier integration and multi-stakeholder approaches to fighting online harms including scams and fraud. The session was designed to initiate multi-stakeholder conversations on these complex issues in the context of the WSIS+20 review and UN Sustainable Development Goal 9 (building resilient infrastructure and fostering innovation).


## Overall Tone:


The discussion maintained a collaborative and constructive tone throughout, with participants demonstrating technical expertise while acknowledging the complexity of the challenges. The atmosphere was professional and solution-oriented, with speakers building on each other’s points rather than engaging in adversarial debate. There was a sense of urgency about addressing these issues, particularly around online harms, but also recognition that sustainable solutions require careful coordination and responsible implementation. The tone remained consistently focused on finding practical, multi-stakeholder approaches to these technical and policy challenges.


Speakers

**Speakers from the provided list:**


– **Emily Taylor** – CEO of Oxford Information Labs and co-founder of the Global Signal Exchange


– **Keith Drazek** – Vice President, Policy and Government Relations at Verisign (session moderator)


– **Benoit Ampeau** – Director of partnerships and innovation at AFNIC, the French internet registry


– **Swapneel Sheth** – Senior director of research engineering at Verisign in the office of the chief technology officer


– **Hilde Thunem** – Managing director of NORID, the Norwegian ccTLD registry (.no)


– **Lucien Taylor** – CTO and founder of the Global Signal Exchange, a global clearinghouse for real-time sharing of scam and fraud signals


– **Rima Amin** – Security policy manager, community protection with Meta


– **Graeme Bunton** – Executive director, NetBeacon Institute (participated online)


– **Edmund Chung** – From .Asia


– **Andrew Campling** – From 419 consultancy


– **Bertrand Lachapelle** – Executive Director of the Internet and Jurisdiction Policy Network


– **Participant** – (Role/title not specified – appears to be Dr. Esther Yarmitsky based on context)


– **Audience** – Individual from Senegal named Yuv (role/title not specified)


**Additional speakers:**


– **Dr. Esther Yarmitsky** – UK Department of Science and Innovation and Technology, has a PhD in internet governance, speaking in personal capacity (mentioned in introduction but appears in transcript as “Participant”)


Full session report

# DNS Trust and Safeguarding Digital Identity: A Comprehensive Workshop Report


## Executive Summary


This workshop at the Internet Governance Forum brought together leading experts from across the DNS ecosystem to examine two critical challenges facing digital infrastructure: the responsible integration of blockchain identifiers with the Domain Name System and the mitigation of online harms through coordinated multi-stakeholder approaches. Jointly organised by the Dynamic Coalition on DNS Issues and the Dynamic Coalition on Data and Trust, the session was framed within the context of UN Sustainable Development Goal 9, which emphasises building resilient infrastructure and fostering innovation.


The discussion revealed consensus amongst participants that both challenges require multi-stakeholder coordination rather than fragmented individual responses. Speakers advocated for integration rather than replacement of existing DNS infrastructure, whilst acknowledging the urgent need for proactive measures to combat the rising scale of cybercrime and online fraud.


## Opening Context and Framework


Keith Drazek, serving as moderator and Vice President of Policy and Government Relations at Verisign, established the session’s framework by connecting the technical discussions to broader policy objectives. He positioned the workshop within the WSIS+20 review process and UN Sustainable Development Goal 9, emphasising how DNS evolution must support sustainable development goals whilst maintaining stability and security.


Emily Taylor, CEO of Oxford Information Labs and co-founder of the Global Signal Exchange, provided brief opening remarks introducing the workshop before handing over to Drazek for the main facilitation.


## Blockchain Identifiers and DNS Integration


### Research Findings on Blockchain-DNS Collisions


Benoit Ampeau, Director of partnerships and innovation at AFNIC, presented research findings revealing actual collisions between blockchain identifiers and existing domain names. Working with the DNS Research Federation, AFNIC identified specific instances where blockchain naming systems have created identifiers that conflict with established generic top-level domains (gTLDs) and country code top-level domains (ccTLDs).


Ampeau provided concrete examples of these collisions, including blockchain identifiers like .wallet, .crypto, .corp, .om, and .mail that conflict with existing or potential DNS namespace usage. He emphasised that these collisions create security risks for users and potential instability for the DNS system.


### Technical Implementation Perspectives


Swapneel Sheth, Senior Director working in Verisign’s office of the chief technology officer, addressed technical challenges facing DNS-blockchain integration. He highlighted critical lifecycle management issues, asking: “How do we think about a domain name that’s transferred or expires after the domain name has been integrated into the blockchain application? How do we avoid risks with inconsistencies, with the security concerns that come along when the same names are used across multiple systems?”


Sheth noted that whilst DNS integrations with blockchain applications have potential, they require responsible implementation to avoid security inconsistencies. He reported encouraging engagement from the blockchain community through collaborative draft development in IETF working groups.


### Strategic Integration Approach


Dr. Esther Yarmitsky from the UK Department of Science and Innovation and Technology, speaking in her personal capacity, argued for integration rather than replacement of DNS infrastructure. She emphasised the importance of answering whether to “integrate this blockchain system into the global domain name system, or do we watch our infrastructure fragment in dangerous ways.”


Yarmitsky advocated for blockchain as a potential secondary security layer that could enhance existing DNSSEC capabilities whilst preserving the single authoritative root principle that ensures DNS stability.


### Industry Questions and Concerns


Edmund Chung from .Asia raised questions about the technical necessity of blockchain enhancements, noting that DNSSEC already provides cryptographic validation and questioning the added value of blockchain for DNS security.


Andrew Campling from 419 consultancy observed that Web3 naming schemes lack mature governance structures and could benefit from DNS governance lessons. He also raised concerns about the environmental and computational costs of implementing dual cryptographic validation systems.


## Online Harm Mitigation: Multi-Stakeholder Approaches


### The Norwegian Model: Identity Verification and Domain Limits


Hilde Thunem, Managing Director of NORID (the Norwegian ccTLD registry for .no), presented a detailed case study of how targeted interventions can effectively reduce DNS abuse. The Norwegian approach requires identity verification for domain registrations, including organization numbers for businesses and national identity numbers for individuals, and limits the number of domains that individual registrants can hold.


Thunem explained that this approach creates friction for scammers whilst maintaining accessibility for legitimate users. She provided a concrete example: “If you want to register santa.no, you have to prove that you are Santa Claus,” illustrating how identity verification prevents impersonation and abuse.


The Norwegian model has proven highly effective in reducing abuse within the .no namespace, demonstrating that well-designed registration policies can significantly impact abuse levels. Thunem also emphasised the importance of robust legal frameworks with clear responsibilities and due process protections.


### Global Signal Exchange: Cross-Sector Threat Intelligence


Lucien Taylor, CTO and founder of the Global Signal Exchange, presented an innovative approach to combating online fraud through cross-sectoral threat intelligence sharing. The Global Signal Exchange operates as a clearinghouse for real-time sharing of scam and fraud signals, processing threat indicators that have grown from 40 million to 270 million, rising by approximately one million per day.


Taylor highlighted a critical asymmetry: “The criminals are moving faster than us. They’re exploiting cross-border legislative tensions and sharing bad things between each other better than we share things.” The platform currently has 160 organisations in its accreditation pipeline, representing significant expansion of cross-sector collaboration.


### Platform Perspectives: Meta’s Approach


Rima Amin, Security Policy Manager for Community Protection at Meta, provided insights into how major platforms address DNS abuse and brand impersonation. She emphasised that DNS abuse accelerates harm across multiple threat areas including domain spoofing, cyber-squatting, and deceptive redirects.


Amin advocated for global solutions and consistent approaches rather than fragmented country-specific responses, noting that the borderless nature of the internet requires coordinated international responses.


### Data-Driven Insights: Concentration of Abuse


Graeme Bunton, Executive Director of the NetBeacon Institute, provided crucial data that reframed understanding of the DNS abuse problem’s scope. His research revealed that “95% of the malicious domains that we see belong to about 50 registrars or less, 80% belongs to less than 20.”


This concentration suggests that targeted interventions could be highly effective. Bunton’s data demonstrated that “the problem space is not huge” and “we can sort of wrap our collective arms around the scope of that problem.” He emphasised that proactive processes and automation are essential given the scale of abuse that reactive reporting cannot handle.


### Governance and Coordination Challenges


Bertrand Lachapelle, Executive Director of the Internet and Jurisdiction Policy Network, provided a systems-level perspective, observing that “this whole thing is a speed and scale challenge and it’s a data challenge. It’s a data sharing challenge.” He noted the emergence of new intermediaries that handle abuse workflow management.


Andrew Campling raised questions about governance gaps, particularly regarding country code top-level domains, noting “the real gap here is the lack of action by some of the ccTLDs” and asking “how do we get governments to also step forward to address this?”


## Areas of Consensus and Disagreement


### Multi-Stakeholder Collaboration


Throughout both discussions, speakers demonstrated consensus on the importance of multi-stakeholder collaboration. This extended to specific implementation approaches, with speakers advocating for coordination through existing frameworks rather than creating entirely new governance structures.


### Integration Over Replacement


Speakers consistently advocated for integration rather than replacement of existing DNS infrastructure when considering blockchain technologies. This reflects understanding of the DNS ecosystem’s complexity and the risks associated with fundamental architectural changes.


### Technical Value Debate


Despite agreement on integration approaches, speakers disagreed about the technical value that blockchain technologies could add to existing DNS security mechanisms. While some advocated for blockchain as a secondary security layer, others questioned whether blockchain provides meaningful improvements over existing DNSSEC capabilities.


## Emerging Challenges and Questions


### Blockchain Community Engagement


Questions arose about how to incentivise blockchain community participation in responsible integration frameworks, highlighting uncertainty about whether blockchain solution providers will engage meaningfully with DNS governance approaches.


### Scaling and Government Engagement


Multiple speakers acknowledged that current abuse mitigation processes struggle with the scale of modern threats. Questions about government engagement, particularly regarding ccTLD accountability, highlighted governance gaps in current approaches.


### Digital Identity and National Infrastructure


Questions from participants highlighted how many government institutions use generic domains instead of their national ccTLD, potentially creating cybersecurity risks and undermining digital identity frameworks.


## Conclusion


This workshop demonstrated both the complexity of challenges facing DNS infrastructure and the potential for multi-stakeholder approaches to address them. The discussion revealed that both blockchain integration and abuse mitigation require coordination mechanisms that preserve existing infrastructure stability whilst enabling innovation and improved protection.


The speakers’ emphasis on integration rather than replacement, proactive rather than reactive approaches, and coordinated rather than fragmented responses provides a foundation for continued progress. However, unresolved questions about blockchain community participation, scaling abuse mitigation, and addressing governance gaps highlight the need for continued engagement.


The workshop’s connection to UN Sustainable Development Goal 9 underscores that these technical discussions have broader implications for global development and digital inclusion. Success will depend on translating the collaborative approaches demonstrated in this workshop into concrete actions that preserve trust in digital infrastructure whilst enabling necessary innovation.


Session transcript

Emily Taylor: Good afternoon, everybody. Thank you very much for joining us this afternoon. You are at workshop 280, the DNS trust horizon, safeguarding digital identity. My name is Emily Taylor. I’m the CEO of Oxford Information Labs and a co-founder of the Global Signal Exchange. And we were asked to put together this panel this afternoon for two dynamic coalitions, the dynamic coalition on DNS issues and the dynamic coalition on data and trust. And thank you to those organizations for asking us to do it. So this workshop will look at the WSIS-20 and the issues of digital trust and identity through the lenses of blockchain identifiers and emerging namespace and multi-stakeholder voluntary measures to fight online harms including scams and fraud. Now, each of these issues requires the domain name system in some way to evolve, to cope with these emerging issues. And each has been a struggle because they’re complex in nature and they require the coordination of multiple stakeholders. We will hear from a range of speakers on the issues and the sessions will be moderated by my good friend and long-term colleague, Keith Drasek, who is Vice President, Policy and Government Relations at Verisign. So with that, Keith, I hand over to you and thank you very much.


Keith Drazek: Thank you very much, Emily. and welcome everybody to our workshop 280. And as Emily noted, this is a joint workshop proposed by the Dynamic Coalition on DNS Issues and the Dynamic Coalition on Data and Trust. And our view of this session is really in some ways the beginning of a multi-stakeholder conversation on two separate issues that Emily touched on. Blockchain identifiers and the need for responsible integration with the DNS and online harm mitigation up and down and across the stack with different roles and responsibilities and technical capabilities for the various actors in the stack. Each one of these really does require multi-stakeholder engagement and multi-stakeholder input. And we just want to call that, you know, this is sort of the beginning of that part of the conversation. So look for more opportunities in the near future to engage on these issues. So I’m going to go ahead and introduce our panelists here. But before I do, I just want to note that as we are here at IGF in a season of looking ahead to the WSIS Plus 20 review, we thought of this workshop in the context of the UN Sustainable Development Goals. In particular, SDG number nine, which is to build resilient infrastructure, promote inclusive and sustainable industrialization, and foster innovation. And really both of these topics, I think, are tied directly to that. And so we wanted to really demonstrate that those at the table, industry and other actors, are really engaged in trying to advance in this IGF context some work around that specific SDG number nine. So with that, let me go ahead and introduce our panelists. A little bit of housekeeping. We’re going to have probably five to seven minutes for each panelist to make some introductory remarks. And then we really do want this to be an interactive dialogue with you in the audience and you online. So we’re going to try to keep a good chunk of time. at the end here for the dialogue, and then we’ll probably save five minutes at the end for a little bit of a wrap-up stop taking for the rapporteurs. So, first panelist, and not in order of speaking necessarily, but first on my list is Lucien Taylor. Lucien is a CTO and founder of the Global Signal Exchange, a global clearinghouse for real-time sharing of scam and fraud signals. We also have Hilde Thunem, managing director of NORID, the Norwegian ccTLD registry, .no. We’re thrilled to be here in Norway, of course. Online, I believe we have Graeme Bunton, who’s the executive director, NetBeacon Institute, an organization established by PIR, the .org registry, that’s focused on helping the internet community identify and report DNS abuse, establish best practices, fund DNS research, and share data. We also have Benoit Ampeau, director of partnerships and innovation at AFNIC, the French internet registry. We have Swapnil Sheth, a senior director of research engineering at Verisign in the office of our chief technology officer. And we have Rima Amin, security policy manager, community protection with MEDA. And Dr. Esther Yarmitsky, UK Department of Science and Innovation and Technology. Esther has a PhD in internet governance. She’s here speaking in her personal capacity. And we are very, very happy to have each of you. So with that, I’m going to start off, because we have two topics, I’m going to lead off with the first, and that’s going to be the topic of blockchain identifiers and the DNS. And probably stop after the three speakers have had their chance to have an intervention, give their remarks, and give an opportunity for questions or audience engagement, participant engagement, before we move on to the next section. But I’ll be keeping an eye on the time with the help of Emily, make sure we keep to our schedule. And with that, let’s go ahead and kick it off. So, Benoit, I’m gonna turn to you first on the topic of blockchain identifiers and the need for responsible integration in the DNS. From your perspective, what are the main challenges to maintaining trust in DNS systems in the face of emerging technologies like blockchain?


Benoit Ampeau: Thank you. Hello, everyone. Delighted to participate in this session. So yes, I will talk about the importance of trust in the security of digital identities and the challenges posed by the emergence of the new technologies like blockchain in current internet naming system, the DNS. It’s opening discussion and also concerns. It’s a challenging size to present this broad, complex topic in such a short time. So I’ll do my best. The domain name system, as you know, currently constitutes a reference infrastructure for creating and resolving names on the internet. It’s available to all connected internet people for more than 40 years. During this time, we can observe some initiative for alternate naming systems that have emerged on a regular basis. For instance, I can mention Namecoin or even Gdunet, and they are seeking to establish themselves by exploring models other than DNS, but all partially inspired by DNS. Today, we observe a significant number of organizations creating and establishing naming system based on blockchain all over the world. For many years at AFNIC, we have been studying the theme of trust in DNS applied to different use cases and technical environments, and regularly are evaluating sorry, other integration of identifier namespace, such as those used in the Internet of Things industry or in the blockchain ecosystem. By studying both risks, but also potential complementarities of this identifier system with the DNS. We also conducted a study publishing a report last year on the possibility of blockchain actually replacing the DNS. And now we are currently evaluating for a future report on a more technical layer, the security level that a blockchain identifier system based on a public blockchain would offer on both registration and also name resolution services. In addition to that, we established with our partners from DNSRF here a roadmap of work on the current ecosystem and blockchain identifier solution providers. From name collisions, provider mappings, and their economic models to ultimately, later this year, develop a general risk assessment framework. So, very quickly, three outcomes of our studies. The importance of trust. Trust is essential for the security of digital identities. Without it, users and businesses cannot operate effectively online. Integrating new technologies like blockchain into existing DNS infrastructures presents unique challenges. Blockchain has proven to be very robust in the face of alteration of the data associated with identifiers, but it raises also questions about governance and standardizations. Global consistency and the trust of all stakeholders in DNS have yet to be built for blockchain. Second one, uniqueness of names in DNS and blockchain. These are two different methods to safeguard the uniqueness of names in their naming space. DNS, as you know, relies on hierarchical architecture and a system of delegation, which also provides decentralization, by the way. The uniqueness of names is ensured by a governance system coordinated by ICANN, which supervises the root of DNS through its technical function, IANA. And then, registries such as us are managing each TLD, top-level domain. on a delegated basis. The existence of a single rule trusted by all ensures that no name can be registered twice in the same naming space is key. In the case of blockchains, the naming space is generally regulated by smart contracts which defines the rules for registration and realization of blockchain identifiers. In theory, these contracts ensure the uniqueness of all names under a given contract and several smart contracts can exist on the same blockchain. However, the uniqueness of identifiers is not centrally managed and at the global level of all blockchains, they are operating independently. Therefore, it’s possible for the same identifier to be allocated by more than one blockchain, leading to duplication. The DNS RF study revealed collisions between blockchain identifiers and domain names. For example, some TLDs like .wallet and .crypto could pose security issues if adopted without adequate planning. Sorry about that. Remember last GTLD round in 2012? Printer.om, user.corp were used internal suffixes by corporation and I can receive the application for .corp, .om, .mail, so forth and so on. So we, with DNS RF, have examples of ccTLD and gTLD collisions. Of the three providers we found had created top-level identifiers that were the same as existing gTLDs. One with eight direct conflicts, the second one with four and the last one in one. On the ccTLD level, we also had collision with existing ccTLDs and even two other TLDs with two later top-level identifiers, not delegated by either. So, our work with DNS-RF aims to give a concrete view of the situation to better evaluate and provide a risk assessment framework for other concerned stakeholders, which is important here, institutions, policy makers, for their own purpose. As a conclusion, in a nutshell, maintaining trust in DNS is crucial for digital identities, DNS identities and other digital identities that are relying at some point on DNS. The integration of blockchain within the DNS could present opportunities but also significant challenges that could alter this trust. Proliferation of blockchain identifier systems makes them prone to confusion when resolving names. Finally, stakeholders’ involvement is essential to overcome these difficulties and understand the potential benefits but also, very importantly, the risk. Thank you.


Keith Drazek: Thank you very much, Benoit. And I just want to reinforce one of the things that you mentioned, and that is the importance of the fundamental foundation, the importance of the single authoritative route in dealing with matters in the DNS. And one of the challenges and one of the concerns that you’ve correctly flagged is the potential for duplication of records when there should be a single record. And so I think this is important both in today’s context but also looking ahead to the upcoming launch of a next round of new GTLDs in the ICANN space. There’s currently an application window that’s targeted for April of next year with likely delegation of some of those strings applied for perhaps a year after that. So this is a live and active topic when we’re talking about potential implications both at the technical and the policy level when it comes to expectations around these unique identifiers. So with that, let me turn to Swapnil.


Swapneel Sheth: Hey, thanks, Keith, and thanks for the opportunity for me to be on this stage, part of this conversation. So, domain names, as we know, have been long users’ identifiers, right? In applications, going back all the way, you can think about telnet, FTP servers, email services, and then later, domain names were adapted to be used for the web use case. So, what we’ve seen, though, in the past few years is that there is interest, and blockchain applications and decentralized applications have emerged as a new use case for user-friendly identifiers. So, as an example, blockchain wallets, we’ve all heard of blockchain wallets by now, and so blockchain wallets tend to identify users via a long alphanumeric string, which is human-unfriendly, much like IP addresses are unfriendly. And so, obviously, there is a need for users to be able to use something that’s human-friendly so that they can make their interactions with these blockchain applications easier. And I think that’s one of the reasons why we have seen dozens upon dozens of these alternative namespaces in blockchains, exactly for this use case, which is trying to make interactions much easier with these blockchain applications. What we are also seeing is there’s a lot of interest in using DNS domain names for these use cases in blockchains. and a lot of other people who have been working on this for a long time. So there’s a lot of interest for using DNS domain names in blockchains, and this chain of thought, this line of thought, where you can use a DNS domain name, integrate that with a blockchain application, we call that a DNS integration. So imagine when you’re trying to send cryptocurrency, right, you can use a domain name which you’re familiar with as opposed to using this long alphanumeric blockchain address. Now the thing is, DNS integrations come with their own set of challenges. For example, how do we think about a domain name that’s transferred or expires after the domain name has been integrated into the blockchain application? How do we avoid risks, right, with inconsistencies, with the security concerns that come along when the same names are used across multiple systems? These are really important topics, and without coordination, these systems will fall out of sync, and when they fall out of sync, they will give rise to, you know, unexpected user behavior, inconsistent behavior. And more importantly, these issues will lose or undermine trust that we have built in DNS over the last several decades. Don’t get me wrong, though, ultimately, I think blockchain-based DNS integrations have the potential to enhance the value of DNS domain names, but we believe that the way to get there… is we are responsible DNS integrations, so we can take the well-established benefits of DNS and extend that to these new use cases in blockchains. So safeguarding the stability, security, and reliability of critical internet infrastructure has been at the very core of what VeriZyne does. And alongside keeping the same values in mind, we’re also supporting development of responsible DNS integrations. So what have we been doing? We have published a variety of research papers and measurement studies to raise awareness of SSR issues that exist in today’s DNS integrations. We’ve also, we are actually actively working with the community and encouraging the community to come up with standards and best practices for responsible DNS integrations. I think this is where I see a great opportunity for collaboration. The DNS, along with this long-standing community in ICANN and IGF, have proven to be resilient and adaptable, right? DNS has well-defined standards and practices for transparency, for control, and for domain name lifecycle management. And I think together these principles can inform and should inform how we build and develop these new integrations with DNS. So now the internet success has been rooted in interoperability. Trust and collective ownership. And as we evolve the DNS to these new use cases, as we innovate, we must preserve these values. So here’s my invitation. Let’s work together. Let’s collaborate together so that we can use the existing critical DNS infrastructure for these new use cases, but let’s do so in a manner that supports our collective goals, which is to build a safe, secure, and reliable internet ecosystem. Thank you.


Keith Drazek: Thank you very much, Swapneel. So I’ll turn next to Esther, but I just want to remind everybody that when Esther’s concluding her remarks, we’ll turn to the audience, turn to you for any questions and comments and input that you may have on this particular topic. And of course, our panelists are more than welcome to engage together and compare notes in any conversation that they’d like to have. So thank you. Esther, we’ve heard about various national approaches to digital identity and online safety from the UK’s Online Safety Act to emerging blockchain systems. As AI transforms both the challenges and the potential solutions, what do you think needs to happen at the global level to address the trust and security challenges? Thank you.


Participant: Thank you so much for your question, Keith. I really believe that the choices we will make in the next two years will determine a lot of whether the internet will remain a stable and trustworthy source, or whether it will become a great vulnerability for us. I will explain why in my remarks. Before I begin, just to reiterate, this is not UK government policy, and it is based on my research on AI, but also institutional governance. I think that when Tim Berners-Lee created the World Wide Web, he was probably not expecting how much of our global e-commerce system and our economy would depend on the structures and the protocols that we have in place today. The internet is the backbone for 5.4 billion internet users, which is an incredible number that we hope will grow and reach everyone that hasn’t been connected yet. Living in this type of environment also presents a lot of risks and challenges. I know that we will move to the topic of fraud after this, but I just wanted to highlight… and Rima Amin, and we are here to highlight how important it is that we maintain a secure DNS system as in the United Kingdom alone, fraud accounts for 40% of all crime and 80% of that is cyber. So while all of this is intensifying and we have a lot of issues of fraud in the current DNS system, new naming systems that we are discussing today are emerging in parallel with the global domain name system. So what is happening in the global domain name system is that there is a lot of information, a lot of logic, standards, and their own risks. ICANN, which we respect and love to be the important body that is keeping the internet stable and interoperable, acknowledges that blockchain naming systems are being built outside of the global domain name system. Actually, I just wanted to give you a number that I have been working on for the last couple of years, and it’s a really good time to talk about web 3.0, but also about web 3.0 groups preparing to apply to the next round of GTLDs at ICANN in 2026, and so this is a really good time to discuss these challenges. So the critical choice I want to highlight is that we need to answer the question, and my co-panelists have addressed it, do we integrate this blockchain system into the global domain name system, or do we watch our infrastructure fragment in dangerous ways in which fraud will likely just intensify? And the question that we’re facing today is definitely not whether these systems will emerge and whether this threat will exist, because it already does, and it will, and I think we’ve already moved past that question absolutely. And I am proposing very much a multi-stakeholder approach to really tackling this. And the different stakeholders in the next round will have already been and Rima Ampeau. So, I’m going to talk about the infrastructure that integrates these two systems. Some of the things that I’m thinking about is also connecting it to some of the GDC and SDG lines that we have. So, under the GDC principle 2, it would be very, very smart to integrate cryptographic identity into DNS queries. So, there would be a lot of security, a lot of security, a lot of security, a lot of security, but it would be a very, very smart layer to what you are accessing. GDC principles 3, 4, and 5 would also enable federated AI systems to detect fraud in realtime on top of the structures that we have today. And how does this work? Well, we know that blockchain identifies, they create really strong, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure, secure. So, the GDC principle 3, 4, and 5 would be a great opportunity to combine these two approaches. This would strengthen, actually, the root principle that maintains today’s internet stability and universal connectivity, and that’s why it’s important that ICANN pays attention to this now and really leverages the next round to ensure that AI is not just a tool for the internet, but also a tool for the future, and that’s why we’re here today. So, the GDC principle 3, 4, and 5 would be a great opportunity to combine these two approaches. And how does this work? Well, we know that blockchain identifies, they create strong, This is very important because if we try to soak the points, to succeed, if we try to replace the DNS it will be really bad for the internet. We need to integrate. and the other is that we are trying to integrate any new technology and innovation into the system we have today. And to conclude, being a multi-stakeholder process is the only way forward. No government, no private entity, no civil society group can solve this alone. This needs to be done within the forest that we have today, especially within ICANN, the GAC. It needs to be actively involved to make sure that the next round is successful and integrates these really important thoughts that we are discussing today. Thank you.


Keith Drazek: Thank you very much, Esther. I think this is a really important point to say. Innovation needs to be supported and encouraged, but it needs to be done in a responsible way. So I think each of our speakers so far has really reinforced that issue. I really appreciate your focusing this on the need for the multi-stakeholder engagement around this topic. I think that’s critical and certainly one of the reasons that we’re here today at IGF bringing this to the community’s attention. So with that, let me ask if there’s anybody who would like to come to the microphone or to get – actually, there’s one on each side – or to get in queue, checking to see if we have anybody online. I would say we have five or ten minutes to discuss this topic before moving on if we’d like to, or we could move directly into the online harms discussion and then come back for questions and comments at the end. Edmund, go right ahead. Hello. Welcome.


Edmund Chung: Edmund Chung here from .Asia. I just wanted to pick up on the integrating blockchain and some of the emerging technologies to how we manage the DNS. Two things I want to highlight. One is I thought the question about including cryptographic technologies to the resolution process is quite interesting. I just wonder, currently the DNSSEC protocol – security extensions, do do that. I’m just curious how blockchain would add to the DNSSEC part. The other thing that came to mind is that what about the registration data? I actually personally find the registration data to be quite useful. I mean, blockchain might actually be very useful for registration data, especially for domain transfers, ownership transfers, and authentication of those issues because of the nature of blockchain. See if there are any thoughts on those two things.


Participant: Thank you, thank you so much for your question. And definitely DNSSEC, very good that you brought it up and thank you. I wanted to get into that as well. It’s true that it already provides some form of validations in the DNS responses to prevent that tampering. But this blockchain enhancement really just builds on top of that, I would say. So it would exist as a form of secondary security layer on top of the DNSSEC. And that would be similarly to what would happen when we need to develop quantum resistant data defense processes.


Benoit Ampeau: Yes, I would just add that DNS is secure today. DNS domain names are portable, they’re flexible, and they’re secure. Security is provided by DNSSEC as a means of authentication and otherwise email and web traffic are supported via the encrypted protocols. So I think I want to reinstate that DNS is secure today. Aziz?


Keith Drazek: Okay, thank you very much for that. And Edmund, thank you for that question. We have another speaker. If you could identify yourself please and then go ahead and ask your question.


Andrew Campling: Yep, hi there. Thank you. Andrew Campling. I’m from a consultancy, 419 consultancy, which amongst other things spends time thinking about the DNS. I’d echo the comments about DNSSEC. And yeah, so I’m skeptical that there will be value add on that specific point, doing two lots of the same thing. I think, particularly when I know there’s post-quantum being tested to extend DNSSEC anyway. And we have to think about the compute cost, the environmental cost of doing that twice. So I think we should be cautious heading in that direction. The point I wanted to make, though, some of the, let’s call them the Web3 naming schemes, have as a feature of their creation that they have no governance. So some of the ones that don’t have it as a feature have fairly immature governance, not by design, just because they’re still very early in their evolution. And I think there’s a lot of very useful lessons that could be carried across from the approach to governance in the DNS into those systems. So there will be benefit from integration, at least at the governance level, if not at the technical level. So I don’t know if any panelists want to comment on the governance points.


Swapneel Sheth: So I don’t know if you’ve been following DNSOP, Working Group, and IETF. And so we have a couple of drafts that we’re working on towards responsible DNS integration. And one of the ones was recently, as of early this week, was adopted by the Working Group. And it talks about what are the considerations for integrating DNS domain names into blockchain namespaces or blockchain applications in a responsible manner. So it’s sort of a checklist of things to go through as you’re building your integration. And hopefully, by the end of it, you will have a responsible integration. And that will obviously have the governance of the DNS because it’s it’s routed into the DNS. I can manage DNS route if that helps answer your question. Yeah and going back just a plug-in here for the since you bought a post quantum DNSSEC. If you are interested in that topic we are actively working on it. We will have hackathons and we’ll also have a PQ DNSSEC side meeting at the upcoming IETF meeting. Please join us and feel free to contribute.


Benoit Ampeau: fully agree with what you said but from the blockchain provider solution perspective we do not know yet if they would like to engage in this way in the responsible integration. So basically we know internet it’s complex we all know this. Maintaining, providing consistent user experience for a stable resilient secure internet it’s complex. So we’ll see what the future will be by integrating this kind of factors into the DNS ecosystem at large.


Swapneel Sheth: I’ll make another point while we’re on the topic is the interest from Web3 community. So the draft I just talked about I have co-authors from ENS which is a alternative namespace in the blockchain Ethereum name service and another co-author is Blue Sky which is a decentralized social media namespace that’s trying to use DNS domain names as social media handles. So I just want to say that there is enough interest from the Web3 community to integrate responsibly as long as we have we are willing to work with them.


Participant: And maybe just to add again to emphasize that this is important to think about now because now ICANN has an opportunity to seriously engage with as I mentioned earlier it is a growing industry there is interest but it’s our responsibility coming from kind of the ICANN and traditional DNS system to to engage and that’s also within our hands.


Keith Drazek: Thank you very much and Andrew thank you for the question and the engagement. we have two quick questions I think in the chat that Emily will read and then we’ll probably pivot and move on to the online harms discussion and we can always come back to this at the end so Emily.


Emily Taylor: Yes so we had a comment from Luke Siffer saying okay I’ll sum it up it’s not that complex the entire web 3 4 5 blockchain saga is merely a creatively lazy attempt to monetize the internet by fragmenting DNS with an alternative route nothing revolutionary here just reheated hype time to move along Bevan Wathen did a thumbs up and an agree to Esther’s call for for integration and not replacement of the DNS and a Carolina from Oxhill hello Carolina asked two questions how do we ensure responsible integration happens in a multi-stakeholder manner and also how to get the blockchain community to participate what incentives exist for them to participate I think a lot of those the second question you touched on in in the just the recent remarks thank you.


Keith Drazek: Yeah thanks very much Emily and I think to Carolina’s question about you know what are the opportunities for engagement I think the dynamic coalitions that are represented here I think our future opportunities for continued engagement in a multi-stakeholder way on this conversation but probably not the only options so we should be creative and think about how to reach out and engage folks from from this particular community but also other multi-stakeholder actors and perspectives to make sure that we have a well-informed and broad sort of understanding of the various concerns and opportunities so thank you for that we will now pivot and move on to our discussion on online harm mitigation I’ll just take a couple of minutes to give some context and maybe frame the discussion over the last five ten years and Benoit Ampeau. The third type of abuse is phishing, farming, malware, botnet, command and control distribution and spam when spam is used as a delivery mechanism for those other four. Obviously, that is just a subset of the broader topic of online harms, right? So that’s, you know, DNS technical abuse. There’s obviously other online harms that are related to content, and there are a number of different actors in the system, and there are a number of different technical capabilities to mitigate abuse at the most appropriate time, the most appropriate level, without disproportionate impact on other actors in the system. So I think what we’re going to talk about today is the broad topic of online harms, and with that, I’m going to turn first to Hilde. Hilde, a question for you. The Norwegian top-level domain .no is an example of a very broad topic of online harms, and I’m wondering if you could talk a little bit about the reasons why online harms are being used for abuse like phishing, malware, and spam. Could you share some insights from your perspective into what could be the reasons, or what could be the reasons behind that? Thank you.


Hilde Thunem: ≫ Thank you for having me here on the panel. I’d like to start by saying that just like in the offline world, I think online abuse rates are a very important part of the world, and I think that the Norwegian model and the Norwegian approach to the .no domain name provides one example of how many different stakeholders can work together and have a positive effect. So all domain registries, people like me that hand out domain names, we operate within a ecosystem of the local law where we’re based and the registration policy. And one of the factors that influence the type of neighborhood that sort of grows under a top-level domain is the requirements that the registry imposes on those wanting to register domain names. So the registration policy for NO is shaped by NUDID, but we do this in consultation with different stakeholders in the Norwegian society and within the domain regulation that provides a sort of framework for the basic principle of this. And one of the requirements we have is that anyone who wants to register a .no domain name must identify themselves by providing either the organization number registered in the Norwegian Register for Business Enterprises, and foreign companies can do this if they have a Norwegian subsidiary, or as an individual to have a national identity number registered in the National Population Register. So if you worked in Norway for a long time you get one of these. And before granting the right of use to a domain to anyone, we verify that they exist in one of these official registers. So we look it up and this ensures that each NO domain name is registered to a real individual or organization who is responsible for how the domain is used. So sad to say, and I hope I’m not breaching any childhood dreams here, but Santa Claus does not have a .no domain name because he does not exist. But of course this is not only a sort of registry only effort, because we don’t talk to the domain holders directly. So it’s the registrars who have the direct contact with their customers that are required to know who they are, and to sort of ensure that the one contacting them actually represents the organization that they are. are trying to register a domain for. But how they do this is left to the registrars, because that varies widely if you’re a small registrar that knows every customer personally, or you’re a large registrar with different control systems. And then we also have a very, I think, fairly unique Norwegian rule that there is a limit to how many domain names each domain holder can have. So if you’re an individual, you get up to five domain names, and if you’re a company, you get up to a hundred. And the rationale behind this is that domain names are a limited resource, or good domain names are that. And sort of in the Norwegian way of, there must be some cake left on the table for the latecomers. We want to keep some domains still there so that early adopters don’t get to take them all. So both of these requirements are there for other reasons than fighting online harm. But they have the happy side effect that they irritate the scammers a lot. Because first of all, someone wanting to register a domain to use it for illegal content, for scams, for spam, they have to either identify themselves or steal somebody else’s credentials. And when they do, and they sneak past the registrar’s control mechanism, they get only a hundred domain names, or five if they stole somebody’s personal credentials. And that’s kind of friction for those that need to burn through a lot of domain names in order to spread their scams. At the same time, the whole point of making it slightly difficult for the criminals is also not to create a big burden on the legitimate domain holders. Because we want people to have domain names. We want them to have their little corner of the internet where they have ownership of the content they produce instead of just… just being at the online large technical social media platforms. And so, this makes NOF a fairly safe space, but of course there are Norwegian criminals and there are other criminals that steal credentials. So, in the cases that domain names are used to commit a crime, then the rest of the regulatory ecosystem comes into play. So, the Supreme Court in Norway established as early as 2009 a principle that it’s the domain holder that holds the responsibility for the use of the domain name. And since that is actually a real person or an organization, there is a place to start if one wants to take action. And this year, the revised Electronic Communication Act provided further clarity by putting this principle into law. So, as a last resort, when proportionate action may be taken against the domain name. But such measures requires a process that safeguards the legal rights of all the involved parties. And this is especially important because for top-level domains like .no with the presence requirements, almost all of the domains that are used for the technical online harms like phishing are compromised domains. So, the domain holder is a victim that has his website or has his domain compromised and not necessarily the perpetrator. But in those rare cases where a domain name needs to be taken down instead of the content acted upon, Norwegian police have a clear mandate in law to seize domain names. Similarly to what they can do in the offline world where they can seize a car or a gun or a dog if it has bitten someone and to keep as part of a case that’s raised. And just like in the offline world, also in the online world, when they seize a domain name, they have to follow the requirements for due. process. And the Consumer Protection Agency have the same sort of power to go and require domain name to either be deleted or transferred in the cases that it’s serious online harm to consumers as a whole. But in those cases, they have to go to court just to prove that they have tried less impactful actions first. So in summary, I think it’s the combined effort of the registry and the registrars as part of the registration process, and then the regulatory framework and the public authorities, both providing official databases we can use, but also acting when illegal content or other online harm is being a problem.


Keith Drazek: Thank you very much, Hilde. And I want to just touch on a point that you raised, and that’s the important distinction between domain names that have been registered with malicious intent or for the explicit purpose of perpetrating fraud or crimes or online harms, and compromised websites or compromised web hosts. And I think you also noted that there could be an instance where a domain name that was registered with perfectly legitimate intent had an account compromise. So it actually could be there’s sort of a range of possibilities there in terms of the use of the domain name. But I think you also reinforced an important point that depending on the nature of the harm or the nature of the abuse, there could be action that’s appropriate at the registry level or the registrar level or in combination somehow, or there’s the need to engage the content layer of the infrastructure stack to make sure that the web hosts, the CDNs, are also involved in instances where a website’s been compromised, because they’re the only actors that can take the surgical act needed to be able to address that particular bit of harm. And so proportionality is important in all of that, but Thank you for all of that. Thank you, Hilde. Okay, I’m gonna turn to Lucian next. Lucian, on day zero, we had, there was a great session, I recommend it to everybody, on online fraud and scams. And so we heard in that session from you about the Global Signal Exchange, your new initiative to address a number of challenges in tackling scams and fraud. So curious what you’d like to share on that and how it’s different from any other initiatives. So, Lucian, thank you.


Lucien Taylor: Thank you very much, Keith. I just wanted to say, I think we’re gonna do our little speeches and then there’ll be questions after that if you wanna take a rest. Okay, thank you very much. Yeah, Keith, thank you for that. And three short answers, and then I’ll extemporize. One is, the first one is that we didn’t just dream up the idea of the GSE ourselves of sort of building a Global Signal Exchange. A number of organizations came together in a multi-stakeholder community and asked for that organization to be created. In other words, that it was missing in the current fight against scams and fraud. And so how are we different? Well, we seek to change the game in the effort to tackle scams and fraud. And finally, in the answer to the… Well, it’s a point that I generally want to say we’re here at the IGF and we really think that this is the ideal sort of space, this multi-stakeholder environment to discuss these sorts of things. But I’ve also been hearing about the Internet Infrastructure Forum and others where these are safe places which are less polemic where we can actually come together and figure out how to solve this without kind of getting into a circular firing squad. So to dig in, my first point, was the creation of a new data signal sharing entity. The need for a cross-sectorial international signal sharing platform was… identified in the Global Anti-Scam Summit in Lisbon in 2023. And the GSE brings together a number of partners to deliver a new service to fight scams and fraud. Currently, we’ve got 160 organizations in the accreditation pipeline. So there is a strict accreditation process. We’ve got the commitment from four big tech, including Meta, thank you, Rima. And we’ve got a huge new opening, proprietary threat intelligence from Google, which is opening, they’re opening up their own in threat intelligence to this new idea, this new venture, and trying to less depend on these sort of lots of threat signal bilaterals and have a single service to go through as a kind of broker. We also have, we’re in negotiations with several governments and law enforcement bodies. So how are we changing the game? Cybercrime is rising relentlessly. I don’t think any of us can argue with that really, seriously. I’ve asked my family to look at their phones and give me some WhatsApp examples. And they’ve just got dozens of, you know, you’ve got to pay a fine, you’ve got to pay for, you’ve got a new bill from some car park or some tax office. We’re under this relentless pressure all the time to reevaluate the things that we’re being presented with. There are a number of initiatives across the internet supply chain, verticals, we call them verticals, that are doing good things. But cybercrime, the vector is still increasing. When I talk about the internet supply chain, I talk about the supply chain that’s available to scammers and fraudsters. That is building their infrastructure. A fraudster will build a domain name, identity, register a company, build a website, benefit from content delivery network. and so on. They will then establish false IDs on social media channels and on email and others. They will then easily engage with the potential victims through chat, through email, through messaging services. And finally, step four, I call it, a banking commitment is made, a crime is registered. And at that point, we know we’re dealing with a criminal. And then they package those fraud services and recycle them and make them available and actually provide a fraud and scamming industry for others to enjoy. So the criminals are moving faster than us. They’re exploiting cross-border legislative tensions and sharing bad things between each other better than we share things. So the GSE aims to deliver new things. First of all, face up to the governance and policy challenges. And they are considerable. We’ve been talking about them in ICANN and IGF for decades now. And secondly, address the technical challenges. Now, in terms of the governance and policy challenges, we are tackling head-on the cross-border international and cross-sectorial challenges. And we’ve hired good lawyers. And I’m not going to even bother to talk about all of that today. Thank you very much, Emily. In terms of the technical challenges, I’ll get back into my comfort zone. We’ve invented our own acronym called Quick Factors, QIQ. You can’t invent a new organization without some new acronyms. First, those quick factors are quantity, immediacy, and quality. In terms of quantity, have we got enough data to reflect the actual problem, to reflect the problem that consumers are suffering? In January, we had 40 million threat signals. Let me put that into context. The action fraud, City of London Police, they’re getting 30,000 threat signals every month. We’ve risen from 40 million threat through the Google stack, up to 270 million threat signals. They’re rising by a million threat signals a day. And we still believe we’re not seeing half of it. Hopefully when Meta and more come on board and start supplying those signals, we’re going to start to see really what the consumer is suffering from. We want those more signals to be provided for the participating organizations. And we call this uplift. Uplift is when all parties share signals and thereby find new information for themselves over and above their own stocks of threat intelligence. We observe uplift. We also want to reduce the cost of signals for the smaller players. Immediacy. We need to make things quicker and reduce the time to live for scams and fraud online. The time between a signal reported and a signal being mitigated needs to be brought down from an average of four days between detection and mitigation. Esther mentioned the need for federated models and quantum big computing power and AI to move towards real-time threat detection to identify these clusters as they’re happening. Finally, quality. To tackle both the quality of the signal and the provider, these are impacted by two things. Confidence scores and feedback. So a signal provider can attach their own confidence score to a signal and this can be improved by what we call overlap. When all parties share signals and simultaneously detect the same signal, we increase confidence. And the second big part of our work is to develop a feedback loop. This is a concept that came from cybernetics. It’s something that I employed in 2023 and started talking about because it’s missing in the game. And the feedback loop is an enormously challenging bit of work. you can’t just provide feedback to threat intelligence signals which are low quality kind of neighborhood watch type things. These are not evidence-based pieces of data that will stand up in court. So the signals are absolutely essential. I’m running out of time so I’ll just summarize. We have a number of pilots with registries, registrars, advertising communities, big tech doing handshakes, and police and law enforcement. Thank you very much.


Keith Drazek: Thank you very much, Lucian. And, you know, I think what you’ve described is a clear need for an intermediary, an aggregator of data, clearinghouse, platform of data sharing between threat reports, threat intelligence, reporters of abuse, and the operators of infrastructure that have the capability to address that abuse, right? So thank you very much. Just time check, we’ve got 18 minutes left. We have two panelists yet to speak and I’m going to try to keep a few minutes, five minutes at the end for any questions and engagement from you. So, Rima, if I could turn it over to you. Thank you.


Rima Amin: Sure. Thank you. So I’ll start by saying that our team in security policy work to counter adversarial threats in a number of different areas. So that tends to cover influence operations, cyber espionage, hacking, and frauds and scams. And throughout all of those different areas, the evidence shows that DNS abuse accelerates the harm to people and businesses across the board. Our teams are really focused on working to prevent, mitigate, and stay ahead of these threat actors that are looking to abuse sort of matters platforms and violate our policies by redirecting users off over to malicious. off-platform links, but I think as everyone has kind of said here today that this is a internet ecosystem problem, so we need to really have that sort of multi-stakeholder approach to be able to responsibly manage and mitigate some of these DNS abuses. Just to touch on a couple of the sort of the key areas that we’re concerned about and that we see, so the first sort of being domain spoofing, where domain names are created closely to resemble legitimate ones in order to deceive the people using our platforms. We also see them being used to sort of phish people online and sort of steal sort of their credentials. The second area relates to sort of cyber-squatting and domain impersonation, and impersonation of things like businesses and sort of well-known brands, again created to lure people into thinking they’re into a safe space that they sort of know, and sort of commit harms towards those people. The third is relating to deceptive sort of redirects, so adversarial actors may attempt to route users to malicious websites by making them think that they’re visiting a legitimate one, and then they get thrown over to a harmful website potentially with sort of malware and other harmful things. One emerging area that we are seeing is the use of link aggregators and shortners, so we’re seeing threat actors really sort of leverage those in order to sort of evade URL impersonation that might be sort of easier to detect, so that’s one sort of area that is emerging. Just to dive a little bit more into the frauds and scams space and how the DNS and Rima Ampeau. So, I’m going to start with the accounts side. So, if you are a fraudster, you’re most likely to use a fake account or a compromised account. Compromised accounts are particularly lucrative because they have legitimacy and sort of history behind them. And those accounts may also be used to sort of manage sort of different business profiles, et cetera. So, for example, if you are a fraudster, you’re most likely to use a fake account. So, one way that they might try to gain access to that account is, again, through sort of malicious links, which would sort of install malware and steal credentials and a bunch of other different things there. Once identities are created to sort of Lucien’s point earlier, the actor will try to engage with their victim. So, for example, if the victim is trying to engage with a bank, they try to engage with a bank and they get a message from a bank and they add a message and whatnot, then the victim is often taken over to a website. Now, that website might be sort of impersonating a particular shop. They try to buy a product. They no longer receive a product. They try to go back to the website. They don’t get any recourse. And then they go over to the banks. And then they try to go back to the website. So, that’s one example of how the victim is trying to get out of a platform and make sure it doesn’t reemerge. But to Lucian’s point about how long they stay on the internet, they still continue and continue to exist on other platforms and cause harm. A couple of things that we’ve been doing also to protect the misuse of sort of Meta’s brand, we hope we can continue to use that. In summer we started in 2024 last URLs that came from sort of Vietnam. We’ve also been able to take down 9,000 URLs that were impersonating sort of WhatsApp, Facebook, Meta, Instagram, threads and reality labs. So we are able to take some action, but we do think more is needed. To go back to the point about these websites existing on the internet, we take efforts to share the intelligence and signals that we have. So we do that through sort of existing signal sharing programs that we have with industry. And we also think GSE has a lot of potential, especially because it’s not just industry focused, but because there’s sort of cross sector sharing that is happening there. In terms of sort of moving forward here, a couple of things that we think would be really helpful. I think the first is having sort of global solutions. We’ve seen some really good sort of practice here today. And I think bringing those into sort of global context would be helpful because of the nature of sort of the internet. We see a lot of countries trying to tackle this sort of in their own way. And so if there was a consistent approach, we think that would be incredibly helpful. We also sort of advocate for sort of transparency and accountability policies to navigate DNS abuse, including sort of areas to help with authentic engagement online. The sort of remediation side, so making sure that abuse is mitigated sort of as promptly as possible. And we also support the whole of sort of community cooperation here because we do understand that it is a complex problem. We all only see different parts of it. And so we actually just need to be pulling these pieces together.


Keith Drazek: Okay. Thank you very much, Rima. I think that last point is really critical, and that’s collaboration, cooperation, information sharing up and down and across the stack, and also to both of your points about the need for cross-sector engagement. For example, the financial processing transactions industry, you know, they have information that would be very helpful to other parts of the Internet stack. That’s just one example. So thank you very much for that. Appreciate it. Graeme, I’m going to turn to you next, and then we’ll probably try to keep five minutes at the end for questions and answers and community engagement. So Graeme, over to you.


Graeme Bunton: Thank you, Keith. I will try and be brief. First of all, apologies that I couldn’t be there in person. I’ve got a pretty small kid at home and have been traveling a bunch, and it turns out that generates some difficulty sometimes. And really appreciate being able to participate in this panel. I’d like to share here a bit today on some of the work that we’ve been doing to try and disrupt online harms and what we’ve learned in that process and how we think that can contribute to further work within this community. So first, a little bit about the NetBeacon Institute. It was created by Public Interest Registry in 2021. PIR is the operator of the .org TLD and is a not-for-profit and needs to do good works in service of that not-for-profit mission, and really felt like there was a gap within the ecosystem around issues of DNS abuse, that there wasn’t someone in the middle of that focused on this issue, working across the community within ICANN and outwards to try and educate, collaborate, build tools and resources to try and disrupt DNS abuse. And so the institute was created to try and fulfill that need. We’re not commercial as a part of the not-for-profit. I’ll talk a little bit about the services that we offer, but we don’t do anything for fee or cost recovery. All of what we do is free. And so as we began this work with the mission of trying to make the internet safer for everybody, we first needed to understand the landscape of DNS abuse. And so we created a project called NetBeaconMap, Measurement and Analytics Platform, which is a free and transparent, academically robust attempt to measure the prevalence of DNS abuse across the ecosystem, as well as things like concentration, mitigation rates, and median time to mitigation. And we do all of that work in partnership with CoreLabs out of the University of Grenoble, an academic there named Professor Maciej Korczynski. And so we’ve been providing this data publicly to the ecosystem for three years, I’ve lost some sense of time being stuck in this room, and really trying to enable the multi-stakeholder community to try and do data-driven policy discussion and development, as well as really drive industry action based on rigorous data. And so what have we learned from that? Well, a couple of things. One is that 95% of the malicious domains that we see belong to about 50 registrars or less, 80% belongs to less than 20. And so on a malicious domain front, in a way, that’s good news. The problem space is not huge. There’s differences between the registrars and TLDs also in that data. But we can sort of wrap our collective arms around the scope of that problem. There are changes that we can make. There’s ways that we can bring all of these parties together and improve the situation. We can see now the changes within the industry based on the ICANN contract amendments that came into effect last year, where we begin to see the larger, more active players getting and Benoit Ampeau. The DNS abuse rate is incrementally better, but they are close to diminishing returns, I think, on issues of DNS abuse for the sort of large, more engaged registrars in the space, and we can see abuse concentrating now in a smaller number of more highly abused registrars and TLDs. Right now, we see a really acute issue with two registrars, with very large abusive campaigns happening, and we’ll publish more on that in a moment, but I think the DNS abuse rate has begun to influence how we begin to approach this problem and think about it, and that really led us to how can we begin to disrupt these things, and so we built NetBeacon Reporter, which is a conduit for abuse reporting that anyone can use via web form or API, and use it to submit abuse reports to any gTLD registrar or participating ccTLD or registry, as well as we distribute to hosting companies and CDNs, so what we’re trying to do is take abuse reports in, we standardize them, we enrich them, we make them better, we reduce the technical burden on the reporter, and we distribute those abuse reports to multiple layers of the internet stack to try and disrupt those harms. That work was directly responsive to some multi-stakeholder outputs, SSR2 and SSEC 115, which is a multi-stakeholder report, and we also have a multi-stakeholder report on SSR2 and SSEC 115, if you speak ICANN, most specifically, and so we’ve been running that now since 2020, and doing somewhere around the realm of about 20,000 abuse reports a month, and we learn an awful lot from that sort of volume. We’re getting a lot of feedback from the hosts and registrars that we’re reporting to on the quality of those reports, and we can see who’s taking action, when, and why. And going back to some of the points made by the other panelists, especially around the Thank you, Luchin, for that. Boy, it seems very clear that improving reactive processes around abuse, there’s still some room there. We can do better at evidence gathering and we can do better at getting abuse reports to registries, registrars, and hosts in a timely fashion, and we can get better at helping them respond quicker. And all of those, I think, are interconnected. Lastly, it seems really clear that we need improved, reliable, and accessible proactive processes. Abuse is happening at such a scale that trying to react all the time isn’t sufficient. There are days where we have sent 6,000 abuse reports out, 7,000 abuse reports out to individual registries or registrars, and that just doesn’t work. It just doesn’t scale that way without some form of automation, but really it’s about getting in front. And so how do we think collectively about getting in front of some of these issues? And lastly, a point I want to make about trust and users is that I think we can rely a little bit on trust based on behavior within these systems rather than identity, because behavior on that platform, how many domains have you registered? How many, how long, how old is your hosting account? Those attributes can’t be faked and feel like a really good place to begin building trust on as we begin to think about who has access to these tools and resources. I’ll stop there. I know we only have a few minutes. Thank you very much for the time.


Keith Drazek: Thank you. Thank you very much. Thank you very much, Graham. Really appreciate it. We have like three minutes left, so I’ve got two people at the microphone, if we could be brief. Oh, and I’m sorry, we have three, yes. So let’s try to fit in at least the three interventions. So go right ahead. Thank you so much.


Audience: Hello. Thank you for these wonderful interventions. My name is Yuv, I’m from Senegal. I really appreciate the topic, especially the digital identity, the DNS. Senegal has had a DNS since the 80s, but in 2025, some ethnic institutions send emails, not with the .sn, but with a .ya or a .go, a .ya or a .gmail, which even constitutes a risk, since the question of cybersecurity arises. And recently, the State of Senegal was the victim of two cyber attacks. So, as an expert, what would you propose to the State, so that we can use the .sn in administrative services, so that there is a digital identity, but also to strengthen security?


Keith Drazek: Thank you very much for the translation. So, good question. Maybe we can take that offline, since we have a couple of others in queue. So, is that Andrew again?


Andrew Campling: It is. I’ll be real quick. Two very quick points. Firstly, ICANN have done some great work to tighten up the contracts to address some of the DNS abuse issues. The real gap here is the lack of action by some of the ccTLDs. So, how do we get governments to also step forward to address this? So, maybe this is the right forum for that, as some of them are here. despite the good work in ICANN, the definition of DNS abuse that ICANN uses is incredibly narrow. And for example, that doesn’t address things like CSAM, although it does cover phishing. So, how can we get more work done to broaden the definition so it has even more impact than it already has?


Keith Drazek: So, thank you very much, Andrew. I can respond to that very briefly. As far as the the definition of DNS abuse, one of the bright lines is when you get into content-related matters, ICANN’s bylaws prohibit it from getting involved into content. So, the definition of DNS abuse is relatively narrow by necessity of ICANN’s bylaws. But there are other venues for discussing content-related harms that are sort of being discussed and developed. And Bertrand, I’m going to turn to you as the shepherd of the Internet Infrastructure Forum. That’s one of the areas where some of these content-related discussions are going to take place. Thanks.


Bertrand Lachapelle: Yeah, thank you. Thank you, Keith. So, in a nutshell, I’m Bertrand Lachapelle. I’m the Executive Director of the Internet and Jurisdiction Policy Network. As Keith mentioned, we have been asked to organize a space to address a certain number of the abuses that do not, that cannot be addressed within the ICANN environment and also to engage other actors than just the DNS operators. I want just to make, and this is the Internet Infrastructure Forum, which is a new thing that started basically in February this year. I want to very quickly mention, in light of what you’ve been saying, this whole thing is a speed and scale challenge and it’s a data challenge. It’s a data sharing challenge. The second thing is that scams, frauds and so on, there is a concept that is evolving that we’ve been discussing in the IIF, which is the notion of theft by deception. This is a category of problems that require or would really benefit from Coordinated Action by the different actors along the stack. The next thing is what I love about what has been presented here, what we do with the IIF, is that these are bottom-up, spontaneous self-organizations, just like the ITF emerged, just like the other organizations emerged. This is multi-stakeholder, bottom-up initiatives in action. It actually is what is needed because the governments are hobbled by the jurisdictional challenges that prevent them from addressing cross-border issues. And the last thing is what is really interesting is that we see the emergence, and Graeme was here. Lucien, you’re talking about what you’re doing with the signal exchange. There are layers here. The IIF is a space for the discussion of what could be done by the different actors. We see the emergence of new intermediaries that handle the abuse workflow problem, management, and what you’re doing is contributing to the platforms for exchanging signals. And I think this is building the ecosystem that, at last, will allow later on to engage law enforcement and other actors so that the whole number of actors can, in a network fashion, address those abuses.


Keith Drazek: Thank you very much, Bertrand. And with that, we are two-plus minutes over time, so I think we probably need to move to wrap up. I just want to say thank you all very much. Thanks to the panelists. Thanks to everybody online. Thanks to you in the room. And we look forward to carrying this on. I wish we had another hour, but we need to close the session. So thank you very much.


B

Benoit Ampeau

Speech speed

141 words per minute

Speech length

1000 words

Speech time

423 seconds

Trust is essential for digital identities and blockchain integration presents unique governance and standardization challenges

Explanation

Trust is fundamental for the security of digital identities, and without it, users and businesses cannot operate effectively online. Integrating blockchain into existing DNS infrastructures raises questions about governance and standardizations, as global consistency and trust of all stakeholders in DNS have yet to be built for blockchain.


Evidence

AFNIC has been studying trust in DNS for many years and published a report on blockchain potentially replacing DNS, with ongoing evaluation of security levels in blockchain identifier systems


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Agreed with

– Swapneel Sheth
– Participant

Agreed on

Integration rather than replacement of DNS is the preferred approach for blockchain technologies


Disagreed with

– Participant
– Edmund Chung

Disagreed on

Value of blockchain enhancement to existing DNS security


Name collisions exist between blockchain identifiers and existing DNS domains, creating security risks

Explanation

The DNS RF study revealed collisions between blockchain identifiers and domain names, where the same identifier can be allocated by more than one blockchain, leading to duplication. This creates security issues similar to the problems encountered in the 2012 GTLD round with internal corporate suffixes.


Evidence

Examples include TLDs like .wallet and .crypto posing security issues, and findings of three providers with direct conflicts – one with eight conflicts, another with four, and one with one conflict with existing gTLDs and ccTLDs


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Cybersecurity | Legal and regulatory


S

Swapneel Sheth

Speech speed

132 words per minute

Speech length

995 words

Speech time

451 seconds

DNS integrations with blockchain applications have potential but require responsible implementation to avoid security inconsistencies

Explanation

While there’s interest in using DNS domain names for blockchain applications like cryptocurrency transactions, these integrations come with challenges around domain transfers, expiration, and security risks. Without coordination, these systems will fall out of sync and undermine trust built in DNS over decades.


Evidence

Examples include blockchain wallets using long alphanumeric strings that are human-unfriendly, and the emergence of dozens of alternative namespaces trying to make blockchain interactions easier


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Cybersecurity | Economic


Agreed with

– Benoit Ampeau
– Participant

Agreed on

Integration rather than replacement of DNS is the preferred approach for blockchain technologies


Multi-stakeholder collaboration is needed to develop standards and best practices for responsible DNS integrations

Explanation

The DNS community has proven resilient and adaptable with well-defined standards for transparency, control, and domain lifecycle management. These principles should inform how new blockchain integrations are built, requiring collective collaboration to preserve internet values of interoperability, trust, and collective ownership.


Evidence

VeriSign has published research papers and measurement studies on SSR issues in DNS integrations and is working with the community on standards development


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Legal and regulatory | Cybersecurity


Agreed with

– Emily Taylor
– Participant
– Rima Amin

Agreed on

Multi-stakeholder collaboration is essential for addressing DNS challenges


Web3 community shows interest in responsible integration through collaborative draft development

Explanation

There is sufficient interest from the Web3 community to integrate responsibly with DNS, as evidenced by collaborative work on standards. A draft on responsible DNS integration considerations was recently adopted by the DNSOP Working Group at IETF.


Evidence

Co-authors include representatives from ENS (Ethereum Name Service) and Blue Sky (decentralized social media namespace), and there are ongoing hackathons and PQ DNSSEC side meetings at IETF


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Digital standards | Legal and regulatory


P

Participant

Speech speed

180 words per minute

Speech length

1042 words

Speech time

345 seconds

Integration rather than replacement of DNS is crucial, with blockchain enhancing security as a secondary layer

Explanation

The critical choice is whether to integrate blockchain systems into the global domain name system or watch infrastructure fragment dangerously. Blockchain enhancement would build on top of existing DNSSEC as a secondary security layer, similar to quantum-resistant defense processes.


Evidence

Reference to GDC principles 2, 3, 4, and 5 for integrating cryptographic identity into DNS queries and enabling federated AI systems to detect fraud in real-time


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Agreed with

– Benoit Ampeau
– Swapneel Sheth

Agreed on

Integration rather than replacement of DNS is the preferred approach for blockchain technologies


Disagreed with

– Benoit Ampeau
– Edmund Chung

Disagreed on

Value of blockchain enhancement to existing DNS security


Multi-stakeholder processes within existing frameworks like ICANN are the only way forward for successful integration

Explanation

No single government, private entity, or civil society group can solve blockchain-DNS integration challenges alone. This requires multi-stakeholder engagement within existing frameworks, particularly ICANN and the GAC, to ensure successful integration in the next round.


Evidence

Reference to the upcoming ICANN new gTLD round in 2026 and the growing Web3 industry interest in applying for gTLDs


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Legal and regulatory | Infrastructure | Digital standards


Agreed with

– Emily Taylor
– Swapneel Sheth
– Rima Amin

Agreed on

Multi-stakeholder collaboration is essential for addressing DNS challenges


E

Edmund Chung

Speech speed

119 words per minute

Speech length

137 words

Speech time

68 seconds

DNSSEC already provides cryptographic validation, questioning the added value of blockchain for DNS security

Explanation

DNSSEC security extensions already provide cryptographic validation to prevent tampering with DNS responses. The question arises about how blockchain would add value beyond existing DNSSEC capabilities, and whether blockchain might be useful for registration data management.


Evidence

Mention of blockchain’s potential utility for registration data, domain transfers, ownership transfers, and authentication due to blockchain’s inherent characteristics


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Cybersecurity | Digital standards


Disagreed with

– Participant
– Benoit Ampeau

Disagreed on

Value of blockchain enhancement to existing DNS security


A

Andrew Campling

Speech speed

148 words per minute

Speech length

333 words

Speech time

134 seconds

Web3 naming schemes lack mature governance structures and could benefit from DNS governance lessons

Explanation

Some Web3 naming schemes are designed with no governance as a feature, while others have immature governance simply due to their early stage of evolution. There are valuable governance lessons from the DNS approach that could be applied to these systems.


Evidence

Concerns about compute and environmental costs of doing cryptographic validation twice, and the need for caution in that direction


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Legal and regulatory | Infrastructure | Digital standards


Government action is needed to address DNS abuse gaps in ccTLD operations

Explanation

While ICANN has done great work tightening contracts to address DNS abuse issues, there’s a real gap in the lack of action by some ccTLDs. Governments need to step forward to address this gap in DNS abuse mitigation.


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Disagreed with

– Keith Drazek

Disagreed on

Scope of DNS abuse definition and responsibility


H

Hilde Thunem

Speech speed

158 words per minute

Speech length

1119 words

Speech time

423 seconds

Identity verification requirements and domain limits create friction for scammers while maintaining accessibility for legitimate users

Explanation

The Norwegian .no domain requires identity verification through official registers and limits domain registrations (5 for individuals, 100 for companies). These requirements irritate scammers who need to either identify themselves or steal credentials, and get limited domain quantities, while not creating excessive burden for legitimate users.


Evidence

Requirements include Norwegian organization numbers or national identity numbers, verification through official registers, and the example that Santa Claus cannot get a .no domain because he doesn’t exist in official registers


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Cybersecurity | Digital identities


Legal frameworks with clear responsibilities and due process are essential for addressing compromised domains

Explanation

Norwegian law establishes that domain holders are responsible for domain use, with clear legal processes for authorities to act when domains are used for crimes. This includes police powers to seize domains and Consumer Protection Agency authority to require domain deletion or transfer, all with due process requirements.


Evidence

Supreme Court principle from 2009, revised Electronic Communication Act providing legal clarity, and distinction between compromised domains (where holders are victims) versus maliciously registered domains


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Cybersecurity | Jurisdiction


L

Lucien Taylor

Speech speed

146 words per minute

Speech length

1186 words

Speech time

485 seconds

Cross-sectoral international signal sharing is needed to combat the rising scale of cybercrime

Explanation

The Global Signal Exchange was created in response to multi-stakeholder community demand for a missing organization in the fight against scams and fraud. Cybercrime is rising relentlessly, and criminals are moving faster than defenders, exploiting cross-border legislative tensions and sharing bad intelligence better than legitimate actors share good intelligence.


Evidence

160 organizations in accreditation pipeline, commitment from big tech including Meta and Google, negotiations with governments and law enforcement, and examples of relentless scam messages on family phones


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Cybersecurity | Legal and regulatory | Jurisdiction


Real-time threat detection and improved feedback loops are necessary to reduce time-to-mitigation for scams

Explanation

The GSE focuses on ‘Quick Factors’ – quantity, immediacy, and quality of threat signals. Current systems take an average of four days between detection and mitigation, which needs to be reduced through real-time detection, federated AI models, and improved feedback loops between signal providers and mitigators.


