Open Forum #42 Global Digital Cooperation: Ambition to Country-Level Action

Open Forum #42 Global Digital Cooperation: Ambition to Country-Level Action

Session at a Glance

Summary

This discussion focused on implementing the Global Digital Compact (GDC) and its impact at the country level. Panelists from various UN agencies, governments, and civil society organizations shared insights on priorities and challenges in digital cooperation.


Key themes included bridging digital divides, fostering partnerships, building local capacity, and aligning the GDC with existing frameworks like WSIS. Panelists emphasized the need for inclusive approaches that reach marginalized communities and rural areas. The importance of multi-stakeholder collaboration was highlighted, with calls to involve local organizations, academic networks, and the private sector in implementation efforts.


Several speakers noted the GDC builds on WSIS principles while addressing emerging issues like AI governance and misinformation. There were suggestions to better integrate GDC implementation with WSIS processes to avoid overburdening countries. The discussion touched on opportunities to leverage new technologies for expanding access to digital services and content in diverse languages.


Participants stressed the need to measure impact through concrete results aligned with GDC objectives. Ideas included tracking progress on connectivity, digital literacy, and economic development. The role of forums like the IGF in fostering dialogue on emerging issues was noted. Overall, the discussion underscored the importance of translating global frameworks into local action to achieve meaningful digital transformation that leaves no one behind.


Keypoints

Major discussion points:


– Implementing the Global Digital Compact (GDC) at the country and local level


– Connecting the GDC to existing processes like WSIS and the SDGs


– Addressing digital divides and ensuring inclusive digital transformation


– The importance of partnerships and multi-stakeholder approaches


– Building digital capacity and skills, especially in developing countries


The overall purpose of the discussion was to explore how to turn the high-level principles of the Global Digital Compact into concrete action and impact at the country level. Panelists and audience members discussed priorities, challenges, and opportunities for implementing the GDC.


The tone of the discussion was generally constructive and collaborative, with panelists highlighting ongoing efforts and opportunities for partnership. Towards the end, some audience members injected a sense of urgency and pushed for more concrete actions and integration of existing initiatives rather than creating new processes. Overall, there was a shared commitment to advancing digital cooperation but differing views on the best approaches.


Speakers

– Yu Ping Chan: Head of Partnerships and Engagement at UNDP


– Robert Opp: Chief Digital Officer of UNDP


– Margarita Gomez: Executive Director of Southern Voice


– Cynthia Lesufi: Minister-Counsel of the South African Mission to the United Nations in Geneva and other international organizations


– Olaf Kolkman: Principal of Internet Technology Policy and Advocacy from the Internet Society


– Deniz Susar: Representing Mr. Juwang Su, Director of Division for Public Institutions at DESA


– Gitanjali Sah: Strategy and Policy Coordinator of the International Telecommunications Union


Additional speakers:


– Anriette Esterhuysen: From the Alliance for Progressive Communications


– Isabel De Sola: From the Office of the Tech Envoy


– Alex Mora: Researcher from Cal State University working on research and education support


Full session report

Revised Summary: Implementing the Global Digital Compact at the Country Level


This discussion focused on the implementation of the Global Digital Compact (GDC) and its impact at the country level. Panelists from various UN agencies, governments, and civil society organizations shared insights on priorities and challenges in digital cooperation. The conversation covered several key themes and highlighted both areas of agreement and differing perspectives on implementation strategies.


Key Themes and Discussion Points


1. Aligning the GDC with Existing Processes


Robert Opp of UNDP noted that GDC objectives align with existing UN agency work. Cynthia Lesufi from the South African Mission to the UN emphasized that the GDC reinforces WSIS principles while addressing modern challenges like AI governance and misinformation. Anriette Esterhuysen from the Alliance for Progressive Communications argued for merging GDC implementation with existing WSIS processes to avoid overburdening countries.


Dennis Susar from DESA highlighted the importance of the WSIS Plus 20 review process and its connection to the GDC. He also mentioned the role of the Internet Governance Forum (IGF) in relation to the GDC, suggesting it could serve as a platform for ongoing discussions and implementation efforts.


2. Local Implementation and Multi-stakeholder Partnerships


Olaf Kolkman from the Internet Society emphasized the importance of local action, stating, “Think global with the GDC, but really the action has to be local.” This focus on grassroots implementation was echoed by several speakers, including Gitanjali Sah from the ITU, who stressed the role of community radio and highlighted the historical context of digital development work.


The discussion underscored the importance of multi-stakeholder partnerships. Cynthia Lesufi emphasized the significance of public-private partnerships for digital initiatives. Olaf Kolkman explained that the Internet Society works through local chapters and partnerships. An audience member raised the need to involve local NGOs working at the grassroots level.


3. Addressing Digital Divides


A major point of agreement was the critical importance of closing digital divides. Yu Ping Chan from UNDP emphasized the need to address all aspects of digital divides, including infrastructure and capacity. An audience member named Nenna expanded the conversation by pointing out the multifaceted nature of digital divides, including policy, gender, rural-urban, and age divides.


Several speakers noted the importance of reaching marginalized communities. An audience member specifically mentioned the need to connect pastoralist communities, while Alex Mora, a researcher from Cal State University, suggested leveraging research and education networks to connect schools in underserved areas.


4. Capacity Building and Skills Development


Capacity building and skills development emerged as a key priority. Robert Opp noted that this was a primary request from countries, with a particular focus on building AI ecosystems and capacity. Deniz Susar, representing DESA, mentioned that the GDC commits to prioritizing digital competencies for public officials.


5. Specific Digital Initiatives and Challenges


The discussion included mentions of specific digital initiatives, such as UNDP’s work in Kenya and Bangladesh. Isabel De Sola from the Office of the Tech Envoy raised the importance of data governance and content diversity, suggesting potential partnerships focused on translation and diverse content creation.


6. Technical Difficulties and Audience Participation


The session experienced recurring technical difficulties, which impacted the flow of the discussion. Despite these challenges, there was active audience participation through the Slido platform. Questions from the audience covered topics such as strategies for reaching marginalized communities, the role of research and education networks, and methods for ensuring meaningful participation in digital transformation efforts.


Areas of Agreement and Unresolved Issues


There was strong agreement on the importance of closing digital divides, the need for capacity building, and the value of multi-stakeholder partnerships. Speakers also generally agreed on the importance of building on existing processes and focusing on marginalized communities.


Unresolved issues included how to effectively merge GDC implementation with existing WSIS processes without creating additional bureaucratic burdens, specific strategies for addressing intersectional digital divides beyond infrastructure, and methods for ensuring meaningful participation of marginalized communities in digital transformation efforts.


Key Takeaways and Action Items


1. The GDC aligns with and builds upon existing WSIS processes and UN agency work.


2. Implementation needs to focus on local and grassroots efforts, involving multi-stakeholder partnerships.


3. Addressing digital divides requires a holistic and intersectional approach.


4. Capacity building and skills development, especially in emerging technologies like AI, are crucial for digital transformation.


5. There is a need to leverage existing networks and initiatives, particularly in research and education, to advance digital cooperation.


Suggested action items included integrating GDC follow-up with the WSIS Plus 20 review process, developing KPIs to measure success in GDC implementation at the country level, increasing efforts to involve local NGOs in digital initiatives, expanding digital readiness assessments to local and rural areas, and strengthening collaboration between UN agencies on digital cooperation efforts.


Conclusion


The discussion highlighted the complex challenge of implementing a global framework like the GDC at the local level. While there was broad agreement on the importance of digital cooperation and development, the conversation revealed the need for careful consideration of local contexts, existing processes, and the multifaceted nature of digital divides. Moving forward, balancing global objectives with local needs and leveraging existing networks and partnerships will be crucial for successful implementation of the Global Digital Compact.


Session Transcript

Yu Ping Chan: All right, we’re trying this one more time, and this is your last chance to vote on the first question. Which GDC objective is most important for your work on global digital cooperation? You scan the QR code and you vote right now. And right now, it looks like we have basically a two-way tie between objective one, which is close all digital divides, and number six, which is everything in the GDC. Okay. And then all answers are locked. Let’s go to the next question. In one, two words, what is the most important action that must be taken in the first year of the global digital compact to ensure meaningful action at the country level? And I know everybody likes to give long UN paragraphs, but here we’re really asking for one, two words so we can show them on the screen. Scan the QR code and give us one, two words. Participants, panelists as well, I think you’re required to take part. I especially like the stop talking suggestion. I think that has to be followed by stop talking and take action. I confess, that was me. Nice. All right. A couple more moments for anybody else. Shows online as well. And that’s interesting. So we see a number of suggestions on the screen. Benefit sharing, ensure alignments, strategies, strong partnerships. But capacity building seems to be the number one response, as you can tell by the boldness of the text. Cooperation, stakeholders, infrastructure, participation, more actions, project. So keeping these in mind, I’ll ask the panelists to just turn around very quickly, have a look at what the audience has responded as the most important actions, and then to bear that in mind as they’re answering the questions so that we can, as suggested by one of the panelists, not just talk, but actually take some actual action at the country level. Oh, and ensure alignment. There was a last-minute contender up there. Okay. So having had that reflection from our participants, we’re going to turn to our panelists now and really have their views on how you turn global digital cooperation, the objectives of the GDC, into what we really need, which is implementation at the country level. And from the perspective of the United Nations Development Program, where I come from as the head of partnerships and engagement, that’s particularly important because we’re present in 170 countries and territories around the world, and we really want to see where global discussions land in impact, particularly at the country level. And so that’s what we’re really hoping today’s conversation with all of you and with our distinguished panelists will bring some insights and highlights and prioritization to these types of efforts. So with that, I’m going to turn to our distinguished panelists. I’m going to introduce them all first, and then I’m going to ask them questions all in turn, one after another. So today we have with us Ms. Cynthia Lasufi, Minister-Counsel of the South African Mission to the United Nations in Geneva and other international organizations. We have Ms. Gitanjali Shah, Strategy and Policy Coordinator of the International Telecommunications Union. We have Mr. Robert Opp, Chief Digital Officer of the UNDP. We have Mr. Olaf Kochman, Principal of Internet Technology Policy and Advocacy from the Internet Society, as well as Mr. Dennis Souza from the Department of Economic and Social Affairs, sitting for Mr. Zhuang Zhu, who was unable to make it at the very last minute. So our distinguished panelists will answer first round of questions, after which we’ll open up to conversation with the audience. And I really encourage participants both online as well as in the room to ask our panel any questions that they might have really about having this conversation that we so urgently need about turning global digital contact into real concrete action. So we’re going to start with the first round of questions. And the first question actually goes to Robert Opp, Chief Digital Officer of the UNDP. Rob, UNDP supports digital programming in more than 120 countries around the world, as I mentioned. What are some of the key challenges and needs that countries face in their digital transformation? How does the GDC speak to some of these needs and opportunities? And how does it connect with other ongoing processes, for instance, the WSIS plus 20 review?


Robert Opp: Well, that’s three questions in one.


Yu Ping Chan: But… A chance to ask as many things as possible.


Robert Opp: Okay. Well, it’s great to be here. And thanks to those of you who have come to this discussion. In terms of answering the question, UNDP, as Yu-Ping just said, has a footprint across 170 countries, and we have digital programs in most of those countries. And the kinds of things that we hear in terms of requests for support fall into a few big categories. One of the ones is… One of the categories is around requests for support in strategy building, policies, roadmaps, in terms of how to roll out digital transformation at a societal level. So, we have been responding to those requests by engaging in dialogues around digital readiness assessment and things like that, to understand where countries are and where they want to be. Second big category is around sort of what are the kinds of technologies I should put in place to improve different digital public services and really connect people, close the digital divide in terms of both the connectivity side, but as well as the kind of services available. Third category is around capacity building. So, that’s interesting that it came up on the screen. Very frequently, everyone is asking for more capacity across the board, whether that be in government or in society at large around innovation ecosystems as well. Everyone’s looking for more digital capacity. And then, fourthly, the more recent requests that we have, which is part of the kind of wave of discussion around AI, is how do I build my AI ecosystem? And so, it involves all of those other three things I mentioned, but there’s a very specific request line around artificial intelligence and how I can make it work for me and my country. So, those are the kinds of things that we hear. Your second question was on how does it relate to the GDC. And the good news is that the Global Digital Compact actually covers all of those themes in one way or another. In the technology space, the first time an intergovernmental agreement has mentioned digital public infrastructure, and that’s something as an approach that we work a lot with in countries. There’s also quite a few mentions in the Global Digital Compact on capacity building and, of course, artificial intelligence as well, including the need for capacity for AI. So, the GDC, I think, as an overarching umbrella, is a good step forward in terms of acknowledging some of the things that are facing us and facing countries around the world today. And then in terms of the WSIS Plus 20, I think it’s an important thing to have a signal from the GDC to where WSIS needs to go. So looking forward, we need to, in WSIS Plus 20, update the action lines, update the basis on which we’re going to work for the next period that we decide on, and take those signals that are coming out of the GDC, and as I mentioned, out of the countries, and ensure that they are embedded in WSIS Plus 20. So I’ll leave it there, Yuping.


Yu Ping Chan: Much Rob, and may I also apologize, because I failed to see that another of our panelists has actually joined us online, Margarita, are you there? Could I also ask that she be upgraded to panelist as well, for the technicians in the room? Margarita Gomez is the executive director of Southern Voice, one of the co-organizers of this event. I’m just checking to see whether she’s been upgraded online. While we are waiting for that to happen, perhaps I can turn the next question to Cynthia. Cynthia, the question that I have for you is, what opportunities does the GDC offer for supporting inclusive digital transformations, particularly at the country level?


Cynthia Lesufi: Thank you. Thank you for inviting me to join this important panel, for sitting as a country, for sitting with the UN agencies to talk about this important topic, and I also want to thank all of you for joining this session. It’s quite an honor for South Africa to join this. Yuping, in terms of the question, let me start first by stating that actually, the Global Digital Compact, in its form, it offers a variety of opportunities to support digital transformation in countries from where we are sitting. It also structures in such a way that it empowers countries by focusing on key priorities that drive inclusive digital transformation. For instance, the Global Digital Compact, it promotes adopting inclusive digital policies for universal and affordable internet access, particularly in rural and underserved areas. Coming from South Africa and from the region where the issue of connectivity is a problem, we believe the GDC, it is structured in such a way that it starts to address this. The other thing that it focuses on for countries, what it does is that it fosters global partnerships to provide affordable devices and services and reduce the barriers for low-income population. Again, this talks to the region that I come from, which is Africa. But the other important thing which Rob spoke to is the issue of skills capacity building. Where we are sitting, we actually want to emphasize the fact that the GDC, in its current form, it does touches on issues of skills capacity building issues. Again, we’re looking at this in a way that our view is that it enabled marginalized groups to use the digital tools effectively. But also, it also allows countries to access, to train their workforces in emerging technologies such as AI, blockchain, cybersecurity, and also it promotes inclusive digital economies. The other thing that we have also noted as South Africa is that the GDC, in its current form, it also encouraged the public-private partnership, which from where we are sitting, it strengthened the collaboration among government, the private sector, NGOs, and international organizations on inclusive digital initiatives. We also believe that through this, then what it does, it also helps countries to leverage resources and expertise for infrastructure development and digital transformation project. But also, the other thing that we have also identified that we believe GDC is talking to is to mandate that countries assess their progress by identifying the gaps, and as far as digital transformation is concerned, and that where we are sitting, it assists countries to take decisive action to enhance their digital transformation journeys. The other thing that is also important is that the GDC also, from where we are sitting, urge countries to learn from global success stories and adopt proven strategies to accelerate digital inclusion initiatives. I think I should stop at that. Thank you.


Yu Ping Chan: I think we could have listened to Cynthia for a lot longer because I think her answer was extremely comprehensive and really touched on a lot of these elements that already were reflected by the participants and you, the audience, as to the important parts of the GDC that we really need to pick up on. So Cynthia, thank you so much for really a great answer to that. I think it’s also particularly important given that South Africa is actually taking on the presidency of the G20 next year. And so that perspective of leading from the South and the global majority is particularly important. So the next question we have is for Olaf. So the question for you is that the Internet Society works to ensure that the Internet is open, globally connected, secure and trustworthy. How does the GDC contribute to your mission and what do you think the role of stakeholders, particularly the technical community, should be in realizing the ambition of the GDC?


Olaf Kolkman: Yeah, good question. The question is essentially what can the GDC do for you, but I’d like to turn that around. What can we do for the GDC? I see the GDC as a joint vision, where we are asked to work towards a common goal. But I’m also a strong believer in the bottom-up fashion and the bottom-up nature of partnerships, of developing solutions that locally work, that are locally tailored, that bring together the people for their local needs. And while the GDC points something on the radar, I strongly believe that you need to develop these partnerships in a bottom-up nature. And, of course, when you do that, you need to have local stakeholders at the table, the people who understand the technology, that can bridge that to the people who understand, say, the rights in a locality, that understand the needs in a locality, and that can also find the funding in that locality. So, we do that in practice as the Internet Society, for instance, when we are connecting communities. And when we are connecting communities, generally we are part of the funding structures for those, but not always. And we seek a technologist that can build the technologies. We tie them to the local communities to make sure that we know what the requirements are, but we also talk, say, to the municipalities to get right of way to a tower that might be somewhere on which an antenna can be mounted. And those are the tiny examples of places where people get together and do stuff. So I think that once we have those experiences locally at municipal level, we can share them at national level to exchange experiences. And I believe that is the model of the IGF where we have all the regional and national IGFs where people come together and share their experiences in their fora on how did you come to a solution. And that type of norm entrepreneurship, the norm and technical entrepreneurship, I believe creates solutions that are more sustainable than anything that we can invest and invent top-down. And to me, that is where the IGF, of course, plays a humongous role. And I’m happy to see that that role is recognized in the GDC concept. And the GDC defines a number of objectives that keep the eye on the ball, of course. One of them is, of course, the connectivity of all humans to the internet. We still have 2.8 million to go, mostly in the Global South, as you heard the Saudi minister say during the plenary. That’s a high effort, and that’s where we, as internet society, are, of course, focused in our work. So I would say the GDC helps us think globally, but the action needs to be local. Thank you.


Yu Ping Chan: That is a great tagline. Think global with the GDC, but really the action has to be local. And I think that’s something that’s been emphasized in quite a lot of the comments as well. And I think that’s a really good way to segue into the question to Margarita. Margarita, Southern Voice is a network of currently 70 think tanks in the Global South working to accelerate SDG progress. So really reflecting on this connection to what Olaf has just said about acting local, what are you hearing across your members about priorities for implementing the Global Digital Compact? And where is that the most opportunity at the country level, the local level?


Margarita Gomez: Thank you. Thank you so much. It’s a pleasure to be here and thank you everybody that is joining online and in person there. So as you mentioned, so we are a network of 70 think tanks in 35 countries of Africa, Asia, Latin America and the Caribbean. And we work to close the gap between evidence and action. We also connect researchers, practitioners and decision makers to work together and to enhance South-South cooperation, South-North collaborations, to rebalance knowledge and symmetry in global debates and sustainable development. So always we are having this conversation. How can we connect? Yes. Can you hear me better?


Yu Ping Chan: Interrupt you, but it seems like there’s some difficulty with her sound. Can you just hold on a minute?


Margarita Gomez: Yeah, can you hear me better now? Hello, can you hear me better?


Yu Ping Chan: Because I hear a lot of buzzing in her sound quality and we’re not really hearing the message clearly. So maybe could we have a little bit more of a clearer fix on the sound? Yeah. Online panelists? Okay, they’re saying that it has, they can’t really control it and it’s coming from something else.


Margarita Gomez: I think that online is-


Yu Ping Chan: Marita, I think if you could just continue and we apologize for that. We can read the transcription here so we can actually follow along with your important points. So Marita, can I ask you to continue?


Margarita Gomez: Thank you so much. Yeah, thank you. Sorry about that. I think that, yeah. I hope that you can hear me better now. So I’m going to continue. And yeah, I think that-


Yu Ping Chan: You’re heard now.


Margarita Gomez: Thank you. Thank you so much. I think that’s-


Yu Ping Chan: Okay, go ahead, Marita.


Margarita Gomez: Thank you. Yeah, and the questions and having this panel focusing on what can we do at the local level- to connect with the global debate. I think that is very relevant for the conversation that we always have with our members. And before to prepare for this panel, we were discussing what are the key priorities? And there is this temptation to say, there are many priorities. We need to focus on the infrastructure, we need to focus on access, but we were really trying to identify the top priorities and one of the top priorities for our members, for the Global South that we hear very often is how can we bridging the digital divides? We think that this is one of the important areas that we need to focus our efforts in order to really have progress in health, education, security, financial inclusion, that is one of the important issues for gender, also inclusion, governance. And that’s one of the priorities that we hear often that is important for our members and for the countries where they are based. The second priority that we have identified if the inclusion of women and girls, what we see is that the gap is getting bigger in terms of having more women and having more girls connecting and being part of the digital transformation. When we talk about the Global Digital Compact, we see that there is an important effort to connect these priorities that are coming from the Global South with this global framework. Now, we have seen that they have put in the center some of these digital divides that exist in the different topics and priorities of the GDC. Just maybe to think a little more about what we can do at the local level. that is where countries and not municipalities, as Olaf was saying, but also states and national governments can have more advantage and can work more on that. So the first one, in terms of closing and tackling the digital divides, are reducing the barriers of meaningful use of digital use. Then digital literacy. So we know that in many countries in the Global South, there is a gap already of literacy. And when we talk about digital literacy, this is becoming even bigger. So we think that this is something that governments at the national level can do better because they know the context. They have also the partners, the right partners to do this. The inclusion of women and girls. That’s another issue that we’ve seen that local governments can have more advantage. And then also the participation and inclusion of marginalized groups in the design of the technology to be part of this revolution that is happening. And maybe just my final point is that these are things that local governments can do better, but there are other things that are needed also to happen at the global level in order to make these changes happen. And I just want to mention two of them that we think that is important. One is having a little more support of the global entities in terms of infrastructure, in terms of really sharing good practices, and also having more regulation and more inclusive governance. We think that this is important. something that is needed to happen at the global level. And in order to really move the needle in this topic, we need to collaborate in both levels. One that is the local level, and then the actions that we need to take at the global level. Thank you so much. And I hope that the sounds wasn’t too terrible.


Yu Ping Chan: No, it was much better towards the end Margarita, and thank you so much again for your patience on that. And so with Margarita’s comment that we should also look to the global level, we’re turning the conversation back here in the room to reflections from DESA as well as ITU, two of the global UN entities working on the global stage. And so the next question goes to Dennis from DESA. How does the GDC help accelerate SDG progress? And that’s something that DESA has really been looking at, tracking and measuring the progress that’s been made on the SDGs. And what has DESA seen in terms of the biggest needs and opportunities in this space?


Deniz Susar: Thank you, Yuping. And thank you also for inviting DESA to this panel. I am representing Mr. Juwang Su, Director of Division for Public Institutions, as you mentioned. The GDC highlights several areas critical for country level implementation, many of which align with our work at DESA. Due to time constraints, I will focus on our contribution related to WSIS and the WSIS Plus 2 in overall review. So as many of you know, Paragraph 68 of the GDC emphasizes building on WSIS processes and forums, such as the IGF and its national and regional initiatives and the WSIS Forum to advance the GDC implementation. And it also looks forward to WSIS Plus 2 in review in 2025, where UNDESA will serve as the secretariat. UNDESA is responsible for three WSIS action lines, C1, promoting ICT for development. C7 e-Government, and C11 International and Regional Cooperation. Related to this action line C1, GDC makes many references to the role of ICTs for SDGs, such as importance of data governance, AI. At UNDESA, with our regular program for technical cooperation, we support capacity building initiatives to advance sustainable development in developing countries. This program provides technical assistance, policy advice, and knowledge sharing platforms to enhance governance, digital transformation, and institutional capacities. One of the key focuses is promoting ICTs as enablers of sustainable development by improving digital governance, fostering inclusivity, and building institutional readiness to leverage digital tools and technologies. We have many projects, same like UNDP, in many countries. Related to this action line C7 e-Government, paragraph 13E of the GDC commits to prioritizing digital competencies for public officials and institutions, enabling the development and implementation of inclusive, secure, and user-centered digital services. The United Nations e-Government Survey, which looks at e-Government development of 193 countries, and starting from 2018, we also went local. We started looking at the most populous cities in each country. However, we have received many questions about why we cannot expand to several cities in a single country. So, we are also creating partnerships with entities, either government or non-government, to advance this work into several cities in a single country. So, we share our e-Government survey methodology, and we look at it at the local level. So, this work is also growing extensively in the recent years. There are many countries that we are going to local, and I agree with Olaf’s comments on that. The last section on C11 is the partnerships. to GDC, acknowledge the IGF as the primary stakeholder platform for internet governance. And by paragraph 29, we commit to supporting the IGF by increasing diverse participation from developing countries. As you see here, we are also working on that already. We’re in the IGF, this region, for the first time. UNDESA is the institutional home to the IGF. And also, we’re bringing global, and national, and local, and youth IGFs. So with that, we already also work on the GDC principles. So I just want to conclude saying that our work aligns closely with the GDC principles. And we will continue to integrate its commitments into our efforts.


Yu Ping Chan: Thank you so much, Dennis. And actually, on that particular note, that the UN agencies are really looking to see how we can drive forward implementation of the GDC to our existing work. And these ongoing programs that are really reaching country level, local level, as Dennis has explained, that’s a good way to actually go to our last panelist, Ms. Kitanjali Shah, who also, many of you would actually know, is known affectionately in some places as MISPASISTS, because of her very strong role and leadership in the process itself. And really, reflecting again on that, the role of the IGF, the role of the WSIS in implementation of the GDC, Kitanjali, can you speak to what ITU sees as the priorities in delivering the GDC vision at the country level, and the opportunity that the WSIS Plus 20 review that will be happening next year in the General Assembly has to drive progress towards these key goals?


Gitanjali Sah: Thank you, Yoping. It’s a pleasure to be here. And thanks for organizing this very multi-stakeholder panel where we heard different voices. And to complement what Dennis and Rob said, that through the WSIS Action Lines, the WSIS Action Lines provide a very sound framework and capture the whole gamut of digital technologies, right from cybersecurity to ICT infrastructure. And they have a whole range of technologies. So it’s a beautiful framework. And it’s really a win-win action, because if different UN agencies based on their respective mandates are implementing different action lines. So WHO has e-health, UNEP does e-environment, ITU and UNDP do cyber capacity building. So it’s really a one UN, UN in action framework. And as you can see, we are all here at the IDF. So the IDF and the WSIS Forum are perhaps the best examples of how multi-stakeholders are bringing stories from the ground to the global level, and sharing knowledge and sharing information on how digital cooperation really happens with different stakeholders. So ITU as the UN agency for digital technologies, our existing mandates and actions are directly aligned with the objectives, principles, and commitments of the GDC. ITU is already actively supporting member states and sector members in implementing the GDC. During our ITU governing body meetings, including the council, council working group on WSIS and SDGs that Cynthia is the chair of, we have actually identified the key actions that ITU should be taking, an ITU action plan, and mapping it with the existing WSIS frameworks and the 2030 agenda. Of course, we must not forget the global development goals as such a key role in achieving sustainable development goals. So at the ITU internally, have an internal ITU GDC implementation plan, and we are working with GDC based UN agencies to also come up with an action plan, a GD action plan. This would, we are calling it the Geneva Digital Kitchen, and we meet very often to kind of brainstorm and to explore what we can contribute to New York and to the implementation of the GDC as the UN in Geneva as well. So recently, many of you attended the WTSA, the World Telecommunication Standardization Assembly, where of course, ITU member states and membership prioritize AI, AI standards, AI governance, responsive, inclusive, impactful AI for sustainable development. Now at the country level as well, ITU has several country offices, A3 offices, regional offices, where we are working with important partners like the UNGDP on capacity building programs, on policy guidance, and AIDB to address the digital divide by ensuring universal connectivity. That’s the main thing that ITU strives to achieve, especially for marginalized and underserved communities. Initiatives like the GIGA, where we are connecting schools with UNICEF, Partner to Connect, the DPI initiative, again with the UNDP, partnership across the digital divide. These are all important initiatives that are already contributing to several aspects of the GDC. At the same time, cybersecurity is a really crucial issue for the ITU, fostering an open, safe, secure digital environment is of course a priority. It’s covered under Action 9C5, those of you who follow the framework, but it’s always an impact. This opportunity obviously provides us with an opportunity to ensure that all of this is strengthened, especially at the grassroots level. Of course, ITU’s ongoing efforts with the Office of the High Commissioner on Human Rights, OHCHR, and other stakeholders are advancing these objectives to developing relevant standards and guidelines to protect privacy, security, and freedom of expression. So just to conclude that WSIS Plus 20 provides us with this opportunity to ensure that this milestone that GDC has provided during the WSIS Plus 20 process is taken into consideration and we build on this to provide a future of WSIS beyond 2025. Back to you.


Yu Ping Chan: Thank you so much, Gitanjali. And then so before I go to our external stakeholders, I’m going to ask Robert to round up the UN family considerations and sort of reflections as to the work that the UN agency is doing in this area and ask you how UNDP is addressing some of the opportunities that we have spoken about that have been reflected from our audience participation and that you’ve heard from some of the other panelists. So what are the insights that you have heard from the various countries that UNDP works in and what do you see as, again, the most urgent priorities in this space?


Robert Opp: Yeah, so I think, well, so all the panelists have mentioned different aspects of it. You know, there’s, I mentioned before that we are getting signals from countries in these sort of different areas, policy. and strategies technology space and capacity building as well as AI. So in the policy and strategy space we have done digital readiness assessments in 53 countries. That is a multi-stakeholder process itself where it is a combination of government, private sector, civil society and other actors feed into the sort of perceptions around what is the strengths and weaknesses of particular contexts or particular digital ecosystems. We’ve also started doing AI readiness assessments which respond to that signal that we’re getting from countries on how can we embrace AI and embrace the benefits and that is something that we do jointly with UNESCO as well. On the technology side of the digital public infrastructure work you just mentioned at Gitanjali we’re working in about 25 countries with digital public infrastructure and trying to understand how to put people at the center of that and to that end we have just recently also launched together with the UN technology envoy’s office a set of DPI safeguards. That is a set of best practices that accompany the implementation of digital public infrastructure in a way that puts people and their rights at the center and so that was launched recently at the UN General Assembly this year and is now something that is available and we’re working to implement across countries around the world. And then the capacity-building space is a kind of a tapestry at the moment. We do work with ITU on a number of capacity building efforts. There’s also I think a fairly strong role for private sector and civil society when it comes to capacity building and so for example in Kenya we are starting a collaboration with the government of Kenya, Microsoft and Huawei on digital capacity building for civil servants. So there’s a lot of work going on out there across all of these areas. Your second question was on insights and I would say you know one of the bigger insights and I hear it coming out of the panel here these cannot just be top-down things. These have to be also bottom-up and you have to take into account signals from people, you have to involve people, you have to be on the ground, you have to be local. You really need to I think in order to get a set of actions that work for everybody and are inclusive you really need to have those voices included. I think that’s probably the biggest thing and in our work with because UNDP works with community level and city level and national governments sometimes it is our role to remind those government authorities that we need to have those voices in the room as well. So I’ll leave it there.


Yu Ping Chan: back to Margarita from Southern Voice to really reflect on that question of voices in the room and Margarita my question for you is where do you see the opportunities, catalytic opportunities for GDC implementation? Have you really seen this for instance from your research work with the Global South and how does Southern Voice plan to continue working with its network and wider partners in this?


Margarita Gomez: Thank you so much and a great conversation, great points that my colleagues has already shared too. I’m going to highlight three catalytics or opportunities that we that we see in the global south and the first one has already been highlighted by some of my colleagues there that is the potential of partnerships and what we see is like at the national level there is the potential of bringing to the conversation other partners and to have more synergies and collaborations so we need the government we need private sector also engaging in these conversations and there is one part that we see from the global south when we talk about partners is this how can we learn from what others countries in the global south are doing in terms of using technology, giving access, innovation that can be adapted and that can be also an inspiration for other countries in the global south so that will be one the potential of these partners is bringing others to the conversation. The second one and this is something that we were discussing too if we needed to do one thing as a government and different actors collaborating in this is maybe as to put in the center the inclusion and also the reduction of these digital divides that exist is maybe guaranteeing or trying to assure that we can have access in public spaces, we can give access in public spaces to as many as many citizens that is possible in these countries and this is an effort again a collective effort that needs to happen to give access in schools public service and we have already some examples that happen in this term so we have the GIGA initiative that has been trying to connect schools, hospitals and different public areas in order to guarantee this access, mainly to the ones that have less access and that we might be leaving behind. And that’s the second opportunity that we see. And the third one is also what’s already mentioned, that is how can we enhance local innovations and also engage local communities to the design development of these technologies that we are using. Even there are already some efforts that we have seen of people designing artificial intelligence, logarithms, bringing communities and local knowledge that is also very important. And in terms of what we are doing, so one of our core work is to connect the local agendas and the local efforts that is happening in different countries to the global agenda. And that is something that we are working with our members to identify these local needs in order to connect also with the global debates. And as a southern voice, we are engaging in different spaces in this agenda to bring and to put it at the center the needs, the priorities and the agenda that is important in these topics from the global south in order to connect with these global debates. Thank you so much.


Yu Ping Chan: Thank you so much, Margarita. Actually, the key words that you highlighted, partnership, inclusion, local innovation and knowledge, but you speak to what you actually had mentioned in the previous intervention. And we will ask them now to elaborate a little bit more on how this types of society intend to continue to work with these types of partnerships.


Olaf Kolkman: Certainly. We do this in many ways. We have a network of chapters throughout the world. We talk about the interaction on a local level between policy makers and perhaps society people. We find those people back in our local chapters. There are 141 million members globally. And in addition to the specialists themselves, we have a lot of good specialists. We have partnerships through our grant making program that provides characters, but also individuals that want to deploy initiatives about to the education skills. But we can do it. If we can do it then should be successful. Even in big ways. If we can do it then some chance can shine. If we can do it then we must make sure there is the openариng for our sustainable way of life. I don’t know if I can distribute the truth back. At the same time I think we drive the truth wrong. I think we drive the truth wrong. We got to judge the truth. Thatǵs okay give you a little more time. Or do you want to say something,ored something else? may I… Just… just going to say a few words. After youÕve speakled about the complete human thing, it has been explaining that for a lot of people because machine learning exists. It allows the electricity bill that generally is probably less than my age. Interesting infrastructure built here, open ceilings, so that we can get everything around the place.


Yu Ping Chan: Sorry to interrupt, but we really canÕt hear anything online. IÕm wondering if the technicians in the room can work on the cameras. The technicians in the room can work on the connection. IÕm wondering if the technicians in the room can work on the cameras. I’m dancing with this. Online participants here love singing, which is very, very entrancing, I have to say. Testing, one, two, three. That’s a bit better, it’s still a little run through. We’re back. Oh, we’re back. Are we back, online people?


Olaf Kolkman: I can stop singing now. You missed something online.


Yu Ping Chan: That’s much better. Okay, back to you, Ola.


Olaf Kolkman: Yeah, I don’t know where I was, but your partnerships are key to everything. It has been said before, alone a youth runs fast, with an elder slow, but together they go far. It has been said before, and that’s partnership for you. And partnership is not only knowledge, or not only money, it’s knowledge as well. And as I was saying, the Internet Society tries to make those connections on the knowledge level, but also through our foundation at the funding level. We ourselves work together with the Giga project of UNICEF, connecting schools, but in Jacksonville, Florida, for instance, we worked with a local bank to connect students to their school. The school put up a mast, so that the kids could go to the kids’ children’s laptops, so that in the poorest areas of Florida, students could get connected. And on bridging that technological policy divide, that is something that is part of our daily work. We try to make connections at the standardization level, so that’s at a very global level. We try to provide tool sets, so that people can analyze whether their policies will impact the open, global, secure, trustworthy, and unfragmented Internet. We have the Internet assessment toolkit for that. And we try to keep that Internet safe, so we will intervene in technical or policy discussions at the local level, where we think that the security of the Internet is under threat. And these are all wicked problems. Building the Internet out to the last billion, the next 1.8 billion people are probably okay, but the last billion people, that is a wicked problem, and we cannot do that alone.


Yu Ping Chan: And another catchphrase, we can’t do it alone. And so picking up on that, and asking who else we can do it with, I’m turning to Cynthia now, and asking her where she thinks that the GDC can connect with other important work that’s underway. For instance, with South Africa’s G20 presidency, and the WSIS review that many other speakers have discussed already as well.


Cynthia Lesufi: Thank you, Philippine, for this important question. Perhaps before one can ask that question, it’s really key for us to ask another question. You know, to then say, what do we make of the WSIS Plus 20 review process? From where we are sitting, as South Africa, we look at the WSIS Plus 20 review process as a framework for all stakeholders, and then based on the WSIS outcome documents, to address opportunities and challenges posed by the current digital landscape, including universal connectivity and sustainable digital transformation. Moving forward, it is also important to look at the GDC as a next step for WSIS, right? Where we are sitting, we believe that WSIS has primarily responded to the initial wave of globalization and digitization, and also concentrating on infrastructure and efforts to build the digital divide. While the GDC, we view it as a reflection of the advanced state of the digital ecosystem in addressing its complicities in the era characterized by widespread of digitalization, misinformation, emerging technologies such as AI and blockchain. And we also believe that it is important for us to ask another question as to our role in the digital divide. how GDC reinforce WSIS. For us, these both initiatives, they aim at enhancing ICTs and digital technologies to transform humanity. And we also believe that the GDC builds on the principles of WSIS by incorporating ethical and the rights-based approaches to digital transformation. While WSIS focuses on action languages, the GDC seeks to centralize sets of principles and commitments agreed upon by all stakeholders. And again, as South Africa, we also believe that really WSIS has laid the groundwork for global ICT discussions. And we also believe that the GDC as an initiative, it builds upon those principles by focusing on modern challenges, such as the regulation of your platform providers, the regulation of AI and ethics, and the online misinformation. And we also believe that the GDC could also be seen as the next step of WSIS’ legacy through aligning digital governance with the broader 2030 Agenda for Sustainable Development. Now, you know, now moving to the South African G20 Presidency. I was, as a country, we are informed by the general culture of inclusivity and consultation, which is, again, at the center of the WSIS and the GDC. And this is informed by the values of the values and the spirit of our constitution. With South Africa as a G20 Presidency, we seek to reinforce the notion of multistakeholder approach. And I want to believe that this is also important for both processes. And we are doing this through enhancing a dialogue and engagement with various states, international organizations, and civil society. And with its presidency, the South African government also intends to place Africa’s developmental agenda at the top of the G20 Presidency. And we aim to build on the success of the past three presidencies led by the Global South. As South Africa, we also believe that this presidency will provide us with an opportunity to advocate and mobilize support for developing economies of Africa and the Global South, particularly championing the developmental agenda. In conclusion, of us as South Africa, we believe that the G20 Presidency has a pivotal role in advancing the WSIS and the SDG agendas by focusing on the digital inclusion, sustainable development rights based on governance and global accountability. And we also believe that with our G20 Presidency, we can leave a lasting impact on global transformation, particularly for developing nations. And lastly, we believe that with our leadership, we can also fulfill the principles of WSIS, but also position South Africa as a key advocate for more equitable and inclusive digital future. Thank you. Thank you so much, Cynthia. And with that, we end our panel and we’re going to audience interaction and questions and answers for our distinguished panelists. Before we start that, we have another question for you to answer via Slido, and if I could have share screen again. So, having heard everything from our panelists, but also thinking about your own experiences and your own perspectives, in one to two words, can you tell us how we will know that we are succeeding and delivering impact at the country level? Again, not just talking about action this time around, reflecting on everything that you’ve heard, but the need to hear these voices and to act on these needs and priorities. So, in one, two words, how will we know that we are and delivering impact at the country? Okay. Hello. There we go. Two responses have been in, digital quality and results. Other suggestions? Other reflections? For those just coming in, we’re taking an audience survey via Slido. You scan the QR code and you give us one to two words on how we will know that we are succeeding in delivering impact at the country level. I see someone says that more than one to two words. I appreciate your commitment.


Olaf Kolkman: in one or two words, because the DTC, the action items or the objectives are, in fact, the KPIs that we’re looking at. And it’s not one KPI, it’s a bunch of them. And I think that once you’ve seen results at each individual objectives, they’re not really, not all of them have been


Yu Ping Chan: This is a good point that Olaf is making, that really the measure is really capturing the objectives of the GDC itself. Dennis wants to come in a little bit before we open the floor to participants. Go ahead.


Olaf Kolkman: I’m looking at the screen and I’m seeing most of the business action lines there, economic development, additional quality, SDG acceleration. And I just want to make this last point that you understand, we still think that GDC is a very comprehensive framework moving forward, which will guide us into the business plus 20. But the business framework is also still valid since 2003 and 2005. We think that existing mechanisms just still work, such as IGF, this is forum, STI forum, technology facilitation mechanism, et cetera. One last thing I want to mention is, for example, in 2005, we didn’t have AI, social media or a number of things were not there. But paragraph 72G of the Tunis agenda, where IGF gets its mandate, I quote, identify emerging issues, bring them to the attention of the relevant bodies and the general public, and where appropriate, make recommendations. So one of the keynotes of IGF is to discuss emerging issues. And AI was in the discussions of IGF since 2015. And UNESCO started discussing AI ethics in 2018. So we think that IGF and all this has enormous agenda setting, and how issues have normally first popped up in IGF, and then produce concrete partnerships and brought us here. So I think that’s an important point I just wanted to input here. And I think


Yu Ping Chan: that’s a point that a lot of us, resonates very strongly with a lot of us, and really reflects to the importance of the IGF process, feeding into these global conversations, and in some ways, prefiguring the conversation that then happens at the global level, because it was here at IGF that you heard it first. Olaf, go ahead. And then I’m going to turn to the floor.


Olaf Kolkman: I use the term norm entrepreneurship. That’s exactly what’s happening.


Yu Ping Chan: Norm entrepreneurship. All right. So we’re going to the floor now for reflections. I saw Henriette raise her hand, and then I see Isabel. So Henriette, go ahead. Henriette from the Alliance for Progressive Communications.


Anriette Esterhuysen: No, no, no, no, no. Thanks, Ola. Thanks, everyone. I kind of feel we’re still beating around the bush. You know, I hear, I want to pick up on what Cynthia was saying about the alignment between GDC and WSIS, but I want to hear more than that. I want to hear that the WSIS plus 20 outcome will integrate GDC follow-up and implementation with the WSIS. And if there’s a need to update WSIS action lines, to merge them with some of the new emerging issues that the GDC raises, then ask WSIS to do that. Ask the WSIS facilitation agencies to work that. Improve cooperation within the UN system. We know it’s not as good as it should be. But I think ultimately, if you want country-based actions, you have to respect countries and you have to, as the international system, not just dump new agendas on them all the time. I can speak for African countries. I was at the African WSIS plus 20 prep comp. They are implementing those WSIS action lines. They’re doing their best. It’s an imperfect and even process. They’re now concerned about also integrating GDC. Make it easy for them. Merge these processes. I think anything beyond that is serving our international intergovernmental bureaucracy rather than serving what we’re trying to achieve at member state level.


Yu Ping Chan: Thank you, Henriette. Turning over to Isabel from the Office of the Tech Envoy. And then after that, we have Nnenna online and then a colleague here. Isabel, go ahead.


Isabel De Sola: Thank you so much. And I’m devastated to go after Henriette. I’m Isabel D’Soula from the Office of the Tech Envoy. And I just wanted to say that I think this is such a good question on the screen is how do we know that we’re succeeding? From the Office of the Tech Envoy, I really wanna take this question back and see how we could connect some of our work on implementation to KPIs. And I couldn’t get my camera to work, but I would like to add one to the screen, which is two actually, data governance. So two words, Yuping. I think that we have an opportunity in the GDC to advance some pretty groundbreaking principles for international data governance. And the task is probably one of the most complex and most important of the GDC that will require a multi-stakeholder approach. So for the IGF and its role as an ideation center as a place for exchange, I really hope that the IGF will contribute to that process, which is just about to kick off in Geneva in January. And a second two or three words is about diversity of content. And that relates to the WSIS agenda. So this is something that we’ve been working on for 20 years but where I’ve recently learned there could be real potential for partnerships with the private sector. 80% of content online 20 years after the WSIS is still just in seven languages. And 50% of that content is in English. And now we have maybe some technical tools that could provide shortcuts to translating loads of content online. Those technical tools are in the hands of a certain sector also present here at the IGF, and they’re doing their part. I understand Google is taking 110 new languages into its AI-powered translation model. But here’s a place I think where the WSIS and the GDC could dig deeper together and say, all right, the progress we’ve made with the WSIS on languages is this. And in the GDC, we call on tech companies to support us in this, that, and the other in nine areas. And perhaps that’s a nice low-hanging fruit for the two frameworks to work together and deliver, as this question suggests, results. Thank you.


Yu Ping Chan: Thank you, Isabel. And we go to Nenna online and then we’ll come over here to our colleague here. Nenna?


AUDIENCE: Thank you. you. I hope you can hear me very well. Very quietly, Nana. Is it


Yu Ping Chan: okay if we speak a little bit more loudly? Can you hear me?


AUDIENCE: Yes, but not a little faint, but go ahead, Nana. Yeah, I think we’ve had a lot of sound issues. I just wanted to come back on the divides and the intersectionality of the divides. At this stage, we’re not just talking about digital divides. That is infrastructural part of it alone. But I think we should pay close attention to the digital policy divides, digital gender divides, digital rural and urban divides, digital age divides. So that’s just what I want to pitch in here. And maybe our panelists, our resource people can zero in on this. After 20 years in IGF, speaking about digital divides alone is not enough. But I think we should all as a global digital community, be aware that divides are intersectional, and our response to them must be intersectional. And I think that it is important to put this here, because we’re talking about digital cooperation. And most of our UN family members are here, so that we don’t just run with our own individual mandates at the expense of the mandate of other agencies. But we should have that collaboration ahead as a focus, because our divides are intersectional, and our response to them should also be. Thank you very much for having me.


Yu Ping Chan: Thank you, Nana. Let me reassure you that I think the collaboration between UN agencies, as you can see from the presence on the stage, has been strong and continues to be growing as well. So over here to colleague in the room.


AUDIENCE: Okay, thank you very much. Thank you for your good presentations. Though we had these hiccups of the, you know, internet, and you hoping that because it’s IGF forum that tomorrow, everything will be better than this. I’m Julia Fosha. I come from Kenya. We mainly work in the northern part of Kenya called Masbit. It’s a very dry place, and the place is remote. We do have a school, for example, called Tego School, which, you know, not only internet, we do not even have electricity in the first place. So I was wondering, Rob said he’s going to work with the country, mainly for the civil servants. In Masbit, most of the people are pastoralists, and they are mainly affected by drought. Like we had drought for the last four years. It only rained early… No, end of last year and early this year. I tend to agree with what Mr. Oph had said, that let’s really look at the local part of it, other than, you know, the whole population. Because if you look at the civil servants who come from Masbit, or from the marginalized places, they are very few. And we really need this taken down to the students, you know, to the ground local levels. So kindly, I would also request, if you are able to work with us, who are the CSOs… like the local, local NGOs who deal directly with the people in the grassroots. I think that can touch more people other than just going to the towns. Thank you.


Yu Ping Chan: Gitanjali has a response to that. And I think that is exactly a reminder of the perspectives and the people that we need to reach if we truly want to be impactful. Gitanjali? We have one more person in the queue. Maybe Gitanjali first. He’s been waiting. Go ahead.


Alex Mora: Hi, I’m Alex Mora. I am originally from Brazil. I work here in Saudi Arabia in the Cal State University, and I’ve been working on the research and education and support for scientific research for more than 25 years now. And from all the perspectives I heard here today, I’d like to add on the last commentary from our colleague here that I miss a lot of the integration or collaboration involving organizations that are working on those in this area of research and education. For instance, in each country, there is some sort of research and education organization working to connect schools, universities, all sorts of educational, let’s say, facility. And those facilities could be, I think, on my view, education is the main thing that could change people’s lives instead of only giving the access to Internet. Because if you give them the communication capabilities, but along with that, if you give access to good information and relevant, meaningful material that they can improve their own lives and do new things for themselves, you can empower communities, remote locations, people that are disconnected. So a lot of good things can come from that. So I think all efforts should always try to look involving the local people who work on research and education. And one good channel is the research and education networks. In each country, you have a lot of people working to do the same thing you are talking here. They are striving to bring fiber across the Amazon River. They are building connections through satellites. And that’s not only for scientific purposes. It’s also to connect schools and make people have access. So if you join efforts with those people and they have global coverage, I am also on the leadership of the GNA, Global Network Advancement. And this group is working to integrate the whole backbone of all NRENs in the whole world to work as an integrated system that every scientist, educator in the world can have access to make things better for science and education in every country. So this, I think, is important to see how we can leverage that capacity. They are very hardworking people. They work on trust. They collaborate. And they do a lot of incredible things. So you could check out the website in the field where they publish a lot of things they do. And the accomplishments are there. So if you join efforts with those kind of organizations, I think it would be very helpful.


Yu Ping Chan: And again, I think that’s a good reminder. that we should be looking to where there are efforts and really these partnerships with local bodies and local organizations are already doing this good work. So thank you for that and that perspective on who we really need to be focusing on and at the local level as well. So I saw that Gitanjali and Rob both wanted to come back in on what they’ve heard so far. And I will also open it up to the other panelists as well. So Gitanjali first and Rob.


Gitanjali Sah: So Yuping, this discussion really takes me back to 2006 when I was working with UNDP and UNESCO at the grassroots level. And I think Olaf and Rob, you really remember how together as a passionate community, the Open South movement started after WSIS. It was so passionate on the ground. The indigenous is bringing indigenous languages and cultures to the digital world. The community radio stations. I mean, I don’t know if any of you were involved in that movement, but in 2006, Anirudh, you remember, you know, when we had started empowering the local villages to run their own community radio stations and to be empowered, you know? So really this whole digital ICT movement dates back to a lot of achievements, you know? So we’re talking about AI, new technologies right now, but think of the grassroots level work that we have all done together at this level. You know, it reminds me of the first offices in India which were converted into telecentres where the postman had the role of the trainer as a telecentre manager. You know, we should be having this accessibility. So you know, we used to balance twice a day because we had a lot of time and we didn’t eat. I’m sorry to interrupt again, but the sound is, again, very bad online. So this was in South Asia, you know? So this one also reminds you that, as Anirudh said, we have been working since 2000, you know, on the ground to make all of this possible. And this is why today we are talking about AI and new technologies and all of that, because a lot of work is going on. Because a lot of work has gone into it.


Yu Ping Chan: We are running out of time. So I’m going to ask the panellists to really be very short in their responses and to also ask if anyone online in the room has any, literally two sentences, comments or responses. So very quickly to the panellists, two sentences. Oh, now, okay. Everyone gets two sentences.


Robert Opp: I just wanted to respond quickly to the two comments made here that are extremely valid in terms of looking at rural areas across the country, local and the education system. You know, what I’m talking about, I kind of left it at the upper level, but in Kenya, in fact, we are now working on local district digital readiness assessments because we know that the disparities are out there. The education system in Africa, we have 13 countries with innovation offices into local universities because we also know that’s the source of a lot of the digital skilling and the kind of the pipeline of the future. And yes, and then we have lots of things around the world as well on extension to local spaces like Bangladesh has something in the order of 9,000 local digital services centres and things like that. So just to say, acknowledge excellent points and there’s a lot going on.


Yu Ping Chan: There’s a lot of two sentences. Hold up very quickly, two sentences. Points.


PANELIST: First, Henriette I assume made a good point. Don’t invent too many processes. Build on what you have. We have the idea. It’s solid. We need to tweak it. We need to grow and evolve it, but build on it. Second point, academic networks and brands have been part of the technical community since the dawn of the internet. We have been on the edge of that education So we’re working on this. And it’s really important for us to be able to do this. And it’s working. It’s working. It’s really important. Thank you.


Yu Ping Chan: Thank you. I just wanted to say, which I agree with. I think this is going on for years and years. And we’ve been going to some cheap meetings. And we’ve had some people who have been doing this for years. Thank you. Thank you.


R

Robert Opp

Speech speed

154 words per minute

Speech length

1170 words

Speech time

454 seconds

GDC objectives align with existing UN agency work

Explanation

Robert Opp states that the Global Digital Compact (GDC) covers themes that align with UNDP’s existing work. This includes areas such as digital public infrastructure, capacity building, and artificial intelligence.


Evidence

UNDP supports digital programming in more than 120 countries around the world.


Major Discussion Point

Implementation of the Global Digital Compact (GDC) at the country level


Need to close all digital divides, including infrastructure and capacity

Explanation

Robert Opp emphasizes the importance of closing digital divides in terms of both connectivity and services. He mentions that capacity building is a frequent request from countries.


Evidence

UNDP receives requests for support in strategy building, policies, roadmaps, and capacity building across the board.


Major Discussion Point

Addressing digital divides


Agreed with

Cynthia Lesufi


Yu Ping Chan


Unknown speaker


Agreed on

Importance of closing digital divides


Capacity building a key priority based on country requests

Explanation

Robert Opp highlights that capacity building is a key priority based on requests from countries. This includes capacity for government, society at large, and innovation ecosystems.


Evidence

Countries are asking for more digital capacity across the board.


Major Discussion Point

Capacity building and skills development


Agreed with

Margarita Gomez


Deniz Susar


Agreed on

Significance of capacity building and skills development


Focus on building AI ecosystems and capacity

Explanation

Robert Opp mentions that countries are requesting support in building their AI ecosystems. This involves strategy, policy, and capacity building specific to AI.