Evidence

Growth from 40 million to 270 million threat signals (rising by 1 million daily), comparison with Action Fraud receiving only 30,000 monthly signals, and development of confidence scores and overlap detection


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Cybersecurity | Infrastructure | Economic


Agreed with

– Graeme Bunton
– Rima Amin

Agreed on

Proactive and automated approaches are necessary to address the scale of online abuse


R

Rima Amin

Speech speed

164 words per minute

Speech length

980 words

Speech time

356 seconds

DNS abuse accelerates harm across multiple threat areas including domain spoofing, cyber-squatting, and deceptive redirects

Explanation

Meta’s security policy team sees DNS abuse accelerating harm across influence operations, cyber espionage, hacking, and fraud/scams. Key areas include domain spoofing that resembles legitimate domains, cyber-squatting that impersonates businesses and brands, and deceptive redirects that route users to malicious websites.


Evidence

Examples include compromised accounts being used to manage business profiles, link aggregators and shorteners being used to evade detection, and taking down 9,000 URLs impersonating Meta brands


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Cybersecurity | Consumer protection | Digital identities


Agreed with

– Lucien Taylor
– Graeme Bunton

Agreed on

Proactive and automated approaches are necessary to address the scale of online abuse


Global solutions and consistent approaches are needed rather than fragmented country-specific responses

Explanation

Due to the global nature of the internet, fragmented country-specific approaches to DNS abuse are insufficient. Global solutions with consistent approaches would be more effective than the current situation where many countries try to tackle abuse in their own way.


Evidence

Meta’s efforts to share intelligence through existing industry signal sharing programs and participation in GSE for cross-sector sharing


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Jurisdiction | Cybersecurity


Agreed with

– Emily Taylor
– Swapneel Sheth
– Participant

Agreed on

Multi-stakeholder collaboration is essential for addressing DNS challenges


G

Graeme Bunton

Speech speed

186 words per minute

Speech length

1108 words

Speech time

356 seconds

DNS abuse is concentrated among a small number of registrars, making the problem manageable through targeted action

Explanation

NetBeacon’s measurement data shows that 95% of malicious domains belong to about 50 registrars or less, with 80% belonging to less than 20 registrars. This concentration means the problem space is manageable and collective action can be effective.


Evidence

Three years of public data from NetBeacon Map showing concentration patterns, and observation of abuse concentrating in smaller numbers of highly abused registrars following ICANN contract amendments


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Cybersecurity | Infrastructure | Legal and regulatory


Proactive processes and automation are essential given the scale of abuse that reactive reporting cannot handle

Explanation

NetBeacon processes around 20,000 abuse reports monthly, with peak days of 6,000-7,000 reports to individual registries or registrars. This scale demonstrates that reactive abuse reporting alone is insufficient and proactive, automated processes are necessary.


Evidence

NetBeacon Reporter handling 20,000 monthly reports, standardizing and enriching reports, distributing to multiple internet stack layers, and receiving feedback on report quality and response times


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Cybersecurity | Infrastructure | Digital standards


Agreed with

– Lucien Taylor
– Rima Amin

Agreed on

Proactive and automated approaches are necessary to address the scale of online abuse


K

Keith Drazek

Speech speed

165 words per minute

Speech length

2362 words

Speech time

856 seconds

ICANN’s DNS abuse definition is necessarily narrow due to content restrictions in bylaws

Explanation

ICANN’s definition of DNS abuse is relatively narrow by necessity because ICANN’s bylaws prohibit involvement in content-related matters. When discussions move into content-related harms, there’s a bright line that ICANN cannot cross.


Evidence

Reference to other venues like the Internet Infrastructure Forum where content-related discussions can take place outside ICANN’s constraints


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Content policy | Infrastructure


Disagreed with

– Andrew Campling

Disagreed on

Scope of DNS abuse definition and responsibility


B

Bertrand Lachapelle

Speech speed

159 words per minute

Speech length

355 words

Speech time

133 seconds

Coordinated action across the internet stack is needed for ‘theft by deception’ categories of abuse

Explanation

The Internet Infrastructure Forum addresses abuses that cannot be handled within ICANN’s environment by engaging actors beyond DNS operators. Scams and fraud represent ‘theft by deception’ categories that require coordinated action by different actors along the internet stack.


Evidence

The IIF as a bottom-up, multi-stakeholder initiative that started in February, emergence of new intermediaries handling abuse workflow management, and platforms for exchanging signals


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Legal and regulatory | Cybersecurity | Jurisdiction


E

Emily Taylor

Speech speed

133 words per minute

Speech length

346 words

Speech time

155 seconds

Multi-stakeholder coordination is essential for addressing complex DNS evolution challenges

Explanation

The workshop addresses issues requiring the domain name system to evolve to cope with emerging challenges like blockchain identifiers and online harms mitigation. Each of these issues is complex in nature and requires coordination of multiple stakeholders to be effectively addressed.


Evidence

The workshop was organized jointly by the Dynamic Coalition on DNS Issues and the Dynamic Coalition on Data and Trust, bringing together various stakeholders


Major discussion point

Blockchain Identifiers and DNS Integration


Topics

Infrastructure | Legal and regulatory | Digital standards


Agreed with

– Swapneel Sheth
– Participant
– Rima Amin

Agreed on

Multi-stakeholder collaboration is essential for addressing DNS challenges


A

Audience

Speech speed

130 words per minute

Speech length

114 words

Speech time

52 seconds

Government institutions should adopt national domain extensions to strengthen digital identity and cybersecurity

Explanation

A participant from Senegal highlighted that despite having a .sn domain since the 1980s, government institutions still use generic domains like .gmail for official communications, which creates cybersecurity risks. The speaker asked for expert recommendations on how to encourage government use of national domains to establish proper digital identity and strengthen security.


Evidence

Senegal has had DNS since the 1980s but institutions use .gmail instead of .sn, and the State of Senegal was recently victim of two cyber attacks


Major discussion point

Online Harm Mitigation and DNS Abuse


Topics

Digital identities | Cybersecurity | Legal and regulatory


Agreements

Agreement points

Multi-stakeholder collaboration is essential for addressing DNS challenges

Speakers

– Emily Taylor
– Swapneel Sheth
– Participant
– Rima Amin

Arguments

Multi-stakeholder coordination is essential for addressing complex DNS evolution challenges


Multi-stakeholder collaboration is needed to develop standards and best practices for responsible DNS integrations


Multi-stakeholder processes within existing frameworks like ICANN are the only way forward for successful integration


Global solutions and consistent approaches are needed rather than fragmented country-specific responses


Summary

All speakers agree that the complex challenges facing DNS – whether from blockchain integration or online harms – require coordinated multi-stakeholder approaches rather than fragmented individual efforts


Topics

Infrastructure | Legal and regulatory | Digital standards


Integration rather than replacement of DNS is the preferred approach for blockchain technologies

Speakers

– Benoit Ampeau
– Swapneel Sheth
– Participant

Arguments

Trust is essential for digital identities and blockchain integration presents unique governance and standardization challenges


DNS integrations with blockchain applications have potential but require responsible implementation to avoid security inconsistencies


Integration rather than replacement of DNS is crucial, with blockchain enhancing security as a secondary layer


Summary

Speakers consistently advocate for responsible integration of blockchain technologies with existing DNS infrastructure rather than attempting to replace the established system


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Proactive and automated approaches are necessary to address the scale of online abuse

Speakers

– Lucien Taylor
– Graeme Bunton
– Rima Amin

Arguments

Real-time threat detection and improved feedback loops are necessary to reduce time-to-mitigation for scams


Proactive processes and automation are essential given the scale of abuse that reactive reporting cannot handle


DNS abuse accelerates harm across multiple threat areas including domain spoofing, cyber-squatting, and deceptive redirects


Summary

All speakers working on abuse mitigation agree that the current scale of online abuse requires moving beyond reactive approaches to proactive, automated, and real-time detection and response systems


Topics

Cybersecurity | Infrastructure | Digital standards


Similar viewpoints

These speakers share skepticism about the technical necessity and governance maturity of blockchain naming systems, emphasizing that existing DNS security mechanisms may already address many concerns

Speakers

– Benoit Ampeau
– Edmund Chung
– Andrew Campling

Arguments

Name collisions exist between blockchain identifiers and existing DNS domains, creating security risks


DNSSEC already provides cryptographic validation, questioning the added value of blockchain for DNS security


Web3 naming schemes lack mature governance structures and could benefit from DNS governance lessons


Topics

Infrastructure | Cybersecurity | Digital standards


Both speakers demonstrate that DNS abuse problems are manageable through targeted interventions – whether through registration requirements or focusing on high-abuse registrars

Speakers

– Hilde Thunem
– Graeme Bunton

Arguments

Identity verification requirements and domain limits create friction for scammers while maintaining accessibility for legitimate users


DNS abuse is concentrated among a small number of registrars, making the problem manageable through targeted action


Topics

Legal and regulatory | Cybersecurity | Infrastructure


These speakers advocate for coordinated, cross-sector approaches to combat online abuse, emphasizing that fragmented national or sector-specific responses are insufficient

Speakers

– Lucien Taylor
– Rima Amin
– Bertrand Lachapelle

Arguments

Cross-sectoral international signal sharing is needed to combat the rising scale of cybercrime


Global solutions and consistent approaches are needed rather than fragmented country-specific responses


Coordinated action across the internet stack is needed for ‘theft by deception’ categories of abuse


Topics

Legal and regulatory | Jurisdiction | Cybersecurity


Unexpected consensus

Web3 community willingness to engage in responsible integration

Speakers

– Swapneel Sheth
– Participant

Arguments

Web3 community shows interest in responsible integration through collaborative draft development


Multi-stakeholder processes within existing frameworks like ICANN are the only way forward for successful integration


Explanation

Despite potential tensions between traditional DNS governance and decentralized blockchain philosophies, there appears to be unexpected willingness from Web3 communities to work within existing multi-stakeholder frameworks and develop responsible integration standards


Topics

Infrastructure | Digital standards | Legal and regulatory


Concentration of DNS abuse making the problem manageable

Speakers

– Graeme Bunton
– Hilde Thunem

Arguments

DNS abuse is concentrated among a small number of registrars, making the problem manageable through targeted action


Identity verification requirements and domain limits create friction for scammers while maintaining accessibility for legitimate users


Explanation

Rather than DNS abuse being an overwhelming distributed problem, there’s consensus that it’s actually concentrated and manageable through targeted interventions, which is more optimistic than might be expected


Topics

Cybersecurity | Infrastructure | Legal and regulatory


Overall assessment

Summary

The speakers demonstrate strong consensus on the need for multi-stakeholder collaboration, responsible integration of new technologies with existing DNS infrastructure, and coordinated approaches to combat online abuse. There’s agreement that both blockchain integration and abuse mitigation require proactive, systematic approaches rather than fragmented responses.


Consensus level

High level of consensus with significant implications for policy development. The agreement suggests that the DNS community is aligned on fundamental principles of responsible innovation and coordinated abuse mitigation, providing a strong foundation for developing concrete standards and implementation frameworks. The consensus spans technical, policy, and operational perspectives, indicating mature understanding of the challenges and viable paths forward.


Differences

Different viewpoints

Value of blockchain enhancement to existing DNS security

Speakers

– Participant
– Benoit Ampeau
– Edmund Chung

Arguments

Integration rather than replacement of DNS is crucial, with blockchain enhancing security as a secondary layer


Trust is essential for digital identities and blockchain integration presents unique governance and standardization challenges


DNSSEC already provides cryptographic validation, questioning the added value of blockchain for DNS security


Summary

While the Participant advocates for blockchain as a secondary security layer on top of DNSSEC, Edmund Chung questions whether blockchain adds value beyond existing DNSSEC capabilities, and Benoit Ampeau emphasizes the governance and standardization challenges that blockchain integration presents.


Topics

Infrastructure | Cybersecurity | Digital standards


Scope of DNS abuse definition and responsibility

Speakers

– Keith Drazek
– Andrew Campling

Arguments

ICANN’s DNS abuse definition is necessarily narrow due to content restrictions in bylaws


Government action is needed to address DNS abuse gaps in ccTLD operations


Summary

Keith Drazek defends ICANN’s narrow definition of DNS abuse as necessary due to bylaw restrictions on content matters, while Andrew Campling argues for broadening the definition and criticizes the lack of action by ccTLDs, suggesting governments should step forward.


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Unexpected differences

Environmental and computational costs of dual cryptographic validation

Speakers

– Andrew Campling
– Participant

Arguments

Web3 naming schemes lack mature governance structures and could benefit from DNS governance lessons


Integration rather than replacement of DNS is crucial, with blockchain enhancing security as a secondary layer


Explanation

Andrew Campling raised an unexpected concern about the environmental and computational costs of doing cryptographic validation twice (both DNSSEC and blockchain), which wasn’t anticipated in a discussion primarily focused on technical integration challenges. This practical sustainability concern contrasts with the Participant’s focus on security enhancement benefits.


Topics

Infrastructure | Cybersecurity | Development


Overall assessment

Summary

The discussion revealed relatively low levels of fundamental disagreement, with most speakers sharing common goals around maintaining DNS security and stability while enabling innovation. The main disagreements centered on technical approaches (blockchain value-add vs. existing DNSSEC) and governance scope (narrow vs. broad DNS abuse definitions).


Disagreement level

Low to moderate disagreement level. The speakers generally aligned on core principles but differed on implementation approaches and technical solutions. This suggests that while there are legitimate concerns to address, the multi-stakeholder community has sufficient common ground to work toward collaborative solutions for both blockchain integration and DNS abuse mitigation.


Partial agreements

Partial agreements

Similar viewpoints

These speakers share skepticism about the technical necessity and governance maturity of blockchain naming systems, emphasizing that existing DNS security mechanisms may already address many concerns

Speakers

– Benoit Ampeau
– Edmund Chung
– Andrew Campling

Arguments

Name collisions exist between blockchain identifiers and existing DNS domains, creating security risks


DNSSEC already provides cryptographic validation, questioning the added value of blockchain for DNS security


Web3 naming schemes lack mature governance structures and could benefit from DNS governance lessons


Topics

Infrastructure | Cybersecurity | Digital standards


Both speakers demonstrate that DNS abuse problems are manageable through targeted interventions – whether through registration requirements or focusing on high-abuse registrars

Speakers

– Hilde Thunem
– Graeme Bunton

Arguments

Identity verification requirements and domain limits create friction for scammers while maintaining accessibility for legitimate users


DNS abuse is concentrated among a small number of registrars, making the problem manageable through targeted action


Topics

Legal and regulatory | Cybersecurity | Infrastructure


These speakers advocate for coordinated, cross-sector approaches to combat online abuse, emphasizing that fragmented national or sector-specific responses are insufficient

Speakers

– Lucien Taylor
– Rima Amin
– Bertrand Lachapelle

Arguments

Cross-sectoral international signal sharing is needed to combat the rising scale of cybercrime


Global solutions and consistent approaches are needed rather than fragmented country-specific responses


Coordinated action across the internet stack is needed for ‘theft by deception’ categories of abuse


Topics

Legal and regulatory | Jurisdiction | Cybersecurity


Takeaways

Key takeaways

Trust is fundamental for digital identities and DNS systems, requiring careful integration of new technologies like blockchain rather than replacement


Name collisions between blockchain identifiers and existing DNS domains create security risks that need proactive management


Multi-stakeholder collaboration is essential for developing responsible DNS-blockchain integration standards and addressing online harms


DNS abuse is concentrated among a small number of registrars (95% from ~50 registrars), making targeted action feasible


Cross-sectoral international signal sharing and real-time threat detection are critical for combating the rising scale of cybercrime


Identity verification requirements and domain limits can create effective friction for scammers while maintaining legitimate user access


Proactive processes and automation are necessary given the scale of abuse that reactive reporting alone cannot handle


Legal frameworks with clear responsibilities and due process are essential for addressing compromised domains


The internet infrastructure requires coordinated action across the entire stack to effectively combat ‘theft by deception’ categories of abuse


Resolutions and action items

Continue multi-stakeholder engagement through Dynamic Coalitions on DNS Issues and Data and Trust


Develop risk assessment framework for blockchain identifier systems (AFNIC and DNSRF collaboration)


Advance responsible DNS integration standards through IETF DNSOP Working Group drafts


Expand Global Signal Exchange participation with 160 organizations in accreditation pipeline


Utilize Internet Infrastructure Forum as a space for discussing cross-border abuse coordination


Engage ICANN GAC and other stakeholders in next GTLD round to address blockchain integration concerns


Continue development of NetBeacon tools for abuse reporting and mitigation


Promote post-quantum DNSSEC development through hackathons and IETF meetings


Unresolved issues

How to ensure blockchain community participation in responsible integration efforts and what incentives exist for their engagement


Whether blockchain provides meaningful security enhancement over existing DNSSEC given computational and environmental costs


How to address DNS abuse gaps in ccTLD operations and encourage government action


How to broaden ICANN’s narrow DNS abuse definition while respecting content restrictions in bylaws


How to scale abuse mitigation processes to handle millions of daily threat signals effectively


How to develop global consistent approaches for DNS abuse rather than fragmented country-specific responses


How to improve feedback loops and evidence quality in threat intelligence sharing


How to encourage government institutions to use national ccTLDs for digital identity and security purposes


Suggested compromises

Integration rather than replacement of DNS with blockchain technologies, using blockchain as a secondary security layer


Responsible DNS integration that preserves existing DNS governance while enabling new blockchain use cases


Behavior-based trust systems rather than purely identity-based systems for platform access


Coordinated multi-layer approach involving registries, registrars, hosting providers, and content delivery networks


Bottom-up, multi-stakeholder self-organization initiatives to address cross-border jurisdictional challenges


Balanced approach between creating friction for bad actors while maintaining accessibility for legitimate users


Combination of reactive abuse reporting with proactive automated detection and prevention systems


Thought provoking comments

The critical choice I want to highlight is that we need to answer the question… do we integrate this blockchain system into the global domain name system, or do we watch our infrastructure fragment in dangerous ways in which fraud will likely just intensify?

Speaker

Esther Yarmitsky


Reason

This comment reframed the entire blockchain-DNS discussion from a technical implementation question to a fundamental strategic choice about internet infrastructure integrity. It elevated the conversation beyond technical details to existential concerns about internet fragmentation and security.


Impact

This shifted the discussion from ‘how to integrate’ to ‘why we must integrate responsibly.’ It connected the blockchain naming discussion directly to fraud prevention, creating a bridge between the two main topics of the workshop and emphasizing urgency in decision-making.


DNS integrations come with their own set of challenges. For example, how do we think about a domain name that’s transferred or expires after the domain name has been integrated into the blockchain application? How do we avoid risks… with inconsistencies, with the security concerns that come along when the same names are used across multiple systems?

Speaker

Swapneel Sheth


Reason

This comment introduced concrete technical challenges that hadn’t been fully articulated, moving beyond theoretical concerns to practical implementation issues. It highlighted the lifecycle management problems that could undermine trust in both systems.


Impact

This grounded the discussion in practical realities and led to more detailed technical exchanges about DNSSEC, governance models, and the need for standards. It prompted Andrew Campling’s intervention about governance lessons from DNS that could benefit blockchain systems.


The criminals are moving faster than us. They’re exploiting cross-border legislative tensions and sharing bad things between each other better than we share things.

Speaker

Lucien Taylor


Reason

This stark observation highlighted a fundamental asymmetry in the fight against online harms – that criminal networks are more agile and collaborative than legitimate defense systems. It challenged the assumption that current approaches are adequate.


Impact

This comment shifted the tone from technical solutions to strategic urgency, emphasizing the need for speed and coordination. It provided context for why initiatives like the Global Signal Exchange are necessary and influenced subsequent discussions about real-time threat detection and cross-sector collaboration.


95% of the malicious domains that we see belong to about 50 registrars or less, 80% belongs to less than 20… The problem space is not huge. There’s differences between the registrars and TLDs also in that data. But we can sort of wrap our collective arms around the scope of that problem.

Speaker

Graeme Bunton


Reason

This data-driven insight fundamentally reframed the scale of the DNS abuse problem from seemingly overwhelming to manageable, while also pinpointing where efforts should be concentrated. It provided concrete evidence that targeted interventions could be highly effective.


Impact

This shifted the discussion from broad, systemic concerns to focused, actionable solutions. It influenced Andrew Campling’s follow-up question about ccTLD accountability and reinforced the importance of data-driven approaches that other speakers had mentioned.


The real gap here is the lack of action by some of the ccTLDs. So, how do we get governments to also step forward to address this? So, maybe this is the right forum for that, as some of them are here.

Speaker

Andrew Campling


Reason

This comment identified a critical governance gap in the multi-stakeholder approach to DNS abuse, pointing out that while ICANN has tightened gTLD contracts, ccTLDs operate under different governance models that may not be addressing abuse adequately.


Impact

This intervention highlighted the limitations of current policy approaches and the need for government engagement, connecting technical solutions to policy and governance challenges. It demonstrated how the multi-stakeholder model itself has gaps that need addressing.


This whole thing is a speed and scale challenge and it’s a data challenge. It’s a data sharing challenge… we see the emergence of new intermediaries that handle the abuse workflow problem, management… this is building the ecosystem that, at last, will allow later on to engage law enforcement and other actors.

Speaker

Bertrand Lachapelle


Reason

This synthesized the entire discussion by identifying the core challenges (speed, scale, data sharing) and recognizing the emergence of new institutional forms to address these challenges. It provided a systems-level view of how various initiatives fit together.


Impact

This comment served as a capstone that tied together the various threads of discussion, showing how technical solutions, policy initiatives, and new organizational forms are part of an evolving ecosystem response to online harms.


Overall assessment

These key comments fundamentally shaped the discussion by elevating it from technical implementation details to strategic infrastructure decisions, introducing concrete data that reframed problem scope, and highlighting critical governance gaps. Esther’s framing of integration versus fragmentation set the stakes, while Swapneel’s technical challenges grounded the discussion in practical realities. Lucien’s observation about criminal agility created urgency, Graeme’s data provided actionable focus, Andrew’s governance critique exposed policy gaps, and Bertrand’s synthesis showed how various initiatives form an emerging ecosystem response. Together, these interventions transformed what could have been separate technical and policy discussions into a coherent analysis of how internet infrastructure must evolve to address emerging threats while maintaining trust and stability.


Follow-up questions

How do we ensure responsible integration happens in a multi-stakeholder manner?

Speaker

Carolina from Oxhill


Explanation

This addresses the governance challenge of coordinating multiple stakeholders in blockchain-DNS integration while maintaining security and trust


How to get the blockchain community to participate – what incentives exist for them to participate?

Speaker

Carolina from Oxhill


Explanation

Understanding motivation and incentive structures is crucial for successful multi-stakeholder engagement in responsible DNS integration


How can we get more work done to broaden the definition of DNS abuse so it has even more impact?

Speaker

Andrew Campling


Explanation

Current ICANN definition of DNS abuse is narrow and doesn’t address issues like CSAM, limiting the scope of mitigation efforts


How do we get governments to step forward to address DNS abuse issues, particularly regarding ccTLD action?

Speaker

Andrew Campling


Explanation

There’s a gap in enforcement where some ccTLDs are not taking adequate action against DNS abuse, requiring government intervention


What would experts propose to help states use their ccTLD in administrative services for digital identity and security strengthening?

Speaker

Yuv from Senegal


Explanation

Many government institutions use generic domains instead of their national ccTLD, creating cybersecurity risks and undermining digital identity


Will blockchain identifier solution providers engage in responsible integration with DNS?

Speaker

Benoit Ampeau


Explanation

Uncertainty exists about whether blockchain providers will participate in responsible integration frameworks being developed


How can federated AI systems be effectively integrated to detect fraud in real-time on top of existing DNS structures?

Speaker

Esther Yarmitsky


Explanation

This represents a technical challenge for implementing AI-powered fraud detection while maintaining DNS stability and performance


How can we develop improved, reliable, and accessible proactive processes for DNS abuse mitigation?

Speaker

Graeme Bunton


Explanation

Current reactive approaches don’t scale effectively – proactive measures are needed to get ahead of abuse at the scale it’s occurring


How can we improve the feedback loop mechanism for threat intelligence signals?

Speaker

Lucien Taylor


Explanation

Developing effective feedback loops is challenging but essential for improving signal quality and creating evidence-based data for enforcement


How can we achieve global consistency in approaches to online harm mitigation across different jurisdictions?

Speaker

Rima Amin


Explanation

Different countries are tackling online harms in their own ways – a consistent global approach would be more effective given the internet’s borderless nature


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Lightning Talk #209 Safeguarding Diverse Independent NeWS Media in Policy

Lightning Talk #209 Safeguarding Diverse Independent NeWS Media in Policy

Session at a glance

Summary

Amy Mitchell from the Center for News Technology and Innovation presented a discussion on safeguarding diverse independent news media through policy considerations. She highlighted that society is currently passing more journalism-related laws than ever before, while simultaneously facing challenges in defining what constitutes journalism in the digital age. Mitchell emphasized that 50% of journalists surveyed internationally had experienced some form of government censorship, and global press freedom scores have declined to 1993 levels.


The presentation focused on how well-intentioned policies can have unintended consequences on press independence and journalism viability. Mitchell outlined critical questions that should be explored in any digital policy, including definitional language, oversight authority, diversity protection, public service, and cross-border impacts. She presented findings from three major studies conducted by her organization.


The first study examined 32 “fake news” policies across 31 countries between 2020-2023, finding that most policies created greater risks to journalistic independence than they provided protection. Only seven of these policies actually defined what constitutes fake or illegal content, while 14 placed control directly in government hands. The second study analyzed 23 media remuneration policies designed to provide revenue streams to journalism, revealing dramatic variations in how digital usage and compensation were defined across different jurisdictions.


Mitchell emphasized the importance of considering public perspectives in policy development, noting that the public has a broad definition of journalism producers beyond traditional news organizations. She concluded by advocating for collaborative, data-driven conversations among policymakers, technology companies, media organizations, and civil society to balance technological benefits while mitigating potential harms to independent journalism.


Keypoints

**Major Discussion Points:**


– **Growing Policy Challenges for Journalism**: The discussion highlights how more laws affecting journalism are being passed than ever before, while it’s simultaneously becoming harder to define what constitutes journalism. This is occurring amid declining press freedoms globally, with 50% of surveyed journalists experiencing some form of government censorship.


– **Definitional Problems in Policy Language**: A critical issue identified across policies is the vague or inconsistent definition of key terms like “fake news,” “journalism,” and “illegal content.” Most policies studied (25 out of 32 fake news policies) failed to clearly define these terms, leaving interpretation to government authorities.


– **Government Authority and Control Mechanisms**: The research reveals that many policies place oversight authority directly in government hands, with 14 of 32 fake news policies giving control to central government. This raises concerns about potential misuse of well-intentioned policies for information control.


– **Media Remuneration and Financial Sustainability**: The discussion covers policies aimed at creating revenue streams for struggling journalism industries through digital platform compensation, but notes wide variation in how “usage” and compensation are defined across 23 different policies.


– **Unintended Consequences of Digital Policies**: Even well-intentioned policies designed to protect the information space can inadvertently harm press independence and diversity. The speaker emphasizes the need to consider cross-border impacts and long-term effects, particularly with emerging AI policies.


**Overall Purpose:**


The discussion aims to present research findings on how digital policies worldwide are impacting journalism and press freedom, while proposing a framework of critical questions that policymakers should consider to safeguard independent, diverse media while addressing legitimate policy concerns.


**Overall Tone:**


The tone is academic and analytical, maintaining objectivity while expressing underlying concern about threats to press freedom. Mitchell presents as a researcher sharing findings rather than an advocate, emphasizing data-driven analysis. The tone remains consistent throughout – informative and measured, though with clear implications about the risks facing independent journalism. During the Q&A, the tone becomes slightly more conversational while maintaining the same analytical approach.


Speakers

– **Amy Mitchell**: Director, Center for News Technology and Innovation (CNTI). Has 25 years of experience at Pew Research Center where she helped launch and directed the journalism line of research. Currently leads a global research center focused on enabling independent, sustainable news media, maintaining an open internet, and fostering informed public policy discussions.


– **Audience**: Multiple audience members who asked questions during the Q&A session. Areas of expertise, roles, and titles not specified.


Additional speakers:


None identified beyond those in the speakers names list.


Full session report

# Safeguarding Diverse Independent News Media: Policy Considerations and Global Challenges


## Executive Summary


Amy Mitchell presented a comprehensive analysis of how digital policies worldwide are impacting journalism and press freedom. Drawing from extensive research conducted by her organisation, the Center for News Technology and Innovation (CNTI), Mitchell highlighted the unprecedented challenges facing independent media in an era where more journalism-related laws are being passed than ever before. The discussion revealed alarming trends in global press freedom, with 50% of journalists surveyed having experienced some form of government censorship, and worldwide press freedom scores declining to 1993 levels.


The presentation centred on the critical observation that well-intentioned policies designed to protect the information space often create unintended consequences that harm journalistic independence and diversity. Through analysis of fake news policies, media remuneration frameworks, and emerging AI regulations, Mitchell demonstrated how vague definitional language and inappropriate oversight mechanisms can transform protective policies into tools for information control.


## Background and Research Context


Mitchell began by establishing her background and the context for CNTI’s work. Coming from 25 years at the Pew Research Center where she helped launch the journalism line of research, Mitchell now leads CNTI, an organisation that is “not quite two years, a little over a year and a half now” old. CNTI works in partnership with organisations including the Global Fund for Media Development (GFMD), Online News Association, and several others.


The research presented emerged from collaborative efforts including a Mexico City convening co-sponsored with OEM, where stakeholders from across the journalism ecosystem gathered to examine how digital policies affect independent media. This work addresses the fundamental challenge that society is experiencing an unprecedented volume of legislation affecting journalism, both directly and indirectly, at a time when press freedoms are declining globally.


## Current State of Journalism and Policy Landscape


Mitchell established the gravity of the current situation facing journalism globally. The research revealed that 50% of the journalists surveyed had experienced some form of government censorship within the past year. Global press freedom scores have deteriorated to levels not seen since 1993, creating an environment where policies originally intended for protection are increasingly being used to imprison and control journalists.


The challenge is compounded by the evolving nature of journalism itself. In the digital age, traditional definitions of journalism and news organisations no longer capture the full spectrum of information producers that the public relies upon. This definitional ambiguity creates vulnerabilities in policy frameworks that may inadvertently exclude legitimate journalism whilst failing to address actual threats to information integrity.


Mitchell emphasised that the volume of legislation affecting journalism is unprecedented, with lawmakers worldwide grappling with how to regulate digital spaces without clear understanding of the implications for press freedom and independent media.


## Research Methodology and Key Questions


To address these challenges systematically, Mitchell outlined key questions that CNTI examines when analysing digital policies affecting journalism:


– How policies define crucial terms such as “journalism,” “fake news,” “illegal content,” and “digital usage”


– Who has oversight authority to interpret and enforce policies


– Whether policies adequately protect diverse voices in the media landscape


– How clearly policies articulate their goals for serving public information needs


– The cross-border impacts of national policies


Mitchell stressed the importance of thinking beyond national boundaries when considering policy impacts, as digital policies often have far-reaching effects through international platforms and the tendency for policies to be copied across jurisdictions, sometimes by authoritarian regimes for harmful purposes.


## Analysis of Fake News Policies


One of CNTI’s most significant studies examined 32 fake news policies across 31 countries implemented between 2020 and 2023. The findings revealed troubling patterns that suggest these policies create greater risks to journalistic independence than protection for the information space.


The most striking finding was the widespread failure to define key terms. Only seven of the 32 policies actually defined what constitutes fake or illegal content, leaving interpretation of these crucial concepts to authority figures. This definitional vacuum creates dangerous ambiguity that can be exploited for information control rather than protection.


The research revealed concerning patterns in oversight authority, with 14 of the 32 policies placing control very specifically in government hands. The penalties varied dramatically, with imprisonment terms ranging from less than one month to over three years (with Zimbabwe specifically mentioned for the longest sentences), reflecting inconsistent and often disproportionate regulatory approaches.


Mitchell emphasised that whilst the stated intentions of these policies were often laudable—protecting citizens from harmful misinformation—the practical implementation frequently created tools that could be used to suppress legitimate journalism and dissenting voices.


## Media Remuneration Policy Analysis


The second major study examined 23 media remuneration policies implemented between 2018 and August 2024, designed to create new revenue streams for struggling journalism industries through compensation from digital platforms. These policies, including various US state-level initiatives, represent attempts to address the economic challenges facing traditional media in the digital age.


The analysis showed dramatic variation in how different jurisdictions defined key concepts such as “digital content usage” and compensation criteria. This inconsistency creates confusion for both platforms and media organisations operating across multiple jurisdictions and may lead to uneven outcomes.


Particularly concerning was the finding that these policies inconsistently addressed the diversity of news media, with many appearing to favour large, established operations over smaller, independent outlets. Furthermore, most policies failed to clearly articulate how they would better serve public information needs, risking becoming mere economic transfers rather than tools for improving the information landscape.


## AI Policy Implications


Mitchell’s research also examined emerging artificial intelligence policies and their implications for journalism. While few AI policies directly address journalism, they have significant indirect impacts through their effects on content creation, distribution, and liability frameworks.


The research revealed that AI policies often place liability on users, including journalists, without providing clear definitions of appropriate use or adequate safeguards for legitimate journalistic activities. This creates uncertainty for journalists who wish to benefit from AI technologies whilst avoiding legal risks.


Mitchell emphasised the need to consider how AI policies affect journalists’ ability to harness technological benefits whilst guarding against potential risks, particularly given the cross-border nature of AI technologies.


## Public Perspective and Behaviour


A crucial element of Mitchell’s analysis focused on understanding public perspectives on journalism and information consumption. CNTI conducted surveys in four countries to understand how the public defines journalism and consumes information.


The research revealed that the public has a much broader definition of journalism than traditional policy frameworks typically recognise, including individual journalists working independently, mission-driven content creators, and principle-guided information producers. Both journalists and the public view technology as critically important for news production, gathering, dissemination, and consumption.


Importantly, Mitchell noted that substantial research shows disinformation campaigns don’t have as much impact on what people actually believe as previously thought. Instead, people’s own behaviour and choices about where to seek information appear to be more significant factors in determining what they accept as credible.


## Discussion and Key Exchanges


The presentation generated significant discussion during the question-and-answer session. Key exchanges included:


**Methodological Questions**: An audience member questioned the value of including established autocracies in policy analysis. Mitchell responded by emphasising that autocratic policies matter because they affect real people and can be copied by other countries for harmful purposes, highlighting the interconnected nature of global policy development.


**EU Policy Analysis**: When questioned about including individual EU member states rather than focusing on EU-wide legislation, Mitchell explained that they specifically looked at country-specific fake news policies rather than broader frameworks like the Digital Services Act.


**Alternative Approaches**: Discussion explored focusing on the demand side of disinformation—understanding why people believe and engage with false information—rather than concentrating primarily on supply-side regulation. Mitchell noted that psychological defence approaches, such as those employed by Sweden’s dedicated agency, could offer valuable alternatives to traditional content moderation policies.


## Key Findings and Implications


The comprehensive research yielded several critical findings:


**Definitional Failures**: The widespread failure to define key terms in digital policies creates dangerous ambiguities that can be exploited for information control, suggesting that policy development must prioritise clear, precise definitions.


**Government Oversight Concerns**: The tendency to place oversight authority directly in government hands raises serious concerns about potential misuse of well-intentioned policies.


**Diversity Challenges**: Many policies fail to adequately protect diverse voices in the media landscape, often favouring large operations over smaller, independent outlets.


**Cross-Border Policy Migration**: Policies developed in one jurisdiction often influence or are directly copied by others, sometimes for harmful purposes, emphasising the global responsibility that comes with policy development.


**Public Behaviour Complexity**: The research challenged assumptions about disinformation effectiveness, suggesting that individual choice and political bias may be more significant factors than external manipulation campaigns.


## Future Research and Recommendations


Mitchell announced that CNTI plans to spend more time examining the relationship between public behaviour and disinformation policy effectiveness. The organisation is developing a research working group focused on public response to AI content labelling and watermarking systems.


Key recommendations included:


– Collaborative, data-driven conversations among policymakers, technology companies, media organisations, researchers, and civil society


– Policy design based on clear understanding of how the public actually seeks and consumes information


– Clear articulation of desired digital information landscape goals before implementing content moderation policies


– Integration of specific safeguards against government overreach and mechanisms to protect diverse, independent voices


## Conclusion


Mitchell’s research revealed the complex and often contradictory nature of contemporary digital policy as it affects journalism and press freedom. While many policies intend to protect the information space and support quality journalism, implementation often falls short of these goals and may create new threats to press independence and diversity.


The findings suggest that effective digital governance requires more sophisticated understanding of public behaviour, global policy dynamics, and the changing nature of information production and consumption. The research provides a valuable framework for approaching these complex issues, emphasising the need for international coordination and careful consideration of unintended consequences in policy development.


As Mitchell emphasised, the challenge lies in creating policies that actually serve public information needs while protecting the diverse, independent media ecosystem that democracy requires.


Session transcript

Amy Mitchell: Hello, hello, that’s loud. I’m Amy Mitchell from the Center for News Technology and Innovation and I look forward to talking with you today about safeguarding diverse independent news media in policy. We are at a point in our society today where we are passing, debating and passing more laws that relate to journalism both directly and indirectly than we ever have. This is occurring at the same time that it is harder than ever to put borders around what journalism is and what it is not and that is from the perspective both of the business and legal kind of laws and policy space as well as what the public considers journalism and the things and sources that they rely on to keep them informed on a daily basis. We are also seeing a growing array of issues in the policy space that relate to journalism. Everything from content moderation to protection of the internet to disinformation to artificial intelligence, again, times that are directly related and other times where it’s indirectly related. In this space of the digital landscape, policies that are passed in one country very much tend to impact and be impacted by policies that are passed in another country. It’s very important to be thinking about these things across country and regional borders. We are seeing all of this happen amid a time when we are facing growing government encroachment on information control and on press freedoms. This comes through both in data we gather from journalists themselves. What you see in front of you is an international survey of journalists that CNTI conducted with a number of partnership organizations like GFMD, Global Fund for Media Development, Online News Association, and several others around the world. You see here that 50% of the journalists that we surveyed, this was in the fall of last year, had experienced some form of government censorship ranging from not being allowed to cover or access an event to complaints about their content to imprisonment. 50% had experienced at least one form of that in the last year. We’re also seeing the world press freedom scores across the board go down from the entities that are tracking this data year in and year out, so much so that we are down to 1993 levels of world press freedoms. This is occurring both when we look at the government censorship as well as the independent protection of journalists in this space. We’re also hearing it in the conversations that we have. One of the things CNTI does is host convenings, which are really daylong working sessions with a combination of folks from journalism, technology, policy space, research, civil society, to talk about these issues. This is one that we held in Mexico City with OEM, was our co-sponsor there. This conversation specifically focused on how to continue to produce journalism amid ongoing security threats, both on and offline. A lot of the discussion that came up from those in the rooms had to do with not only feelings of safety and other kinds of online abuse, but also in terms of the ways that policy had been used, policy that was technically in theory aimed at protection of information, or if journalists was being actually used to imprison or otherwise control journalists and the information space. If we look across the policy space amid this landscape today, what we find in the data is that even the best intended policy, that which is really looking to safeguard our information space to create vibrant digital landscapes, can end up having unintended consequences on the independence of our press and on journalism viability more broadly. The question becomes, how can policy address the issue areas of concern, of which we’re talking about here this week, while safeguarding an independent, diverse media and the public’s access to a plurality of fact-based news? That’s where CNTI comes in. The Center for News Technology and Innovation is a global research center. We’ve been around not quite two years, a little over a year and a half now, but we are an organization that focuses on enabling independent, sustainable news media, maintain an open internet, and foster more informed public policy discussions. We do this by conducting research as well as synthesizing research from others. My background is research. I come from 25 years at the Pew Research Center. I helped launch the journalism line of research there, directed that for many years. I have now decided to move into this space. We also help synthesize research. As a research community, I think we do a pretty lousy job sometimes of helping make sense of what our research all adds up to, where there are gaps, and where we need to do more. We then host convenings, like I was talking about, to try to really work through some of the challenging questions in these spaces and come up with informed solutions. Back to the question, how can policy address issue area concerns while safeguarding an independent, diverse news media and a vibrant digital landscape? Here we go to some of the research that CNTI has done over the last year that I’m going to talk about over the next few minutes. What we do is range from policy analysis to issue primers to surveys. We did the journalist survey. We’ve done a four-country public survey as well that both was a mix of focus groups as well as fully representative statistical surveys, convenings around the world, and more. What I put forward today is a set of questions that we have found to be critical questions to explore in any digital policy that is being debated and thought about today. Again, both those that directly relate to journalism, but also very much so where the journalism and a vibrant digital landscape are likely to be impacted, even if not directly related in the policy. I’m going to spend more time on each of these, so I’m going to run through them very quickly right now. The first question is, what’s the definitional language? We started with a lot of our work just saying, how is journalism being defined here? How about a journalist? How about news? The other areas that are being talked about in this policy, what’s the definitional language and how consistent or inconsistent might that be across policy in ways that matter? The independence of journalism, a big question to be spending a lot of time on is, who is given that oversight authority to determine the details of how a law gets practiced and enacted? Diversity, one of the things that the internet brought was a diverse landscape of information in a way that served minority communities, bringing new kinds of voices into this space. How do we work to build a vibrant digital landscape in a way that still safeguards that diversity of voice, especially in the news and information space? Serving the public, we talk about doing all of this to serve the public. How are we actually serving the public in these policies, especially in the behaviors and the ways that they access and get information today? Social relevance, being forward-thinking, cross-border impacts, and also unintended consequences that may or may not be clearly evident on the surface. These questions to explore all take time and deep thought and collaborative discussion. The first study I’m going to share a little bit about is one that we did that looked at fake news policies around the world. And we put the fake news in quotes many of these actually use the language of addressing fake news. We looked at 32 policies That were proposed for enacted between 2020 and 2023 They cut across 31 countries and so I’ll say straight out that there are more of these that were in a talker in autocracies, but 11 of the countries included here are democracies and so the findings that that Really resonate across different government types in terms of some of the takeaways that can happen and overall the the overall conclusion was that overall these policies created greater risk to journalistic independence and Diversity as well as the public’s access to a diversity of fact-based news than they did to actually safeguard the information space Get back getting back to definitions one of the first things we looked at here was How is fake news or illegal content defined And how might news or journalism or what might be considered real news? Be defined and you can see here that only seven of the 32 actually put a definition around what fake or illegal content was and the remaining left that vague which leaves it up to the Authority figure right the one who gets to make the decision about the enactment of that policy to put those definitions in place same thing on the news and journalism only to Actually spoke to what real news or journalism might be and this is very much a double-edged sword We talked a lot about this with some of the folks at UNESCO guy Berger was an advisor on this on this project he’s done a lot of work with UN and and information integrity and one of the things that You know we talked about in this report is a degree to which Well defining these things in policy can help safeguard Journalism and an independent press it can also be language that gets used against journalism and an independent press So it’s very important both to really consider the definitional language But also to then get to the next question, which is okay. Who’s the authority figure? Who’s the one that then gets to determine what that language means That’s what we looked at next in this study and you can see 14 of the 32 policies very specifically put the control of the authority there in the hands of the government itself and Most of those were talks about the central government being the ones that that was in control There were others that that gave the authority to some sort of body within the government where it was often unclear how closely Associated that other body was to the central government figure or not and the remaining Left it unclear as to who had authority to arbitrate that law or that policy Which then naturally puts it back in the hands of the government? The next question then becomes okay What’s the punishment if you get if you get put in to Determine that you were a part of this fake news and the bulk of these policies did have some sort of Imprisonment and it ranged from Less than one month in less those so I think up to over three years In Zimbabwe and so there was real government action that can be taken against journalists by the uses of but by the language in these policies and so before I move on to the next study if we just broaden this out to a question about content moderation policy more Broadly, one of the things that’s really important to ask in that space of policy Disinformation content moderation etc. Is what is the end goal for the way? The content is going to look and I’m not sure one of the things that we’re spending more time in the coming year looking at Is that very question? It’s not clear within the policy conversation space that we’ve really actually done a very good job at all of Articulating what would the digital landscape look like if this content moderation policy that we’re talking about gets put in what is it? That’s bad. That’s out. What is it? That’s good. That’s in what’s the mix? There’s always going to be a mix of content in there. So really taking the time to think about the ultimate goals there The second study that I’ll share a little bit about was this very specifically this news an example of one that specifically looked at Was very directly related to journalism in the media space So these were media remuneration policies which are basically revenue policies looking to be a revenue stream to add some revenue Financial lifeblood into the journalism industry, which many of you know has been having a hard time lately with its financial structures and support and this looked at 23 policies that were considered or passed from 2018 through August of 2024 And there’s a pretty wide mix. I will say it does include also a number of state Policies in the u.s. Because the state policy space in the u.s. Is very active these days. So there are quite a number in this That are included the first thing we did here was start a framework And this is a something else that we really recommend when you’re in a complex policy space with a wider range of the kind of Focus or orientation of these policies is to say, okay What’s the actual financial structure or the oriented subject? Orientation of how this is going to work and you can see here that the first three are really around actually usage usage Criteria digital interaction that then says that that warrants some sort of compensation The second set is subsidies that are either coming directly from tech platforms or in some cases from the government itself and then the third is a Tax mechanism, which is either creating or building off of new taxes and once you get this framework in place for whatever your subject area your policy is you can any new policy that comes in you Figure out where does it fit in into the framework that we’ve created? So then we broke the analysis into two parts again with these core questions that I showed you all earlier in the top of our minds and the first was definitional in the sense that it was how is how is the usage and interaction of digital content determined and Then when that definitional boundary is put on if and and then if so To what degree what amount of content should be paid for that content? How does that decision get made? When is it appropriate to charge for digital usage is compensation for digital usage applied consistently? Who benefits then who gets that money? Where does that money actually go and then the second half of the analysis looks at the questions of these core? Viability or sustainability elements to journalism. How do we keep an independent news media? How do we support diversity in this space? How do we sustain journalism that is actually serving the way the public gets informed today? And so I’m gonna walk through this really quickly because this is a lightning talk But there’s a lot more detail on the website if you want to go into any more of it and I welcome I’d be happy To talk with anybody about it in in greater detail as well so first on the digital usage side what this really shows is just when you look at what the Criteria of usage was or is articulated across these policies. It varies Dramatically and so the two green Circles are actually at the sort of what’s at the ends of the spectrum in terms of where what you know? Usage could be in time in terms of content and then you see here inside that it ranges from things like Clicking on a URL link to having a title of the article to actually well It’s usage of content for indexing or it’s creating an article summary and having that summary that that warrants content And so the definition of what usage and interaction actually means varies dramatically across these policies and so too Does what the level of compensation would be? as well as who that compensation would be going to. In some cases, it’s going to the organizational level. In some cases, it’s going to individual journalists. Usually, it’s actually at the organizational level. There’s been more in the recent months that has been shifted to going to journalists or journalism producers themselves. So we see a great variety there, which brings us back to the importance of really articulating from the get-go what the goal is and how do we use the best language to clearly articulate and in a consistent way what we mean here. And then the second half of the study, as I mentioned, looks at these journalistic viability elements. First, independence and diversity, public interest and access. And when we talk about independence, as we saw in the fake news study, anytime you’re creating policy, you give the government a role, which isn’t a bad thing, right? That’s what policy is for. But it does mean it’s really important to think about what are the safety mechanisms in place to be sure that in this case, particularly in the journalism and news space, that it doesn’t end up giving an individual government or figure, as the years progress, the ability to take control over the information space. And one of the things we saw in these policies was that in many cases, even if it was left unclear as to who had that authority to arbitrate the law, and if there were third party or third agencies, kind of how that got determined and how it would get determined over time. Diversity, again, the biggest thing we saw was that it was a really inconsistent and kind of haphazard approach to the diversity of news media that would be in there. A lot of these that began really ended up oriented more around your very large news operations and outlets. And some, as we got further into the policy timeline, called out ethnic, certain minority kinds of media or ethnic news outlets. There was only those that really focused on the tax extension element that focused on local journalism itself. And so how do we be sure that policies in this arena are going to support that diversity of voices in the journalism space that has been so valuable to the public? And then finally, public interest. And I will say on the innovation side, only the EU directive and one state law, state policy, New Jersey, in the states, actually spoke at all about being forward looking and the innovation side of technology and where that might lead us in the future. On the public interest side, all of the talk is about serving the public. And there were references to the public in there. But what was unclear was how these steps actually do a better job of getting the news and information to the public, especially thinking about the ways that the public is getting information, the diversity of producers of journalism that the public is turning to, including oftentimes many smaller individual journalism producers that the public has come to trust and rely on. The third policy area, which we are just in the early stages of now, so I’m just going to give you sort of a touch of the framework that we’re using, is in the AI policy space. And here there’s so much policy being talked about, being enacted, many are not actually law, can be enforced legally at this point. But very, very few in this space talk about journalism or really the news information space directly at all. But if we know about what’s happening with AI and where the digital landscape more broadly, there very much is indirect and in the end direct relationship with the way AI policy can and likely would affect the digital news landscape. So thinking about those things inside these other policies is really important before they get passed and too far down the line. How can it affect journalists’ ability to make use of the benefits of technology while also safeguarding against the risks? And then how do these policies work across state and national and country lines? So this is the framework in general, and I’m not going to go through this in detail because I want to have time for questions. But one, again, we’re starting with, okay, what’s the range of the kind of policies that are out there? And you can see here there are many that create a committee or an agency. Okay, do those committee or agencies have somebody from the journalism sector to play a role, to be a part of that? Do they take information integrity into account? Those that focus on deep fakes, synthetic content, this is one where we look at, okay, what’s the impact on journalists and their reporting? There’s a lot of good that can be had by having some sort of policies in place around deep fakes, but how does that resonate with the way journalists, some of what the journalists need to do, especially in unsafe areas, to be able to get their information out there? What labels? How do labeling these kind of things have public relevance? If you think about watermarks. CGPA was up here last week. There’s a lot of good in that kind of identity inside content, especially that’s AI-driven. But what does it mean to the public? We’ve done a lot of research and actually have started a research working group that’s global on this topic specifically to try to help make sense of what the research says about the public response to labeling, to not labeling, and how are there ways that journalists and others can make use of labels while actually fostering public trust with technology and with their work, as opposed to further diminishing it. There’s the focus on algorithmic bias and discrimination, and one of the things that’s important in this area of policy I’ll just mention as an example is that in that and the frontier model, there’s a lot of liability that goes on the user. That can be the public. It can be companies. It can also be the journalist that’s using it. It’s very important to think about who that user space may be and are there ways that the policy would want to define that and make sure that that is very clear in terms of who can be liable for content if there’s some sort of negative usage effect that comes out of it. Then comprehensive regulation. Again, we’re just in the beginning stages of this analysis and I will look forward to sharing it when the team is done. I’m just going to close with a couple more pieces of data that get to the public side of all this because ultimately this is about safeguarding an independent press and a diverse news media is about serving the public in the digital information space. It’s really important as we all delve deep into policy deliberation and making decisions that we don’t forget about the public that we’re saying we’re serving. How does the public think about journalism, about the ways that they can get informed today? That has been greatly expanded inside the digital landscape today. You can see here from this data, these are the four countries that we did this survey in, that there’s great value that the public places on journalism and the role that it plays in society. That really cut across the board. But we also see in the data that the public has a very broad definition of who can be producers of journalism today. It may be somebody inside an organization. It may be an individual who’s working on their own or doing their own work. What came through in the follow-up focus group discussions that we had is that it’s mission-driven. It’s guided by principles. It’s all of those elements that we think about of journalism, but it doesn’t necessarily have to be a news operation. So when we think about policy and for putting implications of policy in a space, how does all that work when we’re thinking about policy? And then finally, we can see that people are going to individuals that they consider journalists for their content today. And this is the final one, which is to also remember as we’re doing these policies that both the journalists, the journalism producers, and the public see technology as critically important in their ability to produce the news, to gather it, to disseminate it, and also to get informed. So again, coming back to these policy questions of how do we then do the best job of enabling the benefits and the needs in this space while also guarding against the potential harms. Quick wrap-up of the questions that we suggest you keep in mind. These are for journalism policies specifically, but they really carry through in a little bit of a nuanced way for all digital policy. And all in all, what’s most important is that in this critical policy space that policymakers, technology companies, media companies, journalism producers, researchers, civil societies actually work together to have really thorough conversations that are driven by data, a seeking of knowledge that keep the public interest in mind to be able to keep up with changing technology and determine how best to mitigate the risks while enabling the benefits. Thank you. And I’d be happy to take questions. You can sign up for our newsletter here, follow us, different places, the website here. Any questions?


Audience: Yeah, thank you so much. I’ve got two questions. First one relating to your, well, both actually relating to your sample choices of your first study that I think 31 countries you had covered. I was a little surprised that you, in the European Union, you took in four individual member states rather than the EU as a whole, because I think most of the aspects covered are now by the DSA, are covered by the Digital Services Act. So these laws, the national laws, have mostly become obsolete. And the second question is, to put it directly, what is the point of having really established autocracies among the sample, where it’s obvious and clear that they will use any excuse to control the information sphere and to use laws against disinformation to control, yeah, to exercise control. So what’s the point of having that? That is just, to me, obvious. And what conclusions can we draw from that?


Amy Mitchell: Yeah, those are two great questions. Thank you. On the EU, and I can share more on the methodology offstage, but the EU Online Safety Act is the one that was in place, and that was actually broader and didn’t talk directly about fake news. It talked about online safety. What we looked at instead were specific country policies that related directly to fake news or illegal content online, as opposed to broader online safety. We have a whole footnote in there in our methodology on that specific decision, but it’s a good question. And really, it’s also about examples. So the CNTI, Center for News Technology Information, does not advocate or call out for a specific policy. And what this is doing is saying, what’s the range of what’s out there, and how can we learn from it when we look at that, as opposed to commenting very specifically on one particular policy or another. But there is a whole methodology that does go into the detail on that decision and the timing of when we had the cutoff for those selections. On the autocracies, good question. One, they’re countries. They have people that live in them that get affected by the laws. We should care. That’s number one. Number two is, as I was mentioning earlier, there are so many policies that carry impact from one country to the next, whether it’s copycatting, and we saw that there was a policy that was done in a very well-intended, proactive way inside a democratic country that got then pulled by India to use for information control. So it’s also important to think about the ways that policy can be taken by another entity and used for ill service when it comes to the information landscape. But it’s also something, especially if we’re here at the UN and IGF talking about collaboration and how do we really have supportive environments to be aware of what’s happening in other countries. Do we have time for one more?


Audience: Hello. Thank you so much. That was super interesting. I specifically appreciate that you brought in that we should look more at the public perspective of this and serving, and the people we’re actually trying to serve. And so I was wondering, because these policies, especially disinformation, they get so tricky with the definitions, as you mentioned. I was wondering if you would recommend that actually countries should also put more emphasis on the demand side of disinformation. So why do people maybe believe disinformation? Why do people engage with disinformation? And why is it so easy for them to look at that? And I know that, for example, in Sweden, there’s this psychological defense agency by the government that kind of tries to prepare the population a little better how to engage with disinformation, how to recognize it. And I was just wondering if that would be a different approach to look at that more in terms of policy.


Amy Mitchell: Thank you for the question. It’s certainly an important element of it, right, is what is the public doing with all this content. There is actually a fair amount of research, and there’s a lot that actually shows the disinformation campaigns don’t have a whole lot of impact on what people actually believe or don’t believe, but that people’s own behavior and where they’re choosing to go can have that. One of the biggest things that we see, though, and this was some research I did back in the days that I was at Pew, is that what the public would categorize as disinformation can vary greatly, right? And so we have clear evidence to see that the way that the public would say, well, that’s disinformation, and our data show, at least in this one study we did, that there are very much alignments to one’s political thinking, to the kinds of sources you turn to. That’s a broader societal question, too, right? So I think your question comes back to the content moderation slide that I showed, which is articulating what’s the goal of the policy, and what’s the goal of the information landscape. I mean, it’s not going to be perfect. We’ve never had a perfect information landscape. So what is the goal, and then what are the best mechanisms to put in place that do the best job of reaching that, as close as we can get, without other unneeded risks and harms that can be brought into place? It’s a really tricky balancing act. It’s an area that CNTI plans to spend more time examining in the coming year. Thank you all. My time is up. Thank you.


A

Amy Mitchell

Speech speed

159 words per minute

Speech length

4881 words

Speech time

1831 seconds

Growing number of laws affecting journalism directly and indirectly, making it harder to define what journalism is

Explanation

Mitchell argues that society is currently passing and debating more laws related to journalism than ever before, occurring simultaneously with increased difficulty in defining journalism boundaries. This affects both business/legal policy spaces and public perceptions of what constitutes journalism and reliable information sources.


Evidence

Growing array of policy issues from content moderation to AI protection, disinformation policies, with digital landscape policies in one country impacting others


Major discussion point

Current State of Journalism and Policy Landscape


Topics

Freedom of the press | Content policy | Legal and regulatory


50% of surveyed journalists experienced government censorship in the past year

Explanation

Based on an international survey conducted by CNTI with partnership organizations, half of the journalists surveyed had experienced some form of government censorship. This censorship ranged from being denied access to events to receiving complaints about content to imprisonment.


Evidence

International survey conducted in fall of last year with GFMD, Global Fund for Media Development, Online News Association, and other partnership organizations


Major discussion point

Current State of Journalism and Policy Landscape


Topics

Freedom of the press | Human rights principles | Cybersecurity


World press freedom scores have declined to 1993 levels globally

Explanation

Mitchell presents data showing that global press freedom has deteriorated significantly, with current levels matching those from 1993. This decline affects both government censorship issues and independent protection of journalists.


Evidence

Data from entities tracking press freedom scores year over year, showing consistent decline in world press freedom scores


Major discussion point

Current State of Journalism and Policy Landscape


Topics

Freedom of the press | Human rights principles


Policy intended for protection is being used to imprison and control journalists

Explanation

Through convenings and discussions with journalism professionals, Mitchell found that policies theoretically designed to protect information or journalists are actually being used to imprison or control journalists and the information space. This represents a significant unintended consequence of well-intentioned policy.


Evidence

Conversations from CNTI convenings, including one in Mexico City with OEM focusing on producing journalism amid security threats, where participants discussed policy being used against journalists


Major discussion point

Current State of Journalism and Policy Landscape


Topics

Freedom of the press | Legal and regulatory | Human rights principles


Need for critical questions when analyzing digital policy: definitional language, independence, diversity, public service, and unintended consequences

Explanation

Mitchell proposes a framework of essential questions that should be explored in any digital policy debate. These questions address how journalism and related terms are defined, who has oversight authority, how diversity is maintained, how the public is served, and what unintended consequences might arise.


Evidence

CNTI research over the past year including policy analysis, issue primers, surveys, four-country public survey with focus groups and statistical surveys, and global convenings


Major discussion point

Policy Analysis Framework and Research Methodology


Topics

Legal and regulatory | Content policy | Human rights principles


Importance of examining who has oversight authority to determine how laws are enacted

Explanation

Mitchell emphasizes that a critical question in policy analysis is identifying who receives the authority to determine the details of how laws are practiced and enacted. This authority assignment significantly impacts the independence of journalism and can determine whether policies protect or harm press freedom.


Evidence

Analysis of fake news policies showing 14 of 32 policies placed control directly in government hands, with most focusing on central government control


Major discussion point

Policy Analysis Framework and Research Methodology


Topics

Legal and regulatory | Freedom of the press | Human rights principles


Cross-border policy impacts require thinking beyond national boundaries

Explanation

Mitchell argues that in the digital landscape, policies passed in one country significantly impact and are impacted by policies in other countries. This interconnectedness makes it essential to consider policy implications across country and regional borders rather than in isolation.


Evidence

Example of well-intended policy from a democratic country being adopted by India for information control purposes


Major discussion point

Policy Analysis Framework and Research Methodology


Topics

Legal and regulatory | Jurisdiction | Digital business models


Study of 32 fake news policies across 31 countries showed greater risk to journalistic independence than protection of information space

Explanation

CNTI’s analysis of fake news policies from 2020-2023 found that these policies created more risk to journalistic independence and diversity, as well as public access to fact-based news, than they provided protection for the information space. This finding applied across both democratic and autocratic countries.


Evidence

Analysis of 32 policies across 31 countries between 2020-2023, including 11 democracies, with findings consistent across different government types


Major discussion point

Fake News Policy Analysis


Topics

Freedom of the press | Content policy | Legal and regulatory


Disagreed with

– Audience

Disagreed on

EU policy analysis methodology – individual member states vs. EU-wide legislation


Only 7 of 32 policies defined what constitutes fake or illegal content, leaving definitions to authority figures

Explanation

Mitchell’s research revealed that most fake news policies failed to clearly define what constitutes fake or illegal content, with only seven policies providing definitions. The remaining policies left these crucial definitions vague, effectively placing definitional power in the hands of authority figures who implement the policies.


Evidence

Detailed analysis of definitional language in 32 fake news policies, with only 2 policies defining what constitutes real news or journalism


Major discussion point

Fake News Policy Analysis


Topics

Content policy | Legal and regulatory | Freedom of the press


14 policies placed control directly in government hands, with imprisonment penalties ranging from less than one month to over three years

Explanation

The study found that nearly half of the analyzed policies gave direct control to government entities, typically central governments, to arbitrate and enforce the laws. Most policies included imprisonment as punishment, with sentences varying dramatically from less than one month to over three years, with Zimbabwe having the longest sentences.


Evidence

Specific analysis showing 14 of 32 policies with government control, imprisonment penalties ranging from less than one month to over three years in Zimbabwe


Major discussion point

Fake News Policy Analysis


Topics

Legal and regulatory | Freedom of the press | Human rights principles


Analysis of 23 revenue-focused policies from 2018-2024 showed dramatic variation in defining digital content usage and compensation criteria

Explanation

CNTI’s study of media remuneration policies revealed significant inconsistency in how digital content usage is defined and what warrants compensation. The criteria ranged from simple URL clicks to article summaries, with equally varied compensation levels and recipient structures.


Evidence

Analysis of 23 policies from 2018 through August 2024, including US state policies, showing usage criteria ranging from clicking URL links to creating article summaries


Major discussion point

Media Remuneration Policy Analysis


Topics

Digital business models | Intellectual property rights | Legal and regulatory


Policies inconsistently addressed diversity of news media, often favoring large operations over smaller outlets

Explanation

Mitchell found that media remuneration policies took an inconsistent and haphazard approach to supporting diverse news media. Many policies ended up favoring large news operations and outlets, with only some later policies specifically addressing ethnic minority media or local journalism through tax mechanisms.


Evidence

Analysis showing policies initially favored large operations, with some later policies calling out ethnic minority media, and only tax-focused policies supporting local journalism


Major discussion point

Media Remuneration Policy Analysis


Topics

Cultural diversity | Digital business models | Legal and regulatory


Most policies failed to clearly articulate how they would better serve public information needs

Explanation

While all media remuneration policies claimed to serve the public interest, Mitchell found that they failed to clearly explain how their mechanisms would actually improve public access to news and information. The policies didn’t adequately consider how the public actually consumes information or the diversity of journalism producers the public relies on.


Evidence

Analysis showing policies referenced serving the public but lacked clear articulation of how steps would better deliver news to public, especially considering diverse journalism producers


Major discussion point

Media Remuneration Policy Analysis


Topics

Digital access | Content policy | Human rights principles


Agreed with

– Audience

Agreed on

Need for alternative approaches to disinformation beyond content restriction


Few AI policies directly address journalism, but they have indirect impacts on the digital news landscape

Explanation

Mitchell argues that while AI policies rarely mention journalism or news information directly, they have significant indirect and eventual direct relationships with the digital news landscape. This makes it important to consider journalism implications before AI policies are passed and implemented.


Evidence

Early-stage analysis of AI policy space showing very few policies directly addressing journalism or news information, but with clear indirect impacts on digital news landscape


Major discussion point

AI Policy Framework and Implications


Topics

Legal and regulatory | Future of work | Digital standards


Need to consider how AI policies affect journalists’ ability to benefit from technology while guarding against risks

Explanation

Mitchell emphasizes the importance of examining how AI policies can impact journalists’ ability to utilize technological benefits while also providing protection against potential risks. This requires careful consideration of both opportunities and threats that AI policies present to journalism.


Evidence

Framework analysis examining range of AI policies including committees, agencies, deep fakes, synthetic content, labeling, and algorithmic bias considerations


Major discussion point

AI Policy Framework and Implications


Topics

Future of work | Digital standards | Legal and regulatory


Liability often falls on users, including journalists, requiring clear policy definitions

Explanation

In AI policy analysis, Mitchell found that liability frequently falls on users, which can include the public, companies, and journalists using AI technology. This makes it crucial for policies to clearly define who constitutes a user and under what circumstances they can be held liable for content or negative usage effects.


Evidence

Analysis of algorithmic bias, discrimination policies, and frontier models showing liability placement on users, with need for clear user space definitions


Major discussion point

AI Policy Framework and Implications


Topics

Legal and regulatory | Liability of intermediaries | Future of work


Public places great value on journalism’s role in society but has broad definitions of who can be journalism producers

Explanation

Mitchell’s four-country survey revealed that the public highly values journalism’s societal role across all surveyed countries. However, the public also maintains a very broad definition of who can produce journalism, including individuals working independently, as long as the work is mission-driven and guided by journalistic principles.


Evidence

Four-country survey with focus groups and representative statistical surveys showing public value for journalism and broad definitions of journalism producers as mission-driven and principle-guided


Major discussion point

Public Perspective and Engagement


Topics

Content policy | Cultural diversity | Digital identities


Both journalists and public see technology as critically important for news production and consumption

Explanation

Mitchell’s research demonstrates that both journalism producers and the public view technology as essential for gathering, producing, disseminating, and consuming news. This mutual dependence on technology underscores the importance of policies that enable technological benefits while protecting against potential harms.


Evidence

Survey data showing both journalists and public consider technology critically important for news production, gathering, dissemination, and consumption


Major discussion point

Public Perspective and Engagement


Topics

Digital access | Future of work | Digital standards


Agreed with

– Audience

Agreed on

Importance of addressing public perspective in disinformation policy


Response that autocratic policies matter because they affect real people and can be copied by other countries for harmful purposes

Explanation

When questioned about including autocracies in policy analysis, Mitchell argued that these policies matter because they affect real people living under those governments. Additionally, policies from autocratic countries can be copied or adapted by other nations, and even well-intentioned democratic policies can be misused by autocratic regimes for information control.


Evidence

Example of well-intended policy from democratic country being adopted by India for information control, demonstrating cross-border policy copying for harmful purposes


Major discussion point

Methodological and Scope Questions


Topics

Human rights principles | Freedom of the press | Legal and regulatory


Disagreed with

– Audience

Disagreed on

Methodological approach to including autocracies in policy analysis


A

Audience

Speech speed

142 words per minute

Speech length

319 words

Speech time

134 seconds

Question about whether countries should focus more on demand side of disinformation – why people believe and engage with it

Explanation

An audience member suggested that countries should emphasize understanding why people believe and engage with disinformation rather than just focusing on supply-side controls. They questioned whether addressing the psychological and behavioral aspects of disinformation consumption might be more effective than content-focused policies.


Evidence

Reference to Sweden’s psychological defense agency that prepares the population to better engage with and recognize disinformation


Major discussion point

Public Perspective and Engagement


Topics

Content policy | Online education | Human rights principles


Agreed with

– Amy Mitchell

Agreed on

Importance of addressing public perspective in disinformation policy


Suggestion that psychological defense approaches, like Sweden’s agency, could be alternative policy approaches

Explanation

The audience member proposed that psychological defense mechanisms, such as Sweden’s government agency that helps prepare the population to recognize and engage with disinformation, could represent an alternative policy approach. This would focus on building public resilience rather than content restriction.


Evidence

Sweden’s psychological defense agency as an example of government efforts to prepare population for disinformation recognition and engagement


Major discussion point

Public Perspective and Engagement


Topics

Online education | Content policy | Capacity development


Agreed with

– Amy Mitchell

Agreed on

Need for alternative approaches to disinformation beyond content restriction


Question about including individual EU member states rather than EU-wide Digital Services Act in the study sample

Explanation

An audience member questioned the methodology of including four individual EU member states in the fake news policy analysis rather than examining the EU-wide Digital Services Act. They suggested that national laws may have become obsolete due to the overarching EU legislation.


Evidence

Reference to EU Digital Services Act covering most aspects that were previously handled by individual member state laws


Major discussion point

Methodological and Scope Questions


Topics

Legal and regulatory | Jurisdiction | Content policy


Disagreed with

– Amy Mitchell

Disagreed on

EU policy analysis methodology – individual member states vs. EU-wide legislation


Challenge regarding the value of including autocracies in policy analysis when their control intentions are obvious

Explanation

An audience member questioned the analytical value of including established autocracies in the policy study sample, arguing that it’s obvious these governments will use any excuse to control information and exercise control over the information sphere. They questioned what conclusions could be drawn from such predictable behavior.


Major discussion point

Methodological and Scope Questions


Topics

Freedom of the press | Human rights principles | Legal and regulatory


Disagreed with

– Amy Mitchell

Disagreed on

Methodological approach to including autocracies in policy analysis


Agreements

Agreement points

Importance of addressing public perspective in disinformation policy

Speakers

– Amy Mitchell
– Audience

Arguments

Both journalists and public see technology as critically important for news production and consumption


Question about whether countries should focus more on demand side of disinformation – why people believe and engage with it


Summary

Both speakers recognized the critical importance of understanding and addressing the public’s role in information consumption, with Mitchell emphasizing technology’s importance to both producers and consumers, and the audience member suggesting focus on why people engage with disinformation


Topics

Content policy | Online education | Digital access


Need for alternative approaches to disinformation beyond content restriction

Speakers

– Amy Mitchell
– Audience

Arguments

Most policies failed to clearly articulate how they would better serve public information needs


Suggestion that psychological defense approaches, like Sweden’s agency, could be alternative policy approaches


Summary

Both speakers implicitly agreed that current content-focused approaches are insufficient, with Mitchell noting policies fail to serve public needs and the audience member proposing psychological defense mechanisms as alternatives


Topics

Content policy | Online education | Capacity development


Similar viewpoints

Both recognize that the public’s perspective and behavior are central to understanding and addressing information challenges, whether in defining journalism or in consuming/believing information

Speakers

– Amy Mitchell
– Audience

Arguments

Public places great value on journalism’s role in society but has broad definitions of who can be journalism producers


Question about whether countries should focus more on demand side of disinformation – why people believe and engage with it


Topics

Content policy | Cultural diversity | Online education


Unexpected consensus

Value of studying autocratic policies despite predictable outcomes

Speakers

– Amy Mitchell
– Audience

Arguments

Response that autocratic policies matter because they affect real people and can be copied by other countries for harmful purposes


Challenge regarding the value of including autocracies in policy analysis when their control intentions are obvious


Explanation

While the audience member initially challenged the value of studying autocratic policies, Mitchell’s response about cross-border policy copying and real human impact created an unexpected area of understanding about the interconnected nature of global policy effects


Topics

Human rights principles | Freedom of the press | Legal and regulatory


Overall assessment

Summary

The discussion showed limited but meaningful consensus around the importance of public-centered approaches to information policy and the recognition that current content-focused policies may be insufficient


Consensus level

Moderate consensus on methodological approaches and public engagement importance, with constructive dialogue rather than disagreement on policy analysis scope. The consensus suggests a shared understanding that effective information policy requires deeper consideration of public behavior and cross-border implications.


Differences

Different viewpoints

Methodological approach to including autocracies in policy analysis

Speakers

– Amy Mitchell
– Audience

Arguments

Response that autocratic policies matter because they affect real people and can be copied by other countries for harmful purposes


Challenge regarding the value of including autocracies in policy analysis when their control intentions are obvious


Summary

The audience member questioned the analytical value of including established autocracies in policy studies since their intention to control information is predictable, while Mitchell argued that these policies matter because they affect real people and can be adopted by other countries for harmful purposes.


Topics

Freedom of the press | Human rights principles | Legal and regulatory


EU policy analysis methodology – individual member states vs. EU-wide legislation

Speakers

– Amy Mitchell
– Audience

Arguments

Study of 32 fake news policies across 31 countries showed greater risk to journalistic independence than protection of information space


Question about including individual EU member states rather than EU-wide Digital Services Act in the study sample


Summary

The audience member questioned why the study included four individual EU member states rather than examining the EU-wide Digital Services Act, suggesting national laws may be obsolete, while Mitchell defended the methodology based on focusing on specific fake news policies rather than broader online safety legislation.


Topics

Legal and regulatory | Jurisdiction | Content policy


Unexpected differences

Research methodology and scope decisions

Speakers

– Amy Mitchell
– Audience

Arguments

Cross-border policy impacts require thinking beyond national boundaries


Question about including individual EU member states rather than EU-wide Digital Services Act in the study sample


Explanation

The disagreement about research methodology was unexpected because it revealed different perspectives on how to analyze transnational policy frameworks. While Mitchell emphasized cross-border impacts and the value of examining diverse policy approaches, the audience member focused on regulatory efficiency and questioned the relevance of studying potentially obsolete national policies.


Topics

Legal and regulatory | Jurisdiction | Content policy


Overall assessment

Summary

The disagreements were primarily methodological rather than substantive, focusing on research approach and scope rather than fundamental policy principles


Disagreement level

Low to moderate disagreement level. The disagreements were constructive and focused on research methodology and analytical approaches rather than core policy goals. Both speakers appeared to share concerns about protecting press freedom and serving public interests, but differed on analytical frameworks and research scope. These methodological disagreements actually enhanced the discussion by raising important questions about how to effectively study and compare international policies.


Partial agreements

Partial agreements

Similar viewpoints

Both recognize that the public’s perspective and behavior are central to understanding and addressing information challenges, whether in defining journalism or in consuming/believing information

Speakers

– Amy Mitchell
– Audience

Arguments

Public places great value on journalism’s role in society but has broad definitions of who can be journalism producers


Question about whether countries should focus more on demand side of disinformation – why people believe and engage with it


Topics

Content policy | Cultural diversity | Online education


Takeaways

Key takeaways

Current journalism policy landscape is unprecedented in scope and complexity, with 50% of journalists experiencing government censorship and global press freedom at 1993 levels


Well-intentioned policies often create unintended consequences that harm journalistic independence and diversity rather than protecting the information space


Critical policy analysis framework should examine definitional language, oversight authority, diversity impacts, public service goals, and cross-border effects


Fake news policies across 31 countries showed most (25 of 32) failed to define key terms, leaving interpretation to government authorities, with 14 policies placing direct government control


Media remuneration policies vary dramatically in defining digital content usage and compensation, often favoring large outlets over diverse smaller operations


AI policies rarely address journalism directly but have significant indirect impacts on the digital news landscape through liability placement and content regulation


Public has broad definition of journalism producers beyond traditional news organizations, valuing mission-driven, principle-guided content creators


Technology is viewed as critically important by both journalists and public for news production, gathering, dissemination, and consumption


Policy impacts cross national borders through copycatting and international digital infrastructure, requiring global coordination


Need for collaborative approach involving policymakers, technology companies, media organizations, researchers, and civil society in data-driven policy discussions


Resolutions and action items

CNTI plans to spend more time in the coming year examining the relationship between public behavior and disinformation policy effectiveness


CNTI is developing a research working group focused on public response to AI content labeling and watermarking


CNTI will complete and share analysis of AI policy impacts on journalism when the team finishes their comprehensive study


Recommendation for policymakers to articulate clear goals for what the digital information landscape should look like before implementing content moderation policies


Unresolved issues

How to balance defining journalism and fake news in policy without creating tools for government control of information


What the optimal end goal should be for content moderation policies and digital information landscapes


How to ensure AI policies adequately protect journalists while enabling technological benefits


Whether demand-side approaches to disinformation (focusing on why people believe false information) should be prioritized over supply-side regulation


How to create consistent cross-border policy frameworks that respect national sovereignty while addressing global digital challenges


How to ensure media remuneration policies effectively serve public information needs rather than just supporting large media organizations


What constitutes appropriate liability distribution between AI platforms, users, and content creators including journalists


Suggested compromises

Balancing the need for policy definitions with safeguards against government overreach by carefully considering who has oversight authority


Including diverse stakeholders (journalism sector representatives) in AI policy committees and agencies rather than excluding media perspectives


Focusing on psychological defense and media literacy approaches alongside regulatory measures to address disinformation


Creating policy frameworks that enable technological benefits while implementing specific safeguards against identified risks


Developing policies that support both large and small journalism operations rather than favoring one over the other


Thought provoking comments

It’s not clear within the policy conversation space that we’ve really actually done a very good job at all of articulating what would the digital landscape look like if this content moderation policy that we’re talking about gets put in what is it? That’s bad. That’s out. What is it? That’s good. That’s in what’s the mix? There’s always going to be a mix of content in there. So really taking the time to think about the ultimate goals there

Speaker

Amy Mitchell


Reason

This comment is deeply insightful because it exposes a fundamental flaw in policy-making: the lack of clear vision for desired outcomes. Rather than focusing on technical mechanisms, Mitchell highlights that policymakers haven’t adequately defined what success looks like in the information landscape.


Impact

This observation reframes the entire discussion from ‘how to regulate’ to ‘what are we trying to achieve.’ It introduces a meta-level critique that challenges the foundation of current policy approaches and sets up the framework for more thoughtful policy design throughout her presentation.


What’s the point of having really established autocracies among the sample, where it’s obvious and clear that they will use any excuse to control the information sphere and to use laws against disinformation to control, yeah, to exercise control. So what’s the point of having that? That is just, to me, obvious.

Speaker

Audience member


Reason

This question is provocative because it challenges the methodology and underlying assumptions of comparative policy analysis. It forces consideration of whether studying authoritarian approaches has value when their intent to control information is predetermined.


Impact

This question shifts the discussion toward the interconnectedness of global policy and the practical implications of policy migration across different governmental systems. It leads Mitchell to articulate how well-intentioned democratic policies can be co-opted by authoritarian regimes, adding a crucial geopolitical dimension to the conversation.


I was wondering if you would recommend that actually countries should also put more emphasis on the demand side of disinformation. So why do people maybe believe disinformation? Why do people engage with disinformation? And why is it so easy for them to look at that?

Speaker

Audience member


Reason

This comment is thought-provoking because it fundamentally shifts the focus from supply-side regulation (controlling content) to demand-side intervention (addressing why people consume misinformation). It suggests a completely different policy approach focused on media literacy and psychological factors.


Impact

This question introduces a new dimension to the policy discussion, moving beyond content regulation to consider human behavior and education. It prompts Mitchell to acknowledge the complexity of public perception and the subjective nature of what constitutes ‘disinformation,’ adding nuance to the entire framework.


We also see in the data that the public has a very broad definition of who can be producers of journalism today. It may be somebody inside an organization. It may be an individual who’s working on their own or doing their own work… it’s mission-driven. It’s guided by principles. It’s all of those elements that we think about of journalism, but it doesn’t necessarily have to be a news operation.

Speaker

Amy Mitchell


Reason

This observation is crucial because it highlights the disconnect between traditional policy frameworks (which assume institutional journalism) and contemporary reality (where individual creators are considered journalists by the public). It challenges fundamental assumptions about who deserves protection under journalism policies.


Impact

This insight forces a reconsideration of how journalism protection policies should be structured. It suggests that current policy frameworks may be inadequate for protecting the diverse ecosystem of information producers that the public actually relies on, fundamentally challenging traditional approaches to media regulation.


There is actually a fair amount of research, and there’s a lot that actually shows the disinformation campaigns don’t have a whole lot of impact on what people actually believe or don’t believe, but that people’s own behavior and where they’re choosing to go can have that… what the public would categorize as disinformation can vary greatly… there are very much alignments to one’s political thinking, to the kinds of sources you turn to.

Speaker

Amy Mitchell


Reason

This comment is particularly insightful because it challenges the entire premise underlying much disinformation policy – that external disinformation campaigns are the primary problem. Instead, it suggests that individual choice and political bias are more significant factors, which would require entirely different policy approaches.


Impact

This observation fundamentally questions the effectiveness of content-focused disinformation policies and suggests that the problem may be more about political polarization and media consumption habits than external manipulation. It adds significant complexity to the policy discussion by suggesting that the problem may not be solvable through traditional regulatory approaches.


Overall assessment

These key comments collectively transformed what could have been a technical policy discussion into a fundamental examination of assumptions underlying digital governance. Mitchell’s insights about the lack of clear policy goals and the evolving nature of journalism challenged traditional regulatory frameworks, while audience questions pushed the conversation toward more nuanced considerations of global policy interconnectedness and human behavioral factors. The discussion evolved from presenting research findings to questioning the foundational premises of current policy approaches, ultimately suggesting that effective digital governance requires a more sophisticated understanding of public behavior, global policy dynamics, and the changing nature of information production and consumption. The comments created a progression from ‘what policies exist’ to ‘what should policies actually try to achieve’ to ‘are current approaches fundamentally flawed,’ resulting in a much more critical and comprehensive examination of digital policy challenges.


Follow-up questions

What would the digital landscape look like if content moderation policies get implemented – what content should be out vs. in, and what should the mix be?

Speaker

Amy Mitchell


Explanation

This is a fundamental question about policy goals that Mitchell identified as not being well-articulated in current policy discussions, which is critical for effective content moderation policy design


How do AI policies affect journalists’ ability to use technology benefits while safeguarding against risks, especially across different jurisdictions?

Speaker

Amy Mitchell


Explanation

This represents an ongoing research area that CNTI is just beginning to explore, focusing on the indirect impacts of AI policy on journalism


How can labeling and watermarking systems foster public trust with technology and journalism rather than diminish it?

Speaker

Amy Mitchell


Explanation

Mitchell mentioned they’ve started a global research working group on this topic to understand public response to labeling systems, which is crucial for effective implementation


How should liability be defined for AI users, including journalists, in frontier model policies?

Speaker

Amy Mitchell


Explanation

This is an important policy consideration as liability often falls on users, and it needs clarification for different user categories including journalists


What is the point of including autocracies in policy analysis samples when their control of information is obvious?

Speaker

Audience member


Explanation

This question challenges the methodology and value of including authoritarian regimes in comparative policy studies


Should countries focus more on the demand side of disinformation – why people believe and engage with it – rather than just content control?

Speaker

Audience member


Explanation

This suggests an alternative policy approach focusing on public education and psychological preparedness rather than content restriction


How can policies better serve the public’s actual information-seeking behaviors and their broad definition of journalism producers?

Speaker

Amy Mitchell


Explanation

Mitchell emphasized the need to understand how the public actually gets information today, including from individual journalists and diverse sources, to inform policy design


What are the best mechanisms to balance reaching information landscape goals while avoiding unintended risks and harms?

Speaker

Amy Mitchell


Explanation

This represents the core challenge of policy design that Mitchell identified as requiring more examination in the coming year


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Launch / Award Event #57 Governing Identity Online Nations and Technologists

Launch / Award Event #57 Governing Identity Online Nations and Technologists

Session at a glance

Summary

This discussion launched a research project funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech, focusing on the governance of digital identifiers and online identity systems. Upasana Hembram from the Internet Society Foundation explained that digital interactions are fundamentally built on trust and identity authentication, which profoundly influence how transparent, secure, and trustworthy the Internet can be. The research examines how private organizations and government agencies interact in the global governance landscape to deploy online identity systems, particularly studying three specific identifier systems: WebPKI, Legal Entity Identifiers (LEI), and Resource Public Key Infrastructure (RPKI).


Dr. Milton Mueller outlined how digital identifiers require systems of trust and authority, with cyberspace changing traditional authority relationships in new ways. He discussed RPKI as a method for authenticating routing announcements and IP address block ownership, noting government involvement such as the U.S. Federal Communications Commission’s consideration of requiring RPKI implementation. The WebPKI system was highlighted through the European Commission’s EIDAS initiative, which created tension with existing browser-based trust hierarchies controlled by companies like Google, Apple, and Microsoft.


Vagisha Srivastava presented research on Legal Entity Identifiers, which uniquely emerged from a top-down approach by the Financial Stability Board and G20 following the 2008 financial crisis. LEIs address transparency and verification needs for financial entities in cross-border transactions, though the system faces challenges with certificate lapses due to insufficient user incentives for renewal. Benjamin Akinmoyeje provided perspective from Africa, discussing the continent’s rapid digital identity initiatives including World Bank projects and African Union digital transformation strategies, while highlighting concerns about interoperability across different national systems. The research aims to enhance understanding of how different policy decisions within various jurisdictions impact the global Internet governance landscape.


Keypoints

## Major Discussion Points:


– **Launch of Digital Identity Research Project**: Introduction of a new research initiative funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech to study governing online identities and digital identifier systems


– **Three Core Identity Systems Under Study**: Examination of RPKI (Resource Public Key Infrastructure) for routing security, WebPKI for web authentication including EU’s EIDAS controversy with browser manufacturers, and LEI (Legal Entity Identifiers) for financial entity verification


– **Government vs. Technical Community Authority**: Analysis of how state authority intersects with Internet community self-governance, including examples like the FCC’s consideration of RPKI requirements and the European Commission’s clash with existing browser-based trust hierarchies


– **Legal Entity Identifiers (LEI) Challenges**: Discussion of the top-down creation of LEI by financial regulators post-2008 crisis, its mandatory use for cross-border transactions, and the problem of certificate lapses due to lack of user incentives for renewal


– **Global South Perspective on Digital Identity**: Presentation of Africa’s digital identity landscape, including massive inclusion efforts (500+ million people lacking verifiable identity), various continental initiatives, and concerns about interoperability across different national systems


## Overall Purpose:


The discussion serves as a launch event for a comprehensive research project examining how digital identity systems are governed globally. The goal is to understand the complex interplay between technical communities, government agencies, and private actors in managing online identity verification systems, with implications for Internet governance, trust, security, and global digital inclusion.


## Overall Tone:


The discussion maintains an academic and informative tone throughout, characterized by scholarly presentation of research objectives and technical concepts. The tone is collaborative and forward-looking, with speakers building upon each other’s presentations to create a comprehensive overview of the research scope. There’s an underlying sense of urgency about the importance of understanding these “background” systems that are fundamental to digital trust, though the presentation remains measured and analytical rather than alarmist.


Speakers

– **Dr. Milton Mueller**: Internet Governance Project at Georgia Tech (project executor/researcher)


– **Upasana Hembram**: Internet Society Foundation (foundation representative)


– **Dr. Karim Farhat**: Part of the research project, based in the United States, working on legal entity identifiers


– **Vagisha Srivastava**: PhD student at Georgia Tech, handling research on legal entity identifiers (LEIs)


– **Benjamin Akinmoyeje**: Involved in ICANN from Africa perspective, working with digital identifier policy, based in Nigeria


– **Michael Palage**: (mentioned in speakers list but role/expertise not clearly specified in transcript)


Additional speakers:


– **Dr. Johannes Sedlmeyer**: (mentioned multiple times but role/expertise not specified in the provided transcript portion)


Full session report

# Summary: Launch of Digital Identity Governance Research Project


## Introduction and Project Overview


This discussion marked the formal launch of a research initiative examining the governance of digital identifiers and online identity systems. The project is funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech, bringing together researchers from multiple continents to address digital identity governance.


Upasana Hembram from the Internet Society Foundation opened the discussion by establishing that digital interactions are built upon trust and identity authentication. She emphasized that digital identity systems, despite their crucial role in today’s digital economy, remain an understudied area of Internet governance with profound implications for privacy, security, and trust. Hembram argued that these systems should be viewed as instruments of public trust rather than mere background technologies.


## Theoretical Framework


Dr. Milton Mueller provided the theoretical foundation by addressing fundamental questions about authority and trust in cyberspace. He explained that objects in cyberspace cannot be identified without proper identification and authentication systems, making digital identity systems essential infrastructure.


Mueller highlighted how cyberspace is changing authority relationships and posed critical questions about where authority resides in digital identity systems and who can be trusted when authenticating online identity. The research framework focuses on three specific identifier systems: Resource Public Key Infrastructure (RPKI), Web Public Key Infrastructure (WebPKI), and Legal Entity Identifiers (LEI).


## Resource Public Key Infrastructure (RPKI)


Mueller presented RPKI as a method for authenticating routing announcements and verifying ownership of IP address blocks. He noted that the U.S. Federal Communications Commission initially considered requiring RPKI implementation among Internet service providers but ultimately backed away from this requirement due to questions about their authority in this domain.


The research team identified RPKI implementation speed and effectiveness as key areas of investigation, particularly regarding the degree to which governments become involved in either requiring or using RPKI.


## Web Public Key Infrastructure and eIDAS


The WebPKI system was discussed through the European Commission’s Electronic Identification, Authentication and Trust Services (eIDAS) initiative, which created tension with existing browser-based trust hierarchies. Mueller described this as a political clash between governmental authority and established technical community governance structures, where the European Commission attempted to intervene in web authentication processes controlled by major technology companies including Google, Apple, and Microsoft.


## Legal Entity Identifiers: Regulatory Approach


Vagisha Srivastava presented detailed research on Legal Entity Identifiers, which emerged from regulatory mandates following the 2008 financial crisis. The LEI system was created by the Financial Stability Board and G20 to address transparency and verification problems in cross-border financial transactions.


Srivastava explained the LEI governance structure: the Financial Stability Board established the Regulatory Oversight Committee (ROC), which oversees the Global Legal Entity Identifier Foundation (GLEIF), which in turn manages local operating units that issue LEI codes to legal entities.


Her research revealed critical challenges with certificate lapses due to insufficient user incentives for renewal. Financial organizations often fail to maintain current LEI certificates, undermining the system’s verification purposes. This led to the insight that regulatory mandates alone are insufficient – effective systems require user incentives and infrastructural integration for ongoing effectiveness.


## African Perspectives


Benjamin Akinmoyeje began presenting on Africa’s digital identity landscape, noting that over 500 million people in Africa lack verifiable legal identities, creating barriers to accessing essential services. He mentioned multiple initiatives developing across the continent, including the World Bank’s ID for Development project and the African Union’s digital transformation strategy.


*Note: The transcript appears to become incomplete during Benjamin’s presentation and becomes unclear toward the end, limiting the available information about his full contribution to the discussion.*


## Project Significance


The discussion positioned digital identity governance as a critical but understudied component of Internet governance. The research project aims to examine how private organizations and government agencies interact within the global governance landscape to deploy online identity systems, addressing the complex reality where traditional boundaries between public and private authority are increasingly blurred.


The project’s multi-stakeholder approach and focus on three distinct identifier systems provides concrete case studies for examining broader questions about authority, trust, and governance in digital environments. The inclusion of Global South perspectives ensures the research addresses questions of inclusion and digital equity alongside technical governance challenges.


## Conclusion


This launch discussion established the scope and methodology of a research project examining digital identity governance through three specific case studies. The conversation highlighted the complexity of digital identity systems and demonstrated the need for understanding how different governance approaches operate across various contexts and jurisdictions. The research represents an effort to fill a significant gap in understanding how these fundamental systems are governed and their implications for the broader Internet ecosystem.


Session transcript

Dr. Milton Mueller: This is a session on digital identifiers, and it represents a launch of a research project that is being funded by the Internet Society Foundation and executed by the Internet Governance Project at Georgia Tech. And I want to begin by introducing Upasana, who is with the Internet Society Foundation, and she will introduce you to the foundation and the way they are supporting research.


Upasana Hembram: Hello, everyone. Good morning to everyone present in Oslo. Good afternoon. Good evening to all those joining virtually. Thank you all for gathering here to attend this session about launching this study on governing online identities. As you all know, the fundamental of our digital interaction these days is essentially built on trust, and a lot of it is dependent on authenticating identity, and this involves several complex technical systems and governance arrangements that are constantly developed in order to assign proof and verify identity. And since these identity systems profoundly influence how transparent, secure, and trustworthy the Internet can be, I don’t think they should be viewed as merely technologies that run in the background, but as a fundamental instrument of public trust. At Internet Society and the Internet Society Foundation, our vision is an Internet for everyone, and we strongly believe that the Internet should be open, secure, safe, trustworthy, and community-centered. Through our various grant programs at the Internet Society Foundation, we have been championing organizations and changemakers who have been working towards this mission, and specifically through our research grant program, we encourage experimentation, innovation, and explorations that can help us deepen our understanding of the critical functions that keep the Internet running, and also help ideate various solutions that can strengthen and safeguard the core principles of an open and trustworthy Internet. So we’ve partnered with the Internet Governance Project at Georgia Tech to do exactly that. The digital identity system, despite the emerging lack of trust in today’s digital world, happens to be an understudied area of Internet governance, but it has deep implications for privacy, security, and trust in today’s Internet economy. And amidst this evolving geopolitical landscape, this study, which has been supported by the Internet Society Foundation’s research grant, will examine how private actor-led organizations and government agencies interact in the global governance landscape to deploy online identity. And our hope with this study is that it can enhance our understanding of the dynamics that are involved, and what that means for the broader Internet ecosystem. This study particularly looks at WebPKI, LEI, and RPKIs, which will be discussed in greater detail by the presenters today. And while these don’t make newsflash, like eyeball-grabbing headlines, they are very critical in shaping some of the most foundational aspects of digital interactions today via trust and safety. Now, why should somebody care about this study, and how does it relate to Internet governance? This study takes a closer look at identity regimes across different jurisdictional contexts, and it sheds light on how the effects of these different policy options within these jurisdictions have implications on the global Internet governance landscape. The insights from these different case studies can help us understand why some decisions were made, how they were made, how they were implemented, and perhaps what are some of the outcomes that they produce, which will eventually help us, especially key decision makers in government and policy, public policy, make decisions on how to allocate resources around investment decisions, et cetera. Lastly, I would like to close off by saying that the future of Internet governance does not mean to be built solely on laws and regulations. It should be through open, multi-stakeholder models that truly reflect the public interest, and this study tries to go deep into the governance of online identity and does exactly that.


Dr. Milton Mueller: Thank you. Let’s go back now to, by the way, that’s Karim Farhat up there. He’s in the United States, and he’s part of the project. So let me just begin by introducing the basic topic. You see these blobs on the left, and that kind of represents objects in cyberspace, which could be any number of things. It could be servers, it could be machines, it could be devices, it could be people. And in cyberspace, you simply do not know what these things are without some kind of a identification and authentication system. So we’re studying that process, and we’re looking at it, how do I change the slides? Like that? Next slide. Okay. So one of the important things about digital identifiers, and they could be, again, for anything, is that they require some kind of system of trust and authority. And the interesting thing about cyberspace is that it is changing the authority relationships in new ways. So where does the authority reside? Who can you trust when you’re authenticating online identity? And so that is three different identifier systems that we have chosen to study. One of them is the RPKI, which is about trusting routing announcements. Another is about the WebPKI. And another is about legal entity identifiers, which is a new system of identifiers being developed by a new international organization. Now, I’m going to talk a little bit about RPKI. We don’t have a lot of time. Obviously, this is a very complex topic. But RPKI is a way of authenticating routing announcements, or actually authenticating who actually is the legitimate holder of an IP address block. The Regional Internet Registry has issued certificates, digital certificates, that allow you to authenticate this. And there’s been some controversy about how quickly this is being implemented and how effective it is as a method of ensuring routing security. And so one of the things that interests us is the degree to which governments get involved in either requiring or using RPKI. And so one of the things we’ll be looking at is a recent U.S. Federal Communications Commission proceeding in which the FCC, for a while, thought it was going to intervene and start requiring RPKI among Internet service providers in the United States, and ultimately backed off and decided it didn’t have the authority to do that. But that’s one of these ways in which state authority is mixing with the The EIDAS is another area in which we will be looking closely at an intersection of government power and Internet community self-governance. This is the web authentication process and recently the European Commission tries to intervene in this by saying we’re going to create a European system of digital certificates and we will decide who you can trust and they clashed with the existing platform-based trust hierarchy primarily centered in the browser manufacturers, that is to say Google, Apple, Microsoft and so on and there was a big political clash over that and so we’re going to be looking at that controversy in detail. And now I’m going to turn it over to, we don’t have time to go into all this, organizational identity. I’ll turn it over to Vagisha Srivastava who is a PhD student at Georgia Tech and she’s handling part of the research on legal identity identifiers.


Vagisha Srivastava: I and Karim, my colleague, who’s online, we are looking at the legal entity identifiers which is kind of a unique choice in our study because this is one of those organizational entity that was not created by the technical community, bottoms up, but it was a top-down approach created by the FSB, the financial standards board in the G20. So one of the problems that led to the creation of this was identified post-financial crisis where a lack of transparency and verification needed for, you know, financial entities was missing. So there was an asymmetric information problem that led to a market failure where especially for cross-border transactions, verification and authentication was very, very difficult. So between 2008 and 2012, G20 convened and they decided that we need an entity identifier norm and regulation which led to the creation of GLEIF, we can go to the next slide. And LEIs basically fill that gap. They provide a standardization requirement for financial entities so that they can be verified which go through a list of procedures and check and then they can participate in local transactions and also cross-border transactions. It’s mandatory for cross-border transactions but not so much for if you want to make domestic transactions. So they did improve transparency and risk mechanisms. So you can see the FSB led to RAC which led to the creation of GLEIF which is like a non-profit entity that then leads to the creation of local operating units that issue LEIs in domestic markets. You can go to the next slide. The current status remains that the uptake is huge, one because it’s compulsory for any entity that wants to participate in cross-border transactions. But one of the problems that we observed was that there’s a lot of lapse certificate which basically means that these financial organizations don’t have the incentive to keep on renewing which means that the information that is associated with these identities gets lapsed and therefore it’s not current which then leads to a problem which we began with that you cannot verify or authenticate these entities with credible information. So LEIs in our cases, and I’ll stop just here, which is LEIs in our case reveal something very important which is global standards need not just regulatory pressure but user incentives and infrastructural integration for them to keep on going and that’s what we are focusing on within this study.


Benjamin Akinmoyeje: Okay. So next we want to bring up Benjamin Akinmoyeje Akinmoye from Nigeria. Benjamin Akinmoyeje is not a researcher for us but he is somebody involved in ICANN from the standpoint of Africa and so he’s been working with digital identifier policy. Benjamin Akinmoyeje, can you talk about your perspective on this for about five minutes? Yes. Thank you very much. Can you hear me? We can hear you. Can you bring his picture up on the screen or is he not showing video? Oh. There we go. Okay. We got you. Yes. Is it possible for me to share my slide? I have a more detailed slide if you don’t mind. I don’t know whether the, yes, you can share your slides. Okay. Thank you. Do you see my screen?


Dr. Milton Mueller: No, we just see you which is perfectly fine. You look great. So.


Benjamin Akinmoyeje: Thank you. Good morning, everybody, and thank you for the opportunity to have me here. So I’m going to be talking about the relevance of digital identifier and the governance around it from the perspective of Global South and from someone living in Africa. So this space is really dynamic because of the enormous innovation going on for primarily for inclusion, access to services, and all of that. And in order to understand what is happening, at least I know that on the continent, statistics show that over 500 million people are yet to have some form of verifiable identity, legal IDs that they can build access to. So from that perspective, and then there’s this huge push for everybody to go online and there’s so much technology optimizing, you know. So there has been interesting projects on the continent. So when you look out some form of research around this, you’re going to find that World Bank has a big project going on, ID for Identification for Development, and it has like 49 countries already on board, and Rwanda and Nigeria are participants of this. And they are really going hard at this and getting more individuals registered, providing the guidelines so that we can have credible identifications that can work online as well. Then there’s this project, ID for Africa. This really goes across the continent, getting different national organizations responsible for either national identifiers like identification schemes to be on board. And then also African Union has their digital transformation strategy. And fundamental, foundational to this is the identifications, legal identification across different countries. So they give like a roadmap. Also regionally, like ECOWAS, you’ll find something like national biometric ID cards. So all of this, I’m just trying to show you how very rapidly moving these things are. Then on top of this, and you can see the motivation for this, because AFICTA, which is Africa Free Trade Agreement, is hoping to build essentially on digital innovations and how can we do trade across the continent. But the major concern is interoperability of this framework, because different countries talking to different vendors, different to get the ID. Benjamin Akinmoyejejamin Akinmoyeje, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer,


Dr. Karim Farhat: Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer,


Michael Palage: Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Vagisha Srivastava, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Dr. Johannes Sedlmeyer, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat,


Dr. Milton Mueller: Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat, Dr. Karim Farhat,


U

Upasana Hembram

Speech speed

114 words per minute

Speech length

565 words

Speech time

295 seconds

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations

Explanation

Hembram advocates for Internet governance approaches that involve multiple stakeholders and serve the public interest, rather than relying exclusively on legal and regulatory frameworks.


Evidence

She references the Internet Society Foundation’s support for research that can help strengthen and safeguard core principles of an open and trustworthy Internet


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Legal and regulatory


Agreed with

– Dr. Milton Mueller
– Vagisha Srivastava

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


Disagreed with

– Vagisha Srivastava

Disagreed on

Top-down vs. Bottom-up Governance Approaches


D

Dr. Milton Mueller

Speech speed

91 words per minute

Speech length

675 words

Speech time

443 seconds

Objects in cyberspace cannot be identified without proper identification and authentication systems

Explanation

Mueller explains that in cyberspace, entities like servers, machines, devices, or people are essentially unknown without some form of identification system to verify what they actually are.


Evidence

He uses visual representation of ‘blobs’ in cyberspace that could represent any number of things – servers, machines, devices, or people


Major discussion point

Digital Identity Systems as Fundamental Infrastructure


Topics

Digital identities | Infrastructure


Agreed with

– Upasana Hembram

Agreed on

Digital identity systems are fundamental infrastructure for trust and security online


Cyberspace is changing authority relationships in new ways, raising questions about where authority resides and who can be trusted

Explanation

Mueller argues that digital identifier systems require trust and authority structures, but cyberspace is fundamentally altering traditional authority relationships, creating new questions about legitimacy and trust.


Evidence

He points to three different identifier systems being studied: RPKI for routing announcements, WebPKI, and legal entity identifiers


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication

Explanation

Mueller describes how the European Commission attempted to create its own system of digital certificates and decide who can be trusted, which conflicted with existing platform-based trust hierarchies centered in browser manufacturers.


Evidence

The EIDAS regulation where the European Commission clashed with existing trust hierarchy primarily centered in browser manufacturers like Google, Apple, and Microsoft


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


The FCC initially considered requiring RPKI among Internet service providers but ultimately backed off due to lack of authority

Explanation

Mueller cites a case where the U.S. Federal Communications Commission considered intervening to require RPKI implementation among ISPs but eventually decided it didn’t have the authority to do so.


Evidence

A recent U.S. Federal Communications Commission proceeding where the FCC initially thought it would intervene in requiring RPKI among Internet service providers


Major discussion point

Authority and Trust in Digital Identity Governance


Topics

Digital identities | Legal and regulatory


The study examines how private actor-led organizations and government agencies interact in global governance to deploy online identity

Explanation

Mueller outlines the research project’s focus on understanding the dynamics between private organizations and government agencies in the global governance landscape for online identity deployment.


Evidence

The study is supported by the Internet Society Foundation’s research grant and focuses on WebPKI, LEI, and RPKIs


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Legal and regulatory


Agreed with

– Upasana Hembram
– Vagisha Srivastava

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


The research focuses on three specific identifier systems: WebPKI, LEI, and RPKI to understand governance dynamics

Explanation

Mueller explains that the research project examines three distinct digital identifier systems to understand how governance works across different contexts and authority structures.


Evidence

RPKI for authenticating routing announcements, WebPKI for web authentication, and legal entity identifiers developed by international organizations


Major discussion point

Research Project Framework and Methodology


Topics

Digital identities | Infrastructure


V

Vagisha Srivastava

Speech speed

142 words per minute

Speech length

404 words

Speech time

170 seconds

LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems

Explanation

Srivastava explains that Legal Entity Identifiers are distinctive because they were created through a top-down regulatory approach by the Financial Standards Board and G20, contrasting with typical technical community-driven bottom-up development.


Evidence

The system was created by the FSB (Financial Standards Board) in the G20 rather than emerging from technical communities


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Legal and regulatory


Agreed with

– Upasana Hembram
– Dr. Milton Mueller

Agreed on

Digital identity systems require complex governance structures involving multiple stakeholders


Disagreed with

– Upasana Hembram

Disagreed on

Top-down vs. Bottom-up Governance Approaches


LEIs were created to address transparency and verification problems identified after the 2008 financial crisis

Explanation

Srivastava describes how the 2008 financial crisis revealed problems with asymmetric information and lack of transparency in verifying financial entities, especially for cross-border transactions, leading to the creation of LEIs.


Evidence

Between 2008 and 2012, G20 convened and decided an entity identifier norm and regulation was needed, leading to the creation of GLEIF


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Economic


Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective

Explanation

Srivastava argues that while LEI uptake is high due to mandatory requirements for cross-border transactions, many certificates lapse because organizations lack incentives to renew them, revealing that successful global standards require more than just regulatory mandates.


Evidence

There are many lapsed certificates because financial organizations don’t have incentive to keep renewing, leading to outdated information that defeats the original verification purpose


Major discussion point

Legal Entity Identifiers (LEI) System Analysis


Topics

Digital identities | Legal and regulatory


B

Benjamin Akinmoyeje

Speech speed

81 words per minute

Speech length

572 words

Speech time

419 seconds

Over 500 million people in Africa lack verifiable legal IDs, creating barriers to accessing services

Explanation

Akinmoyeje highlights the massive scale of the digital identity challenge in Africa, where hundreds of millions of people cannot access services due to lack of verifiable identification in an increasingly digital world.


Evidence

Statistics showing over 500 million people on the continent are yet to have some form of verifiable identity or legal IDs


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Multiple initiatives are rapidly developing across Africa including World Bank’s ID for Development project and African Union’s digital transformation strategy

Explanation

Akinmoyeje describes the dynamic landscape of digital identity initiatives across Africa, with various international and regional organizations working to establish identification systems and digital transformation strategies.


Evidence

World Bank’s ID for Development project with 49 countries including Rwanda and Nigeria, ID for Africa project, African Union’s digital transformation strategy, and ECOWAS national biometric ID cards


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Interoperability remains a major concern as different countries work with different vendors for ID systems

Explanation

Akinmoyeje identifies interoperability as a critical challenge because different African countries are working with different vendors to develop their ID systems, potentially creating compatibility issues for cross-border interactions and trade.


Evidence

The concern is raised in context of AFICTA (Africa Free Trade Agreement) which hopes to build on digital innovations for continental trade


Major discussion point

Digital Identity Challenges in the Global South


Topics

Digital identities | Development


Agreements

Agreement points

Digital identity systems require complex governance structures involving multiple stakeholders

Speakers

– Upasana Hembram
– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


The study examines how private actor-led organizations and government agencies interact in global governance to deploy online identity


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Summary

All speakers acknowledge that digital identity governance involves complex interactions between various stakeholders including governments, private organizations, and technical communities, requiring multi-stakeholder approaches rather than single-authority solutions


Topics

Digital identities | Legal and regulatory


Digital identity systems are fundamental infrastructure for trust and security online

Speakers

– Upasana Hembram
– Dr. Milton Mueller

Arguments

Objects in cyberspace cannot be identified without proper identification and authentication systems


Digital identity systems profoundly influence how transparent, secure, and trustworthy the Internet can be and should not be viewed as merely background technologies


Summary

Both speakers emphasize that digital identity systems are not just technical tools but fundamental infrastructure that determines the trustworthiness and security of the entire Internet ecosystem


Topics

Digital identities | Infrastructure


Similar viewpoints

Both speakers recognize the tension between top-down governmental/regulatory approaches and bottom-up technical community governance in digital identity systems, highlighting different models of authority and control

Speakers

– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Topics

Digital identities | Legal and regulatory


Both speakers identify implementation challenges in digital identity systems, emphasizing that successful deployment requires more than just regulatory mandates and must address practical issues like user incentives and system compatibility

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Interoperability remains a major concern as different countries work with different vendors for ID systems


Topics

Digital identities | Development


Unexpected consensus

Limitations of purely regulatory approaches to digital identity governance

Speakers

– Upasana Hembram
– Vagisha Srivastava
– Dr. Milton Mueller

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


The FCC initially considered requiring RPKI among Internet service providers but ultimately backed off due to lack of authority


Explanation

Despite representing different perspectives (foundation, academic research, and policy analysis), all speakers converge on the view that regulatory approaches alone are insufficient for effective digital identity governance, requiring broader stakeholder engagement and practical implementation considerations


Topics

Digital identities | Legal and regulatory


Overall assessment

Summary

The speakers demonstrate strong consensus on the fundamental importance of digital identity systems as critical infrastructure, the need for multi-stakeholder governance approaches, and the limitations of purely regulatory solutions. They agree on the complexity of governance challenges and the need for balanced approaches between different authority models.


Consensus level

High level of consensus on core principles and challenges, with complementary rather than conflicting perspectives. This suggests a mature understanding of digital identity governance issues across different stakeholder communities, which could facilitate collaborative approaches to addressing the identified challenges in policy development and implementation.


Differences

Different viewpoints

Top-down vs. Bottom-up Governance Approaches

Speakers

– Upasana Hembram
– Vagisha Srivastava

Arguments

Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than solely on laws and regulations


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Summary

Hembram advocates for multi-stakeholder, bottom-up governance models, while Srivastava presents LEIs as an example of successful top-down regulatory approach, though she notes challenges with this model


Topics

Digital identities | Legal and regulatory


Unexpected differences

Effectiveness of Regulatory Mandates

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Multiple initiatives are rapidly developing across Africa including World Bank’s ID for Development project and African Union’s digital transformation strategy


Explanation

Srivastava’s research shows that regulatory mandates alone are insufficient (citing LEI certificate lapses), while Akinmoyeje presents multiple regulatory initiatives as positive developments, creating an implicit tension about the effectiveness of regulatory approaches


Topics

Digital identities | Legal and regulatory | Development


Overall assessment

Summary

The discussion reveals subtle tensions between different governance philosophies – top-down regulatory approaches versus bottom-up technical community governance, and questions about the effectiveness of mandatory systems versus incentive-based approaches


Disagreement level

Low to moderate disagreement level. This was primarily a research presentation rather than a debate, so disagreements are more implicit and philosophical rather than direct confrontations. The implications suggest ongoing challenges in finding the right balance between regulatory oversight and technical community self-governance in digital identity systems


Partial agreements

Partial agreements

Similar viewpoints

Both speakers recognize the tension between top-down governmental/regulatory approaches and bottom-up technical community governance in digital identity systems, highlighting different models of authority and control

Speakers

– Dr. Milton Mueller
– Vagisha Srivastava

Arguments

There are clashes between government power and Internet community self-governance, as seen in the European Commission’s intervention in web authentication


LEIs represent a unique top-down approach created by the FSB and G20, unlike technical community bottom-up systems


Topics

Digital identities | Legal and regulatory


Both speakers identify implementation challenges in digital identity systems, emphasizing that successful deployment requires more than just regulatory mandates and must address practical issues like user incentives and system compatibility

Speakers

– Vagisha Srivastava
– Benjamin Akinmoyeje

Arguments

Global standards need regulatory pressure, user incentives, and infrastructural integration to remain effective


Interoperability remains a major concern as different countries work with different vendors for ID systems


Topics

Digital identities | Development


Takeaways

Key takeaways

Digital identity systems are fundamental infrastructure that should be viewed as instruments of public trust rather than mere background technologies


Cyberspace is fundamentally changing authority relationships, creating new questions about trust and governance between government power and Internet community self-governance


The research project will examine three specific identifier systems (WebPKI, LEI, and RPKI) to understand how private organizations and government agencies interact in global digital identity governance


Legal Entity Identifiers (LEIs) demonstrate that global standards require not just regulatory pressure but also user incentives and infrastructural integration to remain effective


Africa faces significant digital identity challenges with over 500 million people lacking verifiable legal IDs, while multiple rapid development initiatives are creating interoperability concerns


Future Internet governance should be built through open, multi-stakeholder models that reflect public interest rather than relying solely on laws and regulations


Resolutions and action items

The Internet Society Foundation has funded the Internet Governance Project at Georgia Tech to conduct research on digital identity governance


The research team will examine specific case studies including the FCC’s RPKI proceeding and the European Commission’s intervention in web authentication


Vagisha Srivastava and Karim Farhat will focus on researching Legal Entity Identifiers (LEI) systems


Benjamin Akinmoyeje will provide perspective on digital identifier policy from the African/Global South context


Unresolved issues

The fundamental question of where authority should reside in digital identity systems remains unresolved


Interoperability challenges across different national digital identity systems, particularly in Africa where different countries work with different vendors


The problem of lapsed LEI certificates where financial organizations lack incentives to renew, leading to outdated verification information


How to balance government regulatory authority with Internet community self-governance in digital identity systems


The effectiveness and implementation speed of RPKI as a method for ensuring routing security


Suggested compromises

N


o


n


e


i


d


e


n


t


i


f


i


e


d


Thought provoking comments

In cyberspace, you simply do not know what these things are without some kind of a identification and authentication system… the interesting thing about cyberspace is that it is changing the authority relationships in new ways. So where does the authority reside? Who can you trust when you’re authenticating online identity?

Speaker

Dr. Milton Mueller


Reason

This comment reframes digital identity from a technical problem to a fundamental question of power and authority. It highlights that digital identity systems aren’t just about verification but about who gets to decide what constitutes legitimate identity – a deeply political question that challenges traditional notions of sovereignty and control.


Impact

This framing established the conceptual foundation for the entire discussion, shifting it from technical implementation details to governance implications. It set up the tension between traditional authority structures and new digital power dynamics that would be explored through each case study.


LEIs in our case reveal something very important which is global standards need not just regulatory pressure but user incentives and infrastructural integration for them to keep on going

Speaker

Vagisha Srivastava


Reason

This insight challenges the assumption that top-down regulatory mandates are sufficient for successful digital identity systems. It reveals a critical gap between policy intention and practical implementation, highlighting that compliance alone doesn’t ensure system sustainability or effectiveness.


Impact

This observation introduced a crucial dimension to the discussion – the difference between mandated adoption and meaningful, sustained use. It shifted the conversation from focusing solely on governance structures to considering the practical incentives and infrastructure needed for digital identity systems to actually work in practice.


The digital identity system, despite the emerging lack of trust in today’s digital world, happens to be an understudied area of Internet governance, but it has deep implications for privacy, security, and trust in today’s Internet economy

Speaker

Upasana Hembram


Reason

This comment identifies a significant research gap while simultaneously highlighting the paradox that as trust becomes more critical online, the systems that enable that trust remain poorly understood from a governance perspective. It positions digital identity as foundational infrastructure rather than background technology.


Impact

This framing justified the research project’s importance and established digital identity systems as deserving serious academic and policy attention. It elevated the discussion from technical implementation to strategic Internet governance, setting the stage for examining how these systems shape broader digital interactions.


Statistics show that over 500 million people are yet to have some form of verifiable identity, legal IDs that they can build access to… but the major concern is interoperability of this framework, because different countries talking to different vendors

Speaker

Benjamin Akinmoyeje


Reason

This comment brings a crucial Global South perspective that highlights how digital identity governance isn’t just about managing existing systems but about inclusion and access. It reveals how fragmented approaches to digital identity can perpetuate rather than solve exclusion problems.


Impact

This intervention broadened the discussion beyond the technical governance of established systems to include questions of digital inclusion and the risks of creating incompatible identity silos. It added urgency to the governance questions by showing real-world consequences of poor coordination in digital identity systems.


Overall assessment

These key comments collectively transformed what could have been a narrow technical discussion into a comprehensive examination of power, authority, and inclusion in digital identity governance. Mueller’s framing of authority relationships established the theoretical foundation, while Srivastava’s insight about the gap between regulation and implementation added practical nuance. Hembram’s identification of the research gap legitimized the inquiry’s importance, and Akinmoyeje’s Global South perspective ensured the discussion remained grounded in real-world implications for digital inclusion. Together, these comments shaped a discussion that moved fluidly between theoretical governance questions and practical implementation challenges, demonstrating how digital identity systems sit at the intersection of technology, policy, and social equity.


Follow-up questions

How quickly is RPKI being implemented and how effective is it as a method of ensuring routing security?

Speaker

Dr. Milton Mueller


Explanation

This was identified as a controversial topic that interests the research team, particularly regarding the speed of implementation and effectiveness of RPKI for routing security


What is the degree to which governments get involved in either requiring or using RPKI?

Speaker

Dr. Milton Mueller


Explanation

This represents a key research focus on the intersection of government authority and technical infrastructure governance


Why don’t financial organizations have incentives to keep renewing their LEI certificates, leading to lapsed information?

Speaker

Vagisha Srivastava


Explanation

This addresses a critical problem where the lack of renewal incentives undermines the verification and authentication purpose of LEIs


How can global standards achieve not just regulatory pressure but also user incentives and infrastructural integration for sustainability?

Speaker

Vagisha Srivastava


Explanation

This emerged as a key finding from the LEI case study about what’s needed for global digital identity standards to be successful long-term


How can interoperability be achieved across different African countries’ digital identity frameworks when they’re working with different vendors?

Speaker

Benjamin Akinmoyeje


Explanation

This represents a major concern for digital identity implementation across Africa, where different countries are adopting different technical solutions that may not work together


What are the detailed outcomes and implications of the political clash between the European Commission’s eIDAS system and existing browser-based trust hierarchies?

Speaker

Dr. Milton Mueller


Explanation

This was mentioned as an area the research will examine in detail, representing a significant conflict between government power and Internet community self-governance


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Open Forum #17 AI Regulation Insights From Parliaments

Open Forum #17 AI Regulation Insights From Parliaments

Session at a glance

Summary

This discussion focused on AI regulation from a parliamentary perspective, featuring representatives from the European Union, Egypt, and Uruguay discussing their respective approaches to governing artificial intelligence. The panel was moderated by Arda Gerkens and organized by the Inter-Parliamentary Union, which has been actively tracking AI policy developments across 37 parliaments and recently adopted a resolution on AI’s impact on democracy and human rights.


Axel Voss from the European Parliament explained that the EU AI Act, completed in 2024, primarily focuses on high-risk AI systems including biometric identification, critical infrastructure, education, employment, law enforcement, and democratic processes. He emphasized the need for unified interpretation across EU member states and warned that democratic legislators are often too slow to keep pace with technological developments. Amira Saber from Egypt’s Parliament described introducing the first AI governance bill in her country, emphasizing the importance of data classification, ethical considerations, and balancing innovation with regulation. She highlighted the weaponization of AI in regional conflicts and stressed the need for extensive capacity building among parliamentarians.


Rodrigo Goni Romero from Uruguay outlined his country’s cautious approach, preferring to establish a general legal framework while observing developments in larger jurisdictions before implementing detailed regulations. Multiple participants emphasized the challenge of balancing innovation incentives with necessary protections, particularly regarding deepfakes, misinformation, and the exploitation of vulnerable populations. The discussion revealed common themes across different regions: the need for parliamentary capacity building, multi-stakeholder approaches, youth engagement, and flexible regulatory frameworks that can adapt to rapidly evolving technology while maintaining strong ethical foundations and human rights protections.


Keypoints

## Major Discussion Points:


– **Current State of AI Regulation Across Different Regions**: The panel discussed varying approaches to AI regulation, with the EU having completed the AI Act focusing on high-risk systems, Egypt developing national AI strategy and draft legislation with emphasis on data classification and ethical considerations, and Uruguay taking a slower, consensus-based approach with general legal frameworks to avoid deterring investment.


– **Balancing Innovation with Regulation**: A central theme throughout the discussion was the challenge of creating regulatory frameworks that protect citizens from AI risks while still encouraging private sector investment and technological advancement. Panelists emphasized the need to incentivize AI development in crucial sectors like healthcare, education, and agriculture.


– **Implementation Challenges and Regulatory Bodies**: Participants raised critical questions about which entities should enforce AI regulations, noting that traditional telecommunications regulatory bodies are insufficient. The discussion highlighted the need for specialized AI governance bodies with proper authority and the challenge of creating enforceable regulations that hold up in courts.


– **Global Coordination vs. Local Adaptation**: The conversation addressed the tension between AI being a global technology requiring international coordination and the need for country-specific regulations that reflect local contexts, cultural norms, and institutional capabilities. Participants noted the lack of international AI law similar to cybersecurity frameworks.


– **Capacity Building and Education**: All panelists emphasized the critical importance of educating parliamentarians, policymakers, and citizens about AI technologies. They stressed that effective regulation requires deep understanding of the technology being regulated, and highlighted the need for continuous learning as AI rapidly evolves.


## Overall Purpose:


The discussion aimed to examine the role of parliaments in AI regulation and governance, sharing experiences and best practices across different countries and regions. The forum sought to address practical challenges parliamentarians face when developing AI legislation and to explore how democratic institutions can effectively govern rapidly evolving AI technologies while protecting human rights and promoting innovation.


## Overall Tone:


The discussion maintained a collaborative and constructive tone throughout, with participants openly sharing challenges and learning from each other’s experiences. The tone was serious and urgent, reflecting the gravity of AI’s impact on society, but remained optimistic about finding solutions through international cooperation and knowledge sharing. There was a notable shift toward more technical and practical concerns as the discussion progressed, with audience questions bringing focus to specific implementation challenges, enforcement mechanisms, and real-world harms that need immediate attention.


Speakers

**Speakers from the provided list:**


– **Arda Gerkens**: Moderator of the open forum on AI regulation and parliaments


– **Axel Voss**: German lawyer and politician from the Christian Democratic Union of Germany (CDU), Member of the European Parliament since 2009, Coordinator of the People’s Party Group in the Committee of Legal Affairs (2017), Shadow rapporteur on the AI Act, focuses on digital and legal topics


– **Amira Saber**: Egyptian Member of Parliament, Secretary General of the Foreign Relations Committee, National winner of the 2025 Study UK Alumni Awards (social action category), Alumni of the University of Sussex, Policy leader advocating for climate action, AI governance and youth empowerment, Part of ABNIC (African Parliamentary Network on Internet Governance)


– **Rodrigo Goni Romero**: Politician from Uruguay, Member of Partido Nacional, Represents the department of Salto, President of the Committee of the Future of the Parliament, Engaged with AI and democracy


– **Sarah Lister**: Co-director of governance, peace building and rule of law hub at UNDP, Provided closing remarks


– **Hossam Elgamal**: Private sector representative from Africa, MAG (Multistakeholder Advisory Group) member for four years


– **Yasmin Al Douri**: Co-founder and consultant at the Responsible Technology Hub (first European-led, youth-led non-profit focusing on bringing youth voice to responsible technology policy)


– **Meredith Veit**: Public work and human rights researcher with the Business and Human Rights Resource Center


– **Mounir Sorour**: From Bahrain


**Additional speakers:**


– **Participant** (Ali from Bahrain Shura Council): Mentioned that Bahrain drafted and approved the first AI regulatory law


– **Participant** (unnamed): Made comments about simplifying AI laws and keeping frameworks flexible


– **Participant** (unnamed): Discussed exploitation of children through internet and AI, published article on Ahram Center for Political and Strategic Studies about recruitment of children in extremism through AI and gaming


– **Andy Richardson**: IPU staff member mentioned as contact for AI tracking activities (referenced but did not speak)


Full session report

# Parliamentary Perspectives on AI Regulation: A Comprehensive Discussion Summary


## Introduction and Context


This discussion, moderated by Arda Gerkens, was held as part of the Internet Governance Forum (IGF) and brought together parliamentarians and stakeholders from across the globe to examine the critical role of parliaments in artificial intelligence regulation and governance. The forum was organised by the Inter-Parliamentary Union (IPU), which has been actively developing AI governance initiatives including an October 2024 resolution on AI’s impact on democracy, human rights, and the rule of law.


The IPU announced several concrete initiatives during the discussion: a monthly tracker starting February 2025 covering AI policy developments across 37 parliaments, and an upcoming November 28-30 event organised with Malaysia’s Parliament, UNDP, and the Commonwealth Parliamentary Association. The discussion featured representatives from the European Union, Egypt, Uruguay, and Bahrain, alongside civil society organisations, private sector representatives, and youth advocates, creating a multi-stakeholder dialogue on AI governance challenges.


## Current State of AI Regulation Across Different Regions


### European Union Approach


Axel Voss, representing the European Parliament as a CDU member and shadow rapporteur on the AI Act, provided insights into the EU’s comprehensive approach to AI regulation. The EU AI Act was completed “at the end of last Monday, so in 2024,” representing one of the world’s most ambitious attempts at regulating artificial intelligence through a risk-based approach.


The Act focuses on high-risk AI systems including biometric identification, critical infrastructure, education and vocational training, employment, essential private and public services, law enforcement, migration and border control management, and administration of justice and democratic processes. Voss emphasised concerns about implementation challenges, particularly the need for unified interpretation across EU member states to avoid the confusion experienced with GDPR.


Voss noted ongoing discussions about potentially postponing certain requirements, indicating implementation challenges even for completed legislation. He argued that “the democratic legislator is too slow for the technology developments” and advocated for framework-based approaches rather than detailed technical regulations, calling for legislators to “reduce our normal behaviour” and provide solutions within three months.


### Egyptian National Strategy


Amira Saber, representing Egypt’s Parliament as Secretary General of the Foreign Relations Committee, described her country’s efforts in developing AI governance frameworks. Egypt has developed a national AI strategy, and Saber introduced the first parliamentary draft bill on AI governance in the country, emphasising data classification and ethical considerations as foundational elements.


Saber highlighted the weaponisation of AI in regional conflicts, particularly referencing increased civilian casualties in Gaza due to AI-enhanced military systems. She stressed that “there is no one safe until everyone is safe,” connecting AI governance to broader questions of global security and collective responsibility, drawing parallels to lessons learned from the COVID-19 pandemic.


Her approach emphasises data classification as a prerequisite for effective AI regulation, treating national data as a valuable asset requiring protection and accountability measures. She described Egypt’s establishment of a Supreme Council on Artificial Intelligence and emphasised the need for these bodies to have authority to hold governmental entities accountable.


### Uruguay’s Cautious Consensus Approach


Rodrigo Goni Romero, representing Uruguay’s Parliament as President of the Committee of the Future, outlined his country’s deliberately cautious approach to AI regulation. Uruguay has chosen to establish general legal frameworks whilst observing developments in larger jurisdictions, with Goni Romero explicitly stating that Uruguay prefers to “go slow” and learn from others’ experiences.


This approach prioritises consensus-building and stakeholder engagement over rapid regulatory development, reflecting practical considerations about limited regulatory resources and the need to avoid deterring investment whilst ensuring appropriate oversight. Uruguay also emphasises preparation for AI’s impact on employment through capacity building and training programmes.


### Bahrain’s Regulatory Innovation


A participant from Bahrain’s Shura Council noted that Bahrain has drafted and approved what they described as “the first AI regulator law,” using the EU Act as a benchmark but making it simpler and more streamlined. This contribution highlighted how smaller nations can sometimes move more quickly than larger jurisdictions in developing AI governance frameworks.


## Key Challenges and Debates


### Balancing Innovation with Regulation


Throughout the discussion, the tension between promoting innovation and ensuring adequate protection emerged as a critical challenge. Amira Saber articulated this clearly, emphasising the need to avoid hindering investment whilst ensuring ethical AI use, particularly in sectors such as healthcare, education, and agriculture.


The challenge is particularly acute for developing countries that depend on foreign investment and technology transfer for AI development. Different speakers proposed various approaches to achieving this balance, from Egypt’s emphasis on clear ethical guidelines and data classification to Uruguay’s consensus-based approach and the EU’s comprehensive risk-based framework.


### Implementation and Institutional Capacity


Hossam Elgamal, representing the private sector perspective from Africa, raised critical questions about which entities should enforce AI regulations, noting that traditional telecommunications regulatory bodies are insufficient for comprehensive digital society regulation. He observed that “AI is global, it is not local,” highlighting the mismatch between global technology and national regulatory frameworks.


This institutional gap represents a fundamental challenge, as many countries lack the specialised regulatory bodies needed for effective AI oversight. The discussion revealed that creating effective regulation requires not only appropriate laws but also the institutional capacity to implement and enforce them.


### Democratic Processes and Technological Speed


A significant tension emerged between Axel Voss’s advocacy for faster legislative processes and Rodrigo Goni Romero’s preference for slower, consensus-based approaches. Voss argued that democratic legislators must accelerate their processes to keep pace with technology, whilst Goni Romero defended deliberative approaches that build stakeholder consensus.


This disagreement reflects fundamental differences in regulatory philosophy and the particular challenges faced by different types of countries in the global AI governance landscape.


## Human Rights and Social Impact


### Immediate Harms and Vulnerable Populations


Amira Saber provided vivid examples of AI’s immediate harms, particularly describing deepfake threats to women in conservative communities where AI-generated pornographic content could result in death threats. This powerful illustration demonstrated how AI risks intersect with existing social inequalities and cultural contexts in potentially fatal ways.


The discussion also addressed child exploitation through AI-powered platforms, with one participant describing how gaming platforms are being used for recruitment into extremism and radicalisation. These examples highlighted the urgent need for AI governance frameworks that address current harms rather than focusing solely on potential future benefits.


Meredith Veit, representing the Business and Human Rights Resource Centre, emphasised the importance of addressing actual harms happening now rather than being distracted by industry narratives about potential benefits, highlighting the need to maintain focus on protecting vulnerable populations.


### Generational Perspectives and Assumptions


One of the most significant moments occurred when Yasmin Al Douri, representing youth perspectives through the Responsible Technology Hub, directly challenged assumptions about young people’s digital literacy. When Axel Voss expressed “sorrow” that youth grow up in a world where they cannot rely on what they hear or read, Al Douri responded that “young people are way better at actually seeing what is deepfake and what is not.”


This exchange highlighted broader issues about generational assumptions in policymaking and the importance of including youth voices in AI governance discussions. Al Douri observed that young people are “always deemed as not knowing specific things when we’re actually really good at specific things,” revealing how generational biases can influence policy development.


## Data Governance and Accountability


### Data Classification as Foundation


Amira Saber consistently emphasised data classification as crucial for effective AI regulation, arguing that countries must establish clear frameworks for categorising data according to sensitivity levels before implementing comprehensive AI governance systems. This approach recognises that AI systems are fundamentally dependent on data and that effective AI governance requires robust data governance frameworks.


Hossam Elgamal reinforced this perspective by noting that many countries lack proper data exchange policies needed before implementing AI regulation, highlighting how AI governance builds upon existing digital governance frameworks.


### Accountability Frameworks


The discussion revealed significant challenges in establishing clear accountability frameworks for AI systems. Saber’s question about who should be held accountable when sensitive hospital data is leaked in AI systems illustrates the complexity of assigning responsibility in AI-enabled systems involving multiple actors across development and deployment phases.


## Capacity Building and Education


### Parliamentary Education Needs


All speakers emphasised the critical importance of educating parliamentarians about AI technologies. Amira Saber noted that effective regulation requires deep understanding of the technology being regulated, describing taking courses herself to better understand AI systems.


Axel Voss acknowledged the knowledge gap among current regulators, noting that many lack sufficient technical knowledge to effectively govern AI systems. This educational challenge is compounded by the rapid pace of AI development, requiring continuous learning rather than one-time training programmes.


### Broader Stakeholder Education


The discussion highlighted the need for broader public education about AI systems and their implications. This extends to civil society organisations, private sector actors, and other stakeholders who play important roles in AI governance ecosystems, as the multi-stakeholder nature of AI governance requires that all participants have sufficient understanding to contribute meaningfully.


## International Coordination and Future Directions


### Global Cooperation Challenges


Hossam Elgamal’s observation that “AI is global, it is not local” highlighted the fundamental challenge of governing global technology through national regulatory frameworks. His comparison with cybersecurity, where international law remains underdeveloped despite decades of effort, suggests that AI governance faces similar structural challenges.


Amira Saber proposed creating an “AI policy radar” similar to climate policy tracking systems to help parliamentarians understand global regulatory developments and learn from international experiences. This represents a practical approach to enhancing international coordination without requiring formal treaty arrangements.


### IPU’s Ongoing Role


Sarah Lister, UNDP co-director, emphasised in her closing remarks that AI governance is fundamentally a governance issue, not just a technological one. The IPU’s commitment to tracking parliamentary AI activities across 37 countries provides a foundation for continued knowledge sharing, with Andy Richardson identified as the contact for parliaments wanting to be added to the tracking list.