Evidence

Recent requests from countries focus on how to build AI ecosystems and make AI work for their country.


Major Discussion Point

Capacity building and skills development


C

Cynthia Lesufi

Speech speed

126 words per minute

Speech length

1311 words

Speech time

621 seconds

GDC reinforces WSIS principles with modern challenges

Explanation

Cynthia Lesufi states that the GDC builds on WSIS principles by incorporating ethical and rights-based approaches to digital transformation. It also addresses modern challenges such as AI regulation and online misinformation.


Evidence

The GDC is seen as a reflection of the advanced state of the digital ecosystem, addressing complexities in an era of widespread digitalization.


Major Discussion Point

Implementation of the Global Digital Compact (GDC) at the country level


Differed with

Anriette Esterhuysen


Differed on

Approach to implementing the Global Digital Compact (GDC)


Importance of public-private partnerships for digital initiatives

Explanation

Cynthia Lesufi emphasizes that the GDC encourages public-private partnerships for inclusive digital initiatives. This strengthens collaboration among government, private sector, NGOs, and international organizations.


Evidence

These partnerships can help countries leverage resources and expertise for infrastructure development and digital transformation projects.


Major Discussion Point

Role of multi-stakeholder partnerships


Agreed with

Margarita Gomez


Olaf Kolkman


Isabel De Sola


Agreed on

Value of multi-stakeholder partnerships


South Africa G20 presidency to reinforce multi-stakeholder approach

Explanation

Cynthia Lesufi states that South Africa’s G20 presidency will reinforce the notion of a multi-stakeholder approach. This aligns with the values of inclusivity and consultation central to WSIS and the GDC.


Evidence

South Africa aims to enhance dialogue and engagement with various states, international organizations, and civil society during its G20 presidency.


Major Discussion Point

Role of multi-stakeholder partnerships


A

Anriette Esterhuysen

Speech speed

150 words per minute

Speech length

224 words

Speech time

89 seconds

Need to merge GDC implementation with WSIS processes

Explanation

Anriette Esterhuysen argues for integrating GDC follow-up and implementation with WSIS processes. She suggests updating WSIS action lines to merge them with new emerging issues raised by the GDC.


Evidence

African countries are already implementing WSIS action lines and are concerned about integrating GDC as well.


Major Discussion Point

Implementation of the Global Digital Compact (GDC) at the country level


Differed with

Cynthia Lesufi


Differed on

Approach to implementing the Global Digital Compact (GDC)


M

Margarita Gomez

Speech speed

139 words per minute

Speech length

1274 words

Speech time

549 seconds

Importance of partnerships and local innovation

Explanation

Margarita Gomez emphasizes the potential of partnerships and bringing other partners into the conversation at the national level. She also highlights the importance of enhancing local innovations and engaging local communities in technology design and development.


Evidence

Examples of countries in the Global South learning from each other’s experiences in using technology and innovation.


Major Discussion Point

Role of multi-stakeholder partnerships


Agreed with

Cynthia Lesufi


Olaf Kolkman


Isabel De Sola


Agreed on

Value of multi-stakeholder partnerships


Need for digital literacy and skills development

Explanation

Margarita Gomez mentions the importance of digital literacy and skills development. She suggests focusing on guaranteeing access to digital technologies in public spaces to reduce digital divides.


Evidence

The GIGA initiative is trying to connect schools, hospitals, and different public areas to guarantee access.


Major Discussion Point

Capacity building and skills development


Agreed with

Robert Opp


Deniz Susar


Agreed on

Significance of capacity building and skills development


G

Gitanjali Sah

Speech speed

133 words per minute

Speech length

928 words

Speech time

417 seconds

Focus on grassroots implementation and community radio

Explanation

Gitanjali Sah recalls past grassroots efforts in digital empowerment, such as the Open South movement and community radio stations. She emphasizes the importance of empowering local villages and communities through digital technologies.


Evidence

Examples of early telecentres in India where post offices were converted and postmen became trainers.


Major Discussion Point

Implementation of the Global Digital Compact (GDC) at the country level


Y

Yu Ping Chan

Speech speed

167 words per minute

Speech length

2430 words

Speech time

870 seconds

Need to close all digital divides, including infrastructure and capacity

Explanation

Yu Ping Chan emphasizes the importance of closing all digital divides. This includes addressing both infrastructure and capacity building needs.


Major Discussion Point

Addressing digital divides


Agreed with

Robert Opp


Cynthia Lesufi


Unknown speaker


Agreed on

Importance of closing digital divides


U

Unknown speaker

Speech speed

0 words per minute

Speech length

0 words

Speech time

1 seconds

Digital divides are intersectional and require collaborative response

Explanation

The speaker argues that digital divides are intersectional, including policy, gender, rural-urban, and age divides. They emphasize the need for a collaborative, intersectional response from the global digital community.


Evidence

After 20 years of IGF, speaking about digital divides alone is not enough.


Major Discussion Point

Addressing digital divides


Agreed with

Robert Opp


Cynthia Lesufi


Yu Ping Chan


Agreed on

Importance of closing digital divides


Need to reach marginalized communities like pastoralists

Explanation

The speaker highlights the need to focus on marginalized communities, such as pastoralists in remote areas. They emphasize the importance of working with local NGOs to reach people at the grassroots level.


Evidence

Example of Tego School in Masbit, Kenya, which lacks both internet and electricity.


Major Discussion Point

Addressing digital divides


A

Alex Mora

Speech speed

131 words per minute

Speech length

420 words

Speech time

191 seconds

Leverage research and education networks to connect schools

Explanation

Alex Mora suggests leveraging research and education networks to connect schools and educational facilities. He emphasizes the importance of providing access to good information and meaningful material to empower communities.


Evidence

Examples of research and education organizations working to connect schools and universities in each country.


Major Discussion Point

Addressing digital divides


Importance of education and empowering communities through skills

Explanation

Alex Mora argues that education is the main factor that can change people’s lives, beyond just providing internet access. He emphasizes the importance of empowering communities through access to relevant and meaningful educational material.


Evidence

Efforts of research and education networks to connect remote locations and build connections through various technologies.


Major Discussion Point

Capacity building and skills development


O

Olaf Kolkman

Speech speed

137 words per minute

Speech length

1290 words

Speech time

562 seconds

Internet Society works through local chapters and partnerships

Explanation

Olaf Kolkman explains that the Internet Society operates through a network of local chapters and partnerships. This approach allows for bottom-up development of solutions that are locally tailored and bring together various stakeholders.


Evidence

Example of working with a local bank in Jacksonville, Florida to connect students to their school.


Major Discussion Point

Role of multi-stakeholder partnerships


Agreed with

Cynthia Lesufi


Margarita Gomez


Isabel De Sola


Agreed on

Value of multi-stakeholder partnerships


I

Isabel De Sola

Speech speed

168 words per minute

Speech length

381 words

Speech time

135 seconds

Potential for partnerships on content diversity and translation

Explanation

Isabel De Sola highlights the potential for partnerships to address the lack of linguistic diversity in online content. She suggests leveraging new technical tools, particularly AI-powered translation, to increase content diversity.


Evidence

80% of content online is still in just seven languages, with 50% in English. Google is taking 110 new languages into its AI-powered translation model.


Major Discussion Point

Role of multi-stakeholder partnerships


Agreed with

Cynthia Lesufi


Margarita Gomez


Olaf Kolkman


Agreed on

Value of multi-stakeholder partnerships


D

Deniz Susar

Speech speed

134 words per minute

Speech length

518 words

Speech time

231 seconds

GDC commits to prioritizing digital competencies for public officials

Explanation

Deniz Susar mentions that the GDC commits to prioritizing digital competencies for public officials and institutions. This enables the development and implementation of inclusive, secure, and user-centered digital services.


Evidence

Reference to paragraph 13E of the GDC.


Major Discussion Point

Capacity building and skills development


Agreed with

Robert Opp


Margarita Gomez


Agreed on

Significance of capacity building and skills development


Agreements

Agreement Points

Importance of closing digital divides

speakers

Robert Opp


Cynthia Lesufi


Yu Ping Chan


Unknown speaker


arguments

Need to close all digital divides, including infrastructure and capacity


GDC offers a variety of opportunities to support digital transformation in countries from where we are sitting


Digital divides are intersectional and require collaborative response


summary

Multiple speakers emphasized the critical need to address various aspects of digital divides, including infrastructure, capacity, and access.


Significance of capacity building and skills development

speakers

Robert Opp


Margarita Gomez


Deniz Susar


arguments

Capacity building a key priority based on country requests


Need for digital literacy and skills development


GDC commits to prioritizing digital competencies for public officials


summary

Several speakers highlighted the importance of capacity building and skills development in various contexts, from general digital literacy to specific competencies for public officials.


Value of multi-stakeholder partnerships

speakers

Cynthia Lesufi


Margarita Gomez


Olaf Kolkman


Isabel De Sola


arguments

Importance of public-private partnerships for digital initiatives


Importance of partnerships and local innovation


Internet Society works through local chapters and partnerships


Potential for partnerships on content diversity and translation


summary

Multiple speakers emphasized the importance of partnerships involving various stakeholders, including government, private sector, NGOs, and local communities.


Similar Viewpoints

Both speakers emphasized the importance of building on existing processes and grassroots efforts rather than creating entirely new initiatives.

speakers

Anriette Esterhuysen


Gitanjali Sah


arguments

Need to merge GDC implementation with WSIS processes


Focus on grassroots implementation and community radio


Both speakers stressed the importance of focusing on marginalized communities and empowering them through education and skills development.

speakers

Unknown speaker


Alex Mora


arguments

Need to reach marginalized communities like pastoralists


Importance of education and empowering communities through skills


Unexpected Consensus

Integration of AI in development efforts

speakers

Robert Opp


Cynthia Lesufi


Isabel De Sola


arguments

Focus on building AI ecosystems and capacity


GDC reinforces WSIS principles with modern challenges


Potential for partnerships on content diversity and translation


explanation

There was an unexpected consensus on the importance of integrating AI into various aspects of digital development, from building ecosystems to addressing content diversity challenges.


Overall Assessment

Summary

The main areas of agreement included the importance of closing digital divides, the need for capacity building and skills development, and the value of multi-stakeholder partnerships. There was also consensus on building on existing processes and focusing on marginalized communities.


Consensus level

The level of consensus among speakers was relatively high, particularly on broad principles and goals. This suggests a strong foundation for implementing the Global Digital Compact, but challenges may arise in the specifics of implementation and prioritization of resources.


Differences

Different Viewpoints

Approach to implementing the Global Digital Compact (GDC)

speakers

Anriette Esterhuysen


Cynthia Lesufi


arguments

Need to merge GDC implementation with WSIS processes


GDC reinforces WSIS principles with modern challenges


summary

Anriette Esterhuysen argues for integrating GDC implementation with existing WSIS processes, while Cynthia Lesufi sees the GDC as building upon and reinforcing WSIS principles to address modern challenges.


Unexpected Differences

Overall Assessment

summary

The main areas of disagreement revolve around the approach to implementing the Global Digital Compact and the specific priorities in addressing digital divides.


difference_level

The level of disagreement among the speakers is relatively low. Most speakers agree on the overall goals but differ in their emphasis on specific aspects or approaches. This suggests a general consensus on the importance of digital cooperation and development, with variations in implementation strategies based on different perspectives and experiences.


Partial Agreements

Partial Agreements

All speakers agree on the importance of addressing digital divides, but they emphasize different aspects: Robert Opp focuses on infrastructure and capacity, Margarita Gomez highlights digital literacy and skills, while the unknown speaker stresses the intersectional nature of digital divides.

speakers

Robert Opp


Margarita Gomez


Unknown speaker


arguments

Need to close all digital divides, including infrastructure and capacity


Need for digital literacy and skills development


Digital divides are intersectional and require collaborative response


Both speakers emphasize the importance of local partnerships and networks, but they focus on different types of organizations: Olaf Kolkman on Internet Society chapters, and Alex Mora on research and education networks.

speakers

Olaf Kolkman


Alex Mora


arguments

Internet Society works through local chapters and partnerships


Leverage research and education networks to connect schools


Similar Viewpoints

Both speakers emphasized the importance of building on existing processes and grassroots efforts rather than creating entirely new initiatives.

speakers

Anriette Esterhuysen


Gitanjali Sah


arguments

Need to merge GDC implementation with WSIS processes


Focus on grassroots implementation and community radio


Both speakers stressed the importance of focusing on marginalized communities and empowering them through education and skills development.

speakers

Unknown speaker


Alex Mora


arguments

Need to reach marginalized communities like pastoralists


Importance of education and empowering communities through skills


Takeaways

Key Takeaways

The Global Digital Compact (GDC) aligns with and builds upon existing WSIS processes and UN agency work


Implementation of the GDC needs to focus on local and grassroots efforts, involving multi-stakeholder partnerships


Addressing digital divides remains a key priority, requiring a holistic and intersectional approach


Capacity building and skills development, especially in emerging technologies like AI, are crucial for digital transformation


There is a need to leverage existing networks and initiatives, particularly in research and education, to advance digital cooperation


Resolutions and Action Items

Integrate GDC follow-up and implementation with the WSIS Plus 20 review process


Develop KPIs to measure success in GDC implementation at the country level


Increase efforts to involve local NGOs and grassroots organizations in digital initiatives


Expand digital readiness assessments to local and rural areas


Strengthen collaboration between UN agencies on digital cooperation efforts


Unresolved Issues

How to effectively merge GDC implementation with existing WSIS processes without creating additional bureaucratic burdens


Specific strategies for addressing intersectional digital divides beyond infrastructure


Methods for ensuring meaningful participation of marginalized communities in digital transformation efforts


Balancing global frameworks with local needs and contexts in digital cooperation initiatives


Suggested Compromises

Update WSIS action lines to incorporate new emerging issues raised by the GDC


Leverage existing research and education networks to advance GDC objectives rather than creating new structures


Balance focus between high-level policy work and grassroots implementation efforts


Thought Provoking Comments

Think global with the GDC, but really the action has to be local.

speaker

Olaf Kolkman


reason

This concisely captures a key tension in implementing global digital initiatives, emphasizing the importance of local context and action.


impact

It shifted the conversation to focus more on local implementation and partnerships, with subsequent speakers emphasizing bottom-up approaches and local innovations.


I want to hear that the WSIS plus 20 outcome will integrate GDC follow-up and implementation with the WSIS. And if there’s a need to update WSIS action lines, to merge them with some of the new emerging issues that the GDC raises, then ask WSIS to do that.

speaker

Anriette Esterhuysen


reason

This comment directly challenged the panel to address the practical integration of multiple global frameworks, highlighting potential redundancies and burdens on countries.


impact

It prompted more specific discussion about how to align and streamline global digital initiatives, particularly in relation to country-level implementation.


At this stage, we’re not just talking about digital divides. That is infrastructural part of it alone. But I think we should pay close attention to the digital policy divides, digital gender divides, digital rural and urban divides, digital age divides.

speaker

Nenna


reason

This comment expanded the conversation beyond basic infrastructure to highlight the multifaceted nature of digital divides, introducing more complexity to the discussion.


impact

It broadened the scope of the conversation about digital divides and prompted consideration of intersectional approaches to addressing these issues.


I miss a lot of the integration or collaboration involving organizations that are working on those in this area of research and education. For instance, in each country, there is some sort of research and education organization working to connect schools, universities, all sorts of educational, let’s say, facility.

speaker

Alex Mora


reason

This comment introduced a new perspective on leveraging existing educational networks and infrastructure, which had not been prominently discussed before.


impact

It sparked consideration of additional partnerships and resources that could be utilized in implementing digital initiatives, particularly in the education sector.


Overall Assessment

These key comments collectively shifted the discussion from broad, high-level principles to more specific, practical considerations for implementing digital initiatives. They emphasized the importance of local context, the need to streamline global frameworks, the complexity of digital divides, and the potential of leveraging existing networks. This resulted in a more nuanced and action-oriented conversation about realizing the goals of the Global Digital Compact.


Follow-up Questions

How can the WSIS Plus 20 review process integrate GDC follow-up and implementation?

speaker

Anriette Esterhuysen


explanation

This is important to streamline processes and make implementation easier for countries, especially in Africa.


How can we advance international data governance principles through the GDC?

speaker

Isabel De Sola


explanation

This is a complex but crucial task that requires a multi-stakeholder approach and could benefit from IGF contributions.


How can we leverage partnerships with the private sector to increase diversity of online content and languages?

speaker

Isabel De Sola


explanation

This could help address the issue of limited language diversity in online content, building on WSIS goals and GDC principles.


How can we address the intersectionality of digital divides (policy, gender, rural/urban, age) in our response strategies?

speaker

Nnenna


explanation

This is crucial for developing comprehensive and effective solutions to digital inequalities.


How can we better involve and support local NGOs and grassroots organizations in implementing digital initiatives?

speaker

Julia Fosha


explanation

This is important for reaching marginalized communities and ensuring impact at the local level.


How can we integrate and collaborate more with research and education organizations in digital cooperation efforts?

speaker

Alex Mora


explanation

This could leverage existing networks and expertise to improve access to education and empower communities.


Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

DC-Interplanetary: Toward the Interplanetary Internet –the digital governance–

DC-Interplanetary: Toward the Interplanetary Internet –the digital governance–

Session at a Glance

Summary

This discussion focused on the development and governance of interplanetary networks, particularly in the context of space exploration and communication. Vint Cerf introduced the history of interplanetary communications, dating back to 1964 with NASA’s Deep Space Network. He emphasized the importance of governance as space activities become increasingly commercialized.

Yosuke Kaneko discussed the concept of the interplanetary internet, highlighting key principles such as common protocols, open forums, and multi-stakeholder policymaking. He stressed the need to inherit good practices from terrestrial internet governance. Samuel Grasic explained Delay Tolerant Networking (DTN) and its applications beyond space, including in remote terrestrial areas and underwater environments.

Professor Mohamed-Slim Alouini discussed terrestrial applications of DTN technology, such as providing non-real-time internet access to remote villages and underwater communication. The speakers emphasized that while interplanetary communication faces challenges like long delays, the technologies developed can benefit underserved areas on Earth.

The discussion touched on governance issues, including the need for a framework to manage collaborative efforts in space and address commercial interests. Vint Cerf highlighted the importance of considering existing space treaties and the need for new governance models as space activities expand.

Questions from the audience addressed topics such as equitable access to space technologies, human rights considerations, and international cooperation. The speakers emphasized the open nature of the interplanetary network architecture and invited participation from diverse stakeholders, including those from non-spacefaring nations.

Overall, the discussion underscored the importance of proactive governance planning for interplanetary networks and the potential for these technologies to benefit both space exploration and terrestrial applications.

Keypoints

Major discussion points:

– The origins and development of interplanetary networking and communication

– Technical challenges and solutions for interplanetary communication, like delay-tolerant networking (DTN)

– Terrestrial applications and benefits of technologies developed for space communication

– Governance considerations for interplanetary internet and commercialization of space

– Inclusivity and access issues related to interplanetary networking

Overall purpose:

The goal of this discussion was to introduce the concept of interplanetary internet to the Internet Governance Forum, explain its technical aspects and challenges, highlight potential terrestrial applications, and begin a dialogue on governance issues that will arise as space exploration and commercialization increase.

Tone:

The tone was primarily informative and educational, with speakers providing background and technical details in an accessible way. There was also an underlying tone of excitement about the possibilities of interplanetary networking. During the Q&A, the tone became more interactive and collaborative, with speakers encouraging participation and emphasizing the need for multi-stakeholder involvement in shaping the future of interplanetary internet governance.

Speakers

– Roberto Gaetano: Session moderator

– Vint Cerf: Internet pioneer, involved in interplanetary networking project

– Yosuke Kaneko: Chair of the IPN SIG (Interplanetary Networking Special Interest Group)

– Samo Grasic: Lead of the pilot project working group of Interplanetary Special Network Internet Group

– Mohamed-Slim Alouini: Professor of Electrical and Computer Engineering at King Abdullah University of Science and Technology (KAUST), UNESCO Chair focusing on connecting the unconnected

Additional speakers:

– Filipe Santos: Software developer from Brazilian Internet Steering Committee

– Aouke: Works for KPMG in the Netherlands

– Kanbaro Sainbro: From the United Kingdom Foreign Ministry

– Alan Veloso: International cooperation advisor for the Brazilian Space Agency

– Kunle Olorundare: President of Internet Society in Nigeria, member of special interest group in Internet Society

Full session report

Revised Summary of Interplanetary Networks Discussion

Introduction:

This Internet Governance Forum (IGF) session, moderated by Roberto Gaetano, focused on the development and governance of interplanetary networks. Experts discussed technical challenges, governance issues, and potential terrestrial applications of space communication technologies.

1. Origins and Development of Interplanetary Networking:

Vint Cerf, an Internet pioneer, introduced the history of interplanetary communications, dating back to NASA’s Deep Space Network in 1964. He emphasized the importance of governance as space activities become increasingly commercialized, highlighting the need to consider existing space treaties and develop new governance models.

Yosuke Kaneko, Chair of the Interplanetary Networking Special Interest Group (IPN SIG), discussed the concept of the interplanetary internet. He highlighted key principles such as common protocols, open forums, and multi-stakeholder policymaking. Kaneko also mentioned a recent WRC resolution on lunar frequencies, indicating progress in interplanetary communication regulations.

2. Technical Challenges and Solutions:

Samo Grasic, lead of the pilot project working group of the Interplanetary Special Network Internet Group, explained Delay Tolerant Networking (DTN) and its applications. DTN addresses challenges in deep space communication, such as long delays and disruptions, and has potential applications in various terrestrial and underwater scenarios.

Professor Mohamed Slim Alouini from King Abdullah University of Science and Technology, who holds a UNESCO Chair focusing on connecting the unconnected, discussed energy efficiency and wake-up receiver technologies for remote sensors. He also suggested the use of free space optics as a potential solution for spectrum scarcity in interplanetary communication.

3. Terrestrial Applications and Benefits:

The speakers highlighted the potential for interplanetary network technologies to address terrestrial development challenges. Specific examples include:

– Providing non-real-time internet access to remote villages

– Underwater communication

– Supporting sensor networks in remote areas

– A reindeer herder project utilizing DTN technology, as mentioned by Samo Grasič

These applications demonstrate how technologies developed for space communication can benefit underserved areas on Earth and explore remote terrestrial regions.

4. Governance Considerations:

The discussion touched on several governance issues, including:

– The need for a framework to manage collaborative efforts in space

– Addressing commercial interests in the context of the Outer Space Treaty

– Adopting governance models and technical standards similar to those used in the terrestrial Internet

– The importance of multi-stakeholder governance and open standards for interoperability

Yosuke Kaneko mentioned COPUOS (Committee on the Peaceful Uses of Outer Space) as a forum for non-spacefaring nations to participate in discussions about space governance.

Vint Cerf noted the limited capacity of deep space communication resources, suggesting potential constraints on access that will need to be addressed in future governance frameworks.

5. Pilot Projects and Participation:

Samo Grasic discussed the pilot project working group and encouraged participation from interested individuals. He mentioned that people can get involved by joining the IPN SIG and participating in their mailing lists and meetings. The ipnsig.org website was cited as a resource for learning about DTN and interplanetary networking.

Conclusion:

The discussion underscored the importance of proactive governance planning for interplanetary networks and the potential for these technologies to benefit both space exploration and terrestrial applications. Key takeaways included the need for multi-stakeholder governance models, the potential of DTN technology for connecting remote areas, and the importance of addressing technical challenges in deep space communication.

Unresolved issues include developing legal and regulatory frameworks for space commercialization and allocating limited deep space network resources. The speakers encouraged continued development of DTN and bundle protocols through collaborative efforts and invited participation from diverse stakeholders in shaping the future of interplanetary internet governance.

Session Transcript

Roberto Gaetano: I didn’t think that we needed, but apparently, we start thinking, well we’re ready here online. So good afternoon. As often with the first session in the split rooms, we have some details to fix. I hope I can, I hope everybody can hear me, remotely I mean. Can we start? Okay. So this is the section. Can I take your? Hello? We can hear you. Go ahead, Roberto. It’s been served. Okay. I see that now you can hear me. I was apologizing for the delay. This is the first session in the split rooms, and we had some setup problems. We will be talking about the interplanetary networks and having a focus on the internet governance. The first speaker is Vint Cerf, that doesn’t need an introduction. He will talk about the origin of the project, why the interplanetary networks are important, and what were the whereabouts that brought to the start of this project. Vint, you have the floor.

Vint Cerf: Thank you so much, Roberto, and good afternoon, everyone. I’m speaking to you from Washington, D.C., in my basement office. It’s a pleasure to join you. I just wish I could be there in person. Let me just give you a brief history of this project. Interplanetary communications began in 1964 when the Deep Space Network was built by NASA with the intent that these large 70-meter antennas be used to communicate with spacecraft that could go anywhere in the solar system and perhaps even beyond. As some of you know, there are two spacecraft that are well outside of the solar system now, Voyager 1 and Voyager 2. The space program continued. Landings on the moon happened and so on. By 1997, the project successfully landed a small rover on Mars, the so-called Sojourner. There had been another successful landing in 1976 of two Viking spacecraft, and then for 20 years, nothing worked. It was very exciting to see the Sojourner land successfully on Mars, and I was so excited about it, I flew out to the Jet Propulsion Laboratory in California to meet with the team that was handling communications for the 1997 Sojourner mission. And at this point, several of us began speculating about what we should be doing that we are going to need 25 years later, and we concluded that we should start on the design and implementation of a solar system internet. And so that project has been going on. In the 2010s, the project expanded outside of NASA and included the Japanese space agency JAXA, the Korean space agency KARI, and the European space agency ESA. And since that time, during the 10s and 2020s, the four space agencies have been collaborating together with the Consultative Committee on Space Data Systems. Their primary focus of attention has been on the design of a new suite of protocols called the Bundle Protocols to overcome some of the challenges of deep space operation. We’ll hear considerably more about that. The reason I wanted to take this moment for a preamble is also to say that the reason that we’re at the Internet Governance Forum is because governance has become a very critical part of the project. As we look towards commercialization, and many of you are well aware that there are commercial companies, SpaceX, for example, and Intuitive Machines, just to name two, that are actively pursuing activities in space. And in particular, NASA has offered to purchase habitats and the like, and even to buy the product of mining on the moon. And it’s the consequence of commercialization which leads us to the importance of governance. And so the point of this session, in part, is to bring you up to speed on where we are technically, and also the demands that we now foresee for governance as a consequence of commercialization. So, that concludes my little preamble. Let’s move on to the next speaker.

Roberto Gaetano: I can’t hear. Channel three. Yeah. But it. Okay. Thank you. Thank you, Vint, for your introduction. And now I’ll give the floor to Kaneko Yusuke, who is the chair of the IPN SIG, and who will talk about the activities of the IPN SIG and how the work proceeds. Kaneko, you have the floor. Okay.

Yosuke Kaneko: Good afternoon, everyone. And I am sitting in Washington, D.C., as well. And I hope I had joined you in Riyadh, but unfortunately, I’ll be connecting remotely today. But it’s a pleasure to be here. And good afternoon, everyone, to whomever made it to this session. So, as Vint just set the floor, I want to briefly kind of address the concept of the interplanetary internet a bit more in detail. For some of you, this might sound like science fiction, but this kind of interplanetary internet has been around for quite some time, as just Vint mentioned. And many of the space agencies around the world have been putting a tremendous effort into turning this concept into reality. And today, we stand on the cusp of an exciting reentry into space exploration again. We’re heading back to the moon, more than 25 years after the first inception of the interplanetary internet concept. And over 50 years since it first landed humans on the moon. And that was back in 1969. And this time, for our next visit to the moon, we are going with international partnership and along with the industry. And this is absolutely the way the interplanetary internet will also be built. And it will advance with the private sector’s involvement from its early stages of development. And we really want to realize a common and open and shared network infrastructure, even in interplanetary space. So, next slide, please. So, one of the examples toward this endeavor, which is an acronym of lunar internet, which is a collaborative architecture and framework to provide communication and also positioning and navigation services for activities on the lunar surface. So, the lunar net will essentially become the foundational infrastructure for us to communicate with the astronauts. and the moon and the infrastructure that we deploy on the lunar surface. And what’s fascinating is that the development is actually moving forward along with the industry, specifically with the recently selected intuitive machines toward this endeavor. Slide please. So in order to build this interplanetary internet in space, we kind of asked ourselves, what are the key governance principles that we need to pay attention to? And what are the lessons we can learn from history of the internet and the evolution of internet governance? The general approach we sought about was to inherit the good lessons and the good DNA that has matured over the long history of the internet to the model of the interplanetary internet. And so next slide please. So our dynamic coalition came up with several key principles that might inform the future of the interplanetary internet. And I would have very familiar language in here, such as having a common way of doing things. We know we need technical approaches like communication protocols and standards to realize interplanetary networking, similar to how TCPIP became the global standard for every transmission on this planet. And open forums, such as the mechanisms we have at the IETF will become a real critical enabler to refine the networking technology. And the hierarchical management, a way in which we manage identifiers like IP addresses and domain names in the internet will also become an important aspect in space networking architectures. And of course, the multi-stakeholder policymaking process, which is probably the most important part that I want to emphasize today is a unique governance model, which is at the heart of internet governance. And to me, this made the internet so successful and sustainable as we know it today. So we consider this as a critical DNA that we want to inherit from the internet toward the longevity and the sustainability of this network infrastructure in space. Next slide, please. So regarding, talking a little bit about the technical aspects, when we’re talking about interplanetary communication, there are two major problems that needs to be solved. Problem number one is that the speed of light is too slow. It takes 20 minutes to send a signal to Mars and another 20 minutes to get a reply back. So you need to compensate somehow with these high delays. And then the second problem is planetary motion. The earth and the moon and the planets always move around. So sometimes we call this orbital mechanics, and that means that a spacecraft can easily hide behind a planet and your communication can be easily disrupted. So TCPIP doesn’t work very well in these scenarios. So these issues needs to be addressed technically. And there’s a technology called the DTN and the bundled particle that Vint just mentioned is one of the particle suites that actually implements this networking technology. And I think you will hear more from my next speaker Samuel on the developments on DTN. And I think I have one more chart and that should be the last. Yes, and I just want to draw your attention to the governance report that we have published last year, which really gives more details in our thinking process and recommendations on how to approach governance in the interplanetary internet. And you can also find a postcard of our dynamic coalition if you go to our booth at the venue. So don’t miss that out as well. And I think I’ll stop here and turn it over to Roberto. Thank you.

Roberto Gaetano: Thank you, Kaneko, also for making my task easier because now Samuel doesn’t need to have any introduction. He will bring us back to earth and explain why people should care about this. And this is not so abstract and far away how it looks. Samuel, you have the floor. Thank you, Roberto. And welcome everyone.

Samo Grasic: Okay, so, yeah, my name is Samuel Graszczyk and I’m currently the lead of the pilot project working group of Interplanetary Special Network Internet Group. And I tell you a bit my slides actually because, I mean, after my experience that I got from the booth, because quite often people are asking, this is, you know, very futuristic. It’s kind of we’re looking really far in the future. Why does this concern me? So I will try to maybe very briefly address this question by maybe just explaining DTN protocol is and what can it do. So I think one of the very important aspect that sometimes I think it’s a bit overlooked when we talk about DTN as a building block for the interplanetary internet, is actually the aspect that this is an overlay protocol, which means that in this case, I would like to illustrate, for instance, we can actually run DTN bundle protocol over today’s internet. We can just use regular links as we do it right now. We can actually, yeah, we can use it for the high speed, high bandwidth links, optical links. So it’s actually quite universal. Of course, we can use it as well for the deep space where we have quite limited resources or limited bandwidth, really high delays, a lot of disruptions. It can handle deep space because it was, yeah, initially designed for. And then I would like to move to a bit more unconventional, maybe links and ways of communication that is there down with a snowmobile and antenna attached to the snowmobile. So this is actually from the project that I work where we actually use the LoRa, not LoRaWAN, but LoRa radio links for a really kind of a long distances, to cover really long distances in northern Sweden where we basically drag the entire network in a very nomadic fashion so people can move this network. And yeah, so this population of Sami reindeer herders has actually adopted the DTN technology and they can actually benefit from it already today. So they can actually track the reindeer and exchange messages with each other, even in areas where they don’t have conventional internet technology. I would like to then go a bit further back in time. The other project we work with actually, with the same population, we actually use the helicopter as a data mule. So we had that kind of small devices. Helicopters were actually flying in and out to these really remote villages that are still today not covered with the conventional internet. And people were able to send messages. Very delayed, it was actually literally maybe six to seven hours of delay for every message we sent, but it’s better than nothing. And then I would kind of like to finish maybe with two maybe a bit more obscure, kind of a transfer of data, for instance, having the USB stick and carry it around or having the large storage devices, it’s actually amazing how much we can actually do. If you put a hard drive, put it on a plane and fly it to another part of the world. So it’s actually a really high bandwidth option. And yeah, DTM bundle protocol can actually handle that. And the last one is just for illustrative purposes. I think we can use DTM over the smoke signal. So we can go back in time. We can actually apply it in action and thinking about developing a smoke modulator that would actually allow us to illustrate that DTM bundle protocol could handle that. And then why is this important? Why is this overlay characteristic so important? So on the top of this slide, you can actually see some of the potential users of this technology. And of course, space industry is one of the first one that comes to mind. As was already mentioned before, mining, it’s surely something that’s gonna be probably actual really soon. And I think this is, I think, a point in time where actually there’s a lot of commercialization happening in space and surely this will be very actual. I mentioned previously this remote areas and all the people that can actually benefit from this. Logistic is one of these. And lastly, maybe for instance, There are a photo of a scientist collecting the data from the probe. So I think, and this is where I think in my personal opinion, I mean, magic happens when it comes to DTN, because we can really seamlessly actually connect any of these users together. So that means, for instance, you know, if you’re a scientist collecting data from the boy somewhere using the USB stick and carrying it, if you apply a bundle protocol, you can actually use it, and for instance, you know, to collect the data from the deep space probe. So in some software that you’re using to collect the data for one thing, you can actually use it from that. So, and if you envision, for instance, you know, how the mining industry might move to the space, as we get more and more commercial actors into it, they will probably not be skilled in deep space communication, and applying DTN for their services already today, they can use them, they can harden them, and then in future, when the time will come, they can actually simply apply this technology in space applications. So this is kind of a brief to how I want benefits of DTN from another perspective. And my next slide is about the pilot project working group, what we do there, how we can join and things like that. So one of the main objective of the pilot project working group is to actually build operational DTN network, actual machines, actual protocols, and actually spread it globally. And it’s actually quite an interesting exercise. It’s actually brought, it actually brings in many issues that maybe was not really kind of seen or foreseen at the beginning, but, you know, it brings different issues from technical, you know, we need to adopt, we need to change the protocols sometimes, or get new mechanisms to, for instance, to get the neighbor discovery, to mitigate some of the bad kind of practices maybe from the building the internet. So we are currently in a stage where we’re kind of, we’re building the kind of second generation of our operational network where we kind of adopt it a bit and develop more mechanisms. And we do kind of cover, I mean, the entire globe, so we kind of encircle it. Just I see some colleagues here, like there is no Saudi, but I think it’s going to appear next week as we will discuss. So and yeah, I mean, all this kind of practice actually came, I mean, forced us to actually develop certain, or actually push some of even the governance issues. For instance, you know, right now we are actually trying to get the IPN, so it’s actually every node in the NTIA network gets its own identifier, and it’s kind of quite analogous to the IP address, but here it’s actually called IPN, so it’s, and for instance, to allocate those, there is a process, because before it was kind of flat space, now we’re trying to find, you know, how we will actually distribute these IPN numbers, and for that we will need to set up administrative authorities, so there’s really a certain governmental issue that needs to be addressed. In the group, actually, if you join the group, you can actually get the free IPN, this number, so if you would want to join, we’re developing, we’re actually adding some services as well to it, so we’re trying different services, adopt the internet services that we know from today, from the internet, and make them compatible so they can actually run more of the DTN. Some of the best projects were, so I mean, this project I mentioned before with the Raining Hearse, there were sensor networks that we’re developing, so DTN has quite a big potential, at least in my personal opinion, in the sensor networks, and especially low power applications, because you don’t need to be online, or you don’t need to have the radius on all the time, if you synchronize this, you can greatly reduce the power consumption. And the main, and the most kind of, the biggest thing, I think, in this group is actually, we’re having regular meetings every, maybe once, twice per month, and I would really kindly like to invite you all to partake in these meetings, especially if you’re more interested in technologies, so, and this group of people that we’re kind of having right now, it’s actually, they’re coming from space industry, from academia, from many different varieties, I mean, different backgrounds, so it’s a really nice environment if you actually want to be kind of introduced to the delay touring networks. So with this, I will hand back the microphone to Alberto, thank you. And that is a physical handing over. The last speaker of this session is Professor Mohamed Slim Maluini, from KAUST, the King Abdullah University for Science and Technology, that is located here in Saudi Arabia, close to Jeddah, and he will talk a little bit about the projects in the university, and some terrestrial applications, mostly focusing on terrestrial applications.

Mohamed Slim Alouini: Thank you, Roberto. Indeed, I think I’m benefiting here from a very nice introduction made by Vin, by Kaneko, and by Samu, I am, as Roberto mentioned, Professor of Electrical and Computer Engineering at King Abdullah University of Science and Technology, KAUST, and I hold UNESCO Chair, focusing on connecting the unconnected. So now you may ask yourself, how does this relate to this session and to interplanetary communication? The fact is, as Samu explained, when you talk about interplanetary communication, just because of the very basic law of physics, you have to deal with delay. The example he gave is an excellent example. Even if you go for light communication, the fastest possible way to communicate, you need 20 minutes to reach Mars, another 20 minutes to get back the signal. So you have to have a 40-minute delay. And the current terrestrial developed networking protocols essentially has to be modified, adapted, upgraded to be able to deal with this delay. Now, how can we take advantage of this, you know, technologies that have been developed for this interplanetary science for terrestrial applications? It can be useful, actually, for very basic problems that we deal with in the Earth to connect some of the unconnected villages. So assuming you have a remote village, a hard-to-reach area, where basically real-time connectivity is not possible, because we don’t have enough funding to have a satellite link, we don’t have a microwave link. Now, can we still have a light version of Internet, a non-real-time version of the Internet? And the solution is yes. One of my PhD students sitting here, Salah, has worked, for example, on how to develop non-real-time, they are called the digital education library. So you can think of schools in these villages who have, let’s say, maybe some of you know about Khan Academy. So Khan Academy, you can download it. You can install it in the village. But of course, Khan Academy is updated on a daily basis. The village may not be updating this database on a daily basis, but can take advantage of like Simon mentioned, some form of transportation system. It can be buses. It can be helicopters. If you are on an island, it can be the ships that visit the island every now and then. And updates of the local network can be done through these mules visiting the island. And here we are using delay-tolerant networking protocols and paradigm to basically make sure that we are getting your local Internet, in this case focusing on education as an example, to basically give access to people in non-real-time. And you see here the synergy for how DTN paradigm that has been already deployed for or developed for integrated science can be used for very basic needs to connect. A second example, and when we talk about connected and unconnected, we are not talking only about connecting people. We are also talking about connecting all kinds of IoT device. Now, in many cases, you don’t have the infrastructure, again, to collect information in real time. It is costly. It’s complex. So let’s assume you are trying to monitor a particular environment for prediction of, let’s say, natural disasters. So you want to throw some IoT device in these hard-to-reach areas, and you need to capitalize on some kind of maybe network from the sky, a CubeSat that basically comes on a periodic fashion. So basically, you have a very small fraction of time where you have visibility or access to this IoT device, and essentially, you will be able to pick that information and update that information. Not real-time information will be obtained, but in many applications, it’s not absolutely needed to be able to collect data and predict events. Now, the third and last example I would like to share with you, and that’s a very nice complement to this session, which is focusing on interoperability science. is the underwater world. So you probably know that Earth is covered 70%, at least 70%. I think 73% of Earth is covered by water. And believe it or not, and the first time I heard about this, I was quite surprised. I was told less than 10% of the underwater world has been discovered. So there is a lot of engineering that has to be done to learn about this underwater world. And of course, communication, underwater communication, is a big part of discovering the underwater world. And here we have, again, physics that comes into play. Why physics? Because actually, to communicate underwater is quite challenging. There are two approaches. There is the optical approach, which is very limited. We are talking about a few hundred meters. High speed, relatively speaking, but only a few hundred meters that basically the range you can get with an optical lens. Or you can use acoustic. Acoustic communication can give you a bigger range. But we are talking only about a few hundred to a couple of thousand meters of range. That’s all. So when you are trying to discover this huge ocean, essentially, you will have to rely also, in many cases, especially for exploration and environment monitoring, to embed in the environment some basically sensors, some actuators, and to visit these sensors through AUVs, through ROVs, through basically underwater submarines, and collect and receive information using delayed torrent network parallel. So that’s another example where DTN, again, can be applied. And just to finalize my kind of intervention here, what are the other related technologies? Often, when you talk about delayed torrent networking and connecting this kind of remote IoT device, energy efficiency is a critical aspect. So sometimes you can have access to solar panel if you are above water, for example, for terrestrial application. And that can be your source of energy. But nonetheless, you may want to be even more energy efficient. So one technology that is very popular in this context is wake-up receiver. So wake-up receiver is when you throw IoT device or sensors in the middle of nowhere, and you want to be in a sleep mode. Essentially, most of the time, they will just collect information on a schedule. And then when the event of communication happens, you have to wake them up, and basically through an acoustic modem that’s underwater, an optical that is underwater, or RF that’s above water, or optical also above water, and then basically wake them up. Sometimes charge them. You can use a laser source or an RF source to charge that device and collect the information that has been basically gathered over weeks or even months if you are visiting that location in a very rare fashion. So DTN is an excellent point. We are borrowing that from the basically entrepreneurial world, but also wireless power transfer and wake-up receiver is another very important technologies in this context. Thank you.

Roberto Gaetano: Thank you, Professor Slim. Before giving the floor for questions, there are two considerations that I would like to make. The first one is it seems that when we are thinking about the Internet world, all what we are doing is to get bigger throughput, faster speed, everything in an instant mode where we are continuously connected, continuously online. And we are probably losing sight of the benefit of using technologies that don’t give instant response and don’t give those big throughputs, but that can better serve specific situations or remote populations that live in underserved areas, solve specific problems that cannot be solved via a bidirectional, immediate connection. And I think that this field has not been explored enough and I would welcome further research in this area and not just in the mainstream Internet. And this is, by the way, what universities like KAUST are doing, what groups are working on. And so that’s the first consideration. The second one is you might wonder, since we are here in the IGF and the IGF is basically about Internet governance, how all this relates to Internet governance. The question is, if I can make a quick parallel between the development of what is now the traditional Internet and these new technologies, is that in the beginning, the Internet was also developed by scientists and was regarding only some niche situation. And then all of a sudden, the commercial importance of the Internet came up and all of a sudden, we sort of woke up and we realized that the governance model for bringing together different interests and develop a framework where every stakeholder has the possibility to present their positions and their needs. And I fear that the same is going to happen with satellite communication, interplanetary network, there’s a lot of satellites, already of commercial interest. And I wonder if in discussing a future asset also in terms of governance of this environment, there are some stakeholder groups that are maybe missing because they will be late in realizing that they have still an interest in how things go. I’m thinking about Internet users that will be the last to realize that they have to do something in order to get into the governance of satellite communication or for other aspects. So this is why we are bringing these themes to the attention of the Internet governance bodies. And that’s why we are here at the IGF to try to start thinking about these things before it’s too late and before having to catch up in a hurry. And I see a hand up from Vint Cerf. And Vint, you have the floor. Thank you very much for that last point, Roberto, about why are we at the IGF. I wanted to reinforce your observation.

Vint Cerf: Also, I wanted to mention that Slim mentioned the use of DTN underwater. We have done some tests probably more than a decade ago using acoustic communications underwater and the DTN protocols, just for your information. The reason that we’re at IGF is because we expect the interplanetary network to be built by multiple parties in the same way that the terrestrial Internet is built by multiple parties. And we have to manage and govern that collaborative effort. It will be similarly needed in the deep space efforts. The other thing which I think is very important is that the commercialization of space exploration and habitation and space use creates an interesting challenge. Those of you who are aware will know that there is an outer space treaty in 1967 which said no one is allowed to own anything off of the Earth. There’s no place to register a mine on the moon, for example. You can own the equipment that you place on the moon, but you’re not allowed to own the property. My guess is that that will become somewhat difficult. And at some point, we’re going to have to be speaking question of ownership and commercialization. The question then will be, where do you register any ownership? How do you resolve disputes? what’s the jurisdiction in which those disputes get resolved. We don’t have good answers to that, but we think the IGF is a good place to raise the questions because that’s where multi-stakeholder deliberations take place. And the internet gives us at least some guidance and experience in solving those problems. So we expect to be a regular feature of the IGF as the rest of the years unfold. Thank you very much. Thank you, Vint, for this contribution. And I surely think that we may, for instance, try to get at least UN or USA involved in the discussion for this question that are also legal on the outer space. Now, may I ask if there are questions from the floor? Kaneko has his hand up, by the way.

Roberto Gaetano: Sorry, I don’t have a turn of the screen. Sorry, Kaneko. So you are the first in line, and then I have other contributions from the floor.

Yosuke Kaneko: Yes, I just wanted to kind of supplement on what Vint just said. And we do have the Outer Space Treaty. It was inaugurated in 1967. What it basically addresses is that all space activities are nation states’ activity, even though it is a private sector’s activity. So that is the current space regime that we live today. But as I mentioned, the lunar surface would become a hodgepodge of multiple stakeholders’ activity. So in the end, we’re just talking about interplanetary internet for now. But I would just urge everyone to think about that the actual lunar surface venue will become a multi-stakeholder activity venue in itself. So the interplanetary internet is just one of the aspects that we are looking at right now. So just want to make a brief comment on that. Thank you, Kaneko. I see we have two questions from the floor. Good afternoon.

Audience: My name is Filipe Santos. I’m here with the Brazilian new program from the Brazilian Internet Stealing Committee, GIDM.

Yosuke Kaneko: And I’m also a software developer.

Audience: And I have been following discussions of internet governance for some time. I had the privilege in attending IGF 2022, where several important topics about digital governance, inclusion, and Swiss and Mili were discussed. Building on those discussions, I would like to bring up some points to connect them with this exciting topic of free interplanetary internet governance. In 2002, a strong focus was placed on addressing digital divides on Earth. Ensure that connectivity reaches undeserving regions. How can apply those lessons to development of interplanetary internet to ensure that its infrastructures and benefits are equitably shared not just among the space-faring nations, but for the collective advancement of humanity?

Vint Cerf: Thank you. Thank you for the question. I think that probably Vint or Kaneko will answer that. Yeah. Go ahead. It’s Vint. Kaneko probably has some answers as well. First of all, the reason that we’re doing this network is first, very pragmatic. We need it in order to run the various spacecraft to gather data back from them and to send commands, but also to link habitats and laboratories on the moon and Mars and possibly the asteroids in the future. So we need that communication system. But we also are doing it in the same spirit as the original internet design, which was intended to be very collaborative. And remember that the information that’s gathered through the Deep Space Network can be made available to everyone on planet Earth on the planet Earth by means of its terrestrial internet. So the theory behind all this is to network everything and provide equal access to shareable information for everyone who could use it. So I’m glad that you brought it up. I think our general view is that the information gathered from space exploration should be available both for scientific reasons and increasingly for commercial reasons. I will say, however, that deep space communication is expensive. It’s not nearly as richly outfitted as the terrestrial internet. And so it may be that there have to be constraints on who has access to the deep space component of the interplanetary internet. I think we’re not ready for 8.2 billion people sending their cat pictures through to Mars, for example. So there will probably be a limited patient who has access directly to the deep space network or the interplanetary network.

Yosuke Kaneko: But its results should be broadly available terrestrially. Kaneko, maybe you have some more elaboration on that. Yes, Kaneko, if you have something to add, may I ask questions and answers to be sure that I have four other people queuing up for questions. OK, I’ll make it quick then. So basically, I completely agree with the comment. There’s going to be these discussions on digital governance in the interplanetary internet. Learn from these histories from back in 2002. And commonality of the infrastructure and equitable access, I think these are really key principles that we need to pursue for the interplanetary internet. And as far as how we can bring the non-spacing space-faring nations into this endeavor is that we have various forums in space. Like the COPIUS is one of them, like the United Nations Committee on Peaceful Uses of Outer Space, where the nation states show up and talk about policies and rulemaking and information sharing. So these could be one of the venues that the non-spacing-faring countries can join. And actually, information can be exchanged and can have access to these common infrastructures. So I think these are steps that we can take for now, as of now. And I think we should advance that in the future. Aouke, you have the floor. Thank you very much.

Audience: Yes, my name is Aouke. I was working for KPMG in the Netherlands. I do really understand the need for a governance of the interplanetary internet. While we’ve seen it in the past, and for sure, we must have a debate about that. However, what I have more difficulty with understanding is how can we make the delay from 40 minutes to a fraction? Is that a possibility? Or is one we have to deal with that? Because I’m a quite impatient person. And I don’t want to wait 40 minutes for my cat’s picture to be sent into space. No, thanks. It’s Vint. You can see Kaneko and I are both laughing.

Vint Cerf: Unfortunately, Dr. Einstein has pretty much prevented us from solving the problem you pose. The speed of light is finite. And as far as we know, we don’t know how to make photons run faster than the speed of light. The consequence of this is that the delay is inescapable. And before you decide that entangled photons will solve the problem, let me tell you that that doesn’t work either. Despite the fact that entanglement may be distance independent, you can’t use that for communication. You can only get correlation out of it. So I’m terribly sorry to tell you that we can’t solve your problem with today’s physics. So can we go to the next question? If you can come here, then you can use one of our microphones.

Audience: Hello. Thank you so much. Excellent presentation. I’m Kanbaro Sainbro from the United Kingdom Foreign Ministry. This is quite new to me, so I’m just soaking it all up. But I’m just wondering what’s on to account the human rights elements of. the sort of future interplanetary internet. Is that something which you think is relevant at this stage? If so, what are the key considerations which you need the multi-stakeholder community to help you on? Thank you. Maybe I can say a word on this. Yes, this is the main reason why we would like to bring this to the attention of the Internet Governance Forum and to the other internet governance organizations so that we can have a debate on this and make sure that the human rights are taken care in the development of a policy. Thank you for the question. Is there any,

Vint Cerf: Will, do you want to take this question as well? Yes, I would. Thank you. Just very briefly, keep in mind that the architecture of the interplanetary network is intentionally open. It’s designed to allow multiple parties to participate, to implement and share resources. However, I want to emphasize that the resources of the deep space network or the interplanetary network will probably be quite limited, at least in the early days. So we have to be very careful not to accidentally assume that human rights means everyone on the planet has access to and the use of, direct use of these assets. Instead, I think we have to make sure that they have access to that is carried to earth through the deep space network, but not necessarily everyone will have direct access to it because of its limited capacity.

Audience: Very short comment from my side as well. It’s like, I think what’s good maybe with the internet, I mean, or interplanetary architectures that by the definition, it’s kind of a distribute. It’s going to be probably very hard to centralize in a way that we centralize internet today. So that’s just, I think one interesting aspect to look into, so. Thank you. Two more questions. And let’s be sure that, I would like to raise them. Okay. Hello everyone. My name is Alan Veloso. I actually work for the Brazilian Space Agency. I’m an international cooperation advisor there. And I’m also part of the youth program from Brazil, from the Brazilian Internet Community. My question would be, actually, it has already been addressed about how do we get other nations to this project? Because if you count, there are only a handful of nations that owns the capacity to develop this project and to participate. So I would like to, if possible, to elaborate more on that, but bringing the international cooperation as a principle to this project, to the five principles that you mentioned before. And also I have a question that maybe it’s more technical related to the sustainability, because we know that some, I think that radio frequencies are a limited resource. So I don’t know if there are some key considerations

Roberto Gaetano: that we must acknowledge on this project while addressing the interplanetary internet. Thank you. Who takes this short question? It’s been, just very quickly.

Vint Cerf: The network is intentionally designed so that multiple parties can implement and operate it. I would also point out to you that the consultative committee on space data systems, unless I’ve missed my guess, is open to partition, even by countries that don’t necessarily already have lift capacity. The other reason that this is getting better is that lift capacity is now commercially available through SpaceX and others. And the consequence of that is that countries that normally would not have space capability now have the potential for participating, either by directly accessing lift capacity from companies like SpaceX and others, or by collaborating with others in order to share that capacity. So between that and the notion of a deep space network, it feels to me like countries that don’t currently have space capability have an opportunity to participate. Regarding your second question about sustainability

Audience: and scarcity of spectrum, indeed, the RF spectrum is more and more scarce, but typically for interplanetary communication, to my best knowledge, what we can go for is free space optics. So basically we’ll be using the optical band of the spectrum, which is plenty of steel, at least of available wavelength and spectrum to use. So I don’t think we have a problem from that perspective for interplanetary communication. Thank you, Slim. Next question. Conoco has to stand up.

Yosuke Kaneko: Yeah, briefly. Just briefly. Just briefly, yeah. Just briefly, I just want to add that on the capacity building part. Please come to ipnsig.org. We have a full repository of how DTN works and what the interplanetary network is, and it’s all free for use. So I think that this is a good source for people to join this endeavor. And regarding the lunar frequency that you’ve just mentioned, there was a resolution at the WRC last year to assess the lunar frequencies. And I think this is going to be a top of the agenda for the upcoming WRC in 27. So just a quick note on that. Thank you, Conoco. So next question. Hello. Okay, thank you very much. All right, thank you very much for that wonderful presentation.

Audience: My name is Kunle Olorundari from Nigeria. I’m a member of a special interest group in the internet society space, so to say. At the same time, I’m the president of Internet Society in Nigeria. And I’ve been following this discussion, this conversation even before now. And I’m happy that we are discussing this even at the level of Internet Governance Forum because I think it’s one of those things that we need to really take a deep look at. And also, I’m happy that the last speaker mentioned the issue of lunar frequency because it’s one of those issues that we’re looking at at WRC, by the way. I’m a member of the 7C agenda, so to say. So my question is this, because I’m so much excited about this discussion and I think probably there may be a way in which some of us will be able to contribute to the pilot projects working group. So I want to find out, if I want to join the pilot project working group, is this something that one can come on board for? Thank you very much.

Roberto Gaetano: Yep, we are- The chairman of the group, I’m sorry, it’s Vin. The chairman of the group is Sam Aoun, so you need to talk to him. Okay, maybe if you can take the answer offline because we are out of question. I will, there are also some cards explanatory of what is our activity that they are in the booth of the dynamic coalitions. We don’t have time for wrap up, so we just- Very quickly, so if you go into the ipnseek.org page and check the project working group, I mean, you can just join in, you can actually partake, it’s open, it’s free. So we welcome everyone, especially, I mean, people interested in the space that would like to get their hands dirty with this technology, so welcome. Thank you, thank you all for coming. We had an almost full room, so thank you for coming and enjoy the rest of the conference. Thank you. Thank you, everyone. Well done, Kaneko and Sam Aoun and Roberto and Slim. Thank you so much. See you on the next one. See you. It’s already taken. I know.

V

Vint Cerf

Speech speed

142 words per minute

Speech length

1533 words

Speech time

645 seconds

Origins and history of interplanetary communication projects

Explanation

Vint Cerf provided a brief history of interplanetary communications, starting from the Deep Space Network in 1964. He explained how the project evolved from early space missions to the current collaborative efforts among multiple space agencies.

Evidence

Deep Space Network built in 1964, Voyager 1 and 2 missions, 1997 Sojourner mission to Mars

Major Discussion Point

Development and Applications of Interplanetary Networks

Need for multi-stakeholder governance model similar to terrestrial Internet

Explanation

Cerf emphasized the importance of governance in the interplanetary internet project, especially as commercialization increases. He stressed the need for a collaborative effort among multiple parties, similar to how the terrestrial Internet is built and governed.

Evidence

Mention of commercial companies like SpaceX and Intuitive Machines pursuing space activities

Major Discussion Point

Governance of Interplanetary Networks

Agreed with

Yosuke Kaneko

Roberto Gaetano

Agreed on

Need for multi-stakeholder governance model

Addressing legal and regulatory challenges of space commercialization

Explanation

Cerf highlighted the challenges posed by the 1967 Outer Space Treaty, which prohibits ownership of celestial bodies. He pointed out the need to address issues of ownership, commercialization, and dispute resolution in space.

Evidence

Reference to the 1967 Outer Space Treaty and its limitations in the context of current space commercialization

Major Discussion Point

Governance of Interplanetary Networks

Y

Yosuke Kaneko

Speech speed

141 words per minute

Speech length

1394 words

Speech time

593 seconds

Technical challenges and solutions for deep space communication

Explanation

Kaneko explained the two major problems in interplanetary communication: the slow speed of light and planetary motion. He introduced the concept of Delay Tolerant Networking (DTN) and bundle protocols as solutions to these challenges.

Evidence

Example of 20-minute delay for Mars communication, mention of DTN and bundle protocols

Major Discussion Point

Development and Applications of Interplanetary Networks

Agreed with

Samo Grasic

Mohamed Slim Alouini

Agreed on

Technical challenges and solutions for deep space communication

Importance of open standards and protocols for interoperability

Explanation

Kaneko emphasized the need for common technical approaches, open forums, and multi-stakeholder policymaking in the development of interplanetary networking. He stressed the importance of inheriting good practices from terrestrial Internet governance.

Evidence

Reference to TCPIP as a global standard, mention of IETF as an open forum

Major Discussion Point

Governance of Interplanetary Networks

Agreed with

Vint Cerf

Roberto Gaetano

Agreed on

Need for multi-stakeholder governance model

Open participation in pilot projects and standards development

Explanation

Kaneko emphasized the openness of the interplanetary network development process. He invited interested parties to join the pilot projects and participate in the development of standards and protocols.

Evidence

Mention of ipnsig.org as a resource for learning about DTN and interplanetary networks

Major Discussion Point

Societal Implications of Interplanetary Networks

S

Samo Grasic

Speech speed

159 words per minute

Speech length

1572 words

Speech time

590 seconds

Terrestrial applications of delay-tolerant networking (DTN) technology

Explanation

Grasic presented various terrestrial applications of DTN technology, demonstrating its versatility beyond space communication. He explained how DTN can be used in remote areas, logistics, and scientific data collection.

Evidence

Examples of DTN use in remote villages, with reindeer herders, and in helicopter data collection

Major Discussion Point

Development and Applications of Interplanetary Networks

Agreed with

Yosuke Kaneko

Mohamed Slim Alouini

Agreed on

Technical challenges and solutions for deep space communication

M

Mohamed Slim Alouini

Speech speed

0 words per minute

Speech length

0 words

Speech time

1 seconds

Underwater applications of DTN for ocean exploration

Explanation

Alouini discussed the potential of DTN technology for underwater communication and exploration. He explained the challenges of underwater communication and how DTN can be applied to discover the largely unexplored underwater world.

Evidence

Mention of limited range of underwater optical and acoustic communication

Major Discussion Point

Development and Applications of Interplanetary Networks

Agreed with

Yosuke Kaneko

Samo Grasic

Agreed on

Technical challenges and solutions for deep space communication

Energy efficiency and wake-up receiver technologies for remote sensors

Explanation

Alouini highlighted the importance of energy efficiency in remote sensing applications using DTN. He introduced the concept of wake-up receivers as a technology to improve energy efficiency in remote IoT devices.

Evidence

Mention of solar panels and wake-up receivers for energy-efficient remote sensing

Major Discussion Point

Technical Aspects of Interplanetary Communication

Use of optical communication to address spectrum scarcity

Explanation

Alouini suggested the use of free space optics and optical band communication for interplanetary communication. He explained that this could help address the issue of RF spectrum scarcity.

Major Discussion Point

Technical Aspects of Interplanetary Communication

R

Roberto Gaetano

Speech speed

95 words per minute

Speech length

980 words

Speech time

613 seconds

Potential for connecting underserved populations on Earth

Explanation

Gaetano highlighted the potential of DTN and related technologies to serve specific situations or remote populations in underserved areas. He emphasized the need for further research in this area beyond mainstream Internet development.

Major Discussion Point

Societal Implications of Interplanetary Networks

Agreed with

Vint Cerf

Yosuke Kaneko

Agreed on

Need for multi-stakeholder governance model

A

Audience

Speech speed

141 words per minute

Speech length

882 words

Speech time

373 seconds

Ensuring equitable access and benefits for non-spacefaring nations

Explanation

An audience member raised the question of how to ensure that the infrastructure and benefits of the interplanetary internet are equitably shared among all nations, not just space-faring ones. This highlights the importance of addressing digital divides in space technology.

Major Discussion Point

Governance of Interplanetary Networks

Importance of considering human rights in network development

Explanation

An audience member inquired about the consideration of human rights elements in the development of the interplanetary internet. This raises the question of how to incorporate human rights principles into the governance and design of space-based networks.

Major Discussion Point

Societal Implications of Interplanetary Networks

Need for international cooperation and capacity building

Explanation

An audience member from the Brazilian Space Agency emphasized the importance of international cooperation in the interplanetary internet project. They questioned how to involve nations with limited space capabilities in the development and governance of the network.

Major Discussion Point

Societal Implications of Interplanetary Networks

Agreements

Agreement Points

Need for multi-stakeholder governance model

Vint Cerf

Yosuke Kaneko

Roberto Gaetano

Need for multi-stakeholder governance model similar to terrestrial Internet

Importance of open standards and protocols for interoperability

Potential for connecting underserved populations on Earth

The speakers agreed on the importance of adopting a multi-stakeholder governance model for the interplanetary internet, similar to the terrestrial Internet, emphasizing open standards and inclusive development.

Technical challenges and solutions for deep space communication

Yosuke Kaneko

Samo Grasic

Mohamed Slim Alouini

Technical challenges and solutions for deep space communication

Terrestrial applications of delay-tolerant networking (DTN) technology

Underwater applications of DTN for ocean exploration

The speakers discussed the technical challenges of deep space communication and agreed on the potential of Delay Tolerant Networking (DTN) as a solution, highlighting its applications in various terrestrial and underwater scenarios.

Similar Viewpoints

Both speakers emphasized the importance of adopting governance models and technical standards similar to those used in the terrestrial Internet for the development of interplanetary networks.

Vint Cerf

Yosuke Kaneko

Need for multi-stakeholder governance model similar to terrestrial Internet

Importance of open standards and protocols for interoperability

Both speakers highlighted the versatility of DTN technology beyond space communication, demonstrating its potential applications in remote terrestrial areas and underwater exploration.

Samo Grasic

Mohamed Slim Alouini

Terrestrial applications of delay-tolerant networking (DTN) technology

Underwater applications of DTN for ocean exploration

Unexpected Consensus

Relevance of interplanetary networks to terrestrial development

Samo Grasic

Mohamed Slim Alouini

Roberto Gaetano

Terrestrial applications of delay-tolerant networking (DTN) technology

Underwater applications of DTN for ocean exploration

Potential for connecting underserved populations on Earth

There was an unexpected consensus on the potential of interplanetary network technologies to address terrestrial development challenges, particularly in connecting underserved populations and exploring remote areas on Earth.

Overall Assessment

Summary

The main areas of agreement included the need for multi-stakeholder governance, the potential of DTN technology for both space and terrestrial applications, and the importance of addressing technical challenges in deep space communication.

Consensus level

There was a high level of consensus among the speakers on the technical aspects and governance needs of interplanetary networks. This consensus suggests a strong foundation for future development and collaboration in this field, but also highlights the need for broader international cooperation and consideration of societal implications.

Differences

Different Viewpoints

Access to deep space network resources

Vint Cerf

Audience

Instead, I think we have to make sure that they have access to that is carried to earth through the deep space network, but not necessarily everyone will have direct access to it because of its limited capacity.

How can apply those lessons to development of interplanetary internet to ensure that its infrastructures and benefits are equitably shared not just among the space-faring nations, but for the collective advancement of humanity?

Vint Cerf emphasized the limited capacity of deep space network resources, suggesting restricted direct access, while an audience member raised concerns about ensuring equitable access for all nations.

Unexpected Differences

Overall Assessment

summary

The main areas of disagreement centered around the balance between open access and resource limitations in deep space networks, as well as the methods for involving non-spacefaring nations in the development process.

difference_level

The level of disagreement among the speakers was relatively low. Most speakers shared similar views on the importance of developing interplanetary networks and the need for inclusive governance. The differences were mainly in the nuances of implementation and resource allocation. This low level of disagreement suggests a generally unified vision for the future of interplanetary networks, which could facilitate smoother development and governance processes.

Partial Agreements

Partial Agreements

All speakers agreed on the importance of open participation in the development of interplanetary networks, but differed in their approaches. Cerf emphasized the network design, Kaneko focused on providing free resources, while an audience member sought direct involvement in pilot projects.

Vint Cerf

Yosuke Kaneko

Audience

The network is intentionally designed so that multiple parties can implement and operate it.

Please come to ipnsig.org. We have a full repository of how DTN works and what the interplanetary network is, and it’s all free for use.

My question is this, because I’m so much excited about this discussion and I think probably there may be a way in which some of us will be able to contribute to the pilot projects working group.

Similar Viewpoints

Both speakers emphasized the importance of adopting governance models and technical standards similar to those used in the terrestrial Internet for the development of interplanetary networks.

Vint Cerf

Yosuke Kaneko

Need for multi-stakeholder governance model similar to terrestrial Internet

Importance of open standards and protocols for interoperability

Both speakers highlighted the versatility of DTN technology beyond space communication, demonstrating its potential applications in remote terrestrial areas and underwater exploration.

Samo Grasic

Mohamed Slim Alouini

Terrestrial applications of delay-tolerant networking (DTN) technology

Underwater applications of DTN for ocean exploration

Takeaways

Key Takeaways

Interplanetary networks are being developed to enable communication for deep space exploration and future space commercialization

Delay-tolerant networking (DTN) technology developed for space has useful terrestrial applications, especially for connecting remote areas

Multi-stakeholder governance models similar to the terrestrial Internet will be needed for interplanetary networks

There are technical challenges like long delays and disruptions that require new protocols and technologies

Ensuring equitable access and benefits for non-spacefaring nations is an important consideration

Resolutions and Action Items

Continue development of DTN and bundle protocols through collaborative efforts

Bring interplanetary network governance discussions to Internet Governance Forum and other relevant bodies

Explore terrestrial applications of DTN technology for connecting underserved areas

Open participation in pilot projects and standards development to interested parties

Unresolved Issues

How to ensure equitable access and benefits for non-spacefaring nations

Legal and regulatory frameworks for space commercialization

Addressing potential human rights concerns in interplanetary network development

Allocation of limited deep space network resources

Spectrum allocation for lunar communications

Suggested Compromises

Limit direct access to deep space network resources while ensuring broad access to data and information on Earth

Use optical communication to address RF spectrum scarcity concerns

Thought Provoking Comments

The reason that we’re at IGF is because we expect the interplanetary network to be built by multiple parties in the same way that the terrestrial Internet is built by multiple parties. And we have to manage and govern that collaborative effort.

speaker

Vint Cerf

reason

This comment provides a crucial link between interplanetary networks and internet governance, explaining why this topic is relevant at IGF.

impact

It shifted the discussion towards governance challenges and the need for multi-stakeholder collaboration in space exploration.

DTN has quite a big potential, at least in my personal opinion, in the sensor networks, and especially low power applications, because you don’t need to be online, or you don’t need to have the radius on all the time, if you synchronize this, you can greatly reduce the power consumption.

speaker

Samo Grasic

reason

This insight highlights practical terrestrial applications of delay-tolerant networking (DTN) technology developed for space.

impact

It broadened the discussion beyond space applications to show how this technology could benefit Earth-based communications in remote areas.

The lunar surface would become a hodgepodge of multiple stakeholders’ activity. So in the end, we’re just talking about interplanetary internet for now. But I would just urge everyone to think about that the actual lunar surface venue will become a multi-stakeholder activity venue in itself.

speaker

Yosuke Kaneko

reason

This comment expands the scope of governance considerations beyond just the interplanetary internet to the broader context of lunar activities.

impact

It prompted participants to consider wider implications of space exploration and commercialization for governance frameworks.

How can we make the delay from 40 minutes to a fraction? Is that a possibility? Or is one we have to deal with that?

speaker

Audience member (Aouke)

reason

This question, while seemingly naive, led to an important clarification about the physical limitations of interplanetary communication.

impact

It allowed Vint Cerf to explain the fundamental constraints of physics that shape interplanetary networking, deepening understanding of the technical challenges.

I’m just wondering what’s on to account the human rights elements of the sort of future interplanetary internet. Is that something which you think is relevant at this stage?

speaker

Audience member (Kanbaro Sainbro)

reason

This question introduced an important ethical dimension to the discussion that had not been previously addressed.

impact

It prompted speakers to consider human rights implications and access issues related to interplanetary networks, broadening the scope of governance considerations.

Overall Assessment

These key comments shaped the discussion by expanding it beyond technical aspects of interplanetary networking to encompass crucial governance, ethical, and practical application considerations. They highlighted the need for multi-stakeholder approaches, consideration of human rights, and the potential for space technologies to benefit terrestrial communications. The discussion evolved from a primarily space-focused conversation to one that drew important parallels with terrestrial internet governance challenges and opportunities.

Follow-up Questions

How can we ensure equitable access to interplanetary internet infrastructure and benefits for non-space-faring nations?

speaker

Filipe Santos

explanation

This is important to address digital divides and ensure the collective advancement of humanity in space exploration.

How can we reduce the 40-minute delay in interplanetary communications?

speaker

Aouke

explanation

This is important for improving the practicality and user experience of interplanetary internet.

What are the key human rights considerations for the future interplanetary internet?

speaker

Kanbaro Sainbro

explanation

This is important to ensure that human rights are protected and considered in the development of interplanetary internet policies.

How can we incorporate international cooperation as a principle in the interplanetary internet project?

speaker

Alan Veloso

explanation

This is important to ensure broader participation and representation in the development of interplanetary internet.

What are the key considerations for sustainability and resource management (e.g., radio frequencies) in the interplanetary internet project?

speaker

Alan Veloso

explanation

This is important to ensure the long-term viability and efficient use of resources in interplanetary communications.

How can individuals join and contribute to the pilot projects working group?

speaker

Kunle Olorundare

explanation

This is important for expanding participation and expertise in the development of interplanetary internet technologies.

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

High-Level Session 2: Transforming Health: Integrating Innovation and Digital Solutions for Global Well-being

High-Level Session 2: Transforming Health: Integrating Innovation and Digital Solutions for Global Well-being

Session at a Glance

Summary

This panel discussion at the 19th IGF 2024 focused on extending digital identity verification to protect internet transactions. The panelists, representing government, technology, and international organizations, explored the concept of a trusted digital identity framework and its key elements. They emphasized that digital identity is a fundamental infrastructure for digital transformation, not just a service.

The discussion highlighted the need to balance enhanced security with user privacy protection. Panelists suggested that clear core principles and values, along with independent oversight, could help manage this balance. They also explored the potential of emerging technologies like blockchain, biometrics, and AI in shaping the future of digital identity verification, while cautioning against over-reliance on new technologies without proper evaluation.

Barriers to international cooperation in developing standardized digital identity systems were addressed, including the digital divide, lack of basic infrastructure in some regions, and the complexity of the digital identity ecosystem. The importance of understanding regional contexts and needs when deploying solutions was stressed.

Panelists called for global collaboration in creating a high-level framework for digital identity, building on existing success stories in areas like international travel and telecommunications. They advocated for a phased approach to implementation, allowing countries to progress at their own pace while encouraging experimentation among those ready to advance.

Key takeaways included the potential of digital identity to accelerate inclusion, the need to protect user privacy, and the importance of investing in digital identity as infrastructure. The discussion concluded by emphasizing that while countries may face different challenges, they share a common goal in developing effective and trusted digital identity systems.

Keypoints

Major discussion points:

– Defining trusted digital identity frameworks and their key elements

– Balancing enhanced security with user privacy protection

– The role of emerging technologies like blockchain and biometrics in digital identity

– Barriers to international cooperation on standardized digital identity systems

The overall purpose of the discussion was to explore the challenges and opportunities in developing trusted digital identity systems on a global scale. The panelists aimed to share insights on creating effective frameworks, leveraging new technologies, and fostering international cooperation.

The tone of the discussion was largely optimistic and forward-looking. Panelists acknowledged challenges but focused on potential solutions and opportunities for progress. There was a sense of urgency about the importance of digital identity systems, balanced with calls for careful, principled approaches. The tone became slightly more pragmatic towards the end when discussing practical barriers to implementation, but remained generally positive about future possibilities.

Speakers

– Shivani Thapa: Moderator

– Prince Bandar bin Abdullah al-Mishari: Assistant Minister of Interior for Technology Affairs, Kingdom of Saudi Arabia

– Emma Theofelus: Minister of Information Communications and Technology, Namibia

– Siim Sikkut: Managing Partner of Digital Nations

– Sangbo Kim: Vice President for Digital Transformation, World Bank

– Kurt Lindqvist: CEO, ICANN

Additional speakers:

– Fatma: Mentioned briefly, no role specified

Full session report

Expanded Summary of IGF 2024 Panel Discussion on Digital Identity Verification

The Internet Governance Forum (IGF) 2024 hosted a panel discussion focused on extending digital identity verification to protect internet transactions. The panel, moderated by Shivani Thapa, brought together experts from government, technology, and international organisations to explore the concept of a trusted digital identity framework and its key elements.

1. Defining Trusted Digital Identity Frameworks

A central theme of the discussion was the definition and importance of trusted digital identity frameworks. Bandar Al-Mishari, Assistant Minister of Interior for Technology Affairs from Saudi Arabia, emphasised that digital identity is not merely a service but fundamental infrastructure for digital transformation. He highlighted Saudi Arabia’s initiatives in this area, including a national digital ID system used for various services.

Emma Theofelus, Minister of Information Communications and Technology from Namibia, stressed the need for frameworks to clearly define roles, responsibilities, and limitations. Kurt Lindqvist, CEO of ICANN, added that trust in digital identity systems involves both technical and human elements, highlighting the complexity of building truly trusted systems. He also noted ICANN’s role in providing infrastructure that could support digital identity systems.

Siim Sikkut, Managing Partner of Digital Nations, emphasised that user adoption and ease of use are key for building trust. Sangbo Kim, Vice President for Digital Transformation at the World Bank, noted that digital identity enables access to essential services, further underlining its importance as infrastructure and a starting point for various services.

2. Balancing Security and Privacy

A significant portion of the discussion focused on the challenge of balancing enhanced security with user privacy protection in digital identity systems. Siim Sikkut proposed that privacy and security can be advanced simultaneously, rather than being balanced against each other.

Emma Theofelus suggested that an independent oversight body could help manage privacy and security concerns, providing a governance-based approach to this challenge. Kurt Lindqvist offered a perspective on how existing technologies like the Domain Name System (DNS) can provide security and stability in identity management.

3. Emerging Technologies in Digital Identity

The panel discussed the role of emerging technologies in digital identity systems. Blockchain technology was mentioned as a potential tool for enhancing user control and privacy options. Biometrics and artificial intelligence were also discussed as technologies that could play significant roles in future digital identity systems.

However, Kurt Lindqvist cautioned that existing technologies like DNS might be sufficient for many identity management needs, sparking a debate on the role of emerging versus established technologies in digital identity systems.

4. Barriers to International Cooperation

The panel identified several barriers to international cooperation on standardised digital identity systems. Sangbo Kim highlighted the lack of connectivity and basic digital ID solutions in many countries, noting that 2.6 billion people still lack internet access and about 1 billion lack any form of legal identification.

Emma Theofelus emphasised the need to understand different regional contexts and needs when developing digital identity solutions. This point was echoed by Siim Sikkut, who noted the differing levels of readiness and priorities across countries.

Bandar Al-Mishari pointed out the lack of a global framework or standards for digital identity, suggesting that international organisations could play a role in developing such standards. He proposed a high-level framework that could be adapted to different national contexts.

5. Key Considerations for the Future

Looking towards the future of digital identity, the panellists offered several key considerations. Siim Sikkut stressed the importance of experimentation and learning by doing, advocating for a practical, phased approach to implementation. He also emphasised the critical importance of usability in digital identity systems.

Emma Theofelus highlighted the potential for digital identity to accelerate inclusion of underserved populations, particularly in regions like Africa. She stressed the importance of understanding regional differences in digital identity implementation.

Sangbo Kim emphasised the need to protect user privacy through decentralisation, while Bandar Al-Mashari reiterated that digital identity, as critical infrastructure, requires significant investment.

Kurt Lindqvist called for an inclusive, phased approach to implementation, allowing countries to progress at their own pace while encouraging experimentation among those ready to advance.

6. Conclusion and Future Directions

The discussion concluded with several key takeaways. Bandar Al-Mishari emphasised the need for a global framework and increased investment in digital identity infrastructure. Emma Theofelus stressed the importance of understanding regional contexts and needs. Siim Sikkut highlighted the need for experimentation and user-centric design. Sangbo Kim underlined the importance of addressing the digital divide and protecting user privacy. Kurt Lindqvist advocated for leveraging existing technologies and adopting a phased approach to implementation.

The panellists agreed that digital identity is crucial infrastructure enabling various services and transactions, including travel and banking. They emphasised the need for trusted frameworks that balance security, privacy, and user adoption. The importance of experimentation and phased implementation was highlighted, along with the critical need to protect user privacy and give users control over their data.

However, several challenges remain, including creating global standards while respecting national sovereignty, bridging the digital divide, and balancing centralised identity management with calls for decentralised, user-controlled systems. The discussion highlighted the complex nature of implementing global digital identity systems and the need to consider various national and regional contexts, providing a foundation for future work in this critical area of digital governance.

Session Transcript

Shivani Thapa: The 19th IGF 2024 it is and it is a matter of great great privilege ladies and gentlemen for me to come in front of you, get on the stage and to get the ambience set for this very very important panel here at the IGF 2024. Thanks to Miss Fatma for this great privilege that I have just been entrusted with. I can see my fellow panelists coming in. I request them to kindly grace us on stage and yes as I turn to my esteemed members in the audience, ladies and gentlemen, yes yes your highness, if you could kindly be seated here. Please join me ladies and gentlemen as I introduce my very distinguished panelist, his highness Prince Bandar bin Abdullah al-Mishari, the Assistant Minister of Interior for Technology Affairs, the Kingdom of Saudi Arabia. A warm welcome to you. We have joining us here at the panel Her Excellency Miss Emma Theofelis, the Minister of Information Communications and Technology Namibia, joined in by Mr. Sangbu Kim, the Vice President for Digital Transformation, the World Bank and we also have joining us in our panel Mr. Curtis Lindquist, CEO ICANN and Mr. Sim Sikud, the Managing Partner of Digital Nations. Thank you so much for gracing us at this very very important occasion. Ladies and gentlemen, today we focus on a very very important topic, a topic of central importance that’s extending digital identity verification to protect internet transactions. Now yes, we all live in an era of online transactions wherein these online transactions certainly underpin everything, everything from global economy, commerce to public services. Therefore, digital identity verification has become the cornerstone of trust in our digital ecosystem. Now, why is this topic even here amidst us here at the IGF? Because this is not merely a technical issue. It is a multidimensional issue that intersects with innovation, governance, human rights, and inclusion, and the list is pretty long. So our session here today is carefully curated for us to reap an overall understanding as to why we need to strengthen the digital identity verification, give us an outline on the global standards and frameworks for identity protection, of course, talk about some best practices that we would certainly be focusing on, and also quickly run through the central element that is the role of international cooperation and multisectoral collaboration, which again is of central importance, as I said. So we are fortunate to have amidst us an esteemed and illustrious members in the panel, and I know that you bring in a very unique set of ideas and expertise from the niches that you come from, and what I would certainly be looking forward to is exploring the synergies between the insights and the perspective that you bring to this forum. Thank you one more time for gracing us. So without further ado, let’s dive in directly to the conversation for which we are here. We will begin with a deceptively very simple question, so to say, yet a very complex one. How do you define our trusted digital identity framework, and what are the key elements that make it effective? Now, this is a blanket question for all our esteemed panelists, but as I pose this question to each one of you, I certainly encourage you to reflect on how your unique role and perspective shape your answer. So, said that, let me begin with Her Excellency, Ms. Emma Theophilus, the Minister of Information, Communications, and Technology from Namibia, whose work connects governance and technology in remarkable ways. So, what does it mean, Your Excellency, to have a trusted digital identity framework, and what are the indispensable elements that make such a framework effective?

Emma Theofelus: Thank you, thank you very much, and I’m very happy to be here at the IGF and discussing this very important topic around digital identity systems and how they relate to a broader digital economy. And I think trusted could have a very broad definition on a system that is dependable, that is trustworthy, and that a system that can carry the systems and processes that require or depend on digital identity. But I think the biggest one I could say is that a trusted digital identity system is one that would ensure it’s clear who does what and when they do it, and what their limitations are. Because I think it’s very important when dealing with frameworks of this nature that it’s very clear who does what, and very clear what the limitations are of that authority or that body. And especially when you go further, when you look into the administration and oversight, who performs the operational functions, such as incident management. change and release management and coordination, fraud prevention, it should be very clear on who does what and when and what their limitations are to ensure that there are no ambiguities in order to trust the particular system. But of course this is all underpinned by legislation that puts out clear guidelines and clear regulations around these systems and frameworks. So I think that’s very important. Thank you.

Shivani Thapa: Thank you, Your Excellency. May I now turn to Mr. Curtis Lindquist from ICANN. From ICANN’s vantage point, Mr. Curtis, where ensuring trust in the Internet is so, so fundamental. How does, I mean, how does the notion of a trusted digital identity align with the broader challenges of governance in a decentralized digital world?

Kurt Lindqvist: Thank you for your question. Let me start with observation. When we talk about trust, or especially trust in identity, it isn’t just a technical concept of trust, it’s also the human element of trust. And the trust in the system, trust that the system works, that it’s safeguarding, that it’s delivering on the promise, why we turn to the identities. And this is irregardless of if this is an individual trying to use this, going about their daily roles or jobs, or whether it’s in a business context. And so when we talk about trusted digital identity frameworks, we need to encompass all this and we need to make sure that the system provides this comfort or the trust element. And ICANN, we have this conversation very much alive, it’s very much ongoing. We, as part of the ICANN ecosystem, with domain names and registration data, a lot of this data is no longer available to the general public. We have GDPR and other requirements. And this is great from a privacy point of view and safeguarding privacy, but it creates an obvious challenge when there are legitimate requests for access, for example from law enforcement. And the question then becomes, when we get these requests, how do we validate or safeguard these requests? The requester is who they say they are. And this isn’t just a theoretical question, we have these discussions with Interpol, Europol and similar organizations. And they have tools that are useful for their purposes and in their context, but they’re not necessarily systems or models that scale to a global level or a global challenge in identity verification. And so that’s one challenge you have to do to create and prove this trust, of course. And on top of that, there’s the operational issues of building these systems. How do you do this at scale but retain the confidence in the system or the trust to the model without driving up costs or complexities that would hinder access or create uneven adaptation or uneven access to a identity system? Because that would be, again, eroding trust in the system. And then we have readiness of technologies and authentication and credential systems are emerging, but it’s still very immature and very early days. So for this to work, and it also can’t work most of the time, digital identity systems It has to work all the time for everyone, otherwise you can erode trust in the system. ICANN’s role in this is that we don’t build identity systems, especially not global ones. That role is for governments or institutions that they designate. Our focus and our role is to safeguard the Internet’s infrastructure, so domain names, IP addresses, that underlines the function of the Internet and provides, as you said, the trust in the Internet and the Internet model. You can think about this as that we provide a smooth road surface for the cars to drive on top of it, to oversimplify perhaps a little bit, but that’s very much our role. But the ICANN community has a unique role they can play in this. It’s a space where stakeholders from across all of these spectrums, civil society, business, the technical sector, technical community and civil society can all come together, form policies and discuss them, and create globally applicable standards. So this is something that we work very much on. ICANN has developed something called the Registration Data Request Service, which is a way to handle this registration data I talked about, and how you can provide this in a safe and secure manner. So that’s something that we see as our foundational role, ensuring the Internet is stable, secure, and without that you can’t build any trust in the higher layer systems. So that’s what we are very much focused on working on.

Shivani Thapa: Right. Thank you. Thank you, Mr. Curtis. Yeah. We’re here talking about technological reliability and then the user confidence, and when there’s a blend of both of these, this becomes very, very tricky. And we understand the problems are not the same everywhere. There are large communities that are still transitioning into the digital age, and we all really need to instill that trust again. That’s again another part of the entire scenario. Of course, I’m sure we certainly will venture on this later in the conversation. Allow me now to turn to His Highness Prince Bandar bin Abdullah Al-Mashari. Your Highness, the Kingdom of Saudi Arabia has been at the forefront of technological innovation. The world certainly is at awe and keeping a watch at the advancement and how you embrace into the digital world. Right. So what is your take on the trust that we’re talking about?

Bandar Al-Mashari : First of all, let me thank the forum for inviting me to participate in this important panel. Let me start with saying that digital identity is not a service, it’s an infrastructure. It’s an infrastructure for digital transformation, digital transactions between individuals, between entities, business and governments. Therefore, it’s as important as any other infrastructure. It has to be secure, it has to be regulated, it has to be trusted. In Saudi Arabia, we started a long time ago with building the ID or identity in the physical world. We issued the digital cards with SIM cards which stores the biometrics and the numbers and the name and the birth date. Long time ago, 45 years ago, we established what we call the unified national number where each citizen or resident has a unique number where we tie all the information for identity with that number. This managed us to expand to the next level which is the digital identity. Back to your question, trust is a broad word. It means a lot of angles. It has to be trusted in terms of the identity itself since the creation of the identity has to reflect the identity of the person himself with a high trust from the users. Trust means from the user itself, from the identity holder, he has to trust that his identity, his digital identity is going to help him to access all information. everywhere, anytime, across the border, etc. So the trust doesn’t mean only secure and private. It doesn’t mean that it’s protected from invasion or impersonation. It means more than this. It means more business. It enables that the identity holder to use it for digital transactions. Framework. Framework means ecosystem which covers legal, governance, infrastructure, technical options, etc. Of course in different countries there are different frameworks. In Saudi Arabia, thanks to God, we started a long time ago with the identity itself, the physical identity, and when we came to the digital identity we just upgraded the framework. So we are not creating a new framework. It’s an extension to the framework of the physical or card-based identity. As far as identity, we consider identity to be the identity of individual, the identity of entities, business, government entities, NGOs entities. So we have to cover all types of objects, persons, identities, and nowadays we are talking about Internet of Things, digital identity. So trusted digital identity framework is a combination of four words that means a lot. It means trusted infrastructure for digital transformation.

Shivani Thapa: That is so beautifully put and I believe certainly it’s not a service, it’s an infrastructure. I think that adds a lot of value and meaning to how you’re going to sketch or carve the way forward. And certainly in this very essence I’m sure there will be a lot of lessons from the initiatives that are underway here in Saudi Arabia, in Riyadh for the IGF participants. to see as well and for to help guide us the creations that they would want to embrace In the near future. Thank you. Thank you your highness. We are now move on to mr. Sim sick with what is your take on this? well

Siim Sikkut : Going back to my own background from Estonia I had the privilege of serving the government and now we advise other governments that we clearly see one thing Digital identity is just a key So you talk about trust in digital entities and so forth We have to talk about two things one is to trust in the key does that work and secondly? But how is the usage of that key? And how is that secure and trusted? So from from my perspective and we really had to build a lot and we now see the current countries have to build a lot The whole rest of the components around it just like his highness said I mean the framework is actually much wider than that For example elements like personal data management Or how can users have control and consent start to matter so much more for that to be trust in digital identity? even the key itself and and with that in mind What I see is an element that we really have to think about when we talk about Trust in digital identity things is are the users using it? Ultimately, it’s trusted if users are using it and there’s two elements in that Yes, we have to build obviously the frameworks that you know make sure that this reliable etc But at the same time we cannot forget the usability side of things So how to make it work how to make sure that you know people will be using it We have to build this trust safeguards in a way that actually it’s easy to use them That’s no extra effort for example that I have to go through to make sure that now my transaction can be trusted. That’s easy If it’s easy people will use it then trust is really there and then identity and all the impacts are there

Shivani Thapa: Coming to mr. Kim mr. Kim the World Bank operates at the intersection of global development and technology How do you define this trusted digital identity framework, and how do you distil the elements that make them effective?

Sangbo Kim: As other panelists already provided a lot of good insights for the digital identity, I would like to add some more point that digital identity, as many people said, it is fundamental infrastructure. But at the same time, it is just how we encourage our people to use the digital service more frequently, more comfortably, and in a safe way. So it is a matter, if we can just keep, you know, secure the data protections through the digital ID and, you know, save some space so that people can trust the system, maybe we can encourage the people to use more the digital services. So that’s one point. On the other hand, actually, it is very beginning, starting point for the every services. If you see another commercial services in many, provided by many, you know, global company and some tech company, you know, sign-up process is the starting point to, you know, register your identity or account, username and password is the starting point. Actually, digital identity is beyond that, much complicated system, but anyhow, know your customer and know your people from the government services is the starting point. That can, you know, provide through the identity, we can provide the social protection services, you know, financial services, so many government services, much easily through. this ID system, I think.

Shivani Thapa: Thank you, thank you. What a rich start to our discussion already, and thank you all. Now, while we understand what constitutes our trust framework, let us head on to address the tightrope walk that every nation is having to face, that’s balancing enhanced security with the protection of user privacy. My second question would be in this regard, and I would want to begin with Mr. Simsekud. How can we balance the need for enhanced security with protecting user privacy and avoiding over-surveillance?

Siim Sikkut : Well, to me, and not just theoretically, but in practice, it really starts from that I would move away from talking about balancing. They both can be advanced at the same time, as a lot of experience and practice has shown. So it’s not a question of one or the other, how do we advance both? And the beginning point, as with any transformation, is to say that, but let’s really define a certain core principles we will always adhere to. For example, I would be willing to make an argument that if we really want to have trust there for digital identity, people ultimately, for example, want to have control and assurance of privacy. Perhaps, based on the values, if we define those principles that should always be held, then we have a chance of actually thinking, okay, how can now we do security within those confines based on these values and so forth? So it’s not a balancing act, it’s defining what are the things we will always observe and then figuring out how do we do the rest around it. For example, security in a way that privacy is kept. Going beyond that into practical stuff, there’s several things that have worked. I mean, things you can look technologically. I mean, that is, for example, one of the really strong arguments for distributed systems, for data sharing, et cetera. But practically speaking, really going through this exercise of, yeah, principle-based approach is really… really what helps to solve this. And lastly, why this principle space matters is the devil is always in the details, as they say, right? So which means that the dilemma often occurs at the operational and technical level. So on the down the line, techies like system administrations have to make this call, right? Again, for them, it’s so much easier if there’s a clear base of what are the principles we will not steer away from, clearly set from the start.

Shivani Thapa: Let me come to Minister Theofilus. What would be your take on this, especially in the light that privacy concerns can be particularly acute in regions, successfully with limited data protections?

Emma Theofelus: Definitely, and I think I’m leaning towards what Sim has said. I think with clear core principles of values on what the data is to be used for, for each individual user, becomes easier on what parameters to keep within the administration of a digital identity system. But there’s also a school of thought around perhaps an oversight, independent body or authority, to be able to manage the system, to ensure that the data of the users is used particularly for what it was meant to do, and that there’s no trespassing or going beyond and above the authority of the data processor. So I think perhaps around having an oversight authority would be perhaps one of the practical ways to ensure that the system is officially managed and administered, and that there would be no need to have competing interests. I think the balancing act can be carried forward by both keeping the privacy of the user and ensuring that there’s no trespassing around the rights of those users and their data on the system.

Shivani Thapa: Well, thank you. security and privacy certainly are two sides of the same coin and yet constantly in conflict so this can be tricky but that’s been pretty optimistic from your side. Now let’s shift our gears from today to look into the future. Emerging technologies such as blockchain and biometrics that’s what is the food for our I mean like third discourse. These as you all know is redefining the digital identity space at the moment but how can we leverage these advancement without falling prey to their hype and risks. I think this has been a very very burning question or rather concern at all tiers and among all these stakeholders. Now let’s hear from our panelists you’ll have some three minutes each to answer this question beginning with his highness Prince Bandar bin Abdullah Al Misari. With emerging technologies like blockchain and biometrics what do you see as the future of a digital identity verification?

Bandar Al-Mashari : Of course as the wave of technologies comes around it brings with it with itself the challenges and the opportunities. For biometrics it’s available since long time ago and we are using biometrics maybe more than 15 years ago to identify persons and individuals, face, fingerprint, DNA for in special cases, voice in special cases, iris, all are these full biometrics are utilized since we started the digital ID initiative or the ID initiative in fact. For blockchain it’s also around since the web 3 motion or wave which started maybe more than eight years ago And it came after Web 2.0 wave, and then the necessity for more trusted internet brought what we call blockchain. And it started with the Bitcoin, and then it generalized itself by the blockchain. Blockchain, in a nutshell, it’s an option to replace the database or the central database with distributed ledger, or in a simple word, with distributed identity that controlled mainly by the identity holder himself. It cannot be changed, it cannot be forged, he can allow any other user to use the credentials of his identity. But at the end, it needs identity issuer, identity holder, identity user. So it’s going to solve a problem in some societies who are sensitive to the concept of central database for identity. Of course, it provides more secure, more privacy, more control by the identity holder. What is the future or what opportunities? Of course, it will add more options for any country or society or an individual who weigh the privacy more than any other thing else. Of course, security is part of that. However, it should be evaluated in terms of accessibility, in terms of ease of use, in terms of cost. All these aspects has to be assessed in order to weigh the value of using blockchain in identity. Specifically, blockchain can be utilized efficiently in identity management, not identity issuing or identity, I’m sorry, for identity access management, not for identity issuing or identity management. What I mean by that is that blockchain can be used in a variety of ways. need by identity issuing is to create the identity itself. You have to create it outside the blockchain. Then you put it in the blockchain. You have to manage the identity in terms of updating the identity, stopping the identity, re-initiating the identity, et cetera. These are the surfaces around the identity. This has to be done maybe within the blockchain or outside the blockchain. So biometrics, blockchain, I may add AI also. AI is going to add more opportunities to protect the identity or create new models of identity. So as technology progress and the business models progress, we will have more options. And hopefully, this will give more options to other countries, societies, individuals to start the digital identity as a basic right for each individual in the world. As you know, in the UN, there is sustainability goals. And one of them is to provide access to the digital services. Without these options that offer itself as a cure for some concerns in some society, we will not be able to achieve this goal. So hopefully, these technologies, biometric and blockchain, AI, BKI, all of them will add more options to the digital identity infrastructure. And we’ll see one day more than 90% of the planet people here in the planet are having the digital identity, are enabled to access health care, education, opening bank accounts, et cetera. And this will add a lot of value to the economy of each world, each society, each individual.

Shivani Thapa: Thank you. May I now turn to Mr. Curtis? Please feel free. free to add on to what has just been said, while answering that, you know, how we’ve been hailing the revolutionary technology for digital trust, blockchain, which we’ve been hailing for its revolutionary power. Now, is it the panacea often made out to be, or are there any blind spots that needs to be addressed?

Kurt Lindqvist: I’m trying to pick up, I don’t want to follow on to what His Highness just said about blockchain. I think it’s one thing that’s worth reiterating, is that blockchain has some fantastic characteristics, but one of them is that you can’t revoke what’s in there. And if you lose a key, you might not be able to access this, you lose the access to the identity again. And having this recovery of identity is quite an important part of any identity system, right? And I think there might be many systems in this that you can build on. I think, from the organization I represent, talking slightly in my own interest, that there are also existing technologies, right, that will provide very similar, or maybe even better characteristics. The main name system, the DNS, has a hierarchical structure. We are seeing how this is being used for identity management in, for example, social media platforms like BlueSky, who uses this as a way to verify the identity of the users. The Internet Engineering Task Force, that defines all the standards and the technologies that have been in the internet, are working to add the new fields and parameters to this structure to actually use it for identity verification and management. So I think that we like to talk about, actually, going back to your question, we like to talk about future technologies as that they have to be. something brand new and shiny but sometimes the new technologies can also be built inside the context of what we have or built on what we have to deliver maybe perhaps a more stable and Expanded Functionality where we are today, but without going through a lot of unknowns as we have today And I think that’s worth keeping in mind when we talk about the future technologies to enable building secure inclusive access and stability

Shivani Thapa: Mr.. Stickwood eager to know what would you like to add to this conversation? well

Siim Sikkut : Well first of all obviously it’s important to experiment right constantly keep trying things out in a way, and and if you look at emerging Technologies side of things I’m very much with his highness in a sense that AI is probably the biggest impact Especially given our topic here. How do you ensure trust in these frameworks? so from defense point of view as well as of novel ways to really live doing that but if you talk about the goal of having an entity for everyone globally I Think even some ways trying to think too much about emerging technologies like at this service So much proven technology already out there just need to get that out scale that on board people and That does the trick and then we talk about next stages of evolution with next technology and so forth

Shivani Thapa: Mm-hmm Okay, so we’ve explored the what and how in trying to understand the landscape and then the experts point of view How we are looking at the future of the internet that we want as now let us now address the where? Question where the barriers lie and where the international cooperation can make a big difference May I turn to mr. Sun Kim with the plethora of experience that you and the entity that you represent I think you would be the right person to begin as to what are the key barriers to international cooperation in developing standardized digital identity systems? And how do you think these barriers can be addressed?

Sangbo Kim: Two barriers I would like to say today. One is still we are struggling with lack of connectivity and lack of basic digital ID solutions. From the internet connectivity point of view, we are still struggling with 2.6 billion people so no access to the internet. That’s huge. On the other hand, 3.3 billion people in the world are living in a country where there are no ID solutions and data sharing mechanisms. And even 850 million people are not recognized by the government. So they have no physical identity at all. So this is a very fundamental issue. So still we are really struggling with a digital divide across the developing country and the developed country. So that’s a huge challenge. So we need to invest more in the fundamental infrastructure. At the same time, it is really a complicated ecosystem. Not only government, but also many private sector, big tech, and some identity dedicated in a special technology. The startups and many companies should follow the trend. And people need to understand how to use this and needs to get trained. And some participation by the academia and also from the NGO are very crucial for the success of this, building the ecosystem. It is very complicated. complicated ecosystems too. So the leadership is the key to bring the all the, you know, digital ID solution across many stakeholders. So and also international collaboration are another key to, you know, enhance the regional, you know, interoperable services across the cross-border. So many collaboration and leadership are the key solutions for the big challenge of the complication of a digital ID.

Shivani Thapa: Of course cooperation is key and central, but then even after having realized what the scenario is and what needs to be done, things are very very difficult in the ground and in practical life. So how do you go to this scenario, Your Excellency Minister Theodosius? Yes, thank you.

Emma Theofelus: Yeah, I fully agree that cooperation and collaboration definitely would go a long way. Notwithstanding the barriers as indicated earlier, I think there also needs to be a better understanding of the various contexts of the different regions and the solutions to address some of those barriers and challenges. So if we don’t understand the existing barriers of a particular region or area, the solutions around digital identity might necessarily not work for that particular region. So for example, the African region would have a completely different context to the MENA region or to the North American region or to the European region. And if we want to then try to deploy solutions that would necessarily work for Europe, it doesn’t mean necessarily that it will work for the context of the needs of the African region. So better understanding the needs of every region around digital identity. and access, I think, is quite important, and then we can take it up from there. Because with collaboration and cooperation, you must understand the context, and the solutions must then be able to be applied on the various needs of a particular region or area. And I think thereafter, we can better cooperate, and we can better deal with the barriers, if possible, one by one, to ensure that we reach a particular standardized digital identity system or framework that takes care of the entire context, and that ensures that we are able to deploy the solutions needed. Thank you.

Shivani Thapa: Thank you, Your Excellency. May I turn to His Highness one more time? What would be your perspective on these cooperation barriers? At the same time, Saudi Arabia’s initiatives have been deeply rooted in collaboration. Could you also share with us some lessons that can be drawn to inspire global partnerships in the context that we are deliberating now?

Bandar Al-Mashari : What will stimulate the international cooperation and make it stronger than what we have right now is to have an honor for the global digital identity framework. Maybe UN, maybe ITU, maybe someone else, maybe a combination of all these entities has to come forward in a clear responsibility to bring all bodies, all countries, at least the advanced countries, to build such a framework, not as a detailed one, but a high-level one. Since the framework has to come to fill the gaps, not to interfere with specific countries’ laws inside the laws or the culture or the definition of privacy in each society. It has to focus on the gaps in the global level. As far as the challenges, we have a challenge to extend the current success story. We have right now success stories in the travel business. As everyone knows, you travel from a country to a country with a passport, and this passport is a standardized document. There is an international body which is called the International Civil Aviation Organization, and all passports between all countries are used in a standard way. They have standard information. Right now, we are most of the countries moving to the digital passport. So we are very close from global digital identity. We have to focus on the digital passport, the international standard of the digital passport, and extend it to be an option for global digital identity. On the other hand, we have such a story in the roaming services, in the telecommunication, with the GSM. Everyone, when he travels from a country to a country, he can use his mobile in the other country. So by the same token, we can generalize our digital identity to when you travel from a country to a country, you can just activate certain credentials. And the digital identity that you have in your country might be extended as a trusted digital identity in another country. So we have such stories in other fields that we should also focus on and extend it a little bit without interfering with the detailed culture of each country. In Saudi Arabia, we have mature digital identity, thanks to God. We are approaching by way soon the 28 million, which is more than 85% of the population. The left, maybe, from the population are the children and the young people, or those who don’t have any services. So going to the success story in each country, and building on each success story to extend it to another country, is going to expand, also overcome the obstacles. So we have a lot of ingredients. To me, we are not far from the global digital identity. We are very close to that achievement, inshallah.

Shivani Thapa: May I now turn to Mr. Simsekud. We’ve talked about global standards. in practice, that’s quite an optimistic view to build up on, but global standards often face resistance due to local nuances. How can nations strike a balance between alignment and sovereignty for the very concern that His Highness just raised.

Siim Sikkut : Well, I’m not really going to answer you, for good reason. What we have seen, and I come from European context, mind you. In European context, we used to work, and even a small Estonia, we tried steering exactly these things on a European Union level, bringing identities to be mutually usable, exchanging data across the borders and so forth. All the other aspects, including the ones that have been voiced here, can be summed up to basically the challenge is alignment of readiness. Alignment of readiness. You have different priorities of different maturity, you have different sort of, you know, cultural context, you have different connectivity, the readiness is different. And we have to be practical about it and pragmatic about that, even all the way to the point that where I would still say, for example, today, I would be even willing to argue that it’s still too early to have, let’s say, a global standardization or framework effort. Most countries are not ready for this. Look, most of these countries also have teams that are tiny. If you make these people now work on global stuff, they don’t have time to work on domestic things. Really building up, implementing, adopting, scaling identities in the countries, we should come first. But, again, going back to learning from, for example, how did we get things going in Europe? We had the same alignment issue. It’s okay if there are different tracks and sort of a two-tracked approach. Those who are still not ready, let’s give them time and support and everything to get ready. Those who are ready, and there’s more and more of those countries, starting from Saudi Arabia, for example, right? Let’s really allow them to start experimenting, start trying, playing, figuring out these frameworks. Also, for the… reasons that then does practice to then look at in terms of what could work on a international, global or whatever level. And I really want to say this that again very much my own and the Stonian approach has been to say that let’s not debate before we try it out. In standardization effort there’s so much talk about trying to regulate and debate and standardize ahead of time. People don’t know what they’re talking about, they’ve never seen the elephant, they’re talking about elephant. Let’s start trying, experimenting with those who are ready and then we can scale when others are ready more as well.

Shivani Thapa: All right, coming to Mr. Curtis, just building on this very statement that Mr. Sim just built on, ICAN operates as a global steward on internet governance. How do you navigate differing national priorities while advancing collaborative solutions?

Kurt Lindqvist: I think as was said by the panelists before is that, actually just what we just said is that the national priorities are what they are, right? You know, I think you’re gonna have to have respect for them and they have to move forward in the pace they can do. You can of course incentivize those priorities and I think I’m gonna come back to something that Rikson said is that when we define these frameworks and we define the solutions, I think it’s important that they become actually universally implementable if you want, so that we don’t come up with very complicated technological solutions or frameworks, become so expensive or burdensome to implement that you start leaving regions or communities or users out of them. And as we come back to this is that the priorities has to be that you have to adopt this readiness and it can be a phased approach and this can be on a nation level, on a regional level, user application level, what it may be, but it has to be some sort of phased approach that becomes inclusive and enables everyone to follow in this and I think that should be the priority, to have this enablement and as you said, you know, we have to be… a phased approach to it, not wait for everyone to join at the same time because they will never get there.

Shivani Thapa: Well, I believe it’s been quite an enriching and incredible discussion from this very esteemed panel. Before we conclude, let me turn back to our panellists, if you could share a thought on the key takeaways or something maybe we’ve missed to make a statement on this very important topic. I think we would be running out of time, but I could extend at least a minute to each of the panellists. May we begin from Mr. Sekut?

Siim Sikkut : Well, to be really short, I would really want to emphasise perhaps two things here. As we started talking about what is the sort of how to build trust and what is a trusted framework and my whole point was it’s more than just the key, it’s the whole thing around it, the policies, and fundamentally, technology is the easy part in any sort of digital transformation. How we transform ourselves, we have to do proper change management for that. And that takes me to the key point, what is the biggest challenge is build up the leadership and the capability and the governance for that. That’s what I really believe we all should be investing more into all the way from within countries to donors and internationally. Secondly, just going to the last point, even if yes, everyone’s not ready, let’s experiment more, let’s try more, let’s start thinking about how to really build something like a global framework at some point. Even if not everyone’s ready, experimentation is the way to start.

Shivani Thapa: All right, Mr. Curtis?

Kurt Lindqvist: Well, to build on the same thing, I think, you know, let’s remember that digital identity is as much about people as it is about systems and tools and technologies. Make sure that they become inclusive on all layers and in all intersections so that it actually becomes usable. And I very much agree with this, let’s experiment and try so that we get some experience and we can actually build around those pitfalls.

Shivani Thapa: Yeah, Mr. Kim?

Sangbo Kim: I would like to highlight the decentralization feature of the digital ID, so many advanced the privacy of the users. And many countries are now giving back the right of control of the user privacy and private data. So it is really important to protect the privacy. It’s very important. At the same time, I would like to highlight that we don’t need always just every full spec of ID in the central country. We need to protect the privacy of the users. So in order to secure the authentication process or verification process, only just a small piece of the information will be more than enough.

Emma Theofelus: So we should be cautious about that privacy factors. I think a key takeaway for me would be that with digital identity, we can accelerate the inclusion of many people who might have been left behind. So, for example, if you look at the number of people who have been left behind, it’s a huge difference for the government services or the ability to transact, and especially for a region where I come from, like Africa, which continues to have some of those gaps, and that, secondly, I think there is a lot of room to collaborate and to peer-learn from those that have gone before and experimented, like Mr. Sim said, and have done some few successes, so that we

Bandar Al-Mashari : can build on the success story in the digital identity, and also in the digital identity, and also in the digital identity, and also in the digital identity, first of all, build on the success story in travel, banking, telecommunication, global cooperation. Second, consider the digital identity as an infrastructure. Therefore, invest, and I can say invest less to get more. They have their jobs, their salaries, with these jobs, it can be very difficult. Looking in the future, their job area, their economy, their status, their education, their healthcare, the Covid-19 is the proof for that. Thank you.