## Conclusions


The discussion revealed both the complexity of AI governance challenges and the potential for constructive international cooperation. While significant disagreements remain about regulatory timing and approaches, there was broad recognition of the need for capacity building, multi-stakeholder engagement, and frameworks that balance innovation with protection.


Key unresolved challenges include creating appropriate institutional capacity for AI governance, developing effective international coordination mechanisms, and ensuring that regulatory frameworks can address immediate harms while promoting beneficial AI development. The emphasis on youth engagement and multi-stakeholder approaches suggests that effective AI governance will require inclusive processes that incorporate diverse perspectives and expertise.


The IPU’s ongoing initiatives, including the monthly parliamentary tracker and upcoming collaborative events, provide concrete mechanisms for continued cooperation and knowledge sharing as countries navigate these complex governance challenges.


Session transcript

Arda Gerkens: here at the open forum where we will speak about the AI regulation and get some insight from parliaments. You’re not hearing me? Closer. Of course, you have to put your headsets on. This is what the workshop is about, yeah. I’ll give you some seconds to do so. And it’s non-translation, so it’s all English, channel one. Okay, thank you so much. I’m very happy to say that we have a beautiful panel today. Mr. Axel Voss, who is a member of the European Parliament, Miss Amira Saber, who is a member of the House of Representatives of Egypt, and Mr. Gonyi from Uruguay. Before we start, I would like to point out to some of the inter-parliamentarian union activities that have already been done on AI, but also will be happening in future. First of all, in October 2024, the IPU adopted a resolution on the impact of AI on democracy, human rights, and the rule of law. So any parliamentarians in here, or people who are working for any parliament, it’s a very interesting document to look at the resolution that has been adopted in October 2024 on the impact of AI on democracy, human rights, and the rule of law. And since 2025, the beginning of 2025, February, IPU began to publish a monthly tracker that monitors which parliaments are taking action on AI policy. So that’s legislation, committee inquiries… all that tracking is done by the IPU and it currently already covers 37 parliaments. So we we want to know if any parliaments here are missing from that list. If you have activities on AI, you want to be on the tracking list, you can reach out to Mr. Andy Richardson who is sitting here at the corner in front of me and he will add you to that list. And in this year, in November 28 to 20, the 30th of November, there will be a core organized event with the Parliament of Malaysia, UNDP and the Commonwealth Parliamentarian Association and that event is the role of Parliament in shaping the future of responsible AI. This will be published so you can see more about this activity and of course we hope that many parliamentarians will attend. And today from the UNDP is also here Ms. Sarah Lister. She is a co-director of governance, peace building and rule of law hub UNDP and she will make the closing remarks for today. So she won’t be speaking until the end, it’s not because I don’t want her to speak, it’s just because she’s going to listen and then conclude at the end. Okay, that’s for the normal remarks in the beginning. I would like to ask Mr. Axel Vos who is a German lawyer and he’s also a politician from the CDU, the Christian Democratic Union of Germany. He’s actually been serving as a member of the European Parliament since 2009 and you have been a coordinator of the People’s Party Group in the Committee of Legal Affairs in 2017 and you have been focusing your work on digital and legal topics, one of them being the shadow rapporteur on the AI Act. What is the current state of play with regard to AI regulation in Germany? the European Union.


Axel Voss: So, thanks a lot, and also thanks for the invitation and having me here. The situation is as follows. We’ve finished the whole AI Act, yeah, let’s say at the end of last Monday, so in 2024, and now the transition time will pass, so we have an additional part in force at the beginning of August. There’s a kind of discussion going on that this should be postponed and so on. There’s a request also from the American or US side, and so this is one thing, but the other thing is also that our companies need probably more time in adapting these, and so there’s a discussion going on just of focusing on the high-risk AI systems, so that might be postponed. It’s not decided yet, but the discussion is there, and the situation is, of course, we are concentrating in the AI Act, especially on the high-risk systems. This is not forbidden. This is allowed, but we are asking for more requirements for the deployer and also for the system itself, and of course, then it’s quite interesting to see or to notice what is an AI high-risk system, and here we have different options in place, so at first biometrical identification, we consider this as a kind of an AI high-risk system, critical infrastructure, also education and vocational training, so also the question of employment of workers, many and also self-employment, the access and enjoyment of essential private services and benefits, law enforcement also is some of these elements, migration, asylum and border control management is considered in a majority in our house for an AI high-risk system and also administration of justice and democratic processes, also this one is considered as an AI high-risk system and this is also something the whole AI Act is delivering some general additional remarks on AI but focusing more than less on AI high-risk systems and therefore then we are trying also to install or to simplify the lives of our businesses in installing so-called sandboxes. I have still the feeling if I may add this what we shouldn’t do and this is not 100% to my satisfaction that we should have only one interpretation of these provisions of the AI Act. We haven’t done this in the data protection regulation but here in the AI Act it’s extremely important that we have in the European single market only one interpretation of everything and otherwise we will be confused and the companies will be confused and this is quite important. Well I could agree with you more and


Arda Gerkens: also handling the GDPR at sometimes it’s it’s you need to interpret it so it’s very very It’s important that we have clear definitions. I’m looking forward to your work on that. Ms. Amita Saber, you are an Egyptian member of the Parliament and you are serving as the Secretary General of the Foreign Relations Committee. Quite impressive. And you are also a national winner of the 2025 Study UK Alumni Awards, the social action category alumni of the University of Sussex. So it’s quite impressive, right? You are a policy leader, you advocate for climate action, also a very important topic, AI governments and youth empowerment while you’re leading on foreign relations and social development. We’ve just heard from Mr. Axel Vos what’s happening in the European Union, but Europe and somewhere, and maybe you can elaborate a little bit more at what’s happening in your country on AI and regulation.


Amira Saber: Yeah, thank you so much. And it’s a pleasure to be talking on this panel amid esteemed colleagues. Actually in Egypt, we already have a strategy for AI which we have relaunched this year. So there is the boundaries of the national strategy. And I introduced to the Parliament the first draft bill on AI governance, which was very luckily endorsed by 60 other Egyptian MPs. The question of to regulate or not to regulate is a very big debate all across the world. And coming to my background on social democracy, I wanted to tackle the ethical part of which. How we can guarantee that the data is well classified accordingly, how to hold the provider, the entity, the government, everyone accountable according to the sensitivity of the data. Because if it comes to AI, which is basically functioning on the data and the data providers, the national data becomes a huge asset by itself. So if, for example, the data of a hospital in a far place in Egypt is leaked. Who should I hold accountable based on this? So what I tried to do based on the EU Act, by the way, because I introduced this bill like now and a year and a quarter ago, it was March 2024. And what was there in the space back then was the EU Act as the main regulatory bill, which is in the space. And we can like frame on and discuss especially that there was a huge debate between the two big schools of the US and the EU on the regulation. Because when you regulate, there is a constraint somehow on technologies advancement on investing in like crazy innovative ideas, because this might hold you accountable. And accordingly, you may pay fines, this will be a financial burden. So how to balance the innovation and incentivize the private sector to invest? Because we need the AI investments in healthcare in my country to a big deal. We need it in education, we need it in agriculture. And since our esteemed attendees today, many of which are parliamentarians, I’m not just talking about the legislative part of which I’m talking about the scrutinizing part as well. Because here comes the importance of capacitating parliamentarians. If you capacitate and educate parliamentarians on how they can use their tools to ask the different ministries, how they use the AI technologies in the different sectors to advance the work, to benefit as much as we can, the people in their country, this matters a lot. So the basic thing, which I am concerned with also is raising the awareness of the parliamentarians in my country and across the region. Actually, I’m also part of ABNIC, it’s the African Parliamentary Network on Internet Governance, an excellent African network which tries to raise the all the time, the knowledge and the exchange of experiences when it comes to data governance. So again, educate and capacitate, this is crucial. And then we discuss how it worked, because what works for Egypt definitely couldn’t work for other countries and vice versa, but there are experiences which we could always learn from and develop. So actually right away as well, there is another bill which is under progress. It could be governmental, because in Egypt we have the bills either introduced from the parliamentarians or from the government. So actually to my knowledge, there is a very big coordination, a very fruitful one between the Ministry of ICT and the Ministry of Judiciary, the Ministry which is actually concerned with judiciary, to coordinate between each other, how can they release a draft bill or how can they introduce a bill on AI governance. So the question of regulation for me, my priorities of which is how we can make it ethical, how we can focus on the sectors that matters, must and top, and how can we also incentivize the private sector, because my bill has certain incentives to get the private sector interest to invest in certain sectors actually on top of which are the ones which I prioritized during my talk now. So it’s a continuous learning process, but very honestly, after we have seen in the Middle East recently and the political consequences of the usage of AI when it is weaponized, because it has been weaponized recently in the war on Gaza, it has weaponized recently in the different wars in the region, this brings attention much more to how important the regulators, the policy makers, everyone who is a decision maker should be very much aware and capacitated on how. this develops touching the lives of thousands of people. There have been lots of reports circulating that when the IDF uses AI on the war in Gaza, this actually has raised the casualties of civilians being dead. So again, the question is political, the question is social, the question is on every aspect of how AI governance today is one of the most things which affects every aspect of our lives, no matter where we are.


Arda Gerkens: Well, this is a very warm way of saying that, the fact that AI has on our lives and especially in your region. And it’s very good to hear that you’re also there giving advice to other countries in your region and region. So maybe if there’s any parliamentarian here who would like to speak to Amira afterwards and get some advice, please make use of her. And in the meanwhile, I would like to, I hope you can hear me well, because my, okay, and it’s my headphones that not working well. Mr. Rodrigo Coño Romero, you are a politician from Uruguay. From Uruguay. And you belong to the Partido Nacional and you represent the department of Salto, right? Yes. Yes, and you have been engaged with AI and democracy. And also you have highlighted the importance of getting the parliaments in the debate on AI. You think that’s very important. Can you tell me what’s happening with the regulation on AI in your country?


Rodrigo Goni Romero: Yes. As Uruguay is a very small country in South America between biggest, big country, Argentina and Brazil, we are prioritized to be open to investment and focusing promoting, investing in AI. So in Uruguay and in neither country in Latin America have approved a law, an AI law as European Act, but in many countries there are many hundreds and hundreds of drafts. In Uruguay no, in Uruguay we prefer have passed a legal framework approved by all parties which self mandate us to develop regulation with the participation of all sectors and basis of consensus. Like I try to avoid to to do a bad signal for the investment so just approve a very very general legal framework that well we we started running to all stakeholders, academia, companies, technological companies and to develop the process very slow. I prefer go slow. I prefer observe that that they happen in Europe and US and maybe a bigger country like Brazil for


Arda Gerkens: example. Thank you very much. It’s interesting to hear that both of you also highlight the importance of having investment on AI and the dangers that you have. infringing on that investment when you have regulation maybe Axel you can tell a little bit about what progress has been achieved and do you see as apart from this challenges and risks with the AI regulation so we have to be aware


Axel Voss: that the digital future means that everything is more transparent is circular and also digital and this brings us all as a legislator under extreme pressure because it’s a challenge now to adapt the online world to the offline world somehow or vice versa and this of course what we are connecting with AI this is the fundament probably of everything else what is coming next so that’s why it is important to have kind of a frame how far you can go and what might not be part of AI systems so what is forbidden what is high risk and what is low risk and so on and so also there is a kind of a fear for shifting power from humans to machines so that’s why also we need to face these and there’s a thin line only between good purposes and bad purposes so that’s why we have the abilities with AI in widening our human abilities on the one hand side and organizational of societal possibilities the meaning of AI for health and climate change energy traffic administration security education future orientated research this is all what we have in mind that what we should go for And that’s why I would say there are a lot of challenges of having advantages also in using AI. On the other hand, of course, we are facing also a lot of risks because of this thin line. There is a risk for democracies, once again, this fear of loss of control. Then we are facing these arguments of surveillance machines, conspiracies, theories. There might be not an exchange of views and arguments any longer. What is then anti-democratic? The manipulation of the public opinions. This is also something fake news, disinformation for destabilizing countries. So, hurdles of attacking free and democracies and freedom is lower. So, even especially for the young people or youth generation, I would say it’s hard to differentiate what is real and what is not real. So, they can’t trust any longer what they are reading, seeing or hearing. So, that’s why this is a kind of a risk situation. You need to bring this somehow in a balancing situation that you are focusing on these advantages, what you can gain out of it and trying to reduce risks also. And this is what we are trying to do. Thank you, Axel.


Arda Gerkens: You just mentioned that for youth it’s hard to know what’s real, but maybe I’m not youth anymore. Sometimes I also feel it’s hard to know what’s real and what’s not. Amira, can you tell, do you also recognize that? What risks and challenges do you see?


Amira Saber: Absolutely. Actually, one of the biggest challenges is deepfake. Because deepfake is not just about how it affects the political space when it comes to elections and electoral campaigns and the manipulation of some political systems. It comes to everyone’s life, especially in some closed communities or communities which are still having their own strict cultural frameworks. Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed. And actually there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake. So this is affecting everyone’s life. You can ruin someone, you can ruin his life, his career, her life, her career, based on deepfake images, deepfake videos. And now, even during the war, the war in Iran, which is just a few days ago, we were doomed. Everyone was doomed with a massive amount of media, videos, photos, news, with a very fine line on how to verify this is true or not. So in today’s world, what we thought that it would more of empower us towards knowledge and towards edging this knowledge is actually questioning the amount of feeds which we have. Is it true or not? And this again brings a big, important question of how do we verify? And this also applies to education. How do a professor verifies that a certain research is AI generated or it’s done by the personal work of the student? So what is happening now is that I see also developments. on many levels when it comes to the models verification and when it comes to the content verification, is it AI generated or not? And this is why I say all the time, educate, educate, educate, capacitate, capacitate, capacitate. For politicians, for policymakers, and for the people, for everyone. Because it’s a multi-stakeholder thing. Because it’s a multi-stakeholder thing with all the parties involved in the development on this process. Everyone’s life is touched and is altered. And you can’t keep just away from it. However, whatever trials you are exerting in that track, you can’t. It’s embedded in your life. And the good thing now is that the ethical questions are being graced on every international table. I usually hear about different strategies that are now trying to regulate and to have a bold framing, which consequently have some legal responsibilities. If you are dealing with a classified data or you’re dealing with data that is of high risk, this should have immediately a kind of legal liability. Otherwise, it’s a case because it’s already a case which we really need to, it’s a case which is touching everyone’s life, which we really need to regulate. In my country and in my region, the beautiful thing is that there are thousands, I can say millions of young people who are very enthusiastic to get to learn all about AI. I myself, before developing the draftable, I went through different courses, crash ones. I had interviews, definitely because you can’t regulate something which you don’t know. Really good. At least. Take an example of what she did. Very good. You should have a deep dive. Actually, now I can’t pass a day without using at least three apps of AI, at least in my daily work. And it helps a lot. This is the beautiful face of it. But every coin has another side. And this other side, which we as regulators and decision makers should look at thoroughly. We should maximize the benefits of this technology, and we should also look at the risks. And in countries like mine and other countries, in even a position which is having stressful economic situations, the question of AI is the question of electricity, is the question of infrastructure, is a question of capacity building. So the divide is there. I don’t usually like to speak this language, but there is a divide which we all should cross, because this motto, if anyone remembers which of the SDGs, leaving no one behind, we just, you know, we just didn’t remember well as humans the lesson of COVID, when we stated that there is no one safe until everyone is safe. We just forgot about that. This applies to everything else. It applies to AI. There is no one safe until everyone is safe, and we have a responsibility to make it a safe space as possible, because definitely it’s going to be manipulated all the time for different purposes, for different reasons, politically and otherwise. But the real responsibility here is how to make it safe as much as possible. And the good news also is that countries in my region, like Saudi Arabia or UAE or Qatar, they are having a huge potential, like in my country, of young people who are eager to learn, who are eager to get even ahead of the curve of too many competitive setups and environments, which is really appreciated. And I always say that the private sector and the UN agencies have a huge duty to capacitate as much as possible and to get investors to highlight these important tracks, which touches everyone’s life.


Arda Gerkens: Well, thank you very much. I see there’s a question. If you hold on one second, sir, because I would like to pose a question to Mr. Rodrigo and then afterwards I will give the floor to you. So, please go ahead. I was talking about the progress and the challenges and the risks.


Rodrigo Goni Romero: Yes, we are focusing on developing a national strategy of AI to try to involve all the society in the risk, in the challenge, and very focused on capacity. I am the president of the Committee of the Future of the Parliament and I try to awareness to the people the risk of the future of the job. So, we put focus in prepare, capacity. I have to recognize in many perspectives that artificial intelligence have many risks to the job, many changes. So, we have to prepare. There is no magic way to face this risk. Just capacity, capacity, capacity. But many people don’t know about the risk. So, I think it’s our duty of the Parliament to awareness, to ask to prepare and to facilitate the program. Not just to the children, not just to the school, also to the worker. So, we are focusing this.


Arda Gerkens: Very good, thank you very much. The floor, please could you state your name and then your question.


Hossam Elgamal: Yes, my name is Hossam El Gamal. I’m private sector from Africa and I’m a MAG member. I have been MAG member for four years. Well, coming back, AI has been swiftly coming, and in fact it increased a lot the digital gap. We are facing power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability within the AI that would then build capacity for others as well. Many countries are working on building capacity, which is good, putting some strategy is good. But let me just ask a few questions for you to think about and answer. One thing is, what is the regulatory body that will implement? We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation. And going to AI and putting regulation for AI, who is going to implement the regulation? So we need along with building AI regulation to start thinking about the regulator and how we are going to do it. So to incentivize people to work in AI, but at the same time to put limitation to misuse of AI. Now second thing is, AI is global, it is not local, and same as cyber security. Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI, each country will try to start having its own regulation. But how we are going to implement it globally? Because generally data that will be used, whether fake or right. will be a global one. So again, international regulation, how is it going to handle this? And finally, a lot of countries in the South especially, in addition of lacking the power, they did not implement yet data exchange policy. So we need first to pass this point in order to be able to go to the next one. Thank you very much.


Arda Gerkens: Thank you very much. We will take one more question please, yes.


Participant: Thank you so much. My name is Ali from Bahrain Shura Council and I believe that Bahrain have drafted the first and got approved the first AI regulator, sorry, law for regulating the use of AI. We managed to do a framework that it combined a balance, which is that was the challenge between investors, getting investors and believe pushing the innovation and how to regulate the bad side of the use of the AI. But my question, I see in the neighbor’s country like Dubai and Saudi Arabia, like Dubai maybe they have a ministry of AI there currently. I think they are implementing also putting a member, an AI member in the parliament, but I don’t see them that they are regulating the AI. Are we doing a step forward, are we doing it ahead or is it we have to slow down on regulating the thing? That’s the question. Thank you.


Arda Gerkens: And the last question and then we’ll answer them all together because they are very much alike.


Yasmin Al Douri: I’ll keep it short. Good afternoon. My name is Yasmin Aldouri. I’m a co-founder and consultant at the Responsible Technology Hub. We’re actually the first European-led, youth-led non-profit that focuses on bringing the youth voice to responsible technology in the area of policy as well. my question is focused actually on Mr. Axel Voss. So your municipality is actually my hometown, so I’m really happy to see you, but also I had to think a little bit when you said that young people do not really understand or cannot really distinguish between news that might be disinformation or misinformation or can’t distinguish between deepfakes and I would definitely disagree specifically on my work with young people. I would even state that young people are way better at actually seeing what is deepfake and what is not and this shows a little bit the issue that we’re generally facing as a young generation. We are always deemed as not knowing specific things when we’re actually really good at specific things. So my question to you specifically for Europe is how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming? Thank you.


Arda Gerkens: Well very good questions all of them. I actually would like to give Amira first the floor on you know the the question of what regulatory body who is capable of enough of implementing this and also because you’re from the region for some very good points made by behind and it and also it’s it’s a global problem right so how do we make sure that legislation in one country has the same effect in the other and maybe we don’t want to have the same effect so how do you go about with this as a as a parliamentarian? First when it comes to


Amira Saber: the very important question from Mr. Hossam that was a challenge for me but in Egypt actually have recently a body which is the Supreme Council on Artificial Intelligence. By law they didn’t have the authority to actually may I say hold the governmental entities accountable this is what I tried to do in my draft bill to to give them the authority to hold every ministry accountable. And in Egypt, it’s very much intermingled because now, as I said, the Ministry of Justice and the Ministry of ICT, they are collaborating together towards another draft bill. And actually when it comes to every other ministry, was it education, health, whatever, they have also a mandate on advancing their services with AI technologies. So who could be the body? It should be a body which is actually just, you know, having the framework, the strategy, and it should be regulating it amongst all the other players, which in my case, I see in Egypt, the Supreme Council on Artificial Intelligence is a good entity to do that. So it depends a lot on the context, it depends a lot on the institutions and on the stage and the development of these institutions according to each and every country. But in that case, that’s how I see it in Egypt. For the comment and the question of Honorable Ali, first, congratulations. It’s so good music to my ear to hear that another Arab country has walked miles in that way and road because it’s, I see, a matter of sovereignty. It’s, I see, a matter which is touching everyone’s life. So any parliamentarian trial in that track is something which I very much appreciate. And for this, allow me, Arda, to just intensify a recommendation, which I said yesterday at one of the panels that we need to have in the space a kind of a policy radar for AI. That would be extremely knowledgeable for anyone who is accessing that on the level of policymaking to know what is happening in every region, what is happening in every country, and what do they have in place and what do they have in progress. So if we have such kind of radar, there is a climate policy radar. I wish there would be an AI policy radar. Any of the entities could sponsor that and it would be of great benefit for parliamentarians and decision makers so that I know and everyone knows what is happening in other countries. So, should we slow down or this is the question to regulate or not, but let’s at least classify the data. This is what I am very much concerned with because what is not classified couldn’t be easily regulated. So we have like broader things to think about when it comes to classification and to have a legal liability based on which and the other thing is not to slow down at all when it comes to incentivizing the ministries and asking them and doing this chronitizing job of making every ministry up to using AI for the good of the people in their mandate. So it’s like depending on the context, but again, at least the data classification is one crucial thing.


Arda Gerkens: You make a very good point on the data classification and I think that also answers the question. I think it is indeed worrying that there’s a lot of legislation still needed on this data exchange and that’s something that needs to be worked upon simultaneously. I would like to ask Mr. Axel Fos the question, the excellent question, how do we make the reality of youth in the legislation? So how do we connect it? And maybe you can take another question as well because there’s been some online questions, remote questions asked. Can AI help in mitigating the social impact of child abuse and gender related inequalities? It’s kind of a heavy question, but I thought as you are very much into the AIX, maybe you can stipulate something on it. So thank you.


Axel Voss: If I may start with my friend from the Rhineland, I do not, ah, over there. So what I mentioned shouldn’t be a kind of an insult. It was more, I feel sorrow that you are growing up in a world where you are not, can’t rely on something, what is saying or what you’re hearing or what you’re reading. So this is, so I grew up in a different century. So that’s why I would say it was more easy for me to find trust in. some of these elements. But the question of course is the now active regulators probably do not have the knowledge in a way in really understanding what’s going on. And probably sometimes I have the feeling the politicians might be a bigger problem than the technology because we are hindering sometimes some elements and especially if you’re dealing with digital laws then all of a sudden you have a totally different context instead of online laws. So that’s why it’s difficult. I hope that every parliament has someone dealing with these who is understanding a bit more than the average politician. Also if we are coming to this point and saying oh yes digital is very important and we need to develop something then probably nobody knows what to do. So that’s why we need to come forward with it and also to the others. The problem is so I speak for the European Union the democratic legislator is too slow for the technology developments. And so we are always behind. That’s why I’m I would, we can face this problem a bit more if we are saying we need to reduce the normal behavior of a democratic legislator. So meaning there should be a kind of a solution in place after three months. And otherwise we are losing track of this problem and if we are once ready with a law then it might be a kind of a different problem already occurring. So, we need to be faster and we need probably not to be detailed all the time. It’s more a kind of a frame what we should have with ethical aspects or a kind of value-orientated frame and then you might have the time, as everyone knows, if I’m in the frame, everything is okay. If I’m outside the frame, you will face trouble. So this might be a kind of a better way forward. So I’m asking sometimes myself, shouldn’t we instead of focusing on all these risks and avoiding these, shouldn’t we just ask ourselves what we are expecting from AI? This is a more positive approach probably in saying what we are expecting and we do not want to see other things. So that’s why it might help in a kind of a better way. So data exchange policy, what was mentioned, or the second question? Can it help in mitigating the social impact of gender-related abuse and gender-related inequalities? Yes. I would say it can, but of course you need to have a kind of a plan in mind how to do this. I would say it’s not coming as a kind of a stereotype behavior, so no, you have to concentrate on it and also it can help everyone in mitigating these problems, I would say. But of course you need to be very careful in what are the conditions at the end in formulating these.


Arda Gerkens: So, yeah, basically it’s what I hear you say, that as a parliament you should avoid being too detailed. Yes. But make sure that you have a framework here. Also a philosopher comes to mind, Mr. Wittgenstein, who once said, if you don’t know what you’re talking about, you shouldn’t speak on it. I hear both of you say, maybe as a politician, parliamentarian, this time you should put a little extra effort in understanding AI, because it’s so important. Do you think that the parliaments now, it’s a question also from remotes, that they are kind of shaping their own AI policies, or are they just looking at what somebody else is proposing? You already said that you took the AI Act as an example. I depended on too many sources, of which, because it was in the space then as a legislation, I definitely had a deep dive on what the EU Act had. And how about you, Axel, the European Union, they started fresh, or did they look at other examples? No. There are not many examples in there. You were the first. Yeah. They were the first, yeah, but you’re the first. I followed them. You followed them. OK, so. I went to one. Right.


Axel Voss: It’s very detailed, because we are sometimes too complicated and too bureaucratic orientated, but in general, yes, it’s. So for the people who are not hearing this, Bahrain just stated that they have used, they benchmarked their law against the one of the European Commission, and they made it much more simpler. I think that’s what they tried. As a framework. Right. OK. The problem for kind of a rule of law system is at the end, and this was also mentioned with the first question, how to implement and how to enforce all these. Also, yes, the capacity might not be there. So what we are trying now to do is to build up a so-called AI office and also give guidelines and what the provisions should mean and how we might come forward. But at the end, also, you need someone in controlling. and are enforcing all these, and here we are coming to a problem, you need to have something what is also valid in front of a court. So if this is not possible, then it might be very tricky.


Arda Gerkens: You wanted to add something, Ms. Habe?


Amira Saber: Yes. One of the main tools which parliamentarians use is actually the assessment of the legislative impact. It’s still missing to a great extent to assist the legislative impact of the AI bills which are already released. So we are also challenged by the impact of these legislations. So for example, in the EU Act, can I say full mouth 100% that this didn’t affect the amount of private sector investments in the fields of high tech and AI development and that these companies went to the US, for example? It’s not accessible yet. You know, these kind of big questions, it takes time to assess. That’s why the question of regulation when it comes to AI is very challenging. You need to put the regulation now, and you need also to assess the impact, and you need to all the time amend and edit and amend and edit according to the advancement of the technologies and according to what is in place. That’s why I all the time probe the framework and the legal interventions which are regulating the basic thing, which are more towards the data classification, the rights, the ethics, the broader ones. Because when you dive deeply in the details, you get completely doomed. And this is not what the regulator should do.


Arda Gerkens: I see a lot of people nodding in what you’re saying about adding the legislation all the time. So there’s a question from the floor. And if there’s another question, you have to be at the microphone. But first from the lady. Yeah.


Meredith Veit: Hi, thank you. My name is Meredith. I’m the public work and human rights researcher with the Business and Human Rights Resource Center. And it’s really great that we’re having this panel now about AI regulation and the program. Thank you. of it and better understanding what are the impacts because there are governments even here who are touting some very problematic narratives about the dangers of clipping the wings of the potential and everything that AI can do for the benefits of society while ignoring the mountains of evidence that we have about the actual harms that are taking place now that need to be mitigated and dealt with now and justice that needs to happen now so my question from your seats and your positionality is what is needed and what hope do you have in terms of pushing back against this wave and these very problematic narratives as I mentioned in order to hold the line and keep pushing forward on all of the momentum that had been building about AI regulation for quite some time and even keeping the EU AI Act strong and making sure that the AI office is strong in its enforcement and having a really well-tuned regulatory approach that can help continue to set more standards moving


Arda Gerkens: forward thank you so much thank you and another question from behind your


Participant: honorable yeah hi actually it’s not a question just a comment on amending the law I believe the more that what we can do is to simplify the law and just to keep it to another body that they are more of more flexible because changing anything in the law it’s gonna take a long time which we cannot cope as with the developing the fast developing of the AI so this is the only thing come


Arda Gerkens: that’s a very good advice just keep the framework in the law and make sure that you have lower regulation to be able to be flexible I’m gonna take the last question here yes please


Participant: thank you for giving me the floor I’m very happy that I could have touched you especially on this topic exploitation of children through the internet and through artificial intelligence. I have just published a new article on Ahram Center for Political and Strategic Studies about this issue, how young people and children are recruited in extremism and radicalization and terrorism through artificial intelligence. And it was surprising, because I started to study and research about this topic, that they are recruiting children through the games, through the gamings. They recruit children through electronic games on the internet. It is available. So I concluded this study with some recommendations. One of the recommendations, look after your children. Don’t leave them alone with the screens. Don’t do it. They isolate them firstly, then they start to promote their own ideas and radicalization approaches. Then we find some young people doing horrible things. So one of the recommendations is awareness is very important. And the legislation, of course. Thank you. Bye bye.


Arda Gerkens: Thank you very much. And this is really the last question I’m going to take. I’m going to ask you very brief answers, because Sarah will then wrap up.


Mounir Sorour: I’m Mounir Sourour from Bahrain, I would like to thank you and thank all of you. Making regulation is very easy, but at the same time difficult, especially in AI. Because AI, we are working on open space. And every time we do something, I mean, because we are moving and we’re expanding. As Ms. Iman said, we are every time just asking, adapting to ourselves. Can we just say yes to something to be like a main framework? And we are looking for balancing, we don’t look now to make a regulation, we can’t fix a regulation, especially with AI. Can we, I mean, according to the experience of Egyptian, can we just mention what the main framework at least to minimize the risk of the AI?


Arda Gerkens: Thanks. Thank you. A very short answer from Amira first. You’re good? Axel, maybe you want to comment?


Axel Voss: Yes. So thanks for the recommendations. It’s good to hear. To Meredith, yes, so keeping the AI act strong. This is what we are trying to do, but we are in a kind of a trap. We are seeing AI and AI systems and generative AI is creating a lot of wealth. And so we are lagging behind everywhere except two big regions. And this is why we need to support these. But on the other hand, also trying to keep very strong limits and framework.


Arda Gerkens: Thank you. Thank you very much. Thank you all. I would like to give the floor to Miss Sarah Lister, who will give us her closing remarks.


Sarah Lister: Thank you very much. And as we conclude this open forum on AI regulation, I’d like to start by thanking, first of all, all the panelists, the participants, the moderator in person and online for all your insights and the questions and the commitment to inclusive rights-based governance of artificial intelligence. As a personal reflection, I am delighted that there is such a well-attended session focusing on the role of parliaments. In my experience, too often in digitalization discussions, national governance authorities and processes have been forgotten and have been brought too late to the processes. So, today’s discussion has highlighted the practical role of parliaments in ensuring that AI systems are aligned with human rights and normative principles and to ensure that no one is left behind, as the colleague from Egypt said. We have heard that parliaments are on the front lines of some of the most pressing policy issues of our time. How to protect citizens and all people while enabling innovation? And that has been a core theme that has run through our discussion this afternoon. It was raised by the colleague from Egypt and from Uruguay and from the floor. And then how do we ensure oversight in a rapidly evolving technological landscape? What type of regulatory entities do you need? How do you create governance frameworks that are grounded in human rights? And we have heard that to ensure the benefits of AI reach everyone, we must invest in the development, governance and support of responsible and ethical AI, as well as in countries’ capacities to build safe, secure and trustworthy AI systems. Parliaments are key in governing the use of global technologies and ensuring that these truly serve their public’s interests and support the achievements of the SDGs. We have heard that no single actor can shape the governance of AI alone. Effective regulation demands a multi-stakeholder approach, bringing together parliaments, executive branches, civil society, private sector and technical communities. And Uruguay talked about the consensus-based approach that takes place there. We heard from the floor and then in response about the importance of bringing youth voices to the discussions and have asked the question, how can we effectively ensure that multi-stakeholder, including young people’s, approach to this issue? The report of the Secretary General’s High-Level Advisory Body on AI and the Global Digital Compact that was signed on the margins of the General Assembly last year notes that AI governance requires addressing existing gaps in representation, coordination and implementation. Parliaments are key actors in ensuring that. At UNDP, we see AI not only as a technological issue, but as a governance one. We support countries with our partners in navigating both the governance of digitalization and digitalization for governance. And we support countries to develop their potential to transform their public services, build a more open and inclusive public sphere and enhance democratic processes and institutions. We co-host with IPU, an expert group on parliaments and digital policy to try to bring together some of these elements that people have asked for in terms of sharing experiences. And other international organizations join that expert group to help ensure that we pull together. I see that my time has passed, so I would just say once again, thank you very much for being a part of this timely and important conversation. A special thanks to the Inter-Parliamentary Union for their partnership in making this event possible and to the IGF for hosting us. Thank you very much.


A

Axel Voss

Speech speed

120 words per minute

Speech length

1669 words

Speech time

829 seconds

EU AI Act completed in 2024 with focus on high-risk systems and potential postponement discussions

Explanation

The EU has finished the AI Act by the end of 2024, with implementation beginning in August. There are ongoing discussions about potentially postponing certain aspects, particularly focusing on high-risk AI systems, due to requests from the US and companies needing more time to adapt.


Evidence

Mentions specific timeline of completion by end of 2024, implementation starting in August, requests from American/US side for postponement, and companies needing adaptation time


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws

Explanation

The democratic legislative process cannot keep pace with rapid technological developments, causing lawmakers to always be behind. A solution would be to reduce normal legislative timelines to three months and focus on ethical, value-oriented frameworks rather than detailed regulations.


Evidence

States that democratic legislator is too slow for technology developments and suggests three-month solution timeframe, mentions need for ethical aspects and value-orientated frame


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


Agreed with

– Amira Saber
– Participant
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Disagreed with

– Amira Saber

Disagreed on

Detailed vs. framework-based regulation


Regulation should focus on positive expectations from AI rather than just avoiding risks

Explanation

Instead of concentrating solely on risks and how to avoid them, legislators should take a more positive approach by defining what they expect from AI. This would create a clearer framework where anything within expectations is acceptable, and anything outside faces consequences.


Evidence

Suggests asking ‘what we are expecting from AI’ as a more positive approach rather than focusing on avoiding risks


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


Agreed with

– Amira Saber
– Rodrigo Goni Romero
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Difficulty distinguishing real from fake content affects democratic processes and public trust

Explanation

AI makes it increasingly difficult for people, especially young generations, to differentiate between real and fake content. This creates risks for democracy through manipulation of public opinion, fake news, disinformation, and destabilization of countries.


Evidence

Mentions fake news, disinformation for destabilizing countries, manipulation of public opinions, and that young people can’t trust what they’re reading, seeing or hearing


Major discussion point

Risks and Challenges of AI


Topics

Human rights | Sociocultural


Disagreed with

– Yasmin Al Douri

Disagreed on

Young people’s ability to distinguish real from fake content


Need for better understanding among regulators who may not have sufficient technical knowledge

Explanation

Politicians and regulators often lack the necessary knowledge to understand AI technology properly. This creates a situation where politicians might be a bigger problem than the technology itself, as they may hinder beneficial developments due to insufficient understanding.


Evidence

States that ‘politicians might be a bigger problem than the technology because we are hindering sometimes some elements’ and mentions that active regulators ‘do not have the knowledge in really understanding what’s going on’


Major discussion point

Capacity Building and Education


Topics

Development


Agreed with

– Amira Saber
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Requirement for enforceable regulations that are valid in court systems

Explanation

Effective AI regulation requires not just implementation mechanisms but also enforcement capabilities that can withstand legal scrutiny. The challenge lies in creating regulations that are legally sound and can be properly enforced in court systems.


Evidence

Mentions building up ‘AI office’ and giving guidelines, but emphasizes need for ‘something what is also valid in front of a court’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


AI can help mitigate child abuse and gender inequalities but requires careful planning

Explanation

AI has the potential to address social issues like child abuse and gender-related inequalities, but this won’t happen automatically. It requires deliberate planning and careful consideration of the conditions and formulation of such systems.


Evidence

States ‘it can, but of course you need to have a kind of a plan in mind how to do this’ and mentions need to be ‘very careful in what are the conditions at the end in formulating these’


Major discussion point

Human Rights and Social Impact


Topics

Human rights | Children rights


A

Amira Saber

Speech speed

156 words per minute

Speech length

2487 words

Speech time

952 seconds

Egypt has national AI strategy and first parliamentary draft bill on AI governance with focus on ethical data classification

Explanation

Egypt has relaunched its national AI strategy and introduced the first parliamentary draft bill on AI governance, endorsed by 60 MPs. The focus is on ethical aspects, data classification, and ensuring accountability for data providers and entities based on data sensitivity.


Evidence

Mentions relaunching national strategy, first draft bill endorsed by 60 Egyptian MPs, and specific focus on data classification and accountability based on data sensitivity


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory | Data governance


Need to avoid hindering investment while ensuring ethical AI use, especially in healthcare, education, and agriculture

Explanation

There’s a critical balance needed between regulation and innovation incentives. Countries need AI investments in key sectors like healthcare, education, and agriculture, so regulation must include incentives for private sector investment while maintaining ethical standards.


Evidence

Mentions specific sectors: ‘We need the AI investments in healthcare in my country to a big deal. We need it in education, we need it in agriculture’ and discusses including ‘certain incentives to get the private sector interest to invest’


Major discussion point

Balancing Innovation and Regulation


Topics

Economic | Development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities

Explanation

Deepfake technology creates severe risks beyond political manipulation, particularly threatening women in conservative cultural contexts. Fake pornographic images can lead to life-threatening situations, career destruction, and there have been actual incidents of women being killed due to deepfake content.


Evidence

Provides specific example: ‘Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed.’ Also mentions ‘there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake’


Major discussion point

Risks and Challenges of AI


Topics

Human rights | Gender rights online | Sociocultural


AI weaponization in conflicts like Gaza has increased civilian casualties, highlighting political and social implications

Explanation

AI has been weaponized in recent Middle Eastern conflicts, particularly in Gaza, leading to increased civilian casualties. This demonstrates how AI governance affects thousands of lives and has serious political and social consequences beyond technical considerations.


Evidence

States ‘There have been lots of reports circulating that when the IDF uses AI on the war in Gaza, this actually has raised the casualties of civilians being dead’ and mentions AI being ‘weaponized recently in the war on Gaza’


Major discussion point

Risks and Challenges of AI


Topics

Cybersecurity | Cyberconflict and warfare | Human rights


Parliamentarians need education on AI to effectively scrutinize government AI use across sectors

Explanation

Capacity building for parliamentarians is crucial not just for legislation but for their scrutinizing role. Educated parliamentarians can better question ministries about their AI use and ensure technology benefits citizens across different sectors.


Evidence

Emphasizes ‘capacitating parliamentarians’ and mentions using ‘their tools to ask the different ministries, how they use the AI technologies in the different sectors to advance the work, to benefit as much as we can, the people in their country’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Continuous learning and capacity building essential for politicians, policymakers, and citizens

Explanation

AI governance requires ongoing education for all stakeholders – politicians, policymakers, and the general public. This is a multi-stakeholder issue where everyone’s life is affected, making widespread capacity building essential.


Evidence

Repeatedly emphasizes ‘educate, educate, educate, capacitate, capacitate, capacitate’ and mentions taking courses herself: ‘I myself, before developing the draftable, I went through different courses, crash ones’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Rodrigo Goni Romero
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


Need for appropriate regulatory bodies with authority to hold governmental entities accountable

Explanation

Effective AI regulation requires regulatory bodies with proper authority to hold government ministries accountable. In Egypt, the Supreme Council on Artificial Intelligence exists but needs enhanced authority to regulate across all governmental entities.


Evidence

Mentions Egypt’s ‘Supreme Council on Artificial Intelligence’ and explains ‘by law they didn’t have the authority to actually may I say hold the governmental entities accountable this is what I tried to do in my draft bill to to give them the authority’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Need for AI policy radar similar to climate policy radar to track global regulatory developments

Explanation

There should be a comprehensive AI policy radar that tracks regulatory developments across all countries and regions. This would provide valuable knowledge for policymakers to understand global AI governance trends and learn from other jurisdictions.


Evidence

Specifically mentions ‘there is a climate policy radar. I wish there would be an AI policy radar’ and explains it would help parliamentarians know ‘what is happening in every region, what is happening in every country’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


Importance of sharing experiences between countries while recognizing different contexts

Explanation

While what works for one country may not work for another, there are valuable experiences that can be shared and adapted. Countries should learn from each other’s approaches while developing solutions appropriate to their specific contexts.


Evidence

States ‘what works for Egypt definitely couldn’t work for other countries and vice versa, but there are experiences which we could always learn from and develop’


Major discussion point

Global Coordination and International Cooperation


Topics

Development


Legislative impact assessment of AI bills still missing in many jurisdictions

Explanation

There’s a significant gap in assessing the actual impact of AI legislation that has been implemented. It’s unclear whether regulations like the EU AI Act have affected private sector investment or caused companies to relocate, making policy evaluation challenging.


Evidence

Questions whether the EU Act ‘didn’t affect the amount of private sector investments in the fields of high tech and AI development and that these companies went to the US, for example? It’s not accessible yet’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Participant
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Disagreed with

– Axel Voss

Disagreed on

Detailed vs. framework-based regulation


Parliaments should focus on scrutinizing ministerial AI use rather than just legislation

Explanation

Beyond creating laws, parliaments should actively scrutinize how different government ministries use AI technologies. This oversight function ensures that AI implementation serves public interests and advances citizen welfare across sectors.


Evidence

Emphasizes ‘the scrutinizing job of making every ministry up to using AI for the good of the people in their mandate’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


Data classification crucial as foundation for effective AI regulation

Explanation

Proper data classification is fundamental to AI regulation because unclassified data cannot be easily regulated. This involves creating legal liability frameworks based on data sensitivity levels and ensuring accountability for data handling.


Evidence

States ‘what is not classified couldn’t be easily regulated’ and emphasizes ‘at least the data classification is one crucial thing’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Data governance


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


National data becomes valuable asset requiring protection and accountability measures

Explanation

When AI systems function on data, national data becomes a significant asset that requires protection. Clear accountability frameworks are needed to determine responsibility when sensitive data, such as hospital records, is compromised or leaked.


Evidence

Provides specific example: ‘if, for example, the data of a hospital in a far place in Egypt is leaked. Who should I hold accountable based on this?’ and explains ‘the national data becomes a huge asset by itself’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Data governance | Privacy and data protection


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


Need for legal liability based on data sensitivity classification

Explanation

AI governance should establish clear legal responsibilities that correspond to the sensitivity level of data being processed. High-risk data handling should automatically trigger specific legal liability frameworks to ensure accountability.


Evidence

States ‘If you are dealing with a classified data or you’re dealing with data that is of high risk, this should have immediately a kind of legal liability’


Major discussion point

Data Governance and Classification


Topics

Legal and regulatory | Privacy and data protection


Agreed with

– Hossam Elgamal

Agreed on

Data classification and governance as fundamental to AI regulation


R

Rodrigo Goni Romero

Speech speed

84 words per minute

Speech length

311 words

Speech time

220 seconds

Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation

Explanation

As a small country between larger neighbors, Uruguay prioritizes being open to investment and avoids sending negative signals to investors. They have passed a general legal framework with multi-party support that mandates developing regulation through stakeholder participation and consensus.


Evidence

Mentions Uruguay is ‘a very small country in South America between biggest, big country, Argentina and Brazil’ and explains they ‘prefer have passed a legal framework approved by all parties which self mandate us to develop regulation with the participation of all sectors and basis of consensus’


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Disagreed with

– Axel Voss

Disagreed on

Speed and approach to AI regulation


Small countries like Uruguay prioritize being open to investment while developing regulation through stakeholder consensus

Explanation

Uruguay’s approach focuses on promoting AI investment while carefully developing regulation through inclusive processes. They prefer to observe what happens in larger jurisdictions like Europe, the US, and Brazil before making detailed regulatory decisions.


Evidence

States they are ‘prioritized to be open to investment and focusing promoting, investing in AI’ and prefer to ‘observe that that they happen in Europe and US and maybe a bigger country like Brazil’


Major discussion point

Balancing Innovation and Regulation


Topics

Economic | Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Participant

Agreed on

Balancing innovation incentives with regulatory protection


Future job displacement requires extensive capacity building and preparation programs

Explanation

AI poses significant risks to employment that require proactive preparation through capacity building programs. As president of the Committee of the Future, the speaker emphasizes the need to prepare not just children and students, but also current workers for AI-related job changes.


Evidence

Mentions being ‘president of the Committee of the Future of the Parliament’ and states ‘I have to recognize in many perspectives that artificial intelligence have many risks to the job, many changes’ and emphasizes programs ‘Not just to the children, not just to the school, also to the worker’


Major discussion point

Risks and Challenges of AI


Topics

Economic | Future of work | Development


Continuous learning and capacity building essential for politicians, policymakers, and citizens

Explanation

Addressing AI risks requires extensive capacity building across society. Many people are unaware of AI risks, making it parliament’s duty to raise awareness and facilitate preparation programs for all segments of society.


Evidence

Emphasizes ‘capacity, capacity, capacity’ and states ‘many people don’t know about the risk. So, I think it’s our duty of the Parliament to awareness, to ask to prepare and to facilitate the program’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Amira Saber
– Arda Gerkens

Agreed on

Capacity building and education are essential for all stakeholders


P

Participant

Speech speed

127 words per minute

Speech length

401 words

Speech time

188 seconds

Bahrain has drafted and approved first AI regulatory law balancing innovation and regulation

Explanation

Bahrain has successfully created and approved what they claim is the first AI regulatory law. Their framework achieves a balance between attracting investors, promoting innovation, and regulating the negative aspects of AI use.


Evidence

States ‘Bahrain have drafted the first and got approved the first AI regulator, sorry, law for regulating the use of AI’ and mentions achieving ‘a balance…between investors, getting investors and believe pushing the innovation and how to regulate the bad side of the use of the AI’


Major discussion point

Current State of AI Regulation Across Different Countries


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero

Agreed on

Balancing innovation incentives with regulatory protection


Importance of having flexible lower-level regulations rather than frequently amending laws

Explanation

Rather than constantly amending laws to keep up with AI developments, it’s better to simplify laws and delegate detailed regulation to more flexible bodies. Changing laws takes too long to cope with the fast pace of AI development.


Evidence

States ‘changing anything in the law it’s gonna take a long time which we cannot cope as with the developing the fast developing of the AI’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Mounir Sorour

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization

Explanation

Research shows that children are being recruited for extremism and terrorism through AI-enhanced online gaming platforms. The process involves isolating children, then promoting radical ideas, leading to dangerous outcomes.


Evidence

Published article on ‘how young people and children are recruited in extremism and radicalization and terrorism through artificial intelligence’ and explains ‘they are recruiting children through the games, through the gamings…They isolate them firstly, then they start to promote their own ideas and radicalization approaches’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Cybersecurity | Violent extremism | Children rights


Importance of parental awareness and supervision of children’s online activities

Explanation

Parents must actively supervise their children’s screen time and online activities to prevent exploitation. Leaving children alone with screens makes them vulnerable to isolation and radical recruitment through gaming platforms.


Evidence

Recommends ‘look after your children. Don’t leave them alone with the screens. Don’t do it’ and explains the isolation process that leads to radicalization


Major discussion point

Youth Engagement and Future-Proofing


Topics

Children rights | Cybersecurity


Need for simplified legal frameworks with flexible implementation mechanisms

Explanation

AI regulation should focus on creating main frameworks that minimize risks while allowing for flexible adaptation. Rather than trying to fix detailed regulations that become quickly outdated, countries should establish broad principles that can be adjusted as technology evolves.


Evidence

Asks ‘Can we just say yes to something to be like a main framework?’ and mentions ‘we don’t look now to make a regulation, we can’t fix a regulation, especially with AI’


Major discussion point

Parliamentary Role and Oversight


Topics

Legal and regulatory


H

Hossam Elgamal

Speech speed

129 words per minute

Speech length

342 words

Speech time

158 seconds

Lack of adequate regulatory bodies beyond telecommunications authorities in many countries

Explanation

Most countries only have telecommunications regulatory bodies, which are insufficient for governing digital society and AI regulation. New regulatory frameworks require appropriate institutions capable of implementing and enforcing AI-specific regulations.


Evidence

States ‘We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


AI regulation needs international coordination as AI systems operate globally

Explanation

AI operates on a global scale similar to cybersecurity, making international coordination essential. Individual country regulations will be insufficient since data used in AI systems, whether authentic or fake, operates across borders.


Evidence

Compares to cybersecurity challenges: ‘Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI’ and notes ‘data that will be used, whether fake or right. will be a global one’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory | Cybersecurity


Many countries lack proper data exchange policies needed before implementing AI regulation

Explanation

Countries in the Global South face multiple challenges including lack of computational power, data access gaps, and insufficient scientific capability. Many haven’t implemented basic data exchange policies, which are prerequisites for effective AI regulation.


Evidence

Lists specific gaps: ‘power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability’ and notes ‘a lot of countries in the South especially…did not implement yet data exchange policy’


Major discussion point

Data Governance and Classification


Topics

Development | Data governance | Digital access


Agreed with

– Amira Saber

Agreed on

Data classification and governance as fundamental to AI regulation


Digital divide creates gaps in computational power, data access, and scientific capability

Explanation

AI development has exacerbated existing digital divides, creating gaps in computational power, access to processors, data access, and scientific expertise. These gaps particularly affect countries in the Global South and hinder their ability to participate in AI governance.


Evidence

Specifically mentions ‘power gap, we are facing computational power gap, and ability to buy the processors to do AI. We are facing data access gap. And finally we are facing scientist capability within the AI’


Major discussion point

Human Rights and Social Impact


Topics

Development | Digital access


Y

Yasmin Al Douri

Speech speed

161 words per minute

Speech length

210 words

Speech time

77 seconds

Young people are often better at identifying deepfakes and misinformation than assumed

Explanation

Contrary to assumptions that young people cannot distinguish between real and fake content, they are actually better at identifying deepfakes and misinformation. This represents a broader issue where young people’s capabilities are underestimated by policymakers.


Evidence

States ‘I would definitely disagree specifically on my work with young people. I would even state that young people are way better at actually seeing what is deepfake and what is not’ and mentions this ‘shows a little bit the issue that we’re generally facing as a young generation’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Sociocultural | Human rights


Disagreed with

– Axel Voss

Disagreed on

Young people’s ability to distinguish real from fake content


Need to bring youth reality to parliamentarians and ensure future-proof regulation

Explanation

There’s a disconnect between youth capabilities and parliamentarian perceptions that needs to be addressed. Regulation should be designed to be future-proof for coming generations, requiring better integration of youth perspectives in policy-making processes.


Evidence

Asks ‘how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming?’


Major discussion point

Youth Engagement and Future-Proofing


Topics

Legal and regulatory | Human rights


M

Meredith Veit

Speech speed

150 words per minute

Speech length

215 words

Speech time

85 seconds

Need to address actual harms happening now rather than just potential future benefits

Explanation

There are problematic narratives from governments that focus on AI’s potential benefits while ignoring substantial evidence of current harms. Immediate action is needed to address existing problems and provide justice for those already affected by AI systems.


Evidence

Mentions ‘mountains of evidence that we have about the actual harms that are taking place now that need to be mitigated and dealt with now and justice that needs to happen now’


Major discussion point

Human Rights and Social Impact


Topics

Human rights


Importance of maintaining strong regulatory standards despite pressure from industry narratives

Explanation

There’s a need to resist problematic narratives about the dangers of regulating AI and maintain momentum for strong regulatory approaches. This includes keeping the EU AI Act strong and ensuring robust enforcement through institutions like the AI office.


Evidence

Asks about ‘pushing back against this wave and these very problematic narratives’ and mentions ‘keeping the EU AI Act strong and making sure that the AI office is strong in its enforcement’


Major discussion point

Human Rights and Social Impact


Topics

Human rights | Legal and regulatory


S

Sarah Lister

Speech speed

141 words per minute

Speech length

584 words

Speech time

248 seconds

Multi-stakeholder approach essential involving parliaments, civil society, private sector, and technical communities

Explanation

Effective AI governance cannot be achieved by any single actor alone. It requires collaboration between parliaments, executive branches, civil society, private sector, and technical communities, with parliaments playing a key role in ensuring AI serves public interests.


Evidence

States ‘no single actor can shape the governance of AI alone. Effective regulation demands a multi-stakeholder approach, bringing together parliaments, executive branches, civil society, private sector and technical communities’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


M

Mounir Sorour

Speech speed

136 words per minute

Speech length

128 words

Speech time

56 seconds

AI regulation should focus on flexible frameworks rather than fixed regulations due to the open and expanding nature of AI

Explanation

Making AI regulation is both easy and difficult because AI operates in an open space that is constantly moving and expanding. Rather than creating fixed regulations that cannot adapt, there should be main frameworks that can minimize AI risks while allowing for necessary adaptations as the technology evolves.


Evidence

States that ‘AI, we are working on open space. And every time we do something, I mean, because we are moving and we’re expanding’ and asks about creating ‘a main framework at least to minimize the risk of the AI’


Major discussion point

Implementation and Enforcement Challenges


Topics

Legal and regulatory


Agreed with

– Axel Voss
– Amira Saber
– Participant

Agreed on

Need for flexible regulatory frameworks rather than detailed fixed laws


Need for balanced approach that doesn’t focus solely on regulation but seeks equilibrium

Explanation

The approach to AI governance should prioritize finding balance rather than just creating regulations. This involves looking for ways to achieve equilibrium between different interests and needs rather than simply imposing restrictive measures.


Evidence

States ‘we are looking for balancing, we don’t look now to make a regulation’ and emphasizes that ‘we can’t fix a regulation, especially with AI’


Major discussion point

Balancing Innovation and Regulation


Topics

Legal and regulatory


A

Arda Gerkens

Speech speed

155 words per minute

Speech length

1705 words

Speech time

659 seconds

IPU has established comprehensive AI tracking and policy initiatives for parliaments globally

Explanation

The Inter-Parliamentary Union has adopted a resolution on AI’s impact on democracy, human rights, and rule of law in October 2024, and launched a monthly tracker monitoring AI policy actions across 37 parliaments. These initiatives aim to coordinate parliamentary responses to AI governance challenges.


Evidence

Mentions specific IPU resolution from October 2024 ‘on the impact of AI on democracy, human rights, and the rule of law’ and monthly tracker that ‘currently already covers 37 parliaments’


Major discussion point

Global Coordination and International Cooperation


Topics

Legal and regulatory


Parliamentarians should invest extra effort in understanding AI due to its critical importance

Explanation

Given AI’s significant impact on society, parliamentarians and politicians need to put additional effort into understanding the technology before attempting to regulate it. This echoes the philosophical principle that one shouldn’t speak about topics they don’t understand.


Evidence

References philosopher Wittgenstein’s principle ‘if you don’t know what you’re talking about, you shouldn’t speak on it’ and suggests ‘as a politician, parliamentarian, this time you should put a little extra effort in understanding AI, because it’s so important’


Major discussion point

Capacity Building and Education


Topics

Development | Capacity development


Agreed with

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero

Agreed on

Capacity building and education are essential for all stakeholders


AI makes it difficult for people of all ages to distinguish between real and fake content

Explanation

The challenge of identifying authentic versus AI-generated content affects not just young people but people of all generations. This represents a broader societal challenge that extends beyond generational boundaries.


Evidence

Personal reflection: ‘maybe I’m not youth anymore. Sometimes I also feel it’s hard to know what’s real and what’s not’


Major discussion point

Risks and Challenges of AI


Topics

Sociocultural | Human rights


Agreements

Agreement points

Capacity building and education are essential for all stakeholders

Speakers

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero
– Arda Gerkens

Arguments

Need for better understanding among regulators who may not have sufficient technical knowledge


Continuous learning and capacity building essential for politicians, policymakers, and citizens


Parliamentarians need education on AI to effectively scrutinize government AI use across sectors


Continuous learning and capacity building essential for politicians, policymakers, and citizens


Parliamentarians should invest extra effort in understanding AI due to its critical importance


Summary

All speakers emphasized that understanding AI technology is crucial for effective governance, with particular emphasis on educating parliamentarians, policymakers, and citizens to make informed decisions about AI regulation and oversight.


Topics

Development | Capacity development


Need for flexible regulatory frameworks rather than detailed fixed laws

Speakers

– Axel Voss
– Amira Saber
– Participant
– Mounir Sorour

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Legislative impact assessment of AI bills still missing in many jurisdictions


Importance of having flexible lower-level regulations rather than frequently amending laws


AI regulation should focus on flexible frameworks rather than fixed regulations due to the open and expanding nature of AI


Summary

There is strong consensus that AI regulation should focus on creating flexible frameworks and principles rather than detailed, rigid laws that cannot adapt to rapidly evolving technology.


Topics

Legal and regulatory


Balancing innovation incentives with regulatory protection

Speakers

– Axel Voss
– Amira Saber
– Rodrigo Goni Romero
– Participant

Arguments

Regulation should focus on positive expectations from AI rather than just avoiding risks


Need to avoid hindering investment while ensuring ethical AI use, especially in healthcare, education, and agriculture


Small countries like Uruguay prioritize being open to investment while developing regulation through stakeholder consensus


Bahrain has drafted and approved first AI regulatory law balancing innovation and regulation


Summary

All speakers agreed on the critical need to balance regulatory protection with maintaining incentives for innovation and investment, particularly for smaller countries and developing economies.


Topics

Economic | Legal and regulatory


Data classification and governance as fundamental to AI regulation

Speakers

– Amira Saber
– Hossam Elgamal

Arguments

Data classification crucial as foundation for effective AI regulation


National data becomes valuable asset requiring protection and accountability measures


Need for legal liability based on data sensitivity classification


Many countries lack proper data exchange policies needed before implementing AI regulation


Summary

Both speakers emphasized that proper data classification and governance frameworks are prerequisites for effective AI regulation, with clear accountability measures based on data sensitivity levels.


Topics

Legal and regulatory | Data governance | Privacy and data protection


Similar viewpoints

Both speakers from developing countries emphasized the importance of learning from other jurisdictions while adapting solutions to their specific national contexts, favoring consensus-based approaches over rigid regulatory frameworks.

Speakers

– Amira Saber
– Rodrigo Goni Romero

Arguments

Importance of sharing experiences between countries while recognizing different contexts


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Topics

Development | Legal and regulatory


Both speakers highlighted the serious threats posed by AI-generated fake content, though Voss focused on democratic implications while Saber emphasized personal safety risks, particularly for women.

Speakers

– Axel Voss
– Amira Saber

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities


Topics

Human rights | Sociocultural | Gender rights online


Both emphasized the active oversight role of parliaments beyond just creating laws, including monitoring how AI is used by government entities and protecting vulnerable populations from AI-enabled threats.

Speakers

– Amira Saber
– Participant

Arguments

Parliaments should focus on scrutinizing ministerial AI use rather than just legislation


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization


Topics

Legal and regulatory | Cybersecurity | Children rights


Unexpected consensus

Youth capabilities in identifying AI-generated content

Speakers

– Axel Voss
– Yasmin Al Douri
– Arda Gerkens

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


AI makes it difficult for people of all ages to distinguish between real and fake content


Explanation

While there was initial disagreement about youth capabilities, the discussion revealed an unexpected consensus that the challenge of distinguishing real from fake content affects all age groups, not just young people, suggesting a more nuanced understanding of digital literacy across generations.


Topics

Sociocultural | Human rights | Youth Engagement and Future-Proofing


Need for international coordination despite national sovereignty concerns

Speakers

– Hossam Elgamal
– Amira Saber
– Sarah Lister

Arguments

AI regulation needs international coordination as AI systems operate globally


Need for AI policy radar similar to climate policy radar to track global regulatory developments


Multi-stakeholder approach essential involving parliaments, civil society, private sector, and technical communities


Explanation

Despite speakers representing different national interests and regulatory approaches, there was unexpected consensus on the need for global coordination and information sharing, recognizing that AI governance transcends national boundaries.


Topics

Legal and regulatory | Global Coordination and International Cooperation


Overall assessment

Summary

The speakers demonstrated remarkable consensus on key foundational issues: the critical importance of capacity building and education for all stakeholders, the need for flexible regulatory frameworks rather than rigid detailed laws, the necessity of balancing innovation with protection, and the fundamental role of data governance. There was also strong agreement on the multi-stakeholder nature of AI governance and the need for international coordination.


Consensus level

High level of consensus on fundamental principles with constructive disagreement on implementation details. This suggests a mature understanding of AI governance challenges and creates a strong foundation for collaborative policy development. The consensus spans across different regions (Europe, Middle East, Latin America) and different types of stakeholders (parliamentarians, civil society, private sector), indicating broad-based agreement on core AI governance principles that could facilitate international cooperation and knowledge sharing.


Differences

Different viewpoints

Young people’s ability to distinguish real from fake content

Speakers

– Axel Voss
– Yasmin Al Douri

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


Summary

Axel Voss argued that young people find it hard to differentiate what is real and fake, creating democratic risks. Yasmin Al Douri directly disagreed, stating that young people are actually better at identifying deepfakes and misinformation than assumed, and that this represents a broader issue of underestimating youth capabilities.


Topics

Human rights | Sociocultural


Speed and approach to AI regulation

Speakers

– Axel Voss
– Rodrigo Goni Romero

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Summary

Axel Voss advocated for faster legislative processes (three months) to keep up with technology, while Rodrigo explicitly stated Uruguay prefers to ‘go slow’ and observe what happens in larger jurisdictions before acting.


Topics

Legal and regulatory


Detailed vs. framework-based regulation

Speakers

– Axel Voss
– Amira Saber

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Legislative impact assessment of AI bills still missing in many jurisdictions


Summary

While both agree on avoiding overly detailed regulation, Axel Voss focuses on speed and framework approaches, while Amira Saber emphasizes the need for impact assessment and the challenge of constantly amending detailed regulations as technology evolves.


Topics

Legal and regulatory


Unexpected differences

Generational assumptions about digital literacy

Speakers

– Axel Voss
– Yasmin Al Douri

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Young people are often better at identifying deepfakes and misinformation than assumed


Explanation

This disagreement was unexpected because it revealed a fundamental disconnect between policymaker assumptions and youth advocate perspectives. Yasmin Al Douri’s direct challenge to Axel Voss’s statement highlighted how generational assumptions can influence policy-making, which is particularly significant given that AI regulation will primarily affect younger generations.


Topics

Human rights | Sociocultural


Regulatory timing philosophy

Speakers

– Axel Voss
– Rodrigo Goni Romero

Arguments

Democratic legislators are too slow for technology developments, need faster, framework-based approach rather than detailed laws


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Explanation

This disagreement was unexpected because both speakers represent democratic systems but had completely opposite philosophies about regulatory timing. Axel Voss argued for urgency due to technological pace, while Rodrigo advocated for deliberate slowness to observe and learn from others, revealing how country size and position can fundamentally shape regulatory philosophy.


Topics

Legal and regulatory


Overall assessment

Summary

The main areas of disagreement centered on regulatory approach and timing, youth capabilities in digital environments, and the balance between innovation and regulation. While speakers generally agreed on fundamental goals like protecting citizens while enabling innovation, they differed significantly on methods and assumptions.


Disagreement level

Moderate disagreement with significant implications. The disagreements reveal fundamental differences in regulatory philosophy, generational assumptions, and approaches to balancing innovation with protection. These differences could lead to fragmented global AI governance approaches, with some jurisdictions moving quickly with framework-based regulation while others take slower, consensus-based approaches. The generational disconnect highlighted by the youth advocate suggests that current AI regulation may not adequately reflect the realities and capabilities of those most affected by these technologies.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers from developing countries emphasized the importance of learning from other jurisdictions while adapting solutions to their specific national contexts, favoring consensus-based approaches over rigid regulatory frameworks.

Speakers

– Amira Saber
– Rodrigo Goni Romero

Arguments

Importance of sharing experiences between countries while recognizing different contexts


Uruguay prefers slow, consensus-based approach with general legal framework rather than detailed regulation


Topics

Development | Legal and regulatory


Both speakers highlighted the serious threats posed by AI-generated fake content, though Voss focused on democratic implications while Saber emphasized personal safety risks, particularly for women.

Speakers

– Axel Voss
– Amira Saber

Arguments

Difficulty distinguishing real from fake content affects democratic processes and public trust


Deepfakes pose serious threats to individuals’ lives and careers, especially affecting women in conservative communities


Topics

Human rights | Sociocultural | Gender rights online


Both emphasized the active oversight role of parliaments beyond just creating laws, including monitoring how AI is used by government entities and protecting vulnerable populations from AI-enabled threats.