Shivani Thapa: are forming the backbone of global commerce and connectivity already. So this is not something that we limited to our desires, but something that has become imperative and of paramount importance. So as I read from our esteemed panelists, certainly we might be in different boats dealing with our different realities, having a different degree of will. However, the direction that we’re headed and the destination certainly is the same. And then there are so many we already have achieved, which can be opportunities or doors of opportunities, which we’ve already worked on, and that can be built on to work for the future that we all mutually desire for. I think that was in essence what this forum had to give away to the IGF 2024. And I would want to take a moment on thanking on behalf of the IGF and the host of partners that have set up this very, very important coming together here in Riyadh, especially to our panelists for gracing us and extending your valuable time, thoughts, and experience to this panel. And said that, I also rest the microphone. That’s all from this panel. Thank you. Thank you. Thank you. Thank you.

B

Bandar Al-Mashari

Speech speed

0 words per minute

Speech length

0 words

Speech time

1 seconds

Digital identity is fundamental infrastructure, not just a service

Explanation

Digital identity is viewed as essential infrastructure for digital transformation, enabling transactions between individuals, businesses, and governments. It is not merely a service, but a foundational element that requires security, regulation, and trust.

Evidence

Saudi Arabia’s long-term approach to building physical and digital identity systems over 45 years

Major Discussion Point

Defining a trusted digital identity framework

Agreed with

Sangbo Kim

Agreed on

Digital identity as fundamental infrastructure

Framework should encompass legal, governance, and technical aspects

Explanation

A trusted digital identity framework must cover various aspects including legal, governance, infrastructure, and technical options. It should be comprehensive while respecting different countries’ laws, cultures, and definitions of privacy.

Evidence

Saudi Arabia’s experience in upgrading their physical identity framework to a digital one

Major Discussion Point

Defining a trusted digital identity framework

Agreed with

Emma Theofelus

Agreed on

Need for clear frameworks and governance

Blockchain offers more user control and privacy options

Explanation

Blockchain technology provides options for replacing central databases with distributed ledgers, giving identity holders more control over their data. It offers increased security, privacy, and user control, but should be evaluated in terms of accessibility, ease of use, and cost.

Evidence

Discussion of blockchain’s potential in identity management and access management

Major Discussion Point

Balancing security and privacy

Agreed with

Siim Sikkut

Sangbo Kim

Agreed on

Importance of user privacy and control

Differed with

Kurt Lindqvist

Differed on

Role of blockchain in digital identity systems

Lack of global framework or standards for digital identity

Explanation

There is a need for a global digital identity framework, possibly overseen by international organizations like the UN or ITU. This framework should focus on filling gaps at the global level without interfering with specific countries’ laws or cultural definitions of privacy.

Evidence

Success stories in travel business with standardized passports and international roaming in telecommunications

Major Discussion Point

Barriers to international cooperation on digital identity

Differed with

Siim Sikkut

Differed on

Approach to global standardization of digital identity systems

Digital identity as critical infrastructure requires investment

Explanation

Digital identity should be considered as critical infrastructure, requiring investment for its development and implementation. The speaker emphasizes that investing in digital identity can yield significant returns in various sectors of society and the economy.

Major Discussion Point

Key considerations for the future of digital identity

E

Emma Theofelus

Speech speed

151 words per minute

Speech length

778 words

Speech time

307 seconds

Framework must clearly define roles, responsibilities and limitations

Explanation

A trusted digital identity system should clearly outline who does what, when they do it, and what their limitations are. This clarity is crucial for ensuring trust in the system and avoiding ambiguities in operational functions.

Evidence

Examples of operational functions such as incident management, change and release management, coordination, and fraud prevention

Major Discussion Point

Defining a trusted digital identity framework

Agreed with

Bandar Al-Mashari

Agreed on

Need for clear frameworks and governance

Independent oversight body can help manage privacy and security

Explanation

An independent oversight body or authority could be established to manage the digital identity system. This body would ensure that user data is used only for its intended purposes and prevent any misuse or overreach by data processors.

Major Discussion Point

Balancing security and privacy

Need to understand different regional contexts and needs

Explanation

Different regions have varying contexts and needs when it comes to digital identity solutions. Understanding these differences is crucial for developing effective solutions that address the specific barriers and challenges of each region.

Evidence

Comparison of different contexts in African, MENA, North American, and European regions

Major Discussion Point

Barriers to international cooperation on digital identity

Digital identity can accelerate inclusion of underserved populations

Explanation

Digital identity systems have the potential to accelerate the inclusion of people who have been left behind in terms of access to government services and ability to transact. This is particularly important for regions like Africa that continue to have significant gaps in digital inclusion.

Major Discussion Point

Key considerations for the future of digital identity

S

Siim Sikkut

Speech speed

0 words per minute

Speech length

0 words

Speech time

1 seconds

User adoption and ease of use are key for trust

Explanation

Trust in digital identity systems is ultimately determined by user adoption and usage. It’s crucial to build trust safeguards in a way that makes the system easy to use, without requiring extra effort from users to ensure transaction security.

Major Discussion Point

Defining a trusted digital identity framework

Agreed with

Bandar Al-Mashari

Sangbo Kim

Agreed on

Importance of user privacy and control

Privacy and security can be advanced simultaneously, not balanced against each other

Explanation

The speaker argues against the notion of balancing privacy and security, suggesting that both can be advanced simultaneously. This approach involves defining core principles that should always be adhered to, and then figuring out how to implement security measures within those confines.

Evidence

Suggestion of a principle-based approach and the use of distributed systems for data sharing

Major Discussion Point

Balancing security and privacy

Differing levels of readiness and priorities across countries

Explanation

Countries have different levels of readiness and priorities when it comes to digital identity systems. This creates challenges in aligning efforts for international cooperation and standardization.

Evidence

Example of European context where countries had different priorities and maturity levels

Major Discussion Point

Barriers to international cooperation on digital identity

Differed with

Bandar Al-Mashari

Differed on

Approach to global standardization of digital identity systems

Importance of experimentation and learning by doing

Explanation

The speaker emphasizes the importance of experimentation and practical implementation over theoretical debates. He suggests that countries that are ready should start experimenting and trying out digital identity systems, which can then inform future global frameworks.

Evidence

Reference to Estonia’s approach of trying things out before extensive debate

Major Discussion Point

Key considerations for the future of digital identity

S

Sangbo Kim

Speech speed

123 words per minute

Speech length

602 words

Speech time

292 seconds

Digital identity enables access to essential services

Explanation

Digital identity is seen as a fundamental infrastructure that encourages people to use digital services more frequently, comfortably, and safely. It serves as a starting point for various services, including social protection and financial services.

Evidence

Comparison to commercial services where sign-up processes are the starting point for user engagement

Major Discussion Point

Defining a trusted digital identity framework

Agreed with

Bandar Al-Mashari

Agreed on

Digital identity as fundamental infrastructure

Lack of connectivity and basic digital ID solutions in many countries

Explanation

Many countries still struggle with lack of internet connectivity and basic digital ID solutions. This creates a significant digital divide between developing and developed countries, hindering the implementation of global digital identity systems.

Evidence

Statistics on global internet access (2.6 billion people without access) and lack of ID solutions (3.3 billion people in countries without ID solutions)

Major Discussion Point

Barriers to international cooperation on digital identity

Need to protect user privacy through decentralization

Explanation

The speaker highlights the importance of decentralization in digital ID systems to enhance user privacy. He emphasizes that countries are now giving users more control over their private data and that full identification information is not always necessary for authentication or verification processes.

Major Discussion Point

Key considerations for the future of digital identity

Agreed with

Bandar Al-Mashari

Siim Sikkut

Agreed on

Importance of user privacy and control

K

Kurt Lindqvist

Speech speed

163 words per minute

Speech length

1267 words

Speech time

466 seconds

Trust involves both technical and human elements

Explanation

Trust in digital identity systems involves both technical aspects and human elements. It’s not just about the technical concept of trust, but also about user trust in the system’s functionality, safeguards, and ability to deliver on its promises.

Evidence

Discussion of ICANN’s challenges with domain name registration data and privacy requirements

Major Discussion Point

Defining a trusted digital identity framework

Existing technologies like DNS can provide security and stability

Explanation

The speaker suggests that existing technologies, such as the Domain Name System (DNS), can provide similar or even better characteristics than newer technologies like blockchain for identity management. He emphasizes the importance of building on existing stable technologies.

Evidence

Examples of DNS being used for identity management in social media platforms like BlueSky

Major Discussion Point

Balancing security and privacy

Differed with

Bandar Al-Mashari

Differed on

Role of blockchain in digital identity systems

Need for inclusive, phased approach to implementation

Explanation

The speaker advocates for a phased approach to implementing digital identity systems that is inclusive and enables everyone to participate. This approach should respect national priorities while incentivizing progress and ensuring that solutions are universally implementable.

Major Discussion Point

Barriers to international cooperation on digital identity

Agreements

Agreement Points

Digital identity as fundamental infrastructure

Bandar Al-Mashari

Sangbo Kim

Digital identity is fundamental infrastructure, not just a service

Digital identity enables access to essential services

Both speakers emphasize that digital identity is a crucial infrastructure enabling various services and transactions, rather than just a standalone service.

Importance of user privacy and control

Bandar Al-Mashari

Siim Sikkut

Sangbo Kim

Blockchain offers more user control and privacy options

User adoption and ease of use are key for trust

Need to protect user privacy through decentralization

The speakers agree on the importance of giving users control over their data and ensuring privacy in digital identity systems.

Need for clear frameworks and governance

Bandar Al-Mashari

Emma Theofelus

Framework should encompass legal, governance, and technical aspects

Framework must clearly define roles, responsibilities and limitations

Both speakers stress the importance of comprehensive frameworks that clearly define roles, responsibilities, and governance structures for digital identity systems.

Similar Viewpoints

Both speakers recognize that different countries and regions have varying levels of readiness and specific needs when it comes to implementing digital identity systems.

Emma Theofelus

Siim Sikkut

Need to understand different regional contexts and needs

Differing levels of readiness and priorities across countries

Both speakers advocate for a practical, phased approach to implementing digital identity systems, emphasizing the importance of experimentation and inclusivity.

Siim Sikkut

Kurt Lindqvist

Importance of experimentation and learning by doing

Need for inclusive, phased approach to implementation

Unexpected Consensus

Potential of existing technologies for digital identity

Bandar Al-Mashari

Kurt Lindqvist

Blockchain offers more user control and privacy options

Existing technologies like DNS can provide security and stability

While Bandar Al-Mashari emphasizes the potential of blockchain for digital identity, Kurt Lindqvist unexpectedly suggests that existing technologies like DNS can provide similar benefits. This consensus on the importance of leveraging both new and existing technologies for digital identity solutions is noteworthy.

Overall Assessment

Summary

The speakers generally agree on the importance of digital identity as fundamental infrastructure, the need for user privacy and control, clear governance frameworks, and understanding regional differences. There is also consensus on the need for practical implementation approaches.

Consensus level

The level of consensus among the speakers is relatively high, with agreement on core principles and challenges. This suggests a strong foundation for international cooperation on digital identity systems, but also highlights the complexity of implementation due to varying regional needs and technological considerations.

Differences

Different Viewpoints

Role of blockchain in digital identity systems

Bandar Al-Mashari

Kurt Lindqvist

Blockchain offers more user control and privacy options

Existing technologies like DNS can provide security and stability

While Prince Bandar sees blockchain as offering increased security and privacy options, Kurt Lindqvist suggests that existing technologies like DNS may provide similar or better characteristics for identity management.

Approach to global standardization of digital identity systems

Bandar Al-Mashari

Siim Sikkut

Lack of global framework or standards for digital identity

Differing levels of readiness and priorities across countries

Prince Bandar advocates for a global digital identity framework, possibly overseen by international organizations, while Siim Sikkut emphasizes the need to consider differing levels of readiness and priorities across countries before pursuing global standardization.

Unexpected Differences

Emphasis on experimentation vs. established frameworks

Siim Sikkut

Bandar Al-Mashari

Importance of experimentation and learning by doing

Lack of global framework or standards for digital identity

While most speakers focused on establishing frameworks and standards, Siim Sikkut unexpectedly emphasized the importance of experimentation and practical implementation over theoretical debates. This contrasts with Prince Bandar’s call for a global framework, highlighting a difference in approach to developing digital identity systems.

Overall Assessment

summary

The main areas of disagreement revolve around the role of emerging technologies like blockchain, the approach to global standardization, and the balance between privacy and security in digital identity systems.

difference_level

The level of disagreement among the speakers is moderate. While there is general consensus on the importance of digital identity systems and the need for trust and security, speakers differ on the specific approaches and technologies to achieve these goals. These differences reflect the complex nature of implementing global digital identity systems and the need to consider various national and regional contexts. The implications of these disagreements suggest that achieving a universally accepted approach to digital identity may be challenging and may require flexible frameworks that can accommodate different priorities and levels of technological readiness.

Partial Agreements

Partial Agreements

Both speakers agree on the importance of addressing privacy and security in digital identity systems, but they propose different approaches. Emma Theofelus suggests an independent oversight body, while Siim Sikkut argues for advancing both aspects simultaneously through core principles.

Emma Theofelus

Siim Sikkut

Independent oversight body can help manage privacy and security

Privacy and security can be advanced simultaneously, not balanced against each other

Similar Viewpoints

Both speakers recognize that different countries and regions have varying levels of readiness and specific needs when it comes to implementing digital identity systems.

Emma Theofelus

Siim Sikkut

Need to understand different regional contexts and needs

Differing levels of readiness and priorities across countries

Both speakers advocate for a practical, phased approach to implementing digital identity systems, emphasizing the importance of experimentation and inclusivity.

Siim Sikkut

Kurt Lindqvist

Importance of experimentation and learning by doing

Need for inclusive, phased approach to implementation

Takeaways

Key Takeaways

Digital identity is fundamental infrastructure, not just a service, that enables access to essential services and economic participation

A trusted digital identity framework must balance security, privacy, and user adoption

There are significant barriers to international cooperation on digital identity, including varying levels of technological readiness and differing regional needs

Experimentation and phased implementation approaches are needed to advance global digital identity solutions

Protecting user privacy and giving users control over their data is crucial for building trust in digital identity systems

Resolutions and Action Items

Experiment more with digital identity solutions to gain practical experience

Invest in digital identity as critical infrastructure

Work towards developing a high-level global digital identity framework, potentially through international bodies like the UN or ITU

Focus on building leadership, capability and governance for digital identity within countries

Unresolved Issues

How to create truly global standards for digital identity while respecting national sovereignty and priorities

How to bridge the digital divide and bring digital identity solutions to the 3.3 billion people currently without access

How to balance the need for centralized identity management with calls for decentralized, user-controlled systems

How to ensure digital identity systems are inclusive and do not leave behind certain populations or regions

Suggested Compromises

Adopt a phased, multi-track approach where countries can implement digital identity at their own pace while still working towards interoperability

Build on existing successes in areas like international travel documents and mobile roaming to extend digital identity globally

Focus on high-level frameworks and principles rather than prescriptive technical standards to allow for local adaptation

Thought Provoking Comments

Digital identity is not a service, it’s an infrastructure. It’s an infrastructure for digital transformation, digital transactions between individuals, between entities, business and governments.

speaker

Bandar Al-Mashari

reason

This reframes digital identity from a service to a fundamental infrastructure, emphasizing its critical importance.

impact

Set the tone for discussing digital identity as a foundational element rather than just an add-on service. Led to further exploration of the broad implications and requirements for digital identity systems.

Trust means from the user itself, from the identity holder, he has to trust that his identity, his digital identity is going to help him to access all information everywhere, anytime, across the border, etc. So the trust doesn’t mean only secure and private. It doesn’t mean that it’s protected from invasion or impersonation. It means more than this. It means more business.

speaker

Bandar Al-Mashari

reason

Expands the concept of trust beyond security to include utility and economic benefits.

impact

Broadened the discussion to consider user perspectives and practical benefits of digital identity systems, not just technical aspects.

We have to talk about two things one is to trust in the key does that work and secondly? But how is the usage of that key? And how is that secure and trusted?

speaker

Siim Sikkut

reason

Distinguishes between trust in the identity itself and trust in how it’s used, highlighting the complexity of trust in digital systems.

impact

Led to a more nuanced discussion of trust, considering both technical reliability and user experience/control.

I think with clear core principles of values on what the data is to be used for, for each individual user, becomes easier on what parameters to keep within the administration of a digital identity system.

speaker

Emma Theofelus

reason

Emphasizes the importance of clear principles and user consent in managing digital identities.

impact

Shifted the conversation towards the importance of governance and user rights in digital identity systems.

Blockchain, in a nutshell, it’s an option to replace the database or the central database with distributed ledger, or in a simple word, with distributed identity that controlled mainly by the identity holder himself.

speaker

Bandar Al-Mashari

reason

Provides a clear explanation of blockchain’s potential role in digital identity, highlighting user control.

impact

Sparked discussion on the pros and cons of blockchain for digital identity, leading to consideration of various technological approaches.

Two barriers I would like to say today. One is still we are struggling with lack of connectivity and lack of basic digital ID solutions. From the internet connectivity point of view, we are still struggling with 2.6 billion people so no access to the internet.

speaker

Sangbo Kim

reason

Highlights fundamental infrastructure challenges that often get overlooked in discussions of advanced digital identity systems.

impact

Refocused the discussion on the need to address basic connectivity and access issues alongside more advanced digital identity solutions.

Overall Assessment

These key comments shaped the discussion by broadening the concept of digital identity from a narrow technical focus to a more holistic view encompassing infrastructure, trust, user control, governance, and global accessibility challenges. The conversation evolved from defining digital identity to exploring its implications for privacy, security, economic development, and international cooperation. The comments highlighted the complexity of implementing digital identity systems that are both technologically advanced and inclusive, leading to a rich discussion of potential solutions and ongoing challenges.

Follow-up Questions

How can we create globally applicable standards for digital identity verification while respecting local laws, cultures, and privacy definitions?

speaker

Bandar Al-Mashari

explanation

This is important to address the gaps at a global level without interfering with specific countries’ laws or cultural norms.

How can we extend the success of standardized digital passports to create a broader global digital identity framework?

speaker

Bandar Al-Mashari

explanation

Building on existing successful international standards could provide a pathway to more comprehensive global digital identity solutions.

What are the best approaches for experimenting with and implementing digital identity frameworks among countries that are ready, while allowing others time to develop?

speaker

Siim Sikkut

explanation

This is crucial for making progress on international cooperation without leaving behind countries at different stages of readiness.

How can we design digital identity solutions that are universally implementable and don’t exclude regions or communities due to complexity or cost?

speaker

Kurt Lindqvist

explanation

Ensuring inclusivity and accessibility in digital identity frameworks is essential for widespread adoption and effectiveness.

What are the most effective ways to build leadership, capability, and governance structures for digital identity initiatives within countries and internationally?

speaker

Siim Sikkut

explanation

Developing these capacities is fundamental to successfully implementing and managing digital identity systems.

How can we balance the need for centralized identity information with protecting user privacy through decentralization?

speaker

Sangbo Kim

explanation

Finding this balance is critical for creating trusted digital identity systems that respect user rights and privacy.

What strategies can be employed to accelerate digital inclusion in regions like Africa through digital identity initiatives?

speaker

Emma Theofelus

explanation

Addressing the digital divide and including underserved populations is a key potential benefit of digital identity systems.

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Day 0 Event #171 Legalization of data governance

Day 0 Event #171 Legalization of data governance

Session at a Glance

Summary

This discussion focused on the legalization of data governance and internet regulation in various countries, with a particular emphasis on China’s approach. Speakers from China, Singapore, Brazil, and international organizations shared insights on their respective legal frameworks and strategies for managing data in the digital age.

The discussion highlighted the importance of balancing data security with development and innovation. China’s approach, as outlined by several speakers, involves a comprehensive legal framework including cybersecurity, data security, and personal information protection laws. The country is also working on regulations for cross-border data flows and AI governance.

Singapore’s representative described their evolving approach, which began with minimal regulation but has expanded to address harmful content, online falsehoods, and cybersecurity. Brazil’s speaker outlined their efforts in data protection, AI legislation, and plans for a national data economy policy.

Corporate perspectives were provided by representatives from Lenovo and ZTE, who shared their companies’ data governance practices and compliance efforts. Both emphasized the importance of aligning with national and international regulations while fostering innovation.

Key themes that emerged across presentations included the need for international cooperation in data governance, the challenges of regulating rapidly evolving technologies like AI, and the importance of balancing security concerns with the benefits of data sharing and utilization.

The discussion underscored the complex and evolving nature of data governance in the digital age, with countries and companies alike grappling with how to protect privacy and security while promoting innovation and economic growth.

Keypoints

Major discussion points:

– The importance of balancing data security and development in data governance

– The need for international cooperation and harmonization of data governance approaches

– The challenges and opportunities presented by AI and emerging technologies for data governance

– The role of law and regulation in ensuring responsible data practices and cross-border data flows

– Industry perspectives on implementing data governance and compliance frameworks

The overall purpose of the discussion was to explore different national and industry approaches to data governance, with a focus on legal and regulatory frameworks. Speakers shared insights on how to balance innovation and security, address emerging challenges, and promote international cooperation on data governance issues.

The tone of the discussion was largely informative and collaborative. Speakers presented their country’s or organization’s approaches in a factual manner, while acknowledging common challenges and the need for continued dialogue and cooperation. There was an underlying sense of urgency about addressing data governance issues, but the overall tone remained constructive and solution-oriented throughout.

Speakers

Speakers from the provided list:

– Tang Lei: Director of the Internet Governance Research Center, Chinese Academy of Cyberspace Studies

– Wolfgang Kleinwächter: Professor Emeritus at the University of Aarhus, Denmark

– Shi Jainzhong: Professor and Vice President of China University of Political Science and Law

– Jose Roberto de Andrade Filho: Immediate past deputy consul general from consulate general of the Federative Republic of Brazil, Shanghai

– Daniel Seng: Director of Center for Technology, Robotics, Artificial Intelligence and Law Studies, National University of Singapore

– He Bo: Director of Research Center for Internet Law, China Academy of Information and Communication Technology

– Zhao Jingwu: Associate Professor at Law School of Beihang University

– Gao Huandong: Vice President of Lenovo Group

– Li Wen: Vice President of ZTE Corporation

Additional speakers:

– Wu Shenghua: Professor at Beijing Normal University (mentioned but did not speak)

Full session report

Data Governance in the Digital Age: Balancing Security, Development, and International Cooperation

This discussion brought together experts from various countries and sectors to explore the complex landscape of data governance in the digital age. The speakers, representing China, Singapore, Brazil, and major technology companies, shared insights on national approaches, legal frameworks, and corporate practices in data governance.

Key Themes and Approaches

1. Balancing Security and Development

A central theme throughout the discussion was the need to balance data security with development and innovation. Tang Lei, representing China’s perspective, emphasised that the country’s data governance framework aims to achieve “high-quality development and high-level security”. This approach is reflected in China’s comprehensive legal framework, which includes cybersecurity, data security, and personal information protection laws, as outlined by Shi Jainzhong. Tang Lei also noted China’s global initiative on data security, highlighting the country’s efforts to engage internationally on these issues.

In contrast, Daniel Seng described Singapore’s evolving approach, which began with minimal regulation but has expanded to address harmful content, online falsehoods, and cybersecurity. Singapore has recently enacted laws addressing online safety and criminal harms, demonstrating a shift towards more comprehensive regulation. This “light-touch” approach to content regulation differs from China’s more comprehensive framework, highlighting the diversity of national strategies in data governance. Seng also emphasized the importance of public education in Singapore’s approach to internet governance.

2. Legal Frameworks and Regulatory Challenges

The discussion revealed that countries are at different stages of developing and implementing legal frameworks for data governance. Brazil, as described by Jose Roberto de Andrade Filho, has had a data protection law (LGPD) in place for four years and is currently working on AI regulations and plans for a national data economy policy.

Speakers agreed that emerging technologies, particularly AI, are creating new challenges for data governance. He Bo highlighted the shift from model-centric to data-centric approaches in AI development, emphasising the crucial role of data quality management. He stressed the importance of high-quality data in training AI models and suggested strengthening policy guidance to encourage data sharing among companies, particularly to benefit smaller firms and startups in AI development.

3. Cross-Border Data Flows

The regulation of cross-border data flows emerged as a complex challenge requiring international cooperation. Zhao Jingwu provided detailed insights into China’s approach, outlining four categories of rules governing cross-border data flows: general rules, rules for important data, rules for personal information, and rules for specific industries. He also mentioned a recent regulation issued in March 2024 aimed at facilitating data flows while ensuring security.

4. Corporate Data Governance Practices

Representatives from major technology companies provided insights into corporate data governance practices. Gao Huandong described Lenovo’s comprehensive data security and privacy framework, which includes a global privacy compliance system, data classification, and protection measures. Li Wen outlined ZTE’s data compliance system designed to improve efficiency, detailing their approach to data governance, risk management, and compliance with various international standards.

5. Multi-stakeholder Collaboration

Wolfgang Kleinwächter, Professor Emeritus at the University of Aarhus, emphasised the importance of multi-stakeholder collaboration in internet governance. This view was echoed by other speakers, who recognised the need for cooperation among governments, private sector entities, and civil society to address the complex challenges of data governance effectively.

Areas of Agreement and Disagreement

There was broad consensus among speakers on the fundamental importance of data governance in the digital age. All participants acknowledged the need for comprehensive frameworks to address security, privacy, and economic development concerns. However, specific approaches and priorities varied between countries and organisations.

The main areas of disagreement revolved around the level of regulation required. While China’s approach emphasises comprehensive legislation, Singapore’s evolving strategy represents a different philosophy. These differences reflect diverse regulatory landscapes and national priorities, which may complicate efforts to establish global standards for data governance.

Emerging Challenges and Future Directions

Several speakers highlighted the need to address emerging challenges in data governance:

1. AI Regulation: The rapid development of AI technologies requires new approaches to regulating training data and algorithms.

2. Data Economy: He Bo discussed data as an economic asset, citing Shanghai’s data exchanges as an example of how data can be leveraged for economic growth.

3. Data Quality Management: He Bo emphasized the critical role of data quality in AI development and the need for policies to support effective data management practices.

4. Adapting Governance Models: Kleinwächter emphasised the need for tailored governance models for specific digital issues, challenging the notion of a one-size-fits-all approach.

5. Blurring of Communication and Content Platforms: Daniel Seng highlighted the challenges posed by the convergence of communication and content platforms, necessitating new regulatory approaches.

Conclusion

The discussion underscored the complex and evolving nature of data governance in the digital age. While there is general agreement on the importance of balancing security, development, and innovation, the specific approaches vary significantly across nations and sectors. The speakers highlighted the need for continued international dialogue, flexible regulatory frameworks, and multi-stakeholder collaboration to address the challenges posed by rapidly evolving technologies and the increasing economic value of data.

As the digital landscape continues to evolve, policymakers, industry leaders, and academics must work together to develop governance models that protect privacy and security while fostering innovation and economic growth. The diversity of approaches presented in this discussion provides valuable insights for shaping future data governance strategies in an increasingly interconnected world.

Session Transcript

Tang Lei: You Sustainable development Sustainable development Sustainable development Sustainable development Net governance forum and to the day zero event on the legalization of data government data governance You He from You World Internet Conference WuZhen Summit, President Xi Jinping noted that we should see the trends of digitalization, networking and intelligentization, embrace innovation as a primary driver, uphold security as a baseline requirement, and pursue inclusiveness as a core value. Efforts must be accelerated to promote innovative, secure, and inclusive development in cyberspace, working together to usher in a brighter digital future. Today we are gathering here to jointly discuss issues related to data governance, which are of great importance. In cyberspace, China has consistently committed itself to place equal emphasis on development and security, establishing and improving the legal system for data governance. Firstly, China has enacted the cybersecurity law. data security law, and a personal information protection law, providing basic provisions for data security and personal information protection systems. Secondly, China has released the provisions for promoting and regulating the cross-body flow of data, fostering the free flow of data in a lawful and orderly manner. Thirdly, China has released several provisions on the management of automobile data security and several regulations to build the data security management systems in some key areas. Firstly, China has issued the global initiative on data security. For example, an effective utilization of network data Firstly, the regulations forward the overall requirements and the general provisions for network data security. Secondly, the regulations further specify rules concerning personal information protection. Thirdly, the regulations improve mechanisms for the management of important data security. Fourthly, the regulations enhance the provisions on security management. cross-border network data flows. In recent years, with the advancement of new technologies and applications such as artificial intelligence, the volume of data has been growing rapidly. Accompanied by escalating security risks, striking a balance between high-quality development and high-level security has become a common challenge all over the world. It has become increasingly crucial to promote data governance by law-based approaches. To address this, the following actions are necessary. Firstly, improve the legal system for data governance. Establish and improve the foundation rules for data governance and address the data security challenges brought about by the development of new technologies. Secondly, strengthens theoretical support for law-based data governance. Promote the development of the theoretical system for data governance, ensuring a notational relationship between theory and practice. Thirdly, strengthen international exchanges and cooperation on the legalization of data governance. Create a win-win international cooperation pattern for data governance. Colleagues, data governance is a shared challenge for countries worldwide. I encourage that all the guests here today to conduct in-depth discussions around relevant topics, jointly discuss the legal solutions for data governance, work together to promote the legalization of data governance. global data governance and ensure that the benefits of digital advancements are shared by people worldwide. In closing, I wish today’s event a full success. Thank you. Thank you Mr. Tang for the relevant experience of China. Now I give the floor to Professor Wolfgang Kleinwachter, Professor Emeritus at the University of Aarhus of Denmark.

Wolfgang Kleinwächter: Okay, thank you. Thank you very much and thank you for the invitation and thank you all the private administration of China for organizing this important workshop. Mr. Tang Li in his opening speech mentioned two very important concepts. One is education and the other one is collaboration. I think the whole internet is a permanent learning process, so we know more than we knew 20 years ago and we will know a lot more in 20 years from now. So it means it’s a never ending story and it will continue. And the other one is collaboration, so it means No one is able to manage all the things, you know, with one shot. So there is no silver bullet. So there is no one road. So there are many roads which has to be taken and the only way to manage all the forthcoming problems is by collaboration of all stakeholders in their respective roles. I think this is the beauty of the Internet Governance Forum. This was the beauty of the outcome of the World Summit on the Information Society 20 years ago. It was a compromise at this time. Some governments wanted to have private sector leadership. Others wanted to have governmental leadership. And the compromise was we need all stakeholders. So the Internet and all these new achievements are not for leadership. They are for collaboration. So that means we have to work hand in hand in their respective roles. Governments are different than the private sector. Technical community is different from civil society. But we can manage the problems of the future only if we work hand in hand. I think this is the big message. And I’m very happy that Mr. Tang Lai mentioned these two concepts, education and collaboration, as the main guidance. As an academic person, I’m dealing with definitions. So this is a core work of academics. And the title of this session is Legalization of Data Governance. So I want to ask what is data and what is governance? So let’s start with data. So 20 years ago, I was in another workshop where we said, okay, data is the starting point. That’s the resource. That’s the raw resource, the raw material. Data leads to information. Information leads to knowledge. And in the best case, knowledge leads to wisdom. So that’s why some people said, okay, we have, we start with the data society, then we have the information society. It was the world summit on the information society, but we have to move upwards to the knowledge society, and some people say that, and the wisdom society. This is a little bit idealistic, but as an academic person, I think I’m allowed to think in idealistic terms. But more complicated is the term of governance. So this is the internet governance forum. I think internet governance was the term we used 20 years ago, because the internet was brand new. A lot of people did not understand what the internet is. Is it a technical issue? Is this an economic issue? Is this a political issue? So it was very complex, and I was a member of this UN working group on internet governance, which was tasked by Kofi Annan to propose a definition. So just to define and to enable governments and other stakeholders to have an understanding what internet governance means. So the definition we proposed, and which is reflected in the Tunis agenda, had three main elements. The first thing is internet governance means the involvement of all stakeholders. What I said already, so it’s not only one stakeholder approach, it’s a multi-stakeholder approach. Second thing is governance means that you have to share. You have to share protocols, you have to share codes, you have to share regulations and decision making. And the third thing is we proposed a layered approach. We made a differentiation between the evolution and the use of the internet. At this time, the majority of the problems were with the technical layer, the evolution of the internet. And the use of the internet is related to the so-called internet-related public policy issues. Today, the majority of problems is on the application layer and not on the technical layer. I think a lot of issues on the technical layer have been cleared. It’s not a question anymore. So that means 20 years ago, it was a technical problem with some political implications. Today, it’s a political problem with a technical component. And this makes it rather different. So what means this governance now? I think today there is a confusion because everything is governance. We have here data governance in today’s workshop. We have internet governance. People in the cybersecurity field speak about cyber governance. We have now AI governance. We have ICT governance. We have IoT governance for the Internet of Things. So there’s a huge confusion. And what governance do you mean? Data, Internet, AI, and things like that. So I think more or less this is all the same soup because this is governance in the digital age. Governance in the digital age means you have to have a specific solution, governance model, for each of the specific issues. There is no one-size-fits-all that you say this is the governance for the data or this is the governance for AI. You have to identify the problem. What do you want to govern? What is the subject? And then to build the governance model around the system. And this is complicated because in this layered system, you have on the one hand a universal set of norms and principles and codes. The technical layer, this is one world, one Internet. But on the application layer, you have 193 national jurisdictions. So we have a problem, 193 sovereign nations, national jurisdictions, but one world. So and I think this is. a challenge that you have a contradiction and you have to manage the contradiction. You cannot settle this. So that means a settlement would mean the whole world would be ruled only by technical codes. This is an illusion. The other alternative, the whole world would be ruled only by one country. This is also an illusion. So that means you have to find a compromise. And this is the challenge. And to meet these challenges, you need more discussion, more dialogue among all stakeholders. And that’s why the Internet Governance Forum is such a wonderful platform. Thank you very much.

Tang Lei: Thank you very much, Professor Kleinwachter for your wonderful sharing. Next speaker, let’s invite Mr. Shi Jianzhong, Professor and the Vice President of China University of Political Science and Law.

Shi Jainzhong: Please. Good afternoon, ladies and gentlemen. I’m very delighted to have the opportunity to visit this ancient and magnificent city, Riyadh, to attend this panel with you to discuss the topic that is both cutting edge and challenging, namely data governance under the rule of law. As we know, the mission of law is to adjust social relations by allocating rights, obligations, and responsibility, even liability among different social entities in order to maintain the security, justice, and efficiencies of these relations. We have uttered The continuous advancement of ITCI technology is a protecting home being in the construction of digital economy, digital government, digital society. In the digital age, the subject identities of various social relations are being digitalized and datafied, such as nature firms and government departments. The behavior of various subjects are also being digitalized and datafied, such as radio consumption, digital transaction of firms, and digital government affairs. And the objects are also being digitalized and datafied, such as the digitalization and the datafication of the goods, the services, even equipment. In the digital age, the social relations are also being digitalized and datafied, such as between individuals, between firms, between individuals and firms, between individuals and governments, between firms and government departments, and among the government departments at center. Consequently, in the digital age, the mechanism, tools, and modes by which law adjusts the social relationship must be changed accordingly, which poses a lot of new challenges and opportunities. The challenges brought by digital intelligence technology to the law mainly refer to the need for the law to confront unprecedented challenges. Unprecedented new issues, such as how to configure the rights related with data, how to ensure data security, how to maintain the data sovereignty, how to make equal use of data resources, how to protect personal privacy, how to protect digital human rights, and how to regulate data processing, including data collection, storage, use, processing, transmission, provision, disclosure, and deletion. The opportunities brought by digital intelligence technology to law are primarily reflected in the fact that the digital intelligence technology can serve as a tool for the rule of law. It can be internalized and embedded in the rules of law process in real time, therefore empowering all the aspects of legislation, law enforcement, and justice, achieving a higher level of scientific legislation, strict law enforcement, and fair justice, while seeing the opportunities that digital intelligence technology brings to law is a great challenge of itself. So we must acknowledge that in the current era of rapid advancement in the AI, the challenge that the digital intelligence technology poses to the law outweighs the opportunities. Now, we can find an interesting phenomenon that is, on the one hand, digital intelligence technology is creating new legal problems. On the other hand, digital intelligence technology is helping the law to solve the problems. In other words, digital intelligence technology and the data are both objects and the tools of the rule of law. This is a special phenomenon that data governance must be aware of. Certainly, it is important to recognize that data we discussed today refers to electronic log records of information, that is electronic data. Compared to the other forms of information recording, such as paper-based terms, such as paper-based forms, electronic data has several unique characteristics, such as technical characteristics of reproducibility, economic characteristics of non-arrival, and legal characteristics of non-exclusivity. We believe that security is the prerequisite for development, and development is a guarantee for security. When it comes to the data governance, it is about both security and development. In other words, in theory, security and developing development, in other words, in theory, security and promoting development are not opposite, and this is no recognizable contradiction. As one of the goals of data governance, in theory, security means protecting individual privacy. commercial security, and national security in the process in developing and utilizing personal data, corporate data, and the government data. In this regard, the China government has enacted the co-authorization laws such as cyber security laws, personal information protection law, and data security laws. Mr. Tang Lei has already touched upon this in his speech just now, so I will not elaborate it further. As one of the objectives of the data governance, promoting development entails effectively developing and utilizing personal data, corporate data, and the government data, while protecting individual privacy, commercial security, and national security. Promoting development means make use of data and digital intelligence technology to foster technological advancement, economic prosperity, social development, and well-being of the people. From this purpose, Chinese government has also made corresponding provision in many laws, such as the civil code. Moreover, it is formulating a number of laws and regulations to facilitate development and utilization of data. For instance, the Chinese government places great emphasis on fair competition in digital economy, specifically stipulating in the anti-monopoly law that undertakings shall not use data and algorithms, technology, capital advantages, and platform rules to engage in monopolistic behavior prohibited by this law. As we know, In every country, the government holds the largest amount and the highest quality of data. If effectively developed and utilized, it can empower business developments. To this end, the Chinese government has formulated the regulation on fair competition review in accordance with the anti-monopoly law, which can guarantee fair and more discriminative exploration and utilization of government data by all type of firms. In the process of using data security and promoting development of the digital economy, Chinese law is continuously improving system and mechanism for governance, while addressing the challenges brought by digital intelligence technology. China is actively using this technology to empower the legal system. For example, China has not only established the three specialized use net codes, but also actively employs procedural rules of digital intelligence technology to enable justice. These rules include online mediation rules, online litigation rules, and online court rules, ensuring that the law is implemented more justly, efficiently, and with great integrity. In summary, data governance requires support of law and is in separate belief. Therefore, only organic integration of law and the digital intelligence technology can build more scientifically sound and reasonable structure and the mechanism for data governance and achieve positive interaction between higher. standard data security and higher quality digital economic development. Thank you.

Tang Lei: Thank you very much Professor Shi. Now let’s turn to online speaker Mr. José Roberto Andrade, immediate past deputy consul general from consulate general of the Federative Republic of Brazil, Shanghai. Please. Thank you very much. Can you hear me well?

José Roberto de Andrade Filho: Good morning. Thank you. Good morning from Brasilia. It’s a pleasure to join this event online from far away and I’m happy to see many familiar faces. First of all, let me thank the friends and authorities from the Bureau of Internet Laws and the Cyberspace Administration of China, in special Professor Wu Shenghua, with whom we have from Brazil a long time collaboration, but also my fellow speakers and authorities, Mr. Tang Lei, Professor Kleinwächter and Professor Jiang Zhong. I would like to introduce to you today some examples of how we in Brazil are working on our internal governance, on the structuring of our data environment, and also how this will serve as a support and also a way for Brazil to contribute to international, to global governance. And I liked very much as Professor Kleinwächter gave the example that, well, we have so many governances, but it’s digital age, governance in the digital age, and then we have several different approaches. The examples I will give, I could divide in first what, where are we coming from right now, late 2024? What kind of structures we have? And then I would like to speak about, well, the consolidation of our data protection law, the LGPD, and our national authority of data protection. Also, I would like to give an example as a second, number two, of our AI law, which is currently in fast development. And third, our views, our current discussion for data economy policies. So, just last month, we completed four years of the implementation of Brazil’s National Data Protection Authority, ANPD. ANPD is the most robust data authority and instance in Brazil. It was created because of the provisions that we had in LGPD, our national data law, which was approved in 2021, but has a background of discussion since 2018. Well, Brazil, as you know, is one of the 10 biggest economies in the world. Our population is one that spends most hours a day online. We are a leader in terms of users in all platforms, especially now with e-commerce, with a strong connection to Chinese companies as well. So, we are a big data producer, but also at the same time, we have in all fields of our country, especially, let’s say, in agriculture, in biodiversity. So, we are a big data producer, but also at the same time, we have in all fields of our country, especially, let’s say, in agriculture, in biodiversity. a wealth. I always compare that to the Amazon forest. We have an Amazon forest of data, of wealth. So it’s our duty to organize internally and promote development and new internal governance, I would say, but that reflects our values. So one key element that I would say, even before I dip into the three examples, all discussions in Brazil are very much permeated by inclusion. So we have private sector, civil society is a strong player in all discussions regarding our data laws and our frameworks, and also the need to have people at the center, the human beings at the center. As Professor Wu-Sheng Kuo also said, well-being and development. So inclusion, people, human values at the center, and development and well-being. That is very much the spirit, and we can find many of these provisions at LGPD, as I said four years ago, and now with the National Data Protection Authority. A report, a very extensive report has just been published. It’s available online, but unfortunately so far only in Portuguese, but I hope very soon in English as well, which gives a full vision of how ANPD, our national authority, has been working. First in giving guidance and recommendations, and let’s say soft norms as well, to private sector and data actors. I mean companies and public institutions and others. So ANPD has been working actively and has already consolidated. in line with other exchanges, with other legal environments abroad, but has consolidated a robust set of norms and also publications for guidance for our data players or actors. At the same time, we have, at the National Data Authority, improved the number of people. We are still building the capacity. Currently, ANPD, according to the report, has 150 employees. We still don’t have a career of specialized people inside the agency, but the idea is to further professionalize that. And I would say ANPD is our main vehicle for implementation of data policies in Brazil. And also, as one of its reports, we call it international data transfers, or, well, very much like the cross-border data transfer that is at the center of many discussions. So this is the key platform for us to establish international cooperation. At the same time, number two, we have just, five days ago, approved at the Senate, Brazil legislation has two levels, the Senate and the House of Representatives, we have just approved the new project for AI law. This is the result of years of discussion, which, if we see in the timeline, has increasingly absorbed and included new actors, especially civil society. Now, it has had a very strong contribution. One of the key aspects, let me say, is… For example, the use of copyright material for training models. Our artistic and writers associations have been very, very active and we don’t expect to have a final model. I think right now, nobody can expect to have a final model. Of course, because the AI environment is a fast-changing one. But we do want to have something that reflects our values and is operational. The AI law will now go to the House of Representatives. For further consolidation, there might be some modification, but we expect that in the course of 2025, we will have another tool, another legal framework together with the data protection law from 2021, that will give more robust legal framework for us internally to organize ourselves, this wealth of data, but also to promote our international cooperation. As a third level that I would like to enhance, our Ministry of Industry, and this is very much connected with all the international collaboration, has already started organizing a future of coming public consultation for a national data economy policy. This is very much aligned with what we see in other countries of using data, unlocking the power of data, unlocking the value of data to promote, well, economic competitiveness, better products, better business models. But also, as I said in the beginning, oriented, aimed at people-centered, development and reflecting values. So, this is the very early stage of consultations. We will soon have something published and in the press, but it has been announced already that from the industry part, and this is very important now, especially, I would say, with China as one of our main investors in Brazil, but also the just-celebrated Mercosur, our trade bloc in South America, agreement with the European Union for us to attract new business or partnerships and the data economy policy promises a lot of future, let’s say, potential and very good results as well. We have to discuss a lot of, I would say, elements that will serve as base for this data economy development. In China, for example, you have Shanghai Data Exchange and the local data exchanges all over. That is a fantastic example of how data assets can generate value even being, as I saw in Shanghai, data can be declared in the balance sheet of companies. So, this is one very good example. We will certainly take into account all international experiences. We aim at having more and more delegations traveling and learning about the experience not only of China, but also European Union and other partner countries. But I see a very positive horizon. This is, I would say, is more medium and longer term, but a very positive horizon. element as well. So in conclusion, I don’t want to extend my time, although I think we can have an extensive discussion and very productive. These three elements, the consolidation and strengthening of our National Data Authority, the coming approval of our AI law, which I mean with flexibilities to be adapted, to be in line with what we have to be prepared for, and always people-centered, with a vision of protection of vulnerable groups, rights, promotion and protection of human rights in the digital space, and our coming economic-oriented, with competitiveness, national data economy policy. I think these three levels can give a very good vision of how Brazil is moving. Of course, as a diplomat, to conclude, I would say Brazil is very active, has been very active, and will be, will continue to be very active in engaging to promote an organized order that we have to build in collaboration, government to government, government within international organizations, and I congratulate all of you for organizing and participating on events like this, where we have the opportunity to exchange and share, and including other key stakeholders, like civil society and private sector. Thank you very much, and I look forward to to participate further in the discussions and benefit from this

Tang Lei: event. Thank you. Many thanks for Mr. Chou Hsien, which provides us with a new perspective. Thanks again for all speakers of the first session. Next is the second session of roundtable discussion. Now, let’s welcome Mr. Daniel Sun, Director of Center for Technology, Robotics, Artificial Intelligence and Law Studies, National University of Singapore. Can everyone hear me? Yes, we can hear you. Thank you very much.

Daniel Seng: First, I’d like to thank Professor Wu from the Beijing Normal University for this very kind invitation, as well as the UN Internet Governance Forum and the Cyberspace Administration of China. It is a privilege to share with you Singapore’s approach towards Internet governance. And in fact, as you will hear from my presentation later, it is a fast-evolving one that is also adapting to the vicissitudes of the recent uses of the Internet and the problems that it poses. I propose to start by first outlining some basic principles that set the stage for the approach to the governance of the Internet in Singapore. First, Singapore is an open society. We have done our growth through trade, finance, multiculturalism and multilateralism. And in fact, Singapore is one of the most connected countries in the world. 93.2% of our residents have broadband and up to 166% of our population have mobile phones. I was really puzzled by this number until I realised that there are six phones amongst the four family members that I have. So this statistic is indeed true. Furthermore, we have been a firm believer in the free and open access to information, which we believe are key to education, research and innovation. So one of the underlying premises behind our concepts towards internet governance is that fundamentally don’t believe in the monitoring of user access to information. But at the same time, there has to be some minimal light touch across the board content regulation approach that has to be adopted for all information that is accessible in Singapore. So since 1996, we have regulated content providers via something called an internet code of practice. The way the internet code of practice works is that it defines a category known as prohibited materials. These are materials defined to be contrary to public interest, public morality, public order, public security and national harmony or prohibited by applicable Singapore laws in Singapore’s multicultural society. As you can see, the focus is on the fact that as a multicultural society, we have to take steps, sometimes serious ones to ensure that our multicultural society is stable and it’s not disturbed. So some of the factors taken into account in prohibiting material that can be accessed in Singapore include pornography, materials pertaining to sexual violence, materials pertaining to extreme violence or cruelty and materials that end to incite ethnic, racial or religious hatred, strife or intolerance. Having given ourselves a very broad definition of prohibited materials, in practice, our internet service providers only restrict access to about 200 mass impact websites and prevent these. websites from being accessed in Singapore. From our research, most of these prohibited websites are pornographic in nature, and others pertain to content that are harmful to Singapore’s racial or religious harmony or against national interests. As far as our internet content providers are concerned, we encourage them to exhibit or exercise self-regulation by not hosting fora and programs that contain prohibited material, and where the content pertains to news websites and political websites, we require these websites to be registered. So as you can see, the level of internet regulation for these internet content websites is largely minimal. That was until recently. In 2022, we discovered that there is a growing phenomenon where the internet websites are blurred in their usage in that we can have online communication service providers that also provide content, which are done essentially by point-to-point and point-to-multipoint communications. If I describe to you social media services for communications, such as those done by Facebook, TikTok, X, and YouTube, you understand what I mean, because many of these platforms are designed to actually communicate from individual to individual, sometimes harmful and inappropriate content. To deal with this situation, we passed a new law in 2022 called the Online Safety Miscellaneous Amendments Act to address this category of harmful and inappropriate content, which we define to include sexual content, violent content, suicide and self-harm content, cyber-bullying content, content endangering public health, and content facilitating vice and organized crimes. These platforms that I… discussed under our new laws are required to establish content rules and employ content moderation to filter out such content, especially protect children from accessing such content. Users are also empowered to report the availability of such content to the authorities and these websites are required to publish their annual online safety reports to show that they have complied with laws. The COVID incident at the turn of the decade has given rise to a new phenomenon called online falsehoods and to deal with this particular problem we had to enact one particular piece of legislation to deal with this and this is where there are online falsehoods that contain false statements of facts or misleading information that have a tendency from a public interest perspective to affect public health, safety, tranquility, public confidence, public finances, preventing ill will between different groups, preventing the influence on elections, the security of Singapore and relations with other countries. This piece of legislation that we enacted called the Protection from Online Falsehoods and Manipulation Act of 2019 or POFMA in short, is designed to allow the government to respond by issuing what are known as correction notices to counteract these posts. Companies that post these posts are required to also post the Singapore government’s correction notices to counteract the falsehoods that are contained in these posts. The advantages of such a mechanism are that because we do not go through the courts but go through a government system, the response of the government can be very fast sometimes within a matter of hours or days and the design really to combat serious falsehoods such as falsehoods arising from the COVID-19 incident and various other falsehoods claimed against against government ministers, institutions, and policies. You can find a vast majority of these correction notices targeted at Facebook content posted by users. In another recent initiative in this regard, we have enacted two additional pieces of laws to deal with the issue of harassment and online crimes. I’ll focus on the Online Criminal Harms Act of 2023, where in essence, we enacted this new piece of law to deal with online child sex exploitation, job investment, product scams, and phishing attempts. Under this new law, directions can be issued by the government authorities to various online service providers where there is a reasonable suspicion that there is some kind of online activity perpetuated on the online service providers, services, or content in furtherance of a commission of an offense. So for instance, if there is a post page that is used for phishing or other types of scams, the authorities can issue orders to the online service providers to block the content, to disable the content, or to prevent the content from being accessed by people in Singapore. Last but not least, on the issue of personal information and cybersecurity, we have, as many other countries in the world, a Personal Data Protection Act that seeks to regulate the collection, use, and disclosure of personal data by organizations, and it recognizes the rights of individuals to protect their personal data, especially in the online environment. The act also regulates the cross-border data flows that will pertain to Singapore as a trading hub and exchange of data between Singapore and other countries in the world, as well as a cybersecurity act that is designed to preemptively prevent. manage and respond to cyber security threats and incidents by also regulating owners of critical information infrastructure. So in conclusion, Singapore’s experiences in this regard have been largely as a result of our experiences from initially starting with a minimal platform for regulating content online by way of prohibited materials, but as online platforms develop and evolve into communications platforms to enable private individuals to communicate, we have to expand our concept of regulation to include harmful and inappropriate content, such as content that promotes suicide and self-harm or cyberbullying, to ensure that our masses are protected. At the same time, we have to update our laws to deal with online falsehoods and also to protect personal data and cyber security. But amongst all these regulations that are put in place, it is still very important for the government to put in place various public education measures to educate the public on both the advantages and disadvantages of accessing information online and to teach its population to be discerning in its proper use of information. So on that note, thank you very much, and I look forward to the opportunity to hear from the other speakers in our course to learn about developments around the world. Thank you.

Tang Lei: Thank you, Professor Daniel, for your wonderful words. Now I give the floor to the next speaker, Mr. He Bo, Director of Research Center for Internet Law, China Academy of Information and Communication Technology.

He Bo: Thank you. Good afternoon, everyone. I’m He Bo from China Academy. Academy of Information and Communication Technology. Thanks for the invitation of Cyberspace Administration of China. I’m so delighted to participate in today’s discussion. Just now, we have several professors mentioned that we should find out the specific issues of data governance. So today, I would like to discuss the design of legal system for data governance in the era of artificial intelligence. As we know, with the fast development of the wide application of AI technology, data has become the most important factor. When we come into the era of large language model, which also called LLM, the development of AI is shifting from being model-centric to data-centric. And data resources have become the most core and fundamental elements in the development of AI. In order to promote the health development of AI, it is particularly important to build a more suitable system. However, the breakthrough development of AI technology, as actually we know, the AIGC, has posed a huge demand for high-quality data. But the existing data governance rules and regulations have not been adjusted in time, which leading to issues such as data in and difficult to restrict the development of AI technology and industry. Facing the development needs of the new generation of AI, we should promote, adjust, and improve the relevant legal rules. Firstly, it is necessary to improve the data security rules to resolve the problem of data being unusable. During the fast development of AI, the legal use of data has become an issue that urgently needs to be resolved. Laws and regulations around the world are just now… professor from Singapore also mentioned that many laws have made clear provisions regarding data security protection, data collection, and data use. For instance, many laws prohibit any individuals or organizations from engaging in activities that endanger cybersecurity, such as stealing data online. The GDPR of the EU, among others, also has clearly defined the legal basis for processing personal data. However, with the rapid development of AI technology, issues such as the lawful use of public or available personal information have become a very important question. But the relevant rules have not been adjusted at the same time, which means the LRM may face legal problems with using data. For example, it is still unclear whether we’re using public or available personal information as a training data for LRM is legal or not. Therefore, it is recommended to further improve the system for the reasonable use of data. The mirror clarifies whether it is legal to use public personal information as training data, formulating rules, standards, and guidelines for personal information protection issues in different stages, such as the training, generation, and application of large language models. Secondly, it is essential to establish the comprehensive rules for data sharing and circulation to resolve the use of data being insufficient. Only when data circulates can value be created, and it is also an important way for LRM companies to get data. Data sharing and circulation are the key to unlocking the value of data. However, At present, we can see there are still problems in aspects such as data sharing, data training, and data openness. For example, there is a lack of effective, insensitive mechanisms for data sharing among companies, which limits the ability of small companies to access data. Many leading AI companies, they are also the traditional large Internet companies or the big platform companies. They have a large amount of data resources through their existing Internet service and they use their own data to train models, thereby they can form a competitive advantage in their development. But some AI companies restrict other small companies from accessing and using their data, which may become a barrier for start-up companies and small companies. To solve this issue of insufficient data resources, it is recommended to strengthen the policy guidance, encourage and support leading companies to open and share the valuable data. Meanwhile, it is also recommended to open and share valuable data. Thirdly, improve the quality management tools to resolve the problem of data being inefficient. Data quality directly determines the development level of AI, and high-quality data is the core for improving the accuracy, stability, and interoperability of models. High-quality data sets can help large AI models gain a deeper understanding of different concepts, semantics, and grammatical structures, which can significantly enhance the value of large models. Currently, the requirements for data quality management mainly focus on industry-solved norms, while the relevant laws and regulations don’t have much progression on data quality. data quality. To some extent, this has affected the equality and efficiency of the training of the large language models. Therefore, it is recommended to build and improve the rules for the quality management of training data, formulate data quality management standards and reframe the specific requirements for training data in terms of accuracy, objectivity and diversity. That’s all my speech. Thank you and have a nice day.

Tang Lei: Thank you, Mr. He. Now, let’s turn to Mr. Zhao Jingwu as associate professor at law school of Beihang University. Please. Good afternoon, distinguished guests. It’s my honor to have the opportunity to give a

Zhao Jingwu: little speech here. I’m Zhao Jingwu from Beihang University. What I would like to talk today is a small question. It’s how to ensuring the security of cross-billion data flow through the legal instruments. Well, cross-billion data flows is not just a matter of domestic data security regulation and the commercial utilizations. But it’s also a complex issues that affect the promotion of global digital economy. Well, in recent years, we can see that more and more countries, religions and the international organizations, well, including China, have tried to explore the safe and the trustworthy model for cross-billion data flow through domestic legislations. So, however, at the same time, there are also many controversies need to be solved urgently. In this context, China has development the promoting of governance path of cross-billion data flows. However, there is a misleading in the international governance activities, which is to encourage the cross-billion data flow without restriction. Perhaps their original intention was to achieve a border and more efficiency data flow effect. But the key is they fail to understand the relationship between the security and the data flows. It’s worth mentioning that in the Article 1 of data security law in China, the government’s idea of data is to ensure data security and promoting data development and utilization. Well, in summary, it means that we should pay equal attention to the safety and the utilizations. So, we agree that when they pursue cross-border data flows without paying attention to the data security, not only fail to realize the exchange value of data, but also it’s a broadly security risk such as data linkage and theft. These kinds of situations may happen in the future. So, in the international communities, there is also a view that China follows a data controlism path, which essentially politicalize the issues of the data securities. That is because we don’t have a unified standard for the international cross-border data flows around the world, while modernization corporations always have to comply with the different domestic laws and the international agreements. So, there is no denying that the international data security and the personal privacy generally recognize the first and the primary premise for the cross-border data flows. So, furthermore, across the global, we can see that there is no country allowed cross-border data flow without any conditions. So, in most countries, domestic law put data security or national security at the first and the important part. So, what I want to emphasize is that China’s instance on the open and comprehensive governance model for cross-border data flows is not an empty word. China’s domestic law has clearly defined four categories of rules for the cross-border data flows, which include security assignment of outbound data transfer, standard contract for the cross-border transfer of personal information, and the third-party security certifications, and special rules for the personal and other species of special areas. So all above these rules are supported by the comprehensive law and regulations. So in March 2024, China issued a regulation on promoting and regulating cross-border data flows. This purpose is to formulate the regulation that further clarifies the applicable laws in the professing of cross-border data flows. And further, it’s mentioned how to promote the orders of free flows on the data. Regulating cross-border data flows, such as a lot of conditions were considered in this area. So we considered the international trade, cross-border transportation, and academic corporations, and others like manufacturing and areas. So China also released the global data cross-border flows cooperation controversy this year. So this document clarifies China’s position and how to some more useful solution to solve this kind of problems. So in order to truly and efficiently resolve the institutional conflicts, we have enhanced the trustworthiness and the confidence of multi-parties in carrying out international data cooperations. So China’s supervision system for the cross-border data flows is not just an empty word, and it’s not just simply to restrict data export. But we can see that it is also trying to make a better protect and promoting data area export. So China’s legislation has established a diverse channel for cross-border data flow, just as I mentioned before. It’s not just only trying to catering the market demands of a value industry and enterprise. So finally, I hope we can reach a consensus. that in the future, that the governance of cross-border data flow cannot ignore the data security, nor can we set too many restrictions for our securities. So this concept for the security and the utilizations, is in China data governance system is both two important part. So I think in the future, we will find a wisdom and approaching way to solve the problem of cross-border data flows. That is all I want to say, thank you. Thank you, Professor Zhao, for your wonderful insights sharing. Now I give the floor to the next speaker, Mr. Gao Huandong, Vice President of Lenovo Group, please.

Gao Huandong: Thank you, Professor Wu. Distinguished fellow speakers, guests, ladies and gentlemen, good afternoon. I’m Gao Huandong from Lenovo Group. It’s my great pleasure and honor to participate in this forum with the theme on legalization of data governance. The year of 2024 marks the 10th anniversary of Chinese President Xi’s proposal for the strategy of building China as a great cyber state. Looking back over the past decade, the internet and the digital economy has flourished and become an important engine on social progress and economic development, both in China and around the world. We have realized that the high-quality data governance is essential to the high-quality development of the digital economy, and compliance is the foundation of data governance. Therefore, Lenovo Group has made tremendous efforts in data security and privacy protection over the last few years. Today, I would like to quickly share Lenovo’s practice in data security and privacy protection in China for further discussion with experts presented today. Lenovo China’s data security and privacy governance framework basically consists of five building blocks. One is governance structure, the second is process and guidelines, and the third is key work streams, and the fourth is how we use technology to safeguard data security and privacy. And the fifth is cultural awareness and internal education. This framework is in line with Lenovo’s strategy, smart AI for all, and it reflects our mission in data security and privacy governance, security for the future. Our first building block is so-called governance structure. Why? Simply because data security and privacy protection for a company like us has more than 1,000 employees. It’s an astonishing and a giant project. How to deal with this resource issue? We set up a Lenovo China data security and privacy protection committee as a virtual team since the end of 2021 under the leadership of the Lenovo China security committee. This virtual team has three standing sub-committees, namely data security team, privacy compliance team, and the data cross-border transport team for collective decision-making, and another one ad hoc emergency response team forming this so-called three plus one structure. The committee has adopted its bylaw and all of our operational activities are strictly in compliance with the bylaw, and the committee normally has a bi-monthly committee to discuss important issues and drive collective efforts for critical projects. Key to success of this committee is the cross-functional collaboration. Up to now, the committee has more than 200 representatives or focus, serving as ambassadors of more than 40 internal business units and functions. The committee also trained over more than 100 data compliance specialists as the frontline compliance team. And the committee has been coordinating and working closely with the China ESG Committee and AI Compliance Committee, both of which I’m also driving in China. Let’s move to the second building block, process and guidelines. Based on national legislation, administrative regulations, and a number of group policies, our committee has drafted and issued more than 40 guidelines and playbooks covering eight practical areas, for example, data cross-border transfer, data categorization and classification, and AI compliance, et cetera. The guidelines and playbooks helped us to implement detailed rules in routine data security and privacy protection governance on a daily basis. Our third building block is about five work streams of the committee, which we normally roll out annually. The first three are initiated at the forefront and will be deep-dived continuously. Among these three work streams, data inventory mapping is the cornerstone, and data cross-border transfer is the key challenge. Privacy protection is always our top priority. At the same time, we are exploring and navigating another two new work streams. One is AI data security governance, and the other is how to utilize data as an asset. These two issues are also very hot topics in this forum. The fourth building block of our data security and privacy protection governance is how to use technology. to safeguard data and privacy efficiently. I only take one example, the AI guardrail tour developed by Lenovo. This picture illustrates how this tour works in large-language model scenario. In enterprise privacy domain, the guardrail can identify more than 17 types of personal identifiable information and the sensitive personal information in order to block them from inputting to the larger-language model and protect our customers’ privacy. This tour can also realize the identification and the rejection of data on the basis of self-defined keywords. Last but not least is the culture awareness and the internal education. Lenovo has established a training program of data compliance specialists, all of whom come from the business team. The training program is a closed loop with four steps. The committee will train more than 100 specialists by providing a series of professional courses on data security governance and the five work streams of the committee. Then the specialists practice relevant rules in their daily work while they have learned in step one. Then the committee will randomly check and inspect what they have implemented in practice and provide improvement otherwise. The last step is to recognize and award those specialists who contribute significant to the committee. So what I just mentioned is the primary governance framework and the practice of Lenovo China data security and privacy protection. Again, we as a China-based multinational company and a leading technology company are very honored to have this opportunity to share our thoughts and practice. on data security and privacy governance, and our AI for All strategy. Companies’ internal data governance should be strictly in compliance with the rule of laws, both in China and other jurisdictions, to ensure the products and services we provide are secure, reliable, and trustable. We have been learning from international advanced data governance experiences and best practices on one hand. On the other hand, we will continue striving for a more rule-of-law approach, thereby contributing to the healthy and sustainable development of the global digital economy. That’s all, and thank you for listening. Thank you very much, President Gao. Now, let’s turn to Mr. Li Wen,

Li Wen: Vice President of ZTE Corporation, please. Thank you, Professor Wu. Distinguished guests and experts, good afternoon. I am Li Wen from ZTE Corporation. It is a great pleasure to share with you the practice and exploration of ZTE’s data compliance governance at this meeting. Thank you for your trust and support. In the last few years, the new generation of information technology, such as cloud computing, big data, and AI, have promoted and integrated each other. And fields like smart cities, smart transportation, and smart medical care have developed rapidly, and the human society is moving towards a better future of digital intelligence. As a global leading provider of comprehensive communication solutions since 1985 and serving customers in more than 160 countries and regions worldwide, CTE will always adhere to its vision of to enable connectivity and trust everywhere. In 2016, CTE had launched a comprehensive digital intelligence transformation from process driven to data driven, and we are dedicated to build an automated cloud-fired company with a fully cloud-based, intelligent, and lightweight workflow. Releasing the value of data is a key element of corporate innovation, development, and management in the digital intelligence era. The premise is to ensure data security and compliance. After the effect of GDPR in the EU in 2018, more than 160 countries or regions in the world have formulated data protection laws and regulations, and China has also established the data protection legal framework with three laws of the cybersecurity law, the data security law, and the personal information protection law at the core. Against this background, CTE attached great importance to data security and privacy, and privacy protection strictly abides by the relevant laws and regulations, and the continuous implementation of data-comprised governance and the devote to… forming a virtual circle of value creation for compliance. The construction of DTS data compliance governance system follows the risk-oriented methodology. It is based on management commitment, staffing and organizational structure, and is carried out in six aspects, including the establishment of system and rules, risk monitoring, risk assessment, personnel training, security audits, and incident response to ensure data compliance of business activities. For example, as we know, cross-border data transfer is the high-risk data processing activities. CTE is one of the first batch of the companies in China to apply for data export security assessment according with the relevant national requirement. And in early this year, 2024, we obtained the approval from the Cyberspace Administration of China for the export of the reported personal information. CTE has conducted a special audit on the implementation of its signed data transfer contract to evaluate and verify the effectiveness of the company’s cross-border data compliance program. In order to further improve the efficiency and the quality of data compliance management, DTS developed a data compliance system which integrated the Privacy Center APP, Privacy Compliance Scanning, Data Protection Impact Assessment, the Data Leakage Response, and so on. This data compliance system can display the data compliance management in real-time and dynamically and realize the data compliance management. digitization, and also to provide a practical basis for the data intelligence transformation of companies’ comprise management. CTE continues to pay attention to authoritative certification for data security and personal information protection. Currently, all related products and services have been certified by ISO-IEC 27701, 2019’s Privacy Information Management System, European ePrivacy, and U.S. Trusted Certification, which indicates that CTE has reached the international advanced level in privacy protection technology and management ability, and is able to help global customers enter the area of digital intelligence more comfortably. In recent years, China has stepped up its efforts to cultivate and build a market of data elements, which put forward high requirements for the data compliance management of enterprises, and it is necessary for enterprises to adjust the strategy and key points of data compliance management dynamically according to the change of legislation, policies, and business development. On the one hand, enterprises still need to perfect its data compliance management system continuously. On the other hand, they also need to pay more attention to the new data compliance challenges that face the digital intelligence era, such as AI training data security compliance, algorithm governance, data transaction compliance, data competition compliance, and so on. 2024 is the year of the deepening development of China’s digital economy, and also a year for ZTE’s data-comprised governance to move forward steadily. In the coming 2025, ZTE will stick to its role as the driver of the digital economy, fully promote the deep integration of data intelligence business development and data-comprised, and contribute wisdom to a better digital intelligence society. The above is my sharing today. Thank you for listening.

Tang Lei: There will be more opportunities and more chances to deepen our insights sharing in the next steps, not only for the legal system, but also for the so-called legal ecology. So thank all of you, and today we stop here. See you next time. Thank you.

T

Tang Lei

Speech speed

99 words per minute

Speech length

776 words

Speech time

467 seconds

China’s data governance framework emphasizes security and development

Explanation

Tang Lei outlines China’s approach to data governance, which focuses on both security and development. This framework is implemented through various laws and regulations.

Evidence

China has enacted the cybersecurity law, data security law, and personal information protection law, providing basic provisions for data security and personal information protection systems.

Major Discussion Point

Data Governance Approaches and Challenges

Agreed with

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Zhao Jingwu

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

Differed with

Daniel Seng

Differed on

Approach to data governance

W

Wolfgang Kleinwächter

Speech speed

140 words per minute

Speech length

1082 words

Speech time

461 seconds

Multi-stakeholder collaboration is key for internet governance

Explanation

Kleinwächter emphasizes the importance of collaboration among all stakeholders in their respective roles for effective internet governance. He argues that no single entity can manage all aspects of internet governance alone.

Evidence

He cites the outcome of the World Summit on the Information Society 20 years ago as an example of this collaborative approach.

Major Discussion Point

Data Governance Approaches and Challenges

Agreed with

Jose Roberto de Andrade Filho

Zhao Jingwu

Agreed on

Need for collaboration in data governance

New technologies require updates to existing data governance rules

Explanation

Kleinwächter points out that the rapid advancement of new technologies necessitates updates to existing data governance rules. He suggests that the current governance landscape is complex and evolving.

Evidence

He mentions various forms of governance such as data governance, internet governance, cyber governance, AI governance, and ICT governance.

Major Discussion Point

Emerging Challenges in Data Governance

Agreed with

Tang Lei

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Zhao Jingwu

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

S

Shi Jainzhong

Speech speed

98 words per minute

Speech length

1056 words

Speech time

642 seconds

China has enacted cybersecurity, data security and personal information protection laws

Explanation

Shi Jainzhong discusses China’s legal framework for data governance. He highlights the enactment of key laws to address various aspects of data security and protection.

Evidence

He specifically mentions the cybersecurity law, data security law, and personal information protection law as core components of China’s data protection legal framework.

Major Discussion Point

Legal Frameworks for Data Governance

J

José Roberto de Andrade Filho

Speech speed

112 words per minute

Speech length

1528 words

Speech time

815 seconds

Brazil is developing data protection laws and AI regulations

Explanation

Jose Roberto de Andrade Filho outlines Brazil’s efforts in developing comprehensive data protection laws and AI regulations. He emphasizes the country’s focus on creating a robust legal framework for data governance.

Evidence

He mentions the recent approval of an AI law project in the Senate and the ongoing development of a national data economy policy.

Major Discussion Point

Data Governance Approaches and Challenges

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Daniel Seng

He Bo

Zhao Jingwu

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

Brazil’s data protection authority is consolidating implementation of data laws

Explanation

Andrade Filho discusses the progress of Brazil’s National Data Protection Authority (ANPD) in implementing data protection laws. He highlights the authority’s role in providing guidance and recommendations to data actors.

Evidence

He mentions that ANPD has been operational for four years and has published an extensive report on its activities.

Major Discussion Point

Legal Frameworks for Data Governance

Agreed with

Wolfgang Kleinwächter

Zhao Jingwu

Agreed on

Need for collaboration in data governance

D

Daniel Seng

Speech speed

132 words per minute

Speech length

1449 words

Speech time

654 seconds

Singapore uses a light-touch approach to content regulation

Explanation

Daniel Seng describes Singapore’s approach to internet content regulation as minimal and light-touch. He explains that while Singapore is an open society, it maintains some level of content regulation to ensure stability in its multicultural society.

Evidence

He mentions that internet service providers only restrict access to about 200 mass impact websites, mostly pornographic in nature.

Major Discussion Point

Data Governance Approaches and Challenges

Differed with

Tang Lei

Differed on

Approach to data governance

Singapore has laws addressing online safety, falsehoods and criminal harms

Explanation

Seng outlines Singapore’s legal framework for addressing various online issues. He discusses recent laws enacted to deal with harmful content, online falsehoods, and online criminal activities.

Evidence

He mentions the Online Safety Miscellaneous Amendments Act of 2022, the Protection from Online Falsehoods and Manipulation Act of 2019, and the Online Criminal Harms Act of 2023.

Major Discussion Point

Legal Frameworks for Data Governance

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

He Bo

Zhao Jingwu

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

H

He Bo

Speech speed

127 words per minute

Speech length

837 words

Speech time

395 seconds

Data quality management is crucial for AI development

Explanation

He Bo emphasizes the importance of data quality management in AI development. He argues that high-quality data is essential for improving the accuracy, stability, and interoperability of AI models.

Evidence

He suggests building and improving rules for the quality management of training data and formulating data quality management standards.

Major Discussion Point

Data Governance Approaches and Challenges

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

Zhao Jingwu

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

AI development is shifting from model-centric to data-centric approaches

Explanation

He Bo discusses the shift in AI development from being model-centric to data-centric. He argues that data resources have become the most core and fundamental elements in AI development, particularly with the advent of large language models.

Evidence

He mentions the emergence of AIGC (AI-generated content) and the increasing demand for high-quality data in AI development.

Major Discussion Point

Emerging Challenges in Data Governance

Z

Zhao Jingwu

Speech speed

139 words per minute

Speech length

826 words

Speech time

354 seconds

Cross-border data flows require balancing security and utilization

Explanation

Zhao Jingwu discusses the need to balance data security and utilization in cross-border data flows. He argues that China’s approach to cross-border data flows emphasizes both security and development.

Evidence

He mentions China’s regulation on promoting and regulating cross-border data flows issued in March 2024.

Major Discussion Point

Data Governance Approaches and Challenges

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Gao Huandong

Li Wen

Agreed on

Importance of data governance in the digital age

Cross-border data flows pose complex regulatory challenges

Explanation

Zhao Jingwu highlights the complexity of regulating cross-border data flows. He argues that there is no unified standard for international cross-border data flows, leading to challenges for multinational corporations.

Evidence

He mentions that most countries prioritize data security or national security in their domestic laws regarding cross-border data flows.

Major Discussion Point

Emerging Challenges in Data Governance

Agreed with

Wolfgang Kleinwächter

Jose Roberto de Andrade Filho

Agreed on

Need for collaboration in data governance

G

Gao Huandong

Speech speed

127 words per minute

Speech length

1010 words

Speech time

476 seconds

Lenovo has implemented a comprehensive data security and privacy framework

Explanation

Gao Huandong outlines Lenovo’s data security and privacy governance framework. He explains that the framework consists of five building blocks to ensure comprehensive data protection and compliance.

Evidence

He describes the five building blocks: governance structure, process and guidelines, key work streams, technology safeguards, and cultural awareness and internal education.

Major Discussion Point

Corporate Data Governance Practices

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Zhao Jingwu

Li Wen

Agreed on

Importance of data governance in the digital age

L

Li Wen

Speech speed

103 words per minute

Speech length

779 words

Speech time

450 seconds

ZTE has developed a data compliance system to improve efficiency

Explanation

Li Wen discusses ZTE’s efforts in developing a data compliance system. He explains that this system integrates various data protection and privacy management tools to improve efficiency and quality of data compliance management.

Evidence

He mentions that the system includes features such as Privacy Center APP, Privacy Compliance Scanning, Data Protection Impact Assessment, and Data Leakage Response.

Major Discussion Point

Corporate Data Governance Practices

Agreed with

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Zhao Jingwu

Gao Huandong

Agreed on

Importance of data governance in the digital age

Agreements

Agreement Points

Importance of data governance in the digital age

Tang Lei

Wolfgang Kleinwächter

Shi Jainzhong

Jose Roberto de Andrade Filho

Daniel Seng

He Bo

Zhao Jingwu

Gao Huandong

Li Wen

China’s data governance framework emphasizes security and development

New technologies require updates to existing data governance rules

Brazil is developing data protection laws and AI regulations

Singapore has laws addressing online safety, falsehoods and criminal harms

Data quality management is crucial for AI development

Cross-border data flows require balancing security and utilization

Lenovo has implemented a comprehensive data security and privacy framework

ZTE has developed a data compliance system to improve efficiency

All speakers emphasized the importance of data governance in the digital age, highlighting the need for comprehensive legal frameworks, balancing security and development, and addressing emerging challenges.

Need for collaboration in data governance

Wolfgang Kleinwächter

Jose Roberto de Andrade Filho

Zhao Jingwu

Multi-stakeholder collaboration is key for internet governance

Brazil’s data protection authority is consolidating implementation of data laws

Cross-border data flows pose complex regulatory challenges

These speakers emphasized the importance of collaboration among various stakeholders, including governments, private sector, and civil society, in addressing data governance challenges.

Similar Viewpoints

Both speakers highlighted China’s comprehensive approach to data governance, emphasizing the enactment of key laws to address various aspects of data security and protection.

Tang Lei

Shi Jainzhong

China’s data governance framework emphasizes security and development

China has enacted cybersecurity, data security and personal information protection laws

Both speakers from major Chinese technology companies discussed their organizations’ efforts to implement comprehensive data governance and compliance systems.

Gao Huandong

Li Wen

Lenovo has implemented a comprehensive data security and privacy framework

ZTE has developed a data compliance system to improve efficiency

Unexpected Consensus

Balancing data utilization and security

Tang Lei

Zhao Jingwu

He Bo

China’s data governance framework emphasizes security and development

Cross-border data flows require balancing security and utilization

Data quality management is crucial for AI development

Despite representing different sectors (government, academia, and industry), these speakers all emphasized the need to balance data utilization for development with ensuring data security, showing a surprising alignment across different stakeholders.

Overall Assessment

Summary

The speakers generally agreed on the importance of comprehensive data governance frameworks, the need to balance security and development, and the challenges posed by emerging technologies and cross-border data flows.

Consensus level

There was a high level of consensus among the speakers on the fundamental importance of data governance. This consensus suggests a growing recognition of the critical role of data in the digital economy and the need for robust governance frameworks. However, specific approaches and priorities varied somewhat between different countries and organizations, indicating that while there is agreement on the importance of the issue, there may still be divergence in implementation strategies.

Differences

Different Viewpoints

Approach to data governance

Tang Lei

Daniel Seng

China’s data governance framework emphasizes security and development

Singapore uses a light-touch approach to content regulation

While China emphasizes a comprehensive framework balancing security and development, Singapore adopts a more minimal, light-touch approach to content regulation.

Unexpected Differences

Overall Assessment

summary

The main areas of disagreement revolve around the specific approaches to data governance, with variations in emphasis on security, development, and regulation across different countries.

difference_level

The level of disagreement among the speakers appears to be moderate. While there are differences in approaches and emphases, there is a general consensus on the importance of data governance and the need to address emerging challenges. These differences reflect the diverse regulatory landscapes and priorities of different countries, which may complicate efforts to establish global standards for data governance.

Partial Agreements

Partial Agreements

Both speakers agree on the importance of collaboration and balance in data governance, but Kleinwächter emphasizes multi-stakeholder involvement, while Zhao focuses specifically on balancing security and utilization in cross-border data flows.

Wolfgang Kleinwähter

Zhao Jingwu

Multi-stakeholder collaboration is key for internet governance

Cross-border data flows require balancing security and utilization

Similar Viewpoints

Both speakers highlighted China’s comprehensive approach to data governance, emphasizing the enactment of key laws to address various aspects of data security and protection.

Tang Lei

Shi Jainzhong

China’s data governance framework emphasizes security and development

China has enacted cybersecurity, data security and personal information protection laws

Both speakers from major Chinese technology companies discussed their organizations’ efforts to implement comprehensive data governance and compliance systems.

Gao Huandong

Li Wen

Lenovo has implemented a comprehensive data security and privacy framework

ZTE has developed a data compliance system to improve efficiency

Takeaways

Key Takeaways

Data governance requires balancing security and development/utilization

Multi-stakeholder collaboration is crucial for effective internet and data governance

Countries are developing and refining legal frameworks for data protection, AI regulation, and cross-border data flows

Corporate data governance practices are becoming more comprehensive, with frameworks addressing security, privacy, and compliance

Emerging technologies like AI are creating new challenges for data governance that require updates to existing rules

Cross-border data flows pose complex regulatory challenges that require international cooperation

Resolutions and Action Items

None identified

Unresolved Issues

How to effectively regulate AI training data and algorithms

Balancing data security requirements with the need for cross-border data flows

Addressing potential monopolization of data by large tech companies

Harmonizing different national approaches to data governance internationally

Suggested Compromises

Light-touch content regulation combined with self-regulation by internet companies

Balancing data security requirements with mechanisms to promote data sharing and circulation

Developing flexible AI regulations that can adapt to rapidly changing technology

Thought Provoking Comments

Governance in the digital age means you have to have a specific solution, governance model, for each of the specific issues. There is no one-size-fits-all that you say this is the governance for the data or this is the governance for AI. You have to identify the problem. What do you want to govern? What is the subject? And then to build the governance model around the system.

speaker

Wolfgang Kleinwächter

reason

This comment challenges the notion of a universal governance model and emphasizes the need for tailored approaches to different digital issues. It’s insightful because it recognizes the complexity and diversity of digital governance challenges.

impact

This comment shifted the discussion towards a more nuanced understanding of governance in the digital age, encouraging participants to consider specific solutions for different aspects of digital technology rather than seeking a one-size-fits-all approach.

In the digital age, the social relations are also being digitalized and datafied, such as between individuals, between firms, between individuals and firms, between individuals and governments, between firms and government departments, and among the government departments at center.

speaker

Shi Jainzhong

reason

This comment provides a comprehensive view of how digitalization is transforming various social relationships. It’s thought-provoking because it highlights the pervasive impact of digital technology on all aspects of society.

impact

This observation broadened the scope of the discussion, encouraging participants to consider the wide-ranging implications of digitalization on social structures and relationships, beyond just technical or legal aspects.

We have to discuss a lot of, I would say, elements that will serve as base for this data economy development. In China, for example, you have Shanghai Data Exchange and the local data exchanges all over. That is a fantastic example of how data assets can generate value even being, as I saw in Shanghai, data can be declared in the balance sheet of companies.

speaker

Jose Roberto de Andrade Filho

reason

This comment introduces the concept of data as an economic asset and provides a concrete example of how this is being implemented in China. It’s insightful because it bridges theoretical discussions about data governance with practical economic applications.

impact

This comment shifted the discussion towards more practical considerations of data governance, particularly in terms of economic value and business practices. It encouraged participants to think about the tangible impacts of data policies on economic development.

To solve this issue of insufficient data resources, it is recommended to strengthen the policy guidance, encourage and support leading companies to open and share the valuable data. Meanwhile, it is also recommended to open and share valuable data.

speaker

He Bo

reason

This comment addresses a key challenge in AI development – access to data – and proposes a solution that involves collaboration between large and small companies. It’s thought-provoking because it suggests a shift in how data is viewed and shared in the AI industry.

impact

This comment introduced a new perspective on data sharing and collaboration in the AI industry, encouraging participants to consider policy solutions that could foster innovation while addressing data access inequalities.

Overall Assessment

These key comments shaped the discussion by broadening its scope from purely legal or technical considerations to encompass social, economic, and practical aspects of data governance. They encouraged a more nuanced and multifaceted approach to understanding the challenges and opportunities of the digital age, emphasizing the need for tailored solutions, consideration of social impacts, economic potential of data, and collaborative approaches to data sharing. The discussion evolved from theoretical frameworks to more concrete examples and practical policy considerations, reflecting the complex and rapidly evolving nature of data governance in the digital era.

Follow-up Questions

How can we strike a balance between high-quality development and high-level security in data governance?

speaker

Tang Lei

explanation

This is important as it addresses the core challenge of promoting data utilization while ensuring data security, which is crucial for sustainable development in the digital age.

How can we improve the legal system for data governance to address new challenges brought by emerging technologies?

speaker

Tang Lei

explanation

This is crucial for ensuring that legal frameworks keep pace with rapid technological advancements, particularly in areas like AI and big data.

How can we strengthen international exchanges and cooperation on the legalization of data governance?

speaker

Tang Lei

explanation

This is important for creating a globally coordinated approach to data governance, which is essential in an interconnected digital world.

How can we define and differentiate between various types of governance (data, internet, AI, cyber, etc.) in the digital age?

speaker

Wolfgang Kleinwächter

explanation

This is important for clarifying the scope and boundaries of different governance areas, which can help in developing more targeted and effective policies.

How can we manage the contradiction between the need for universal norms and the existence of 193 national jurisdictions in data governance?

speaker

Wolfgang Kleinwächter

explanation

This is crucial for addressing the challenge of creating global standards while respecting national sovereignty in the digital realm.

How can we configure rights related to data in the digital age?

speaker

Shi Jainzhong

explanation

This is important for establishing clear legal frameworks around data ownership, use, and protection in the evolving digital landscape.

How can we ensure fair competition in the digital economy, particularly regarding the use of data and algorithms?

speaker

Shi Jainzhong

explanation

This is crucial for preventing monopolistic behaviors and ensuring a level playing field in the data-driven economy.

How can we develop a national data economy policy that balances economic competitiveness with people-centered development?

speaker

Jose Roberto de Andrade Filho

explanation

This is important for harnessing the economic potential of data while ensuring that the benefits are distributed equitably and align with societal values.

How can we improve mechanisms for data sharing among companies, particularly to benefit smaller companies and startups?

speaker

He Bo

explanation

This is crucial for fostering innovation and preventing data monopolies in the AI and tech industries.

How can we establish comprehensive rules for data quality management, particularly for AI training data?

speaker

He Bo

explanation

This is important for ensuring the accuracy, objectivity, and diversity of data used in AI development, which directly impacts the quality and fairness of AI systems.

How can we ensure the security of cross-border data flows while promoting necessary data exchange for global digital economy development?

speaker

Zhao Jingwu

explanation

This is crucial for balancing national security concerns with the need for international data flows in an increasingly interconnected global economy.

How can companies effectively implement data compliance governance systems that adapt to rapidly changing legislation and business environments?

speaker

Li Wen

explanation

This is important for ensuring that businesses can maintain compliance while remaining agile in a fast-evolving regulatory landscape.

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Day 0 Event #35 Empowering consumers towards secure by design ICTs

Day 0 Event #35 Empowering consumers towards secure by design ICTs

Session at a Glance

Summary

This discussion focused on the Internet Standards Security and Safety Coalition (IS3C) and its efforts to promote a more secure and safer internet. The session began with an overview of IS3C’s work, including reports on IoT security by design, education and skills, and government procurement of secure ICT. Janice Richardson presented the concept of a “hub” for cybersecurity collaboration, emphasizing the need for education and diversity in the field.

Bastiaan Goslings discussed IS3C’s report on the deployment of DNSSEC and RPKI standards, highlighting the importance of these technologies for internet security. The panel on consumer protection featured representatives from Lithuania and Singapore, who shared their countries’ approaches to internet safety and regulation. They emphasized the need for international cooperation and a balance between regulation and industry incentives.

The discussion then turned to IS3C’s future plans, including a new project on IoT security and post-quantum cryptography in collaboration with AFNIC. This project aims to examine the societal impacts of IoT and the challenges posed by quantum computing to current security measures. The speakers stressed the importance of addressing these emerging technologies and their potential consequences.

Finally, the session concluded with an update on IS3C’s organizational development, including plans to become an Internet Society special interest group and potentially establish itself as a non-profit foundation. These changes aim to expand IS3C’s reach and funding opportunities while maintaining its role as a dynamic coalition within the IGF structure.

Keypoints

Major discussion points:

– The Internet Standards Security and Safety Coalition (IS3C) is working on initiatives to improve internet security and safety, including IoT security, education/skills, and government procurement practices

– IS3C is planning to create a “hub” to bring together experts and stakeholders to collaborate on cybersecurity solutions

– International cooperation is crucial for addressing cross-border cyber threats and creating harmonized security standards

– Consumer protection and empowerment is an important focus, including through security labeling schemes and regulations

– IS3C is launching a new project on the societal impacts of IoT and post-quantum cryptography

Overall purpose:

The discussion aimed to provide an overview of IS3C’s work and future plans to improve internet security and safety through various initiatives, research, and stakeholder collaboration.

Tone:

The tone was informative and optimistic throughout, with speakers enthusiastically describing ongoing and planned efforts to address cybersecurity challenges. There was a sense of urgency about the need for action, but also confidence that progress is being made through collaboration and new initiatives.

Speakers

– WOUT DE NATRIS: Moderator, Coordinator of the Internet Governance Forum dynamic coalition on Internet Standards Security and Safety (IS3C)

– JANICE RICHARDSON: CEO of Insight, IS3C Working Group 2 Chair on Education and Skills

– BASTIAAN GOSLINGS: Works for .nl registry IDN, former member of IS3C Working Group 8

– STEVEN TAN: Assistant Director of the Cyber Security Agency of Singapore, leads the Safer Internet Mobile and IoT security team

– KRISTINA MIKOLIŪNIENĖ: Council member at RRT (Lithuanian Communication Regulatory Authority)

– NICOLAS FIUMARELLI: Chair of IS3C Working Group 1 on IoT security by design

– ELIF KIESOW CORTEZ: Member of IS3C Working Group 9 on emerging technologies

– JOÃO MORENO FALCÃO: Member of IS3C working group on IoT

Additional speakers:

– Mark Carvell: IS3C senior policy advisor and rapporteur for the session

– David Huberman: Chair of IS3C Working Group 8 (mentioned but not present)

Full session report

The Internet Governance Forum session on the Internet Standards Security and Safety Coalition (IS3C) provided a comprehensive overview of ongoing efforts to enhance internet security and safety. The discussion, moderated by Wout de Natris, brought together experts from various backgrounds to explore key initiatives, challenges, and future plans in the realm of cybersecurity.

Internet Security Standards and Best Practices

A central theme of the discussion was the critical need for widespread deployment of existing security standards. Bastiaan Goslings, formerly of IS3C Working Group 8, highlighted the importance of DNSSEC and RPKI for securing internet infrastructure. However, he noted that implementation challenges persist due to perceptions of cost and complexity. This sentiment was echoed by Steven Tan from Singapore’s Cyber Security Agency, who emphasised the importance of balancing regulation and incentives for industry adoption.

Kristina Mikoliūnienė from Lithuania’s Communication Regulatory Authority advocated for a holistic approach to internet security regulation. This perspective aligns with the overall consensus that a comprehensive strategy is necessary to address the multifaceted challenges of cybersecurity.

Consumer Protection and Empowerment

The discussion highlighted the challenges and opportunities in consumer protection and empowerment. Steven Tan stressed the importance of building digital trust and secure systems, arguing that developers and service providers must prioritize security. The speakers discussed the potential role of certifications and security labels in empowering consumers to make informed decisions about online products and services.

Both Tan and Mikoliūnienė agreed on the importance of raising awareness and educating consumers about cybersecurity risks and best practices. They emphasized the need for collaborative efforts between governments, industry, and civil society to address these challenges effectively.

International Cooperation on Cybersecurity

The speakers unanimously agreed on the crucial need for international cooperation in addressing cybersecurity challenges. Steven Tan highlighted the importance of shared threat intelligence and common security standards, as well as partnerships between countries and industry. Kristina Mikoliūnienė emphasised the value of learning from other countries’ experiences and the need for clear problem definition and active participation in international efforts.

This focus on collaboration was further reinforced by a video presentation on the concept of a “hub” for cybersecurity collaboration. This hub would bring together experts and stakeholders to work on solutions, addressing the need for better education and diversity in the field. The presentation outlined the potential benefits of such a hub, including improved knowledge sharing and more effective problem-solving.

Emerging Technologies and Future Challenges

The discussion also touched upon the challenges posed by emerging technologies. Nicolas Fiumarelli reported on the analysis of IoT security regulatory documents across various countries, highlighting the fragmentation of approaches. Elif Kiesow Cortez and João Moreno Falcão emphasised the need for research on the societal impacts of IoT and post-quantum cryptography, stressing the importance of understanding the social implications of current IoT security status.

IS3C Organisation and Future Plans

Wout de Natris outlined IS3C’s future plans, including becoming an Internet Society special interest group and potentially establishing itself as a non-profit foundation. These changes aim to expand IS3C’s reach and funding opportunities while maintaining its role as a dynamic coalition within the IGF structure.

De Natris also announced a new project on IoT security and post-quantum cryptography in collaboration with AFNIC, with a report to be delivered at IGF 2025. This initiative underscores IS3C’s commitment to addressing emerging technologies and their potential consequences.

Additionally, IS3C plans to create capacity-building programs and continue its work beyond 2025. The coalition’s previous work on procurement was also highlighted, demonstrating its ongoing commitment to improving cybersecurity practices across various sectors.

Key Takeaways and Action Items

The discussion yielded several key takeaways, including the need for more widespread deployment of existing security standards, the importance of consumer protection and empowerment, and the critical role of international cooperation in addressing global cybersecurity challenges.

Action items emerging from the session included IS3C’s plans to organise a first event on consumer protection in the new year, apply to become an Internet Society special interest group, and convene a meeting in January to discuss the creation of a cybersecurity hub.

Nicolas Fiumarelli announced an upcoming IS3C session on Thursday, encouraging participants to attend for further discussions on cybersecurity initiatives.

In his closing remarks, Wout de Natris provided an overview of IS3C’s history and achievements, highlighting the coalition’s growth and impact since its inception. He also mentioned a QR code available for accessing additional IS3C resources.

In conclusion, the session provided a comprehensive overview of IS3C’s work and future plans, emphasising the need for collaborative efforts to improve internet security and safety. The discussion highlighted the complex challenges facing the cybersecurity landscape and the importance of multi-stakeholder cooperation in addressing these issues.

Session Transcript

WOUT DE NATRIS: Thank you and welcome to this ICC workshop on empowering consumers towards secure by design ICTs. But I have to admit that this flag does not cover the all the topics we are about to share with you. Things change over time. My name is Walter Nazis and I’m the coordinator of the Internet Governance Forum dynamic coalition on the Internet standards security and safety, or ISVC and I am your moderator today. ISVC has an overarching theme to make online activity and interaction more secure and safer by achieving more widespread and rapid deployment of existing security related Internet standards and ICT best practices. We cover through reports and IoT security by design tertiary secure cybersecurity education and skills and government procurement. We have also published two tools, and the first by presenting a list of covering the most important Internet standards aimed at operability plus how to secure websites. And the second we present to you today in a, in a few moments. You can find our work on our website, www.is three coalition.org, or on the website. In this session we will present our upcoming work and our plan to create a hub. I’m the first to see a video on this topic, so stick around. ISVC has ended the first phase of some of our priorities. It’s time to move forward by putting theory into practice. ISVC strives to create capacity-building programs so that our guidelines, recommendations and tools will be implemented around the globe in the coming years, leading to more harmonized and not isolated security actions. But that is the future. Let’s turn to now. Today we will first learn about the hub by Janice Richardson. Next, Basiaan Gosselinks will present on ISVC’s latest tools, our outcome for 2024. And this is followed by a panel on consumer protection. And we end with our plans for 2025 and beyond. But first, the hub. Janice, I think that you’re online and I would like to present the word to you. Janice is the CEO of Insight, based in Luxembourg, and is the ISVC Working Group 2 Chair on Education and Skills. Janice, the floor is yours.

JANICE RICHARDSON: Thank you and good afternoon, everyone. I’m sure you’re all aware that we’ve gone through a tectonic shift in the security landscape over the last couple of years. The speed, the ferocity of cyber attacks are coming faster and faster, and no one is really prepared for this. The rise of generative AI also has made it much easier to cyber attack many of the applications that we use daily. Organizations have increasingly moved their business to the cloud. And once again, this is a point of fragility. Also, identity-based attacks are growing considerably through social engineering. This raises a question, what can we do because the traditional way of cyber attacks is no longer valid? We need to educate, educate at all levels. We learned a couple of years ago when we did a study that in fact, young people are coming out of tertiary education, they’re really not prepared to kickstart their career in industry. Industry is decrying this lack, decrying the gap and asking for better tertiary education. But I’d like to go back even further, because cybersecurity depends on every single one of us. We are all the weak link in the chain. And therefore, I think we all need to be much more aware of what cybersecurity means for us. And this goes right back to the first classes of elementary school. Over the last couple of weeks, I’ve done a quick scan of what’s available to help young people know how to use computers, technology safely and securely. And what I realized is that we’re really not getting to the heart of cybersecurity. We teach about hard passwords, but we’re not teaching the fundamentals. And this is actually what we learned from the study that we did and that we published at the IGF two years ago. Industry considers we need to get back to basics. Young people need to understand the architecture of the internet, the architecture of the cloud, if they’re really going to help find innovative solutions. Having education and training, I’ve already mentioned that, but every single person must be aware of how we can very easily be victim of social engineering. Even people like ourselves. consider ourselves experts in the field. We need to improve collaboration. In tertiary education, professors are lecturing with their own resources, and yet industry has some fabulous resources available. If only they would share these resources, if they would improve the collaboration, there is a real gap. Industry doesn’t know what’s being taught, but just knows that not the right things are being taught, and education is struggling to find the answers. We also need to boost diversity. I don’t know how many people are in this room right now, but usually I’m one of the few women talking about cyber security. If we don’t have women, if we don’t have different races, if we don’t have a broad overview of the population working in cyber security, we really cannot fully understand where the breaches are, and how to improve them. And of course, we need to upgrade recruitment procedures. These in-service trainings are really not working for anyone. Young people are there making the coffee when they should be there, really understanding how cyber security needs to work, and how they can be part of a team. This has led us to push for a hub. What is a hub? Well, it’s a place where people from all walks of life, interested and involved in the cyber security system, would meet, would exchange ideas. It’s a place where there would be room for the general public, room for youth, room for everyone to discuss and find the best ways ahead. Cyber security is not going to lessen. Every day we’re learning about new AI tools. tools. This morning I was listening to intuitive AI, which adds further burdens to the system. So my call for action here is join us. Join us to create a hub. Create a hub where we can all work together and start finding solutions and making the public aware that they also are the weakest link in the chain. And when I talk about young people, I’d like to say that they very often have a lot of solutions. If only we know how to work with them, how to guide them, but not put ideas into their mouth. We’ve worked with young people, thanks to Buchanan Coal and Tony Grillo. Pixel Blue was the company. We’ve actually worked with young people in Canada. They have created a video. And I really think that this brings together the ideas of why we need a hub, how to make that hub, and maybe a glimpse of the future. So I’m calling on you. Join us. We’ll be running meetings in January. Join us to help the hub become a reality. Back to you, Selby, to play the video.

VIDEO: So it is the dawn of the internet. The world is suddenly connected like never before. The free flow of information reveals a global community brimming with innovation. Welcome to the world wide web. But there are those who seek to subvert the web. web, to poison its promise for ill-gotten profit. It is the dawn of the Internet. The world is suddenly connected like never before. The free flow of information reveals a glimmer of hope. We are still trying to find out how to get the movie on screen. Okay, are there any questions for me while you’re getting the movie on screen? I’m very

WOUT DE NATRIS: Is there a question in the room? I don’t see any fingers. So, let’s watch this video. Shelby is trying to figure it out for the guys at the technique section.

VIDEO: So Shelby is getting back and here is our video on the hub. It is the dawn of the internet. The world is suddenly connected like never before. The free flow of information reveals a global community brimming with innovation. Welcome to the world wide web. Seek to subvert the web. To poison its promise for ill-gotten profit. Necessary and existing security measures are not built in by design. Cybercrime becomes big business, exploiting the cracks in our defenses, taking advantage of our trust. taxing our resources, leaving countless victims. Our leadership struggles to develop a coordinated response. Our defense is disorganized and outdated. We’re left to fend for ourselves. To protect our global connection, experts around the world come together to form the vanguard of cybersecurity. The Hub. Populated with the smartest people on the planet, using the most effective solutions available. With adequate funding and collaboration, the Hub grows. Schools are empowered to provide state-of-the-art training. A new generation of cyber warriors enters the battlefield. Citizens of the web have open access to protection, ensuring the security of every link in the system. Put an end to cybercrime, once and for all. Support the Internet Standards Security and Safety Coalition. Let’s build the Hub.

WOUT DE NATRIS: Yes, I think that’s This is made by a good friend of mine called Tony Grillo. And he works with a university in Canada where the department is called Pixel Blue. And their students made this as a graduation assignment. And then it was finished by the head of the department to get some finishing touches together. But I think it’s a very powerful video, as Jenna said. Are there any questions on the idea of the Hub, or what it could do, or what it could do for you? Janice, as a final question from my side. How do you envision the next step for early in 2025? What are your plans?

JANICE RICHARDSON: First, I think that. All of those interested need to sign up. We will inform you when we’ll be conducting a meeting in January to see concretely how we can put this together. So first step, call for action. Sign up please to the IS3C. Keep an eye on the date that we will announce and then come with your ideas on how we can put this together and the road ahead.

WOUT DE NATRIS: Great Janice, thank you very much and we’ll be looking forward to the dates that will be announced on the IS3C website and beyond very soon. Thank you very much. The next is that Basia Gosseling is in the room. Basia works for the .nl registry as IDN nowadays but when we started this project we were on working group aid in Ireland. We are one of the two sponsors of this project. The result is some guidelines that we produce on arguments and Basia will lead us through his presentation to show what this work is and how it came about and what the recommendations are. Basia. Thank you, oh you can understand me?

BASTIAAN GOSLINGS: Thank you Wout for the introduction and I think that’s being announced I think you know that emphasizes you know the urgency of security standards having to be deployed and I’m proud you know that I can be here to share an overview of an endeavor, an IS3C endeavor that was recently finalized and in this particular case on deployment of standards DNSSEC and RPKI. So I have 10 minutes to go through this and you know I also want to give you the opportunity to reflect on it and give statements or questions. This is going to be, I’m not going to be able to go into details, the report is publicly available on the ISO 3303 website. But I think you know, it’s good to take the opportunity here to give you an overview of what we’ve been doing. So in a nutshell, the problem statement, probably you’re all aware, but the domain name system and as well as a global system for internet routing are both fundamentally important when it comes to the functioning of the internet overall. Everything else depends on it. The functioning of naming, numbering, and then you know, the combination of that and the way that internet routing works. If there’s an issue there, then any content or any communication that relies on it, you know, is affected. So that leads to the conclusion that if there are standards available that can improve those fundamental technologies, the security of them and increase trust in online services provided and online presence of entities and individuals, then that would at least give you an indication, right? This is something that you need to implement or if you purchase services from someone else, but that particular vendor has taken this into account. These technologies have been available for quite a long time in internet terms, but deployment, it’s different across operators, it’s different across regions, and we’ve seen growth, but it’s still lacking. So in order to have a real impact, this deployment needs to be increased, but what’s the reason for that? So this was something, you know, that fed into this effort about also mentioned the fact that the RIPE NCC and I can support it this kindly. And there’s a lot of technical documentation available, many reports over the years looking at these techniques. And when I worked for the RIPE NCC, and also with regard to RPKI to improve the security of routing, all the knowledge is there. And there has been quite some engagement effort, right, to increase deployment, but we thought, hey, maybe there’s a different narrative. necessary, and that’s what the working group aimed at. So again, you know, the deployment of these standards is fundamental. I think it’s really important to emphasize that, you know, that routing and the way the DNS works, everything else depends on it. So whether it’s for organizations, whether it’s for public entities, public services, for business as well as individuals, to main trust, you know, in terms of internet content consumed, internet services used, internet presence. It’s fundamental that those technologies work properly and are secure. So then at least when it comes to these technologies, it sounds like a no-brainer, but at least consider looking at them. So either when it comes to your own network, your own devices that you have control over, which you can configure, you know, think about implementing them there. Or otherwise, if you purchase services, whether it’s from a transit provider or a cloud operator or other infrastructure services, then make it part of your procurement process to include these types of criteria. Because again, everything else depends on a secure internet routing and a secure DNS. So why is deployment lacking? And I will not go into the numbers and details. There’s more in the report, so please go ahead. The URLs, the links are included later on. But there are a number of points that were raised by the working group of experts that were involved in this. On the one hand, you know, there’s the perception of cost and resource constraints, right? Like it takes additional knowledge, additional software, maybe additional hardware, control of this to manage all of this. People consider this to be quite technically complex. Not only the fact, you know, that you need to have the knowledge to actually use these type of standards. But also, if anything goes wrong, because these technologies, the underlying technologies are so fundamental, there’s a risk, you know, if anything goes wrong with implementation, that the provision of online services might be affected. And also, the working group considered, you know, that for quite a few entities, they’re just involved in their business, have their commercial reasons to do so or other reasons to do so. And they’re not even really aware of the risk, you know, this is very much under the hood of these type of technologies and how this works. So people are not really aware of it. And then they come to the lack of awareness, and maybe a lack of education, also, even when it comes, you know, to the engineers and the ICT people that are employed. And the last but not least, and then we can get more, you know, towards the target group that the report is aiming at. It’s not part of priorities, right? Even an ICT strategy, and everything that comes along with it, quite a few organizations don’t have that. So it’s not part of those strategic considerations and priorities. So as I mentioned, you know, although the technical reports are there, many analysis have taken place before, but the working group felt there was a reason for a new narrative and a number of elements fed into that. On one hand, you know, national cybersecurity resilience, the risks or the availabilities of online services, they’re so huge, if all of this breaks, if your internet doesn’t work, if you cannot communicate with your public authorities, because everything is done online, then you do have a serious problem. And we see in many countries, especially, I’m from the Netherlands, and so looking more at that part of the world, the western part of the European Union, specifically, more and more our sector, the internet sector is being regulated. And I think to some extent, rightly so, because of the risks and the, because of the risks involved. So there’s more and more regulatory pressure. So if you include these type of standards, as a base, best practice in the way you know that you approach your ICT strategy, then I think you’re already a step ahead. And then, of course, for commercial organizations, ICT and digital presence and online services, it’s part of your core business. It doesn’t really matter which business you’re in. It’s so important. So you have to consider at least these type of standards. And then maybe from a moral perspective, it’s not only about you as an individual. It’s not only about you as an organization. It’s about us as a society, as a whole. The internet as a global phenomenon as a whole, I think. So again, go back to the report. All the details are there. But to take some of the main takeaways from the conclusion, it’s about safeguarding an organization’s reputation. It’s protecting critical services, vital information related to infrastructure. The integrity and authenticity of online services can be improved by technologies like RPKI and you implementing DNSSEC. And I mentioned it a couple of times, I think, you know, this has to be part of your core business. Everything is online nowadays. It doesn’t really matter which line of business you’re in. So then we’d argue, please, decision makers, take this on board and include it in your strategic plans in order to promote trust in online services and also your own online presence. These are the experts that contributed to the document. Our gratitude goes out to them. A special shout out to our chair, David Huberman from ICANN. He put a lot of time and effort into this and herding cats, you know, this group of people. Unfortunately, he cannot be here, but I do want to mention him specifically. And we’re really grateful for all the time and effort he put into this together with the other experts. And of course, Wout, as a secretariat. And I mentioned, you know, this could not have been possible without the financial support of both ICANN and the RIPE NCC. Those are the websites of the I3C itself. And then, you know, the working groups and working group eight is there and you can find the report. This ends my summary. If there is anyone who has remarks, comments, questions, I’m happy to make an effort to answer them. Thank you.