Speakers

– Amira Saber
– Participant

Arguments

Parliaments should focus on scrutinizing ministerial AI use rather than just legislation


Children vulnerable to recruitment through AI-powered gaming platforms for extremism and radicalization


Topics

Legal and regulatory | Cybersecurity | Children rights


Takeaways

Key takeaways

AI regulation requires balancing innovation incentives with risk mitigation, particularly for investment-dependent developing countries


Data classification and governance frameworks must be established before detailed AI regulation can be effective


Parliamentarians need extensive capacity building and technical education to effectively regulate and oversee AI implementation


Democratic legislative processes are too slow for rapidly evolving AI technology, requiring framework-based rather than detailed regulatory approaches


Multi-stakeholder approaches involving parliaments, civil society, private sector, and technical communities are essential for effective AI governance


International coordination is crucial since AI operates globally, but regulatory approaches must be adapted to local contexts


Youth voices and technical expertise should be better integrated into parliamentary AI policy-making processes


Immediate harms from AI (deepfakes, weaponization, misinformation) require urgent attention alongside long-term governance frameworks


Resolutions and action items

IPU to continue monthly tracking of parliamentary AI activities across 37 parliaments and expand coverage


Parliamentarians encouraged to contact Andy Richardson to be added to IPU’s AI policy tracking list


Upcoming IPU event scheduled for November 28-30 with Parliament of Malaysia, UNDP, and Commonwealth Parliamentary Association on responsible AI


Recommendation to create an AI policy radar system similar to climate policy radar to track global regulatory developments


Need to establish appropriate regulatory bodies with authority to hold governmental entities accountable for AI use


Focus on developing flexible lower-level regulations rather than frequently amending primary legislation


Unresolved issues

Which specific regulatory bodies should implement AI regulation in countries lacking adequate digital governance authorities


How to achieve effective international coordination of AI regulation while respecting national sovereignty and different development contexts


Whether the EU AI Act’s detailed approach will negatively impact private sector investment and innovation


How to effectively measure and assess the legislative impact of AI regulations on innovation and investment


Timing and implementation details for potentially postponing high-risk AI system requirements in the EU


How to bridge the digital divide in computational power, data access, and scientific capability between developed and developing countries


Specific mechanisms for ensuring youth voices are meaningfully integrated into parliamentary AI policy processes


Suggested compromises

Adopt general legal frameworks with broad ethical principles rather than detailed technical regulations to maintain flexibility


Focus regulation on data classification and high-risk AI applications while allowing innovation in lower-risk areas


Implement consensus-based, multi-stakeholder approaches that involve all sectors in developing AI governance


Prioritize capacity building and education for parliamentarians while developing regulatory frameworks simultaneously


Create regulatory sandboxes to allow business experimentation within controlled environments


Establish framework laws with delegated authority to specialized bodies for detailed implementation rules


Balance immediate harm mitigation with long-term innovation goals through risk-based regulatory approaches


Thought provoking comments

However, whatever trials you are exerting in that track, you can’t. It’s embedded in your life. And the good thing now is that the ethical questions are being graced on every international table… There is no one safe until everyone is safe, and we have a responsibility to make it a safe space as possible, because definitely it’s going to be manipulated all the time for different purposes, for different reasons, politically and otherwise.

Speaker

Amira Saber


Reason

This comment is deeply insightful because it reframes AI regulation from a technical/legal issue to a fundamental human security issue. By invoking the COVID-19 lesson of ‘no one safe until everyone is safe,’ she connects AI governance to global solidarity and collective responsibility, moving beyond national regulatory approaches.


Impact

This comment elevated the discussion from technical regulatory details to philosophical and ethical foundations. It influenced subsequent speakers to consider the global interconnectedness of AI risks and led to questions about international coordination and the need for unified approaches across borders.


The democratic legislator is too slow for the technology developments. And so we are always behind… we need to reduce the normal behavior of a democratic legislator. So meaning there should be a kind of a solution in place after three months… It’s more a kind of a frame what we should have with ethical aspects or a kind of value-orientated frame.

Speaker

Axel Voss


Reason

This is a provocative challenge to traditional democratic processes, suggesting that democracy itself may be structurally inadequate for governing rapidly evolving technologies. It raises fundamental questions about the tension between democratic deliberation and technological urgency.


Impact

This comment sparked a crucial debate about regulatory approaches throughout the remainder of the discussion. Multiple participants referenced the framework vs. detailed regulation approach, and it led to practical suggestions about keeping laws simple while delegating flexibility to regulatory bodies.


Imagine a girl who is living in a village with certain cultural norms and she has leaked photographs of her on pornography. This might threaten her life directly. She could be killed. And actually there are incidents in many countries of girls and women who have suffered or actually have risked their lives to deepfake.

Speaker

Amira Saber


Reason

This comment is powerfully insightful because it grounds abstract AI risks in concrete, life-threatening realities, particularly for vulnerable populations. It demonstrates how AI harms intersect with existing social inequalities and cultural contexts in ways that can be fatal.


Impact

This visceral example shifted the discussion from theoretical policy considerations to urgent human rights concerns. It influenced later questions about child protection and gender-based violence, and reinforced the need for immediate regulatory action rather than prolonged deliberation.


I would even state that young people are way better at actually seeing what is deepfake and what is not and this shows a little bit the issue that we’re generally facing as a young generation. We are always deemed as not knowing specific things when we’re actually really good at specific things… how can we bring the reality of youth to parliamentarians and how can we make sure that the regulation we’re actually doing today is future-proof for generations that are coming?

Speaker

Yasmin Al Douri


Reason

This comment is thought-provoking because it directly challenges assumptions made by senior policymakers and flips the narrative about generational digital literacy. It highlights a critical gap in policymaking where those most affected by regulations have the least voice in creating them.


Impact

This intervention created a notable shift in tone, forcing Axel Voss to clarify his earlier statement and acknowledge the problem of excluding youth voices. It introduced the crucial question of intergenerational equity in AI governance and influenced the moderator to emphasize the importance of including youth perspectives.


AI is global, it is not local, and same as cyber security. Till now we are facing huge challenge in having international law of cyber security. And will be the same for AI, each country will try to start having its own regulation. But how we are going to implement it globally?

Speaker

Hossam Elgamal


Reason

This comment is insightful because it identifies a fundamental structural problem: the mismatch between global technology and national regulatory frameworks. It draws a parallel with cybersecurity to show this is a recurring challenge in digital governance.


Impact

This question exposed a critical weakness in the current regulatory approach and led to discussions about the need for international coordination. It influenced Amira Saber’s response about creating an ‘AI policy radar’ and highlighted the limitations of purely national approaches to AI governance.


What is the regulatory body that will implement? We don’t in all countries till now, all what we have is telecommunication regulatory body, which is no longer capable of handling digital society regulation. And going to AI and putting regulation for AI, who is going to implement the regulation?

Speaker

Hossam Elgamal


Reason

This comment cuts to the heart of implementation challenges, pointing out that existing regulatory infrastructure is inadequate for AI governance. It highlights the gap between creating laws and having the institutional capacity to enforce them.


Impact

This practical concern grounded the discussion in implementation realities and led to concrete discussions about creating new regulatory bodies, such as Amira Saber’s mention of Egypt’s Supreme Council on Artificial Intelligence and Axel Voss’s reference to the EU’s AI office.


Overall assessment

These key comments fundamentally shaped the discussion by introducing critical tensions and complexities that moved the conversation beyond surface-level policy discussions. Amira Saber’s comments consistently elevated the discourse to address human rights, global solidarity, and life-threatening consequences, while Axel Voss’s observation about democratic processes being too slow created a central tension that influenced much of the subsequent debate. The youth representative’s challenge to generational assumptions and the practical questions about implementation and global coordination forced participants to confront the limitations of current approaches. Together, these interventions transformed what could have been a technical policy discussion into a nuanced exploration of democracy, human rights, global governance, and intergenerational equity in the age of AI. The comments created a cascading effect where each insight built upon others, ultimately revealing AI regulation as a complex challenge requiring fundamental rethinking of governance structures, democratic processes, and international cooperation.


Follow-up questions

How can we have only one interpretation of AI Act provisions across the European single market to avoid confusion for companies?

Speaker

Axel Voss


Explanation

This is crucial for business clarity and consistent implementation across EU member states, unlike the varied interpretations seen with GDPR


Who should be held accountable when sensitive data (like hospital data) is leaked in AI systems?

Speaker

Amira Saber


Explanation

This addresses the fundamental question of liability and responsibility in AI data breaches, especially for sensitive national data


How can we balance AI innovation incentives with regulatory constraints to avoid discouraging private sector investment?

Speaker

Amira Saber


Explanation

This is essential for countries needing AI investments in healthcare, education, and agriculture while maintaining ethical standards


What regulatory body will implement AI regulations, given that current telecommunication regulatory bodies are inadequate for digital society regulation?

Speaker

Hossam Elgamal


Explanation

This addresses the institutional gap in AI governance and the need for appropriate regulatory infrastructure


How can international AI regulation be implemented globally when AI is inherently global but countries are developing separate national regulations?

Speaker

Hossam Elgamal


Explanation

This highlights the challenge of coordinating AI governance across borders, similar to ongoing challenges with international cybersecurity law


Should countries slow down AI regulation or move forward, especially when neighboring countries have different approaches?

Speaker

Ali from Bahrain Shura Council


Explanation

This addresses the strategic timing of AI regulation and whether early adoption provides advantages or disadvantages


How can we bring the reality of youth perspectives to parliamentarians and ensure AI regulation is future-proof for coming generations?

Speaker

Yasmin Al Douri


Explanation

This challenges assumptions about youth capabilities and emphasizes the need for intergenerational input in AI policymaking


Can AI help in mitigating the social impact of child abuse and gender-related inequalities?

Speaker

Remote participant


Explanation

This explores the potential positive applications of AI in addressing serious social issues


How can we assess the legislative impact of AI bills, particularly whether EU AI Act affected private sector investments?

Speaker

Amira Saber


Explanation

This addresses the need for evidence-based policy evaluation to understand the real-world effects of AI regulation


What is needed to push back against problematic narratives that ignore current AI harms while focusing only on potential benefits?

Speaker

Meredith Veit


Explanation

This addresses the need to balance AI regulation discussions with acknowledgment of existing harms requiring immediate attention


What should be the main framework to minimize AI risks while maintaining flexibility for rapid technological changes?

Speaker

Mounir Sourour


Explanation

This seeks practical guidance on creating adaptable regulatory frameworks that can evolve with technology


How can we create an AI policy radar similar to the climate policy radar to track global AI policy developments?

Speaker

Amira Saber


Explanation

This would provide parliamentarians and policymakers with comprehensive knowledge of AI policy developments worldwide


How can we verify AI-generated content and distinguish between real and fake information, including deepfakes?

Speaker

Amira Saber


Explanation

This addresses the critical challenge of content verification in an era where AI can create convincing fake content


How can democratic legislators become faster in responding to technology developments instead of always being behind?

Speaker

Axel Voss


Explanation

This addresses the fundamental challenge of democratic processes being too slow for rapid technological advancement


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #484 Innovative Regulatory Strategies to Digital Inclusion

WS #484 Innovative Regulatory Strategies to Digital Inclusion

Session at a glance

Summary

This workshop discussion focused on innovative regulatory policy and business strategies for achieving equitable digital inclusion, particularly in developing countries and Africa. The session was organized under South Africa’s G20 presidency, building on previous work by Brazil that developed the concept of “meaningful connectivity” beyond basic internet access. The panelists identified that the primary barriers to digital inclusion are demand-side constraints rather than supply-side infrastructure issues, with device affordability being the biggest obstacle to internet access, followed by digital literacy and skills gaps.


The discussion revealed that despite high mobile broadband coverage in many African countries (above 95% in some cases), actual connectivity rates remain below 20%, indicating that coverage alone does not solve the digital divide. Panelists emphasized that 90% of unconnected people live in areas with existing coverage but face other barriers to access. The conversation highlighted how digital technologies amplify existing inequalities, creating multiple tiers of connectivity from the unconnected to those with minimal access to those who can meaningfully participate in the digital economy.


Solutions discussed included reducing regulatory barriers for small operators and community networks, implementing wholesale access regulation to lower backhaul costs, developing innovative device financing schemes, and creating comprehensive digital skills training programs. The panelists stressed the importance of intermediaries like libraries and post offices in supporting digital inclusion, and the need for diverse, locally-relevant solutions rather than one-size-fits-all approaches. The discussion concluded with calls for a fundamental shift from treating people as consumers in a market-driven system to recognizing digital access as a public good and citizen right, requiring cross-sectoral collaboration and whole-of-society approaches to address the underlying structural inequalities that perpetuate digital exclusion.


Keypoints

## Major Discussion Points:


– **The Digital Divide is More Complex Than Just Connectivity**: The discussion reveals that 90% of unconnected people actually live in areas with mobile broadband coverage, indicating the problem isn’t infrastructure but rather affordability, digital skills, and meaningful usage barriers.


– **Device Affordability as the Primary Barrier**: Research shows that for the poorest 20% in sub-Saharan Africa, an entry-level internet-enabled device costs 99% of average monthly income, making device cost the biggest obstacle to internet access rather than data costs.


– **Need for Diverse Ecosystem Solutions Beyond Traditional Operators**: The conversation emphasizes moving from a “few big stones” approach (large mobile operators) to enabling smaller, community-based networks, social enterprises, and alternative business models that can serve “uneconomic” areas.


– **Regulatory and Policy Failures in Addressing Demand-Side Constraints**: Discussion of how current regulatory frameworks focus too heavily on supply-side solutions while neglecting demand-side interventions, wholesale access regulation, and the need for treating digital resources as public goods.


– **Systemic Inequalities Amplified by Digital Technologies**: The panel addresses how digital technologies layer over existing structural inequalities (education, income, gender, rural/urban divides) and amplify rather than reduce these disparities, requiring holistic cross-sectoral approaches.


## Overall Purpose:


This workshop aimed to examine innovative regulatory policies and business strategies for achieving equitable digital inclusion, building on G20 work under South Africa’s presidency. The goal was to shift the global conversation from purely connectivity-focused solutions to addressing the complex demand-side barriers that prevent meaningful internet usage, even where coverage exists.


## Overall Tone:


The discussion maintained a collaborative and solution-oriented tone throughout, with experts building on each other’s insights rather than debating. The tone was analytical and evidence-based, with participants sharing research findings and practical examples. There was an underlying sense of urgency about addressing digital inequalities, particularly given lessons from the pandemic, but the conversation remained constructive and forward-looking, emphasizing the need for systemic change and innovative approaches to digital inclusion.


Speakers

**Speakers from the provided list:**


– **Alison Gillwald** – Workshop moderator, works with Research ICT Africa as knowledge partner to the South African government for the G20, focusing on digital inequality and equitable digital inclusion


– **Carlos Rey-Moreno** – From the Association for Progressive Communication (APC), works on digital inequality, connectivity, inclusion, and community networks, with focus on social enterprises


– **Claire Sibthorpe** – Works with GSMA, specifically in mobile for development and inclusive development, focusing on mobile internet connectivity and digital inclusion


– **Steve Song** – From the Internet Society (previously worked with Mozilla), expert in telecommunications, internet infrastructure, and connectivity solutions


– **Dr Gillian Marcelle** – Independent consultant, extensive experience working across Africa in mobile telephony, policy and regulatory initiatives for universal access, advising operators and regulators


– **Sophie Maddens** – Works with the ITU (International Telecommunication Union), involved with the World Development Telecommunications Conference, focuses on regulatory issues and digital inclusion


– **Audience** – Multiple audience members who asked questions and participated in the discussion


**Additional speakers:**


– **Leandro Navarro** – From eReuse initiative and APC, works on device reuse and refurbishment for digital inclusion


– **Kevin Hernandez** – Works at the Universal Postal Union (UN organization for postal sector), focuses on connecting intermediaries for digital inclusion


– **Peter** – Online moderator/facilitator managing remote participants and questions


– **Leslie** – Technical support person managing online connections


– **Ramune** – Online participant who commented about libraries as intermediaries (mentioned indirectly through Peter)


Full session report

# Workshop Report: Innovative Regulatory Policy and Business Strategies for Equitable Digital Inclusion


## Executive Summary


This workshop, conducted under South Africa’s G20 presidency, brought together leading experts to examine innovative approaches to achieving equitable digital inclusion. The discussion revealed a fundamental shift in understanding the digital divide, moving beyond traditional infrastructure-focused solutions to address complex demand-side barriers that prevent meaningful internet usage even where coverage exists.


The panel identified that whilst mobile broadband coverage reaches above 95% in many African countries, actual connectivity rates remain below 20%, indicating that most unconnected people live in areas with existing coverage but face other barriers to access. This finding challenges conventional approaches and highlights the need for comprehensive solutions addressing device affordability, digital literacy, and systemic inequalities.


## Key Participants


**Alison Gillwald** from Research ICT Africa moderated the session, bringing experience as knowledge partner to the South African government for G20 initiatives. **Sophie Maddens** from the International Telecommunication Union provided regulatory perspectives, whilst **Claire Sibthorpe** from GSMA offered mobile industry insights. **Steve Song** from the Internet Society contributed telecommunications infrastructure expertise, **Dr. Gillian Marcelle** brought independent consulting experience, and **Carlos Rey-Moreno** from the Association for Progressive Communication represented civil society perspectives on community networks.


Additional contributions came from **Leandro Navarro** on device reuse initiatives, **Kevin Hernandez** from the Universal Postal Union on intermediary organisations, and audience members who enriched the discussion.


## Redefining Digital Exclusion


### Beyond Basic Connectivity


**Sophie Maddens** highlighted that 2.6 billion people remain unconnected to the internet, with persistent divides across rural/urban, income, gender, and age demographics. However, **Alison Gillwald** argued that when meaningful connectivity standards are applied—requiring quality, availability, affordability, devices, skills, and security—the number of truly digitally excluded people approaches 4-4.5 billion.


Gillwald explained that meaningful connectivity, building on previous G20 work, requires that people have safe, enriching, and productive online experiences at affordable costs, not merely minimal broadband connections. Under South Africa’s G20 presidency, this framework has been extended to include digital financial transactions, security awareness, data protection, government services access, and digital identity.


### The Plateau Effect


**Steve Song** identified a critical challenge: internet access growth is plateauing as the telecommunications industry has “connected the easy parts,” leaving billions requiring fundamentally different approaches. **Claire Sibthorpe** reinforced this analysis, noting that 90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage.


## Primary Barriers to Digital Inclusion


### Device Affordability as the Dominant Constraint


The panel reached strong consensus that device affordability represents the primary barrier to internet access. **Claire Sibthorpe** presented evidence that for the poorest 20% in sub-Saharan Africa, an entry-level internet-enabled device costs 99% of average monthly income, making device acquisition practically impossible for the most vulnerable populations.


**Alison Gillwald** expanded on this challenge, explaining that even when people acquire devices, they often can only use them for basic functions rather than for business or productive purposes due to both affordability constraints and digital literacy gaps.


### Education and Digital Literacy


**Sibthorpe** identified digital literacy as the second major barrier, closely linked to device affordability in creating compound barriers to access. **Gillwald** provided crucial context by explaining that the main determinants of internet access correlate with education level, which in turn correlates with income and employment opportunities.


This reveals the systemic nature of digital exclusion, where existing inequalities in education and economic opportunity directly translate into digital disadvantage. **Sibthorpe** emphasised that digital skills training must be tailored to mobile devices since those are what people actually use.


### Regulatory and Market Structure Challenges


**Steve Song** argued that current regulatory frameworks focus too heavily on competition policy without adequately addressing inclusion strategies. **Alison Gillwald** provided specific evidence of regulatory failures, noting that market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation that could significantly reduce costs.


The discussion revealed significant regulatory barriers that prevent smaller operators and community networks from entering markets. **Carlos Rey-Moreno** highlighted the vast differences in regulatory requirements across countries, with many African countries imposing high transaction costs that effectively exclude community-based solutions.


## Alternative Models and Solutions


### Community Networks and Social Enterprises


**Carlos Rey-Moreno** presented community networks and social enterprises as crucial alternatives to traditional operator models. These organisations are driven by socially motivated intentions rather than purely commercial objectives, enabling them to serve populations that are economically unviable for traditional operators.


Rey-Moreno emphasised the difference between “transactional” and “transformational” services, arguing that social enterprises provide transformational connectivity that creates local value and addresses community-specific needs through circular economies that maintain money locally.


### Ecosystem Diversity


**Steve Song** introduced a compelling ecological metaphor, arguing that telecommunications ecosystems need diversity like healthy forests, with protection for small operators and encouragement of different business models. This diversity is essential because large mobile network operators, whilst successful in their market segments, cannot economically serve all populations and areas.


### Capacity Building and Local Ownership


**Steve Song** argued for building capacity for communities to create, understand, and control their own network infrastructure, referencing Richard Feynman’s principle that “what I cannot create, I cannot understand.” He warned of the risk that without local ownership, communities become further entrenched as consumers rather than empowered as citizens.


### Intermediary Organisations


**Kevin Hernandez** highlighted the critical role of intermediary organisations such as libraries, post offices, and community centres in supporting digital inclusion. He described UPU initiatives to connect every post office to the internet and leverage postal networks for digital inclusion, demonstrating systematic approaches to supporting intermediary organisations.


## Current Implementation Efforts


Several panellists described ongoing initiatives demonstrating practical progress:


**Sophie Maddens** reported that the ITU has launched the first course in Africa for technical promoters at the community level, focusing on capacity building for local network development.


**Claire Sibthorpe** described GSMA’s mobile internet skills training toolkit, which has trained 75 million people across 40 countries, demonstrating the potential for scaling digital literacy interventions.


**Leandro Navarro** introduced device refurbishment and circular economy approaches as potential solutions to device affordability challenges, connecting unused devices with people who need them.


## Fundamental Tensions and Disagreements


### Systemic vs. Technical Solutions


A fundamental disagreement emerged between **Dr. Gillian Marcelle’s** call for addressing the “extractive economic system” as the root cause of digital exclusion and other speakers’ focus on technical, regulatory, and capacity-building solutions within existing frameworks. Marcelle argued that the shift toward deregulation 25 years ago fundamentally changed how telecommunications policy treats people—as consumers in a market rather than citizens with communication rights.


### Measurement Challenges


The disagreement between traditional metrics citing 2.6 billion unconnected people versus meaningful connectivity definitions suggesting 4-4.5 billion people lack adequate digital inclusion highlights fundamental measurement challenges that could undermine policy coordination and resource allocation.


## Multi-Stakeholder Collaboration


**Claire Sibthorpe** emphasised that addressing digital inclusion requires multi-stakeholder collaboration across sectors, as no single entity can solve these challenges alone. **Sophie Maddens** reinforced this perspective, advocating for cross-sectoral collaboration and whole-of-society approaches that integrate digital inclusion with broader development objectives.


The panel grappled with defining appropriate government roles in digital inclusion whilst supporting community-based solutions, acknowledging the tension between state responsibility and community empowerment.


## Unresolved Challenges


Several critical challenges remain unresolved:


– **Scaling Community Solutions**: Moving from small pilot projects to systematic interventions that can address digital inclusion at population level


– **Regulatory Implementation**: Reducing high regulatory transaction costs whilst maintaining quality and security standards


– **Financing Innovation**: Developing financing models specifically designed for smaller operators and social enterprises


– **Wholesale Access Regulation**: Implementing market reviews and wholesale access regulation to reduce dominance and increase competition


## Conclusion


This workshop revealed the complexity and urgency of achieving equitable digital inclusion. **Alison Gillwald’s** closing observation highlighted that “we are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns,” underscoring the life-and-death consequences of digital exclusion.


The discussion demonstrated strong consensus on the inadequacy of current approaches whilst revealing significant disagreements about solutions. The shift from viewing digital exclusion as primarily an infrastructure problem to recognising it as a complex challenge involving device affordability, digital literacy, regulatory barriers, and systemic inequalities represents a fundamental reframing of the issue.


The panel’s emphasis on ecosystem diversity, community ownership, and transformational rather than merely transactional approaches to connectivity suggests that achieving equitable digital inclusion will require innovative policies, financing mechanisms, and collaborative approaches that go well beyond traditional telecommunications sector interventions.


Most significantly, the discussion highlighted the tension between treating people as consumers in a market-driven system versus recognising them as citizens with rights to communication and digital participation. Resolving this tension may be crucial for developing sustainable, equitable approaches to digital inclusion that can address the needs of billions who currently lack meaningful connectivity.


Session transcript

Alison Gillwald: Thank you very much. This is the workshop on Innovative Regulatory Policy Business Strategies to Digital Inclusion, workshop 484. Sorry, we’re just doing a sound test before we start. Want to talk? Hello, hello. Hi. Hello. More, more, more, more, more. Okay.


Carlos Rey-Moreno: Hello. My name is Carlos. I’m very happy to be in Oslo. Okay. Cool.


Claire Sibthorpe: Hi, my name is Claire.


Alison Gillwald: Okay. Good. Right. Good morning, everyone. For those of you who’ve just joined us and are planning to be part of this roundtable discussion, which it is meant to be, please feel free to come up and join the roundtable so that we can involve you in the discussion. If others of you are here for other reasons, of course, please carry on, but for those of you who’d like to come up here and join us, please do. Right. Okay. Well, we’ll start this session, and perhaps just a little bit by way of background is that this session really and I’m going to be talking about the work that’s been done in the context of the G20 under the South Africa’s presidency, which has one of the core pillars, which is being focused on the Digital Economy Working Group, is on equitable digital inclusion. And this very much builds on the previous G20 work done under Brazil, which looked at extending conceptions and measuring meaningful connectivity as developed by the Broadband Commission and the Digital Cooperation Roadmap work that was done, which was looking at issues very much of affordability in addition to universal access at a period of time. And then, of course, the meaningful connectivity as developed by the ITU and CETIC for the Brazilian G20 presidency was very much looking at what you required besides a sort of minimal broadband connection. And so the concept of meaningful connectivity included for, in the Brazilian case, issues of quality, issues of affordability, and then also some acknowledgement from the really extraordinary demand side work that CETIC does across Latin America, but particularly in Brazil, some of the issues of the kind of digital skills, the basic skills that you would need in order to be able to meaningfully access the Internet. So under the South African G20 presidency, the concept of meaningful connectivity has been extended to include some of those out-of-scope factors that the meaningful connectivity work done under the Brazilian presidency was looking at. And those really included what people did online, which are very extensively covered in the African After Access Surveys done by Research ICT Africa. and who is a knowledge partner to the South African government for the G20 and is working with the ITU on extending this conception under the presidency. So there we’re looking at some of the Brazil out of scope issues which include limitations on people’s ability to transact financially. So issues around… Are you able to hear? Are you able to hear? Okay. Issues around being able to, for example, digital inclusion, to transact digitally online, able to be aware of some of the security threats that might exist online, able to effectively protect your data, those kinds of things. So we look at a lot more things than just the connectivity issues, whether you’re able to access government services, whether you have digital ID. It’s a very extensive beyond connectivity survey, although it fulfills all the requirements of the ITU international standards standardization. So the important part of this complementary aspect to that was saying, despite the evidence that we’ve had of these primary demand side constraints, which are attached to affordability, but are not limited only to affordability issues, especially when you’re talking about digital inclusion, not simply connectivity. So the results of the data, both in Brazil and in Southeast Asia, where it’s been done with partners at Learn Asia and across Africa, shows that the main barrier to accessing the internet is the cost of the device. Okay, so that’s within a whole regulatory business model, that cost of that device, as it currently is, and currently regulated, etc., is unaffordable to the majority of Africans. And in fact, little chance of it being affordable under existing conditions. for a lot of the population. The barriers then for data, which are often made as barriers to access, but the barriers to use are then the price of data. But the main barrier is the price of the device. And there are many things one could do to reduce that device, but the question is whether it could be enough to be affordable. But more importantly, what we see is that when even people when people are online or have access to a device, they are unable to use that device very meaningfully. So for example, in our micro enterprise surveys, we see that although a number of people in the South African case, for example, not all across Africa, actually have a smart device, they’re only able to use it for or they only use it for WhatsApp, they’re unable to use this whole array of small business apps that now exist, for example. And so I think the important part of this is that the because these surveys are nationally representative, and we can model them, we can see that the main drivers of internet access and use, the main determinant of whether you’re going to have access and how you’re going to be able to use it, the intensity of use, the scope of use correlates with education. So your level of education, which correlates with income, of course, employment and income, will determine whether you have access to the internet, and the degree to which you’re able to use it meaningfully, or effectively, or optimally. And certainly, whether you can use it for not just transacting that, but for purposes of production or well being of your home, etc. So the main issue that’s been presented with the ongoing work by multilateral organisations within the Broadband Commission and across the UN, is that there is still a focus in addressing the digital divide on issues of connectivity. Current projects is very, very large, multi million euro projects underway that are trying to establish what existing investment is needed to ensure that the last 8% of the population, only 8% of the population aren’t under current mobile broadband coverage. And so the challenge for us is that we’ve got least developed countries throughout Africa, Rwanda, Uganda, Mozambique with above 95% coverage, some of them 99% coverage, and yet they have less than 20% connectivity. So the challenges for many countries is not a supply side challenge, and I am talking just about digital inclusion, so basic level. Of course those economies need to be able to develop 4G and 5G, all sorts of other business things, but in terms of addressing the inclusion problem, some of our challenges have been that we continue to look at costing 4G, 5G infrastructure that’s needed to get universal coverage at a global level, when in fact we could be getting reasonably meaningful connectivity, even at 3G, but arguably 4G, and we have that across many countries, but people are unable, nevertheless, despite having coverage, to use the internet. They either cannot afford it, or they do not have the educational skills to use it meaningfully, and even very often you’re beyond quite basically. So what we are trying with this initiative under the G20, South Africa’s G20 presidency, is to say let’s respond to this now quite large-scale global south evidence that the primary constraints on internet access are demand-side constraints, and start shifting the discussion on the digital divide from a purely connectivity discussion with possibly a little bit of digital skills, digital literacy. That is not going to be sufficient to systemically move countries towards digital equality. So shifting this discussion purely from a connectivity debate to a non-connectivity debate. to actually saying, how do we firstly identify digital inequality, how do we measure it, and what are the policy responses that we need to redress it? And I think this is the sort of fundamental digital equality paradox, this wicked policy problem that we’ve been facing, that the Global Digital Compact tries to address, that multiple rounds of the G20 under India, Brazil, and South Africa’s developing country economies are trying to address, is that actually as we layer these new technologies over existing structural and other inequalities, we are actually amplifying those inequalities. And unlike the old voice and text kind of environment, where one knew that one was doing that between the connected and the unconnected, it’s not only between the connected and unconnected, of course it’s there, but it’s also between those who are barely connected, who are on tiny bits of data, really not meaningfully connected, and those who are able to transact effectively and participate in the economy, seeing as this is a digital economy working group focus, and then of course those who are able to produce using these technologies. So with that longer than intended introduction, let me turn to our panellists here, and of course our wonderful panellists online, which I shall hopefully, are still online, and should have introduced much earlier on, but in the room here we have Carlos Rey Moreno, who is from the APC, from the Association for Progressive Communication, but worked along intersections with various other NPOs over many years in the area of digital inequality and connectivity and inclusion and community networks specifically, but he’s going to talk about new developments around social enterprises today. And then we also have Clare Sipthorpe, who is with the GSMA, and particularly the mobile for development, inclusive development component of that, is going to speak to us about GSMA’s long-standing work in this area and then we’ve got online Steve Song I’m now from the Internet Society I think many of you might have know Steve very well from Mozilla and various other things before and then we also have Dr Gillian Marcelle Marcelle who is joining us I think from from Germany today but usually not and not there who’s a independent consultant but I think many of us will will be known to many of us as working extensively across Africa especially in the very exciting early days of mobile mobile telephony actually initially and then it’s all happened so fast and then of course very much involved with the policy and regulatory initiatives towards getting universal access both at the in within multilateral organizations but also technically advising operators and regulators across the continent so a very exciting team which is finally we’ve joined by Sophie Maddens who works with the ITU and has been very involved with the World Development Telecommunications Conference which you could also update us on who’ve also been preoccupied with the kind of extensive demands on regulators and you know the extended mandates that they’re facing with these rapidly diversifying technologies and the demands that are arising from those so I think we are just going to start off with Sophie telling us a little bit about what the ITU is doing in this area I think she has also been tracking what we’ve been doing within the G20 with the ITU


Sophie Maddens: Thank you, Alison, and good morning everybody, good morning, good afternoon, wherever you are in the world. Alison, if you permit, I’m going to build on your introductory statements, because really you set the scene in a perfect manner, because we all see how digital has and continues to impact all sector and aspects of our lives. So think of e-health, e-agriculture, e-education and e-government services, innovation opportunities for value creation and the skills needed for adoption and the infrastructure for access, because it’s really about access adoption and value creation. That’s what the digital transformation is all about. But we still have 2.6 billion people not connected to the internet. So there is and must be a sense of urgency with all these people still unconnected. And that really is the core of our work, really that sense of urgency to connect the unconnected, but also to make sure that everybody has a meaningful experience through the connectivity. Our concern is as well that the digital divide still persists in many areas, rural areas, urban areas, across income, across gender, across age groups, and there are deep new divides that have emerged for vulnerable groups. So really addressing that demand side is key, because the challenge, it’s not just one of infrastructure development. And of course, as ITU, we work on infrastructure development, but expanding that connectivity is not enough because having access or being online are not sufficient to benefit fully from the connectivity. And today we see deep divides. So we see the risk of creating a multi-speed digital world, as you yourself mentioned, Allison. And so the fear is that a privileged few, those equipped with infrastructure, with skills, with the resources, with the expensive devices, that they are the ones that drive and benefit from AI innovation, while marginalized or vulnerable communities and groups are left behind. And so that’s why that universal and meaningful connectivity, it’s important to consider and address that. And how do we define it? It’s enabling everyone to enjoy a safe, enriching and productive online experience at an affordable cost. It does not mean everybody must be connected all the time, but it describes a situation, as you said, Allison, where anyone can access the internet, but optimally, affordably, whenever and wherever they need. And that also must be an objective of digital policy. So as you said, UMC is built on six interdependent dimensions, quality of the connection, availability for use, affordability of devices, skills and security. And each of these dimensions contribute to that meaningful digital experience and strength, and one cannot compensate for weakness in the other. So UMC has and must continue to be a vital policy objective. And let me highlight one issue here. Data is key to the success of this policy objective, because you cannot fix what you do not know. Achieving UMC also requires a holistic strategy. So we think of infrastructure development, but also policy frameworks, education initiatives, and of course, the multi-stakeholder engagement. And let’s go even further to ensure that no one is left behind, which brings me to digital inclusion, which is that holistic, intersectional approach. are all working together to build a digitally inclusive world for all, regardless of age, gender, ability or geographic location. And that’s why we at ITU are keen to share best practices, foster regional and global collaboration, so that together we can build those inclusive societies, economies and environments. And we provide assistance to our membership to formulate, implement and promote ICT policies and strategies for digital inclusion. And we also work to empower diverse groups, including youth, women and girls, particularly in rural, remote, underserved and unserved areas and communities, but also including older persons like myself, persons with disabilities and persons with specific needs, and of course indigenous people and communities. That to reduce the digital divide and enable everyone to actively participate in the digital world. I’ll leave it at that for now and come back with more thoughts.


Alison Gillwald: Thank you very much for that, Sophie. And we’ll move on to Steve Song to talk about it, just reminding us that in this round we just want to identify what exactly the problem is, your take on what those problems are, and then we’ll move to solutions in the next round. And then also just to, again, invite the audience who want to participate on the roundtable and post questions or just listen closer by, please do feel free to come up and join the conversation. Steve, over to you.


Steve Song: Thanks, Alison. I think we exist at a particularly critical point at the moment in that with two conflicting trends. One is that the growth of access is plateauing, right? And that is… you know, the reason for that is that we’ve connected the parts that are easy and, you know, affordable to connect and that the people can, you know, there’s a business model to sustain connectivity there. The remaining 2.9 billion are going to require a different approach. At the same time, you know, as you mentioned, Alison, you know, telecommunications and the internet is a force multiplier. It’s an amplifier. And so those 2.9 billion people who are unconnected are falling further behind all the time as those with access actually, you know, profit from the benefits of access. So having a strategy now that focuses on the inclusion of everyone is absolutely critical. And I think this points to regulatory issues where we’ve been focused on, you know, promoting competition. Well, that’s still extremely important, but we need to now go beyond competition and have strategies for inclusion. And the existing models, which have been extraordinarily successful to date, especially mobile networks and their growth, you know, remain a tremendously important mechanism for providing affordable access. But there’s limits to how far they can go and what they can do and whether their business models are viable in the most challenging parts of the world. And the way I like to describe this is, you know, if you think of connectivity as a jar you’re trying to fill, you know, in every country there are typically, you know, two or three or four mobile network operators and they’re like stones you’re trying to fit into that jar. And you can fit, you know, three or maybe four stones in that jar and the jar looks full. But, in fact, if you fill that jar with water, still more than 50% of it remains empty. And what is needed now is regulation that actually accommodates those smaller operators, those differently shaped operators, whether they are municipalities or cooperatives or non-profits or national research and education networks that can fill in those shapes in different ways. Another way of explaining this is to say, you know, you think of it like forest management, you know, monocultures have historically been extraordinarily unsuccessful, very vulnerable and not the way to create a healthy ecosystem. In a healthy ecosystem, we want to protect small plants and new growth to create diversity in the ecosystem. And we need to do the same thing with telecommunications and the internet. We need to protect small operators and encourage their growth so that they create different business models, they challenge affordability paradigms and they go where large operators don’t necessarily want to go. I’ll stop there. Thank you.


Alison Gillwald: Thank you so much for that, Steve. I’ve been biting my tongue trying to, since Sophie spoke, to just urge you to look at the paper where we do, applying the universal meaningful connectivity conception, not even our own more extended equitable digital inclusion conception, point out that that 2.6 unconnected in terms of basic connectivity as previously described, in terms of the application of meaningful connectivity, which the G20 under Brazil very courageously looked at Brazil and their universal access figure previously, their internet penetration figures previously above 80%. when they applied the Meaningful Connectivity formula went right down to 20%. So, using again the same extrapolation, yes, 2.6 people unconnected and, as Sophie points out, such bad data that those could be out by, you know, several hundred thousand, possibly millions. But that’s another part of that we are also trying to promote. But that the figure more like the people who are really not digitally included, substantively digitally included, is much closer to 4, you know, 4 billion or 4.5 billion in terms of that definition that we’ve used before and that we are now using in the South African G20 process. So, it’s getting those unconnected but also those not meaningfully connected online. So, Claire, perhaps if you’d come in there because Steve has mentioned some of the limitations, but despite the success of the mobile operators, especially on the African continent, there are some limitations now in reaching those so-called uneconomic areas or subscribers.


Claire Sibthorpe: Yeah, thanks so much, Alison. And I’m going to talk about, you know, obviously from the mobile perspective because that’s, you know, mobile is the primary way most people and often only way most people access the internet. And I think, you know, we also do these country national representative surveys like Research ICT Africa and find exactly the same things as you’re finding. And if we look at the problem, so if in terms of mobile internet, if 57% of the world is now connected to mobile internet, of the unconnected, if you break it down, there’s only 4% who don’t live in areas without coverage, mobile broadband coverage. So, the majority of those, so 39%, which is 90% of the unconnected, live in areas where there’s covered, but they can’t use it. So, if 90% of the people who are not connected, it’s not a coverage issue. It’s the fact that they have other face, other barriers to using it. And the people who are unconnected, and I think we’ve mentioned, it’s been mentioned already, it’s predominantly people in rural areas, people lowering… lower education, lower income, women, people, persons with disabilities. So we, for example, just published our latest mobile gender gap report, which shows that women in low and middle income countries are 14% less likely than men to use the internet. And in fact, that gender gap has stalled. So we’re not seeing, you know, a great deal of progress in that regard. But in our surveys, we look at, you know, why, why are they, why are people not using the internet or not getting online? And then once they’re online, why are they only using it in these very limited ways, as you said? And, you know, our research has similar findings to you. So the biggest barrier to getting online is the affordability of a device. And you mentioned it, you know, also about how it’s, it’s challenging. And I think if you, you know, I was, I’m always struck by the number from Africa, if you, you know, in our analysis, we looked at if you are in the poorest 20% of people living in Africa, in sub-Saharan Africa, you’re, it’s costing 99% of your average monthly income to buy an entry level internet enabled device. So these are, this is a very significant problem that, you know, needs a lot of thought in terms of how to address it. It’s not an easy solution. The other top, there’s two top barriers to getting online is the affordability of device. And the second is literacy and digital skills. And then once people go online, we ask people, what’s stopping you from using it more? Why is it this sort of limited? And in our research, it’s showing again, safety and security concerns become a big issue, affordability, but more of data at this point also emerges. So, you know, we have to, we have to look at the barriers around affordability, skills, relevance of, you know, relevant content and services, safety and security issues. If we’re really going to move the needle and we’re really going to get people online, not just online, but using it to help meet their life, life needs. And it’s sort of, it’s that usage gap. It’s that, that really is where we need to be focusing our efforts to, to really move the needle. And, and like you, it’s, you know, segments like women who are are you know lower income lower education are disproportionately affecting but we’ve also done you know some analysis that looked at if you held um you know the same women and men of the same income education levels you know there would still be for example a gender gap because things like social norms and and these other factors also play so if you’re wanting to you have to consider you know these structural inequalities as well as social norms and some of these these big barriers um and they need um they need we need to think beyond coverage and we need to think you know and we need to think beyond you know a certain single stakeholder as you know and you know how we can address these these barriers as as has been said repeatedly in this panel you know now it’s only exacerbating inequalities and it’s absolutely critical that we we move this needle.


Alison Gillwald: Thank you so much and um as before we carry on I’m just going to ask the audience um particularly to um sort of prime themselves we’ve been talking about and we’ll continue to talk about a lot of um access solutions regulatory strategies to reduce prices issues of affordability but I think you know a lot of this demand side evidence is demonstrating that we can no longer solve this problem with uh siloed sort of sectoral solutions there’s you know we can we can remove taxes from mobile phones we can do a number of things but actually we really need transversal digital policies that will focus on our education challenges these fundamental challenges that we are facing um human development challenges and that you know the um gender questions as have been historically posed which homogenize you know women um really aren’t helping us with policy interventions that really need to be focused at you know women at the intersection of those multiple other inequalities so if you look overall at issues of um sort of rural deficits in terms of access to the internet and you compare it with gender rural is worse off now obviously there’s also a lot of women concentrated in those rural areas But in fact, if you look at some of our data, it’s an issue of the poor and it’s also issues of kind of location and those kinds of things. So if they were actually, you know, they’re poor men who are worse off than urban poor women just because of their proximity. So we really need sort of far more nuanced interventions, but we also need interventions that are way beyond certainly the telecommunication sector, communication sector, the historical sectors that look at this problem. If we can go to Carlos, Carlos, some of the problem setting has been stated, so please do just add to that. But if you’d also just move to what you see as some of the possible solutions that we could deal here on the access side, and then we’re hoping for some really innovative responses on some of the non-access ways in which we can address this problem as well.


Carlos Rey-Moreno: Thank you so much, Alison, and I want to go back to one of the points that you mentioned in the introduction around costing, how much money is needed to close the digital divide from an infrastructure point of view. And I believe there are way too many conversations about costing, how much does it cost to close the digital divide, and I believe we are going to hear a new figure at some point this year, and not that much about how that investment could be used differently, how to enable other models. Also coming from the G20 in Brazil, the Digital Investment Infrastructure Initiative from the ITU and several second-tier development banks stated that stakeholders should think beyond typical for-profit models to cover 70% of the remaining access gaps. So addressing the same actors, considering the same ways of building infrastructure is leading to some part of this inequality that we see, due to the return on investment that they are seeking, due to other practices. as we’ve heard. But it is surprising to also see that the Global Digital Compact is referring to investing in local networks to close the digital divide, right? Because why it happens that some of these local networks are socially driven models that go way beyond the transactional way that we’ve understood the internet so far. Enterprises are transacting for a price, a service that is internet connectivity, period, right? There are these other models based on socially driven intentions, I would say, or bottom lines, social bottom lines or environmental bottom lines, social enterprises that go beyond those transactional models, sorry, those transactional services. They provide social inclusion services, they provide transformational services that at the end of the day create a circular economy, maintain the money locally to develop other small enterprises that develop the local skills required not only to run that particular local network but to run other businesses in the community that contribute to creating culturally relevant content and services using sensor networks, for instance, and that contribute quite significantly to local innovation. We were talking about innovation before. The amount of innovation that can come from the communities and from the rural areas is astonishing, addressing their own community needs and their own problems. Yet education systems are more proposing that those rural people go and contribute to the economies as we see them in urban areas and not to the problems that they are facing locally. So thinking through how that supply and demand meet with this type of interventions that stimulate circular economies locally, I think it’s also a way of thinking about the equitable digital inclusion. that you alluded to also. Thank you.


Alison Gillwald: Thank you so much. We’ll come back to that. Before we go into speaking a little further on some of the solutions, are there any questions from the room as we also try and gather some questions online? I know we’ve got a number of people online. Are there any questions or comments from the room at this point? Okay, Leslie, what do we have online? If we can turn to Peter for that, but also to hear from Dr Gillian Marcelle as well. Yep, yep. Okay, so while we gather some of those online questions, we are also going to ask Dr Gillian Marcelle to come in. Dr Gillian Marcelle, if you could also add to your extensive experience on what some of the problems are, but also move on to what you see as some of the solutions, which I know you’ve put a lot of thought into. Certainly, and thank you so much, Alison, for the invitation to join this panel with so many pioneers.


Dr Gillian Marcelle: Actually, I want to go in a different direction, if I may, because I think it’s important to actually put a theoretical framing on this question of how do we actually achieve equitable digital inclusion, because all of those premises and all of those words actually matter. And in listening to my colleagues, and I was listening very carefully, what I didn’t hear come up is the root causes that lead to exclusion and that lead to inequity. And the root causes, in my view, are the fact that we have an extractive economic system. on which we are then trying to layer demand and supply side solutions. So, to my mind, equitable digital inclusion will be achieved when laws, regulation, policy, ecosystem strengthening, entrepreneurship, finance and investment take place. But if they do within the status quo, then nothing will change. And we will still have what we’ve called the unconnected last mile problems. And we will still be talking about the things that we’ve been talking about for 25 years. And my own work in this area has been, as Alison mentioned, from the policy and regulatory lens, but I was also deeply involved in financing, and not financing at a small scale, but financing from the pioneers of the African telecoms revolution. And I will say that there was innovation at a narrative level in that time, which is now nearly 25 years ago, because when we were making models to look at whether or not investing in Nigeria was a good thing for MTN to do, there was no data. And so when I hear my colleagues talk about the fact that you can’t get reliable information about the cost of a handset, or what you would price data at, that leaves out a fundamental issue, which is risk. We want to encourage the private sector to take risks and to benefit from a return. And so whatever we do from the policy and regulatory domain should not exclude or leave out the fact that some private sector solutions and providers will succeed and others will fail. And there should not be an attempt to stop that from happening under the presumption that that is the way to connect the unconnected. One final point. If a mobile handset like the one I have here is an asset for production and for well-being, there are in existence alternative collateral models for financing things that people need. And so in looking at the things that we need to be doing, not only from a policy and regulatory side in the telecoms or in the tech sector, we also need to be looking at what are the enabling conditions that would allow for a variety of solutions that tackle all of the very good things that I’ve heard from my colleagues, but do not assume that the direction of change is going to be coming from policy and regulatory only. Because that then leaves out a very important engine of change which has been shown to work and I’ll leave it there for now and say a little bit more about what I think needs to be done so that we don’t end up with a digital society that is anywhere like the United States where you’ve had Silicon Valley and Silicon Valley values and norms produce a digital society that is about as toxic as we could possibly imagine. I’ll leave it there for now.


Alison Gillwald: Thank you so much for that Dr Gillian Marcelle. I’m hoping that we’ll get some responses to that. I did want to draw your attention those of you who had a chance to look at the issues paper to indicate that this is not only a policy and regulatory alternatives. We’re looking at alternative business strategies, we’re looking at cooperatives, social enterprises which we’ll come back to. I think we are though looking at some of the public interest policy and regulatory failures that we’ve seen and I think we are looking at new shifts that are acknowledging that despite the enabling conditions that have been created for the extraordinary investments that we’ve seen by mobile networks on the African continent but also now of course fiber networks across the continent. The creation of these conditions prioritized the supply side valuation of resources and really neglected the demand side valuation of resources that would recognize these critical resources as digital public goods and increasingly global digital public goods that require demand side interventions if they are to serve as critical inputs in the economy and to be universally accessible as we require digital public goods to be and so one of the mechanisms that we think is a real travesty in the long theoretical and economic regulatory competition levers that they’re meant to be is you know the market reviews that have barely been conducted on the African continent and the demonstrate the need to assess dominance in markets and effectively remedy that and I think many you know there’s an extraordinary evidence of the impacts of wholesale access regulation in opening up markets that has been got to the point where it’s meant to be implemented and would have changed the environment very very differently to what it is now and through the ethos of creating the certainty for investors and getting the certainty for investors I would argue Dr Gillian Marcelle there’s been you know an open conversation to that they that commercial supply-side assessment spectrum with anything you know that that’s gone without creating the public value the commons aspects of this that would have allowed greater inclusion and I know Steve your work has also focused on this and now not only kind of wholesale you know leased facilities and those kinds of things but of course very importantly with mobile operators in many parts of the continent actually being the dominant operators no longer the old fixed networks your access to API’s that would have just changed this environment entirely and I just wondered if you want to pick up on that.


Steve Song: Yeah I think a wholesale access is increasingly a massive barrier to the development of affordable access typically in many countries it it costs more to transit inside the country via fiber than it does to connect internationally. And there has to be mechanisms for bringing down the cost of backhaul, which is increasingly the highest burden of cost, especially for small operators in terms of operating costs. Things like structural separation, breaking out the backbone from the incumbents and setting it up as a separate company is a great step forward. But I think there are even better things to do. One of my favourite examples is Corus in New Zealand, who is formerly part of the incumbent and was separated out into a backbone network across New Zealand and who have implemented effectively flat pricing across the country. So anywhere you can connect to a Corus network, you can peer at the same price as if you are in the capital city or very close to it. And that’s a huge issue. We see national research and education networks like Tenet, Sanren in South Africa implementing the same thing so that universities connect to their national backbone network at the same price, no matter where they are, whether they’re rural or urban. If you were to implement those strategies across, say, state-owned backbones, you would unlock competition. You would incentivise small operators to deliver services in rural areas where they simply can’t at the moment because of the cost of backhaul.


Alison Gillwald: Thanks very much for that, Steve. Claire, I was wondering if you wanted to come in on the mobile and the regulatory and possibly what alternatives GSMA is looking at addressing these so-called uneconomic areas. If you do have non-technical or sectoral strategies, if you’re actually supporting educational other initiatives, please I highlight those as well.


Claire Sibthorpe: Yeah, as I said in in sort of the opening comment, I think that the biggest issue in terms of connectivity is, is, you know, not the coverage. I mean, obviously, coverage is important, but it’s not only a coverage issue. And on the coverage point, I think, you know, where those areas where it’s not economical for operators to cover, you know, looking at in how they can be covered. And the different models is really important. But I do think that we need to also really look at these, you know, coverages, the data shows coverage is not going to get people connected and using the internet coverage alone. Obviously, coverage is an important prerequisite, but alone, it’s not as I said, 90% of the people are who are not using it are covered. So what we do need to do is address things like affordability of devices. And I think there’s a range of strategies that can be done there. You know, taxation is a big issue, reducing taxation, looking at innovative device financing schemes, looking at subsidy schemes, because, you know, the cost of these devices is not on its own going to get down to the level that the people who are not connected can can afford. So we need to think about that. But literacy and digital skills are also critical. And again, I think that requires, you know, multi stakeholder multi agency intervention. So we need to be building in digital skills, you know, in with across education and training programs of the government across, you know, and, and, you know, and ensuring that those things that those initiative help highlight, you know, how the internet is relevant for different segments. I think a lot of the time we see in our research, people say this is not for me, because they see role in, you know, maybe in the marketing or awareness campaigns role. I mean, urban men and not not necessarily reflecting themselves and their life needs, but also ensuring that those training campaigns build in elements around how to keep yourself safe and secure online and address all those those issues. And I think in terms of the mobile operators, I think first of all I think it can’t be done by one stakeholder, but mobile operators are doing this, so they’re doing a range of device financing, looking at data that they get from their networks as alternative credit scorings to provide device financing, providing a lot of digital skills training. We have, GSME has created a mobile internet skills training toolkit which is a free open source creative commons training content that can be used to provide people the basic skills to get on to use the internet and use it safely. It’s now been used across 40 countries, been trained, I think 75 million people now at least have been trained, so I think we’re trying, because I think we found a lot of the digital skills campaigns are also focused on laptops and tablets, but those are not the devices people are using their hands, and so they weren’t able to translate that training into ways that they could use in their lives, so we’ve tried to address that, some of that gap, but I think it requires interventions by quite a range of people, and I think we need to be focusing on these sort of, as you say, the demand side barriers, and we need to be thinking across stakeholder groups as to how we do that to make sure that we’re really able for people to get online and get online safely and meet and use the internet to meet their life needs.


Alison Gillwald: So thanks very much Claire. Carlos, could you talk to us a little bit about, we’ve spoken about some of the sort of failures, regulatory failures and those sorts of things, but and in regard to some of the more kind of systemic issues around, you know, that would change things at scale around getting greater competition and through wholesale access and driving down prices, but they’ve also been, I mean when Steve was speaking in the beginning about a few big stones or just like, you know, lots of stones, I think as Steve’s often said, you know, let a thousand flowers bloom kind of models, the ability of niche innovations community services, now social enterprises services to break into the system as you know had relatively high regulatory transaction costs and you know what do you see as the key levers there if one accepts that these are actually the way that one can you know address some of the systemic challenges that we’re facing.


Carlos Rey-Moreno: Thank you, thank you so much Alison. Well I think one of it or the most important one is recognition. Recognition and a deep insight into the value of a diverse diversified ecosystem of actors. We see that still there are you know like this mindset of only traditional large operators countrywide operators can solve certain problems and again those are doing great but only contributing or providing services from that transactional perspective that I was alluding to and not entering in the transformational aspect that the internet could bring into this into this aspect. So that would be the one recognition that other actors are needed and that other actors are contributing because when those actors are provided with an enabling regulatory environment well here in Europe for instance where there is a vast array of small operators providing fiber optics wireless you name it even private mobile network mobile networks in certain areas you just need to declare your activity your provision of telecommunication services. In the Philippines you need a congressional franchise the Congress needs to allow you to deploy infrastructure so reducing the regulatory barriers of what do you need to actually start some sort of a business practice whether social or not certainly is gonna allow to for those smallest stones that Steve was alluding to to actually grow and thrill right. I think also touching a bit on what Dr Gillian Marcelle was saying about that we need to establish innovative financing and investment models that allow this small and localised operators to thrill. I have the feeling that in the financial sector, a lot of the interest has been on supporting the interest of capital and not supporting the interest of people. I think 20 years after Wysys, we need to start recognising the financial models to think through or to understand how we can support smaller operators, smaller ticket sizes, understanding what are the needs of those smaller actors, which of course are critical and there are starting to be some very interesting models around this. And lastly, capacity building. We are super proud to have launched last week the first course with the ITU in Africa for technical promoters at the community level after five editions in Latin America. And I think once you have that regulatory frame, once you have the recognition, once you have the regulatory framework, once you have the innovative financing and investment models in place, if enough skills and enough awareness is around for people to take benefit and advantage of this financing and these regulatory interventions, we see this thrilling. In Kenya, there are 20 community networks already and more will come. In Colombia, there are across the same number. In Brazil, there has been a magnificent collaboration with the regulator. There are more than 50, right? So when those things start to appear, more of those diversified actors and local innovation is going to take place to create those other impacts that I was alluding to in relation to circular economies, local innovation and culturally relevant content and services.


Alison Gillwald: Carlos, I suppose some of the scepticism is kind of scaling us. You know, that yes, great to see that capacity building, but how many people have been trained? How many people can be trained? So, you know, what kind of more systematic… opportunities there are. But I think some of the kind of collective response. So if one, you know, enables all of these smaller providers, if one enables different kinds of capacity building, if one gets curriculum, actually, you know, it’s probably more entrenched in curriculums and stuff. Collectively, we could we could see some outcomes. But I think one of the main challenges, one of the things has been around like demand stimulation, that actually for the people now who are not online, big challenges around awareness of the Internet. These are obviously least educated people. And of course, very little local language content for people. So there seems to be a particular role for these social enterprise organizations, community organizations that have are able to also produce content that could stimulate the Internet take up.


Carlos Rey-Moreno: So someone that was said at a session yesterday was in relation to to fair trade. Right. Was in relation to creating the same environment as has been created for social and solidarity economy in other sectors, agriculture, retail, you name it, to to to really reach the scale that there would be enough products and trainings and whatnot. As you were saying, whole of government approach. If this was a course that every pivot in every country would teach how someone could start a small business in that area around telecommunications as they do with agriculture or with retail or with car mechanics or whatever. Certainly you can you can start creating this type of a scale that you were that you were referring to. And the same with with mechanisms, with financing mechanisms. We were talking this morning at a discussion with someone that in Kenya, you need at least 20 percent of interest to pay in 20 percent of interest rates to get a loan for for for for a small operator, because there is not that understanding. There is not that awareness in the financial sector locally that these small operators can actually do any of this. right so that type of financial sector deepening that type of engaging with local financial institutions so they can make available products that are accessible for small operators and small social enterprises in the country would be very much necessary I think for for that side of scale going again to the thousand flowers blooming that Steve was talking about but we need to look at it ecosystemically if it’s three or four philanthropic organizations giving grants here and we’re not going to tackle any problem whatsoever.


Alison Gillwald: And of course you say a whole of government but, I think some of the problems have been is there’s been a lot of investment focus in government and across government but actually what we need is a whole of society kind of approach that hopefully government will play a more active role in creating that public value kind of environment that we want for this I’m hoping we can go on to some questions before we go back to Dr Gillian Marcelle actually Dr Gillian Marcelle’s got her hand up so let’s take Dr Gillian Marcelle’s question Dr Gillian Marcelle’s response while we look Leslie I’m hoping that you can see Peter or can Peter hear me directly okay so if we can just line up some questions Peter and then we’ve got a question fortunately at our very small round table please do come and join us Dr Gillian Marcelle do you want to go ahead and then we’ll take one from the floor and then we’ll go online


Dr Gillian Marcelle: certainly what I wanted to come back to is the issue of dominance and your point about that the and I am assuming that you’re talking about regulatory agencies in developing countries have not taken the opportunity to look at dominance and industry concentration and so on in the tech sector and of course we know exactly why that is the case because so much of what happens and what called the digital space, gets its way of being from what is happening in the United States. And 25 years ago, a decision was made that deregulation and not even applying, Alison, this will be in your wheelhouse, not even applying broadcast regulations to all of these platform companies. So that the zeitgeist saw regulation and public interest, the notion that tech should serve the public interest, shifted. And it shifted 25 years ago. And so we must acknowledge that. Because the reason that we are struggling with Connectivity Plus and so on is because people are being treated like consumers in a neoliberal framing rather than citizens who have the right to communication and the rights to access. 25 years ago, we would be having a different conversation. 25 years ago, we also had pushed the multilateral organizations into recognizing the concepts that you are speaking about, you know, the global commons, telecoms and so on as global public goods. And we need to get back to that. Because if we don’t, and recognize just how far that shift has happened, unlike when Nelson Mandela was saying in 1996, that there are more fixed lines in all of Manhattan, than they are in all of sub-Saharan Africa. Now, what we can say is there are people in the Bronx in New York who cannot get access to internet. So it is the underlying economic system, not even finance. The economic system says you treat people like consumers in a market for profit maximization and then you layer everything on top of that. So that’s what I wanted to come back to because all of the things that we are talking about, market concentration, regulatory capture, the limits of regulatory power, the sort of the meekness of those interventions also come from that shaping of the frame. And there are things that we can do. We should not accept that it’s a foregone conclusion but we must also see from where this has originated as well.


Alison Gillwald: Thank you so much Dr Gillian Marcelle and we have a question from our roundtable. If you’d introduce yourself and then we’ll see somebody standing up there as well. Please if you want to join us, do. Please go ahead.


Audience: Hi, can you hear me? Yes, so I’m Leandro Navarro. I’m coming from an initiative called eReuse and also from APC and I wanted to highlight, because it’s being discussed, when it comes to talking about inclusion, it makes sense to count in let’s say millions or billions, not unconnected, but when it comes to meaningful connectivity probably you don’t find it on the amount of packets, IP packets that you get, but on what you do. What you do, the labels, the value and so forth. But also as it was commented, I mean I haven’t seen anyone connected directly to the internet if they connect to a device. And so, typically, we’ve been looking in community networks or in network infrastructure to the last mile. But I think it’s important to look at the last meter, because the last meter is when the action happens, when the meaningful part occurs. So imagine that we are talking about water. It’s very important to have water. But it depends if I have a glass or if I have a toilet or if I have a swimming pool. It’s completely different. And that is the meaning there. I’m swimming. I’m doing exercise or I’m eating because I have a pot and I’m cooking my food. So you cannot see it on the network layer. So I think it’s important to look at the last meter. And in the last meter, well, there are devices. It’s not the same. I mean, we have been doing projects in which we go to schools in Uganda and we replace mobile phones by laptops because mobile phone is not useful for learning. But a laptop can be. So it makes a big difference. So once we go beyond the challenge of bringing the Internet there, then the next thing is which device is there. And, you know, it’s interesting to see that there are unconnected people, but also there are unused devices. And then regarding affordability, there is this interesting opportunity that there are devices which are no longer used by one owner, but still they have a lot of years of life span. And then, I mean, refurbish them, refurbish them and collecting them and giving them to people that need a device that shouldn’t be the last model in the market can also help. Connecting the unconnected by supplying them unused devices and helping the environment. So, I mean, there are a lot of potential in the last meter and also in creating affordable devices which do not need to be manufactured again. So, well, I think it’s, yeah, it’s been discussed. I think the user device makes a lot of sense, a lot of meaning to the user. Of course, the user has to know what to do with it, but the device is not the same glass than some input.


Alison Gillwald: Thank you so much for that input. I think the importance of connectivity and the device, these are absolutely necessary conditions. So nobody’s saying that these access issues aren’t absolutely critical. I think the device refurbishment is a nice example. I think we have it in the issues paper, but I think it could be. Brazil, for example, has really very interesting examples of recycling within their circular economy policy and practice that are kind of scalable. Because I think in many of our environments, they’ve been little small project here for retraining people or something like that. So kind of getting those, you know, there’s innovation out of constraint that Africa is famous for. Models more effectively working to get the kind of systemic and scaling. I am hoping that the questions, some questions that we got lined up from the thing in here are also going to deal with some of the non-access issues. But please go ahead anyway.


Audience: Hi, so my name is Kevin Hernandez and I work at the Universal Postal Union, which is the UN organization that deals with the postal sector. And my question is specifically about the non-access issues. So I think, and I want to thank all of you for all the solutions that you put forward on this panel. They’ve all been very interesting. And specifically, I want to thank, I don’t know your name, but the person who mentioned something about community-based organizations. Because I think they also play a very critical role in the last mile, not just in connecting people, but also dealing with the immediate risks of digital exclusion. And what do I mean by that? I mean, in the case when someone is not connected and all the services in their country are digitalized and you can no longer access things in person, where do people usually turn to? They usually turn to a library. and they turned to a post office that might be offering the government services and digital financial services or they might turn to an NGO or they might turn into some other community based organization. But I don’t really hear many solutions that are put forward that kind of focus on connecting these intermediaries because these intermediaries play a big role in ensuring that the immediate effects of exclusion are not are not felt today. So we’re not going to we’re not going to connect all the unconnected anytime soon. There are billions of them. So what do we do now to ensure that these kind of intermediaries are not left in a place where they’re left to fend for themselves without any support? We need to also support these intermediaries. And how do we do that? And also, I just want to flag that I work for the UPU and I work for a project that aims to connect every post office to the Internet and leverage them for digital inclusion. So anybody who would like to learn more, you can come and find me. I have some concept notes about our project. Thank you.


Alison Gillwald: Thank you so much for that very useful input. And to say that, of course, a lot of the work that has been done by APC in this area and Mozilla with Steve. But anyway, I think just to emphasize that if the importance of intermediaries hasn’t been highlighted enough, it absolutely should be. And I think when we were talking about some of the high transaction costs for community services and those kinds of things is precisely to enable that kind of intermediary intervention. I think another interesting policy aspect to that, though, the challenge has been not to allow the state to abdicate its responsibilities to, you know, we’ll just let those communities sort out this little kind of minimalist network there or something, but to actively support them as part of programs. And it’s a state’s responsibility to do that and or to ensure that the licensed operator or whatever actually does serve those communities. So I think it’s an important policy debate. And I’m still hoping for some grand strategy. that’s going to solve the underlying human development challenge, so let’s go online and see what we have there. Peter can you hear me? I keep looking at Leslie thinking that he’s got the connection to you, but can you hear me?


Audience: Thank you, yes I can. There was a useful comment from Ramune about another form of intermediary. I quote, local libraries when equipped with sufficient connectivity and computers for public use contribute effectively to digital inclusion of communities they serve. Besides physical access tackling, also digital literacy, online safety and privacy issues, as well as walking people of all ages to digital learning opportunities. So putting that as a question, would you and the panel agree with that, and are there any other of those forms of intermediary like the post office that we just heard about?


Alison Gillwald: Great, so we’ve actually got a minute for each of the panellists, so I’m going to let them respond to each other, which I think some have already done, and then also just to take that last question if you’d like to. Steve, would you like to go ahead?


Steve Song: Thanks Alison. I think there’s a thread here that strikes me as very important. That relates to intermediaries such as post offices and libraries, but also to community networks, and that is the fact that we focus a lot on the capacity building of the consumer, right, to be able to use the network, but we don’t talk as much about the ability to build the network and capacity building to build and own networks. I came across a lovely quote from Richard Feynman, one of the great physicists of the 20th century. He said, what I cannot create, I cannot understand, and I think this is true of the internet, and it gives me pause when I think about solutions like Starlink, which are… The very remarkableness is kind of also their flaw in the sense that when you connect a Starlink dish you just turn it on and it connects to the internet and that’s it. Which is remarkable, but it also means that you don’t know what an IP address is, you don’t know what an autonomous system number is, you don’t know how to build the network and it is a loss of agency and control as a result. So I think that national research and education networks that are building their own fiber backbones, the same potential exists for post offices and libraries not to just receive connectivity but to be involved in the solution, in the provision of connectivity and I think there’s a huge risk when organizations are not involved, when citizens are not involved in that, you get situations such as we see now with AFRINIC, the agency responsible for assigning IP addresses across African countries, is in crisis because in order to participate in AFRINIC you need to be an internet service provider, you need to have an autonomous system number, you need to be an agent of building networks and if we don’t actually focus and invest in that ability to invest, then we’re further becoming, as Julian says, consumers rather than


Alison Gillwald: citizens in this process. Thanks Steve. Carlos, one minute please. No, less than that.