WOUT DE NATRIS: Thank you, Basiaan. And thank you everybody who worked on this project because we really had really excellent comments from all people from all over the world who worked to get this together. You can find the document by scanning the QR code. And what I can add is that I’ve heard from both organizations that they’re really, really happy with this outcome. And the RIPE NCC will actually share it as of today now that it’s officially released with all their members, but also their colleagues at RIRs, the internet registries around the world. So if that is the sort of impact that our work has, then it means that we’re changing perhaps a little bit how people who have to convince their bosses can actually do so. So let’s hope that that will happen in the coming year. Working group eight will be closed this Wednesday officially because then we have our internal meeting, but also for me, David, also Basiaan, thank you very much for getting this together. And it is very much appreciated by ISVC memberships. Thank you. And a small applause for the work is certainly in place. Is there a question? It worked when we were at home. Soli, can you take a look whether this is the right code because it’s not working they say, but it worked when I tested it. Yeah. It’s a different… We’re going to try and change it so that the right code will come on, sorry for that. The next up is, okay, I can’t hear myself anymore for some reason. Oh yes, that’s it. As soon as you put it into something then the sound disappears. The next topic is on consumers, and what we have is that we tried to get a working group together in 2022 with consumer organizations, but then the finance did not work and then the specialist stepped away so it never really got off the ground. We talked to people at the ICF in Kyoto last year and that sort of started to revive it, and we hope to start some work on this topic of consumer protection in the next year. In the panel today, we have two consumer protection organizations. And we have Stephen Tong, and he is Assistant Director of the Cyber Security Agency of Singapore, and he currently leads the Safer Internet Mobile and IoT security team under the Cyber Security Engineering Center. And his work focuses on assessing cyber risk in the internet, mobile, and IoT domains, and develop initiatives to secure Singapore’s digital landscape. They’re both online, so hopefully we can see them on the screen soon. Welcome, Christina and Stephen. I think the first you have two minutes to introduce your organization, and what exactly is that, but it doesn’t make me start so Christine, you go first. Thank you.

KRISTINA MIKOLIŪNIENĖ: Yeah, hello, everybody in the room. Me, I’m Kristina Mikulina, I’m council member at RRT, it’s Lithuanian Communication Regulatory Authority. And we are a small country in the Eastern part of Europe. Going forward to our institution, RRT is a, started at the beginning as a pure technical organization. It was National Radio Frequency Agency many years ago and evolved to the big hub of regulation, starting from electronic communications and post railway sectors, and going forward to the big bunch of digital services as electronic signature, as electronic stamp or safer internet or hotline in general. So me, I am over 20 years, and this organization and beginning, I have worked in electronic communication field, with more with technical and economical aspects, then also with consumer disputes, going forward to postal and railway issues. And currently as a council member, I see strategic decision-making across all these sectors, and I’m working deeply with digital services, including safer internet and measures to combat child sexual abuse material online, or filtering measures and mechanism to protect minors. So shortly about me and my organization. Thank you.

WOUT DE NATRIS: Thank you, Christine and Steven.

STEVEN TAN: Hi there. Right. I think, firstly, thanks a lot for the introduction. Yeah, maybe a quick one. I think as we all know, right, online transactions used to be very pretty straightforward. You click a button and then you make a purchase, right? But as digital services evolve and becomes more interconnected, things got a little bit more complex. And while this… connectivity brings convenience, it also introduces a range of cyber risks that we can’t ignore, right? Scammers and cyber criminals are constantly finding clever ways to exploit vulnerabilities. We have all heard about data breaches, identity theft, and online scams. It has become something none of us can ignore anymore, right? This makes digital trust more important than ever. It’s about making people feel safe when they’re online, whether they are shopping, banking, or just browsing the internet. But digital trust isn’t just about users being careful, it’s about building secure systems that people can rely on without having to think twice, right? So, in the Cyber Security Agency of Singapore, it’s a national agency dedicated to protecting Singapore’s cyberspace. At CSA, we are all about co-creating a safer cyberspace, we work closely with the industry partners, raise public awareness, and of course, promote secure technology adoption. But at the heart of it, we also think that developers and service providers have a primary responsibility, right? They need to build security into their products right from the start, ensuring that there’s privacy, there’s data protection, and also secure development process are non-negotiable. And importantly, on the flip side, we also realize that consumers also need to play a role. They should better demand for security from the products and services they use. This is where, you know, certifications, security labels, and standards come into play. And that’s also one of the core businesses that we have in CSA, by providing transparency and giving companies a competitive edge when they prioritize security, right? So, essentially, that’s what CSA does, right?

WOUT DE NATRIS: Thank you, Stephen. I think you answered my first question already quite good, that how does your organization currently contribute to a more secure and safer internet for your country? And I think you gave some excellent examples. Now, is that in Lithuania, Christina, how does your organization currently contribute to a more secure and safer internet for all the people living in Lithuania?

KRISTINA MIKOLIŪNIENĖ: You know, RRT, so as a national regulatory authority, we also help and promoting internet as such. So we do market analysis to enhance competition in the market. We do any proposals for giving the frequencies or numbering to resources to the market participants. But at the same time, we see how the internet in general impacts end users, consumers, and that we have to see and help them to not be lost in the internet space in general. So first of all, thank you for helping, for making internet safer. So it’s really very helpful to know to each other the possibilities in the market. But internet knows no borders. So if one press looks for some information online, it goes, the information can go from any countries abroad. So it’s really important for us to act together, I think. And in Lithuania, we have the holistic approach. We, being a hub of regulation, we can impact the market participants, beginning from the operators for market participants. So in the level of interconnection, then we can go forward to different problems occurring with numbering resources, that numbering resources wouldn’t be used for fraud or any forbidden actions in general. And also we see that bullying or scam or child sexual abuse material, they are also online. And we, as a hotline, we do some, not some, but many. actions or not only also active clearing the internet against the children’s prohibited information. We also have some requirements for fixed and mobile networks. We also have, as I said, numbering resources. We acting as independent auditor for trust services or electronic identification services that these services will not be not so secure in the especially where the state is giving the security level high security level for consumers. We also pre-trial authority for consumer dispute resolution. It means that you as a consumer and user you can go to us if some operators acts not according the requirements that you are somehow not you feel not so safe or secure according your agreement. And also we have very special attitude to minors. We have a special law already from 2011 and implemented in the level of state the hotline. We also have international cooperation. We are part of InHope Arachnid projects. We are also have an agreement with Interpol to make internet safer. So we are also trust flagger in different platforms as Google, YouTube, TikTok or Discord. We also trying to raise the awareness in any of these different layers. So the holistic approach and being a regulatory hub helps us to be everywhere or to try to be everywhere on time. Because in internet, every second matters. Because if you push a button, the same time, the same second, it makes an impact to consumer or any internet user or not always the very positive impact. And of course, I think that priority is very important. Knowing that internet is so huge and interact in all different layers, it’s very important to set the right priorities. For example, in the world, in the whole world, there are over 200 countries, but hotlines implemented on the state level are only 10. And only five of them are in European countries. And we are one of them. So actually, I’m proud to be part of that system, which makes internet safer for anybody, especially for minors, who do not have a possibility to be safer, because they cannot protect themselves. Thank you.

WOUT DE NATRIS: Thank you, Christina. I think that I heard from your answer three topics that we can move on to. One is that we have heard from Stephen, where there’s a responsibility in terms of themselves, but we also heard about the industry and the role that industry plays. And the next, that there is a complete international component that makes it extremely hard to actually do something as an organization from one specific country. To look at the industry itself, to start with, because they are often the organization that could put forward a solution towards more security. like we heard from Rossi on internet standards and the deployment. But there are some, is this something that you took care that the ICT industry could have? Is it something that you ever thought about the deployment where security of the internet is concerned and for example, with the deployment of security on the internet standards that would make the end user far more safer than currently it is? Is that something that you’ve discussed among yourself? And let me start with you first, Stephen.

STEVEN TAN: Right. I think firstly, the short answer would be absolutely. Right. Why so? I think firstly, the clear duty to care rules can push ICT providers to adopt stronger security measures. When regulatory framework set minimum security expectations providers out there, developers out there have no choice but to comply, right? This help makes security a standard practice and not just a competitive edge, right? So in Singapore, we have rolled out initiatives like the internet hygiene portal which sets a strong example by encouraging businesses to adopt secure practices by default and then publicly recognizing those that excel in security through internet hygiene rating. Similarly in Singapore, we have also launched out a safe app standard as well as a cybersecurity labeling scheme for IoT products as well. This shows how setting clear expectations can actually offer developers and providers some public facing recognition and then drive compliance and even giving businesses a business niche or market advantage, right? This balance of regulation and industry recognition is important. It helps to motivate companies to go beyond the bare minimum, right? And we do understand that at. Many a times, regulation isn’t just everything, right? It works best when you pay with incentives like certifications, security labels, or even industry recognition itself, right? This creates clear differentiation and give businesses that competitive edge, encouraging they themselves to not only meet but exceed minimum security requirements. And what we really intend to do is that we hope this actually motivates continuous improvements. And of course, innovation in cybersecurity practices for the various enterprises and business out there, right? So when we are looking at the duty to care, we thought it’s important that some rules will be useful, but it should be a good mix between regulations as well as incentives, right? To actually help to match in the industry to move on forward.

WOUT DE NATRIS: Yes, and creating a level playing field as I also understand from your words. I think that is a very encouraging answer that you gave that it’s not just about regulation and the hard side of the law, but that the softer side of the law is just as important. How is that in Lithuania, Kristina?

KRISTINA MIKOLIŪNIENĖ: As I mentioned before, yes, we have rules. We have in each level of internet interaction, in a field of interaction, we have some particular part, some amount of rules, but I totally agree with Stephen that is not, rules are not everything. Rules are only the, too many rules brings the market participants to the insecurity feelings. And they do not want to invest, especially in the levels, in the areas where investments are not so profitable. So actually as a representer of regulator, I would suggest to be on the good. the balance between regulation and between motivation. Maybe some, if you want to have some requirements for market participants, you have to give the regulatory qualities or something like that. Not to, and not convince very strictly in every point where you need to have more security, internet security. Because, you know, at the end of the day, everything costs money. And if you will require, only require, that all the investments will be paid by their consumers. And are consumer ready for it? Are consumer ready to pay for every security implementation on the market? I am not so sure. So I think that right balance is the best idea.

WOUT DE NATRIS: We’re also talking about the international component. In what way could citizens of your countries profit from international cooperation that would ensure a secure and more secure and safer internet? Steven.

STEVEN TAN: I think when it comes down to international cooperation, right? We must firstly understand that global cooperation would potentially, or, you know, be seen as, you know, shared threat intelligence, common security standards. And of course, faster responses to incidents, you know, but at times we do understand that that’s not what is really happening. But if we were to actually do it carefully, intricately, this is what we actually foresee. Governments play a crucial role by sharing cyber threat information, coordinating responses, and even collaborating on joint research initiatives, right? This transparency would help to build collective resilience and ensure that no country is left vulnerable due to isolated cyber security efforts, right? So in CSA, some of the things that we have done is that we have built strong partnerships with key industries. players like Akamai, Google, Microsoft, even non-profit organizations like APNIC and even in the Internet Society. These collaborations coupled with government-led information sharing efforts would enhance our cybersecurity capabilities through joint intel sharing, training, and even research initiatives. Such collaborations would also allow us to enhance our cybersecurity capabilities. For example, by working together on securing IoT devices, we will be able to align on common security baselines, ensuring that consumers worldwide have access to safer products. These partnerships will also help address cross-border cyber threats more effectively, making it harder for attackers, even scammers, to exploit gaps between different regions. In the long run, having international cooperation would mean better protection, enhanced trust, and more resilient digital services for everyone. We have identified and even noted that cross-border cyber threats are tough to tackle alone. International partnerships between countries, even between the government and the industry, will create a united front, making it harder for attackers to exploit gaps between different regions. At the end of it, I really hope that through international cooperation, this will actually help to enhance the protection, and at some point in time, we will actually gain back the digital trust for everybody.

WOUT DE NATRIS: Some very important comments on making the world more secure and safer. Christina, what’s your thought about the international cooperation and if that could make citizens more secure and safer?

KRISTINA MIKOLIŪNIENĖ: Yeah, so internet, as I mentioned before, internet has no borders, so it’s very important to be part of a big family. So we, almost every… Everybody knows that sometimes synergy gives not 1 plus 1 equal 2, but 1 plus 1 equal 3 or even 4. So I think this is the result of international cooperation, and this is the reason why we are part of ARAKNIT or INHO projects, which are going global to make our children and in general consumers safer on the Internet. And you know, we have even the proverb in Lithuania that the fool learns from their own mistakes, but the wise person learns from other mistakes. So I think it’s a very good sign to learn from other mistakes and not repeat the same mistakes in every country because of separately views or attitudes to the same issues. And it’s, I think, so, you know, every time we do the market analysis, we search for experience in other countries and collecting the experience from other countries. We do the obligations, which suits for Lithuania, for small country in Eastern European part, but still valid all around the globe. And I think the Internet being such an international thing must be treated also internationally, because if we agree on values, we share, we do the best in terms of all of us. So I think we have to cooperate. and work together in order to have the best results, and then everybody will win from it.

WOUT DE NATRIS: Thank you, Kristina. I think that you’re totally right, that in the end the challenges for everybody in every country, every organisation on the internet are about the same, because the threats come from the same sources, most likely. As ISRC, we hope that we can start working on this to create some sort of a blueprint on this topic, or whatever we would like to call it, so that the same sort of information goes out to the alliance organisations. It would be a good step, I think, a first step to try and get this international cooperation going. What would be your advice, Stephen?

STEVEN TAN: Right, when it comes down to a good step to actually start getting international cooperation, I think it can start and can begin by forming multilateral working groups, such as those that we are seeing currently in IS3C, but it would be always a good mix if you could actually involve the government, industry leaders, and standard-setting bodies at times, and last but not least, consumer groups as well, to actually come in together to collaborate on global frameworks for the internet and application security, ensuring that solutions would work across borders while reducing fragmentation in cybersecurity practices. The last thing we really want to do is that, you know, when we call each country coming up with different cybersecurity practices, and in the end, we get the various fragmentation and balkanisation, you know, this is something that we are trying to avoid, and this is something that I believe, right, as part of IS3C itself, it’s something we really want everybody to have a common internet working together. Another essential step, I think, would be is to establish regional forums and international workshops where experts can discuss pressing cybersecurity challenges like securing digital supply chains, mitigating cross-border cybercrime. Such events would help create actionable roadmaps and foster partnership that will drive long-term improvements. I also feel that as government, right, we will always need to take the lead in sharing Cybertrack intelligence to trusted global networks. Transparent communication and real-time data sharing would enable faster and more coordinated responses to emerging threats, strengthening collective defenses against global cyber attacks. And last but not least, I think it’s important that we could advance capacity building initiatives. I think just now when Janice was actually bringing up about the hub, right, I didn’t previously heard about it before. I mean, through this platform, I actually heard about it. I’m very excited itself, whether we could actually pull in various experts on all around the place, right, to work together. You know, hopefully we could share best practices and support on technology transfers. And perhaps, you know, even for nations-wise, right, we could help to uplift each other cybersecurity capabilities and sharing that no country or no region is actually left behind in a fight for a safer internet.

WOUT DE NATRIS: I could never put that better myself. Thank you, Stephen. Stephen, what are your thoughts about the international cooperation and what would be the first good step started? Well, this is a question for me? This question for you, Christina.

KRISTINA MIKOLIŪNIENĖ: Yeah, sorry, because it’s very difficult to hear you. Yeah, so from my point of view, it’s very important to clear the problem, first of all. because the internet has so many different layers and in every layer there are some different problems. So first of all, I think it’s necessary to find a quite narrow description of the problem you would like to solve. And then it’s important to find the active people because active people, the right people that are of a critical importance. The third thing I think is to have a necessary tool for it as internet.nl and similar. So really to convince your partners that you have something which is really suitable for them. Going forward, the voluntary participation as we do in ARAHNET or INTERPOL programs are very important also. And as a good example, because example motivates I think it’s a IE convention started to sign in Vilnius this year and on 5th of September, which is that there was the point where every country in the world agrees. And now the creator of that convention they started to find the people who are agreeing on that convention. And now they are trying to find the signing parties. So I think it’s like some similar like lobbying activities. Yes, when you have a problem, you have the people around you, you can convince regulators to implement some obligations necessary, some part of obligations. You have convinced. maybe some market participants to be more active and more social responsible in the internet. Maybe there are some end users where awareness, raising awareness could help to act more safe in more safe way on internet. So I think all the related parties must be implemented in that work, because as I said before, you are encompassing the whole world. So thank you for doing this.

WOUT DE NATRIS: Thank you, Cristina. I think that we’ve heard from the panel that we have quite some challenges, but also a lot of opportunities. And I suggest that we, when the new year starts, let’s see if we can organize a first event to get this going. So I will be in contact with you in the new year. For now, thank you very much for participating and for your very clear and concise answers, because we have heard very good answers in this panel. So thank you, Steven. And thank you, Cristina. The next topic is- Thank you for inviting me. Thanks for inviting me. You’re very welcome. I’m very happy to say that ISRC has received a new assignment. We’re gonna start a new work next year. And I have the chairs of Working Group One and the project leader of Working Group One with me and online of working with mine on emerging technologies. Working Group One has produced a report last year on IoT security by design, led by Nicholas. And we’re gonna start a new project on that topic combined with emerging technologies. I’ll first give the floor for five minutes to Nicholas to say what exactly was the current affairs and where we’re going to. Then I ask Elif to tell about the quantum cryptography, QPC, she’ll tell you, and then Joao about the IoT components in that. So Nicholas first, you have five minutes, please. Thank you.

NICOLAS FIUMARELLI: Thank you so much, Valt. Good afternoon, everyone. I am Nicolas Fiumarelli, the chair of the working group one on IoT security by design. Well, it’s a pleasure to be here and discussing on how we can empower the consumers on different topics we have raised. In 2022, we conducted a comprehensive analysis of IoT security regulatory documents and different policies around 18 different countries and regions. We identified 442 different best practices around four key areas that are data privacy, secure updating, user empowerment, and operational resilience. 442 best practices. So we also found that many nations, particularly in the global south, lack about enforceable IoT security policies, even where the frameworks exist, because there are several of them. They are often like voluntary or fragmented ones. And the global adoption of the security by design, ICTs, is hindered by these inconsistent standards, right? So one of the most promising solutions in implementing cybersecurity are labeling schemes. Labeling schemes are seen in Singapore and Finland. Labeling empowers consumer by providing clear information about products, security features. So this drives manufacturers to prioritize on the security. But these systems require robust independent testing mechanisms and so on. So global standardization and ensure effectiveness is difficult. So on the other hand, consumer empowerment must be complemented by strong regulatory frameworks. For example, we have the new ones about the UK’s product security and so on, NIST standards on the 8.425, on the 2024, and the EU Cyber Resilience Act, different ones, right? But on our research report, we recommend establishing these clear frameworks, promoting more interoperable global standards, and so on. Well, the Working Group 1 remains committed to advancing IoT security through education, research, and different advocacy mechanisms, as we recommend in our research. But looking into the future, we will continue with this research. We will continue with different approach now, because we identified that there are other factors that are important. And so my colleague Joao will tell us more about the 2025 action plan for our working group and beyond. And well, I invite you all as well to join our efforts, whether implementing these recommendations we have at the report, also contributing to engaging on our ongoing research and repository of the best practices. I mentioned we have 442. So looking for more examples from the global world, and also to advocate for this stronger policy right in your own regions. So together we can ensure that the IoT devices and in the more extended way, ICT, not only connect us, but also protect us, right? So I’m giving the word to Joao to explain more about the next year plans.

WOUT DE NATRIS: Thank you, Nicolas. I think that the message here is that I think it was 22 or 22 constituencies in the world that were studied. In 22 constituencies, we had 442 different best practices or advices or whatever you want to call them. And that’s unworkable for industry. I think I’m going to let Elif go first, and then Joao. As two years ago already, we sort of launched the idea to start a working group on emerging technologies. And we talked to a lot of organizations. And finally, once we met in Kyoto, decided to work with us. And that project is going to start pretty soon. The contract is signed. And Elif, please explain from your side from exactly what it is that we’re going to study and report on. Then Joao will explain how that interconnects with IoT. So Elif, the floor is yours.

ELIF KIESOW CORTEZ: Thank you very much, Wout. We are, of course, very happy to announce this new project. of IS3C with AFNIC from France. And this project will be delivered as a collaboration between Working Group 1 and Working Group 9. Our research will have two different areas to focus, one dedicated to the societal impacts of IoT and the second one on the post-quantum cryptography. We will be also providing a brief combined analysis of these domains. And our project will have a multidimensional analysis looking at societal, legal, economic and environmental impacts. And we will be also including policy recommendations both at the state level and at the organization level. So we have a big task for us for this project. And in the next IGF in 2025, we will be also facilitating stakeholder engagement on these issues through a common workshop that will encourage dialogue on societal implications as well as the future directions. The project will be finalized with a combined report both on IoT security and on PQC. I’m also exploring cross-cutting teams like digital transformation and future proofing against emerging threats. That was also the focus of our Working Group 9. We will be also making sure to refer to international cooperation and economic competitiveness aspects within the broader context of global cybersecurity efforts. And we think that these are extremely relevant and important topics today. So we are also happy to hear from you if you would like to collaborate with us in the future in any of these domains. And I think I can give the floor to Joao.

WOUT DE NATRIS: Thank you, Eylif.

JOAO: Hello everybody. So I’m here to represent the working group that will develop the part regarding to IoT. So when we were discussing about this project and sketching it, what we see is that people understand that there is a security problem with IoT. And what we wanted to know about after realizing it is, well, okay, if someone gets hacked, if this current security status of IoT is kept, what are the security implications of it? And what are the social implications? Because we are developing a world based on the security levels that we see, and we want to see further and think of what would happen and what we need to change to make the society safer in regarding to IoT. So we want to see this societal phase of the work of making IoT safer.

WOUT DE NATRIS: Thank you, Joao. And I think that shows how the two topics also intersect with each other, because when the quantum computer is there, then all IoT devices will have an instant security problem that’s even bigger than it is today. So that is where we are going to try to come up with not immediate solutions, but at least with an indication of where we are at this point in time and what the consequences will be. And from there, hopefully build that into some sort of a capacity building program, which has been discussed with Avnik already about how to move forward after the IGF in 2025. What it shows is that IS3C is building and we’re delivering. As you see at this moment, all the reports we promised to deliver are there and you find it on our website. Is it possible already, Selby, to show the QR code? The gentleman in the back, can we show the correct QR code, please? Thank you. To wrap this session up, because we’re about to end, but if there are any questions first, and are there any online questions? That is something that I cannot see from the stage. Are there any questions? No, we don’t have any. So I’ll wrap the session up and let you go to the next two sessions. To talk about IS3C, again, the Internet Standards and Safety Coalition, the dynamic coalition within the IGF structure, we’re now in existence for four IGF cycles. We started at the virtual IGF in 2020 with our inaugural meeting. And we can look back at being a dynamic coalition that started by making promises. We painted a picture of where we wanted to be in about two years’ time. And we decided on three topics to start with. The first was IoT security by design. The second was education and skills. And the third is procurement. And that’s the only one you haven’t heard about, but that was also a report we published that showed that most governments in the world do not procure their ICT secure by design. They have no policy for it. In 2021, we were able to present solid plans on these three topics. And with them came the first funding in 2022 and the first research and then our first reports. From there we grew and more topics came aboard. The fact we have seen a new one presented just now, but it’s also proven to be a struggle to find funding to attract attention, to be recognized within the IGF system, and this all has still not been solved satisfactorily, but this has led to ideas on how to organize ourselves in a different way, and that is what we’re seriously studying at this moment. We’re looking at two options simultaneously. The leadership team, and that is Mark Carvell, who’s sitting next to me, who’s the rapporteur of this session, who is our senior policy advisor, and our working group chairs. We have decided to try and come to apply, or to apply to become an Internet Society special interest group, because this will allow ICC to reach out beyond the IGF, but also to bring funding of projects closer. This does not mean that we will not remain a dynamic coalition, because we will, only that we are spreading our wings, and this is also logical. If we manage to set the next step, and that is what we strive to do, to move from theory to practice, to come up with a recommendation, to turn them into capacity building programs or workshops or whatever we call them, we move ourselves out of the IGF system, because that is not what the IGF is for. The IGF doesn’t do capacity building programs or workshops, and we do strive to do that so that there will be some form of harmonization around the world on specific topics, so that organizations start thinking the same about, for example, procurement and the Internet standards that you can procure on. So ICC will, and is striving to become more mature, but it also means it has to organize itself differently. So what we’re also studying, and that’s the second topic, do we establish ourselves as a not-for-profit foundation? And that is something that people are investigating at this moment, and we get the first report on our closed EC session on Wednesday. The benefits would be, of course, that we were allowed to have members who can pay a membership fee or allowed to accept donations, and from there be funded in a more structural way, hopefully, so that our plans will go through. Well, these are our plans. I don’t know if everybody has experience with these sort of topics, then please talk to us after this session. On Tuesday at 1230, we’ll be showing the video again at the Dynamic Coalition booth, so you’re invited to join the session, and if you’re interested to join the hub, let us know, and then we will send you the invite on the first meeting that I will be organizing with Janice Richardson in January. For now, I want to thank you, the presenters also, the people online, Elif, Steven, Janice, and Christina, Mark, for reporting, for the people in the back for the technique, thank you very much. It describes somewhere in the world, probably. Thank you very much. And for now, thank you for joining, and I hope you had a good session, which you learned some new topics, and if you’re interested in IC3C, please join us and just talk to us during the week. And Nico has a final comment. Nico.

NICOLAS FIUMARELLI: Just to invite everyone also to our session on Thursday from 11.15 to 12.15 will be our main session, our joint session with the Dynamic Coalition on the IoT with our Dynamic Coalition, so you are all invited also to that session.

WOUT DE NATRIS: Thank you for reminding me, Nico. Thank you very much. Thank you, and have a very good IGF, and we’ll see you soon, probably.

W

WOUT DE NATRIS

Speech speed

141 words per minute

Speech length

2980 words

Speech time

1259 seconds

Need for widespread deployment of existing security standards

Explanation

WOUT DE NATRIS emphasizes the importance of implementing existing security-related Internet standards and ICT best practices more widely and rapidly. This is aimed at making online activity and interaction more secure and safer.

Evidence

ISVC has published reports on IoT security by design, tertiary secure cybersecurity education and skills, and government procurement.

Major Discussion Point

Internet Security Standards and Best Practices

Agreed with

BASTIAAN GOSLINGS

STEVEN TAN

Agreed on

Importance of implementing security standards

Plans to become an Internet Society special interest group

Explanation

WOUT DE NATRIS discusses IS3C’s plans to apply to become an Internet Society special interest group. This move aims to allow IS3C to reach out beyond the IGF and bring funding of projects closer.

Evidence

Mentions the decision made by the leadership team and working group chairs.

Major Discussion Point

IS3C Organization and Future Plans

Consideration of establishing as a not-for-profit foundation

Explanation

WOUT DE NATRIS mentions that IS3C is considering establishing itself as a not-for-profit foundation. This would allow the organization to have members who can pay a membership fee and accept donations, potentially leading to more structural funding.

Major Discussion Point

IS3C Organization and Future Plans

Goal to move from theory to practice in implementing recommendations

Explanation

WOUT DE NATRIS expresses IS3C’s goal to move from theory to practice by turning recommendations into capacity building programs or workshops. This aims to create some form of harmonization around the world on specific topics.

Evidence

Mentions the example of procurement and Internet standards that can be procured.

Major Discussion Point

IS3C Organization and Future Plans

B

BASTIAAN GOSLINGS

Speech speed

170 words per minute

Speech length

1480 words

Speech time

522 seconds

Importance of DNSSEC and RPKI for securing internet infrastructure

Explanation

BASTIAAN GOSLINGS highlights the critical role of DNSSEC and RPKI in securing fundamental internet technologies like the domain name system and global routing. These standards are essential for maintaining trust in online services and presence.

Evidence

The domain name system and global routing system are described as fundamentally important for the functioning of the internet overall.

Major Discussion Point

Internet Security Standards and Best Practices

Agreed with

WOUT DE NATRIS

STEVEN TAN

Agreed on

Importance of implementing security standards

Challenges in implementing security standards due to cost and complexity perceptions

Explanation

BASTIAAN GOSLINGS discusses the barriers to implementing security standards, including perceived costs and resource constraints. Many organizations view these standards as technically complex and potentially risky to implement.

Evidence

Mentions perceptions of cost, resource constraints, technical complexity, and potential risks associated with implementation.

Major Discussion Point

Internet Security Standards and Best Practices

S

STEVEN TAN

Speech speed

152 words per minute

Speech length

1355 words

Speech time

531 seconds

Importance of building digital trust and secure systems

Explanation

STEVEN TAN emphasizes the critical need for building digital trust in the face of evolving cyber risks. He stresses the importance of creating secure systems that users can rely on without hesitation.

Evidence

Mentions the complexity of digital services, increasing cyber risks, and the need for digital trust in various online activities.

Major Discussion Point

Consumer Protection and Empowerment

Need for developers and service providers to prioritize security

Explanation

STEVEN TAN argues that developers and service providers have a primary responsibility to build security into their products from the start. This includes ensuring privacy, data protection, and secure development processes.

Major Discussion Point

Consumer Protection and Empowerment

Agreed with

WOUT DE NATRIS

BASTIAAN GOSLINGS

Agreed on

Importance of implementing security standards

Role of certifications and security labels in empowering consumers

Explanation

STEVEN TAN discusses the importance of certifications, security labels, and standards in empowering consumers. These tools provide transparency and give companies a competitive edge when they prioritize security.

Evidence

Mentions initiatives like the internet hygiene portal, safe app standard, and cybersecurity labeling scheme for IoT products in Singapore.

Major Discussion Point

Consumer Protection and Empowerment

Agreed with

KRISTINA MIKOLIŪNIENĖ

Agreed on

Consumer education and empowerment

Need for shared threat intelligence and common security standards

Explanation

STEVEN TAN emphasizes the importance of global cooperation in cybersecurity, including shared threat intelligence and common security standards. This cooperation is crucial for building collective resilience and ensuring no country is left vulnerable.

Evidence

Mentions partnerships with key industry players like Akamai, Google, Microsoft, and non-profit organizations like APNIC and Internet Society.

Major Discussion Point

International Cooperation on Cybersecurity

Agreed with

KRISTINA MIKOLIŪNIENĖ

Agreed on

International cooperation in cybersecurity

Importance of partnerships between countries and industry

Explanation

STEVEN TAN stresses the need for international partnerships between countries and industry to create a united front against cyber threats. These collaborations are essential for addressing cross-border cyber threats effectively.

Evidence

Mentions the potential benefits of such partnerships, including better protection, enhanced trust, and more resilient digital services.

Major Discussion Point

International Cooperation on Cybersecurity

Importance of balancing regulation and incentives for industry adoption

Explanation

STEVEN TAN argues for a balance between regulation and incentives to motivate companies to adopt stronger security measures. He suggests that clear duty of care rules can push ICT providers to adopt stronger security measures, while incentives can encourage them to exceed minimum requirements.

Evidence

Mentions initiatives in Singapore like the internet hygiene portal, safe app standard, and cybersecurity labeling scheme for IoT products.

Major Discussion Point

Internet Security Standards and Best Practices

Differed with

KRISTINA MIKOLIŪNIENĖ

Differed on

Approach to regulation and incentives

K

KRISTINA MIKOLIŪNIENĖ

Speech speed

111 words per minute

Speech length

1533 words

Speech time

828 seconds

Need for holistic approach to internet security regulation

Explanation

KRISTINA MIKOLIŪNIENĖ advocates for a comprehensive approach to internet security regulation. This involves impacting market participants at various levels, from interconnection to addressing issues like fraud and child sexual abuse material online.

Evidence

Mentions RRT’s role in market analysis, frequency allocation, and addressing various internet-related issues.

Major Discussion Point

Internet Security Standards and Best Practices

Differed with

STEVEN TAN

Differed on

Approach to regulation and incentives

Importance of raising awareness and educating consumers

Explanation

KRISTINA MIKOLIŪNIENĖ emphasizes the importance of educating consumers about internet safety. She highlights the role of regulatory authorities in helping consumers navigate the internet space safely.

Evidence

Mentions RRT’s role in consumer dispute resolution and efforts to make the internet safer, especially for minors.

Major Discussion Point

Consumer Protection and Empowerment

Agreed with

STEVEN TAN

Agreed on

Consumer education and empowerment

Value of learning from other countries’ experiences

Explanation

KRISTINA MIKOLIŪNIENĖ stresses the importance of international cooperation and learning from other countries’ experiences in addressing internet security issues. She argues that this approach can help avoid repeating mistakes and lead to more effective solutions.

Evidence

Mentions a Lithuanian proverb about learning from others’ mistakes and the importance of collecting experiences from other countries.

Major Discussion Point

International Cooperation on Cybersecurity

Agreed with

STEVEN TAN

Agreed on

International cooperation in cybersecurity

Need for clear problem definition and active participation

Explanation

KRISTINA MIKOLIŪNIENĖ emphasizes the importance of clearly defining the problem and involving active participants in international cooperation efforts. She suggests that this approach is crucial for addressing internet security issues effectively.

Evidence

Mentions the need to find a narrow description of the problem and involve the right people in the process.

Major Discussion Point

International Cooperation on Cybersecurity

N

NICOLAS FIUMARELLI

Speech speed

125 words per minute

Speech length

487 words

Speech time

232 seconds

Analysis of IoT security regulatory documents across countries

Explanation

NICOLAS FIUMARELLI discusses the comprehensive analysis of IoT security regulatory documents across 18 different countries and regions. The analysis identified 442 different best practices in four key areas: data privacy, secure updating, user empowerment, and operational resilience.

Evidence

Mentions the identification of 442 best practices across 18 different countries and regions.

Major Discussion Point

Emerging Technologies and Future Challenges

E

ELIF KIESOW CORTEZ

Speech speed

146 words per minute

Speech length

265 words

Speech time

108 seconds

Need for research on societal impacts of IoT and post-quantum cryptography

Explanation

ELIF KIESOW CORTEZ outlines a new research project focusing on the societal impacts of IoT and post-quantum cryptography. The project aims to provide a multidimensional analysis looking at societal, legal, economic, and environmental impacts.

Evidence

Mentions the collaboration between Working Group 1 and Working Group 9, and the plan to provide policy recommendations at both state and organization levels.

Major Discussion Point

Emerging Technologies and Future Challenges

J

JOÃO MORENO FALCÃO

Speech speed

114 words per minute

Speech length

139 words

Speech time

72 seconds

Importance of understanding social implications of current IoT security status

Explanation

JOÃO MORENO FALCÃO emphasizes the need to understand the social implications of the current IoT security status. He argues that it’s crucial to consider what would happen if the current security levels are maintained and what changes are needed to make society safer regarding IoT.

Major Discussion Point

Emerging Technologies and Future Challenges

Agreements

Agreement Points

Importance of implementing security standards

WOUT DE NATRIS

BASTIAAN GOSLINGS

STEVEN TAN

Need for widespread deployment of existing security standards

Importance of DNSSEC and RPKI for securing internet infrastructure

Need for developers and service providers to prioritize security

Multiple speakers emphasized the critical need for implementing existing security standards to enhance internet security and maintain trust in online services.

International cooperation in cybersecurity

STEVEN TAN

KRISTINA MIKOLIŪNIENĖ

Need for shared threat intelligence and common security standards

Value of learning from other countries’ experiences

Both speakers stressed the importance of international cooperation in addressing cybersecurity challenges, sharing knowledge, and developing common standards.

Consumer education and empowerment

STEVEN TAN

KRISTINA MIKOLIŪNIENĖ

Role of certifications and security labels in empowering consumers

Importance of raising awareness and educating consumers

Both speakers highlighted the need to educate and empower consumers about internet safety and security through various means such as certifications, security labels, and awareness programs.

Similar Viewpoints

Both speakers recognized the challenges in implementing security standards and emphasized the need for a balanced approach that combines regulation with incentives to encourage adoption by the industry.

BASTIAAN GOSLINGS

STEVEN TAN

Challenges in implementing security standards due to cost and complexity perceptions

Importance of balancing regulation and incentives for industry adoption

These speakers all emphasized the importance of understanding the broader implications of IoT security, including its societal impacts and the need for comprehensive research and analysis.

NICOLAS FIUMARELLI

ELIF KIESOW CORTEZ

JOÃO MORENO FALCÃO

Analysis of IoT security regulatory documents across countries

Need for research on societal impacts of IoT and post-quantum cryptography

Importance of understanding social implications of current IoT security status

Unexpected Consensus

Holistic approach to internet security

KRISTINA MIKOLIŪNIENĖ

STEVEN TAN

Need for holistic approach to internet security regulation

Importance of building digital trust and secure systems

Despite coming from different backgrounds (regulatory authority and cybersecurity agency), both speakers emphasized the need for a comprehensive approach to internet security that goes beyond technical measures to include trust-building and broader regulatory frameworks.

Overall Assessment

Summary

The main areas of agreement included the importance of implementing security standards, the need for international cooperation in cybersecurity, and the significance of consumer education and empowerment. There was also consensus on the challenges of implementing security standards and the need for a balanced approach combining regulation and incentives.

Consensus level

The level of consensus among the speakers was relatively high, particularly on the fundamental issues of cybersecurity and the need for international cooperation. This consensus suggests a shared understanding of the critical challenges in internet security and the potential for collaborative efforts to address these issues. However, there were some variations in emphasis and approach, reflecting the diverse backgrounds and perspectives of the speakers.

Differences

Different Viewpoints

Approach to regulation and incentives

STEVEN TAN

KRISTINA MIKOLIŪNIENĖ

Importance of balancing regulation and incentives for industry adoption

Need for holistic approach to internet security regulation

While both speakers emphasize the importance of regulation, STEVEN TAN advocates for a balance between regulation and incentives, whereas MIKOLIŪNIENĖ focuses more on a comprehensive regulatory approach without explicitly mentioning incentives.

Unexpected Differences

Overall Assessment

summary

The main areas of disagreement were subtle and primarily focused on the approach to regulation and the specific aspects of international cooperation to prioritize.

difference_level

The level of disagreement among the speakers was relatively low. Most speakers generally agreed on the importance of cybersecurity, international cooperation, and the need for improved standards and practices. The differences were mainly in the nuances of approach rather than fundamental disagreements. This low level of disagreement suggests a general consensus on the importance of the issues discussed, which could facilitate more unified action in addressing cybersecurity challenges.

Partial Agreements

Partial Agreements

Both speakers agree on the importance of international cooperation, but STEVEN TAN emphasizes shared threat intelligence and common standards, while KRISTINA MIKOLIŪNIENĖ focuses more on learning from others’ experiences and avoiding mistakes.

STEVEN TAN

KRISTINA MIKOLIŪNIENĖ

Need for shared threat intelligence and common security standards

Value of learning from other countries’ experiences

Similar Viewpoints

Both speakers recognized the challenges in implementing security standards and emphasized the need for a balanced approach that combines regulation with incentives to encourage adoption by the industry.

BASTIAAN GOSLINGS

STEVEN TAN

Challenges in implementing security standards due to cost and complexity perceptions

Importance of balancing regulation and incentives for industry adoption

These speakers all emphasized the importance of understanding the broader implications of IoT security, including its societal impacts and the need for comprehensive research and analysis.

NICOLAS FIUMARELLI

ELIF KIESOW CORTEZ

JOÃO MORENO FALCÃO

Analysis of IoT security regulatory documents across countries

Need for research on societal impacts of IoT and post-quantum cryptography

Importance of understanding social implications of current IoT security status

Takeaways

Key Takeaways

There is a need for more widespread deployment of existing internet security standards and best practices.

Consumer protection and empowerment are crucial for building digital trust and securing the internet.

International cooperation is essential for addressing global cybersecurity challenges.

Emerging technologies like IoT and quantum computing pose new security risks that need to be studied and addressed.

The Internet Standards Security and Safety Coalition (IS3C) is working to move from theory to practice in implementing cybersecurity recommendations.

Resolutions and Action Items

IS3C to start a new project on IoT security and post-quantum cryptography, with a report to be delivered at IGF 2025

IS3C to organize a first event on consumer protection in the new year

IS3C to apply to become an Internet Society special interest group

IS3C considering establishing itself as a not-for-profit foundation

IS3C to organize a meeting in January to discuss the creation of a cybersecurity hub

Unresolved Issues

How to effectively implement security standards across different countries and regions

How to balance regulation and incentives for industry adoption of security measures

How to address the fragmentation of IoT security best practices across different jurisdictions

How to prepare for the security implications of quantum computing on existing infrastructure

Suggested Compromises

Balancing regulatory requirements with industry incentives to promote security adoption

Combining mandatory security standards with voluntary labeling schemes to empower consumers

Collaborating internationally while respecting national sovereignty in cybersecurity matters

Thought Provoking Comments

We learned a couple of years ago when we did a study that in fact, young people are coming out of tertiary education, they’re really not prepared to kickstart their career in industry. Industry is decrying this lack, decrying the gap and asking for better tertiary education.

speaker

Janice Richardson

reason

This comment highlights a critical gap between education and industry needs in cybersecurity, challenging assumptions about the effectiveness of current educational approaches.

impact

It shifted the discussion towards the importance of education reform and industry collaboration in cybersecurity, leading to ideas about creating a hub for knowledge exchange.

These in-service trainings are really not working for anyone. Young people are there making the coffee when they should be there, really understanding how cyber security needs to work, and how they can be part of a team.

speaker

Janice Richardson

reason

This insight critiques current training practices and suggests a need for more meaningful engagement of young professionals in cybersecurity roles.

impact

It deepened the conversation about practical skills development and led to discussions about reforming recruitment and training procedures in the industry.

On one hand, you know, there’s the perception of cost and resource constraints, right? Like it takes additional knowledge, additional software, maybe additional hardware, control of this to manage all of this. People consider this to be quite technically complex.

speaker

Bastiaan Goslings

reason

This comment provides insight into the barriers to implementing security standards, highlighting both technical and resource challenges.

impact

It shifted the discussion towards addressing practical obstacles in implementing security measures and led to considerations of how to overcome these barriers.

In Singapore, we have rolled out initiatives like the internet hygiene portal which sets a strong example by encouraging businesses to adopt secure practices by default and then publicly recognizing those that excel in security through internet hygiene rating.

speaker

Steven Tan

reason

This comment introduces a concrete example of how government initiatives can incentivize better security practices in the private sector.

impact

It sparked discussion about the role of government in promoting cybersecurity and led to considerations of similar initiatives in other countries.

I think it’s important that we could advance capacity building initiatives. I think just now when Janice was actually bringing up about the hub, right, I didn’t previously heard about it before. I mean, through this platform, I actually heard about it. I’m very excited itself, whether we could actually pull in various experts on all around the place, right, to work together.

speaker

Steven Tan

reason

This comment demonstrates how the discussion itself led to new connections and enthusiasm for collaborative initiatives.

impact

It reinforced the value of the discussion forum and led to increased interest in the proposed hub concept.

Overall Assessment

These key comments shaped the discussion by highlighting critical gaps in cybersecurity education and implementation, introducing concrete examples of successful initiatives, and fostering enthusiasm for collaborative approaches. They shifted the conversation from theoretical concerns to practical solutions and emphasized the need for multi-stakeholder cooperation in addressing cybersecurity challenges. The discussion evolved from identifying problems to exploring potential solutions and international cooperation opportunities.

Follow-up Questions

How to create and implement a hub for cybersecurity collaboration?

speaker

Janice Richardson

explanation

A hub would bring together people from various backgrounds to discuss and find solutions for cybersecurity challenges, addressing the need for better education and collaboration in the field.

How to increase deployment of DNSSEC and RPKI security standards?

speaker

Bastiaan Goslings

explanation

Despite being available for a long time, these standards lack widespread adoption. Increasing their deployment is crucial for improving the security of internet routing and domain name systems.

How to balance regulation and incentives in promoting cybersecurity practices?

speaker

Steven Tan

explanation

Finding the right mix of regulatory requirements and incentives is important to encourage businesses to adopt and exceed minimum security standards without stifling innovation.

How to establish effective international cooperation on cybersecurity?

speaker

Steven Tan and Kristina Mikoliūnienė

explanation

Given the borderless nature of the internet, international cooperation is crucial for addressing cross-border cyber threats and creating unified security standards.

What are the societal implications of current IoT security levels?

speaker

João Moreno Falcão

explanation

Understanding the broader societal impacts of IoT security vulnerabilities is crucial for developing appropriate security measures and policies.

How will post-quantum cryptography affect IoT security?

speaker

Elif Kiesow Cortez

explanation

The advent of quantum computing will create new security challenges for IoT devices, requiring proactive research and planning.

How can IS3C organize itself to better achieve its goals?

speaker

Wout de Natris

explanation

IS3C is exploring options like becoming an Internet Society special interest group or establishing itself as a non-profit foundation to expand its reach and funding opportunities.

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Day 0 Event #61 Accelerating progress for unified digital cooperation

Day 0 Event #61 Accelerating progress for unified digital cooperation

Session at a Glance

Summary

This discussion focused on global digital governance, addressing key issues in artificial intelligence (AI), data management, and internet governance. Participants from government, industry, and international organizations shared insights on recent developments and future challenges.


The conversation highlighted the need for interoperable regulatory approaches to AI governance, balancing innovation with risk management. Speakers emphasized the importance of multi-stakeholder collaboration in developing frameworks that are flexible enough to adapt to local contexts while maintaining global consistency.


On data governance, the discussion centered on initiatives promoting data free flow with trust, addressing privacy concerns, and facilitating cross-border data sharing. Participants stressed the need for harmonized approaches to reduce fragmentation and ensure legal clarity for businesses and citizens.


The panel also examined the future of internet governance, particularly in light of the upcoming WSIS+20 review. Speakers advocated for strengthening existing multi-stakeholder processes like the Internet Governance Forum (IGF) rather than creating new structures. They emphasized the importance of inclusive participation, especially from developing countries and underrepresented groups.


Key themes throughout the discussion included the urgency of addressing governance challenges posed by rapidly evolving technologies, the need to preserve what works in current systems, and the importance of trust-building among stakeholders. Participants called for more focused, action-oriented approaches to governance that can deliver tangible results while maintaining the benefits of open, multi-stakeholder dialogue.


The discussion concluded with reflections on improving inclusivity, gender representation, and the overall effectiveness of global digital governance processes. Speakers emphasized the need for clear mandates, strategic vision, and practical outcomes in future governance efforts.


Keypoints

Major discussion points:


– The need for interoperable and aligned approaches to AI and data governance across jurisdictions


– The importance of preserving multi-stakeholder approaches in internet governance


– Preparing for the WSIS+20 review and the future of the Internet Governance Forum (IGF)


– Balancing innovation with risk mitigation in emerging technologies like AI


– Improving inclusivity and representation in internet governance processes


The overall purpose of the discussion was to take stock of recent developments in digital policy and governance, particularly around AI and data, and to look ahead to upcoming processes like WSIS+20 and the implementation of the Global Digital Compact. The goal was to identify priorities and approaches for improving global digital cooperation between governments, businesses, and other stakeholders.


The tone of the discussion was largely constructive and forward-looking. Speakers acknowledged challenges but focused on opportunities for progress. There was a sense of urgency about addressing governance gaps, balanced with caution about preserving what works well in the current system. The tone became more action-oriented towards the end, with calls to move beyond talk to concrete outcomes.


Speakers

– Timea Suto: Moderator


– Maria Fernanda Garza: Honorary Chairwoman of ICC (International Chamber of Commerce)


– Thomas Schneider: Ambassador and Director of International Relations at Ofcom Switzerland, Vice Chair of the Council of Europe’s Committee on Artificial Intelligence


– Flavia Alves: Director and Head of International Organizations for Meta


– Yoichi Iida: Assistant Vice Minister for International Affairs of the Ministry of International Affairs and Communications of Japan


– Maarit Palovirta: Deputy Director General at Connect Europe


– Irina Soeffky: Director for National, European, and International Digital Policy at the German Federal Ministry for Digital and Transport


– Larisa Galadza: Director General for Global Affairs Canada and Senior Official for Cyber, Digital and Critical Technology at the Government of Canada


– Amr Hashem: MENA Policy Director for the GSMA


Additional speakers:


– Bertrand de La Chapelle: Audience member


– Jacques Beglinger: Member of the board of EuroDIG and co-chair of the Swiss IGF


– Desiree Milosevic-Evans: Audience member


Full session report

Global Digital Governance: Navigating AI, Data, and Internet Challenges


This comprehensive discussion on global digital governance brought together key stakeholders from government, industry, and international organisations to address pressing issues in artificial intelligence (AI), data management, and internet governance. The panel explored recent developments, future challenges, and potential solutions for creating a more cohesive and effective global digital governance framework.


AI Governance: Balancing Innovation and Interoperability


A central theme of the discussion was the need for interoperable regulatory approaches to AI governance. Thomas Schneider, Ambassador and Director of International Relations at Ofcom Switzerland, emphasized the importance of the Council of Europe’s AI convention as a potential global standard. He stressed the need for flexible frameworks that can adapt to rapidly evolving AI technologies while ensuring interoperability between different regulatory approaches.


Flavia Alves, Director and Head of International Organizations for Meta, highlighted the potential of open-source AI to drive innovation and create better, safer products accessible on a global scale. She emphasized the importance of open-source approaches in fostering collaboration and improving AI systems.


Yoichi Iida, Assistant Vice Minister for International Affairs of the Ministry of International Affairs and Communications of Japan, discussed the G7 Hiroshima AI process and code of conduct as an example of international cooperation on AI governance. Audience members raised concerns about potential biases in AI datasets and the need for inclusive governance approaches that represent marginalized communities.


Data Governance: Trust, Privacy, and Cross-Border Flows


The discussion on data governance centered on initiatives promoting data free flow with trust, addressing privacy concerns, and facilitating cross-border data sharing. Yoichi Iida introduced the OECD’s work on data free flow with trust, highlighting the importance of balancing data utility with privacy protection. He also addressed the complex issue of government access to data for law enforcement purposes.


Maarit Palovirta, Deputy Director General at Connect Europe, outlined the EU approach to data protection and cross-border data flows, emphasizing the need for harmonized regulations that protect privacy while enabling innovation.


Amr Hashem, MENA Policy Director for the GSMA, highlighted the mobile industry’s crucial role in expanding internet access and connectivity. He stressed the importance of considering infrastructure development alongside governance issues, particularly in developing regions.


Future of Internet Governance: Multi-stakeholder Collaboration and Reform


The panel examined the future of internet governance, particularly in light of the upcoming WSIS+20 review. Irina Szovki, Director for National, European, and International Digital Policy at the German Federal Ministry for Digital and Transport, emphasized the continued importance of the multi-stakeholder model in internet governance.


Audience members, including Bertrand de La Chapelle, called for updating the WSIS vision and structures to reflect current technological realities. There was a strong push for improving the Internet Governance Forum (IGF) mandate and structure, with de La Chapelle proposing a dedicated effort to discuss new institutional arrangements.


Speakers advocated for strengthening existing multi-stakeholder processes rather than creating new structures. They emphasized the importance of inclusive participation, especially from developing countries and underrepresented groups. Jacques Beglinger, a member of the board of EuroDIG and co-chair of the Swiss IGF, raised concerns about defining stakeholders too narrowly and excluding grassroots participation.


Global Digital Cooperation: Aligning Priorities and Addressing Challenges


Larisa Galadza, Director General for Global Affairs Canada, discussed the implementation of Global Digital Compact commitments and Canada’s upcoming G7 presidency, which will focus on AI governance. She framed the coming year as “an inflection point” for global digital governance.


Maria Fernanda Garza, Honorary Chairwoman of ICC, highlighted the crisis in multilateralism and the need for greater alignment in digital governance while preserving flexibility to meet diverse local needs. She emphasized the importance of business involvement in shaping effective governance frameworks.


Gender Inclusion and Accessibility


An audience member raised the critical issue of gender inclusion in digital governance processes. Panel members acknowledged the importance of this concern and discussed strategies for improving gender representation and diversity in governance discussions and decision-making bodies.


Unresolved Issues and Future Directions


Several key issues remained unresolved, including how to effectively include developing countries and underrepresented groups in AI and data governance frameworks, addressing biases in AI datasets and algorithms, and determining the appropriate division of work between new AI governance bodies and existing internet governance structures.


The discussion concluded with reflections on improving inclusivity, gender representation, and the overall effectiveness of global digital governance processes. Speakers emphasized the need for clear mandates, strategic vision, and practical outcomes in future governance efforts.


Conclusion


As the global community grapples with rapidly evolving digital technologies, this discussion underscored the critical importance of collaborative, flexible, and inclusive approaches to governance that can adapt to local contexts while maintaining global consistency. The coming year promises to be a pivotal period for shaping the future of global digital governance, with significant implications for innovation, equity, and human rights in the digital age. Key takeaways include the need for improved coordination between stakeholders, greater inclusivity in governance processes, and more action-oriented approaches to addressing global digital challenges.


It’s worth noting that the panel experienced some technical difficulties throughout the discussion, which occasionally impacted the flow of conversation but did not significantly detract from the overall quality of the dialogue.


Session Transcript

Timea Suto: Can you hear me? Okay, perfect. Thank you so much. All right. Well, good afternoon, everyone. Welcome to this session. Everything is good with the technology. Everybody can hear. Everybody has a microphone. Channel three. Should be channel three. Can you hear me now? Yes. Perfect. Okay, good. I feel like a rock star with this microphone on. So, hello, everyone. Welcome to this business government roundtable that looks like a panel, but it will be a roundtable. We will talk of what has happened this year on all the various fronts on digital policymaking and a number of issues. And we will try and see how we move forward towards a more common digital cooperation and how we can work better together between the business and the government sectors. I don’t want to take up too much time in doing an introduction, but really just want to share with you how we are envisioning this session to go. We have set up three mini discussions within these two hours that we have together today. First, we were going to talk a little bit about the governance of artificial intelligence, what has happened throughout the year on this topic and where we are hoping to go forward. Then we will take the same stock around the conversations on data governance. So, how are we today with initiatives on data governance? What have we done so far? And where we hope to go under the aegis of digital cooperation. And then we are looking at a couple of processes that we have all been engaged in as part of the IGF community, the global digital compact and the WSIS plus 20 process and trying to look ahead after we have taken stock of these policy developments and try and see where we want to go in the context of these policy fora. We see as necessary as all of us up here, here on the panel, but together with you in the community. So we will have two speakers per topic to start a discussion, and then we’re going to turn to all of you in the room for a dialogue on those topics. So we won’t wait till the end to have the dialogue. We have two speakers and then you, and then again, two speakers and then you. But to set the scene, we will have first a keynote. I want to start by, first of all, thanking all of you, panelists who’ve accepted to be here with us. Just a quick introduction on who we have here in no particular order at the moment, but just the way it appears on my list here. We have Ms. Flavia, National Institutions and Relations at MEDA. We have Mr. Thomas Schneider, Ambassador and Director of International Relations at Ofcom Switzerland. He is also the Vice Chair of the Council of Europe’s Committee on Artificial Intelligence. So there will be my first panel on AI. We also have Mr. Yorichi Iida, Assistant Vice Minister for International Affairs of the Ministry of International Affairs and Communications of Japan. And Dr. Irina Szovki, I hope I’m pronouncing that correct, Director for National, European, and International Digital Policy at the German Federal Ministry for Digital and Transport. So they will be my second panel on data. And then for the third panel it’s for the business conversations. We will have Ms. Larissa Galazza, from the, who’s the Director General for Global Affairs Canada and Senior Official for Cyber, Digital and Critical Technology at the Government of Canada. Ms. Marit Palavirta, Deputy Director General at Connect Europe. And Mr. Amir Hashim, MENA Policy Director for the GSMA. Thank you all for joining us. To kick us off, we also have the Honorary Chairwoman of ICC to give a quick keynotes and a few thoughts on where we are and where we’re hoping to go. So Maria Fernanda, please.


Maria Fernanda Garza: Thank you very much. Do you mind I just nod your head if you can listen to me, please? Thank you. Let me start with a few quick words about the International Chamber of Commerce. For those of you who might not know, also the ICC is institutional representative of more than 45 million. businesses in over 117 countries with a mission to enable peace and prosperity through trade. We deeply believe in a world based in rules, benefits, business and society. And this mission is particularly relevant today. In a rapidly evolving digital world, the stakes have never been higher for us to collaborate effectively to shape policies that are inclusive, sustainable and forward-looking. This year, we have seen meaningful discussions on digital policy across multilateral fora, whether it’s the G7, the G20 or the OECD, including the adoption of the Global Digital Compact and the preparations for the 20-year review of the outcomes of the World Summit of the Information Society. These discussions address a number of pressing issues, from digital divides and cybersecurity to the governance of data, AI and our digital world in general. But these discussions are happening against the backdrop of a crisis in multilateralism. Deepening geopolitical tensions and competing national priorities have made it harder to achieve alignment, and the result is increasing regulatory and policy fragmentation. For business, this fragmentation creates uncertainty, disrupts cross-border digital trade, increases compliance costs and stifles innovation. For governments, it makes it more challenging to establish interoperable frameworks that support economic growth and cross-border collaboration. To address these challenges, we must pursue greater alignment while preserving the flexibility to meet diverse local needs. A single, centralized, global regulatory superstructure is neither feasible nor feasible. Instead, we should build on the strengths of expert organizations and forums, allowing them to contribute within their mandates while fostering collaboration. collaboration across sectors and regions. So looking ahead to 2025, our priorities must include, first, data governance, establishing principles and frameworks that support the free flow of data, while addressing legitimate concerns about privacy, and second, AI governance, and developing banks and companies that can It’s what we agreed. While addressing societal risks and ensuring equitable benefits, especially for under-reserved regions, and third, the internet governance, reinforcing the principles of an open, interoperable, and inclusive internet. So at the heart of this effort must be the multi-stakeholder approach that offers a model that brings together governments, businesses, civil society, academia, and technical experts to develop policies that are pragmatic, inclusive, and effective. The IGF is the embodiment of this approach. It is not a decision-making body, but it is invaluable in its ability to bring together all stakeholders to share knowledge and expertise, ensuring interoperable policy approaches that meet the diverse needs of everyone, everywhere. So looking ahead to the implementation of the Global Digital Compact and the WSIS Plus 20 review, we must follow through on the promise made 20 years ago to make the multi-stakeholder model the rule and not the exception. It is how we address the policy issues around the internet. and the digital technologies more broadly. So to move forward, we need to ensure that the voices of all stakeholders are heard and are valued. Business has a critical role to play, not just in implementing the policies, but in shaping them through expertise and practical experience. Today, I encourage us to have an honest, focused discussion in a true IGF fashion about how we can align our priorities, reduce regulatory fragmentation, and prepare for WSIS 2020 in a way that strengthens the next decade. So thank you all for your engagement and for meeting to these issues. Back to you, Timon. Thank you. Thank you, Maria Fernanda. I hope that everybody could hear you. Just trying to check with the panelists that everybody’s okay with the microphones and everybody’s okay with the headsets.


Timea Suto: Okay, thank you so much, Maria Fernanda, for leading us into this discussion. So on this imperative of talking openly and really in true IGF fashion, into our first panel, as I said, we will be starting with artificial intelligence and try and take a little bit of stock of the current state of play in global AI governance, trying to identify some commonalities on the initiatives that we are all aware of, but also trying to see if there are any barriers that we still need to surmount in the implementation. So to kick us off, I’m going to turn first to Thomas Schneider, and I’m going to ask you to wear two hats in this conversation. First of all, talk a little bit about the opportunities and challenges you see in opportunities. operationalizing AI governance and of the work that you’ve done at the CHI and the Council of Europe.


Thomas Schneider: Yes, thank you and I hope you can hear me. Okay, thank you very much Tymija. Before I go into more detail, one thing that helped me understand or get a vision on the concept of AI governance is to note that AI is not the first disruptive technology that mankind has learned to seize opportunities and minimize risks. And there’s a number of parallels that can be drawn with the way that we actually managed engines, combustion. Engine driven machines in the 19th century started to replace physical human and actually animal labor through putting engines into machines that were either used to move something from A to B or were used to automate production of goods or of food. And there are lots of parallels with the digital revolution of today where we use AI systems to replace not physical labor but cognitive labor. Mainly also in two ways to analyze data and prepare to take decisions. In both cases, the risks and impacts of the technology are very much context based. And if we try to figure out how to govern AI, I think it may be worth to look at how we’ve more or less managed to govern engines in different areas of their use. And if we look at engines, of course we are aware that there’s no single engine convention, no one engine law that regulates all aspects of the use of engine. In fact, there are thousands of technical norms, of legal norms and also different from culture to culture and how to manage risks. And in that case of engines used in different contexts. And there’s areas where we have. quite advanced harmonization internationally. If you take the airline industry, of course, to land an airplane is the same on every airport in the world. But if you take a cars, even in Europe, people drive on different sides of the road and so on and so forth. But there’s some level of interoperability so that the British also able to drive in Switzerland, although we are driving on the other side of the road. And I think the same is already happening in the field of AI. We also have there, we have tuitions in a technical field, ISO, IEC, I2, IEEE, but then also institutions like NIST and US and Senelec in Europe that are working on technical standards. We have a lot of legal instruments, binding and non-binding ones, starting from the UNESCO recommendation, DOECD, and the Council of Europe has already done some work before this binding instrument, and others have contributed to a number of legal instruments. And we will also have differences in how in a particular society you deal with risks or who you trust to actually cope with the risk, whether you task the government in your own hands, these things will probably keep varying. And in this sense, the convention that the Council of Europe has negotiated, and I happen to have been leading these negotiations in the last two years, is one, but not the only instrument that will hopefully help us to cope with AI in the sense that the purpose of this convention is not to create new rights or to raise protection levels or make new restrictions. It is to make sure that the existing safeguards and protection levels of human rights, democracy, and rule of law are also applied to AI like they apply to any other environment or technical development that we’ve seen. It’s important also to note that the instrument is meant to secure these rights and freedoms, but at the same time to… conducive to innovations or not to disadvantage those that are part of this of this structure compared to others that that may not be because we think that there is a mutual interest from the industry from consumers from from the states that we have a certain level of trust and clarity and rule allow us to be innovative but be more or less be able to to uh yeah to assess risks and impacts and deal with them in in a reasonable and appropriate way um if the word council of europe may apply that this is something european it is first of all not uh the same like the european union european union has 27 member states the council of europe has 46 and the council of europe has a system of observers that can also be an ad hoc observer to a process that allows actually to include countries from all uh and become signatories of an instrument which is the case also with this convention we’ve had 11 countries participating in the negotiations from latin america from north america from asia and we’re in touch also with countries from africa to join uh the work now so the idea is to have a global instrument globally in the sense that you would require a minimum level of respect for human rights democracy and rule of law otherwise the whole system would not be credible but every every country that respects a certain level of democracy rule of law and human rights is invited to to join the process the convention is also an instrument unlike a law that is meant to be more future proof therefore in terms of time and development it therefore needs to be a little bit more general a little bit more abstract but in a way translated into a concrete guidance for whatever the latest technology may be so it establishes some general principles about safeguarding existing protection levels of democracy and rule of law and goes into more detail about human rights but remains always at the level that it can be adapted to the concrete legal and institutional setting of a particular country and thus help to not fully harmonize the world because that may not be possible but at least build on the shared fundamental values and legal norms that many countries share and help to allow legal constructs in a way that they can not just be interoperable for the states but also for the industry and for the consumers so there’s a common basis and that is not just the legal text it’s also the and I’ll end with this it’s also a concrete instrument which is a concrete methodology for a human rights democracy and rule of law risk and impact assessment which is fundamental also to build the bridge not just between technical standards and legal standards but also to help operationalize something abstract like a convention into daily life that consumers but also for programmers and for regulators think. Thank you so much Tomasz


Timea Suto: and you’ve raised quite a lot of ideas in your speech so I’m just trying to pull out a couple of those. I’m noting interoperability of regulatory and policy approaches working in hand in hand with the stakeholders making sure that we’re working towards policy frameworks that can be global in nature but can flexible enough to be implemented in local contexts and the importance of providing actual tools to making those happen and I’m just from all of this trying to connect to the rest of the conversation I want to highlight one thing that you said that we need trust and clarity so that those who are implementing and working on implementation sides of these technologies it was the principles that we develop and actually make it part of their work so I think that’s a good segue to Flavia who’s going to speak next, I wanted to ask her about the voluntary commitments that industry is taking in a field of AI. And how do you see that linking up with some of these global conversations in policy, and treaties, and guidelines, and others that are happening around the world? And what is the meta focus in this? And how do you see that?


Flavia Alves: Thanks. Here today, I’m Flavia Alves, Director and Head of International Organizations for Meta. So first, let me tell you, Meta is committed to developing responsible AI. And we work to help ensure that AI at Meta benefits people and society. In addition to our internal processes to develop AI responsibly, we are also active on international level in contributing to development and implementation of AI governance frameworks. International cooperation is key to ensuring people around the world can fully harness the benefits of AI. Global AI governance frameworks promote trust and help to prevent fragmentation and jurisdictions. Given the quickly evolving capabilities of GenAI, we need frameworks that are agile and adaptable. As a company, we participate in industry bodies and international commitments and organizations. Industry bodies, to name a few, the AI Alliance, Partnership on AI, Frontier Model Forum, and there are others. As for voluntary and international commitments, we are signatories to the White House Voluntary AI Commitments, the Bletchley Declaration, Munich Accord on AI and Elections, and so Frontier AI Safety Commitments on the G7 Hiroshima process implementation. We need to avoid fragmentation. Governments should build on their progress to establish consistent international positions that support the development of AI, that benefit society in a responsible way. This was a key underpinning of the UN resolution on AI approved early this year. Similarly, the G7 leaders just commit to step up on efforts to interoperability on AI governance frameworks. This recent government affair, Nick Clegg, was in a stage with the Prime Minister of Japan as they discussed the importance of the G7 Hiroshima process in bringing stakeholders together in order to harness the benefits of AI. We are also very active at the G7 task force that helped develop the survey to apply the code of conduct on the G7 Hiroshima AI process. And in fact, we are looking forward to work with G7 Canada in the next steps of implementation of the Eurasian AI. As a stakeholder forum, we are active participation at the OECD. We are members of the business at the OECD and OECD experts on AI. We are involved in supporting the development of the 2019 AI principles. And we’re also very pleased to see that principles turning into parts of the EU AI Act. So this is exactly what we want to see. These frameworks evolving among themselves and building upon each other instead of fragmented among themselves. Special thanks to my fellow panelist, Mr. Ida Sun, for his leadership at the G7 Digital and Tech Working Group, but also at the OECD Digital Policy Committee. Remote Stakeholder Frameworks, I also said we are part of the UAF AI Governance Outliners. So there is no response one fits to all. We are part of all these different efforts. There is also the global effort from the UN. We participate at the UN Global Digital Compact and are looking forward on the implementation of that. We are also very pleased to see the outcomes of the work of the UN High-Level Advisory Body on AI. The report they issued was excellent, particularly on the government. We are now looking for how to participate on the Independent International Scientific Panel on AI and the Global Forum on AI. Can you hear me? Okay. So now is one part that we are looking to see in all of this framework. It’s the open approach to AI development. Through all of these initiatives, one aspect of governance that is crucial and very important for us is the promotion of open source AI models. Open source AI has real potential to provide access to the world’s most advanced models at a global scale. We favor this approach because in many contexts we believe it is the right thing to do. It drives innovation. It creates better, safer products that everyone can benefit from. We also believe open source will be the key to unlocking the potential of AI across developing nations. Open source has several strategic benefits. It’s good for Meta. We benefit from a developed ecosystem of tools, efficiency, and proven integrations. It’s also good for developers. The open source AI allows developers to train their own models, control their own destiny without being locked into a single closed model. And above all, it’s good for the world. Open source will ensure that more people around the world have access to benefits and opportunities of AI. The power isn’t concentrated in a small number of companies, and then the technology can be deployed more evenly and safely across society. As of today, we have $600 million being used by broad communities of researchers, entrepreneurs, developers, and governments, as well as international government bodies. For example, we created a no-language-left-behind AI model, which UNESCO is using to help support high-level translation, including in low-resource and marginalized languages, such as indigenous languages. As we converge around frameworks, it is critical that they support an open approach to development of AI, that those frameworks are interoperable and non-duplicative, and that they enable AI to deliver on their potential, also advancing progress to the SDGs.


Timea Suto: Thank you so much, Flavia, for that. So with these two introductory statements, both from the government and the industry side, I would like to turn first to the panelists to see if there’s any reaction statements, and then to those of you on the floor, if you might have questions or reaction statements to what we heard. Ides, I’m from the panel. I think we can just… …both in name and also in the work of Japan.


Yoichi Iida: Okay, thank you very much. My name is Yoichi Rikida, Assistant Vice Minister from the Japanese Ministry of Internal Affairs and Communications, and I have been working as Chair, Committee Chair at OECD for digital policymaking, and also last year I worked as Chair of G7 Working Group, as well as the Hiroshima AI Process Working Group. So, having listened to the wonderful, previous two wonderful speakers, I want to pick up three points from the progress and development. over the last two or three years in AI governance. The first thing is, as we frequently mentioned, G7 AI governance very actively. We agreed on Hiroshima process for the conduct last year and this year under Italian presidency, we are discussing the monitoring mechanism and also the brand for the companies and organizations to implement the code of conduct. And we have a lot of support from OECD Secretariat and we are almost agreeing on the monitoring mechanism and the brand, but it takes a little bit time, but I hope we will put the Hiroshima process for local mechanism into actions and invite the private sector players to announce their commitment to those instrument early next year. Of course, this is my personal hope, but I believe G7 could move quickly, continuously quickly to get together. And this year under Brazilian presidency, G20 discussed AI for development. I believe this is a very important element, aspect of AI governance, because we always talk about AI governance to leave no one behind and the developing countries, people in the marginal communities should not be left behind, of course. And AI for development is a very important notion. And one of the efforts to in action is a second element of my presentation, which is Hiroshima Process Friends Group. Hiroshima Process Friends Group is still a kind of Japanese government initiative, but also with a lot of support from other G7 member countries. And this group now covers more than 50 countries, including all EU members. And we cover a lot from Asia up to Africa, and we are still actively increasing the number of the members. And we often hear a lot of voices from those countries that they are… very much welcoming these opportunities because they have less opportunities to listen to the discussions on international AI governance and they have less opportunities to be involved. So we need to provide those such opportunities to countries and communities and the people in marginal communities and we need to realize the multi-stakeholder approach in AI governance discussion too. So this is the second element and the second development through the year and also the third one is the global partnership on AI and OECD AI community, those two communities are integrated into one or the two. The global partnership on AI was launched in June of this year for the U.S. residency of G7 and now it’s in the hands of the G20 and the UNHC. So this is the third element and the third development through the year and also the third one is the global partnership on AI and OECD AI community, those two communities are integrated into one or the two. So this is the third element and the third development through the year and also the third one is the global partnership on AI and OECD AI community, those two communities are integrated into one or the two.


Timea Suto:


Audience: We’ve got a microphone here to the lady, please. A microphone. Yeah, my name is not said I’m a prominent object. I’m talking about AI and that there is a great concern about the data used AI. I don’t think that it is really happening that we are governing AI. That would not leave anybody in mind. And we’re not representing the set of people about them like sets of data sets. This is not what is happening. I’m representing the people in Egypt. They are represented. The platforms are biased. They feel that they have to go around to express their opinions. And this is all is somehow. Yeah, so I have a great concern about that. Thank you.


Timea Suto: Thank you for that question and that reflection. I think it’s going to be a good segue then to our next conversation on data because, and then if we would have another one, it would be have to be on connectivity. And if we had another one, it had to be an electricity. So it starts, I think, very, very deep back the presentation from the very beginning of where those divides are and how we bridge them. But I think the spirit that we hear is that we do want to bridge them. And we need to find the right partnerships on where we start closing those gaps. And how can we make sure that we go as far up now where we are at the end of the development spectrum with gen AI, but who knows tomorrow, and then there comes quantum and other things. But I think this commitment that we see here that I’ve heard also on the panel is the first step there. Would anybody from the panel like to react any further to that? Please, we got a microphone here.


Larisa Galadza: I think it’s a really good comment. And I would say a couple of things at the risk of taking away from my main speaking segment. I think that there is a willingness I’ve seen my last few months in this job, a willingness to a different kind of partnership when it comes to AI, and AI for good and AI for development and all those things. But I’m not algorithms and saying they’re not good enough, or they’re biased, or the data being used is not representative. I think the partnership requires someone to say, hey, we’ve got data sets in our country, can you help us put them together? Can you help us make them? We want to front We would like to support an initiative that uses our local language. And we would like to work with you. So I think that when you hear those of us in country. And, and doing what we can to try to bridge the divide, talking about nobody, you know, nobody left behind wouldn’t be the language that I use but it’s that it’s for the common good, that we’re looking for partners who say yes. We’ve got language, and we’ve got models and we’ve got skills and we’ve got data sets. We need compute, or we need someone to do some translation for us or whatever it is that’s required. That’s the kind of partnership that that’s the Canada, Canada is going to be looking for as we head into our G7, G7 presidency.


Timea Suto: Thank you for that. Any other comments from the floor, or is there anybody online. If not, then I’m just going to give the microphone back for one minute each to Thomas and then to Flavia to close up this segment, and then we move into our data discussion which I hope will be as exciting as this one was.


Thomas Schneider: Thank you. I’ll just also react to the parliamentarian from Egypt, I think it is, it is important that we try to align or make these different initiatives and instruments interoperable, but they also help to provide for solutions for the ones that are not yet part of it. Both. Then it’s stereo. So I think, and I also invite you to come and join the Council of Europe, but this is the normative legal part of it. The Huderia is supposed to trying to help all countries to do risk and impact assessment. And of course the data component. an important one, if there’s no data about your people, then the algorithm is of no use, even if the… So I think there’s several aspects of this and discussions like these are good to raise the awareness of what are the elements, where have we made progress? Where do we need more progress? What is priority? So thanks very much for this.


Flavia Alves: Let’s see if we can hear you with that microphone, Flavio. Yeah, take the one that’s, yeah, that’s the one. Thank you. Yes, yes, yes. So first, I think one thing I wanna make clear is that our project, No Language Left Behind, is about translation. It’s not necessarily about assets and trying to put your language there about… Yeah, I’ll keep talking, I don’t know if anyone can hear me. No. All right. Sorry, guys, I have 30 seconds. With regards to data sets, we agree with you that we also have an open source model that can actually implement. We have partnered with the Gates Foundation and have funding projects in Africa Pacific. I’m not sure what the delegate of Canada said. Let me, your input come to us to see what type of data sets we’re working out there for that. I’ll stop here because it seems that it’s not working. If we can take a two-minute break now and try and see if we can find a microphone that works for the panel. Can we try that one then? Okay, so these two, we can, I think, get back to you. Yeah, times the charm. Hello? Yeah, okay. Yes, it works for now. So yes, please, that’s what we want. We want to work together. That’s why it’s an open source approach with stakeholders, researchers and developers, countries, governments, international governments, that we can help develop AI that is a particularly open source, that is an equalizer. We want to make sure open source AI or AI gets through everyone. And that we don’t get in the same bridge that we had before with connectivity, where people were left. Of course, we need connectivity to get to AI, but at the time we want to advance the bridge, if possible. So, back to you.


Timea Suto: Thank you so much, Flavia. And as I said before, it’s a good segue into our next discussion, which we’re going to talk a little bit about what we have done. They can hear me with this one, I think, so this one is okay. Yeah, okay. So, what we have done as a global community this year to try and advance a little bit the conversations on data governance. And what are the challenges that we faced? Where can we still go, or where we need to work more to expand on this? And what can we do to make sure that our approach to data governance? Yeah, yes. I’m very sorry that we don’t have the- It may not be the best solution, these things that don’t work. Yes, exactly. Maybe there is a new development technology that we can use for this, but we’ll bear through this. Next year at the IGF, we’ll all be transported into virtual headsets. But until then, let’s talk a little bit about data, where we are with our data governance issues. What has happened, hope to go. I’ll turn first to Ida-san again to talk a little bit about his insights on the operationalization of data free flows with trust, and what you have done to find enablers for trusted government access to data, to privacy protection, and the considerations of the transfers and sharing of data across borders. And where do you still see barriers that we need to overcome? Thank you very much. We can’t hear each other.


Yoichi Iida: As well as for this very complicated and difficult questions, and I’m not quite sure I can answer appropriately, but I’d be happy to share what I know. from my experience as a development over the last year. And actually, the Japanese government proposed the concept of a data free flow with a trust, which encourage the relevant stakeholders to make orders as free as possible while ensuring the trust regarding data flow appropriately and aspect of privacy protection or intellectual property protection or probably other human rights protections. And this concept was discussed over the years and this year, early this year, OECD launched a DLFT expert committee, if I remember correctly, in February. And 200 experts getting together to discuss how we can promote data flow across borders while ensuring some legitimate protection of human rights and other freedom or other rights. And this committee is now long discussing three pillars to promote data flow across borders and the financial data flow across borders while of course ensuring the security of data and privacy protection. Second pillar is privacy protection enhancement technology, which is often called PET. And there will be a lot of different types of technological solutions to protect privacy when we flow data across borders. And this group is discussing how we can enhance and also deploy such technologies to promote data flow across borders. And the third element is legal transparency around the data, I’m sorry, data flows. So I think different jurisdictions are taking different approaches on data flow and the data protection. And just like the people discussed with AI, the data policy is also needs a lot of interoperability and this group is discussing how we can promote interoperability across different jurisdictions and how we can ensure the transparency about the data governance framework including the regulations. So this is the development regarding data through the trust and one of the important elements here is the trust for what trusted the government access to the data held by private entities. And this is based on the declaration taken by the member countries of OECD at the end of the year 2022. And this declaration is discussing how the government has to evade or follow some principles when they access the data held by private sector entities. Even when they want to use data for law enforcement or some legal. So different countries have different systems when we need law enforcement bodies and the police and other entities wants to access to the private data. And we discussed what are the kind of consequences elements here and what are the gaps here. So this group is also now discussing what would be the next element. And the one element is this is just the agreement among only 38 member countries of OECD and now they are trying to approach the countries outside OECD and to understand what the OECD members are commonly following and what would be the potential gaps or potential commonalities with the countries outside the group and probably try to find the global commonality and the consistency about the government access to private sector data. And from the similar perspective, OECD also the data sharing and the data access. And this recommendation is also now being discussed to enhance the practical implementation of this recommendation into action. So quite a lot of approaches are taken now and the main point is again the interoperability. in different jurisdictions while we protect the common universal, kind of universal, I’m not quite sure we can say universal, but commonly held principles across different countries and different communities, different cultures around the world. So there is a kind of presumption that data should be used and to produce as much benefit as possible and for the people, for the common good. So I think, again, we always talk about, you know, no one leave behind, no one left behind, and it is always very difficult to achieve, but the continuous endless effort is very important and we never forget about this concept, no one left behind. So that is what I can share at this moment and look forward to further discussion. Thank you very much.


Timea Suto: Thank you. And so two things that I pick up from your input to what we’ve heard in the AI conversation is that need for interoperability of approaches to policy and to regulations and the need to avoid fragmented approaches in the spirit of wanting to make sure that, first of all, we create an environment where all stakeholders and businesses have the certainty and the reliability of where we’re going forward, but also to make sure that everybody is well represented and is part not just of the services themselves, but also of the governance conversations around it. So I’m going to turn to Marit. and now from Europe preface a little bit of, I think what you are going to bring in because I hope you will tell us a little bit about how the European approach is to this but also how industry in Europe sees the conversation on planetary governance and developing. Floor is yours.


Maarit Palovirta: Super, thank you very much. Thank you very much Tamea. I hope you can hear me loud and clear. So just for those of you who don’t know Connect Europe, we are a trade association based in Brussels and our members are the leading operators. And just to give you an idea, so our members today serve about 270 million Europeans with different types of connectivity services. And now you might be asking yourself, well, what is this lady doing here in the data session? She should be in the connectivity session. But of course there is a very close link between connectivity and content. So the data travels in the networks that our members are running. And also the provision of connectivity services and network services of European operators rely on cross-border cooperation with various different third parties. So whether it be vendors or partners or other types of service providers. And to make things even more complex, cloud and cloud computing has certainly brought another aspect into the data governance in that data in between the networks, of course then is stored and processed in the cloud. And yeah, if you look at the ecosystem, not the specialized cloud service providers, but also the operators increasingly involved in the cloud business, in edge cloud, et cetera. So there’s a kind of interdependence between the different players. And of course, it’s very important that we have a data governance model and hopefully some level of interoperability to make sure that costs, especially costs for the operators and different parties are kept intact, et cetera. Now, I’ll talk a little bit about the approach in Europe quite briefly. I think that Europe has been leading in the data protection in many ways because data privacy and protection is something that both our policymakers but also citizens hold very dear. And we have a, I think we have a, and also a policy framework within Europe. And then now more recently, we also start to have a data framework that goes beyond Europe. So looking at the third party relations, but just to look at within Europe first. So we of course have our GDPR, the General Data Protection Regulation for Personal Data. And I believe that this is quite well known also globally. And we consider this as really being the baseline and the basic rules for data in Europe. And while the GDPR is not perfect, I mean, we do consider it as a, let’s say, good example globally speaking. Then rules and maybe not so well known internationally, but something that we called the Privacy Directive, which was a kind of historical legacy piece of regulation and which imposes some sector specific, very restrictive rules regarding data management and especially on telecom operators. And we believe that today, this type of sector specific rules have become a kind of out of touch with the data economy today. And here we really come to the question that we need to, at the same time, while we protect, we need to start also promoting innovation. And this, I don’t think it’s such a good example coming from Europe, if you like. And then really putting it into today’s context, we believe that when we look at rules on privacy, that all digital players should be subjected to the same horizontal rules of privacy, as they often process the same kind of data, for example, localization data. And we can think of many digital services players or even car manufacturers that today plan. And so we believe that really a horizontal solution would be the most effective one. And hopefully this would also, if you like, level a little bit or reduce the fragmentation in terms of data governance frameworks. And then we have more recently, we have some new rules on cross-border data. And especially when it comes to cross-border government access to data in the shape of the Data Act that was… adopted earlier this year, and then we have some for example require cloud and other data processing services to prevent third country governmental access and transfer of industrial data held in the EU, if such a transfer access is illegal under the EU or the member states law. And this of course, well it complements the GDPR in many ways, and we have welcomed it as European Selecom operators, as it provides some level of legal certainty to our members. On an enabling side, the EU has concluded various free data flow agreements. I think also with the US, which is a major one. And from the industry side, I mean we believe that these agreements are very welcome, and they bring more data and legal clarity, and also safeguards for businesses and citizens. I think that, you know, as a final point from Europe, it is also very important to note that it’s not only about policy frameworks or regulation, it is also about technical solutions and interoperability. And we, for example, in a slightly kind of, let’s say marginal context, but there’s also ongoing work in the EU to work on some common cybersecurity certification schemes, which can be seen as, you know, helping to limit foreign government access to EU data and help us securing EU data. Now going to your question about risks of fragmentation, Tamir, I think that our common global and open and interoperable internet, and especially also at the technical standards and protocols level. And maybe just, I would like to mention here, I mean, there are many risks, as we have already heard, but I’ll mention two examples that certainly have come up in some ways in the EU context lately. One is the evolving global connectivity infrastructure and the connectivity ecosystem that carry our data traffic and store our data. And I already mentioned the cloud, but for example, today we talked a lot about submarine cables and satellite becoming really part of the connectivity ecosystem. And I think that’s, you know, and our members are also involved in these activities, but we need to then also consider interoperability, but also the legal certainty of carrying our data through the new and the evolved connectivity value chain. And also, of course, it’s a question of resilience. Now, we’re not here asking for regulation on this, we’re just hoping that when we look at this data governance framework, that we have a kind of holistic look on these things. The second thing, if I may, it is on data sovereignty. And this is a text, you know, kind of an example that has come up quite a lot. And we see this also in the EU context. So, of course, different parts of the world, they have the legitimacy to try and protect their own businesses and citizens with different kinds of data governance regimes, if you like. But then there is, can be a kind of protectionist or commercial also incentive to create these data areas that’s, you know, then when they go too much too far, it becomes still businesses, and this includes businesses from that region. So, of course, if everybody starts looking at things too much from the whole perspective, then businesses will face increased costs and also legal complexity. So here we would be, you know, pulling from balancing act, while of course, you know, in the European context, we privacy and data protection is a very important, important thing. So, very briefly, to conclude the way forward. So we believe that innovation, of course, and global digital commerce are important, and they need also to be protected. And but, you know, it needs to be very clearly in balance with the rights and values and European context, especially data protection. And we believe from the operator side that this is best achieved through a horizontal, so not sector specific policy framework, that are also flexible, future proof, ideally, although this is a challenge for all policymakers, and we are not, of course, jealous of their role, and also technologically neutral. So I would maybe stop my initial remarks there, thank you.


Timea Suto: Thank you so much, Marit. And then, so the conversation that we’ve had on AI and highlighting the need for interoperability, I think we can add to that a little bit more, if you’d be remarks and Edith’s remarks, the needs for a more holistic approach, so that we look at the various sectors and see, not just the sectors of the economy, but also the sectors of regulation that we have, sometimes regulation in one area might impact the regulation in other, and we’re not realizing those impacts. And then, of course, the needs to harmonize across regions. And as Maria said, she had to leave, unfortunately, for another speaking engagement, but she was emphasizing her opening remarks, is to try and reinstate the trust in global cooperation and multilateral cooperation as well. Otherwise, we will get into too much of an inward-looking situation where it’s not going to be good. So what we want to achieve, that we were talking just earlier about, including everyone in the data conversation. So with that, are there any comments or questions from the floor regarding the data segment of our panel? Anybody would like to say anything? Can we please get a microphone to the lady? Thank you.


Audience: Thank you, Shredda. I will try to be quick. It’s just about the data. I think that’s why we are fighting to get legislation, the EFD, you know, data and information inside, not just Egypt. I think in several countries in Asia and other places, so it’s very high, but thank you.


Timea Suto: I heard your concern. I will share this concerns. I think that the question of the question, the concern of the. She was. Yes. And I agree.


Yoichi Iida: It’s about not complete data. And our capacity to give it up. I think that’s the question. I think that’s the question. I think that’s the question. I agree. The answer is there. And I. I comment. It’s a very important issue that. We all have to think. Oh. And. Now. The question. Is. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. It’s. I can agree with you. Now. It’s. It’s. It’s. It’s. It’s taken to the. Technically. But yes. Here’s. We are sharing. If I take an example, for instance. Particular application, which is. Federated learning. Transfer data. Send the model to somebody. To train the model. And then you bring back the weight. And you can not transfer data. I think it’s important. To think about. Look at. It’s. It’s. It’s. It’s.


Audience: Thank you. prevention and solutions. Just this time, I came along with a big problem of access to electronic evidence to environmental solutions. And I’m really surprised that in this whole series of discussions about free flow data, you mentioned the question of access to information and law enforcement. But it’s very interesting to mention the question of stimulation. Stimulation is extremely important to the world. How that can be realized? And in the same country, especially in the profession of health, we need to think about human participation. I think as long as we don’t address this question straightly, stimulating people in situ, organizations that have answers, I screamed how it is accessible.


Timea Suto: Seeing no more questions, I’ve also spoken on this to address we’ve had a question about making sure that we process data and then we talk about governance, we have a question around whether we are talking about data transfer or access transfer and how do we deal with trying to get into the sphere of that. I’m sure you can answer those questions. Thank you for volunteering. And thank you to all of our presenters for being such level of discussion. But when we want to put such a notion into practice, we recognize there will be a lot of difference and gaps to be addressed across jurisdictions. And yes, government access is a very difficult question and also we have a cyber security convention or something like that. Cybercrime convention.


Yoichi Iida: Cybercrime convention, yes. So it is very sensitive and very difficult questions across the This is something we have to address and there is no single answer coming overnight, but relevant people, actually, when we started the discussion on government access to data, we were very much surprised to see, you know, different people are gathering, people from, we are the digital economy policy people, but actually we had a group of intelligence people, police and law enforcement people, or even some lawyers and people from the court. We always have a widespread aspect of data regulation and governance, and this is something we have to tackle all together, and the answer is not always very easy, but when we talk about the bias of data for AI, we have also struggling, the gap, and probably, you know, Japan is also struggling with the development of AI ecosystem, and most of the technologies are based on English, and Japanese is a very small language, so now we are trying to develop multi-language models using different kind of marginal, some small-scale languages together, and we are working with different partners from Asia and other regions to develop our own language models to reflect different differences, but also in cultures, which is very important when we talk about developing language models. So, we share a lot of difficulties and challenges together, and we hope, you know, we need to tackle, we hope we tackle these challenges all together, not only by the government, but across different communities. Thank you very much.


Maarit Palovirta: If I may maybe address a little bit the question of Bertrand, the evidence, or let’s say a more obligations, the regulatory obligations that, for example, operators have. vis-a-vis law enforcement. I mean, it’s a very tricky topic. If we’re looking at it kind of purely from a data economy perspective without any societal responsibility, of course it is a cost to operators. It complicates things. I mean, recently we discussed the law, the legal intercept obligations within Europe, and an operator from one of the bigger European countries said that it costs them 15 million a year just to comply with the legal intercept obligation. So it is not nothing. It is a big responsibility and obligation. But at the same time, for the society to work well and to put the criminals into jail, of course this then is maybe necessary. But from the data governance and how do you fit it into the framework, of course that’s not an easy task. And from our side, I mean, we wouldn’t want to go, of course, judging the rightfulness or the wrongfulness of it for the moment. It is the way it is.


Timea Suto: Thank you. Thank you for that. I see that we have no comments online, and I don’t see any hands up in the room. So I think we can move on from the data conversation. I think we’ve thrown up quite a few highballs in these first two rounds, and these are the topics that we see not just individual governments or stakeholders struggling with, but when we look at the global level, when we look at the United Nations or various regional fora, we see quite a lot of struggle on how we actually make sense of the governance of all of this. How do we take all these issues and try and connect those who are working on the various policy try to make them more aware of one another and then what are some of the other structures that might or might not be necessary to help with not only the practical implementation but the global governance discussions around all of this. So we had quite a significant process this year where Germany was holding one of the pan holders for the Pact for the Future, a huge feat I think in multilateralism on many issues but we’ll focus on digital today, complemented with the Global Digital Compact. And then we have a number of multilateral fora, we’ve mentioned the G7 so many times and Canada now is taking up the baton moving forward so how do we deal with all of this in that context and also talked about taking the work of G7 and making it broader in other fora so how do we move towards that idea and then of course where does the private sector come in in all of this so that’s what we’re trying to figure out in the remaining 40 minutes or so that we have on this panel, also keeping in mind that we are at the IGF which is the product of society that is coming up to a very significant milestone next year so in this context I’m just going to ask first Irina to take a little bit of stock of what has happened this year with the Pact for the Future and the Global Digital Compact and how do we move into moving all these discussions ahead both in the GDC context but also looking ahead to the OSCIS plus 20. Over to you Irina.


Irina Soeffky: Thank you very much, indeed internet governance is very important to us and maybe it’s not much to sense the basis of everything that we’ve been discussing so far so we are really digging to the core now and Yeah, it’s important decisions have been taken, others are still about to be taken, and I think a lot is at stake. I mean the, the internet as we know it is working incredibly well also through the pandemic on a technical level at the same time there are already very challenging developments that are taking place on the internet. That’s like deep fakes, misinformation, lots of phenomena that are deeply troubling, probably to all of us and really go to the root of our democratic societies. And, well, all this makes clear that we need internet governance also in the future and maybe it’s not only internet governance but digital governance but I know that an entire academic debate could turn around this question so maybe I leave that out for the moment, but indeed it’s very important and what I have to say is that for us at the core of internet governance really is multi stakeholder for stakeholder collaboration and the IGF is really the prime example to show how this is done, as we can experience here during the day already and in the coming days still. And this is also well, this is really the, the key for us, and really the basis that everything else is turning around and we really think that we need on one hand to protect it because I think it’s not, it’s not given that internet governance in a multi stakeholder way is going forward. And on the other hand, I think it’s also necessary to develop it further because it would be, yeah, nobody would believe me if I said, it’s already perfect in every single way and we can’t fix anything and we can’t develop it further in any regard. And this has also been well, so to speak, the guidelines for the processes that have already taken place. And we’re also very important for us. and the processes that are coming. Very much involved in the pact of the future, a little less in the global digital compact, but that such a document, such a compact exists is really a major achievement that countries at UN level managed to agree on a document. And we are happy with what we have as a product now. It’s not yet implemented and this process will, or these processes rather, will also be very important. But to have such a document, I think, is really of very big importance. Obviously, probably if we had a vote now, not every single country, not every single person or stakeholder is happy with every single bit of the global digital compact, but I think this is also something that is probably not doable at all. So we are happy with what came out, that something came out and it wasn’t really clear from the start or also along the way that we would succeed. And there are some elements in there that are particularly important to us. And again, they go to the, well, to the core, as I stated, multi-stakeholder model is mentioned. The IGF was an important form of multi-stakeholder discussion and involvement is mentioned in there. We have something really new, which is that internet shutdowns are not acceptable. So there’s a lot of important things that we agreed to on a very broad basis. Well, as I said, implementation will be important now. And I think was, as is probably the rule on such a high level and with so many partners involved that not everything is clear yet, but we need really to work hard to figure out how is all this working and how can all this fit together? And this is maybe the major challenge that we see that it would not be helpful to have a bunch. of new institutions, different fora, discussing the same topics with different players, because I think they’re more difficult and not easier. And in particular, if we want stakeholders really to participate, it would be possible. I mean, it’s hard already for governments to cover everything. Yuichi already hinted at it when he was talking about AI governance, which is really a complex picture by now, but it’s even more difficult for, especially for stakeholders, civil society, for example, to really cover all those different fora. So we really need focus. And as I said already, we really do think that the IGF should not only be one important forum for internet governance, but the important and the premier forum for that. And we try to work on that, work hard in that. And we have been having lots of discussions with different partners, different stakeholders on what it would need, how we could develop it further. It could be IGF or maybe even DGF, Digital Global Forum, could look like. And this is really a process that we want to work hard on. And well, as you said already, this is one milestone, a major milestone, I would say. Implementation remains to be done and is a fragile thing and things can go well and not so well, maybe in this regard. And then there is another process coming up, the WSIS Plus 20 review. And this is also very important because there indeed, we have to decide how we will go on with the IGF, how it will look like in the future. And therefore, well, we as a government try to be as involved, as engaged as possible. So we became or we will be becoming next year, which is quite around the corner, a member of the Commission on Science and Technology for Development has quite an important role to play in this process. So we try to be involved there. we also find important and I think there is probably still room for manoeuvre or for improvement if we look back to the GDC process, it’s really important to involve. If we talk about multi-stakeholder collaboration and how this can be done in a meaningful way in the future, we certainly cannot do it without involving all those players. So this is something we really hope to do, not alone, definitely not alone, together with partners. And well, I think as much conversations that we can have in this regard, also on how to convince really people and governments, but also outside governments, that this is really an important moment in time and it’s really right or wrong now, not just for us or for something we find important, but for something that is so basic for everybody in the world, I think this is really important. And we’re really looking forward to, well, to do our part of the job, but also to work together with partners, with stakeholders, to find a good solution there. And yeah, for that, obviously it’s also important, I mean, to have these conversations and as many for us as we can, to really get a sense of what is important and what is maybe why we are very much looking forward to the Canadian presidency of the G7, because I think this is one of the fora we can really talk and also strategize of how we can get that right. With that, I think it’s best if I just


Larisa Galadza: give you the microphone. Thanks. It’s really good to be here. It’s really good to be learning from multi-stakeholderism is really great for an education about what happens in all the different parts of society and business and government and for all people in managing this resource that we share collectively in the internet and digital space. To hear about it all, and I’m not going to rip repeat all the progress that has been made because you’ve heard about it all here from people who have been part of the process or even leading the process. The contribution I’d like to make to this is from the perspective of where I sit. So I am Canada’s senior official on cyber, critical tech, and I also have a responsibility for democratic resilience in the government of Canada. And I sit in the international security branch of the foreign ministry. I’m not a digit or anything. I’m in the international security branch of our foreign ministry and I work for our political director. And so my perspective on progress and the year ahead is from that seat and also in being in Canada, I guess, from the seat of the next president of the G7. I’d like to call our attention to sort of the context for the work over the next year. I think we’re in a context where actually it ain’t broke. The internet I think is working a heck of a lot better than the technology in this room today. And it wasn’t until I started this job that I realized just how much complexity there is to making it work. So there’s many, we have many sayings about this problem that we’re studying right now in English. It’s, you know, if it ain’t broke, don’t fix it. Don’t throw the baby out with the bath water. Leave well enough alone. It’s not to say, as my colleagues have said, that there isn’t room for improvement, but we are in a context where we know who lives in Kiev. I work out with him three times a week. The Zoom works, the encrypted texting works, and I can send him money once a month. And when I tried to send him money at an address that was of a bank that was in a part of Ukraine that is occupied, I wasn’t allowed to send money. So there we see every day in our lives that there are really. that the internet works. That’s my first point. The second thing that has struck me is the extent to which geopolitical strategic competition is playing out at the most strategic levels, and it’s playing out at the most practical levels. What I’m very heartened to hear is actually when it comes to the practical, it works. This is an area where there is still trust. This is an area where countries that have very different ideas about how this universe should work still managed to cooperate, because it’s at that very practical level that we see what the benefit of the current system that we have is to all of us. We feel the benefits. The third bit of context is that there’s real urgency to this work. There’s serious urgency to it. Why? Because the technology isn’t waiting for us to figure it out. It’s not waiting for our policy frameworks or for our legislative frameworks or for us to figure out how we’re going to do things together. The technology is actually dual-use technology. As Thomas said, we’ve done this before, but never, I don’t think, have we had the speed of the evolution of a dual-use technology. It is imperative for us to deal with technology like AI. Thirdly, as the opening speaker said, we are living a crisis of the multilateral system. Over the next year, the multilateral system needs to figure out some of these questions. Whether that system breaks or survives will be borne out in these discussions. The last thing is that there’s a real, even in something as hard-edged as the international security world, there’s a real recognition of the importance of the multilateral system. that what we’re talking about is a global public good that must be shared, that our security, the stability of the world is not unless we share the benefits of the technology and the benefits of connectivity, the benefits of the internet. And so ensuring participation of the global majority at all governance tables is really important. And certainly doing development differently with the tools, the new tools we have is the only option that we have. So the year ahead has lots of opportunities. Yes, Canada will continue to focus on AI in particular. And we really thank the Japanese and the Italians for making significant progress and working urgent way that the subject matter demands. WIS is plus 20. You all know it better than I do. What’s at stake there? There’s another IGF. Then there’s the definition of how we’re going to implement the GDC commitments on AI, the scientific panel and the global dialogue. How those are defined, form will define function. And so this is a real opportunity. And in all of that, Canada will be active because of the urgency of the situation. We will uphold fervently multi-stakeholderism. We will look to do things that advance the SDGs. We will advocate for transparency in all of these processes and we will do it because we recognize that trust is absolutely critical. Trust between every. aspect of the puzzle that sits on this stage, trust with our citizens, trust between different parts of the world. And I would just conclude by saying this the next year is really an inflection point. There is an awful lot going on. It’s going to test our resolve. It’ll make or break some of the governance that we have that has done very well. And I think it’s going to be a year where that geopolitical strategic competition continues to play itself out. And managing that, managing the pace of change, managing the urgency, the demands and the commitments will continue to be exhausting. But we’ve done it before. We’ll just keep doing it again.


Timea Suto: Thank you so much, Larissa, for that. I’m going to ask you to please pass the microphone to the end of the row. Thank you so much.


Amr Hashem: Thank you. And I know that I’m the last speaker, so I will not take much of time, especially that I’m an engineer. So as an engineer, we usually don’t manage to get so many words to speak about, but we like to talk in numbers. So just to share with you some kind of numbers about the mobile industry that I am representing in this gathering, that currently 96% of the world population is mobile coverage and mobile broadband coverage. Actually, 4.6 billion people, almost 57% of the global population access the internet primary through mobile broadband. And I believe that this percentage of 57% will go even higher when we are talking about developing countries where mobile coverage is much wider and much more reachable and affordable. to people compared to fiber connectivity and other means for internet access. Yet, we are facing a challenge, the original WSIS document reflects the time that it was written in the early days of the information society. So it doesn’t really recognize the key role that mobile has to come to play in the community and businesses around the world. When we are talking about SDGs, again, using some numbers to describe the impact that the mobile industry is contributing to the SDGs, the figures that we have showed that the mobile industry achieved almost 58% of its potential contribution to SDGs. We are trying to measure what direction or what dimension that we were most impactful and we found that the SDG 9 related to industry innovation and infrastructure is where we were most impactful, mainly driven by the reach of the mobile. By end of 2023, the share of the mobile population without internet broadband coverage is less than 4%, 350 million people, while 57% of the world population are actually using the mobile broadband as we mentioned before. So the use of mobile is not only limited to connectivity or accessing the internet as you have mentioned. financial services are actually a major area where mobile industry has made a impactful contribution. With almost 3 billion people, more than 50% of the mobile subscribers are actually using mobile money and mobile banking services by 2023. Yet we hope that throughout the process there will be a real multi-stakeholder approach when it comes to the way forward in order to connect the rest of the people. Whereas we, the mobile operators and the mobile industry are projected to spend about 1.5 trillion dollars over the period from now till the end of 2023. There remains a gap between the projected investment and that needed to realize the government’s digital policy objectives. Especially when we are taking into consideration the growing need for broadband. I mean when we are talking about broadband now it is completely different experience than the broadband that we will need to experience in 2030 when the metaverse will be realized and when we are talking about this new technology. So in order to realize these technologies we have or we need to think about new means for financing this connectivity and for creating an environment that will enable that. And we hope that the review of the Waze plus 20 will recognize this and will encourage governments and other stakeholders to contribute to this investment gap that we are witnessing and we are trying to bridge in order to really leave nobody behind. Thank you.


Timea Suto: Thank you, Amer. So we’ve had three speakers talk about taking stock of the actual governance conversations that happened this year and looking ahead for WSIS plus 20. So what I’ve noted here as you were talking of how we look ahead and what is it that we would like to see done. So of course, you’ve all talked about more cooperation, less new structures, but better coordination of what is already out there. You have talked about the importance of informed policymaking and the need to have stakeholders contribute to that. You’ve talked about making sure that we don’t throw babies out with bathwaters and we actually make sure that we preserve the core of what is actually working, the technology, and adjust and make sure that our policy and regulatory frameworks enable the technology to continue on working and not pose extra barriers to that. And then you’ve all mentioned multistakeholderism, multistakeholderism and input to policymaking, multistakeholderism and the multistakeholder approach to policy conversations, but also the multistakeholder approach to implementation, whether that comes in forging partnerships, whether that comes in making the investments that are necessary, or in making sure that the policy frameworks that we come up with actually enable the technology to work, enable those who don’t have a voice to have a conversation, and also enable the innovation that we need to balance out with the potential areas where we want to address risks. So a lot of rich ideas coming out from the panel, but we have about 15 minutes to hear a little bit from the audience on how you see the road going. Are these the right elements that we should take away from this panel discussion to move into the WSIS++20 process at the GDC implementation? Do you have other ideas? Do you have any remaining questions to our speakers? So I would like to turn it over to the audience. And with that, I hope that our technician colleagues are ready to also share the microphone with you all so that you can speak. Are there any questions or comments from the floor? Raise your hand, we’ve got your microphone. Yeah, there’s a question for Jorge and then for Desiree. There, a microphone please, there. Thank you. There in the back. Yes, I think we’ll share the one up here.


Audience: I hope you hear me okay. So I just wanted to break the ice, but I saw that Desiree also raised her hand. So I’ll be very brief. I think it would be really great, well, Jorge Gánzio Swiss government to pass a very clear message coming from this IGF. And I think we’ve been hearing it in your panel. The first one is that we are still very deeply committed to a vision that was laid out in WSIS of a human-centric information society, a digital society that we want to work towards that goal. That we have to update, of course, the substance of what we agreed 20 years ago, what we reviewed 10 years ago, looking into connectivity, what it means today, the human rights implications of our digital world on data governance, on AI governance, and you cannot have… one without the other, and that we are eager to update also the structures we have to govern this, that we have a very good basis with WSIS, that there’s a good impulse with the new chapter written by the GDC, but it’s just a new chapter in a book we’ve been writing for 20 years, that we are ready to be innovative in how we update the multi-stakeholder approach of doing things. We have good ideas coming, for instance, from the Sao Paulo multi-stakeholder guidelines that were agreed in Sao Paulo earlier this year, and that it’s very important to commit to a non-proliferation of processes, because more processes, more governance kills inclusivity, and you wouldn’t have two spoons and a Swiss army knife. So let’s be functional, let’s respect the forms, and let’s avoid duplications that are unnecessary. Thank you. Thank you Jorge.


Timea Suto: We have the question there from Desiree first, and then Bertrand.


Audience: Thank you, my name is Desiree Milosevic-Evans. I listened to the takeaways of what’s been discussed, and I think much of what you’ve suggested seems like a common concept, but also looking forward in terms of reviewing the WSIS action lines, bearing in mind that a lot of good things are already in the document laid out in the Tunis agenda and the Geneva plan of action. What does the panel think about gender as an issue? Was it there in 2003 and 2005? Because we’re talking about inclusivity and digital inclusion. I wonder whether that’s something that the panel thinks should also be an issue to be discussed. The WSIS lines are good, and we’ll see how much the progress is done, but I think I single out that particular issue. Thank you. Thank you, Desiree. Bertrand, just behind you. Hi, Bertrand de La Chapelle again, there’s a lot of issues that are going to be addressed in 2025 in the context of the WSIS plus 20 other aspects. I like very much the comment about it’s going to be an inflection point, and I hope it will be an inflection point. We’re taking stock of 20 years, and some of us have been here for those 20 years. Even here I have the bag of the first IGF of 2006, which is a testimony of the sustainability approach that they adopted, by the way. Kudos to Marcus Coulomb. That’s a private joke for those of you who were there. But more seriously, among all those issues, there is one topic that I think of particular importance, which is what is going to be the future of the IGF, not only just the continuation, but how do we improve it, restructure it? Isn’t it time to have a serious discussion, maybe a little bit like the Working Group on Internet Governance back in 2004, to have a dedicated effort, not just a series of reports, some of which were very good, but let’s be honest, most of them have been filed the moment they were assigned, having a group that could, after the WSIS Plus 20 review, discuss seriously what is the new structure, what is the institutional arrangement that will be set in place. We know, and I finish with this, that there will be no agreement from the start by all governments, and therefore I think that there is a particular role for the governments who have hosted the IGF, who have made the effort to host the IGF. and that includes Japan, that includes Germany, that includes Switzerland, and to the countries who will be in presidency of different groups, and that includes Canada for their weight, behind an effort that could take place at the IGF in Norway, in the middle of the year, to send a clear message to the drafters of the resolution in the UN General Assembly, that there needs to be a paragraph that says, it is time to have a serious discussion on the new mandate. We will have 2026 to really discuss this in a multi-stakeholder manner, and not just a discussion in New York among the governments. Important element in the agenda, it doesn’t exclude all the different other topics, but I’m just taking the opportunity of having a few key governments here on the panel to raise the idea.


Timea Suto: Thank you, Bertrand. Jacques, please, and then we’ll go back to the panel.


Audience: My name is Jacques Beglinger, and I’m speaking here with my hat as a member of the board of EuroDIG, and co-chair of the Swiss IGF, and I would like to emphasize my question on the definition of stakeholder. I thought it pretty demanding to follow what all has been said, now in the past two hours, and explaining this to stakeholders might be quite difficult. Now, what do we see as a stakeholder? Are stakeholders just saying, well, they are just different groups represented by the top most possible understanding bodies, or is in the future of the IGF, still the little citizen, the corporate citizen, the editorial citizen? C of the multi-stakeholder process.