Carlos Rey-Moreno: Well, we live in a diverse world with diverse societies and in many ways the internet has been homogenized in the way that it’s been provided and I think at the center of this solution for equitable digital inclusion we need to embrace the diversity of solutions because Again, as Leandra was saying, like many people will use the internet differently, and talking to what Steve was saying in relation to autonomy, we need to enable the capacity of diverse ways of engaging, building, using, etc. And neither from the investors, nor from the regulators or the ministries, that ecosystem is there to enable and support that diversity, right? The risk is there, people are willing to take the risk, people are willing to do these interventions, but they don’t have an enabling ecosystem.


Alison Gillwald: Thanks very much. Sophie, please, you’ve got like 25 seconds.


Sophie Maddens: All right. Carlos, you gave me a perfect segue, because I’ve heard, I think all of us agree, we need a different mindset, right? So we need a different mindset to close the gap, that difficult gap. But that different mindset needs a different set of tools, skills and processes. So I think it’s not just about policy and regulation, but really that approach and experimenting, right? We need the variety of solutions and being bold enough to be able to experiment. You think of the regulatory sandboxes. So I think agility is key, boldness is key, having the necessary regulatory skills is key. And I think I’ve also heard that cross-sectoral collaboration, right? We need to think, if you think of digital financial inclusion, that’s automatically the working between the sectors. I think all of that is key.


Alison Gillwald: Thank you so much, Sophie, because that was quite a nice summing up for us that we’re not going to have time to do of highlighting some of those issues. We’ve got offline. Claire, if you want to just give us a 10 second response, please do.


Sophie Maddens: Sure. I mean, I guess I think what we’re all alluding to is there’s no one sort of silver bullet, that everything we do needs to be grounded in the realities of the people we’re trying to connect and connect in a meaningful way. And so I think we need and I think also what is critical is not only understanding people’s needs and barriers, but also taking a kind of holistic approach. It’s not about just giving coverage or giving devices. we need to think about skills, relevant content, that ecosystem that Carlos was talking about, enabling that kind of, you know, so we need to be thinking holistically about the barriers and it needs to be grounded in really the needs and barriers of the different communities and it is different, people communities are different and their needs and barriers are different and and thinking about that in that way.


Alison Gillwald: Okay, I think we don’t have a chance, Dr Gillian Marcelle, unless you have a off, we’re off time, but if you want to have a five second, 10 second response, please go ahead. I think you should trust your own instincts,


Dr Gillian Marcelle: Alison, because I think you know exactly how we should re-centre sustainable development into this agenda for what is being called digital inclusion. So thanks again for your leadership.


Alison Gillwald: Well, thank you so much for joining us, Dr Gillian Marcelle, and for all the pioneering work over so many years. My only thing, again, I can’t help myself, yes, Steve, Starlink does come down and you just switch on the internet, but it also doesn’t come free, even though a lot of the discourse is that this is this incredible free service that’s going to provide all, solve all our universality problems. And the other thing I just want to leave us with, with lots of these really important access solutions, but that are not, you know, that are kind of community or collective access solutions, is that should we face another pandemic, which we inevitably will, but if we should face it this month, this year, we are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns. They could not get to community centres, they could not get to libraries and they could not get to schools and they saw the greatest negative outcomes, death, from being unable to mitigate that risk. digitally. So onwards and forwards with these solutions and I’m still looking forward for some of those non-access solutions that we can take forward into the final G20 equitable digital inclusion responding to evidence of demand side constraints. Thank you so much. Thanks to our fabulous panellists and to the audience. Thank you. Thank you. Thank you.


S

Sophie Maddens

Speech speed

145 words per minute

Speech length

961 words

Speech time

396 seconds

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups

Explanation

Sophie Maddens highlights the scale of digital exclusion globally, emphasizing that billions remain without internet access. She notes that digital divides exist across multiple dimensions including geography, economic status, gender, and age, with vulnerable groups facing particularly deep new divides.


Evidence

Specific figure of 2.6 billion unconnected people


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Human rights


Disagreed with

– Alison Gillwald

Disagreed on

Scale and measurement of digital exclusion


Universal meaningful connectivity requires quality, availability, affordability, devices, skills, and security – not just minimal broadband connection

Explanation

Maddens argues that true connectivity goes beyond basic access to include six interdependent dimensions. She emphasizes that meaningful connectivity means enabling everyone to enjoy a safe, enriching and productive online experience at affordable cost, where one dimension cannot compensate for weakness in another.


Evidence

Definition of UMC built on six interdependent dimensions, with each contributing to meaningful digital experience


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Infrastructure


Disagreed with

– Dr Gillian Marcelle
– Claire Sibthorpe
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


People need safe, enriching, and productive online experiences at affordable costs, not just basic connection

Explanation

Maddens defines meaningful connectivity as more than just being online, but rather having access that is optimal, affordable, and available whenever and wherever needed. She argues this should be an objective of digital policy to prevent creating a multi-speed digital world.


Evidence

Definition that meaningful connectivity does not mean everyone must be connected all the time, but describes situation where anyone can access internet optimally and affordably


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Legal and regulatory


Cross-sectoral collaboration is essential, such as between telecommunications and financial sectors for digital financial inclusion

Explanation

Maddens emphasizes that addressing digital inclusion requires working across different sectors rather than in silos. She specifically mentions the need for collaboration between telecommunications and financial sectors to achieve digital financial inclusion.


Evidence

Example of digital financial inclusion requiring cross-sectoral work


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Economic


Agreed with

– Claire Sibthorpe
– Carlos Rey-Moreno

Agreed on

Multi-stakeholder collaboration is essential for digital inclusion


Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches

Explanation

Maddens argues that closing the digital gap requires a different mindset with new tools, skills and processes. She emphasizes the need for regulatory agility, boldness in experimentation, and having necessary regulatory skills to try variety of solutions.


Evidence

Mention of regulatory sandboxes as example of experimental approach


Major discussion point

Innovation and Financing Models


Topics

Legal and regulatory | Development


S

Steve Song

Speech speed

140 words per minute

Speech length

1068 words

Speech time

457 seconds

Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches

Explanation

Song argues that we are at a critical point where access growth is slowing because the easily connectable areas with viable business models have been addressed. The remaining unconnected population will require fundamentally different strategies and approaches to reach them.


Evidence

Specific figure of 2.9 billion people requiring different approach


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Alison Gillwald
– Claire Sibthorpe

Agreed on

Coverage is not the primary barrier to digital inclusion


Disagreed with

– Dr Gillian Marcelle
– Sophie Maddens
– Claire Sibthorpe

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


Current regulatory focus on competition needs to expand to include strategies for inclusion

Explanation

Song contends that while promoting competition remains important, regulatory frameworks must evolve beyond competition to actively address inclusion. He argues that existing mobile network business models have limits in reaching the most challenging parts of the world.


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Development


Telecommunications ecosystems need diversity like healthy forests – protecting small operators and encouraging different business models

Explanation

Song uses forest management as an analogy, arguing that monocultures are vulnerable and unsuccessful. He advocates for protecting small operators and new growth to create diversity in telecommunications ecosystems, allowing different business models that can challenge affordability paradigms and serve areas large operators avoid.


Evidence

Forest management analogy comparing monocultures to diverse ecosystems; jar analogy where mobile operators are like stones that appear to fill the jar but leave 50% empty space


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Legal and regulatory | Economic


Agreed with

– Carlos Rey-Moreno

Agreed on

Need for ecosystem diversity and alternative models


Wholesale access costs often exceed international connectivity costs, creating barriers especially for small operators

Explanation

Song identifies wholesale access as a massive barrier to affordable access development, noting it often costs more to transit within a country than to connect internationally. He argues this creates particularly high operating cost burdens for small operators.


Evidence

Example of Corus in New Zealand implementing flat pricing across the country; Tenet/Sanren in South Africa providing same-price university connections regardless of location


Major discussion point

Regulatory and Market Structure Issues


Topics

Infrastructure | Economic


Capacity building should include not just using networks but building and owning them to maintain agency and control

Explanation

Song argues that focusing only on consumer capacity building while neglecting the ability to build networks results in loss of agency and control. He cites Richard Feynman’s quote ‘What I cannot create, I cannot understand’ to emphasize the importance of understanding network construction.


Evidence

Richard Feynman quote; Starlink example showing remarkable connectivity but lack of understanding of IP addresses, autonomous system numbers; AFRINIC crisis example


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Infrastructure


C

Claire Sibthorpe

Speech speed

200 words per minute

Speech length

1364 words

Speech time

408 seconds

90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage

Explanation

Sibthorpe presents data showing that the vast majority of unconnected people actually have coverage available but cannot use it due to other barriers. She emphasizes that only 4% of unconnected people lack coverage, while 39% (representing 90% of the unconnected) live in covered areas but face usage barriers.


Evidence

Specific statistics: 57% of world connected to mobile internet, only 4% lack coverage, 39% have coverage but can’t use it


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Alison Gillwald
– Steve Song

Agreed on

Coverage is not the primary barrier to digital inclusion


Disagreed with

– Dr Gillian Marcelle
– Sophie Maddens
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


The biggest barrier to internet access is the cost of devices, not data prices

Explanation

Sibthorpe identifies device affordability as the primary obstacle to internet access based on GSMA’s national representative surveys. She argues that while data costs are barriers to increased usage, the initial barrier to getting online is device cost.


Evidence

GSMA surveys finding device affordability as top barrier; literacy and digital skills as second barrier


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Agreed with

– Alison Gillwald

Agreed on

Device affordability is a major barrier to digital inclusion


For the poorest 20% in sub-Saharan Africa, an entry-level internet device costs 99% of average monthly income

Explanation

Sibthorpe provides stark evidence of device unaffordability by showing that the poorest quintile in sub-Saharan Africa would need to spend nearly their entire monthly income on a basic internet-enabled device. This demonstrates the scale of the affordability challenge.


Evidence

Specific statistic: 99% of average monthly income for poorest 20% in sub-Saharan Africa


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Agreed with

– Alison Gillwald

Agreed on

Device affordability is a major barrier to digital inclusion


Literacy and digital skills are the second biggest barrier to getting online after device affordability

Explanation

Sibthorpe identifies digital skills as a major barrier both for initial access and for meaningful usage once online. She notes that safety and security concerns also become significant barriers once people are online, along with data affordability for increased usage.


Evidence

GSMA research showing literacy and digital skills as second top barrier; safety and security concerns emerging for existing users


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Sociocultural


Agreed with

– Sophie Maddens
– Alison Gillwald

Agreed on

Digital skills and education are critical barriers beyond connectivity


Digital skills training must be tailored to mobile devices since those are what people actually use, not laptops and tablets

Explanation

Sibthorpe argues that many digital skills programs focus on devices people don’t actually use, making the training irrelevant to their daily lives. She emphasizes the need for mobile-focused training that people can actually apply.


Evidence

GSMA’s mobile internet skills training toolkit used across 40 countries, training 75 million people; observation that existing campaigns focused on laptops/tablets that people weren’t using


Major discussion point

Skills, Education and Digital Literacy


Topics

Development | Sociocultural


Addressing digital inclusion requires multi-stakeholder collaboration across sectors, not single-stakeholder solutions

Explanation

Sibthorpe emphasizes that the complexity of digital inclusion barriers requires coordinated responses from multiple stakeholders rather than any single organization or sector attempting to solve the problem alone. She advocates for collaborative approaches that address the full range of barriers.


Evidence

Examples of mobile operators doing device financing, digital skills training; GSMA toolkit as multi-country solution


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Legal and regulatory


Agreed with

– Sophie Maddens
– Carlos Rey-Moreno

Agreed on

Multi-stakeholder collaboration is essential for digital inclusion


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches

Explanation

Sibthorpe argues that effective digital inclusion requires understanding that different communities have different needs and barriers. She emphasizes the importance of tailoring solutions to specific community contexts rather than applying universal approaches.


Evidence

Observation that communities are different and their needs and barriers are different


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Sociocultural


A

Alison Gillwald

Speech speed

147 words per minute

Speech length

4590 words

Speech time

1861 seconds

Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem

Explanation

Gillwald presents evidence that coverage is not the primary barrier to connectivity in many African countries. She argues that despite extensive mobile broadband coverage, actual connectivity remains very low, demonstrating that supply-side infrastructure investments alone are insufficient.


Evidence

Examples of Rwanda, Uganda, Mozambique with above 95% coverage, some 99%, but less than 20% connectivity


Major discussion point

Digital Divide and Connectivity Challenges


Topics

Development | Infrastructure


Agreed with

– Claire Sibthorpe
– Steve Song

Agreed on

Coverage is not the primary barrier to digital inclusion


When meaningful connectivity standards are applied, countries like Brazil saw internet penetration drop from 80% to 20%

Explanation

Gillwald explains how applying meaningful connectivity criteria rather than basic access measures reveals much lower actual digital inclusion rates. She uses Brazil’s experience under the G20 presidency to show how meaningful connectivity assessment dramatically changes understanding of digital inclusion levels.


Evidence

Brazil’s universal access figure dropping from above 80% to 20% when meaningful connectivity formula applied


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Legal and regulatory


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions

Explanation

Gillwald argues that current figures of 2.6 billion unconnected significantly underestimate the scale of digital exclusion. When applying meaningful connectivity standards that include not just basic access but substantive digital inclusion, the number of excluded people is much higher.


Evidence

Extrapolation from meaningful connectivity applications in Brazil, Southeast Asia, and Africa showing much higher exclusion numbers


Major discussion point

Meaningful Connectivity vs Basic Access


Topics

Development | Human rights


Disagreed with

– Sophie Maddens

Disagreed on

Scale and measurement of digital exclusion


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment

Explanation

Gillwald presents evidence from nationally representative surveys showing that education is the primary driver of both internet access and the ability to use it meaningfully. She explains how education correlates with income and employment, creating compounding barriers to digital inclusion.


Evidence

Nationally representative After Access Surveys by Research ICT Africa; micro enterprise surveys showing people with smart devices only able to use WhatsApp, not business apps


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Sociocultural


Agreed with

– Sophie Maddens
– Claire Sibthorpe

Agreed on

Digital skills and education are critical barriers beyond connectivity


Even when people have devices, they often can only use them for basic functions like WhatsApp, not for business or productive purposes

Explanation

Gillwald provides evidence that device ownership doesn’t automatically translate to meaningful usage. She shows how people may have smartphones but lack the skills or knowledge to use them for productive activities like running small businesses or accessing various services.


Evidence

South African micro enterprise surveys showing people with smart devices only using WhatsApp, unable to use small business apps


Major discussion point

Demand-Side Barriers and Affordability


Topics

Development | Economic


Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation

Explanation

Gillwald argues that regulatory authorities have failed to conduct necessary market reviews that would identify dominance and enable wholesale access regulation. She contends this represents a significant missed opportunity to increase competition and reduce costs.


Evidence

Reference to theoretical and economic regulatory competition levers and wholesale access regulation that could have changed the environment


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Economic


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights

Explanation

This argument is actually made by Dr Gillian Marcelle, not Alison Gillwald. It should be attributed to Dr Gillian Marcelle.


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Human rights


C

Carlos Rey-Moreno

Speech speed

149 words per minute

Speech length

1401 words

Speech time

561 seconds

Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation

Explanation

Rey-Moreno argues that community networks and social enterprises go beyond simply providing internet access as a commercial transaction. Instead, they create social inclusion services and transformational experiences that build circular economies, maintain money locally, and foster innovation that addresses community-specific needs.


Evidence

Examples of community networks creating circular economies, developing local skills, culturally relevant content, and sensor networks for local innovation


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Development | Economic


Agreed with

– Steve Song

Agreed on

Need for ecosystem diversity and alternative models


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators

Explanation

Rey-Moreno emphasizes that regulatory frameworks need to recognize and support diverse types of network operators beyond traditional large-scale commercial providers. He argues for reducing regulatory barriers that prevent small operators from entering the market and contributing to digital inclusion.


Evidence

Comparison between Europe where operators just need to declare activity versus Philippines requiring congressional franchise; examples of Kenya with 20 community networks, Colombia with similar numbers, Brazil with 50+ networks


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Legal and regulatory | Development


Agreed with

– Steve Song

Agreed on

Need for ecosystem diversity and alternative models


Alternative financing models are needed that support smaller operators and social enterprises rather than just capital interests

Explanation

Rey-Moreno argues that the financial sector has focused on supporting capital interests rather than people’s interests, creating barriers for small and localized operators. He advocates for innovative financing models that understand the needs of smaller actors and provide appropriate support.


Evidence

Example from Kenya where small operators face 20% interest rates due to lack of understanding in local financial sector


Major discussion point

Innovation and Financing Models


Topics

Economic | Development


Disagreed with

– Dr Gillian Marcelle

Disagreed on

Role of private sector and market mechanisms in digital inclusion


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies

Explanation

Rey-Moreno critiques current educational approaches that primarily prepare rural populations to contribute to urban economies rather than addressing local problems and fostering local innovation. He argues for education that builds capacity to solve community-specific challenges.


Evidence

Observation about innovation from communities and rural areas being astonishing when addressing local needs, contrasted with education systems directing people toward urban economies


Major discussion point

Skills, Education and Digital Literacy


Topics

Sociocultural | Development


D

Dr Gillian Marcelle

Speech speed

117 words per minute

Speech length

1012 words

Speech time

518 seconds

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo

Explanation

Dr Marcelle argues that the root causes of digital exclusion and inequity stem from an extractive economic system. She contends that without addressing these fundamental systemic issues, demand and supply side solutions will not achieve equitable digital inclusion and will perpetuate existing problems.


Evidence

Reference to 25 years of discussing the same issues without fundamental change


Major discussion point

Alternative Models and Ecosystem Diversity


Topics

Economic | Development


Disagreed with

– Sophie Maddens
– Claire Sibthorpe
– Steve Song

Disagreed on

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights

Explanation

Dr Marcelle traces current digital inclusion challenges to a fundamental shift in approach 25 years ago, when deregulation policies began treating people as consumers in a market rather than citizens with rights to communication and access. She argues this shift away from public interest regulation has created many current problems.


Evidence

Historical reference to decision not to apply broadcast regulations to platform companies; comparison between current situation and 25 years ago when there was push for telecoms as global public goods


Major discussion point

Regulatory and Market Structure Issues


Topics

Legal and regulatory | Human rights


Risk-taking and innovation should be encouraged in the private sector while ensuring variety of solutions for inclusion

Explanation

Dr Marcelle argues that policy and regulatory approaches should not exclude private sector risk-taking and returns, as some providers will succeed while others fail. She emphasizes that this natural process should not be prevented under the assumption that it helps connect the unconnected.


Evidence

Reference to her experience with financing African telecoms revolution 25 years ago, including work on MTN Nigeria investment models without reliable data


Major discussion point

Innovation and Financing Models


Topics

Economic | Legal and regulatory


Disagreed with

– Carlos Rey-Moreno

Disagreed on

Role of private sector and market mechanisms in digital inclusion


A

Audience

Speech speed

172 words per minute

Speech length

930 words

Speech time

324 seconds

Intermediaries like libraries, post offices, and community organizations play critical roles in supporting those facing immediate digital exclusion

Explanation

An audience member from the Universal Postal Union emphasizes that when people cannot access digitalized services directly, they turn to intermediaries like libraries, post offices, and NGOs. These organizations need support to help address the immediate effects of digital exclusion while broader connectivity solutions are developed.


Evidence

UPU project to connect every post office to internet and leverage them for digital inclusion; mention of libraries equipped with connectivity and computers contributing to digital inclusion


Major discussion point

Multi-Stakeholder and Holistic Approaches


Topics

Development | Infrastructure


Device refurbishment and circular economy approaches can help address affordability by connecting unused devices with those who need them

Explanation

An audience member from eReuse argues that there are many unused devices with years of life remaining that could be refurbished and provided to people who need them but cannot afford new devices. This approach addresses both affordability and environmental concerns.


Evidence

Projects in Uganda replacing mobile phones with laptops in schools; concept of connecting unconnected people with unused devices while helping environment


Major discussion point

Innovation and Financing Models


Topics

Development | Sustainable development


Agreements

Agreement points

Coverage is not the primary barrier to digital inclusion

Speakers

– Alison Gillwald
– Claire Sibthorpe
– Steve Song

Arguments

Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches


Summary

All speakers agree that infrastructure coverage exists in most areas but people cannot access or meaningfully use internet services due to other barriers, indicating that supply-side solutions alone are insufficient


Topics

Development | Infrastructure


Device affordability is a major barrier to digital inclusion

Speakers

– Alison Gillwald
– Claire Sibthorpe

Arguments

The main barrier to accessing the internet is the cost of the device


The biggest barrier to internet access is the cost of devices, not data prices


For the poorest 20% in sub-Saharan Africa, an entry-level internet device costs 99% of average monthly income


Summary

Both speakers identify device costs as the primary financial barrier preventing people from getting online, with specific evidence showing devices are unaffordable for the poorest populations


Topics

Development | Economic


Multi-stakeholder collaboration is essential for digital inclusion

Speakers

– Sophie Maddens
– Claire Sibthorpe
– Carlos Rey-Moreno

Arguments

Cross-sectoral collaboration is essential, such as between telecommunications and financial sectors for digital financial inclusion


Addressing digital inclusion requires multi-stakeholder collaboration across sectors, not single-stakeholder solutions


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators


Summary

All three speakers emphasize that digital inclusion cannot be solved by any single stakeholder or sector, requiring coordinated approaches across multiple actors and sectors


Topics

Development | Legal and regulatory


Digital skills and education are critical barriers beyond connectivity

Speakers

– Sophie Maddens
– Claire Sibthorpe
– Alison Gillwald

Arguments

Universal meaningful connectivity requires quality, availability, affordability, devices, skills and security – not just minimal broadband connection


Literacy and digital skills are the second biggest barrier to getting online after device affordability


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment


Summary

Speakers agree that having access to technology is insufficient without the skills and education needed to use it meaningfully, with education being a fundamental determinant of digital inclusion


Topics

Development | Sociocultural


Need for ecosystem diversity and alternative models

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Telecommunications ecosystems need diversity like healthy forests – protecting small operators and encouraging different business models


Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation


Recognition of diverse actors beyond traditional large operators is needed, along with reduced regulatory barriers for small operators


Summary

Both speakers advocate for diverse telecommunications ecosystems that include small operators, community networks, and alternative business models rather than relying solely on large traditional operators


Topics

Legal and regulatory | Development


Similar viewpoints

Both speakers critique regulatory failures and the shift away from public interest regulation, arguing that current approaches prioritize commercial interests over citizen rights and public value

Speakers

– Alison Gillwald
– Dr Gillian Marcelle

Arguments

Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Topics

Legal and regulatory | Human rights


Both emphasize the importance of local agency, control, and capacity building that empowers communities to create and manage their own solutions rather than being passive consumers

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Capacity building should include not just using networks but building and owning them to maintain agency and control


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies


Topics

Development | Sociocultural


Both advocate for flexible, experimental approaches that can be tailored to specific community needs rather than applying universal solutions

Speakers

– Sophie Maddens
– Claire Sibthorpe

Arguments

Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches


Topics

Legal and regulatory | Development


Unexpected consensus

Limitations of current successful mobile network models

Speakers

– Steve Song
– Claire Sibthorpe
– Alison Gillwald

Arguments

Current regulatory focus on competition needs to expand to include strategies for inclusion


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Many African countries have 95-99% coverage but less than 20% connectivity, indicating supply-side solutions aren’t addressing the core problem


Explanation

Despite mobile networks being extraordinarily successful in expanding coverage across Africa, all speakers acknowledge their limitations in reaching universal inclusion, which is unexpected given the typical celebration of mobile success stories


Topics

Development | Infrastructure


Need for systemic rather than sectoral solutions

Speakers

– Dr Gillian Marcelle
– Alison Gillwald
– Carlos Rey-Moreno

Arguments

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo


Main determinants of internet access and meaningful use correlate with education level, which correlates with income and employment


Social enterprises and community networks provide transformational services beyond transactional connectivity, creating circular economies and local innovation


Explanation

There is unexpected consensus that digital inclusion requires addressing fundamental economic and social structures rather than just technological or sectoral interventions, suggesting a more radical approach than typically discussed in telecommunications policy


Topics

Economic | Development


Overall assessment

Summary

Strong consensus exists on core challenges (coverage vs. meaningful access, device affordability, need for skills) and the inadequacy of current approaches. Speakers agree on the need for multi-stakeholder collaboration, ecosystem diversity, and moving beyond traditional telecommunications solutions.


Consensus level

High level of consensus with significant implications for policy direction. The agreement suggests a paradigm shift is needed from supply-side infrastructure focus to demand-side, holistic approaches that address education, affordability, and systemic inequalities. This consensus among diverse stakeholders (ITU, GSMA, civil society, academia) indicates potential for coordinated policy action, though implementation challenges remain significant given the systemic nature of required changes.


Differences

Different viewpoints

Primary focus for addressing digital inclusion – infrastructure vs systemic economic change

Speakers

– Dr Gillian Marcelle
– Sophie Maddens
– Claire Sibthorpe
– Steve Song

Arguments

The underlying extractive economic system needs to be addressed rather than just layering demand and supply solutions on the status quo


Universal meaningful connectivity requires quality, availability, affordability, devices, skills, and security – not just minimal broadband connection


90% of unconnected people live in areas with mobile broadband coverage but face other barriers to usage


Growth of internet access is plateauing as we’ve connected the easy parts, leaving 2.9 billion requiring different approaches


Summary

Dr Marcelle argues for fundamental economic system change as the root solution, while other speakers focus on technical, regulatory, and capacity-building approaches within existing frameworks


Topics

Economic | Development | Legal and regulatory


Role of private sector and market mechanisms in digital inclusion

Speakers

– Dr Gillian Marcelle
– Carlos Rey-Moreno

Arguments

Risk-taking and innovation should be encouraged in the private sector while ensuring variety of solutions for inclusion


Alternative financing models are needed that support smaller operators and social enterprises rather than just capital interests


Summary

Dr Marcelle supports private sector risk-taking and natural market processes including failures, while Rey-Moreno criticizes financial sector focus on capital interests over people’s interests


Topics

Economic | Development


Scale and measurement of digital exclusion

Speakers

– Sophie Maddens
– Alison Gillwald

Arguments

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions


Summary

Significant disagreement on the actual scale of digital exclusion, with Gillwald arguing the problem is much larger when meaningful connectivity standards are applied


Topics

Development | Human rights


Unexpected differences

Historical framing and root cause analysis

Speakers

– Dr Gillian Marcelle
– Other panelists

Arguments

The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Various technical and policy solutions focused on current barriers


Explanation

Dr Marcelle’s historical analysis of deregulation 25 years ago as the root cause was unexpected given other speakers’ focus on current technical and policy solutions. This fundamental disagreement about whether to address historical policy shifts or current barriers represents a deeper philosophical divide about reform vs revolution approaches


Topics

Legal and regulatory | Human rights


Data reliability and measurement challenges

Speakers

– Sophie Maddens
– Alison Gillwald

Arguments

2.6 billion people remain unconnected to the internet, with deep divides persisting across rural/urban, income, gender, and age groups


The real number of people not digitally included is closer to 4-4.5 billion when using meaningful connectivity definitions


Explanation

The significant disagreement on basic statistics about digital exclusion was unexpected among experts working on the same issues. This suggests fundamental measurement and definitional challenges that could undermine policy coordination


Topics

Development | Legal and regulatory


Overall assessment

Summary

The discussion revealed moderate to significant disagreements on fundamental approaches (systemic change vs technical solutions), measurement of the problem scale, and the role of market mechanisms, while showing convergence on the need for diverse solutions and multi-stakeholder approaches


Disagreement level

The disagreements are substantial enough to potentially impact policy coordination and resource allocation, particularly the 2.6 billion vs 4-4.5 billion measurement gap and the fundamental divide between reform-oriented technical solutions versus systemic economic transformation approaches. However, the shared recognition of demand-side barriers and need for innovation provides common ground for collaborative action.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers critique regulatory failures and the shift away from public interest regulation, arguing that current approaches prioritize commercial interests over citizen rights and public value

Speakers

– Alison Gillwald
– Dr Gillian Marcelle

Arguments

Market reviews and dominance assessments have barely been conducted on the African continent, missing opportunities for wholesale access regulation


The shift toward deregulation 25 years ago treated people as consumers rather than citizens with communication rights


Topics

Legal and regulatory | Human rights


Both emphasize the importance of local agency, control, and capacity building that empowers communities to create and manage their own solutions rather than being passive consumers

Speakers

– Steve Song
– Carlos Rey-Moreno

Arguments

Capacity building should include not just using networks but building and owning them to maintain agency and control


Educational systems should focus on local innovation and community problem-solving rather than just preparing rural people for urban economies


Topics

Development | Sociocultural


Both advocate for flexible, experimental approaches that can be tailored to specific community needs rather than applying universal solutions

Speakers

– Sophie Maddens
– Claire Sibthorpe

Arguments

Regulatory sandboxes and experimentation are needed along with agility and boldness in trying different approaches


Solutions need to be grounded in the realities and specific needs of different communities rather than one-size-fits-all approaches


Topics

Legal and regulatory | Development


Takeaways

Key takeaways

The digital divide is primarily a demand-side problem rather than a supply-side connectivity issue, with 90% of unconnected people living in areas with mobile broadband coverage but facing other barriers


Device affordability is the biggest barrier to internet access, with entry-level devices costing 99% of monthly income for the poorest 20% in sub-Saharan Africa


Meaningful connectivity requires six interdependent dimensions: quality, availability, affordability, devices, skills, and security – not just basic connection


When meaningful connectivity standards are applied, the number of truly digitally excluded people is closer to 4-4.5 billion rather than the commonly cited 2.6 billion


Education level is the main determinant of internet access and meaningful use, correlating with income and employment opportunities


A diverse telecommunications ecosystem is needed, similar to forest management, with small operators, cooperatives, and social enterprises filling gaps that large operators cannot address economically


Current regulatory frameworks focus too heavily on competition and need to expand to include specific strategies for digital inclusion


The shift toward treating people as consumers rather than citizens with communication rights has contributed to current exclusion patterns


Multi-stakeholder, cross-sectoral collaboration is essential, as no single entity can solve digital inclusion challenges alone


Resolutions and action items

ITU launched the first course in Africa for technical promoters at the community level for capacity building


GSMA created a mobile internet skills training toolkit (Creative Commons) that has trained 75 million people across 40 countries


Universal Postal Union is implementing a project to connect every post office to the Internet and leverage them for digital inclusion


Continued work under South Africa’s G20 presidency to extend meaningful connectivity concepts to include equitable digital inclusion measures


Development of innovative financing models specifically designed for smaller operators and social enterprises rather than traditional capital-focused approaches


Unresolved issues

How to achieve systematic scaling of community networks and social enterprises beyond small pilot projects


Lack of reliable data for measuring digital inclusion progress and device affordability across different regions


High regulatory transaction costs that prevent smaller operators and community services from entering markets


Wholesale access regulation implementation failures across African continent, missing opportunities to reduce backhaul costs


How to address the fundamental ‘extractive economic system’ that underlies digital inequality without just layering solutions on existing structures


Ensuring state responsibility for universal access while supporting community-based solutions without allowing government abdication of duties


Preparing for future pandemic scenarios where collective access solutions (libraries, community centers) may be inaccessible


Suggested compromises

Balancing private sector risk-taking and profit incentives with public interest requirements for digital inclusion


Combining large operator efficiency with small operator innovation through regulatory frameworks that accommodate both


Integrating device refurbishment and circular economy approaches with new device manufacturing to address affordability


Using intermediaries like libraries and post offices to bridge immediate digital exclusion while working toward long-term connectivity solutions


Implementing regulatory sandboxes that allow experimentation with new models while maintaining necessary oversight


Developing whole-of-society approaches that include but don’t rely solely on government intervention


Thought provoking comments

The main barrier to accessing the internet is the cost of the device… But more importantly, what we see is that when even people when people are online or have access to a device, they are unable to use that device very meaningfully.

Speaker

Alison Gillwald


Reason

This comment fundamentally reframes the digital divide discussion by distinguishing between basic connectivity and meaningful use. It challenges the prevailing focus on infrastructure by highlighting that even those with access often cannot use devices effectively due to educational constraints.


Impact

This set the foundational framework for the entire discussion, shifting focus from supply-side (infrastructure) to demand-side constraints. It established the conceptual foundation that other panelists built upon throughout the session.


If you think of connectivity as a jar you’re trying to fill… in every country there are typically two or three or four mobile network operators and they’re like stones you’re trying to fit into that jar… But, in fact, if you fill that jar with water, still more than 50% of it remains empty.

Speaker

Steve Song


Reason

This metaphor brilliantly illustrates why traditional approaches to connectivity are insufficient. It demonstrates how dominant operators, while successful, cannot address the full scope of connectivity needs, making a compelling case for ecosystem diversity.


Impact

This metaphor became a recurring theme, with other speakers referencing the need for diverse solutions and smaller operators. It shifted the conversation toward regulatory frameworks that could accommodate different types of service providers.


I want to go in a different direction… because I think it’s important to actually put a theoretical framing on this question… what I didn’t hear come up is the root causes that lead to exclusion and that lead to inequity. And the root causes, in my view, are the fact that we have an extractive economic system.

Speaker

Dr Gillian Marcelle


Reason

This comment introduced a critical systems-level analysis that challenged the panel to think beyond technical and policy solutions to examine underlying economic structures. It brought historical context and questioned whether incremental solutions could address fundamental inequities.


Impact

This intervention elevated the discussion from tactical solutions to strategic systemic analysis. It prompted other speakers to acknowledge broader structural issues and influenced the conversation toward considering alternative economic models and the need for transformational rather than just transactional approaches.


There are these other models based on socially driven intentions… social enterprises that go beyond those transactional models… They provide social inclusion services, they provide transformational services that at the end of the day create a circular economy, maintain the money locally.

Speaker

Carlos Rey-Moreno


Reason

This comment introduced the crucial distinction between transactional and transformational approaches to connectivity, highlighting how community-based models can address multiple development challenges simultaneously rather than just providing internet access.


Impact

This shifted the discussion toward holistic, community-centered solutions and influenced subsequent conversations about capacity building, local innovation, and the need for regulatory frameworks that support diverse business models.


What I cannot create, I cannot understand… there’s a huge risk when organizations are not involved, when citizens are not involved in that, you get situations… we’re further becoming consumers rather than citizens in this process.

Speaker

Steve Song


Reason

This philosophical insight, referencing Richard Feynman, highlighted the importance of agency and ownership in digital inclusion. It challenged the passive consumer model and emphasized the need for communities to be involved in building, not just receiving, connectivity solutions.


Impact

This comment deepened the discussion about empowerment and self-determination, influencing the conversation toward capacity building for network creation and the importance of technical literacy beyond just usage skills.


We are not going to be any better off than we were, where the last pandemic put the majority of Africans at risk who were unable to digitally substitute both for the health risk and of course the economic risks associated with lockdowns.

Speaker

Alison Gillwald


Reason

This closing comment provided urgent real-world context that demonstrated the life-and-death consequences of digital exclusion. It moved the discussion from abstract policy considerations to concrete human impact, emphasizing the urgency of meaningful connectivity solutions.


Impact

This served as a powerful conclusion that reinforced the entire discussion’s importance and urgency, connecting all the theoretical and policy discussions back to immediate human needs and survival.


Overall assessment

These key comments fundamentally shaped the discussion by progressively deepening and broadening the analysis of digital inclusion challenges. The conversation evolved from identifying problems (device affordability, meaningful use barriers) to proposing systemic solutions (diverse operator ecosystems, community networks) to examining root causes (extractive economic systems) and ultimately connecting back to urgent human needs (pandemic preparedness). The most impactful comments challenged conventional thinking – moving from infrastructure-focused to demand-side approaches, from consumer to citizen models, and from transactional to transformational frameworks. This created a rich, multi-layered discussion that addressed technical, economic, social, and political dimensions of digital equity, with each major intervention building upon previous insights to create a comprehensive analysis of both problems and potential solutions.


Follow-up questions

How can we systematically scale community networks and social enterprises beyond small pilot projects to achieve meaningful impact?

Speaker

Alison Gillwald


Explanation

There is skepticism about scaling community-based solutions from small training programs to systematic interventions that can address digital inclusion at a population level.


What innovative financing models can support small and localized operators with smaller ticket sizes?

Speaker

Carlos Rey-Moreno


Explanation

Current financial sector models focus on supporting capital interests rather than people’s interests, and there’s a need for innovative financing that understands the needs of smaller actors in telecommunications.


How can we create enabling regulatory environments that reduce barriers for small operators while maintaining quality and security standards?

Speaker

Carlos Rey-Moreno


Explanation

Different countries have vastly different regulatory requirements for telecommunications operators, from simple declarations in Europe to congressional franchises in the Philippines, affecting the ability of small operators to enter the market.


What are the most effective wholesale access regulation models that can be implemented to reduce dominance and increase competition?

Speaker

Alison Gillwald and Steve Song


Explanation

Market reviews have barely been conducted on the African continent, and wholesale access regulation could significantly change the competitive environment and reduce costs, especially for backhaul.


How can we better support intermediary organizations like libraries, post offices, and community centers in their role as digital inclusion facilitators?

Speaker

Kevin Hernandez (UPU representative)


Explanation

These intermediaries play a critical role in helping unconnected people access digital services, but there’s insufficient focus on connecting and supporting these organizations.


What capacity building programs are needed to enable communities to not just use but also build and own networks?

Speaker

Steve Song


Explanation

There’s too much focus on training consumers to use networks but not enough on building capacity for communities to create, understand, and control their own network infrastructure.


How can device refurbishment and circular economy models be scaled to address device affordability systematically?

Speaker

Leandro Navarro


Explanation

There are unused devices with years of lifespan remaining that could be refurbished and provided to those who need them, but this needs to move beyond small projects to systematic solutions.


What transversal digital policies are needed that go beyond telecommunications to address fundamental education and human development challenges?

Speaker

Alison Gillwald


Explanation

Siloed sectoral solutions are insufficient; there’s a need for policies that address the intersection of digital inclusion with education, gender equality, rural development, and other structural inequalities.


How can we shift from treating people as consumers in a market to recognizing them as citizens with rights to communication and access?

Speaker

Dr Gillian Marcelle


Explanation

The fundamental economic system treats people as consumers for profit maximization rather than citizens with rights, which affects how digital inclusion policies are framed and implemented.


What alternative business models beyond traditional for-profit approaches can address the remaining 70% of access gaps?

Speaker

Carlos Rey-Moreno


Explanation

The G20 Digital Investment Infrastructure Initiative noted that stakeholders should think beyond typical for-profit models, but there’s insufficient exploration of what these alternative models look like in practice.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

WS #139 Internet Resilience Securing a Stronger Supply Chain

WS #139 Internet Resilience Securing a Stronger Supply Chain

Session at a glance

Summary

This workshop focused on Internet resilience and securing a stronger supply chain, hosted by the Marconi Society’s Internet Resilience Institute at the Internet Governance Forum. Vint Cerf opened the discussion by emphasizing how society’s increasing dependence on the Internet, particularly with AI applications, makes resilience critical, highlighting the importance of supply chain provenance and the integrity of open source software components. Ram Mohan outlined four key challenges to Internet resilience: increasing system complexity with hidden interdependencies, intensifying regulatory pressures creating friction between technical operators and governments, insufficient funding for preventive measures, and supply chain vulnerabilities in software.


Olaf Kolkman illustrated these vulnerabilities through practical examples, showing how complex systems like food delivery depend on Internet connectivity and how backup systems like diesel generators can fail due to overlooked details like fuel management. Anriette Esterhuysen provided a Global South perspective, describing how Internet resilience creates a two-tier system where wealthy individuals and institutions can invest in backup solutions while ordinary users must manage disruptions themselves with multiple SIM cards and batteries. The panel discussed ongoing mapping efforts led by Fiona Alexander to trace Internet packet paths and identify all actors and dependencies in the supply chain ecosystem.


John Crain from ICANN explained how the domain name system has evolved from 13 root servers to 2,000 locations globally through strategic investment in resilience infrastructure. Manal Ismail emphasized the vital role of governments in promoting resilient networks while embracing multi-stakeholder approaches for effective Internet governance. Mark Nottingham shared real-world experiences from Cloudflare, demonstrating how even well-engineered systems with redundancies can fail catastrophically, requiring continuous improvement and transparency about failures. The discussion concluded with recognition that Internet resilience requires cross-sector collaboration, proactive investment, and systemic thinking rather than reactive problem-solving.


Keypoints

## Major Discussion Points:


– **Internet Infrastructure Dependencies and Vulnerabilities**: The discussion emphasized how the internet has become critical infrastructure that society depends on, yet it relies on complex interdependencies (power, water, physical infrastructure) that create single points of failure and cascading risks when disrupted.


– **Supply Chain Security and Provenance**: Speakers highlighted the importance of understanding where internet components come from, particularly open source software libraries, and ensuring their integrity through proper documentation, digital signatures, and tracking of the “bill of materials” used in internet services.


– **Global Inequality in Internet Resilience**: The conversation addressed how internet resilience is unevenly distributed globally, with developed regions having better backup systems and recovery capabilities, while users in the Global South often must create their own workarounds (multiple SIM cards, batteries, etc.) with little communication about outages.


– **Cross-Sector Collaboration Challenges**: Panelists discussed the need for enhanced collaboration between different sectors (internet providers, power companies, governments, etc.) that currently operate in silos, each assuming other critical infrastructure will remain available during their own backup planning.


– **Mapping and Understanding Internet Ecosystem**: The discussion covered ongoing efforts to create comprehensive maps of internet infrastructure dependencies, following the path of IP packets to identify all the actors, institutions, and systems involved in internet connectivity.


## Overall Purpose:


The workshop aimed to raise awareness about internet resilience as a critical global challenge and to foster collaboration across sectors, disciplines, and geographies. The Marconi Society’s Internet Resilience Institute convened experts to discuss current vulnerabilities, develop solutions for supply chain security, and create actionable frameworks for improving internet stability and reliability.


## Overall Tone:


The discussion maintained a serious, urgent tone throughout, with speakers emphasizing that internet resilience is not just a technical issue but a societal and economic imperative. The tone was collaborative and solution-oriented, with experts sharing practical experiences and failures alongside theoretical frameworks. While there were moments of levity (jokes about construction noise, coffee needs for early morning participants), the underlying message remained consistently grave about the potential consequences of internet infrastructure failures. The conversation became more concrete and practical as it progressed from theoretical frameworks to real-world examples and mapping exercises.


Speakers

**Speakers from the provided list:**


– **Moderator (Pablo)** – Supporting the Marconi Society’s Internet Resilience Institute, session moderator


– **Vinton Cerf (Vint)** – Internet pioneer, helping to set the scene for the workshop


– **Ram Mohan** – Digital identity expert, discussing current state of internet resilience


– **Olaf Kolkman** – Internet Society, presenting on system complexity and resilience challenges


– **Anriette Esterhuysen** – Former MAG Chair and APC, discussing Global South perspective on internet resilience


– **Fiona Alexander** – American University, leading internet resiliency mapping exercise and supply chain analysis


– **John Crain** – CTO of ICANN, participating remotely, discussing unique identifiers and DNS resilience


– **Manal Ismail** – From Egypt regulator, former Chair of the Governmental Advisory Committee of ICANN, discussing governmental role in internet resilience


– **Mark Nottingham** – Cloudflare and IETF, sharing real-world experience with internet infrastructure resilience


– **John Janowiak** – President and CEO of the Marconi Society, providing closing remarks


– **Paticipant** – Multiple audience members asking questions (appears to be a generic label for various participants)


**Additional speakers:**


– **Qusayr Shati** – From Kuwait, asking questions about safety and security of internet infrastructure


– **Mallory** – Audience member asking questions about political economy and capitalism’s role in internet resilience


– **Juan** – Audience member asking about economics and revenue flow in internet infrastructure (referenced by Fiona but not explicitly identified in transcript)


Full session report

# Internet Resilience and Supply Chain Security: Workshop Report


## Executive Summary


The Marconi Society’s Internet Resilience Institute convened a workshop at the Internet Governance Forum focused on internet infrastructure resilience and supply chain security. The session brought together experts from across the internet ecosystem to discuss growing vulnerabilities in our internet-dependent society. Despite construction noise and logistical challenges, the interactive workshop revealed that internet resilience has evolved from a technical concern to a fundamental societal imperative requiring unprecedented collaboration across sectors and geographies.


The discussion was structured in three blocks: foundational presentations on internet dependence and system complexity, perspectives from different stakeholder communities, and audience questions that explored economic sustainability, physical security, and systemic challenges. Key themes included cascading failures from hidden interdependencies, regulatory tensions between technical and governmental approaches, chronic underfunding of preventive measures, and supply chain vulnerabilities.


## Opening Framework: Critical Internet Dependence


Vinton Cerf established the foundational framework by highlighting society’s profound dependence on internet infrastructure. “The implication of dependence is that when it doesn’t work there are all kinds of consequences,” Cerf observed, noting that artificial intelligence applications are further intensifying this dependence.


Cerf introduced “provenance” as a central concern – understanding where internet components originate and ensuring their integrity. He emphasized the importance of documenting supply chains, particularly for open source software libraries, and ensuring their integrity through digital signatures and comprehensive “bill of materials” tracking.


## System Complexity and Hidden Dependencies


Ram Mohan identified four interconnected challenges threatening internet stability: increasing system complexity with hidden interdependencies, regulatory pressures creating friction between technical operators and governments, insufficient funding for preventive measures, and supply chain vulnerabilities.


He highlighted dangerous circular assumptions where power companies assume internet availability for communications while internet providers assume reliable power supplies. “We have a systematic bias towards reactive rather than proactive resilience strategies,” Mohan noted, explaining how organizations struggle to secure investment for prevention while post-incident responses receive adequate funding.


Olaf Kolkman from the Internet Society illustrated these complexities with concrete examples. His most memorable anecdote involved a data center with backup diesel generators tested monthly for two hours, but during an actual emergency lasting longer, “the generators failed after five hours because operators had forgotten to refuel the diesel tanks.” He noted this was a case he knew of, demonstrating how human factors can undermine technical systems.


Kolkman explained how seemingly simple services like food delivery actually depend on complex internet connectivity – requiring not just the delivery app but payment processing, GPS navigation, restaurant systems, and driver communications. He advocated for risk-based thinking that identifies coupled risks and cascade effects.


## Stakeholder Perspectives


### Global South and Equity Concerns


Anriette Esterhuysen brought crucial equity considerations, highlighting how internet resilience creates a two-tier system. In many Global South countries, internet resilience operates “like an act of God” for ordinary users who receive no advance warning, no recovery timelines, and no institutional support during outages.


Users develop their own coping mechanisms – maintaining multiple SIM cards, carrying backup batteries, creating informal information networks. This contrasts with wealthy users who can invest in backup connections and redundant systems. Esterhuysen challenged narrow technical definitions of resilience, arguing that physical transmission infrastructure should be included in resilience planning.


### DNS Infrastructure Lessons


John Crain from ICANN, participating remotely, discussed DNS resilience as a model for critical infrastructure. The DNS root system has evolved from 13 original systems to “roughly 2,000 locations globally” through systematic investment. This demonstrates how proactive resilience planning can scale critical systems while maintaining stability.


Crain emphasized that resilience requires continuous improvement as the internet grows, and that global coordination and policy frameworks are essential for managing critical internet functions.


### Government Role and Regulation


Manal Ismail addressed the complex governmental role in promoting resilience, outlining approaches ranging from awareness-building to mandated requirements. She emphasized that effective government involvement requires understanding both technical realities and policy frameworks needed to support resilience investments.


Multi-stakeholder approaches emerged as essential for balancing competing interests. Government responsibilities extend beyond regulation to promoting investment in redundant networks and developing national digital resilience strategies, coordinated internationally since resilience cannot be achieved within national boundaries alone.


### Industry Implementation Challenges


Mark Nottingham from CloudFlare provided front-line operational perspectives, explaining that the internet is “inherently unreliable” and appears reliable only through multiple layers of abstraction and redundancy. Even well-resourced organizations with extensive engineering expertise face unexpected failures from unanticipated system interactions.


Nottingham described recent CloudFlare incidents, including a “Code Orange” event and another incident “about a week ago,” emphasizing the importance of learning from failures and sharing lessons across the industry. He noted that many resilience problems require industry-wide coordination rather than individual company solutions.


### Infrastructure Mapping Efforts


Fiona Alexander described ongoing efforts to map internet infrastructure dependencies by following IP packet paths through the entire ecosystem. The working group is developing these maps collaboratively, with plans for a first draft and subsequent iterations examining specific sectors like energy infrastructure.


Alexander noted that traditional telecommunications models are inadequate for understanding internet infrastructure, explaining that applying historical telephone accounting rate models to internet infrastructure would “fundamentally break the system.”


## Audience Questions and Broader Challenges


The interactive session included several significant questions that expanded the discussion:


**Business Continuity Strategy**: Nandifa Natsaluba asked online about business continuity strategies, prompting discussion of how organizations prepare for internet disruptions.


**Economic Sustainability**: Juan raised detailed questions about international charging arrangements and revenue flows, arguing that shifts away from traditional telephone models had eliminated crucial revenue flows to developing countries. This generated debate about whether current business models support long-term infrastructure sustainability.


**Physical Security in Conflict**: Qusayr Shati asked about infrastructure safety and security in conflict zones, highlighting how internet infrastructure becomes both target and casualty in warfare.


**Systemic Transformation**: Mallory posed a provocative question about whether meaningful resilience progress requires addressing broader systemic issues like capitalism and global power structures, rather than just technical solutions.


## Key Tensions and Unresolved Issues


The workshop revealed several ongoing tensions:


– **Scope of Resilience**: Disagreement about whether physical transmission infrastructure should be universally considered part of internet resilience


– **Economic Models**: Debate about whether current business models and revenue distribution threaten long-term sustainability


– **Systemic vs. Technical Approaches**: Tension between holistic approaches addressing broader infrastructure issues versus achievable technical solutions


– **Regulatory Timelines**: Friction between government demands for immediate solutions and technical communities’ iterative improvement processes


## Next Steps and Action Items


John Janowiak concluded by outlining concrete next steps:


– The working group will produce a first draft of the internet resilience supply chain map by their November meeting


– Participants were encouraged to download the Internet Resilience Report from the Marconi Society website


– Those interested can join the Internet Resilience Advisory Council to contribute to ongoing mapping efforts


– Future mapping iterations will examine specific sectors, beginning with energy and power infrastructure


## Conclusion


The workshop demonstrated that internet resilience challenges are interconnected and require systematic thinking beyond traditional technical boundaries. While participants agreed on fundamental challenges – complex interdependencies, cascading failures, and the need for cross-sector collaboration – disagreements about scope, approach, and solutions reflect the complexity of achieving resilience in practice.


The session’s interactive nature, despite physical challenges including construction noise, illustrated both the collaborative spirit needed for resilience work and the practical difficulties of coordination. The mapping exercise and ongoing collaboration provide concrete mechanisms for translating insights into actionable improvements, recognizing that internet resilience has become a societal imperative requiring sustained commitment across technical, policy, and social domains.


Session transcript

Moderator: Hello, how are you? It is really an honor to welcome you to the workshop Internet Resilience, Securing a Stronger Supply Chain. Just double check that you are in the right room, and you are very welcome. We are on a tight schedule, so we will need to move quickly, but meaningfully. If you are sitting at the back, please don’t be shy and come closer. This is a roundtable by design, so please don’t spare any seat over there. Come and don’t be shy, just take a seat, you are welcome. The closer that we sit, the more resilient our dialogue becomes, you know. I’m Pablo. I’m supporting the Marconi Society’s Internet Resilience Institute. I’m very happy to be here, and I’ll be your moderator for this session. Let’s dive straight into the substance. I’d like to begin by turning to someone that truly needs no introduction, Vint Cerf. He will help us to set the scene, and Vint, are you there? I am here, yes I am. Fabulous. Can you hear me? Yes. Help us to set the scene, Vint, where the idea of this workshop comes from. What would be your advice in terms of what would be the good outcome for this discussion? Put some stress on us.


Vinton Cerf: So in the short summary is that the… Many of us have been asking ourselves very hard questions about internet and its resilience because we’ve become so dependent upon it and with the arrival of new applications of artificial intelligence that dependence is only going to increase and The implication of dependence is that when it doesn’t work there are all kinds of consequences. No serious serious problems This is true of a lot of infrastructure You don’t think about it until it doesn’t work, like when the power goes out, now what doesn’t work or when the roads are all blocked So I’m sure you can, when your mobile doesn’t work, that’s become a very important infrastructure and when it doesn’t work there are consequences So the internet has become so woven into a significant part of our ecosystem that we are very concerned about its resilience and reliability We talked about that in a number of different contexts and the specific one for this meeting has to do with the supply chain Since the internet is composed of many many pieces, coming from many many different sources, a very significant part of the internet is software After all, it’s the protocols that make all these things work, running on, of course, physical equipment that we also depend upon I’m going to suggest to you that the word provenance will turn out to have a very heightened importance in this conversation Where did things come from? How do we know that they have integrity? Have they been altered sort of in flight? Do we know who is responsible for them? Do we know where to turn when things are not working properly? So if we ask ourselves, can we document the supply chain that leads to a particular product or service? Can we know that it has integrity? And this is particularly applicable to open source libraries, which have become a major component of the development of products and services in the internet space. Open source is wonderful because it’s accessible, but it’s also hazardous because sometimes it’s not well maintained. And so we have to ask questions about the bill of materials used to create a product and the order in which those products have been applied. Do we know whether the software is unaltered? Does it have integrity? Has it been digitally designed? Do I know the party who digitally signed it so that I can trust the integrity of that? And second, security is a huge issue as well, not only in open source software, but in all of the components of the internet. How can we be assured that security has been properly attended to, not only in the fabrication of creation of the software, but also its configuration and installation? So tracking all of that, having the ability to audit where things came from and how they were assembled and who assembled them is a very important aspect of supply chain evaluation. So as you know, I have to go off to another meeting soon, but I hope that you will all take copious notes and that there will be something concrete coming out of the discussion that the rest of us can share. So that would be my little opening homily for you, Pablo.


Moderator: Thank you so much. It’s very strange to hear myself. So I think we have a good scene to work on, and let me introduce more or less how this panel is going to work. So we will have, there are a few lines there, but basically we will have three sections. The first one to talk about the current state of internet resilience, the second one to talk about what we mean by internet resilience supply chain, the interdependencies and the developing solutions, and the third part will be real-time experience and practical examples. Our panelists, it’s a stellar group of people and experts and on the first block we will have Ram, we will have Olaf, and we will have Anriette, Ram from digital identity, Olaf from the Internet Society, Anriette, former MAG Chair and APC. Are you? Fiona, American University, John Crain, he’s joining us remotely, he’s the CTO of ICANN. Manal, I hope you are here, welcome. She is from Egypt, from the regulator, former Chair of the Governmental Advisory Committee of ICANN, and we have Mark from Cloudflare and ITF. So we will be having a conversation and you are welcome to join that conversation and we will get straight into it in terms of the current state of internet resilience. Ram, why don’t you start to talk about what has happened recently in this work?


Ram Mohan: Pablo, thank you so much, and just to frame this issue for us, the internet, as Vint said earlier, the internet is no longer just a convenience, it’s an invisible infrastructure that supports nearly every aspect of our lives, from critical services to daily activities. We know this, But we also perhaps don’t understand fully well just how much our modern world is fundamentally built on Internet connectivity, right? From enabling critical services, healthcare or financial transactions, transportation, energy grids, emergency response, a resilient Internet ensures that these vital services remain operational even in the face of disruptions. The other part of the criticality of what we are looking at is economic stability because businesses of all sizes from global corporations to local shops, they rely on the Internet for every aspect of what they do. We also know in the last decade or a little over the last decade that it’s been significant for social communication and for social connectivity. And for all of us who endured the years of COVID, without the Internet would have been quite a different experience altogether. Certainly the Internet is critical for national security and public safety, but it’s also a key part of trust and confidence. When you don’t have a resilient Internet and you have frequent or prolonged Internet outages that erodes both public and business trust in digital systems. And conversely, a resilient Internet, it fosters confidence, it encourages further digital innovation, investment and adoption, right? And finally, it’s about mitigating disruptions, right? Because resilience is not about preventing outages, which are inevitable, but it’s about the ability to withstand, adapt to and rapidly recover. from them, right? So that means the ability to restore services to route traffic around failures and minimize the impact on users, right? Because without resilience, even minor technical glitches or cyberattacks could have disproportionately severe and long-lasting consequences. So the Marconi Society in November of 2024, it convened a group of 30 or so global experts in Washington, D.C. to review the state of internet resilience. And that group provided a report for 2024, the Internet Resilience Report, and that report


Olaf Kolkman: highlights a critical assessment of the internet’s infrastructure. It identifies key threats, and it also offers recommendations. But here are the pressing challenges in internet resilience. There are really four key challenges. The first is just the increasing system complexity with tangled systems. Modern applications and services rely on a vast web of interdependencies, and inside of those interdependencies are often single points of failure, and they’re hidden within complex supply chains. So for an example is dependency on power, dependency on water, or over-reliance on a few APIs, software APIs. A second part is just intensifying regulatory pressures. The relationship between technical operators and government policymakers is becoming strained. Governments demand accountability and quick responses to incidents given the Internet’s critical role in not only national security but the economy and that clashes often with the technical community’s traditional reactive and problem-solving approach. Try what’s going on, solve it, and if it doesn’t work well, try the next thing. In the meanwhile, you have a government regulator saying, I don’t want you to try the next thing, fix it now, right? So, there’s a growing friction, growing clash that’s happening there. The third part is insufficient funding for preventive measures because if you look at funding for resilience, there’s almost none. What happens is that when incidents occur, when problems happen, those things readily attract funding and they readily attract attention. But the crucial work of prevention, which is about good operational practices, proper training, systematic thinking about infrastructure, those things often lack adequate investment. And resilience is a prevention problem and prevention does not attract money. The last part is the supply chain vulnerabilities in software. The reliance on complex software supply chains, it introduces significant points of fragility and the potential for cascading failures if a single link is compromised. And there are a great number of examples of this happening and that are public. There are a great, much greater number of them. that are happening that are not public. So, if you look at all of this, we are at a point where we have, we’re at a moment where it’s not just a technical challenge. Resilience is an increasingly urgent global and political challenge in front of us, which is why we’re here at the IGF to talk about it, right? And what we need is a fundamental mind shift change. We’ve got to be starting to talk about proactive prevention. We have to really start thinking about how can you enhance collaboration, not inside a sector, but across sectors. An anecdotal and funny story is that when you talk to regulators and they talk about how terrific the resilience plan is for internet service providers, the common thread is that they have great backup plans, but then you start to talk to them about what is the common assumption. The common assumption is power will be available, water will be available, air will be available, right? Now, you go to folks in the power sector and you talk to them about their backup plans and how they have resilience planned. They have very good plans in there, but a common assumption for them is that the internet will be available so that they can communicate, right? So, you have this expectation and an assumption that other parts of critical infrastructure are going to be available, except those parts aren’t actually talking with each other, right? So, we need enhanced collaboration across sectors. And really, the last part is a much deeper understanding of the interdependencies. that really sustain global connectivity. So these things are essential and we’ve got to wake up to these challenges now or we’ll wake up to a world that doesn’t have adequate resilience


Ram Mohan: for a foundational part of not just infrastructure but of life.


Moderator: Ram, thank you. Tangled systems, regulatory friction, the funding gap, software, Achilles heel. What I am thanking you for is that you used enhanced collaboration and not enhanced cooperation because if not we were going to get into a lot of trouble. That’s an inside joke but well Olaf, do you want the clicker for your slides or do you want me to do it?


Olaf Kolkman: There it is. First I want to apologize Martin Borteman who was initially scheduled to moderate the panel but he had to leave because of family emergency and that brings us to the matters of life. What you see here on the picture is a staple food for the global minority, bread. This is something that is delivered to our grocery stores and this is a little bit of a global minority description of the issue but this is being delivered to our shops with our groceries on almost a daily basis and I’m telling this a little bit to make the story of resiliency a little bit more, you know, give it a little bit more life. The way this works is that a grocery store will place an order. that order will go into a logistic system. And if you Google for logistic system software, specifically if you do an image search, you will see enormously complicated architectures with all kinds of building blocks of interconnected systems that go all over the place. But that was the interconnectedness that Ram was talking about. One of those blocks fail and your grocery will not be delivered. And all these type of things depend on the internet connecting, not only in the connecting in your locality, not connecting in your city, not connecting between the warehouse and the grocery store, but also connecting to distance APIs that might be hosted somewhere at the other end of the globe. And everybody in that supply chain is doing their best to maintain uptime. Seriously doing their best to maintain uptime. But once systems get more complex, they become more fragile. A webpage nowadays will do about 100, 200 queries before the page is actually visible, going to all kinds of different locations. And these websites are hosted probably in data centers. These data centers rely on electricity. And of course, the internet providers and the data center maintainers are doing their best, next slide, to maintain their power situation. This, my friends, is a Cummings DFLE 1500 kilowatt diesel generator. I got this picture from a secondhand diesel generator site. This model is available for $139,000. And this is the type of thing that sits in a data center. It slurps about 392 liters of diesel per hour to generate 1500 kilowatts of power. That is one truckload, a 30 ton diesel truckload of diesel every three days. If your internet goes down or if power goes down in a data center, it takes three days before these babies are out. Now, of course, these things are tested all over the place. I actually have a story, or I’m telling a story, but I have a sub-story. I know of a case where the diesel was tested every month for two hours. They turned it on, made sure everything was working. And after five, six years, they really had an emergency. They turned the thing on, it worked for five hours, and it was out of diesel. They forgot to refuel the tanks. You laugh about this, but this is important, because this is the type of thing that can go wrong if you don’t think through your system. And if you think about resiliency, I think that that is the main question that we have to ask ourselves in these approaches is, next slide, what can possibly go wrong and what can possibly be broken? And that informs your risk-based approach. That also informs what can I do when things go wrong. Do I have to have a satellite phone so that I can communicate to somebody, to my diesel provider, for instance, so that I can get diesel? Because if the logistic system sits down at the same time… There’s no way I can refuel my generators to keep up time and things will really break down. So these are the things that we need to think about when we think about resiliency. What can possibly go wrong? What can possibly be broken? And take risk-based approaches on the evaluation and understand, for instance, what are risks that might be coupled to each other? What if an anchor goes over the seabed and breaks both the electricity cable as well as the fiber cable? Coupled risks. And with that, I hope I set the stage for the continued discussion.


Moderator: Olaf, thank you very much. Indeed, we’re thinking about you, Martin, if you’re following us. And Martin said to Olaf, could you moderate? And then they agreed that I would moderate, because if not, we would have missed this wonderful presentation that you just did. I think it was awesome. Anriette, I would like if you could thread this into the IGF. Why we’re discussing this in the IGF?


Anriette Esterhuysen: These mics have to be switched on. Thanks, Mark. Because the IGF, I think, is the place where we connect people, the people at the other end of the breakages, to the processes that involve both technical coordination, policy and development, as well as other areas of policy coordination and development, as well as practice, as well as innovation. So, I think this is the place where we try and talk about, how does all of this make a difference or not make a difference in people’s lives? So, you also asked me to say, you know, what is my take coming, you know, from the Global South on internet resilience? And I think I’m from South Africa, so I live in a big city, but it happens to be a big city that has electricity outages, if not every day, you know, every few days. And I live in a region where there’s been drought recently, so all the countries along the Zambezi River, Malawi, Zambia, Zimbabwe, had power outages as a result of drought because they rely on hydro, and if the dam levels are too low, you just don’t have electricity. So I think for many people, internet resilience is something that other people have. And what you have is this divide where you have financial institutions, for example, will make sure that they have backup. Upper middle class people would have moved to solar by now, so when it comes to dealing with these disruptions, which are often not easy to control, there’s a vast difference in how people are able to respond to that. And then when you look at industry and businesses, obviously the larger the company, the better it’s going to be to be able to address disruptions. You have sectors, you have data centres, which communicate very effectively with their clients. The clients would probably get advance warning, or they would be rerouting, and they would manage. But data centres serve a kind of a small sector of the economy, relatively, or they work with the financial institutions. So the banks might carry on working, but if you rely on a mobile network that needs to use a tower that relies on electricity, and the towers just go down. So even though theoretically the bank services are still up, you’re not as an end user able to access it, because your mobile operator, firstly you’re a pay-as-you-go customer, remember that. which means you get no communications from your service provider that there are disruptions. So, it’s like there’s a two-tier system of how, I think as Ram said, what really matters is how do you respond? How do you do recovery? And I think what you have in many countries in the global South is a two-tier system. Some people who just deal with internet resilience, it’s like an act of God. Sometimes you have, sometimes you don’t. And then there are sectors of the economy and society who are empowered enough to invest in routing around it. And I think that’s what’s so frightening in many ways. I think that, I mean you’ve all talked about how the technical community does the routing around the disruptions. I think what happens in many developing countries is that the end user is expected to do the routing. They have to have two SIM cards, three or four SIM cards because there’s different affordability and different coverage in different parts of the country, for example. They have to have backups. They always have to have batteries. And with the undersea cable disruptions that have hit much of Africa, well, much of the world, you know, in the last year, you have no idea. There’s no communication. There’s no information. Unless you’re actually an internet service provider that belongs to an internet service providers association or a pairing point, they’re very good at communicating. But if you’re any other business, never mind an end user, you will not know what the current status is of undersea cable breakages and repair. You basically just have to wait and see and hope for the best. So I think just my last input here, I think, I mean, Ram talked about enhanced collaboration. I mean, I’m very happy saying enhanced. cooperation, by the way, I think enhanced communication. I think we need to at the moment there’s the security sector, the companies that provide the security and the backup are very good at communicating with one another, in fact, and I think there’s a lot of cross-industry, cross-discipline collaboration, but there’s no communication with end users or with, you know, the rest of the world who still, as Ram said, is so dependent and takes for granted that this is going to be available, and I think the result is exactly as Ram said, it breaks trust and I think it disrupts innovation and it just, it disincentivises people from beginning to embed the internet in daily life and daily services on a more routine basis.


Moderator: Thank you, Anriette. We’re just on time, we’re going well, we’re doing well. We have participation online, Nandifa Natsaluba, what a great topic on resilience, do we have a business continuity strategy for unplanned disruption leading to a total global unavailability of the internet? They are very switched on, I would like to know where are you from, but welcome to this panel. I see as well some empty seats, so I welcome people to join us, don’t be shy if you would like to participate at a later time when we open for questions. Let’s go into the second block about the supply chain, the interdependencies and developing solutions, and for that I would like to ask Fiona if you could help us with some mapping and the work that you are doing in terms of identifying the gaps and the policy concerns.


Fiona Alexander: Hi to everyone and thanks Pablo, you’re doing a great job stepping in to moderate, and thanks for the invitation to participate and speak and to John and Aisha and others at Marconi Society for this really interesting project. So Ram talked about the session that we had in Washington last year now. I don’t know, time all flies for me. But from that we’ve been having a couple of different conversations and we have a working group that’s specifically trying to put together an internet resiliency mapping exercise and actually putting together a map of what that supply chain looks like. And the goal of our, I think there might be a slide somewhere, but the goal of our group is to produce a map that identifies the actors, institutions, and dependencies across the internet ecosystem infrastructure supply chain. And as Anriette’s story really highlights, that’s not just what we normally think of. It’s not just traditional telecom, providers, ISPs, DNS players. What we’re hoping to do with this exercise is demonstrate clearly that our internet ecosystem infrastructure supply chain includes everybody. And we’re hoping to do that with this map. Again, our default is to kind of only focus on the people that we think of and some of the people that are here. But we’re really hoping to help go through this exercise and confirm that it’s much broader than that. So not all actors or institutions fully appreciate their role and corresponding responsibilities. Not all these different silos are in a routine habit of talking to each other, back to enhanced communication or whatever, enhanced see where we’re going with this cycle. So I think we’re hoping to do that as well. So what our working group is doing is that we’re trying to do all of this online as well through Google Docs. That will be an interesting test of our ability to work together. But the group’s going to develop a map that follows the path of an IP packet and that a routine internet user action initiates. So I think we’ll figure out what couple of examples might make sense so that this is an accessible tool for everybody and anyone regardless of their technical skill sets. I should also offer the observation that I’m the least technical person in the working group, which is great for me. I get to rely on all these great engineering minds that are part of the group. But we’re going to follow the packet, the route that a packet takes at a 30,000-foot level. And we’re going to try to identify what infrastructure layers the packet hits as it goes from you typing something to getting to its destination and to delivering. what you’ve asked it to do and so I know obviously we’ll probably talk about power and water which I think we all kind of Know and I think was highlighted with the most recent sort of broad-based internet outages We saw in Europe and Spain most recently But we want to see what other parts of and what other sectors of the world that we’re hitting with all of that We did talk about and we have discussed that we want to find a way to acknowledge. There are some cross-cutting issues That we’re not going to address so that we kind of scope this Carefully and don’t try to take on everything at once So we’re not going to try to take on sort of a policy and regulatory landscape at the outset And sort of acknowledge that at the first instance if this works for us, which I’m optimistic that it will We’re hoping to have a first draft of the map for the Marconi Society meeting That’s happening in November And if we think this is useful and we think we’re providing a value-add to the community for doing this and we like the map But by we I mean all of us collectively we like it Then I could envision next iterations of the map that then dig into each bucket Maybe there’s a resiliency map just for energy and one just for power But I think at the outset we’re just trying to get everyone together and get all these smart engineering minds together to figure out Where does a packet go and what might need to work and what happens when those things don’t work? So that’s what our group is doing and I look forward to talking about it more and others that want to be involved in answering Any other questions? But again, I thought it was a really interesting exercise and one worth spending some time on So I’m really happy to be a part of the exercise


Moderator: Thank You Fiona those were a lot of words per second and it’s Always I Will be like you when I grow up and we’ll have that speed of thought Translated into language, that’s amazing. I’m not sure if you have John Crain John is at a very odd hour. So I’m sure he will be much slower than you at this time John is online if you can I am put him on He’s going to talk about I guess one part of that map, which is the unique identifiers. Good morning, John Have you had coffee?


John Crain: Good morning, can you hear me?


Moderator: We cannot hear you, try again. Okay, I am unmuted.


John Crain: Can you hear me when you put your headphone on? Yes, we can hear you. Yes, good. Where are your headphones? So, good afternoon everybody. It’s early morning here in Southern California. So, indeed, I work for an organization called the Internet Corporation for Assigned Names and Numbers. Many of you may have heard of us, often just referred to as ICANN by its acronym, and as tech folks we love our acronyms. So, resilience is interesting, even if you look at the identifier systems and the role of ICANN. ICANN has existed for approximately 25 years, a little bit longer, and our bylaws talk a lot about security and stability. Those are the other two sides, in my mind, of resilience, you know, with resilience being the ability to bounce back once one of those two things don’t happen. Now, identifiers is not just the domain name system, right? So, most people think ICANN, they think DNS, but ICANN is also responsible for the Internet Assigned Numbers Authority, and they register literally thousands of different types of identifiers that are used on the Internet. And for the Internet to work, and for that packet that Fiona was talking about, to get from one place to another, all of those need to have certain attributes. Often that is a uniqueness to the identifier, or it is some other special relevance to the protocols and how all the protocols work. Now the interesting thing is of course that may not be obvious, most end users, the people who use the internet, are blissfully unaware of how the internet works and most of these things. So while we talk about resilience of the network or the internet, it’s important to remember that the users aren’t aware of a lot of what is happening and also that it’s not a internet. You know you’ll often hear people tell you that the internet is actually a network of networks. So that means that even in the identifier space there are many many people that have a role to play. It’s not just ICANN. ICANN’s role is really about administering the top registration databases, the initial information of many of those identifiers. Now if we look at the DNS, the domain name system, and you look at the history and you go back to the early days of ICANN or pre-ICANN, that was a system and you know the root of the DNS is a very critical system for the internet to work. It’s where the domain names start, where the resolution from that web browser to getting you somewhere starts. Back in the late 90s and you know into the early 2000s, you were talking about 13 systems around the globe. Now what the industry was able to do was to notice that that was an issue. We said to ourselves this is an issue that could affect the resiliency and the stability of the ecosystem. New ways of doing routing were developed, something called Anycast, and now you have 2,000 roughly locations around the globe where this infrastructure is. So you can build resilience, but it actually takes you thinking about it, and it takes time. And it takes, what Ram talked about, it takes investment in resilience. You know, building something like this out is not something you just do overnight. Now, ICANN is also interesting because, you know, very early on we realised that this is a global asset or a global ecosystem, and it required global policymaking. So when it comes down to the domain name system, any of you who are familiar with ICANN know that there is actually a global, what we call, multi-stakeholder system for the governance and the policy setting around that. So, you know, in some ways, you know, and I’ve been with ICANN for quite a few years, in some ways we spent a lot of effort and time over the years to develop ways that we can include the user and the ISP and the governments and everybody else in the discussions. But we also worked on the technical side with our technical partners like the IETF, the route server operators and many others to increase resilience. But you don’t just increase resilience and stop. The internet is a growing thing. You have to keep looking at how you’re going to continue to increase and keep that resilience. And you have to be aware of all the things that you rely on for that resilience. And that’s why the Marconi Society’s work is really interesting to me personally. I do sit and think about what if we have a major power outage, what if we have a major code flaw, you know, how will that affect the identifier systems and further how will that affect the internet. So it’s really good that our friends at Marconi and, you know, I thank them for inviting me to take part in this, are looking at the broader scope of what does it take to provide resilient communication, because remember the internet is a communication device, across the globe. So identifiers are a big part of that and it’s what makes myself in my role as the CTO at ICANN lose sleep at night, sitting thinking about how we keep this stuff resilient, but it’s more than just what we do, it’s so much broader, you know, power, water, protocols and just think about everything it takes to not only move a packet like Fiona was saying from one place to another, but actually to do the right thing with that piece of data when it gets to the other end. So I’m looking forward to hearing what the rest speak and I’m going to hang around to answer questions if there are any. Thank you everybody.


Moderator: This is very nice. Thank you John. And this is all about collective risk management in a collaborative way and it’s really good to converge here to discuss these matters. Manal, I’m not sure if you are online, welcome, she’s in Egypt and this is another part of the map, which is the governmental aspect of things and would love if you could talk about the regulatory challenges and the role of governments. Manal? Yes, I am Pablo, can you hear me? Yes. When you put your headset? Okay.


Manal Ismail: I’m ready. Okay, great. Thank you very much, Pablo, and thanks to everyone for the inspiring interventions so far. So, as was already mentioned by everyone, the internet has become more than just a communication tool. It’s part of nation’s critical infrastructure, backbone for digital economies and the fundamental need for society’s development. So, dependency on the internet and its infrastructure is rising exponentially and it’s increasing even more with IoT, AI and other emerging technologies. This growing reliance exposes the need to work on securing the internet against the escalating risks that endanger not only critical services running on the internet, but also the mere functioning of the internet itself. Such risks include unintentional errors like infrastructure failure, power outages, misconfigurations, but also sometimes intentional disruptions such as internet shutdowns, geopolitical tensions resulting in cyber attacks and disruptions caused by wars and weaponization of the internet and the cyberspace. All this, of course, in addition to the very well known natural and climate disasters, as well as crises that may trigger unforeseen traffic spikes like what we have all experienced with the COVID. In this context, the role of governments is both vital and evolving as today’s digital interconnected world poses unprecedented challenges on how nations operate. This role ranges from simple awareness and incentivized encouragement to mandated requirements and enforced regulations. Accordingly, governments, as stewards of national digital infrastructure, should promote conscious investment in resilient networks with built-in redundancy and also benefiting from technology’s diversity, like satellite versus land or undersea cables. Properly secure and redundantly store digital registries, device robust acts, laws, regulations or frameworks that balances national interests with global interoperability. Be aware of and minimize dependencies that were already mentioned. And carefully manage third-party elements in the network, but also encourage keeping local traffic local through IXPs. As we’ve already heard, also cooperation and collaboration with other sectors is extremely important to align efforts towards having a national digital resilience strategy that is constantly being updated. And also not to overlook the human factor, not only in terms of capacity development, but also in terms of changing the culture that Ram already hinted at of taking for granted the Internet’s underlying infrastructure and its ongoing responsiveness. Of course, governments cannot do all this without embracing the expertise and contributions of other stakeholders, depending on the issue and stage we’re at. The Internet is already a global shared resource, and its governance must reflect that reality through what we refer to as multi-stakeholder approaches, where governments, private sector, civil society, technical community, academia, and international organizations all work together in order to reach well-informed, sustainable decisions, devise more effective people-centered regulations, and achieve feasible and realistic solutions that are mindful of the global public interest. On the other hand, stakeholders should also understand and respect government’s concerns in order to be able to reach a constructive way forward. And since processes followed are equally as important as results achieved, in that respect, I would like also to refer to the Sao Paulo multi-stakeholder guidelines that serve as a valuable reference for strengthening internet governance and digital policy processes. They provide comprehensive and operational framework for establishing, implementing, and assessing inclusive, transparent, and accountable multi-stakeholder processes. In conclusion, it’s important to note that the internet was not developed with security in mind, but now the transition to an increasingly digital society and economy prioritizes internet resilience as a pressing technical and policy challenge that is both national and global in nature. Hence, strengthening internet resilience is the responsibility of everyone, caretakers and beneficiaries, and it should be ongoing and proactive in order for the internet to continue to function as we expect. And I leave it at this and hand it back to you, Pablo. Thank you.


Moderator: Thank you, Manal. Wonderful. And it seems that we’re really working on the basis of resiliency in spite of major construction happening at the back. So if you see, Manal, our faces, like a lot is going on in the backdrop of this. I don’t know exactly what. Are they preparing for the music night? I don’t know. OK, that’s that. So imagine a major concert of the Rolling Stones being prepared at the back. And so are the musicians. Let’s be resilient and let’s move on. We are soon to head towards an opening of the conversation. We have Vint stating a provocative question. Then Ram providing some background. Then Olaf providing some what if scenarios. Anriette more on the collaborative and the linkage between the Internet governance arena and the Internet resilience conversation. We have Fiona on the mapping, John on the unique identifiers. We have Manal on a global perspective on government regulatory, but also cooperation, cooperation, cooperation, cooperation. I think that’s what we try to do. Let’s not say how, just cooperation. Let’s get into the real deal with you, Mark. If you could tell us a bit how this works in the real world.


Mark Nottingham: Sure. Hello. I’m going to take my headphones off. So I was asked to talk a little bit about how my company conceptualizes and deals with internet resilience. I work for a company called CloudFlare. And CloudFlare is a company that provides internet infrastructure in a particular way. You know, the internet itself is inherently unreliable. There’s nothing that guarantees that a packet will get to its destination. We build abstractions on top of that so that we can pretend that it is reliable and resilient. We have TCP so that we have connections and we pretend that that is reliable, except sometimes it’s not. Sometimes that abstraction breaks down. And so we do other things. Web browsers will actually retry requests if they fail so that they paper over that unreliability so that the user of the browser has a nice experience. Websites and other services use companies like mine to further provide resilience. So what we are is a global network of servers everywhere providing services to users, whether it’s in the global south, whether it’s in the minority world. They bring content and services closer to the users to improve the resilience and the availability, to improve the security of those services, and also to make them faster, to make them so that they seem like they’re just next door, even though you’re actually talking to someone around the world. And what that does is make the internet more seamless for everyone. That means that resilience is really an existential threat for our business. We have to be available all the time or our customers are very unhappy. And so we use several techniques to make sure that our systems are as available as possible. The core systems, the data plane, are decentralized so that every node, every one of those servers can operate on its own. It doesn’t need connectivity to the rest of our systems. so that if there’s a partial failure somewhere, they can continue serving data. There are some parts of our systems that need to be centralized, and so we use other techniques to make sure that they are fully available. And so usually that’s redundancies and failovers and things like that. So despite all of those efforts, despite all that engineering and hiring some of the best engineers in the world to do this, we still have problems. As has been said a few times, you can never make something perfectly available. We had an incident last year, just as one example. We called Code Orange. It was an alarm bells kind of situation at the company where one of the generators that Olaf was talking about earlier – thank you for that illustration, by the way, Olaf – was used by one of our power suppliers at a key data center, and it failed in a particular way, and then some other systems failed, and that caused a cascade of failures where that data center went offline completely, which shouldn’t happen. Data center operators – we were renting that space from a data center operator – took extraordinary lengths to keep them highly available. So that was one thing that shouldn’t have happened, or a series of events. Because it was that particular data center, those centralized systems that I talked about, the ones that needed to be in one place, also failed. And we had designed them to fail over to another data center when that happened. It turns out that didn’t happen as well as we anticipated. And so it made those control systems unavailable for about a day and a half. Six hours was the length of the real outage there, but it kind of trailed on for about a day and a half where there was partial availability. That’s a horrific situation for a company like ours, and we resolved not to let that happen again. And so we went through this effort to re-engineer our systems, those key systems that were centralized, so that they were more resilient. And that took a couple of months, basically. We had another big incident at the same time that caused some distraction, which I won’t go into. But there were a lot of lessons that we learned from that. Even though we had a lot of very talented eyeballs on these problems, making sure that these systems were redundant, you still have to continuously improve your resiliency and follow the best practices, define what those best practices are, interrogate how you’re using these systems, provision for failure situations, and test the failure. Make sure that you intentionally fail your systems to understand how they behave, and consider what happens when there are these cascading failures. And finally, be transparent about your failures. We are very proud that every time we have one of these incidents, our CEO or our CTO writes a blog entry that explains what happened and why, so that we’re transparent to our customers. We had, indeed, another incident just about a week ago where we did that. But, unfortunately, this is not just an issue that happens within one company. That would be a much simpler problem to deal with. It’s a systemic issue. It’s a whole of Internet issue for resilience. And one example there is around routing security. The routing system is critical to Internet resilience. We need to be able to route packets around the world. And it’s one of those places where everyone has to agree on what the reality of routing is. And so, Cloudflare has spent a tremendous amount of resource. And we’re very committed to RPKI, the routing security issues. We’re collecting routing data about this in our radar platform, which is our kind of Internet observatory for statistics about the Internet that we are able to observe from that worldwide network of servers we have. And that helps us to identify and mitigate these systemic issues. But I think it’s that cooperation that we’ve been talking about across different kinds of businesses and different parts of the ecosystem that’s so key to make sure that, as a whole, we’re able to have those abstractions so that people don’t have to worry about this in most cases.


Moderator: Mark, thank you. We are moving from theory to practice. And I think this is a very good moment to start opening the conversation. I would love to open the floor if you have any questions, and if not, by all means, que gusto, adelante.


Paticipant: If I may, just to tie what Mark was saying to what Ram was saying, basically, the previous failure is always prevented. Gracias, Pablo, and thank you everybody for being here. I just want to ask a question to the panel about a topic that I think the first speaker mentioned about the economics and finance. I’m going to make a brief introduction to put it in context. Before the Internet, you know, the international communication was through the telephone network, and international communication was long-distance telephone calls. And the model, the business model there is that the call, it was originated by the company in one country. It was finalized by some other company, and they shared the revenue of that call. That was a very sound business model in which everybody that cooperated, maybe there was some other intermediary in that call, but everybody got a fair share of the revenue there. By historical reasons that, you know, when Internet first moved out of the continental United States, there was set a rule that those who want to connect have to pay the whole share of the communication. In the last years of the past century, oh my God, it’s passed so many times, this was a big deal. It was called the international Internet communication cost. It was even raised in the ITU, you know, in study group three, the recommendation from those days, the D50 recommendation. And that’s a very big issue, even for some European countries and companies, even for Australia. They were very vocal about that. As the time passed, the companies from these developed countries solved the problem by putting their connection into what is called the core or the backbone in the Internet. And eventually, this communication problem cost has been alleviated in some other places through IXPs and companies like the one that was just put, but alleviated because still the problem is that these revenues are not external to the country. I forgot to say that during the telephone long distance model, those income, especially for developing countries, was the one who financed, that you mentioned, the financing infrastructure development there was billion every year. When the internet came, all those yearly billions that was going from outside to developing countries disappeared. Now that’s not only happening, this uneven distribution of revenue, it’s not only happening through all of the communication infrastructure, also about the information. We see the information, data, even knowledge that is created in many countries, even if it’s flowing two directions, the money is flowing in one direction, and that is no surprise that a few companies, only a few companies has amassed so massive amount of money from resources that comes from everywhere. So my question to the panel is the following. Don’t you think that that uneven flow of revenues could be a cost in the long run of unsustainability of the internet? Thank you.


Moderator: Those were the days, the international charging arrangements for internet services from 1988, and all those debates, it reflects some part of the economics of the infrastructure, and I wonder how… This is linked to internet resilience, so that’s a provocative question for sure. I’m not sure if any of the panellists would like to take it, Fiona, I knew it.


Fiona Alexander: For sure, I’m happy to talk about the telephone accounting rate regime and two decades of arguments that we had, Juan, about accounting rates and how that system and model could not be applicable to the internet, because if you tried to apply the traditional telephone circuit switch model of accounting and revenue to the internet, it would actually require breaking the internet infrastructure that we’re trying to preserve. I would also dispute that all those accounting rate revenue and that passing of money that went to other countries was not always used to build the infrastructure in those countries. So we could talk about that a lot, too, offline. But I will say that in terms of whether or not the sort of IKEA’s debate or the fair share debate, because it’s back again, I can’t believe, is relevant in the context of this, I’m not quite so sure. But I will say that one of the ways of dealing with sort of internet resiliency, and maybe Olaf and others want to talk about the development of IXPs, and Mark wants to talk about peering and other things like that, but the model of traffic exchange in the internet ecosystem is through peering and transit, and that’s the way commercial parties privately resolve these revenue constructs that you’re talking about. There has been a lot of work, I think John Crane talked about the root server instances, and I know there’s been lots and lots of works by ISOC and others to get IXPs deployed, and that has really shifted and changed the traffic patterns. So we no longer see the unequal traffic patterns, the ones we’re talking about from the 1990s, where if you were somewhere in a different part of the world and you wanted something on the internet, it always had to come back to the United States or Western Europe. That’s no longer the case anymore because of all the work people have done on internet resiliency, but in terms of the policy and regulatory stuff, we could talk about this for hours as you know, but maybe the more technical people want to talk about how this relates to the internet resiliency construct. For hours or for decades indeed.


Paticipant: Thank you for a good workshop that we understood a lot about the resilience of the internet infrastructure. My name is Qusayr Shati, I’m from Kuwait and we are located in the Middle East and as you know the circumstances in our region. It’s a question, can we consider the safety and the security of the internet infrastructure part of the resilience or part of the concept of the resilience of the internet itself? When I talk about the safety or the security of the infrastructure, whether it’s a ship anchor that cuts off submarine cable, or whether an area of hostilities where sometimes the communication or the internet infrastructure gets limited into operation or gets halted or gets targeted. So would we consider the safety and the security of the internet infrastructure part of the resilience approach or this is a different angle? It’s just a question to the panellists.


Moderator: Thank you, Anriette. Then Ram.


Anriette Esterhuysen: Qusayr, I have a view on this, it’s not necessarily a broadly accepted view. I was a member of the Global Commission on the Stability of Cyberspace and so was Olaf. So we debated this together and I think we spent a long time talking about is it the logical resources or is it actually the physical transmission infrastructure. We decided it has to include the physical transmission infrastructure and I haven’t even touched on that but I think it really, having, and I think there’s a, I actually also want to react a bit. I think that we have. Resilience is treated differently by different parts of the internet. I think the technical community understands resilience and I think has good practices and procedures for ensuring resilience or striving towards greater resilience. I do not necessarily think that telcos have the same approaches to the internet technical community. I do not think that governments have the same approaches. There are also not even common definitions of what is critical internet infrastructure, what is critical information infrastructure. I think we also see the destruction of infrastructure and conflict. We have the case of Gaza where infrastructure has been completely destroyed. In fact, and where Gaza users, even when they had internet, were restricted to 2G. Now, so there’s so many different factors, but I certainly think that the physical transmission infrastructure does have to be considered because without that, and I think as Mark and others have said as well, even electricity, which is an external factor, but it disables both the physical and the logical resources. So I personally do think that physical transmission infrastructure is part of it, but that’s not a universal view. In fact, we asked the ICANN board a few years ago to look at the public resources, physical infrastructure as being part of that. In fact, even to look at the DNS as being a part of the public core, and even that I think we struggle to achieve.


Moderator: We need to hurry because we have still some content to cover. I would let Mallory to have a question, Ram, a quick response, and then John to wrap the conversation if that’s okay. Mallory. Thanks.


Paticipant: And thanks for hosting this conversation. And Ram, I really liked your first slide. I don’t know if you can go back to it, but I don’t know if folks are like me, but when we were having these conversations in the framing of fragmentation, and now it kind of came up here. Oh, I love the bread picture as well. Thank you, Olaf. We obviously see there’s an interconnection between electricity and food systems and shipping lines. And I feel a bit odd when we have those conversations because it’s really clear that we don’t think the internet is maybe more important than eating or drinking water. But we don’t quite make the connection, in my view, that every single one of these vulnerabilities is actually a crisis of capitalism. And we aren’t thinking holistically in terms of the political economy of the internet. And I can say, if we think that we can solve those problems without solving power or without, you obviously have gotten that, right? Like, we can’t solve these problems without solving electricity and power and other things. We can’t solve these problems without thinking about what happens when some states invade others or there are internet shutdowns. You know, we have to think of it holistically. I wonder if we imagine the project we’re trying to take on together to keep the internet resilient is a project that will transform our global capitalist system or is a project that very much depends on some other sector sorting those things out.


Moderator: Thank you, Mallory. Ram?


Ram Mohan: Thank you, Mallory. That’s a great provocative question. I think it will transcend rather than transform. And I don’t want to talk necessarily about, I mean, I think there’s quite a bit to discuss about the system and whether the system itself is primarily at fault. I will point out that in these resilience problems happen in non-capitalist systems as well. So, that’s just one thing. One very brief response to the gentleman from Kuwait who had the question. He had talked about he’s on the at the table there. You’ve spoken about security and safety. I want to say you should be thinking about security and stability, not safety, because safety is often what the user perceives. Stability is something that you can actually affect as a regulator or as a government.


Moderator: Thank you, Ram. I would love for John Janowiak, the President and CEO of the Marconi Society, to help us wrap this up. Sure.


John Janowiak: Thank you, Pablo. And thank you to the panel and all of you for attending today. This is a near and dear subject to the Marconi Society. I was approached not too long ago by Vint to take this on as one of our core issues for the society. And since we did, you know, we’ve just gotten a great amount of support from the industry. And so this is one of the first readouts that we’re providing publicly. So thank you for attending today’s session. You know, raising the awareness of this critical issue that’s, you know, often unappreciated or is the topic of internet resilience. And, you know, it’s going to take all of us to ensure that this matter gets the attention that’s required. So, again, we look forward to having you all involved. The responsibilities are cross sectors, cross geographies, and cross disciplines, as you heard today. One of the things that we were fortunate to do is we were able to bring together some of the top experts in the internet. And I think, like, we have a photo up here of our activity together in Washington, D.C. last November, where we really sat down and looked at, you know, what are some of the critical issues in resiliency of the network, you know, reliability, stability, and resiliency. And the report that we ultimately came up with is right here, this yellow report that’s on the internet, on our website. Please go ahead and download that report and take a look at it. We welcome your organizations to get involved in this. The more people we get involved in looking at these issues and helping solve these issues, the more resilient the Internet will become. So we’re really looking forward to working with all of you on this issue. So on behalf of this group here, which is all, most of the members on the panel here are part of the Internet Resilience Advisory Council, as well as the Marconi Board of Directors, you know, we look forward to working with all of you on making the Internet more reliable, stable, and resilient. So thank you for attending today.


Moderator: Pablo? With that, I wish we have a really good concert and thank you very much for attending the workshop.


R

Ram Mohan

Speech speed

112 words per minute

Speech length

501 words

Speech time

268 seconds

Internet has become invisible infrastructure supporting all aspects of life, creating critical dependencies

Explanation

The internet is no longer just a convenience but fundamental infrastructure that supports healthcare, financial transactions, transportation, energy grids, and emergency response. This creates critical dependencies where disruptions can have severe consequences across all sectors of society and economy.


Evidence

Examples include critical services like healthcare, financial transactions, transportation, energy grids, emergency response, and the COVID-19 experience showing how essential internet connectivity became


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Development | Economic


Agreed with

– Vinton Cerf
– Manal Ismail
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities

Explanation

Modern internet faces four critical challenges that threaten resilience. These include tangled interdependent systems with hidden failure points, growing friction between technical operators and government regulators, lack of investment in preventive measures, and vulnerabilities in complex software supply chains.


Evidence

Examples include dependency on power/water, over-reliance on few APIs, government demands for immediate fixes conflicting with technical problem-solving approaches, and public examples of supply chain compromises


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Legal and regulatory | Economic


Agreed with

– Anriette Esterhuysen
– Manal Ismail
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Cross-sector assumptions create vulnerabilities where each sector assumes others will remain available

Explanation

Internet service providers assume power and water will be available in their backup plans, while power sector operators assume internet will be available for their communications. This creates circular dependencies where sectors don’t coordinate their resilience planning.


Evidence

Anecdotal example of ISP backup plans assuming power availability while power sector backup plans assume internet availability for communication


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Legal and regulatory


Agreed with

– Olaf Kolkman
– Mark Nottingham
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Growing friction between technical community’s problem-solving approach and government demands for immediate fixes

Explanation

Governments demand accountability and quick responses to incidents given the internet’s critical role, which clashes with the technical community’s traditional approach of trying solutions iteratively. This creates tension between regulatory expectations and technical realities.


Evidence

Example of government regulator saying ‘I don’t want you to try the next thing, fix it now’ versus technical community’s approach of trying solutions sequentially


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure


Security and stability more relevant concepts than safety for regulators and governments

Explanation

When addressing internet resilience from a regulatory perspective, focus should be on security and stability rather than safety. Safety is what users perceive, while stability is something that regulators and governments can actually influence and affect.


Major discussion point

Physical Security and Infrastructure Protection


Topics

Cybersecurity | Legal and regulatory


Resilience issues transcend economic systems, occurring in various political and economic contexts

Explanation

Internet resilience problems are not solely caused by capitalist systems but occur across different economic and political systems. The focus should be on transcending rather than transforming existing systems to address these challenges.


Evidence

Observation that resilience problems happen in non-capitalist systems as well


Major discussion point

Systemic and Holistic Perspectives


Topics

Economic | Legal and regulatory


Disagreed with

– Paticipant

Disagreed on

Root cause analysis – systemic vs technical solutions


O

Olaf Kolkman

Speech speed

119 words per minute

Speech length

1353 words

Speech time

677 seconds

Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure

Explanation

As internet systems become more interconnected and complex, they become more vulnerable to failures. A webpage now makes 100-200 queries to different locations before loading, creating multiple potential failure points that can cascade through the system.


Evidence

Example of bread delivery logistics requiring complex interconnected systems, and modern webpages making 100-200 queries to various locations before loading


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Cybersecurity


Agreed with

– Ram Mohan
– Mark Nottingham
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning

Explanation

Data centers rely on diesel generators that consume massive amounts of fuel and require regular maintenance and refueling. These physical dependencies are often overlooked but represent critical single points of failure for internet infrastructure.


Evidence

Detailed example of Cummings DFLE 1500 kilowatt diesel generator costing $139,000, consuming 392 liters of diesel per hour, requiring one truckload of diesel every three days, and a real case where generators failed due to empty fuel tanks after years of monthly testing


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Cybersecurity


Agreed with

– Anriette Esterhuysen
– Manal Ismail

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


A

Anriette Esterhuysen

Speech speed

150 words per minute

Speech length

1173 words

Speech time

467 seconds

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”

Explanation

In many Global South countries, there’s a stark divide in internet resilience capabilities. Larger companies and financial institutions have backup systems and advance warning of disruptions, while ordinary users, especially pay-as-you-go customers, receive no communication and must manage disruptions on their own.


Evidence

Examples from South Africa with regular electricity outages, drought affecting hydro-powered countries along Zambezi River, financial institutions having backup power while mobile towers go down, and users needing multiple SIM cards as personal backup strategy


Major discussion point

Current State of Internet Resilience


Topics

Development | Infrastructure | Economic


Need for enhanced communication with end users who currently receive no information about disruptions

Explanation

While technical communities and service providers communicate well among themselves about disruptions, end users and businesses outside the technical sector receive no information about outages, repairs, or current status. This lack of communication breaks trust and discourages digital adoption.


Evidence

Example of undersea cable disruptions affecting Africa where only ISPs belonging to associations get information, while other businesses and end users have no knowledge of current status or repair timelines


Major discussion point

Current State of Internet Resilience


Topics

Development | Infrastructure | Sociocultural


Agreed with

– Ram Mohan
– Manal Ismail
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents

Explanation

Internet resilience must include physical transmission infrastructure, not just logical resources. This infrastructure faces threats from conflicts, accidents, and deliberate targeting, as seen in various global conflicts where infrastructure has been destroyed or restricted.


Evidence

Reference to Global Commission on the Stability of Cyberspace work, example of Gaza where infrastructure was completely destroyed and users were restricted to 2G even when internet was available


Major discussion point

Physical Security and Infrastructure Protection


Topics

Cybersecurity | Infrastructure | Human rights


Agreed with

– Olaf Kolkman
– Manal Ismail

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


Disagreed with

– John Crain

Disagreed on

Scope of internet resilience – physical vs logical infrastructure


Different sectors have varying approaches to resilience with no common definitions of critical infrastructure

Explanation

The technical community has good resilience practices, but telcos, governments, and other sectors don’t necessarily share the same approaches. There’s no universal agreement on what constitutes critical internet infrastructure or critical information infrastructure.


Evidence

Reference to asking ICANN board to consider DNS as part of public core and struggles to achieve even that recognition


Major discussion point

Physical Security and Infrastructure Protection


Topics

Infrastructure | Legal and regulatory | Cybersecurity


F

Fiona Alexander

Speech speed

208 words per minute

Speech length

1169 words

Speech time

335 seconds

Need to map actors, institutions, and dependencies across the entire internet ecosystem infrastructure supply chain

Explanation

A comprehensive mapping exercise is needed to identify all actors, institutions, and dependencies in the internet supply chain. This goes beyond traditional telecom and ISP providers to include everyone who plays a role in internet infrastructure, many of whom don’t fully appreciate their responsibilities.


Evidence

Working group developing map through Google Docs as a test of collaborative capability, focusing on making it accessible to people regardless of technical skill level


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Legal and regulatory


Agreed with

– Ram Mohan
– Olaf Kolkman
– Mark Nottingham

Agreed on

Complex interdependencies create cascading failure risks


Working group developing map following IP packet path to identify all infrastructure layers and potential failure points

Explanation

The mapping project will follow the route an IP packet takes from a user action to its destination, identifying all infrastructure layers it touches at a 30,000-foot level. This will help demonstrate the complexity and interdependencies in internet infrastructure.


Evidence

Plan to have first draft ready for Marconi Society meeting in November, with potential for future iterations focusing on specific sectors like energy and power


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Infrastructure | Development


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure

Explanation

The historical telephone circuit-switched model of accounting and revenue sharing cannot be applied to internet infrastructure without fundamentally breaking how the internet works. The internet operates on different principles of traffic exchange through peering and transit arrangements.


Evidence

Reference to two decades of arguments about accounting rates and how applying traditional telephone models would require breaking internet infrastructure


Major discussion point

Economic and Structural Challenges


Topics

Economic | Infrastructure | Legal and regulatory


Disagreed with

– Paticipant

Disagreed on

Economic model sustainability and revenue distribution


Traffic exchange through peering and transit has shifted patterns, reducing historical inequalities

Explanation

The development of Internet Exchange Points (IXPs) and peering arrangements has fundamentally changed internet traffic patterns. Traffic no longer needs to route back to the United States or Western Europe, addressing historical inequalities in internet traffic flow.


Evidence

Reference to work by ISOC and others in deploying IXPs, and how this has changed traffic patterns from the 1990s model where all traffic had to route through US or Western Europe


Major discussion point

Economic and Structural Challenges


Topics

Infrastructure | Economic | Development


J

John Crain

Speech speed

141 words per minute

Speech length

977 words

Speech time

412 seconds

ICANN manages critical identifier systems requiring uniqueness and global coordination for internet functionality

Explanation

ICANN manages not just the domain name system but thousands of different types of identifiers through the Internet Assigned Numbers Authority. These identifiers must have specific attributes like uniqueness for internet protocols to function properly, requiring global coordination.


Evidence

ICANN’s 25-year history, responsibility for DNS and IANA functions, management of thousands of identifier types beyond just domain names


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Legal and regulatory


Disagreed with

– Anriette Esterhuysen

Disagreed on

Scope of internet resilience – physical vs logical infrastructure


DNS root system evolved from 13 systems to 2,000 locations globally through investment in resilience over time

Explanation

The DNS root system, critical for internet functionality, was recognized as a potential single point of failure in the late 1990s and early 2000s. Through development of new routing technologies like Anycast and sustained investment, it now operates from approximately 2,000 locations worldwide.


Evidence

Historical progression from 13 root server systems in late 90s/early 2000s to current 2,000 locations globally using Anycast technology


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Cybersecurity


Continuous improvement needed as internet grows, requiring ongoing assessment of dependencies and vulnerabilities

Explanation

Internet resilience is not a one-time achievement but requires continuous attention as the internet evolves and grows. Organizations must constantly evaluate their dependencies and potential vulnerabilities, considering scenarios like major power outages or code flaws.


Evidence

Personal reflection on losing sleep thinking about power outages, code flaws, and their potential impact on identifier systems and broader internet functionality


Major discussion point

Identifier Systems and Technical Infrastructure


Topics

Infrastructure | Cybersecurity


Agreed with

– Ram Mohan
– Vinton Cerf
– Manal Ismail

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


M

Manal Ismail

Speech speed

106 words per minute

Speech length

630 words

Speech time

355 seconds

Government role ranges from awareness and incentives to mandated requirements and enforced regulations

Explanation

Governments have varying levels of involvement in internet resilience, from simple awareness-raising and providing incentives to implementing mandatory requirements and enforcing regulations. This role is evolving as digital interconnectedness poses unprecedented challenges for national operations.


Evidence

Examples of different government approaches and the range of interventions available to governments


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure


Agreed with

– Ram Mohan
– Vinton Cerf
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Need for multi-stakeholder approaches balancing national interests with global interoperability

Explanation

Internet governance requires multi-stakeholder approaches involving governments, private sector, civil society, technical community, academia, and international organizations. This is necessary because the internet is a global shared resource that requires balancing national interests with global interoperability requirements.


Evidence

Reference to Sao Paulo multi-stakeholder guidelines as framework for inclusive, transparent, and accountable processes


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure | Development


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– John Janowiak
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


Governments should promote investment in redundant networks, secure digital registries, and national digital resilience strategies

Explanation

As stewards of national digital infrastructure, governments should actively promote investment in resilient networks with built-in redundancy, ensure secure storage of digital registries, and develop comprehensive national digital resilience strategies that are regularly updated.


Evidence

Examples include promoting technology diversity (satellite vs. undersea cables), encouraging local traffic through IXPs, managing third-party network elements, and capacity development


Major discussion point

Governmental Role and Regulatory Challenges


Topics

Legal and regulatory | Infrastructure | Development


Agreed with

– Olaf Kolkman
– Anriette Esterhuysen

Agreed on

Physical infrastructure dependencies are critical vulnerabilities


M

Mark Nottingham

Speech speed

169 words per minute

Speech length

1040 words

Speech time

367 seconds

Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable

Explanation

The internet itself provides no guarantees that packets will reach their destination, so multiple layers of abstraction are built on top to create the appearance of reliability. This includes TCP connections, browser retry mechanisms, and services like CloudFlare that provide additional resilience layers.


Evidence

Examples of TCP providing connection abstraction, web browsers retrying failed requests, and CloudFlare’s global network of servers providing content delivery and security services


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity


Even with best engineering practices, failures still occur requiring continuous improvement and transparency

Explanation

Despite hiring top engineers and implementing redundancy measures, failures still happen due to cascading effects and unexpected interactions. Companies must continuously improve their resilience, test failure scenarios, and be transparent about incidents when they occur.


Evidence

Detailed example of Code Orange incident involving generator failure at data center, cascading failures of centralized systems, six-hour outage extending to day and a half of partial availability, and subsequent re-engineering efforts


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity | Economic


Agreed with

– Ram Mohan
– Olaf Kolkman
– Fiona Alexander

Agreed on

Complex interdependencies create cascading failure risks


Systemic issues require cooperation across different businesses and ecosystem parts, not just individual company solutions

Explanation

Internet resilience cannot be solved by individual companies alone but requires systemic cooperation across the entire ecosystem. Issues like routing security need everyone to agree on reality and work together, as demonstrated by CloudFlare’s investment in RPKI and routing data collection.


Evidence

Examples of routing security challenges, CloudFlare’s investment in RPKI, radar platform for internet statistics, and the need for ecosystem-wide cooperation on routing issues


Major discussion point

Real-World Implementation and Industry Practices


Topics

Infrastructure | Cybersecurity | Economic


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– John Janowiak

Agreed on

Cross-sector collaboration is essential for effective resilience


P

Paticipant

Speech speed

144 words per minute

Speech length

898 words

Speech time

373 seconds

Uneven revenue distribution from historical internet development may threaten long-term sustainability

Explanation

The historical shift from telephone accounting rates to internet connectivity models eliminated billions in annual revenue that previously flowed to developing countries for infrastructure development. Current uneven revenue distribution, where data and knowledge flow globally but money flows in one direction, may threaten internet sustainability.


Evidence

Historical comparison of international telephone revenue sharing model versus internet connectivity costs, reference to ITU study group discussions and D50 recommendation, impact on developing countries losing infrastructure financing


Major discussion point

Economic and Structural Challenges


Topics

Economic | Development | Legal and regulatory


Disagreed with

– Fiona Alexander

Disagreed on

Economic model sustainability and revenue distribution


Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking

Explanation

Internet resilience cannot be separated from broader infrastructure challenges including electricity, water, food systems, and shipping. These vulnerabilities are interconnected and require holistic political economy thinking rather than treating internet resilience as an isolated technical problem.


Evidence

Reference to connections between electricity, food systems, shipping lines, and the need to think about power, state conflicts, and internet shutdowns as interconnected issues


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Economic | Development


Disagreed with

– Ram Mohan

Disagreed on

Root cause analysis – systemic vs technical solutions


J

John Janowiak

Speech speed

144 words per minute

Speech length

364 words

Speech time

151 seconds

Cross-sector, cross-geography, and cross-disciplinary collaboration essential for addressing resilience challenges

Explanation

Internet resilience requires collaboration across different sectors, geographic regions, and academic disciplines. The Marconi Society’s approach brings together top experts from various fields to address these complex challenges that no single organization or sector can solve alone.


Evidence

Reference to Washington D.C. meeting with 30+ global experts, Internet Resilience Report publication, and formation of Internet Resilience Advisory Council with diverse membership


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Development | Legal and regulatory


Agreed with

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– Mark Nottingham

Agreed on

Cross-sector collaboration is essential for effective resilience


V

Vinton Cerf

Speech speed

153 words per minute

Speech length

551 words

Speech time

214 seconds

Internet dependence is increasing with AI applications, making resilience critical as consequences of failures become more severe

Explanation

The internet has become so woven into our ecosystem that we are very concerned about its resilience and reliability. With the arrival of new applications of artificial intelligence, that dependence is only going to increase, and when it doesn’t work there are serious consequences.


Evidence

Comparison to other infrastructure like power outages, blocked roads, and mobile network failures that have consequences when they don’t work


Major discussion point

Current State of Internet Resilience


Topics

Infrastructure | Development


Agreed with

– Ram Mohan
– Manal Ismail
– John Crain

Agreed on

Internet has become critical infrastructure requiring proactive resilience planning


Provenance and integrity of software components, especially open source libraries, are critical for supply chain security

Explanation

The word provenance will have heightened importance in understanding where things come from, how we know they have integrity, and whether they have been altered. This is particularly applicable to open source libraries which are wonderful because they’re accessible, but hazardous because sometimes they’re not well maintained.


Evidence

Questions about bill of materials, digital signatures, and tracking of software assembly and installation processes


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Cybersecurity | Infrastructure


Need for comprehensive supply chain documentation and audit capabilities to ensure security and integrity

Explanation

We need to ask whether we can document the supply chain that leads to a particular product or service and know that it has integrity. Tracking all of that and having the ability to audit where things came from and how they were assembled is a very important aspect of supply chain evaluation.


Evidence

Questions about knowing who digitally signed software, who assembled components, and how they were configured and installed


Major discussion point

Supply Chain Dependencies and Mapping


Topics

Cybersecurity | Infrastructure | Legal and regulatory


M

Moderator

Speech speed

127 words per minute

Speech length

1312 words

Speech time

618 seconds

Internet resilience requires collective risk management through collaborative approaches across sectors

Explanation

The moderator emphasized that internet resilience is fundamentally about collective risk management that requires collaborative approaches. This involves bringing together different stakeholders and sectors to address shared vulnerabilities and dependencies.


Evidence

Reference to the workshop structure bringing together diverse experts and the emphasis on enhanced collaboration throughout the discussion


Major discussion point

Systemic and Holistic Perspectives


Topics

Infrastructure | Legal and regulatory


IGF provides the appropriate forum for connecting technical coordination with policy development and real-world impacts

Explanation

The moderator positioned the Internet Governance Forum as the ideal venue for discussing internet resilience because it connects people affected by breakages to the processes involving technical coordination, policy development, and practical implementation.


Evidence

Framing of the workshop within IGF context and emphasis on connecting theory to practice through the panel structure


Major discussion point

Systemic and Holistic Perspectives


Topics

Legal and regulatory | Development


Agreements

Agreement points

Internet has become critical infrastructure requiring proactive resilience planning

Speakers

– Ram Mohan
– Vinton Cerf
– Manal Ismail
– John Crain

Arguments

Internet has become invisible infrastructure supporting all aspects of life, creating critical dependencies


Internet dependence is increasing with AI applications, making resilience critical as consequences of failures become more severe


Government role ranges from awareness and incentives to mandated requirements and enforced regulations


Continuous improvement needed as internet grows, requiring ongoing assessment of dependencies and vulnerabilities


Summary

All speakers agree that the internet has evolved from a convenience to critical infrastructure that supports essential services, requiring systematic and proactive approaches to resilience planning rather than reactive responses.


Topics

Infrastructure | Development | Legal and regulatory


Complex interdependencies create cascading failure risks

Speakers

– Ram Mohan
– Olaf Kolkman
– Mark Nottingham
– Fiona Alexander

Arguments

Cross-sector assumptions create vulnerabilities where each sector assumes others will remain available


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Even with best engineering practices, failures still occur requiring continuous improvement and transparency


Need to map actors, institutions, and dependencies across the entire internet ecosystem infrastructure supply chain


Summary

Speakers consistently identified that increasing system complexity creates hidden interdependencies and single points of failure that can cascade across sectors, requiring comprehensive mapping and understanding of these relationships.


Topics

Infrastructure | Cybersecurity


Cross-sector collaboration is essential for effective resilience

Speakers

– Ram Mohan
– Anriette Esterhuysen
– Manal Ismail
– John Janowiak
– Mark Nottingham

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Need for enhanced communication with end users who currently receive no information about disruptions


Need for multi-stakeholder approaches balancing national interests with global interoperability


Cross-sector, cross-geography, and cross-disciplinary collaboration essential for addressing resilience challenges


Systemic issues require cooperation across different businesses and ecosystem parts, not just individual company solutions


Summary

All speakers emphasized that internet resilience cannot be achieved by any single sector or organization alone, requiring enhanced collaboration and communication across technical, governmental, business, and civil society stakeholders.


Topics

Infrastructure | Legal and regulatory | Development


Physical infrastructure dependencies are critical vulnerabilities

Speakers

– Olaf Kolkman
– Anriette Esterhuysen
– Manal Ismail

Arguments

Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning


Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents


Governments should promote investment in redundant networks, secure digital registries, and national digital resilience strategies


Summary

Speakers agreed that physical infrastructure dependencies like power, water, and transmission infrastructure are often overlooked but represent critical vulnerabilities that must be addressed in resilience planning.


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Similar viewpoints

Both speakers emphasized how increasing system complexity creates fragility and hidden failure points, with Ram focusing on the broader challenges including regulatory and funding issues, while Olaf provided concrete technical examples of how complexity leads to cascading failures.

Speakers

– Ram Mohan
– Olaf Kolkman

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Topics

Infrastructure | Cybersecurity


Both speakers highlighted inequality in resilience capabilities and the need for inclusive approaches, with Anriette focusing on the Global South perspective and end-user experiences, while Manal emphasized the governmental role in ensuring equitable resilience through multi-stakeholder governance.

Speakers

– Anriette Esterhuysen
– Manal Ismail

Arguments

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Need for multi-stakeholder approaches balancing national interests with global interoperability


Topics

Development | Legal and regulatory | Infrastructure


Both speakers approached resilience from a technical architecture perspective, with Vint focusing on supply chain integrity and provenance, while Mark explained how multiple layers of abstraction are built to create reliability from inherently unreliable systems.

Speakers

– Vinton Cerf
– Mark Nottingham

Arguments

Provenance and integrity of software components, especially open source libraries, are critical for supply chain security


Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable


Topics

Infrastructure | Cybersecurity


Unexpected consensus

Revenue distribution and economic sustainability concerns

Speakers

– Paticipant
– Fiona Alexander

Arguments

Uneven revenue distribution from historical internet development may threaten long-term sustainability


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure


Explanation

Despite representing different perspectives on internet economics, both speakers acknowledged the complexity of revenue distribution issues while agreeing that historical telephone models cannot be applied to internet infrastructure. This represents unexpected consensus on the technical limitations of applying legacy economic models to internet governance.


Topics

Economic | Infrastructure | Legal and regulatory


Holistic approach to resilience beyond technical solutions

Speakers

– Paticipant
– Anriette Esterhuysen
– Olaf Kolkman

Arguments

Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Physical infrastructure like power and water are critical dependencies often overlooked in resilience planning


Explanation

Unexpected consensus emerged around the need for holistic thinking that goes beyond technical solutions to address broader systemic issues including economic inequality, infrastructure dependencies, and social factors. This represents a shift from purely technical approaches to more comprehensive socio-technical perspectives.


Topics

Infrastructure | Development | Economic


Overall assessment

Summary

Strong consensus exists on fundamental challenges (complexity, interdependencies, need for collaboration) and the critical nature of internet resilience, with broad agreement on the inadequacy of current approaches and the need for proactive, cross-sector solutions.


Consensus level

High level of consensus on problem identification and general solution directions, with speakers reinforcing each other’s points about system complexity, collaboration needs, and the critical nature of internet infrastructure. The consensus suggests a mature understanding of the challenges and readiness for coordinated action across sectors and stakeholders.


Differences

Different viewpoints

Scope of internet resilience – physical vs logical infrastructure

Speakers

– Anriette Esterhuysen
– John Crain

Arguments

Physical transmission infrastructure should be considered part of resilience, including protection from conflicts and accidents


ICANN manages critical identifier systems requiring uniqueness and global coordination for internet functionality


Summary

Anriette argues for including physical transmission infrastructure as part of internet resilience, noting this is not a universally accepted view and referencing struggles to get even DNS recognized as part of the public core. John focuses primarily on logical identifier systems and their management, representing a more traditional technical community view that separates logical from physical infrastructure.


Topics

Infrastructure | Cybersecurity | Legal and regulatory


Economic model sustainability and revenue distribution

Speakers

– Paticipant
– Fiona Alexander

Arguments

Uneven revenue distribution from historical internet development may threaten long-term sustainability


Traditional telephone accounting rate model cannot be applied to internet without breaking infrastructure


Summary

The participant argues that the shift from telephone accounting rates eliminated crucial revenue flows to developing countries and that current uneven distribution threatens sustainability. Fiona strongly disputes this, arguing that the telephone model cannot be applied to internet infrastructure and that modern peering/transit arrangements have addressed historical inequalities.


Topics

Economic | Development | Infrastructure


Root cause analysis – systemic vs technical solutions

Speakers

– Paticipant
– Ram Mohan

Arguments

Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Resilience issues transcend economic systems, occurring in various political and economic contexts


Summary

The participant frames resilience problems as fundamentally rooted in capitalist systems requiring transformation of global political economy. Ram argues that resilience problems transcend economic systems and occur across different political contexts, suggesting the focus should be on transcending rather than transforming existing systems.


Topics

Economic | Infrastructure | Development


Unexpected differences

Terminology precision in regulatory contexts

Speakers

– Ram Mohan
– Paticipant

Arguments

Security and stability more relevant concepts than safety for regulators and governments


Internet resilience problems interconnected with broader infrastructure vulnerabilities requiring holistic thinking


Explanation

This disagreement emerged unexpectedly during a question about physical security. Ram made a specific terminological correction distinguishing ‘security and stability’ from ‘safety’ for regulatory purposes, while the questioner was thinking more broadly about physical protection. This reveals different conceptual frameworks – technical precision vs. holistic security thinking.


Topics

Legal and regulatory | Cybersecurity


Overall assessment

Summary

The discussion showed relatively low levels of fundamental disagreement, with most conflicts arising around scope, approach, and emphasis rather than core principles. Main disagreements centered on: (1) whether physical infrastructure should be included in internet resilience definitions, (2) economic models and revenue distribution impacts, and (3) whether problems require systemic transformation or technical solutions.


Disagreement level

Low to moderate disagreement level. Speakers generally agreed on the importance of internet resilience and need for collaboration, but differed on scope, definitions, and approaches. The disagreements reflect different professional perspectives (technical, policy, academic, regional) rather than fundamental conflicts. This suggests good potential for finding common ground, though definitional and scope issues need resolution for effective collaboration.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasized how increasing system complexity creates fragility and hidden failure points, with Ram focusing on the broader challenges including regulatory and funding issues, while Olaf provided concrete technical examples of how complexity leads to cascading failures.

Speakers

– Ram Mohan
– Olaf Kolkman

Arguments

Four key challenges: increasing system complexity, regulatory pressures, insufficient funding for prevention, and supply chain vulnerabilities


Modern systems become more fragile as they get more complex, with hidden interdependencies and single points of failure


Topics

Infrastructure | Cybersecurity


Both speakers highlighted inequality in resilience capabilities and the need for inclusive approaches, with Anriette focusing on the Global South perspective and end-user experiences, while Manal emphasized the governmental role in ensuring equitable resilience through multi-stakeholder governance.

Speakers

– Anriette Esterhuysen
– Manal Ismail

Arguments

Two-tier system exists where some have backup solutions while others face internet resilience as “act of God”


Need for multi-stakeholder approaches balancing national interests with global interoperability


Topics

Development | Legal and regulatory | Infrastructure


Both speakers approached resilience from a technical architecture perspective, with Vint focusing on supply chain integrity and provenance, while Mark explained how multiple layers of abstraction are built to create reliability from inherently unreliable systems.

Speakers

– Vinton Cerf
– Mark Nottingham

Arguments

Provenance and integrity of software components, especially open source libraries, are critical for supply chain security


Internet inherently unreliable, requiring multiple layers of abstractions and redundancy to appear reliable


Topics

Infrastructure | Cybersecurity


Takeaways

Key takeaways

Internet resilience requires a fundamental mindset shift from reactive problem-solving to proactive prevention and cross-sector collaboration


The internet supply chain involves complex interdependencies extending far beyond traditional telecom providers to include power, water, physical infrastructure, and all sectors of the economy


A two-tier resilience system exists globally where some organizations and regions have backup solutions while others treat internet availability as unpredictable


Prevention-focused resilience measures struggle to attract funding compared to post-incident responses, creating a systematic investment gap


Physical transmission infrastructure must be considered part of internet resilience, including protection from conflicts, accidents, and natural disasters


Multi-stakeholder governance approaches are essential for balancing national interests with global internet interoperability


Continuous improvement and transparency about failures are necessary as internet complexity and dependencies continue to grow


Enhanced communication with end users is critically needed, as most people remain unaware of internet infrastructure vulnerabilities and current disruption status


Resolutions and action items

Marconi Society working group to produce first draft of internet resilience supply chain map by November meeting, following IP packet paths to identify all infrastructure dependencies


Participants encouraged to download and review the Internet Resilience Report from Marconi Society website


Organizations invited to join the Internet Resilience Advisory Council and contribute to ongoing resilience mapping efforts


Working group conducting mapping exercise through collaborative Google Docs to test online cooperation capabilities


Future iterations of resilience maps planned for specific sectors (energy, power) if initial mapping proves successful


Unresolved issues

No common definitions exist for critical internet infrastructure or critical information infrastructure across different sectors


Funding mechanisms for preventive resilience measures remain inadequate and systematically underdeveloped


Communication gaps persist between technical operators, government regulators, and end users during disruptions


Cross-sector coordination challenges where each sector assumes other critical infrastructure will remain available


Debate continues over whether physical transmission infrastructure should be universally considered part of internet resilience


Economic sustainability concerns regarding uneven revenue distribution in global internet infrastructure development


Regulatory friction between government demands for immediate fixes and technical community’s iterative problem-solving approaches


Suggested compromises

Multi-stakeholder approaches that balance national security interests with global internet interoperability requirements


Scoped mapping exercise starting with high-level packet flow analysis before diving into sector-specific details


Enhanced communication strategies that improve information flow to end users without overwhelming them with technical details


Risk-based approaches to resilience planning that prioritize coupled risks and cascading failure scenarios


Collaborative frameworks that respect both government accountability needs and technical community problem-solving methods


Thought provoking comments

The implication of dependence is that when it doesn’t work there are all kinds of consequences… I’m going to suggest to you that the word provenance will turn out to have a very heightened importance in this conversation. Where did things come from? How do we know that they have integrity?

Speaker

Vinton Cerf


Reason

This comment was foundational because it reframed internet resilience from a purely technical issue to one of trust and accountability in supply chains. Cerf’s introduction of ‘provenance’ as a key concept shifted the discussion from reactive problem-solving to proactive verification and documentation of digital supply chains.


Impact

This set the entire tone for the workshop, establishing the framework that subsequent speakers built upon. It moved the conversation beyond traditional infrastructure concerns to encompass software integrity, digital signatures, and supply chain transparency – themes that resonated throughout the entire discussion.


So you have this expectation and an assumption that other parts of critical infrastructure are going to be available, except those parts aren’t actually talking with each other, right? So, you have folks in the power sector… they have very good plans… but a common assumption for them is that the internet will be available so that they can communicate.

Speaker

Ram Mohan


Reason

This observation revealed a critical blind spot in infrastructure planning – the circular dependency problem where each critical infrastructure sector assumes others will remain operational. It highlighted the dangerous illusion of independence in interconnected systems.


Impact

This comment fundamentally shifted the discussion from viewing internet resilience as an isolated technical challenge to understanding it as part of a complex web of interdependent critical infrastructures. It influenced subsequent speakers to consider cross-sector collaboration and helped frame the mapping exercise that Fiona later described.


So even though theoretically the bank services are still up, you’re not as an end user able to access it… it’s like there’s a two-tier system of how… what you have in many countries in the global South is a two-tier system. Some people who just deal with internet resilience, it’s like an act of God. Sometimes you have, sometimes you don’t.

Speaker

Anriette Esterhuysen


Reason

This comment was particularly insightful because it exposed the inequality inherent in current resilience approaches. It challenged the assumption that technical solutions alone can address resilience, highlighting how socioeconomic factors create vastly different experiences of internet reliability.


Impact

This intervention brought a crucial equity lens to the discussion, forcing participants to consider that resilience isn’t just about technical redundancy but about who has access to backup systems and information. It influenced the conversation to consider end-user communication and the social dimensions of resilience, moving beyond purely technical solutions.


I know of a case where the diesel was tested every month for two hours… after five, six years, they really had an emergency. They turned the thing on, it worked for five hours, and it was out of diesel. They forgot to refuel the tanks.

Speaker

Olaf Kolkman


Reason

This seemingly simple anecdote was profound because it illustrated how human factors and operational oversights can undermine even well-designed technical systems. It demonstrated that resilience failures often occur not from sophisticated attacks but from mundane operational gaps.


Impact

This story became a touchstone for the discussion, with other speakers referencing similar themes about the importance of operational practices versus technical solutions. It helped ground the abstract concepts in concrete, relatable examples and emphasized the human element in resilience planning.


Don’t you think that that uneven flow of revenues could be a cost in the long run of unsustainability of the internet?

Speaker

Participant (Juan)


Reason

This question was thought-provoking because it connected internet resilience to fundamental economic sustainability questions, challenging participants to consider whether current business models might themselves be a threat to long-term internet stability.


Impact

While this comment didn’t dramatically shift the technical focus of the discussion, it introduced important questions about the economic foundations of internet infrastructure. It prompted responses about peering arrangements and IXPs, and connected resilience to broader questions of global digital equity and sustainable financing models.


I wonder if we imagine the project we’re trying to take on together to keep the internet resilient is a project that will transform our global capitalist system or is a project that very much depends on some other sector sorting those things out.

Speaker

Mallory


Reason

This was perhaps the most provocative comment because it challenged the fundamental assumptions underlying the entire discussion. It questioned whether internet resilience could be achieved within existing political and economic structures, or whether it required more fundamental systemic change.


Impact

This comment forced participants to confront the limits of technical solutions and consider whether their resilience efforts were addressing symptoms rather than root causes. While it came near the end, it reframed the entire discussion by questioning whether incremental improvements could address systemic vulnerabilities rooted in broader political-economic structures.


Overall assessment

These key comments collectively transformed what could have been a narrow technical discussion into a rich, multidimensional exploration of internet resilience. Cerf’s opening established the conceptual framework around provenance and supply chain integrity. Ram’s insight about circular infrastructure dependencies shifted the focus to cross-sector collaboration. Anriette’s observations about inequality brought crucial equity considerations into the technical discourse. Olaf’s diesel generator story grounded abstract concepts in human operational realities. The economic sustainability question and Mallory’s systemic critique challenged participants to consider whether their technical solutions were adequate to address the scale of the challenges. Together, these interventions created a discussion that moved fluidly between technical specifics and broader systemic questions, ultimately revealing internet resilience as a complex socio-technical challenge requiring collaboration across sectors, disciplines, and global power structures.


Follow-up questions

Do we have a business continuity strategy for unplanned disruption leading to a total global unavailability of the internet?

Speaker

Nandifa Natsaluba (online participant)


Explanation

This addresses a critical gap in global internet resilience planning – the need for comprehensive business continuity strategies that can handle complete internet failures, which would have catastrophic economic and social impacts.


How can we document the supply chain that leads to a particular product or service and ensure it has integrity?

Speaker

Vinton Cerf


Explanation

This is fundamental to supply chain security and resilience, particularly for open source libraries and software components that form the backbone of internet infrastructure.


How can we be assured that security has been properly attended to, not only in the fabrication of software, but also its configuration and installation?

Speaker

Vinton Cerf


Explanation

This addresses the need for end-to-end security verification throughout the entire lifecycle of internet infrastructure components.


What are risks that might be coupled to each other, and how do we identify and prepare for them?

Speaker

Olaf Kolkman


Explanation

Understanding cascading failures and interdependent risks is crucial for building truly resilient systems, as single events can trigger multiple simultaneous failures.


How can we enhance communication with end users about internet disruptions and recovery status?

Speaker

Anriette Esterhuysen


Explanation

There’s a significant gap in communicating internet resilience status to end users, particularly in developing countries where users are left to manage disruptions without information or support.


How can we develop common definitions of what constitutes critical internet infrastructure across different sectors and stakeholders?

Speaker

Anriette Esterhuysen


Explanation

The lack of common definitions hampers coordinated resilience efforts, as different communities (technical, government, telecom) have varying approaches and understanding of what needs protection.


Should physical transmission infrastructure be considered part of internet resilience, and how do we protect it during conflicts?

Speaker

Qusayr Shati and Anriette Esterhuysen


Explanation

This addresses whether internet resilience should include physical infrastructure protection, especially in conflict zones where infrastructure becomes a target or casualty of war.


Could the uneven flow of internet revenues globally cause long-term unsustainability of the internet?

Speaker

Juan (participant)


Explanation

This explores whether economic imbalances in internet infrastructure financing could undermine global internet resilience, particularly affecting developing countries’ ability to maintain and upgrade infrastructure.


How do we solve internet resilience problems without addressing broader systemic issues like power, water, and political conflicts?

Speaker

Mallory (participant)


Explanation

This questions whether internet resilience can be achieved in isolation or requires addressing fundamental infrastructure and political economy issues that affect all critical systems.


How can we develop next iterations of the resilience map that dig into specific sectors like energy and power?

Speaker

Fiona Alexander


Explanation

This suggests expanding the mapping exercise to create sector-specific resilience maps that would provide more detailed analysis of interdependencies within critical infrastructure sectors.


How do we continue to increase and maintain resilience as the internet continues to grow and evolve?

Speaker

John Crain


Explanation

This addresses the ongoing challenge that resilience is not a one-time achievement but requires continuous adaptation and improvement as the internet ecosystem evolves.


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.

Open Forum #20 WSis+20 High Level Event 2025 Ocp Special Briefing

Open Forum #20 WSis+20 High Level Event 2025 Ocp Special Briefing

Session at a glance

Summary

This discussion focused on the upcoming WSIS Plus 20 high-level event and the evolution of the World Summit on the Information Society (WSIS) forum over the past two decades. Gitanjali Sah from ITU opened the session by outlining the WSIS process, which began in 1998 and has grown to involve over 50 UN entities in a multi-stakeholder framework that includes the Internet Governance Forum (IGF). The WSIS action lines provide a comprehensive framework where different UN agencies implement specific areas based on their mandates, such as FAO handling e-agriculture and ITU managing ICT infrastructure and cybersecurity.


Ambassador Thomas Schneider from Switzerland emphasized the importance of translating dialogue into concrete decision-making and action, noting that while the WSIS structure has helped achieve many goals, there remains work to bridge the gap between discussion and implementation. South Africa’s representative highlighted their country’s commitment as the incoming chair of the high-level event, citing their active participation in internet governance processes and their focus on issues like AI, digital public infrastructure, and capacity building for small businesses through their G20 presidency.


Multiple UN agencies and stakeholders expressed their continued commitment to the WSIS process. UNDP’s Yu Ping Chan stressed the critical importance of capacity building, which remains the top request from governments they serve globally. UNESCO’s representative emphasized their role in facilitating action lines on access to information, e-learning, cultural diversity, and media ethics. The technical community, represented by ICANN, reaffirmed support for the multi-stakeholder model and urged recognition of the technical community as a distinct stakeholder group.


The discussion revealed broad consensus on the continued relevance of WSIS principles, with participants noting that the framework’s ambitious vision of a people-centered, inclusive information society remains more important than ever in addressing current digital challenges and opportunities.


Keypoints

## Major Discussion Points:


– **WSIS Plus 20 High-Level Event Planning and Logistics**: Extensive discussion of the upcoming World Summit on the Information Society (WSIS) Plus 20 high-level event scheduled for July 7-11 in Geneva, including venue details, registration processes, high-level participation (67 ministers confirmed), and the interactive agenda developed through multi-stakeholder consultations.


– **Multi-stakeholder Governance and Implementation Framework**: Emphasis on maintaining the multi-stakeholder DNA of the WSIS process, with various UN agencies, civil society, private sector, and technical community representatives discussing their roles in implementing the WSIS Action Lines and contributing to digital policy development.


– **Bridging Dialogue and Decision-Making**: A recurring theme about the need to translate multi-stakeholder discussions into concrete actions and real-world impact, moving beyond dialogue to actual implementation that affects communities and achieves sustainable development goals.


– **Integration with Global Digital Governance Frameworks**: Discussion of how WSIS connects with other major digital governance initiatives including the Global Digital Compact (GDC), Internet Governance Forum (IGF), AI for Good conference, and various national and regional digital policy frameworks.


– **Capacity Building and Digital Divide**: Focus on addressing digital inequalities through capacity building initiatives, particularly for developing countries, rural communities, and specific sectors like agriculture, with emphasis on meaningful connectivity and inclusive digital transformation.


## Overall Purpose:


The discussion served as a briefing and coordination session for stakeholders preparing for the WSIS Plus 20 high-level event. The primary goal was to update participants on event logistics, encourage broad participation, and align various stakeholder perspectives on the evolution and future direction of the WSIS process as it undergoes its 20-year review.


## Overall Tone:


The tone was consistently collaborative, professional, and forward-looking throughout the conversation. Speakers demonstrated mutual respect and appreciation for each other’s contributions to the WSIS process. There was an underlying sense of urgency about making the upcoming high-level event impactful, combined with pride in the achievements of the past 20 years. The discussion maintained an optimistic and constructive atmosphere, with stakeholders expressing commitment to continued cooperation and shared goals for digital inclusion and sustainable development.


Speakers

**Speakers from the provided list:**


– **Gitanjali Sah** – Session moderator/organizer from ITU, coordinating the WSIS plus 20 high-level event


– **Thomas Schneider** – Ambassador from Switzerland, representing the co-host country of the WSIS plus 20 high-level event


– **Representative of South Africa** – Cynthia, representing South Africa as chair-designate of the upcoming high-level event, with Minister Soli Malatsi as the designated chair


– **Yu Ping Chan** – Representative from UNDP, speaking on behalf of UN organizations co-convening the WSIS Forum


– **Tatevik Grigoryan** – Representative from UNESCO, co-host of the WSIS plus 20 high-level event


– **ICANN representative** – Veni, representing the technical community and ICANN


– **FAO representative** – Dejan, facilitator of WSIS action line on e-agriculture


– **MAG representative** – Bruna, ex-MAG member and co-facilitator of the MAG Working Group on Strategy


– **Anriette Esterhuysen** – Civil society representative from APC (Association for Progressive Communications)


– **WIPO representative** – Richard, representing the World Intellectual Property Organization


– **Inter Parliamentary Union representative** – Andy Richardson, representing parliamentarians in the WSIS process


– **ICC representative** – Meli, representing the International Chamber of Commerce and Business Action to Support the Information Society


**Additional speakers:**


None identified – all speakers mentioned in the transcript were included in the provided speakers names list.


Full session report

# WSIS Plus 20 High-Level Event: Comprehensive Stakeholder Discussion Report


## Executive Summary


This discussion focused on preparations for the World Summit on the Information Society (WSIS) Plus 20 high-level event, scheduled for 7-11 July in Geneva. The session, moderated by Gitanjali Sah from the International Telecommunication Union (ITU), brought together representatives from across the multi-stakeholder community to coordinate event preparations and reflect on two decades of WSIS implementation.


The discussion revealed strong consensus on the continued relevance of WSIS principles and the multi-stakeholder approach, while acknowledging significant challenges in translating dialogue into concrete decision-making and measurable outcomes. With 67 ministers and deputies confirmed to attend, the event represents substantial global recognition of WSIS’s importance, though participants identified critical gaps in measurement frameworks and institutional visibility within broader UN processes.


## Background and Context


### WSIS Evolution and Framework


Gitanjali Sah outlined the evolution of the WSIS process, which began with a proposal in 1998 at ITU’s plenipotentiary conference when Tunisia requested the framework. It has grown into a comprehensive multi-stakeholder framework involving over 50 UN entities. The WSIS action lines provide a structured approach where different UN agencies implement specific areas based on their mandates – for example, the Food and Agriculture Organization (FAO) handles e-agriculture while ITU manages ICT infrastructure and cybersecurity.


The framework has maintained its multi-stakeholder approach throughout its 20-year journey, incorporating the Internet Governance Forum (IGF) as an integral component. This architecture has facilitated inclusive dialogue across governments, civil society, private sector, technical community, and academia, though measuring quantitative impact remains challenging due to the absence of indicators and monitoring frameworks.


### High-Level Event Logistics and Participation


The WSIS Plus 20 high-level event has secured participation from 67 ministers and deputies confirmed across all regions. The event will take place at the Palexpo venue, with an interactive agenda developed through extensive multi-stakeholder consultations. Sah noted that one badge will provide access to both the WSIS event and the AI for Good conference taking place simultaneously.


Additional event features include 72 WSIS champions and 18 winners to be awarded, a youth special track, and a youth party planned for Monday at ITU premises. A hackathon on “hack against hunger” will also take place, though speakers noted the lack of incubators to support innovation beyond the event.


The representative of South Africa expressed honor at their country’s role as chair-designate, with Minister Soli Malatsi designated as chair. She emphasized South Africa’s long-standing commitment to the WSIS process since the 2003 Geneva Summit and highlighted their current leadership of the ITU Council Working Group on WSIS and SDGs.


## Key Stakeholder Perspectives


### Co-Host Country Commitment


Ambassador Thomas Schneider from Switzerland emphasized the critical importance of translating dialogue into concrete decision-making and action. He noted that while the WSIS structure has helped achieve many goals over the past two decades, the biggest gap currently facing the community is ensuring that multi-stakeholder dialogue actually translates into results and decision-making processes.


Switzerland’s commitment extends beyond hosting, with Schneider referencing their non-paper with proposals for building on existing WSIS architecture rather than creating entirely new structures.


### UN Agency Coordination and Implementation


The discussion highlighted extensive coordination among UN agencies through the UN Group on Information Society. Yu Ping Chan from the United Nations Development Programme (UNDP) provided field perspective, noting that capacity building remains the top request from the 170 country offices they serve globally, reflecting the enduring relevance of original WSIS principles.


UNESCO’s representative, Tatevik Grigoryan, emphasized their role in facilitating action lines on access to information, e-learning, cultural diversity, and media ethics. She advocated for principled frameworks rooted in WSIS values of human rights, openness, and accessibility.


The FAO representative, Dejan, provided context for the urgency of digital transformation, noting that 700 million people remain undernourished globally. FAO uses the WSIS process to address agri-food system transformation enabled by technology, highlighting the critical implications of effective digital governance.


### Technical Community and Private Sector Engagement


The ICANN representative reaffirmed strong support for the multi-stakeholder model while urging recognition of the technical community as a distinct stakeholder group. The representative noted that while the IGF was mentioned in the Global Digital Compact as the primary meeting space for Internet policy discussions, the WSIS Forum was omitted from the elements paper for the UN General Assembly review, prompting calls for coordinated stakeholder feedback.


The International Chamber of Commerce (ICC), represented by Meli, demonstrated long-standing private sector engagement since WSIS inception. ICC plans to organize specific sessions including a workshop on July 10th (3-3:45 PM) on “Global Adoption, Global Progress, Managing the Challenges of AI Inclusion” and a Knowledge Cafe on July 9th (12-2 PM) on strengthening multistakeholderism.


### Civil Society and Parliamentary Perspectives


Anriette Esterhuysen from the Association for Progressive Communications (APC) provided a civil society perspective, emphasizing that the WSIS Action Line Framework enables collaborative implementation at country level between governments and stakeholders. She characterized WSIS as more powerful than most other tech-related UN frameworks.


The Inter-Parliamentary Union representative, Andy Richardson, brought the perspective of elected representatives who must balance innovation with citizen protection, adding democratic accountability to technical and policy discussions.


## Major Agreements and Consensus Areas


### Multi-Stakeholder Participation as Core Principle


The discussion revealed unanimous agreement that multi-stakeholder participation represents the core DNA of both WSIS and IGF processes. All speakers consistently emphasized that this inclusive approach has been successfully maintained throughout WSIS evolution, enabling collaborative implementation across different stakeholder groups.


### Complementary Nature of WSIS and IGF Platforms


Speakers demonstrated clear agreement that WSIS Forum and IGF serve complementary rather than competing roles in global digital governance. This complementary relationship is being operationalized through two IGF-focused panels planned for 8 July at the high-level event, addressing both mandate renewal and the next 20 years of IGF development.


### Implementation and Capacity Building Priorities


Multiple speakers emphasized that capacity building and practical implementation represent fundamental needs requiring urgent attention. The UNDP representative’s observation that capacity building is the top request from governments globally resonated across different stakeholder groups, with each providing concrete examples of implementation challenges and solutions.


## Challenges and Areas of Concern


### Dialogue to Decision-Making Gap


The most significant challenge identified was the persistent gap between multi-stakeholder dialogue and actual decision-making by governments and institutions. Ambassador Schneider’s articulation of this challenge as the biggest current gap resonated across multiple subsequent interventions.


This challenge manifests in various ways: excellent discussions in forums that struggle to influence actual policy decisions, capacity building needs identified globally but inadequately addressed, and innovative solutions developed through initiatives like hackathons that lack incubation support to reach implementation.


### Measurement and Accountability Frameworks


Sah acknowledged that WSIS action lines lack indicators and monitoring frameworks, representing a fundamental weakness in the 20-year process. This absence of quantitative measurement capabilities means that while qualitative achievements can be celebrated, systematic assessment of progress and impact remains impossible.


### Institutional Recognition and Visibility


The omission of WSIS Forum from the elements paper for the UN General Assembly review highlighted ongoing challenges in ensuring proper recognition of multi-stakeholder processes within formal UN frameworks. This visibility gap could undermine WSIS influence in broader digital governance discussions.


## Future Directions and Action Items


### Immediate Preparations


All stakeholders were encouraged to submit comments and inputs to the UN General Assembly overall review through the online form available until 15 July. The ITU will work with the Office of the Secretary-General’s Envoy on Technology (ODET) on Global Digital Compact implementation roadmap, requiring a thousand-word document on current implementation to be submitted to the Commission on Science and Technology for Development annual session.


South African Minister Soli Malatsi will submit a chair summary of high-level event outcomes to the UN General Assembly review process.


### Long-term Strategic Development


The discussion identified several areas requiring sustained attention beyond the July event. Developing indicators and monitoring frameworks for WSIS action lines emerged as a priority for enabling quantitative measurement of achievements and impact assessment.


Strengthening the dialogue-to-decision-making pipeline requires systematic attention to how multi-stakeholder discussions translate into policy decisions and implementation. Building on existing WSIS architecture rather than creating entirely new structures offers a pragmatic approach to institutional evolution while maintaining proven multi-stakeholder frameworks.


## Conclusion


The discussion revealed a mature multi-stakeholder community with strong consensus on fundamental principles while honestly acknowledging significant implementation challenges. The upcoming WSIS Plus 20 high-level event represents both celebration of achievements and critical opportunity to address persistent gaps in measurement, decision-making translation, and institutional recognition.


The high level of participation confirmed for July, combined with the collaborative spirit demonstrated throughout this preparatory discussion, suggests a strong foundation for meaningful outcomes. However, success will ultimately be measured not by the quality of dialogue in Geneva but by the concrete actions and decisions that follow in countries and communities worldwide.


The WSIS Plus 20 milestone occurs at a crucial moment when digital governance challenges have never been more urgent or complex. The framework’s vision of a people-centered, inclusive information society remains relevant, but achieving this vision requires moving beyond dialogue to systematic implementation and measurable impact that stakeholders consistently identified as the next frontier for multi-stakeholder digital governance.


Session transcript

Gitanjali Sah: Good morning ladies and gentlemen, thank you for joining us today for this special session on the WSIS plus 20 high-level event and the evolution of the WSIS forum over the years. Since we have it’s a 9 a.m meeting, we would really appreciate if you can join us here so that we can be closer to each other. The audience if you would like us to join in the table that would be really nice so we can be closer together. Okay so basically I wanted to divide this into two parts to kind of update you about the WSIS plus 20 high-level event but also to look at the evolution in the context of the WSIS plus 20 review as well. So we have a very quick presentation which I will go through and then we’ll pass on the floor to our speakers who are actually also our stakeholders who contribute very actively to the WSIS forum and the WSIS process. So as all of you are familiar it’s a UN process WSIS. It started in the evolution started in 1998 in ITU’s plenipotentiary conference when Tunisia as a member state requested that there should be a framework like WSIS. We work with more than 50 UN entities currently and of course it’s a multi-stakeholder process. You can see IGF is part of the WSIS process and you can see the spirit here the multi-stakeholder participation and we are very proud that we could maintain that over the years. So the evolution is clear and I’ll leave this presentation for all of you. I’ll go through it very quickly. 1998 it was proposed, 2001 we took it to the UN, 2003 and 5 we had the two events the summits, 2003 came up with the framework of the WSIS action lines, 2005 was the Tunis agreement where IGF was also born. 2015 our mandate was renewed and then it was still 2025 and hence this is such a milestone year for all of us where we are reviewing the mandate. As you all know we are guided by the framework of the WSIS action lines. It’s a beautiful framework where all UN agencies based on their mandates work together. For example, Dejan from FAO implements the action line on e-agriculture with the multi-stakeholder community. ITU has the action line on ICT infrastructure, cyber security and so on so forth. The WSIS implementation wheel, as we call it, the action lines, the forums, stocktaking, stocktaking database is a huge database where all stakeholders have inputted their projects, really the grassroot projects, based on the action lines, the SDGs, and now we also have an alignment with the global digital compact objectives. Like we mentioned, it’s really multi-stakeholderism is in the DNA of the WSIS process and we’re proud that we’ve been able to maintain it. Now our achievements over the 20 years, one challenge that all of us face is that the WSIS action lines don’t have indicators and monitoring frameworks. So we really can’t measure and tell you that quantitatively this is what we’ve achieved in the WSIS action lines. However, if you look at the qualitative achievements, you can look at how a process like WSIS, a framework like WSIS has improved the lives of people all over the world. So WSIS essentially was about technology benefiting the people on the ground. So 5.5 billion people online. Looking at the Giga mapping, we see that 280,000 plus schools are connected with UNESCO. We figured out that 400 plus languages are accessible, and so on and so forth. So the stocktaking database, all of you must have a look at it. And if you’re looking for examples of implementation of WSIS on the ground, you definitely can use those examples in your presentations, in your case studies, and so on and so forth. It’s a very good repository. We also have WSIS photo contest winners every year out there, so you can use those. The United Nations Group on Information Society, all members of the CEB, the Chief Executive Board, are members of this group. We also have observer members, newcomers like Odette, who are very welcome to the United Nations Group on Information Society. It’s UN in action, and we have been working really well to implement the digital aspects of our work together. This is high-level event. As I look around the table, most of you are coming there. So we really look forward to welcoming you there. We’ve had several briefings for all of you. So the way the agenda and the program is built, it’s through an open consultative process. Most of you have been part of it. And the interactive agenda that you see right now is the result and the outcome of what we’ve done together. We had several consultative meetings, we analysed the inputs that we received, and then we put it together on the forum website. So as you’ll see in these graphs, the contributions to the WSIS Forum open consultation process, they are very, very multi-stakeholder. Also, we are very proud to say that some regions who were not that active in the process in the sense of contribution of inputs, for example, Latin America, it’s really increased over the years. So we are really happy that all regions and all stakeholders are benefiting and contributing towards the process. So I’ll skip all of this because the agenda is already online. This one is important. All the action line facilitators have actually got together and there’s a presentation online, you can find it on the WSIS Forum website, highlighted the achievements, challenges and opportunities of the WSIS action lines. It’s a beautiful, it’s really important work that people have done, where they’ve shown you the evolution of the action line, and these are the experts. So I think you should have a look at it, it’ll really help you with the work that you’re doing as well. So our chair designate is the Minister of South Africa, Excellency Soli Malatsi. Cynthia was supposed to be here representing him, but I think she’s on her way. And he will take over from Switzerland, who was the chair last year. The venue is Pal Expo, it’s very similar actually to this venue. It’s a huge space, and it’s very approachable, Geneva is a small place and it’s easy to travel in Geneva. I hope you’ve registered, especially the people who needed visas, because we’re working closely with the Swiss administration, who’s also helping us with the visas. So as you’re aware, the AI for Good conference is also taking place at the same time. So one badge will take you also to the AI for Good conference. Once you have it, you can also access it. Now in terms of high level participation, we are proud to say that we have 67 ministers confirmed right now, 67 ministers and deputies. This means that not only the G77 countries, EU, but all the regions, they really consider this process so important that they would like to be present in Geneva for it. We have more than 40 regulators coming, of course our UN partners that are very important, and 72 WSIS champions and 18 winners who will be awarded during the conference. high-level event. So I won’t go through the program, you all have seen it. We have a high-level one, we have workshops, we have several WSIS plus 20 consultations. These will happen during lunchtime, during the knowledge cafes as well. So please be there because we really want concrete outcomes. We have limited space at Palexpo, so we will have registration forms, do fill them up as soon as they are available online. We have a youth special track that we will be working on, and if you have youth delegations coming with you, and of course we are all young at heart, so we can all join the youth party that we will have at ITU Maubriant premises on Monday. So please join the youth track also on Monday, 7th of July to kind of get an impression of what the young people are expecting out of us. We have exhibition spaces, but since we are non-commercial, they are not very fancy about what people are doing on the ground. I’m going to skip all of this because, well, I do see many high-level track facilitators around, so I wanted to say that the high-level tracks are moderated by the high-level track facilitators, who are selected from, not selected actually, nominated by the different stakeholder types. So we look forward to, Cheryl is one of them, and I see Valeria, Anaret, so many of you around, thank you so much. I spoke about the, so the outcomes of the high-level event, very important this time because they will be fed into the UNGA overall review. So one would be through the chair summary, so the South African minister who’s going to submit the outcome of the high-level event to the UNGA overall review. Second is, of course, the ITU secretary-general’s WSIS plus 20 roadmap and report, which she will be submitting, and I do hope that all of you, while making your submissions to the UNGA overall review, review will consider the importance of WSIS Forum and IGF in terms of being multi-stakeholder you know platforms for deliberations on digital policy. We of course have seen the elements paper which was released and we were quite surprised to note that the WSIS Forum was not noted on it so we will provide our feedback but if all of you could we would like to encourage all of you also to submit your comments and inputs through the online form which is available until 15th of July. So I’ll stop here now because you know it’s quite I’ll make this available for you but just two points my colleagues from New York also wanted me to highlight is that ITU is also working with ODET in the GDC implementation roadmap. We are supposed to provide a thousand word document on how the GDC is being implemented currently so we encourage you to also submit to us these ideas so we could prepare this thousand word document and this will be sent to the CSTD annual session next year. So I’m gonna stop here and hand over the floor actually to Ambassador Schneider who’s the Switzerland is the co-host of the WSIS plus 20 high-level event they were also the co-chair they were also the chairs last year. Ambassador Schneider thank you for the wonderful evening last night over to you.


Thomas Schneider: Yes thank you Gitanjali and good morning everyone I hope you can hear me with your earphones. Yes we are happy and proud to be the co-host of also this year’s WSIS forum we are also very happy to work together with our friends from South Africa who are chairing the event this year. because we think that WSIS is a very important structure. We had almost 22 years ago where we agreed in Geneva on some principles how to turn this world into an inclusive, people-centred and development-oriented or the other way around, information society. Now we would call it digital society. We have agreed on an action plan and then in Tunis we have complemented whatever was not agreed in Geneva. And we do think that, and we have expressed this on many occasions this week, that this structure has helped us a lot to achieve some of the goals that we set, some of the targets that we set. There’s still some work to do in many others. We’ve had new challenges, new technical developments, new opportunities that this system has been able to take on. We are discussing here at the IGF not only about the same things that we were discussing 20 years ago. We are every year adapting our dialogue to the challenges and opportunities of the time. The same goes not just for the IGF here, it also goes for the WSIS. So we think that this architecture is not perfect, but we have tried to be as inclusive as we can, to allow as many voices to be heard as we can. And the IGF as well as the WSIS Forum are two important components that are complementary because they have a slightly different setting. They are complementary in our view and we are very happy that these two exist and think these are very important elements of the dialogue part. Of course, we all know that dialogue is only a necessary but not sufficient step in getting things done and actually making things happen. So I can again refer to among other inputs to the Swiss non-paper that we have circulated where we try to build on the existing architecture, make some concrete proposals that can be discussed that we hope are useful to actually fill the biggest gap that I think we currently have, which is to help make sure that the dialogue that we’re having is actually turning into result in decision-making for us so that the voices of the people are not just heard here or at the WSIS forum, but they actually heard when and taken into account when decisions are made. I think this is something we all need to work on and we are very happy to see that also this year there will be a big WSIS plus 20 and the AI for Good will be a big meeting but with lots of participants, but also a remarkable number of high-level participants so we also hope that this meeting will be used to get this dialogue to the awareness of high-level people from all stakeholders because this is what we I think need to focus on to make sure that these voices that we try to make heard that they are really have an impact in decisions that are taken, be it in intergovernmental institutions, also by private institutions. I think this is the biggest endeavor so we hope that this discussion here is useful to bring us one step closer to this goal. Thank you very much.


Gitanjali Sah: Thank you very much, Ambassador Schneider and thanks to Switzerland for their support for making this happen. We’re really looking forward to the high-level events 7th to 11th of July and as we look around the room I just mentioned that we know most of them are going to be there with us so thank you so much. I’ll move on to now the chair-designate, South Africa. Cynthia, the floor is yours.


Representative of South Africa: Thank you, Gitanjali and good morning to everyone. and it’s such an honour to be part of this session and to see many familiar faces that we have, I have actually interacted with and we are really looking forward as South Africa to be the chair of the upcoming high level event in Geneva which will then be chaired by our Honourable Minister Soli Malachi. And for South Africa really, we stand firmly and constantly a champion of the WSIS process since its inception from 2005 to, I mean from 2003 to 2005 and many South African delegation has, have actually actively participated in the 2003 Geneva Summit including the 2005 Tunisia Summit and this is a demonstration of the South African commitment to bridging the digital divide and shaping the future for internet governance. As South Africa, we have also played an important role in advancing the civil society and multi-stakeholder participation both in global internet governance process. Its leadership has been visible in both policy development and of course the norm-setting platform helping to ensure that voices of the global South, particularly African stakeholders, are represented in shaping the digital future. For instance, I would say that from a country point of view, we do have a, we all, we have also chaired, I think, through our clear and data, a multi-advisory group of the United Nation IGF and which is another clear recognition of South Africa’s commitment. to Inclusive Internet Governance. But in addition to that, South Africa, we have also, we have what we call the Internet Governance Forum, which is a multi-stakeholder platform that, which unites government, the civil society, the academia, the private sector, and most importantly, the youth. And we do not end there, South Africa, but we also recently have hosted a national IJF forum under the theme, Reviewing South Africa’s Internet Governance Program, progress in the context of WSIS plus 20. And, you know, for us, this was about highlighting alignment with the Global Digital Policy Framework. And of course, we’ve used the forum to access the diverse voices on what we have achieved, the challenges, and again, what lies ahead of us beyond 2020-25. And again, the other, I would say, a classic example of how we are committed to the WSIS Forum, it’s our role as the chair of cancer working group, ITU Cancer Working Group, WSIS and SDGs. And through that platform, again, as a chair, what we have done working together with the ITU, we’ve issued an ITU’s call for both governments and stakeholders to really share their experiences of how they have implemented the WSIS outcomes for over a period of 20 years, and what are the challenges, and what is it that they are envisioning going forward. So this is one of, what I would say, the highlights of showing, again, how South Africa is really taking this process serious. But we did not only end there, but through our G20 presidency, the country is also prioritizing a number of issues. that are actually key, and they are key not only for South Africa, but they are also the issues that are contained in the Global Digital Compact. Issues such as your AI, it’s one of the South African G20 Presidency focus areas, the issue of the digital public infrastructure, and these are some of the things. And also, in addition to the two issues that I’ve mentioned, there’s also the issue of capacity building for SMMEs. That is another element that the South African government is actually prioritizing through its G20 Presidency. And all of these things that I’ve mentioned, they are quite key in the global discussions, and again, in ensuring that we achieve the 2030 Sustainable Digital SDGs. But again, it is also important to also reflect on these issues as we look beyond 2025. Thank you.


Gitanjali Sah: Thank you, Cynthia, and we look forward to welcoming South Africa as the chair of the High Level Event. You’re already the chair of the Council Working Group on Business and SDGs. Thank you so much. We have to be mindful of time. There are 23 minutes left. We can see the timer there. I’ll invite all the stakeholders who wanted to also express themselves. I’ll start with our co-organizers. Yu Ping from UNDP. Yuping, the floor is yours.


Yu Ping Chan: Thank you so much, Gitanjali. And just wanted to say on behalf of the other UN organizations to our co-conveners of the WSIS Forum, UNCTAD, UNESCO, and UNDP, together working closely, of course, with ITU, we really look forward to having you as part of the process, as part of the conversation, because we all know this is a particularly important year. I just wanted to put a plus one and a super plus 1,000, actually, on the points that have been raised on this idea of the translation and delivery of conversations into decision-making and then action. For UNDP, with our 170 country offices around the world, our support to over 120 governments in the area of leveraging digital and AI to achieve the SDGs, this is particularly important. It’s about the impact that we make directly to communities and people that we serve around the world that will make the difference in terms of how we translate digital discussions at the global level into real impact on lives. and economies and communities and so that idea that has already been reiterated by Cynthia from South Africa talking about the importance of capacity building is particularly profound. So for instance for UNDP the number one ask from the national governments and communities that we serve is capacity building and that’s really important and that is actually a principle that has existed and endured from the very beginning of WSIS itself. So this is I think a pertinent example of what Ambassador Schneider says that you know the principles that underlying WSIS are even more relevant today than ever before. I also want to say that’s how UNDP characterizes our participation in WSIS around the action line capacity building that we facilitate. So for instance just last week in Rome we launched the AI help for sustainable development with the Italians that was a product of the G7 presidency that is really aiming to strengthen local AI ecosystems in Africa. Just two weeks ago at the Hamburg sustainability conference we worked very closely with our colleagues from the German government the BMZ the GIZ to launch the Hamburg declaration on responsible AI for the SDGs. This is the first ever completely multi-stakeholder document on this important issue and we now have almost 50 signatories from across the entire multi-stakeholder community some of the major names in the area of AI. I will ask my German colleagues to actually put the link to the chat so that perhaps some of the stakeholders here in the IGF community would be also interested in being an endorser of the Hamburg declaration as well. So all of this I think is precisely that connection that we’re talking about. The connection between a multi-stakeholder conversation to decision-making by policymakers and collectively by the entire multi-stakeholder community then translated into real action on the ground for people everywhere that we serve. So I think I just want to reiterate this importance of this continuing connection between New York, Geneva, South Africa, G20, Hamburg and all these other places in which we’re collectively taking action. Thank you so much.


Gitanjali Sah: Thank you very much, Yuping Chan. I do not see UNESCO in the room.


Tatevik Grigoryan: Thank you very much. I’ll read it to make it quick. So thank you again. Thank you and colleagues and everyone here present. So over the past two decades, the Internet has undergone a remarkable transformation and the vision laid out in WSIS has materialized in ways both inspiring and complex. And we’ve witnessed how the emerging technologies revolutionized our lives both positively and also posing serious threats such as disinformation, misinformation and other harmful content. And this is why UNESCO has continuously advocated for the use of the recognized and principled frameworks such as ROMEX, many of you know it, rooted in the same foundational values as WSIS, human rights, openness, accessibility and multi-stakeholder participation. ROMEX provides a robust tool to assess and guide the development of inclusive rights-based digital environment. We’re confident that the outcomes of the IGF will serve as a strong foundation for the upcoming WSIS plus 20 high-level event which UNESCO is proud to co-host again alongside ITU and Switzerland, the UNDP and UNCTAD. I would like to extend our heartfelt thanks to all WSIS stakeholders who actively contributed to shaping this year’s IGF program through the open consultation process. I would also like to recognize the continued investment of the members of the UN Group on Information Society, which UNESCO had the honor to chair during the last year. This group constitutes the UN level of fundamental backbone to implementation of the WSIS outcomes, ensuring coordination, partnership and complementarity across agencies and programs. Finally and most importantly I’d like to warmly invite you to participate in the discussions around the WSIS action lines, which UNESCO is the facilitator. The action lines are on access to information, e-learning and science, cultural diversity and multilingualism, media, ethics of information society. These action lines are not just thematic areas, they are pillars of digital society that is inclusive, ethical and sustainable. We really do look forward to your contributions in these discussions and look forward to the outcomes of the forum for a renewed… focused action-oriented WSIS 2.0 or plus, accelerating our collective efforts towards reaching the international agreed development goals. Thank you.


Gitanjali Sah: Thank you, Tatevik. You know UNESCO is a very close partner of the UN in the WSIS process and at the ITU actually we have expanded WSIS into information and knowledge societies ensuring that all the work of UNESCO is also discussed when we talk about the WSIS process. So it’s not only about provision of ICT infrastructure but also converting it into knowledge. Thank you so much. I’d now like to hand over the floor to Veni, representing the technical community ICANN. He has a conflicting schedule, so Veni, over to you.


ICANN representative: Thank you. And thank you for organising this session and talking about UNESCO and ITU, ICANN is partnering with both organisations. We just signed an MOU with UNESCO and we have long-term relationships with the ITU in a very positive way. Most recently we had briefings for UN diplomats in Geneva and in New York where we had our president and CEO Curtis Lindquist speaking with Doreen Bogdan-Martin in Geneva and we were co-hosted by Cintia by South Africa and Finland in New York. So we are really having a very good cooperation and we use the opportunity here to meet with people from both organisations. We had a meeting with the Assistant Director General yesterday and we are talking about doing more briefings in the WSIS plus 20 process. Also I took a note from your appeal to stakeholders, Gitanjali, to put in the comments to the elements paper to note that the WSIS plus 20, sorry the WSIS The ITU WSIS Forum is not mentioned and this is an omission obviously, I hope it will be corrected in the zero draft. We had a meeting with the co-facilitators yesterday and we want to reiterate that the WSIS Forum, where we will have a delegation headed by the ICANN President and the leadership of the ICANN Board will be participating as well in 10 days in Geneva. We want to convey the same messages everywhere, which is basically the IGF is a great venue. It’s not a coincidence that it was mentioned last year in the Global Digital Compact as the primary meeting space for discussing Internet related policy issues, questions. And that the technical community is a separate stakeholder which also should be recognized and reaffirmed. And also that the multi-stakeholder model of Internet governance is the one that actually managed to bring all this economy, accessibility, etc. Things that were made possible because of the Internet. So we are hopeful that the Member States of the United Nations will use this opportunity in the WSIS Plus 20 process to update the WSIS Plus 10 outcome document and to use the good language from the Global Digital Compact. We are very thankful to the ITU for organizing this event. We are partnering with you as you know in the WSIS Forum. I was impressed personally by the numbers that you showed in the presentation about how many high-level officials. And I’m sure, I’m not putting any pressure or stress on South Africa, but I’m sure that the chairmanship will be really a successful one. Because obviously you are chairing the Council Working Group on WSIS and SDGs, but also because South Africa has a long time been showing interest in this. area and is one of the countries that is leading the the whole discussions in a very positive way so thanks again for organizing this and looking forward to the event in 10 days in Geneva.


Gitanjali Sah: Thank you very much Veni and you know while discussing with the stalwarts of the WSIS process who actually created it we were asking them that you know what should be the key components going forward and the first thing they said is that this community which is so motivated to make a difference should maintain the ambition like we were very ambitious they said we were very ambitious back then in 1998 and they were because the whole framework of the WSIS action line the concepts in the you know the Geneva Declaration the Tunis agenda they are so relevant even today so we must ensure that we are ambitious we have the momentum of the stakeholder community and that we are making a difference in the right places. Thank you so much. I’ll move on to Dejan who is the facilitator of WSIS action line on e-agriculture. Dejan over to you.


FAO representative: Thank you and good morning to all participants on behalf of food and agriculture organizations the FAO of the UN. So if we look at the reasons why we find WSIS relevant also IGF in a way we still have about 700 million people under nourished so it’s about 1 in 11 even if you look at this room I’m sure everybody will get sense of urgency why we need to do something and and what do we do we we do need to transform agri-food systems and very urgently and one of the key enablers and accelerators is technology and if we look at the key elements that technology offers us for example we know we need connectivity and and here we always discuss meaningful connectivity we also need capacity building but we also need fintech Hey, hi, and there is a long list of opportunities, let’s say technological opportunities we have. And if we pick, for example, just the connectivity side, what we are seeing is that even now, even more than before, rural communities or farmers not connected are completely out of the markets and any possible service we can imagine today. So, when we look holistically into all these elements, we can also see that the digital capabilities, they don’t understand really the opportunities but also challenges. They don’t really understand IGF or WSIS or UNDP or UNESCO or any other players around us. So, what does it take to bring them all together? And we find that WSIS process helped us, I think it’s since 2002 even, to bring this multi-stakeholder forum together for us to discuss and see how to move forward with enabling these elements. We do not see any sort of a top-down or centralized approach working. We very much hope that all the some of the elements that we can hopefully orchestrate together will bring us forward and accelerate solutions needed. So, I’m really grateful for the consultation process. I think we can re-energize WSIS and we are looking forward to be part of this process. So, I thank you.


Gitanjali Sah: Thank you very much, Dejan. With FAO, we’ve also been doing innovative things like we did a hackathon on hack against hunger. And such innovative solutions came out from the ground and from young engineers all over the world, young students of policy. It was really an innovation and we should try to do this more often. But from that perspective, we noticed that there is a lack of incubators. So, once this innovation comes out, we really were struggling, Dayan, to kind of give these young people who have developed these applications some sort of guidance. And when we look at the private sector, I see ICC and USCIB, we definitely need your help in that direction as well to incubate these young talents. I’ll now pass on to Bruna. Bruna is the ex-MAG member. Your views, please, Bruna. Over to you.


MAG representative: Thanks Gitanjali, and also sharing the co-facilitation of the MAG Working Group on Strategy with Chris, Amrita and many others on this, so happy to be here representing the group. Just to also be brief and mention that on the 8th of July, the agenda of the High Level Event will have two panels about the IGF, as we do see it as a core part, right, not just of the plus 20 review, but ensuring that the IGF mandate is not just improved, but is kept as something that’s more stable for the near future. So the first session will be hosted by the IGF Secretariat, that’s called Building Digital Governance Together, will focus solely on the Norway outcomes, and the second one will also be, it’s the one that the Working Group Strategy is organizing, and it’s called Celebrating 20 Years of Multi-Stakeholder Engagement with this forum, IGF, and the road ahead. And for this second panel, we really want to have as open as possible discussion on what the next 20 years of the Internet Governance Forum will look like, not just about the mandate renewal, but also making sure it remains a clearinghouse with its efficient early warning systems and so on. And we, the Working Group Strategy also wants to make sure we have some youth voices joining the conversation above all. So everyone is invited to join, please join us there, it’s on the 8th of July, and it starts at 15.15, and really looking forward to having this open discussion as we do want to take it over from the very beginning and the early days of WSIS until what came to be the IGF, and why this is such a relevant space, and why we should keep pushing for multi-stakeholder participation. So I think I’ll stop here for the sake of time. Thanks, Gitanjali.


Gitanjali Sah: Thank you so much, Bruna, we look forward to continuing this partnership. Of course, all of this is not possible without the civil society, and yet APC has been such a strong voice of implementing and also bringing the voices of the people from the ground into the process. Over to you.


Anriette Esterhuysen: Thanks very much Gitanjali. I’m speaking as someone from civil society. I really urge civil society to participate in the WSIS Forum. I think we’ve had so far three days of a very impactful IGF and I think the message of the importance of renewing the IGF has, I think, been brought across substantially. But I also want to urge the value of the WSIS Forum. What the WSIS Action Line Framework gives all of us, but also gives civil society, is a framework that enables you to work collaboratively on implementation at country level. Collaborate with governments, collaborate with other stakeholders. It also gives civil society a framework and I think, as Gitanjali and Yuping have said, it’s a very ambitious framework. I think the vision of a people-centered, inclusive information society that’s human rights oriented, it’s ambitious, it’s important and I think it gives us something that, in my view, is more powerful than what most other tech-related UN frameworks gives us. So come to the WSIS Forum. It’s an opportunity you will meet regulators, you’ll meet ministries of communications and you’ll meet people that are actually building infrastructure on the ground, that are developing capacity building programs. So it’s extremely complementary with the IGF where we talk so much and intensively about governance challenges. At the WSIS Forum we talk about policy and governments, but we also talk about implementation in a very concrete way and it’s vital, I think, for civil society to be part of that process as well. Back to you, Gitanjali. Thank you.


Gitanjali Sah: Richard from WIPO. WIPO has been a very active participant also in the WSIS process. Richard, over to you.


WIPO respresentative: Thank you very much, Gitanjali, and a very good morning to everyone. Just for a bit of maybe context, just to say that when thinking about intellectual property, of course, the legal framework is is important, but other aspects are equally important that shape that conducive IP system. This includes the infrastructure that helps the innovators and creators more easily protect and manage their IP, and this is about collaboration with academia and industry, this is accessing financing by start-ups and SMEs, and this is of course making sure that everyone everywhere can benefit from the IP system. WIPO serves of course the innovators and creators from across the world in all of these areas, and many, many of our initiatives are contributing to the VCs Action Lines. We’ve submitted of course the VCs, our report for VCs plus 20, and I had three examples I wanted to give you, but because I’m very aware of the ticking clock, I’ll just give you one, but happy to expand on those during the VCs forum. So the one I just wanted to mention is that we’re supporting the ICT applications and IP institutions, so this is about making sure that that infrastructure, that digital infrastructure is available to everyone. So we help national regional IP offices in every corner of the world to enhance the efficiency of their IP registration, and that they can adopt their own digital transformation strategies. This includes among others improving their online services, including search and registry filing systems, and the integration to the regional and international IP systems so that they can more easily exchange data and documents. And since it was launched, already 90 IP institutions from across the world are using one of the modules from our WIPO IP office suite. This is just an example of the many, many things that we are doing that contribute to the VCs Action Lines. Being here in IGF, of course listening to all the many discussions also on AI, let me also mention our WIPO conversation, which is our discussion on the impact of all the frontier technologies on all the IP rights, and we also of course want to bridge the information gap through this forum. Past sessions focused on GNI or data and how those impact intellectual property. So of course we’ll be also speaking about these things further down the road. Seeing that clock, let me say that just as we have done over the past 20 years, WIPO stands ready to support VCs through dialogue as well as through practical outcomes that lead to real world impact. We’ll see you of course in July in Geneva in Palaixco. Like all the past years, we’ll be there contributing to a range of activities together with all our great partners also at this table.


Gitanjali Sah: Thank you, our neighbour from Geneva. They’re just opposite ITU in Geneva. Thank you. If I could please request the producer, the next session is also ours. So if we could please have five minutes. Oh no, we can’t. Okay. So Andy, I missed out the parliamentarians in the high levels who are going to be there with us. We have several parliamentarians joining us. Andy, if you could please.


Inter Parlamentary Union representative: Thank you. So Andy Richardson from the Inter-Parliamentary Union. And yes, thank you for this opportunity for parliaments to contribute to this plus 20 event, which comes as a great compliment to the strong parliamentary track here at IGF. This week, Ambassador Schneider referred to dialogue and decision making, and I think this is why it’s so important to have parliamentarians at the table in addition to the core functions of adopting legislation, carrying out oversight, allocating budgets. Really what parliaments try to do is to balance a range of interests, both supporting innovation and protecting citizens, protecting rights. And they bring a strong perspective on how the information society affects the people that they represent. So we’re happy to work with you. take part in this high-level dialogue with the Secretaries General of the ITU and the IPU and a number of parliamentarians. Thank you.


Gitanjali Sah: Thank you, Andy. And we are closing with Meli.


ICC representative: Okay, this is on. So, just to quickly say, as ICC, we have been participating and engaging with the WSIS process since really the get-go. We are still very much engaged into the process and we will make sure to be present in all instances, including the WSIS Plus 20 high-level event coming up very soon. So, I just wanted to quickly flag that we will have a number of sessions that we are organizing. So, there is an ICC basis workshop. This is the Business Action to Support the Information Society that has been the group of our membership involved with the WSIS process. So, it will be on the 10th of July from 3 to 3.45 on Global Adoption, Global Progress, Managing the Challenges of AI Inclusion. Again, pointing to the fact of the importance of the, let’s say, the neutrality of the WSIS Action Lines and how they can really apply in various challenges, including AI. So, we will be talking a little bit about that. And then, of course, we are also organizing jointly with the United States Council of International Business and Knowledge Cafe that is taking place on the 9th of July from 12 to 2 p.m. that will address the imperative of strengthening multistakeholderism. So, really looking forward to seeing you there in person in a few weeks’ time, a few days’ time rather. Thank you.


Gitanjali Sah: Thank you, Many. Thank you to all of you. The next session starts and it’s going to be ours as well. So, stay back. And thank you to the production team for giving us some time. Thank you very much.


G

Gitanjali Sah

Speech speed

148 words per minute

Speech length

2524 words

Speech time

1018 seconds

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout

Explanation

The WSIS process began in 1998 when Tunisia requested a framework at ITU’s plenipotentiary conference, evolved through UN adoption in 2001, summits in 2003 and 2005, mandate renewal in 2015, and now reaches the milestone year 2025 for review. Throughout this evolution, the multi-stakeholder participation has been maintained as part of WSIS’s DNA.


Evidence

Timeline: 1998 proposed, 2001 taken to UN, 2003-2005 summits, 2015 mandate renewal, 2025 review milestone; works with 50+ UN entities; IGF is part of WSIS process


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


Agreed with

– Thomas Schneider
– ICANN representative
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions

Explanation

The high-level participation includes 67 confirmed ministers and deputies from not only G77 countries and EU, but from all regions globally. This demonstrates that all regions consider the WSIS process so important that they want to be present in Geneva for the event.


Evidence

67 ministers and deputies confirmed, more than 40 regulators coming, participation from G77, EU and all regions


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


UN Group on Information Society with 50+ UN entities demonstrates coordinated approach to WSIS implementation

Explanation

The UN Group on Information Society includes all members of the Chief Executive Board and observer members, representing coordinated UN action. This group works together to implement digital aspects of their work, showing a unified approach to WSIS implementation across the UN system.


Evidence

Works with more than 50 UN entities, all CEB members are part of the group, observer members like newcomers are welcome


Major discussion point

Organizational Partnerships and Coordination


Topics

Development | Legal and regulatory


T

Thomas Schneider

Speech speed

151 words per minute

Speech length

594 words

Speech time

235 seconds

Switzerland proud to co-host event and work with South Africa, emphasizing WSIS structure’s importance in achieving digital society goals

Explanation

Switzerland is happy to co-host the WSIS forum and work with South Africa as the chair. They believe WSIS is an important structure that helped achieve goals set 22 years ago in Geneva for creating an inclusive, people-centered, development-oriented information society.


Evidence

22 years ago agreed in Geneva on principles for inclusive, people-centered, development-oriented information society; structure helped achieve some targets set


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results

Explanation

The WSIS architecture has tried to be as inclusive as possible, allowing many voices to be heard through complementary platforms like IGF and WSIS Forum. However, there’s a gap between dialogue and actual decision-making, as dialogue is only a necessary but not sufficient step in getting things done and making things happen.


Evidence

IGF and WSIS Forum are complementary with different settings; Swiss non-paper circulated with concrete proposals; need to ensure voices are heard when decisions are made by intergovernmental and private institutions


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


Disagreed with

– Yu Ping Chan

Disagreed on

Dialogue versus implementation gap


WSIS Forum and IGF are complementary platforms with different settings, both important for comprehensive digital governance dialogue

Explanation

Both the IGF and WSIS Forum are important components that complement each other because they have slightly different settings. Together they provide comprehensive coverage for digital governance dialogue, adapting each year to address current challenges and opportunities.


Evidence

IGF and WSIS discuss not just same things as 20 years ago but adapt dialogue to current challenges; both platforms allow different voices to be heard


Major discussion point

IGF Integration and Future Vision


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– ICANN representative
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


R

Representative of South Africa

Speech speed

121 words per minute

Speech length

645 words

Speech time

318 seconds

South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit

Explanation

South Africa is honored to chair the upcoming high-level event through Minister Soli Malachi and has been a champion of the WSIS process since its inception. South African delegations have actively participated in both the 2003 Geneva Summit and 2005 Tunisia Summit, demonstrating commitment to bridging the digital divide and shaping internet governance.


Evidence

Active participation in 2003 Geneva Summit and 2005 Tunisia Summit; leadership in advancing civil society and multi-stakeholder participation; chaired multi-advisory group of UN IGF


Major discussion point

WSIS Plus 20 High-Level Event Overview and Preparation


Topics

Development | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


South Africa chairs ITU Council Working Group on WSIS and SDGs, showing commitment through multiple leadership roles

Explanation

South Africa demonstrates its commitment to the WSIS process through multiple leadership roles, including chairing the ITU Council Working Group on WSIS and SDGs. Through this platform, they have issued calls for governments and stakeholders to share experiences of WSIS implementation over 20 years.


Evidence

Chair of ITU Council Working Group on WSIS and SDGs; issued ITU call for sharing experiences of WSIS implementation over 20 years; G20 presidency prioritizing AI, digital public infrastructure, and SMME capacity building


Major discussion point

Organizational Partnerships and Coordination


Topics

Development | Legal and regulatory


Agreed with

– Yu Ping Chan
– FAO representative
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


Y

Yu Ping Chan

Speech speed

192 words per minute

Speech length

522 words

Speech time

162 seconds

UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation

Explanation

UNDP, with 170 country offices worldwide and support to over 120 governments in leveraging digital and AI for SDGs, identifies capacity building as the number one request from national governments and communities. This reflects the enduring relevance of WSIS principles, particularly around capacity building which has existed since WSIS’s beginning.


Evidence

170 country offices around the world; support to over 120 governments in digital and AI for SDGs; launched AI help for sustainable development with Italy; Hamburg declaration on responsible AI for SDGs with almost 50 signatories


Major discussion point

Implementation and Capacity Building Focus


Topics

Development | Capacity development


Agreed with

– Representative of South Africa
– FAO representative
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


Disagreed with

– Thomas Schneider

Disagreed on

Dialogue versus implementation gap


T

Tatevik Grigoryan

Speech speed

124 words per minute

Speech length

356 words

Speech time

171 seconds

UNESCO advocates for principled frameworks like ROMEX rooted in WSIS values of human rights, openness, and accessibility

Explanation

UNESCO has continuously advocated for recognized and principled frameworks such as ROMEX, which is rooted in the same foundational values as WSIS including human rights, openness, accessibility and multi-stakeholder participation. ROMEX provides a robust tool to assess and guide the development of inclusive rights-based digital environments.


Evidence

ROMEX framework rooted in human rights, openness, accessibility and multi-stakeholder participation; provides tool to assess and guide inclusive rights-based digital environment development


Major discussion point

Implementation and Capacity Building Focus


Topics

Human rights | Development


I

ICANN representative

Speech speed

146 words per minute

Speech length

489 words

Speech time

200 seconds

Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility

Explanation

The technical community and multi-stakeholder model of Internet governance is what actually managed to bring about the current digital economy, accessibility, and other benefits made possible by the Internet. ICANN wants to convey that this model should be recognized and reaffirmed as the successful approach.


Evidence

Multi-stakeholder model brought digital economy and accessibility; ICANN partnerships with UNESCO (new MOU) and ITU; briefings for UN diplomats in Geneva and New York


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Infrastructure | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– Anriette Esterhuysen
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20

Explanation

The IGF was mentioned in the Global Digital Compact as the primary meeting space for discussing Internet-related policy issues and questions. ICANN hopes that UN Member States will use the WSIS Plus 20 process to update the WSIS Plus 10 outcome document and incorporate good language from the Global Digital Compact.


Evidence

IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions; WSIS Forum not mentioned in elements paper which is an omission that should be corrected


Major discussion point

IGF Integration and Future Vision


Topics

Legal and regulatory | Infrastructure


Agreed with

– Gitanjali Sah
– Thomas Schneider
– MAG representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


F

FAO representative

Speech speed

130 words per minute

Speech length

349 words

Speech time

160 seconds

FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology

Explanation

With 700 million people still undernourished (1 in 11), there’s an urgent need to transform agri-food systems, and technology is a key enabler and accelerator. FAO finds the WSIS process helps bring together multi-stakeholder forums to discuss how to move forward with enabling elements like connectivity, capacity building, and fintech for rural communities and farmers.


Evidence

700 million people undernourished (1 in 11); rural communities not connected are completely out of markets and services; WSIS process since 2002 brings multi-stakeholder forum together


Major discussion point

Implementation and Capacity Building Focus


Topics

Development | Economic


Agreed with

– Yu Ping Chan
– Representative of South Africa
– WIPO respresentative

Agreed on

Implementation and capacity building are critical priorities


M

MAG representative

Speech speed

156 words per minute

Speech length

312 words

Speech time

119 seconds

Two IGF-focused panels planned for July 8th high-level event to discuss mandate renewal and next 20 years vision

Explanation

The high-level event will feature two panels about IGF on July 8th – one hosted by IGF Secretariat focusing on Norway outcomes, and another organized by the Working Group Strategy celebrating 20 years of multi-stakeholder engagement and discussing the road ahead. The goal is to have open discussion about the next 20 years of IGF, including mandate renewal and maintaining its role as a clearinghouse.


Evidence

Two panels on July 8th: IGF Secretariat panel on Norway outcomes, and Working Group Strategy panel starting at 15:15; focus on next 20 years vision and mandate renewal


Major discussion point

IGF Integration and Future Vision


Topics

Legal and regulatory | Development


Agreed with

– Gitanjali Sah
– Thomas Schneider
– ICANN representative

Agreed on

WSIS and IGF are complementary platforms that work together effectively


A

Anriette Esterhuysen

Speech speed

139 words per minute

Speech length

260 words

Speech time

111 seconds

Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders

Explanation

The WSIS Action Line Framework gives civil society a framework to work collaboratively on implementation at country level with governments and other stakeholders. It provides an ambitious framework with a vision of people-centered, inclusive, human rights-oriented information society that is more powerful than most other tech-related UN frameworks.


Evidence

WSIS Forum allows meeting with regulators, ministries of communications, and people building infrastructure; opportunity to discuss policy, government, and concrete implementation; vision of people-centered, inclusive, human rights-oriented information society


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Human rights | Development


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– ICC representative

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


W

WIPO respresentative

Speech speed

165 words per minute

Speech length

471 words

Speech time

171 seconds

WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services

Explanation

WIPO helps national and regional IP offices worldwide enhance efficiency of IP registration and adopt digital transformation strategies. This includes improving online services, search and registry filing systems, and integration to regional and international IP systems for easier data and document exchange.


Evidence

90 IP institutions from across the world using WIPO IP office suite modules; support for online services, search and registry filing systems, integration to regional and international IP systems


Major discussion point

Implementation and Capacity Building Focus


Topics

Legal and regulatory | Infrastructure


Agreed with

– Yu Ping Chan
– Representative of South Africa
– FAO representative

Agreed on

Implementation and capacity building are critical priorities


I

Inter Parlamentary Union representative

Speech speed

134 words per minute

Speech length

146 words

Speech time

65 seconds

Parliamentarians bring perspective on how information society affects constituents and balance innovation with citizen protection

Explanation

Parliamentarians contribute to the dialogue-to-decision-making process through their core functions of adopting legislation, oversight, and budget allocation. They try to balance a range of interests, supporting innovation while protecting citizens and rights, bringing perspective on how the information society affects the people they represent.


Evidence

Core functions include adopting legislation, carrying out oversight, allocating budgets; high-level dialogue with ITU and IPU Secretaries General and parliamentarians


Major discussion point

Multi-Stakeholder Engagement and Governance


Topics

Legal and regulatory | Human rights


I

ICC representative

Speech speed

187 words per minute

Speech length

233 words

Speech time

74 seconds

ICC has engaged with WSIS since inception and will organize sessions on AI inclusion and strengthening multi-stakeholderism

Explanation

ICC has been participating and engaging with the WSIS process since the beginning and continues to be actively involved. They will organize sessions including an ICC BASIS workshop on Global Adoption and Managing AI Inclusion Challenges, and a Knowledge Cafe on strengthening multi-stakeholderism.


Evidence

ICC BASIS workshop on July 10th on Global Adoption, Global Progress, Managing AI Inclusion Challenges; Knowledge Cafe on July 9th addressing strengthening multi-stakeholderism; Business Action to Support Information Society group involvement


Major discussion point

Organizational Partnerships and Coordination


Topics

Economic | Legal and regulatory


Agreed with

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen

Agreed on

Multi-stakeholder participation is fundamental to WSIS and IGF processes


Agreements

Agreement points

Multi-stakeholder participation is fundamental to WSIS and IGF processes

Speakers

– Gitanjali Sah
– Thomas Schneider
– Representative of South Africa
– ICANN representative
– Anriette Esterhuysen
– ICC representative

Arguments

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout


WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


ICC has engaged with WSIS since inception and will organize sessions on AI inclusion and strengthening multi-stakeholderism


Summary

All speakers consistently emphasized that multi-stakeholder participation is core to the WSIS DNA and has been successfully maintained throughout its evolution, enabling inclusive dialogue and collaborative implementation across different stakeholder groups.


Topics

Development | Legal and regulatory


WSIS and IGF are complementary platforms that work together effectively

Speakers

– Gitanjali Sah
– Thomas Schneider
– ICANN representative
– MAG representative

Arguments

WSIS evolution from 1998 proposal to current plus 20 review milestone with multi-stakeholder participation maintained throughout


WSIS Forum and IGF are complementary platforms with different settings, both important for comprehensive digital governance dialogue


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20


Two IGF-focused panels planned for July 8th high-level event to discuss mandate renewal and next 20 years vision


Summary

Speakers agreed that WSIS Forum and IGF serve complementary roles with different settings, both being essential for comprehensive digital governance dialogue and policy discussions.


Topics

Legal and regulatory | Development


Implementation and capacity building are critical priorities

Speakers

– Yu Ping Chan
– Representative of South Africa
– FAO representative
– WIPO respresentative

Arguments

UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


South Africa chairs ITU Council Working Group on WSIS and SDGs, showing commitment through multiple leadership roles


FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology


WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services


Summary

Multiple speakers emphasized that capacity building and practical implementation are fundamental needs, with concrete examples of how their organizations are addressing these priorities through the WSIS framework.


Topics

Development | Capacity development


Similar viewpoints

All three speakers emphasized the critical need to move beyond dialogue to actual implementation and decision-making, with concrete action and results being essential for meaningful impact.

Speakers

– Thomas Schneider
– Yu Ping Chan
– Anriette Esterhuysen

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Topics

Development | Legal and regulatory


These speakers shared pride in the global recognition and success of the WSIS process, highlighting high-level participation and long-term commitment as evidence of its effectiveness.

Speakers

– Gitanjali Sah
– Representative of South Africa
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Topics

Development | Legal and regulatory


Unexpected consensus

Human rights and ethical frameworks integration

Speakers

– Tatevik Grigoryan
– Anriette Esterhuysen
– Inter Parlamentary Union representative

Arguments

UNESCO advocates for principled frameworks like ROMEX rooted in WSIS values of human rights, openness, and accessibility


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Parliamentarians bring perspective on how information society affects constituents and balance innovation with citizen protection


Explanation

Unexpectedly, speakers from different sectors (UN agency, civil society, and parliamentary) all emphasized human rights and ethical considerations as central to digital governance, showing convergence on values-based approaches across institutional boundaries.


Topics

Human rights | Development


Technical and policy integration necessity

Speakers

– ICANN representative
– WIPO respresentative
– FAO representative

Arguments

Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


WIPO supports 90 IP institutions globally with digital infrastructure for IP registration and online services


FAO uses WSIS process to address 700 million undernourished people through agri-food system transformation enabled by technology


Explanation

Technical organizations (ICANN, WIPO) and a development-focused agency (FAO) unexpectedly showed strong consensus on the need for integrated approaches that combine technical infrastructure with policy frameworks to address real-world challenges.


Topics

Infrastructure | Development


Overall assessment

Summary

The discussion revealed strong consensus on multi-stakeholder participation as fundamental, the complementary nature of WSIS and IGF platforms, the critical importance of implementation and capacity building, and surprisingly, the integration of human rights and ethical frameworks across different sectors.


Consensus level

High level of consensus with significant implications for WSIS Plus 20 – the unified support across all stakeholder groups provides a strong foundation for mandate renewal and continued multi-stakeholder governance, while the emphasis on moving from dialogue to implementation suggests a maturation of the process toward more action-oriented outcomes.


Differences

Different viewpoints

Dialogue versus implementation gap

Speakers

– Thomas Schneider
– Yu Ping Chan

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Summary

Schneider emphasizes the gap between dialogue and decision-making as the biggest challenge, while Yu Ping Chan focuses on the translation from global discussions to direct community impact through capacity building


Topics

Development | Legal and regulatory


Unexpected differences

Recognition of WSIS Forum in UN processes

Speakers

– Gitanjali Sah
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


IGF mentioned in Global Digital Compact as primary meeting space for Internet policy discussions, requiring recognition in WSIS Plus 20


Explanation

While both speakers advocate for recognition of WSIS processes, there’s an unexpected tension where ICANN representative notes that WSIS Forum was omitted from the elements paper, suggesting institutional recognition challenges despite the high-level participation that Sah emphasizes


Topics

Legal and regulatory | Development


Overall assessment

Summary

The discussion shows remarkably high consensus among speakers with minimal direct disagreements. Most differences are complementary rather than conflicting perspectives on implementation approaches and organizational priorities.


Disagreement level

Very low level of disagreement with high collaborative spirit. The main challenge identified is not disagreement between stakeholders but rather the systemic gap between dialogue and implementation, and ensuring proper recognition of multi-stakeholder processes in formal UN frameworks. This suggests strong alignment on goals with need for better coordination on execution methods.


Partial agreements

Partial agreements

Similar viewpoints

All three speakers emphasized the critical need to move beyond dialogue to actual implementation and decision-making, with concrete action and results being essential for meaningful impact.

Speakers

– Thomas Schneider
– Yu Ping Chan
– Anriette Esterhuysen

Arguments

WSIS architecture allows inclusive dialogue with many voices heard, though dialogue must translate into actual decision-making and results


UNDP’s top request from governments is capacity building, reflecting enduring WSIS principles with 170 country offices supporting digital transformation


Civil society should participate in WSIS Forum as it provides framework for collaborative implementation at country level with governments and stakeholders


Topics

Development | Legal and regulatory


These speakers shared pride in the global recognition and success of the WSIS process, highlighting high-level participation and long-term commitment as evidence of its effectiveness.

Speakers

– Gitanjali Sah
– Representative of South Africa
– ICANN representative

Arguments

67 ministers and deputies confirmed, demonstrating global recognition of WSIS importance across all regions


South Africa honored to chair event, demonstrating long-standing commitment to WSIS process since 2003 Geneva Summit


Multi-stakeholder model of Internet governance successfully enabled current digital economy and accessibility


Topics

Development | Legal and regulatory


Takeaways

Key takeaways

WSIS Plus 20 represents a critical milestone year for reviewing and renewing the mandate of the World Summit on the Information Society, with the high-level event scheduled for July 7-11 in Geneva


Multi-stakeholder participation remains the core DNA of the WSIS process, successfully maintained over 20 years with representation from governments, civil society, private sector, technical community, and academia


There is a significant gap between dialogue and decision-making that needs to be addressed – while WSIS and IGF provide excellent platforms for discussion, translating these conversations into actual policy decisions and implementation remains challenging


The WSIS framework has achieved substantial qualitative impact including 5.5 billion people online and 280,000+ schools connected, though quantitative measurement remains difficult due to lack of indicators and monitoring frameworks


Capacity building emerges as the top priority request from governments globally, reflecting the enduring relevance of original WSIS principles


The IGF and WSIS Forum are complementary platforms that should be recognized and strengthened, with IGF already acknowledged in the Global Digital Compact as the primary meeting space for Internet policy discussions


Resolutions and action items

All stakeholders encouraged to submit comments and inputs to the UNGA overall review through the online form available until July 15th


ITU to work with ODET on GDC implementation roadmap, requiring a thousand-word document on current GDC implementation to be submitted to CSTD annual session next year


South African Minister Soli Malatsi to submit chair summary of high-level event outcomes to UNGA overall review


ITU Secretary-General to submit WSIS Plus 20 roadmap and report to the review process


Two IGF-focused panels scheduled for July 8th at the high-level event: one on Norway outcomes and another on the next 20 years of IGF


Stakeholders urged to highlight importance of WSIS Forum and IGF as multi-stakeholder platforms in their submissions to UNGA review


Registration forms for limited space at Palexpo to be completed as soon as available online


Unresolved issues

WSIS Forum was notably absent from the elements paper released for the UNGA review, requiring feedback and advocacy to ensure inclusion


Lack of indicators and monitoring frameworks for WSIS action lines makes quantitative measurement of achievements difficult


The fundamental challenge of translating multi-stakeholder dialogue into actual decision-making by governments and institutions remains unaddressed


Need for more incubators and support systems for young innovators developing digital solutions, particularly in areas like agriculture


How to maintain the ambitious vision and momentum of the WSIS process while adapting to new technological challenges and opportunities


Suggested compromises

Building on existing WSIS architecture rather than creating entirely new structures, as referenced in Switzerland’s non-paper with concrete proposals


Using complementary nature of WSIS Forum and IGF rather than viewing them as competing platforms, recognizing their different but valuable roles


Leveraging the Global Digital Compact language and framework to update and strengthen WSIS Plus 10 outcome document rather than starting from scratch


Thought provoking comments

One challenge that all of us face is that the WSIS action lines don’t have indicators and monitoring frameworks. So we really can’t measure and tell you that quantitatively this is what we’ve achieved in the WSIS action lines.

Speaker

Gitanjali Sah


Reason

This comment highlights a fundamental weakness in the WSIS framework – the inability to quantitatively measure impact after 20 years of implementation. It’s particularly insightful because it acknowledges a critical gap between ambitious goals and accountability mechanisms.


Impact

This observation set a realistic tone for the discussion, moving beyond celebratory rhetoric to acknowledge structural limitations. It influenced subsequent speakers to focus more on concrete implementation challenges and the need for measurable outcomes.


We all know that dialogue is only a necessary but not sufficient step in getting things done and actually making things happen… the biggest gap that I think we currently have, which is to help make sure that the dialogue that we’re having is actually turning into result in decision-making.

Speaker

Thomas Schneider (Ambassador)


Reason

This comment cuts to the heart of a persistent challenge in international governance forums – the translation of discussion into action. It reframes the entire purpose of these gatherings from dialogue-focused to outcome-focused.


Impact

This observation became a recurring theme throughout the session, with multiple subsequent speakers (Yu Ping Chan, Anriette Esterhuysen) explicitly referencing and building upon this dialogue-to-action framework. It shifted the conversation from process celebration to effectiveness critique.


The number one ask from the national governments and communities that we serve is capacity building… this is a pertinent example of what Ambassador Schneider says that the principles underlying WSIS are even more relevant today than ever before.

Speaker

Yu Ping Chan (UNDP)


Reason

This comment provides ground-truth validation from field experience, connecting high-level policy discussions to actual grassroots needs. It bridges the gap between Geneva-based deliberations and real-world implementation challenges.


Impact

This field-based perspective added credibility to the discussion and influenced other speakers to provide more concrete examples of implementation. It reinforced the relevance of WSIS principles while highlighting persistent capacity gaps.


What the WSIS Action Line Framework gives all of us, but also gives civil society, is a framework that enables you to work collaboratively on implementation at country level… it’s a very ambitious framework… more powerful than what most other tech-related UN frameworks gives us.

Speaker

Anriette Esterhuysen (APC)


Reason

This comment reframes WSIS not just as a dialogue platform but as a practical implementation tool, distinguishing it from other UN frameworks. It provides a civil society perspective on why WSIS remains uniquely valuable for collaborative action.


Impact

This intervention shifted the discussion toward the practical utility of WSIS frameworks for stakeholders, moving beyond institutional perspectives to user experience. It reinforced the multi-stakeholder implementation theme while highlighting WSIS’s distinctive value proposition.


We were quite surprised to note that the WSIS Forum was not noted on [the elements paper] so we will provide our feedback but if all of you could we would like to encourage all of you also to submit your comments and inputs through the online form.

Speaker

Gitanjali Sah


Reason

This comment reveals a significant oversight in UN documentation and transforms the session from informational to mobilizational, calling for collective action to address institutional visibility gaps.


Impact

This observation prompted immediate responses from other stakeholders (notably the ICANN representative) who committed to addressing the omission. It shifted the session from passive information sharing to active advocacy coordination.


Overall assessment

These key comments fundamentally shaped the discussion by moving it beyond ceremonial celebration of WSIS’s 20-year history toward critical examination of its effectiveness and future relevance. The dialogue-to-action framework introduced by Ambassador Schneider became the organizing principle for subsequent interventions, with speakers consistently addressing how to translate multi-stakeholder discussions into measurable impact. The acknowledgment of measurement gaps and institutional visibility challenges created a more honest, problem-solving oriented conversation. Rather than simply promoting the upcoming high-level event, the session evolved into a strategic planning discussion about strengthening WSIS’s practical utility and ensuring its continued relevance in global digital governance. The comments collectively established a tension between WSIS’s ambitious vision and implementation realities, which energized participants to think more concretely about solutions and collective action.


Follow-up questions

How to develop indicators and monitoring frameworks for WSIS action lines to enable quantitative measurement of achievements

Speaker

Gitanjali Sah


Explanation

This is a significant gap identified in the WSIS process – the lack of quantitative metrics to measure progress and impact of the action lines over the 20-year period


How to better translate dialogue into decision-making and actual implementation

Speaker

Thomas Schneider


Explanation

Ambassador Schneider identified this as the biggest gap currently – ensuring that voices heard in forums like IGF and WSIS actually influence real decision-making processes


How to develop more incubators for innovative solutions emerging from hackathons and youth initiatives

Speaker

Gitanjali Sah


Explanation

Based on experience with the ‘hack against hunger’ initiative, there’s a need for better support systems to guide young innovators after they develop applications


How to ensure WSIS Forum is properly recognized in UN processes, particularly in the elements paper for UNGA review

Speaker

Gitanjali Sah and ICANN representative


Explanation

Both speakers noted that the WSIS Forum was surprisingly omitted from the elements paper and called for stakeholder feedback to correct this oversight


How to strengthen capacity building mechanisms, particularly for SMMEs (Small, Medium and Micro Enterprises)

Speaker

Representative of South Africa and Yu Ping Chan


Explanation

This was identified as the number one request from national governments and communities, and is a key focus area for South Africa’s G20 presidency


How to better connect rural communities and farmers to markets and services through meaningful connectivity

Speaker

FAO representative (Dejan)


Explanation

With 700 million people still undernourished, there’s urgent need to understand how to leverage technology to transform agri-food systems and connect rural communities


What should the next 20 years of the Internet Governance Forum look like beyond mandate renewal

Speaker

MAG representative (Bruna)


Explanation

This relates to ensuring IGF remains relevant and effective as a clearinghouse with efficient early warning systems for future digital governance challenges


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.