Timea Suto: Thank you, Jacques. So I’m going to turn back to the panel and we’ve had four types of intervention, four questions that I think all move in the same way, like how Bertrand put it, future doesn’t have to equal only continuation. Future needs to mean some sort of progress or improvement. So how do we take that, and this is going to be my final question to the panel, and you can pick and choose which question you want to elaborate more on this, but what do we take from our discussions as a hope for improvement as we look into the future? How do we improve the existing WSIS action lines? How do we improve the inclusion of various stakeholders or our governance models? How do we improve the IGF’s mandate? And how do we improve inclusion, especially gender inclusion? So what are your one-sentence takeaways, or I know now the the x limit is longer, so I got 140 characters, but what are your short takeaways with views to improvement as we move to WSIS plus 20? So I’m going to start, Flavia, you volunteered, so with you.


Flavia Alves: Yes, sure. So I want to start with the questions in the interoperability or getting all governments from groups together at IGF. This is a great idea. In fact, from what we understand is that Norway is planning to do that, similar to last time, to put the group together to have some documents to discuss at the IGF. As I spoke today, there are several international frameworks around AI, but it’s not only on AI, there are several other international frameworks on several other issues. So it would be crucial for these groups to get together to see how a real interoperability can exist of even the working methodologies, because for us, we don’t have enough time for people to engage substantially in all various issues. In addition to that, I think you’ll be… important for us to really give a voice for all stakeholders. Sometimes having frameworks that you invite only stakeholders to speak and provide like a session is not necessarily inclusive. We need to give time to our stakeholders to provide comments to what is being proposed and actually have feedback and then getting out together. A good example of this is NetMundial, of course, a document that has existed and has been developed again early this year in Brazil. But how can we actually make that, then implement that? And so giving a real voice to stakeholders, getting groups, head of hosts of G7, G20, the OECD, and the IGF, what is it that we can do at the IGF together to address that?


Timea Suto: Thank you, Flavia. Any volunteers? If I’m not, I’m just going to ask you to pass the microphone. Yeah, Larissa.


Larisa Galadza: I think on the question of commit to nonproliferation of processes, I think it’s really incumbent upon every process to be clear about what its comparative advantage is to all the other processes. Because the decisions about what process survives and doesn’t isn’t going to be made by people who have participated in all of these. Because we’re all stakeholders in our own understanding. And if the comparative advantage of a given process isn’t clear, then it won’t survive, and perhaps it shouldn’t survive. So I think that’s incumbent upon, in this case, the IGF to make sure that that is clear. And I think that IGF should be as open as possible. So not just the topmost bodies, but whoever wants to come. There’s just, it’s kind of a low stakes environment. Come and participate. It doesn’t crowd the space. There’s lots of room here. And in terms of the future of the IDF, I really like the idea that we talk about what is the new mandate, because it puts the default at it is continuing, should it continue? It is continuing and how do we make sure that it’s fit for purpose? So however that goes forward is important. As for gender, I mean gender at this point should be mainstreamed through everything and that’s actually what we should be aiming for. That’s how to future-proof the issue of gender. In Canada we have a model that does that analysis of everything through a gender lens without putting up a lightning rod that says gender.


Irina Soeffky: Yeah, thank you. I can go on. Well, I have a lot of sympathy for many of the suggestions that I heard and really have a deep discussion of where we want to go, who are going to be relevant actors, how we can also achieve this in practice. And I do also agree that probably it’s a hard thing to do next year, basically, or even less than a year. And this is maybe the note of Realpolitik that I want to finish with. I think our minimum goal should be that there is an IGF with an unlimited term, full stop. But looking back at the GDC discussions, we have seen that there are very different ideas and they’re strong and it’s all about alliance building. So I would say we should have reasons and probably we can’t convince others without having at least a glimpse of it. But I also think we shouldn’t overburden the discussion that we have ahead of us. So I think we should really focus on the core, as I said already, of what we want to achieve. And if the trick is by really having an ongoing process afterwards and really digging into the details, that would be wonderful. But I really think, well, especially having followed New York discussions quite closely, I’m indeed a bit worried that things could also turn in. Indeed we want to avoid that and coming to that or coming to the conclusion it’s maybe we also well we have to be visionary but we also have to be tactic and how best to move ahead to build alliances to convince to convince partners and I think I’m not not decided on that yet but I think we really have to think hard to multi stakeholder world that we do have


Thomas Schneider: Thank you first first to start with a reply to to to Jacques I think yeah but we we thought 20 years ago that the world was complicated and the Internet was something complicated looking looking back now it seems that things then were quite quite simple so I’m what I’m trying to say is we have to basically do the margin walk between trying to be inclusive, trying to be specific. But at the same time trying to be understandable to an average person although this is a little bit of an illusion if you’re honest because we don’t have 5 billion average persons sitting here. We have to serve different levels of interest and knowledge to patrons question I think something that actually struck me again came to my mind this morning. I think it’s paragraph 72 point G or whatever of the Tunis agenda. The one of the key things of the IJF, and no matter what the latest emerging technologies what we should not change is the IJF mandate to look into emerging issues on Internet or whatever you call it governance, because if the latest thing today is AI tomorrow there will be something else and I think this is one of the deliverables that the IJF has. It’s always the first platform to get. new issues on the agenda, set it on the agenda of others. So this is, I think, in my view, one of the core deliverables. Inclusivity, of course, is another thing. Although the question is, how do we get those at the table that do not want to be at the table? Not those that cannot. We can fund them and support them. Those that do not want to be at the table is another thing. They may not want to be at the table because others are at the table, which I will not go into too much detail. But I think a good question is also on the new stuff that is being built around AI. If it now is, what do you do with the rest? Do we just subordinate everything else under the new stuff that is created on AI? And with everything else, I mean everything else. Or what is the division of work between those new things that will be created on AI? And the more legacy things like the IGF and the WSIS process, but also even more legacy stuff that is looking into issues per se, whether it’s health or climate or whatever. And I think, well, maybe not everything is yet fully thought through with the…


Timea Suto: Great, thank you. Thank you, Tomasz. All right, Ida-san? Okay, so just quickly, the gender. I think gender equality is very important.


Yoichi Iida: But now, look at the panel. The male is minority now. So I’m not saying that gender balance is not important, but probably we need to address some of the asymmetry points. Because digital space, women, girls face different types of risk and challenges, rather than males. So we need to address those challenges and risks. And then we may… achieve a kind of very equally enabling space for both men and women. That is probably the central issue in the future discussion on gender equality. And comment by Bertrand really struck me. Yeah, we often talk about the bottom line to keep, protect, and promote IGF and the stakeholder approach. But we believe that will be the bottom line, a minimum level, as Irina said. And of course, we want to achieve more, because the condition and situation is very different in digital economy. We have AI. We have mobile. We have very, very many different factors compared to 2005. So we have to look and we have to see, because GDC negotiation was really difficult. And we saw a lot of gaps and differences and diversity from different, not only different governments, but also from different communities. So probably opening more open and enabling discussion space for different stakeholders would be very important. And then we need to think about our own strategy, probably to IGF itself, but maybe reform and strengthen this framework for the future internet space, which I believe cover AI and other new technologies as enabling factors. So I think that’s all. I can’t say now, but thank you very much for the very productive questions.


Timea Suto: Thank you. We have two more panelists left who haven’t had their last words. Who wants to go first? Yeah.


Maarit Palovirta: Yes, I mean, I can only but agree, just maybe to Jacques’s question, I mean, how to involve everybody and who are the stakeholders and, you know, how can we make sure that everybody has a say, who wants to have a say indeed. I mean, I think it’s all about preparation and I think it’s also important that although we’re talking about the global internet governance, that we, you know, at the same time, it comes bottom up. So, for example, in Europe, we have the regional initiatives on internet governance and when we now look at the WSIS plus 20, for example, the European Commission, who is just was the European voice in there together with the member states, they have now put out open public consultations on internet governance, so that European citizens can comment, etc. And of course, you can argue that, you know, you still need to be in the know and maybe, you know, it’s not available for everybody. But I think that, you know, at least in that way, you also open a little bit the discussion at the national and regional level and, you know, for people who want to have a say. Thank you.


Amr Hashem: And Amir, for the last word. Okay, having the challenge of saying something new after all what was said. My idea is that sometimes you turn this nice governance forum into a platform for actually taking some actions that would result in impactful action. I mean, the discussion and the open discussion and having everybody saying things are great and it is nice to talk and maintaining this multi-stakeholder approach is always welcome. But actually, you might like to start thinking about supporting reforms, supporting people, recognizing the effort, something like that. I hope when you are thinking about the process for the plus 20, to think about it more from a private sector perspective rather than from a government perspective. In the private sector, we don’t like to talk. We like to work and to achieve our objectives. So our KPIs are not that we went and we talked, no, our KPIs should be a result that we have improved our situation. We have changed this. So we hope that the forum will be more for private sector driven, more private sector inclusion and all the best of luck.


Timea Suto: Thank you, Amir. That all leaves me with thanking our panelists. We are already beyond time, so I will not share my takeaways. But I do want to thank you all for bearing with us, with bearing with the technology issues. It’s day zero. We always have kinks to work out. It will get better from here, I’m sure. But I do want to thank for all the rich contributions of industry and what we discussed here and actually contributed to the process that we worked to. So thank you all and a big round of applause to all of you. Thank you. Thank you. I hope I did not exhaust you.


T

Thomas Schneider

Speech speed

168 words per minute

Speech length

1717 words

Speech time

611 seconds

Need for interoperable regulatory approaches

Explanation

Schneider emphasizes the importance of creating interoperable regulatory frameworks for AI governance. He suggests looking at how previous disruptive technologies were managed to find parallels for AI governance.


Evidence

Draws parallels between AI and the governance of combustion engines in the 19th century


Major Discussion Point

AI Governance


Agreed with

Flavia Alves


Yoichi Iida


Maarit Palovirta


Maria Fernanda Garza


Agreed on

Need for interoperable regulatory approaches


Differed with

Flavia Alves


Differed on

Approach to AI governance


Balancing innovation and risk mitigation

Explanation

Schneider discusses the need to balance innovation with risk mitigation in AI governance. He argues for approaches that allow for technological advancement while addressing potential societal risks and ensuring equitable benefits.


Major Discussion Point

Global Digital Cooperation


F

Flavia Alves

Speech speed

152 words per minute

Speech length

1424 words

Speech time

561 seconds

Importance of voluntary industry commitments

Explanation

Alves highlights Meta’s commitment to developing responsible AI and participating in various international AI governance frameworks. She emphasizes the need for agile and adaptable frameworks given the rapidly evolving capabilities of GenAI.


Evidence

Meta’s participation in industry bodies like AI Alliance, Partnership on AI, Frontier Model Forum, and international commitments like White House Voluntary AI Commitments


Major Discussion Point

AI Governance


Agreed with

Irina Soeffky


Larisa Galadza


Agreed on

Importance of multi-stakeholder collaboration


Differed with

Thomas Schneider


Differed on

Approach to AI governance


Y

Yoichi Iida

Speech speed

96 words per minute

Speech length

1947 words

Speech time

1211 seconds

G7 Hiroshima AI process and code of conduct

Explanation

Iida discusses the progress made in AI governance through the G7 Hiroshima process. He mentions the development of a code of conduct and ongoing work on monitoring mechanisms and branding for companies implementing the code.


Evidence

G7 agreement on Hiroshima process for AI conduct, discussions on monitoring mechanism and branding under Italian presidency


Major Discussion Point

AI Governance


Agreed with

Thomas Schneider


Flavia Alves


Maarit Palovirta


Maria Fernanda Garza


Agreed on

Need for interoperable regulatory approaches


Data free flow with trust concept

Explanation

Iida explains the concept of data free flow with trust, which encourages stakeholders to make data flows as free as possible while ensuring appropriate trust regarding privacy protection and other rights. He mentions ongoing discussions at OECD on this topic.


Evidence

OECD launch of DLFT expert committee in February, discussing three pillars to promote data flow across borders


Major Discussion Point

Data Governance


A

Audience

Speech speed

111 words per minute

Speech length

1251 words

Speech time

674 seconds

Concerns about biased data and representation

Explanation

An audience member raises concerns about the data used in AI systems, particularly regarding representation of diverse populations. They argue that current AI governance efforts are not adequately addressing these issues.


Evidence

Example of people in Egypt feeling underrepresented in AI datasets and platforms


Major Discussion Point

AI Governance


Need for government access to data for law enforcement

Explanation

An audience member highlights the importance of considering government access to data for law enforcement purposes in data governance discussions. They suggest that this aspect is often overlooked in conversations about free flow of data.


Major Discussion Point

Data Governance


Need to update WSIS vision and structures

Explanation

An audience member suggests that the vision and structures established by the World Summit on the Information Society (WSIS) need to be updated. They argue that while the core vision of a human-centric information society remains relevant, the substance and governance structures should be revised to reflect current realities.


Major Discussion Point

Future of Internet Governance


Improving IGF mandate and structure

Explanation

An audience member proposes a dedicated effort to discuss and improve the Internet Governance Forum’s (IGF) mandate and structure. They suggest that this discussion should take place after the WSIS+20 review and involve multiple stakeholders.


Evidence

Suggestion for a working group similar to the Working Group on Internet Governance from 2004


Major Discussion Point

Future of Internet Governance


Ensuring inclusivity and stakeholder participation

Explanation

An audience member raises questions about the definition of stakeholders and how to ensure true inclusivity in internet governance processes. They emphasize the importance of involving not just top-level representatives but also individual citizens and smaller entities.


Major Discussion Point

Future of Internet Governance


M

Maarit Palovirta

Speech speed

147 words per minute

Speech length

1755 words

Speech time

714 seconds

EU approach to data protection and cross-border data flows

Explanation

Palovirta discusses the European approach to data protection and cross-border data flows. She highlights the importance of GDPR as a baseline for data protection in Europe and mentions newer rules on cross-border data transfers.


Evidence

GDPR as the basic rules for data in Europe, Data Act adopted earlier in the year


Major Discussion Point

Data Governance


Agreed with

Thomas Schneider


Flavia Alves


Yoichi Iida


Maria Fernanda Garza


Agreed on

Need for interoperable regulatory approaches


A

Amr Hashem

Speech speed

113 words per minute

Speech length

760 words

Speech time

403 seconds

Mobile industry’s role in expanding internet access

Explanation

Hashem emphasizes the significant role of the mobile industry in providing internet access globally. He argues that mobile broadband is the primary means of internet access for a majority of the global population, especially in developing countries.


Evidence

96% of world population has mobile coverage, 4.6 billion people (57% of global population) access internet primarily through mobile broadband


Major Discussion Point

Data Governance


Private sector perspective on achieving concrete outcomes

Explanation

Hashem suggests that the Internet Governance Forum should focus more on achieving concrete outcomes rather than just discussions. He proposes thinking about the process from a private sector perspective, emphasizing results and measurable improvements.


Major Discussion Point

Global Digital Cooperation


Differed with

Irina Soeffky


Differed on

Focus of internet governance discussions


I

Irina Soeffky

Speech speed

156 words per minute

Speech length

1557 words

Speech time

598 seconds

Importance of multi-stakeholder model

Explanation

Soeffky emphasizes the critical role of multi-stakeholder collaboration in internet governance. She argues that this approach is essential for addressing complex digital policy issues and should be protected and further developed.


Evidence

Reference to IGF as a prime example of multi-stakeholder collaboration


Major Discussion Point

Future of Internet Governance


Agreed with

Flavia Alves


Larisa Galadza


Agreed on

Importance of multi-stakeholder collaboration


Differed with

Amr Hashem


Differed on

Focus of internet governance discussions


L

Larisa Galadza

Speech speed

152 words per minute

Speech length

1553 words

Speech time

612 seconds

Implementing Global Digital Compact commitments

Explanation

Galadza discusses the importance of implementing the commitments made in the Global Digital Compact. She emphasizes the need for clarity on how these commitments will be put into action, particularly regarding AI governance.


Evidence

Mention of upcoming definition of implementation for GDC commitments on AI, including the scientific panel and global dialogue


Major Discussion Point

Global Digital Cooperation


Agreed with

Irina Soeffky


Flavia Alves


Agreed on

Importance of multi-stakeholder collaboration


M

Maria Fernanda Garza

Speech speed

103 words per minute

Speech length

648 words

Speech time

377 seconds

Aligning priorities and reducing regulatory fragmentation

Explanation

Garza emphasizes the need to align priorities and reduce regulatory fragmentation in digital governance. She argues that this is crucial for creating certainty for businesses, supporting economic growth, and fostering cross-border collaboration.


Evidence

Reference to increasing regulatory and policy fragmentation due to geopolitical tensions and competing national priorities


Major Discussion Point

Global Digital Cooperation


Agreed with

Thomas Schneider


Flavia Alves


Yoichi Iida


Maarit Palovirta


Agreed on

Need for interoperable regulatory approaches


Agreements

Agreement Points

Need for interoperable regulatory approaches

speakers

Thomas Schneider


Flavia Alves


Yoichi Iida


Maarit Palovirta


Maria Fernanda Garza


arguments

Need for interoperable regulatory approaches


Importance of voluntary industry commitments


G7 Hiroshima AI process and code of conduct


EU approach to data protection and cross-border data flows


Aligning priorities and reducing regulatory fragmentation


summary

Multiple speakers emphasized the importance of creating interoperable regulatory frameworks for AI and data governance to reduce fragmentation and ensure consistency across jurisdictions.


Importance of multi-stakeholder collaboration

speakers

Irina Soeffky


Flavia Alves


Larisa Galadza


arguments

Importance of multi-stakeholder model


Importance of voluntary industry commitments


Implementing Global Digital Compact commitments


summary

Speakers agreed on the critical role of multi-stakeholder collaboration in internet governance and the implementation of global digital initiatives.


Similar Viewpoints

Both speakers emphasized the need for flexible and adaptable governance frameworks that can accommodate rapidly evolving AI technologies while ensuring responsible development.

speakers

Thomas Schneider


Flavia Alves


arguments

Need for interoperable regulatory approaches


Importance of voluntary industry commitments


Both speakers discussed approaches to balancing free flow of data with necessary protections for privacy and other rights, highlighting the need for trust in cross-border data transfers.

speakers

Yoichi Iida


Maarit Palovirta


arguments

Data free flow with trust concept


EU approach to data protection and cross-border data flows


Unexpected Consensus

Recognizing the effectiveness of current internet infrastructure

speakers

Larisa Galadza


Amr Hashem


arguments

Mobile industry’s role in expanding internet access


explanation

Despite coming from different sectors (government and industry), both speakers acknowledged the current effectiveness of internet infrastructure, particularly in mobile connectivity, which was unexpected given the focus on challenges and improvements in most discussions.


Overall Assessment

Summary

The main areas of agreement centered around the need for interoperable regulatory approaches, the importance of multi-stakeholder collaboration, and the balance between innovation and risk mitigation in AI and data governance.


Consensus level

There was a moderate level of consensus among speakers on key issues, particularly on the need for collaborative and flexible governance frameworks. This consensus suggests a shared understanding of the challenges in digital governance and a common direction for addressing them. However, there were also divergent views on specific implementation strategies and the role of different stakeholders, indicating that while there is agreement on broad principles, the details of implementation remain contentious.


Differences

Different Viewpoints

Approach to AI governance

speakers

Thomas Schneider


Flavia Alves


arguments

Need for interoperable regulatory approaches


Importance of voluntary industry commitments


summary

Schneider emphasizes the need for interoperable regulatory frameworks, while Alves focuses on voluntary industry commitments and agile, adaptable frameworks.


Focus of internet governance discussions

speakers

Irina Soeffky


Amr Hashem


arguments

Importance of multi-stakeholder model


Private sector perspective on achieving concrete outcomes


summary

Soeffky emphasizes the importance of multi-stakeholder collaboration, while Hashem argues for a more results-oriented approach focused on measurable improvements.


Unexpected Differences

Gender representation in digital governance

speakers

Yoichi Iida


Audience


arguments

Data free flow with trust concept


Concerns about biased data and representation


explanation

While discussing data governance, Iida unexpectedly brought up the issue of gender representation on the panel itself, suggesting that men were now a minority. This contrasts with the audience’s concern about underrepresentation of diverse populations in AI datasets, highlighting a potential disconnect in understanding representation issues.


Overall Assessment

summary

The main areas of disagreement revolve around the approach to AI and data governance, the focus of internet governance discussions, and the understanding of representation and inclusivity in digital spaces.


difference_level

The level of disagreement among speakers is moderate. While there is general consensus on the importance of addressing AI and data governance issues, speakers differ significantly on the specific approaches and priorities. These differences could potentially impact the development of cohesive global digital cooperation strategies, particularly in balancing regulatory frameworks with industry-led initiatives and in ensuring true inclusivity in governance processes.


Partial Agreements

Partial Agreements

All speakers agree on the need for some form of AI governance, but differ on the specific approach. Schneider advocates for interoperable regulatory frameworks, Alves emphasizes voluntary industry commitments, and Iida focuses on international processes like the G7 Hiroshima AI process.

speakers

Thomas Schneider


Flavia Alves


Yoichi Iida


arguments

Need for interoperable regulatory approaches


Importance of voluntary industry commitments


G7 Hiroshima AI process and code of conduct


Similar Viewpoints

Both speakers emphasized the need for flexible and adaptable governance frameworks that can accommodate rapidly evolving AI technologies while ensuring responsible development.

speakers

Thomas Schneider


Flavia Alves


arguments

Need for interoperable regulatory approaches


Importance of voluntary industry commitments


Both speakers discussed approaches to balancing free flow of data with necessary protections for privacy and other rights, highlighting the need for trust in cross-border data transfers.

speakers

Yoichi Iida


Maarit Palovirta


arguments

Data free flow with trust concept


EU approach to data protection and cross-border data flows


Takeaways

Key Takeaways

There is a need for interoperable and flexible AI governance frameworks that can be implemented globally while adapting to local contexts


Data governance approaches should balance free flow of data with privacy protection and security concerns


The multi-stakeholder model remains crucial for internet governance, but needs to be updated and strengthened


There is an urgency to address governance of emerging technologies like AI due to their rapid development and potential impacts


Future internet governance structures should avoid fragmentation and proliferation of processes, while improving inclusivity and stakeholder participation


Resolutions and Action Items

Work towards implementing the Global Digital Compact commitments on AI, including establishing the scientific panel and global dialogue


Develop a monitoring mechanism and branding for companies to implement the G7 Hiroshima AI Process code of conduct


Use the upcoming WSIS+20 review to update the vision and structures for internet governance


Discuss potential improvements to the IGF mandate and structure at the next IGF in Norway


Unresolved Issues

How to effectively include developing countries and underrepresented groups in AI and data governance frameworks


Balancing innovation with risk mitigation for emerging technologies


Addressing biases in AI datasets and algorithms


Determining the appropriate division of work between new AI governance bodies and existing internet governance structures


How to engage stakeholders who are unwilling to participate in multi-stakeholder processes


Suggested Compromises

Focus on protecting and developing the core multi-stakeholder model, while allowing flexibility for implementation in different contexts


Balance the need for global frameworks with preserving national sovereignty on certain governance issues


Mainstream gender considerations throughout governance frameworks rather than treating it as a separate issue


Combine visionary goals for internet governance reform with tactical, achievable steps in the near-term


Thought Provoking Comments

AI is not the first disruptive technology that mankind has learned to seize opportunities and minimize risks. And there’s a number of parallels that can be drawn with the way that we actually managed engines, combustion.

speaker

Thomas Schneider


reason

This comment provides a valuable historical perspective, framing AI governance within the broader context of how society has dealt with disruptive technologies in the past. It’s insightful because it suggests that while AI presents unique challenges, we can learn from previous experiences in technology governance.


impact

This comment shifted the discussion towards considering historical precedents and lessons learned, encouraging participants to think about AI governance in a broader context. It led to further discussion on the need for flexible, context-based approaches to AI governance.


Open source AI has real potential to provide access to the world’s most advanced models at a global scale. We favor this approach because in many contexts we believe it is the right thing to do. It drives innovation. It creates better, safer products that everyone can benefit from.

speaker

Flavia Alves


reason

This comment introduces the important concept of open source AI as a potential solution to issues of access and innovation. It’s thought-provoking because it challenges the notion that AI development should be proprietary and suggests a more collaborative, global approach.


impact

This comment sparked discussion about the role of open source in AI development and its potential to address issues of global access and equity. It led to further consideration of how open source approaches could be incorporated into AI governance frameworks.


To address these challenges, we must pursue greater alignment while preserving the flexibility to meet diverse local needs. A single, centralized, global regulatory superstructure is neither feasible nor feasible.

speaker

Maria Fernanda Garza


reason

This comment highlights the tension between global alignment and local flexibility in digital governance. It’s insightful because it acknowledges the complexity of creating a governance framework that can be both globally coherent and locally relevant.


impact

This comment set the tone for much of the subsequent discussion, encouraging participants to consider how to balance global and local needs in their approaches to digital governance. It led to further exploration of multi-stakeholder approaches and the role of different forums in governance.


The next year is really an inflection point. There is an awful lot going on. It’s going to test our resolve. It’ll make or break some of the governance that we have that has done very well.

speaker

Larisa Galadza


reason

This comment emphasizes the critical nature of the upcoming year for digital governance. It’s thought-provoking because it frames the current moment as a pivotal point that will significantly impact the future of digital governance.


impact

This comment heightened the sense of urgency in the discussion and encouraged participants to think concretely about the immediate future of digital governance. It led to more focused discussion on specific upcoming events and processes, such as the WSIS+20 review.


Isn’t it time to have a serious discussion, maybe a little bit like the Working Group on Internet Governance back in 2004, to have a dedicated effort, not just a series of reports, some of which were very good, but let’s be honest, most of them have been filed the moment they were assigned, having a group that could, after the WSIS Plus 20 review, discuss seriously what is the new structure, what is the institutional arrangement that will be set in place.

speaker

Bertrand de La Chapelle


reason

This comment proposes a concrete step forward in improving internet governance structures. It’s insightful because it suggests a specific mechanism for addressing the challenges discussed throughout the panel.


impact

This comment shifted the discussion towards more concrete, action-oriented proposals for the future of internet governance. It sparked discussion about the potential for a new working group and the need for substantive reform of governance structures.


Overall Assessment

These key comments shaped the discussion by broadening the historical and theoretical context of digital governance, highlighting the tension between global and local needs, emphasizing the urgency of current governance challenges, and proposing concrete steps for future action. They moved the conversation from abstract principles to more specific considerations of governance structures and processes, while also encouraging participants to think creatively about solutions to global digital challenges. The discussion evolved from a general overview of current issues to a more focused consideration of immediate next steps and long-term structural changes in internet governance.


Follow-up Questions

How can we ensure that AI development and governance includes and represents marginalized communities and developing countries?

speaker

Audience member (unnamed)


explanation

The speaker expressed concern that current AI governance efforts are not truly inclusive and may be biased against certain populations.


How can we improve access to electronic evidence for environmental solutions while balancing privacy and security concerns?

speaker

Audience member (unnamed)


explanation

This was raised as an important issue that needs to be addressed in data governance discussions.


How can we update and improve the WSIS action lines to reflect current technological realities, particularly around AI and data governance?

speaker

Jorge Cancio


explanation

Updating the WSIS framework was identified as necessary to address new technological developments since its creation.


How can gender issues be better incorporated into future internet governance frameworks and processes?

speaker

Desiree Milosevic-Evans


explanation

The speaker highlighted gender as an important issue that may need more explicit focus in governance discussions.


What should be the new mandate and structure for the IGF to make it more effective and relevant?

speaker

Bertrand de La Chapelle


explanation

Reimagining the IGF’s role and structure was proposed as a key area to explore for improving internet governance.


How can we ensure true multi-stakeholder participation that includes individual citizens, not just high-level representatives?

speaker

Jacques Beglinger


explanation

The speaker raised concerns about defining stakeholders too narrowly and excluding grassroots participation.


How can we make internet governance processes and frameworks more understandable and accessible to the average person?

speaker

Thomas Schneider


explanation

This was identified as an ongoing challenge for ensuring broad participation in governance.


How can we address the specific risks and challenges faced by women and girls in digital spaces?

speaker

Yoichi Iida


explanation

The speaker highlighted this as an important aspect of gender equality in internet governance.


How can we make internet governance forums more action-oriented and focused on achieving measurable results?

speaker

Amr Hashem


explanation

The speaker suggested shifting from discussion to more concrete outcomes and private sector involvement.


Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Day 0 Event #75 Addressing Information Manipulation in Southeast Asia

Day 0 Event #75 Addressing Information Manipulation in Southeast Asia

Session at a Glance

Summary

This discussion focused on foreign information manipulation and interference (FEMI) in Southeast Asian countries. Experts from Indonesia, Australia, the Philippines, and Vietnam shared insights on the information landscape and challenges in their respective countries. They highlighted how disinformation, both domestic and foreign, impacts public opinion and political processes.

The speakers noted that while disinformation is widely recognized as a problem, FEMI is not consistently perceived as a threat across Southeast Asian nations. They discussed various approaches to combating disinformation, including government regulations, platform accountability, and digital literacy campaigns. However, they also acknowledged the difficulties in balancing effective governance with preserving democratic freedoms and free speech.

The discussion revealed that the sources and nature of disinformation vary across countries, with some facing more domestic issues while others contend with foreign interference. The rise of generative AI and deepfakes was identified as an emerging challenge, particularly in election contexts. The speakers emphasized the need for multi-stakeholder approaches involving governments, civil society, and tech platforms to address these complex issues.

Questions from the audience prompted discussions on the real-world impacts of disinformation, the role of social media platforms, and the challenges of determining who should be the arbiter of truth. The speakers agreed on the importance of regional cooperation and inter-regional dialogue to tackle FEMI effectively. They also highlighted the need for context-specific solutions and the challenges of implementing uniform approaches across diverse political systems in Southeast Asia.

Keypoints

Major discussion points:

– The information landscape and challenges with disinformation/foreign interference in Southeast Asian countries like Indonesia, Philippines, Vietnam

– Government and civil society responses to combat disinformation and foreign information manipulation

– The role of social media platforms and need for better content moderation

– Balancing regulation of disinformation with freedom of expression

– The need for regional cooperation and multi-stakeholder approaches

Overall purpose:

The goal of this discussion was to examine the issue of foreign information manipulation and interference (FIMI) in Southeast Asia, share case studies from different countries, and explore potential solutions and best practices for addressing this challenge.

Tone:

The overall tone was academic and analytical, with speakers presenting research findings and policy perspectives in a neutral, factual manner. There was a sense of concern about the impacts of disinformation, but the tone remained measured and solution-oriented throughout. The Q&A portion allowed for some more pointed questions and debate, but the tone remained largely collegial and constructive.

Speakers

– BELTSAZAR KRISETYA: Researcher from CSIS Indonesia, moderator

– PIETER ALEXANDER PANDIE: Researcher at the Safer Internet Lab and Department of International Relations at CSIS Indonesia

– FITRI BINTANG TIMUR (FITRIANI): Senior Analyst at Australia Strategic Policy Institute (ASPI)

– MARIA ELIZE H. MENDOZA: Assistant Professor, Department of Political Science, University of Philippines

– BICH TRAN: Postdoctoral fellow, Lekwungen School of Public Policy, National University of Singapore

Additional speakers:

– Alexander Pandi: Researcher from CSIS Indonesia

– Koichiro: Cybersecurity expert from Japan

– Luisa: Advisor for the German-Brazilian Digital Dialogue Initiative

– Nidhi: Audience member

– Eliza: From Vietnam, working in Germany

– Fawaz: From Center for Communication and Governance, New Delhi

Full session report

Foreign Information Manipulation and Interference in Southeast Asia: Challenges and Responses

This discussion brought together experts from Indonesia, Australia, the Philippines, and Vietnam to examine the issue of foreign information manipulation and interference (FIMI) in Southeast Asia. The speakers shared insights on the information landscape and challenges in their respective countries, highlighting how disinformation, both domestic and foreign, impacts public opinion and political processes.

Research Initiatives and Information Landscape

Beltsazar Krisetya introduced the Safer Internet Lab (SAIL) research program, which focuses on studying online harms, platform governance, and digital rights. SAIL collaborates with various stakeholders, including civil society organizations, to address these issues.

Pieter Alexander Pandie presented findings from an Indonesian case study, drawing on a database of FIMI instances in Southeast Asia from 2019 to 2024. He noted the increasing use of AI-generated disinformation in elections, including a deepfake video of a former Indonesian president.

Bich Tran outlined Vietnam’s information landscape, consisting of three main components: domestic media, foreign media with Vietnamese language service, and social media. She highlighted Vietnam’s concerns about China’s disinformation campaigns regarding South China Sea disputes.

Maria Elize H. Mendoza described the Philippines’ information ecosystem as saturated with “independent” media practitioners spreading disinformation, mentioning AI-generated audio of the current Philippine president as an example.

Government and Societal Responses

The speakers discussed various approaches to combating disinformation, including government regulations, platform accountability, and digital literacy campaigns. However, they also acknowledged the difficulties in balancing effective governance with preserving democratic freedoms and free speech.

There were notable differences in how governments approach the issue. Bich Tran mentioned that Vietnam created Task Force 47 to counter “wrong views” on the internet, taking a more active and restrictive approach. In contrast, Maria Elize H. Mendoza stated that the Philippine government has failed to effectively address electoral disinformation, leading to civil society taking on more responsibility.

Fitri Bintang Timur (Fitriani) shared information about the ASEAN task force on countering fake news and its guidelines, highlighting regional efforts to address the issue.

The speakers agreed on the need for a multi-stakeholder approach involving government, civil society, and tech platforms to address disinformation effectively. They also emphasised the importance of regional cooperation and intelligence sharing, particularly given the disparities in cybersecurity capabilities among Southeast Asian nations.

Challenges in Combating Disinformation

Several key challenges were identified in the fight against disinformation:

1. Defining and attributing foreign information manipulation and interference consistently, with a need for context-specific definitions for Southeast Asia or the Asia-Pacific region

2. Balancing political stability concerns with freedom of expression

3. Addressing the lack of digital literacy, which exacerbates susceptibility to disinformation

4. Combating confirmation bias, which makes people susceptible to believing disinformation

5. Dealing with the rise of generative AI and deepfakes, particularly in election contexts

6. Potential misuse of anti-fake news laws to infringe on freedom of speech

The speakers agreed that technical solutions alone are insufficient to combat disinformation. They highlighted the need to consider sociological factors and implement a more holistic approach.

Recommendations and Future Directions

The discussion yielded several recommendations for addressing disinformation:

1. Develop a Southeast Asian or Asia-Pacific specific definition for FIMI

2. Strengthen regional cooperation and intelligence sharing on disinformation issues

3. Incorporate digital literacy education at all levels of schooling

4. Engage in multi-stakeholder and inter-regional cooperation to research disinformation and its real-world impacts

5. Implement voluntary codes for tech platforms while maintaining government’s ability to intervene if needed

6. Balance effective governance of information ecosystems with protections for democratic freedoms and civil liberties

7. Encourage tech platforms to address confirmation bias through algorithm transparency

The speakers emphasised the need for context-specific solutions, acknowledging that a one-size-fits-all approach to combating disinformation in Southeast Asia may not be effective.

Unresolved Issues and Future Considerations

Several issues remained unresolved and warrant further discussion:

1. How to effectively regulate tech platforms without infringing on freedom of speech

2. Who should be the arbiter of truth in determining what constitutes disinformation

3. How to address the broader sociological problem of confirmation bias and incentives for spreading disinformation

4. How to improve the effectiveness of digital literacy campaigns, especially for those who haven’t formed their opinions yet

5. How multiple countries can work together to more effectively demand action from tech platforms in addressing disinformation

6. Determining the best platform for addressing FEMI in the Asia-Pacific region, as raised by Koichiro from Japan

In conclusion, the discussion highlighted the complex and multifaceted nature of foreign information manipulation and interference in Southeast Asia. While there was consensus on the need for collaborative, multi-stakeholder approaches, the speakers also acknowledged the challenges in implementing uniform solutions across diverse political systems and information landscapes. As the threat of disinformation continues to evolve, particularly with the rise of AI-generated content, ongoing regional cooperation and adaptive strategies will be crucial in addressing this pressing issue.

Session Transcript

BELTSAZAR KRISETYA: to Alexander Pandi, my colleague, researcher from CSIS Indonesia as well, and also Dr Bik Chan, postdoctoral fellow, Lekwungen School of Public Policy, National University of Singapore. And also joining us online is Maria Mendoza, Assistant Professor, Department of Political Science, University of Philippines, as well as Dr Fitriani, Senior Analyst at Australia Strategic Policy Institute, or ASPI. Okay, before we begin our session, kindly allow me to provide a little bit of context about who we are as the organisers, and also why do we pick this topic to be presented amongst other ongoing research projects that we are also presenting, that we are also conducting in Southeast Asia and the Pacific in general. So, MeatSaver Internet Lab, it is a research program that were co-constructed, if you will, or co-concepted by CSIS, our home institution in partnership with Google, Google Indonesia back then, and followed by Google Asia Pacific later on. It is a research hub that convinces all researchers and also practitioners working on information ecosystem. So, on the first year, we are trying to capture the whole supply chain, if you will, of this information. So, we conducted some kind of anthropological research to disinformation actors. We tried to cover how buzzers or cyber troopers and bots conducted the influence operation campaign in Indonesia. We also conduct a user-centered research by conducting surveys on public susceptibility on disinformations to promote the balance between digital information and political literacy. And we also conducted a platform-facing research on, we want to explore further, what are the co-governance models that are acceptable and yet better responses and mitigations, and can bring along the government actors, tech platform, as well as civil society, in one forum and in one institution. And so, we’ve been doing this for the second year in a row now. We’ve concurrent with the 2024 general elections that were conducted in Indonesia. And so, we collaborate a lot with information actors, as well as electoral actors in Indonesia. We also shaped the dialogue with international communities in which we joined as speakers and also participated in the UNESCO forum, UN forum, and also several diplomatic embassies. We’ve also hosted an academy conference on disinformation in Indonesia, as well as publishing ad reports in which you can find the printed version of the report in our booth just outside of this room. We’ve established a booth for the entire IGF 2024, so feel free to drop in anytime. And for this year, 2024 going forward, we will be focusing on three research. The first is the impact of deepfakes on online fraud, how AI, how generative AI would worsen the topography of online scams in Southeast Asia. We also take a closer look into the impact of disinformation to democratic resilience, how is the net sum of democracy after a series of electoral tsunami, if you will, in 2024, and where does the information resilient place a part in this. And lastly, the one that we are going to present on this occasion is on information manipulation and interference. We are also a part of the Global Network of Internet and Society Research Center, or Global Network of Centers, in which institutions such as Harvard University, Oxford Internet Institute, the CIS at Stanford, and other probably 100 to 200 institutions focused on internet society convene in an academic discussion globally. So that’s a short presentation on SAIL, but we will delve further into one topic that is probably in growing interest across the region, which is on the information manipulation. We have an Indonesian case study, a Vietnamese case study, Philippines case study, and some perspective from Australia. Without further ado, I will let Peter, probably 10 to 15 minutes, to present the case on foreign information manipulation and interference, and whether what is happening in this part of the world, which is Southeast Asia, there are some parallels that can be drawn to instances that are also happening elsewhere. So please, Peter, the time is yours.

PIETER ALEXANDER PANDIE: Thank you very much, Beltz. Again, thank you everyone for attending the session. My name is Peter Pandey, a researcher at the Safer Internet Lab and also a researcher at the Department of International Relations at CSIS Indonesia. So as Beltz has very well introduced, the Safer Internet Lab this year has three research streams that we’ve tried to conduct for the second year of research of this research lab, and I will be focusing mostly on the foreign information manipulation and interference and instances of that occurring in Southeast Asia, and I’ll also be covering a little bit about the information landscape in Indonesia specifically, and how that correlates between foreign-based disinformation or domestic sourced disinformation. So as part of the research stream for FEMI in SAIL this year, we’ve tried to create a database that’s tried to make records of FEMI instances in Southeast Asia from 2019 to 2024. So what we’ve done is, from open source sources, we’ve tried to make a database of cases of where information operations, whether traditional, digital, or offline, have been made in Southeast Asia from 2019 to 2024. And for the data set, we’ve tried to make those three categories. So for traditional media influence, examples include when influence actors place advertisements, hires or pays or influences a journalist or opinion leader to share their part of the story on media, and so on and so forth. For digital media influence, these would be cases such as coordinated and non-ethnic behaviors, creation of troll and bot networks to share narratives on digital media, and offline influence include diplomatic influence, economic investment, and so on and so forth. But for part of this research, we’ll be focusing mostly on the digital aspect of it. So part of the ongoing research, what we found so far as part of our data set, is that while disinformation has been discussed openly by countries in Southeast Asia, FEMI has not been discussed that much across Southeast Asian states. And that’s, we’ll delve into the reasons why later, but for disinformation specifically, what we found is that countries in Southeast Asia tend to focus more on disinformation as the topic, but not FEMI. So what they’ve tried to address by policy is disinformation that’s occurred domestically, but not much discussion of FEMI more broadly. So as part of our data set, we’ve discovered that earlier, through our early findings, is that so far the data set shows a tail of two halves between 2019 and 2024. So from 2019 to 2021, we found that cases of FEMI were not quite high. Most of the disinformation cases that occurred in Southeast Asian states were domestically sourced, that were attributed, so they were mostly domestic, created by local actors or sometimes government actors. But from 2022 to 2024, what we found is that there has been an increase of FEMI case, reported FEMI cases, and also a greater diversity of threat actors that have been operating in Southeast Asia’s information landscape. So the correlation that we’ve sort of made as a result of these data findings is that there has been an increase of FEMI and influence operations in Southeast Asia, concurrent with rising geopolitical tensions between great powers and also a rising number of international conflicts. So the Russian-Ukraine conflict, the ongoing conflict in the Middle East, and so on and so forth. These have in fact increased the number of influence and FEMI operations in Southeast Asia, whereas from 2019 to 2021, it was still mostly domestic focus. So in addressing disinformation, as I’ve covered before, most countries still use national approaches to legislation, rarely through attribution, so very few countries, if any, attribute where the sources of disinformation are. If they’re foreign, if they’re domestic, it’s more likely the case that it would occur, and even more rarely through retaliation. I don’t think we have a case of that that we found so far. So as part of our data set, we’ve recorded from 10 different countries in Southeast Asia and drawing on lessons from Taiwan and Australia as well. And what we found is that it was quite difficult to find cases of, because our team is quite small and we’re mostly English-speaking, so the most of our sources were English-speaking media and newspapers and so on and so forth, and we found that that was a great limitation in how we identified cases, particularly in countries where the information space is much, much smaller and much less exposed to English language media. So countries such as Cambodia and Laos, we found it was quite difficult to identify cases of foreign-based disinformation. Number one is because attribution rarely occurred, where they attributed a foreign actor as part of the disinformation operation. And number two is that if it were to occur, it would most likely be in the local language. So the language would be localized, whereas in countries where the information landscape and the social media users were much more exposed to international media, it was a lot easier to detect cases of FEMI operations.

BELTSAZAR KRISETYA: And moving forward, we also identified a few foreign influence actors. These actors include, from reported cases, these are actors such as China, Russia, Iran, and also some non-state actors that were unattributed, either whether they were supported by a state actor or not. And also one of the examples that we found was also the United States, in fact, engaging in some information operations in Southeast Asia. So to wrap up how the data set that we found is that sources of disinformation and the information landscape more broadly in Southeast Asia is very different and very contextual from different Southeast Asian states, especially during election periods and so on and so forth. There’s also very different threat perceptions, particularly relating to FEMI. While disinformation is considered a challenge, and is likely so for many, many states, even outside of Southeast Asia, not all governments consider FEMI as a current threat. Some are quite comfortable with leaving certain cases of FEMI to fester because it’s not deemed as a big threat to the existing political regime, or it’s not creating the social disturbances that other sources of domestic disinformation might. There’s also, I think, with the different cyber capabilities across Southeast Asian states, there’s also a difficulty in addressing these issues or even attributing the source of disinformation. So in Southeast Asia, while there is, in ASEAN, for example, while there is the cybersecurity cooperation agreements and so on and so forth, these are still mostly led or hosted by countries such as Singapore or Malaysia, who have higher, I would say, cyber capabilities compared to other Southeast Asian states who are still building on those capabilities. So not everyone is on the same page, either threat perception-wise or capabilities-wise. And moving on specifically to Indonesia, we just held elections in 2024, presidential elections. And while the data is still very, very fresh, very new because the election just occurred in February of this year, we found that most of the disinformation cases were still domestic-sourced. So either by non-state actors that were paid by government actors or certain political actors, but still very, very domestic-based. And as part of that, we found that there were differences in how disinformation was created in previous elections. So in 2016 or 2019 presidential and regional elections, the game in 2024 was a lot different. Whereas in previous elections prior to 2020, most of the disinformation that was created was very text-based and image-based and distributed on platforms that were text-based and image-based. So platforms such as Instagram, Twitter, Facebook, but they were either image or just text-based disinformation or on messaging apps like WhatsApp. Whereas in 2024, we saw a greater proliferation of disinformation incidents that involved Gen AI, either visual or audio form. So three of the examples that I’ve noted down here is, the first is a video-based, this deepfake of our former president who has passed away, who stated support for one of the political candidates. So that was a deepfake that was made. He was making a speech saying that you should support this certain candidate. Two other examples that was posted on TikTok was audio-based. So one of them was an argument that occurred between a certain political candidate and the head of the party that supported him, which was very convincing for a lot of people. And the third one was one of the presidential candidates giving a speech in fluent Arabic when he did not in fact speak fluent Arabic. So these are three different ways where Gen AI has affected how disinformation has proliferated in Indonesia. And one thing that we found is that our election bodies that are trying to deal with these disinformation cases are still playing on the playbook from 2019 and previous elections. They were not adequately prepared to deal with how disinformation would be proliferated in future elections because of the creation of Gen AI. And I think this is another problem that will continue moving forward. So to wrap up the presentation, what’s the way forward after this? So I’ve identified three things. Number one is I think that especially this is for an Indonesian context. Of course, I can’t speak for every country since everyone has a very, very different contextual information landscape. But I think for Indonesia specifically, a multi-stakeholder approach involving government, civil society, and social media platforms will be needed to comprehensively address

PIETER ALEXANDER PANDIE: disinformation either during elections or other instances. Obviously, with Gen AI developing the way it is, it will be very, very difficult to create policy that will form itself as guardrails for it since with increasing geopolitical tensions and the tech competition between great powers, I think we’re going to see the rapid, rapid development of Gen AI. So I think we need to do what we can and involve as much stakeholders as possible in that regard. Number two, I think as I said before, emerging technologies will intensify the speed, nature, and spread of disinformation. While I think now there are still cases of Gen AI with video and audio that are still a little bit easy to identify where it’s fake or not, I think moving forward, the capabilities of these technologies will improve where it will be increasingly difficult even for the trained eye to detect whether that’s disinformation or not. And lastly, and I think this is very important to say, especially for the Indonesian context, is that we need to strike a balance between effective governments of the information landscape and ensuring that democratic freedoms for civilians are still upheld. Because this is drawing from previous research at the Safer Internet Lab is that while there are policy responses from the government to address disinformation, oftentimes they can step into civil freedoms for expressing opinions and so on and so forth. So they don’t address disinformation, but they limit freedoms for expression and so on. So I think that balance is of course a very, very difficult strike, but I think it’s something that we need to note on moving forward. I think that will be it for my presentation. I’ll pass it back to Beltz.

BELTSAZAR KRISETYA: Thank you, Peter. Before we move on with Dr. Fitri, allow me to delve further into something that you just said. Please paint a further picture on the users. You’ve explained really well on how threat perceptions inhibits the effort against information manipulation. You’ve also painted a picture on the different topography of threats in Southeast Asia. But how does the receiving end look like? How does the users look like? Do the Indonesian users serve as a fertile ground for disinformation, if you will? Or because they have been the quote-unquote victim for disinformation by domestic actors, and does it make them a fertile ground for foreign interference, in your opinion?

PIETER ALEXANDER PANDIE: Right. So I think with disinformation, and this can be extrapolated to not just Indonesians, but people from other countries as well, is that disinformation is most effective when it reinforces certain opinions or ideas that someone already has. This is something that I’ve spoken about with counterparts from the US and Australia as well, is that even whether foreign or domestic, the confirmation bias is a very, very big thing in how disinformation is spread. So when you already have pre-existing notions of a certain idea or a certain political position, disinformation can reinforce those ideas and in fact make it stronger. And I think in the Indonesian context more specifically, we are one of the most populated countries in the world. I think number four right now. Digitalization is occurring rapidly and a lot of the youth are starting to become more and more exposed to social media. And I think while that increase has happened, digital literacy has not increased with it. And I think that’s another challenge that we need to take, is that improving digital literacy for social media users, whether young or old in Indonesia, to be able to differentiate between fact and fiction, real or hoax information, I think is another really important step forward. I think this is also part of a public opinion survey that SAIL has conducted last year, and the numbers were quite low for the amount of people who have participated in a digital literacy program that was held by the government. Even though these programs existed for public, not a lot of people were aware of them and even less people were involved in them. So I think this is another challenge moving forward.

BELTSAZAR KRISETYA: Thank you. Moving on to Dr Fitriani, Senior Analyst at Australia Strategic Policy Institute. Can the IT team prepare for Dr Fitriani’s slides?

FITRI BINTANG TIMUR (FITRIANI): Hi Belz, thank you. Good afternoon everyone in Riyadh, in Canberra. It’s 1am, so apologies if I look pretty sleepy. Thank you for having me. It’s an honour to be able to speak at the Internet Governance Forum 2024. And I would like to extend my gratitude to CSIS, as well as Google, for bringing this timely discussion on the issue that is essential, I think, for our digital future and security. So my presentation today, if the IT team can manage to pull out the slide, is focusing on how we can tackle information manipulation in Southeast Asia by a drawing lesson and what does not work in Australian experience. If I can go to the next slide, I’ll share in how this information and if we can go to the next slide, this information and foreign information manipulation is a global challenge. And I think, as we know, and has been discussing, it undermined democratic processes and acid by societal divides, we can public trust an institution. And I would argue here that Australia is similar to Southeast Asia, where threats are happening in a fertile ground where the society is diverse in social, political, as well as opinion. In Australia, for example, we’re open to do protests on the street and because of that, and we have many population that’s coming from different parts of the world, and they are often leaving the country, but still have a connection from the country. Sometimes the government from the country actually conduct information operation. to influence how they actually say good things about the country where they’re from. If I can go to the presentation before the previous slide, I want to share about how this information is actually exploiting the sensitive issues of different political ideologies, and it is not common for a state-sponsored actor to employ this information campaign aimed at fostering division, confusion, and mistrust among the population, and for Australian experience is to wedge distrust against allies. It happens, for example, the top example is where in the recent US election, the recent BBC News was saying that Mr. Simon Novikov, he’s an Australian-born individual, but he was being known as the Russian spokesperson in Australia, and he was paying X account of Alphafox $7,800 to post in Alphafox Twitter account, X account, a fake AI video that falsely claimed Haitian immigrants engaging voting fraud in Georgia swing state, and this actually pose a concern for Australia because such activities could tarnish Australia reputation and connection to its allies, and it is implicating in a way that Australia can be considered as a launchpad for foreign interference in other countries, so this can be concerning. And I don’t say that ASEAN country might be like this, but we can see it in the increasing geopolitical tension that situation might happen in the future. Another example is how the disinformation as Peter was sharing has become more sophisticated and leveraging social platform. And the second example the photo below in is from Southeast Asia where there’s actually. I think we’re losing victory. Are you still with us. bogus website channel and that have news that is produced by AI in a post that is unfounded really fake. And they use a drone or flight that was being used for Ukraine in the example of South China Sea. And it actually trying to increase the tension by saying that US is sending anti-tank missile to support the Philippines and so on. And actually they copy pasting from top GPT I think because in the posting it actually said I am a language model AI and I cannot perform tasks that require real time information. But concerningly this news on South China Sea was shared over one of them are shared over 25 times. And I think we need to be aware of how this campaign is not only accent by regional tension but post significant rates to the security and stability in Southeast Asia. Asia. And here in my presentation, I would like to share how Australian recent experience could provide valuable insight to addressing this challenge, and perhaps give measure to combat information manipulation. So if we can go to the next slide, I will share of how Australia deal with information manipulation in the in last year voice of Parliament, which is a referendum that called on whether the First Nation, the indigenous aborigin, people of Australia can have direct seat in the Parliament like allocated seat. But this, this election, unlike the previously Russian operation in Australia, this was identified, there’s allegedly linked with the Chinese Communist Party. And there’s a lot of TikTok and social media, other social media being used to distribute false narrative that include racial segregation, and actually having the narrative as you can read there, and say that it’s a way to actually change how Australia currently is working. So how learning from the voice of Parliament failed to actually provide a stronger position for the First Nation people of Australia, then the government and the people are trying to address this challenge using three main ways. If I can go to the next slide, the three main ways is one legislative effort, two is public and joint attribution, and three is fact checking and awareness campaign. So let me start with the law, making the law. I know creating a law is a process that takes long, and I don’t know whether the ASEAN 10 and will be perhaps with Timor-Leste joined. meaning, hopefully soon, the countries of Southeast Asia can issue the update of law. But even in Australia, the proposed combating misinformation and disinformation bill was actually shut down by countries that disagree, by people that actually disagree, and saying that perhaps this is just a way of trying to silence the people. So the disinformation and misinformation bill campaign is actually receiving disinformation campaign. And one of the senators that actually thanking Elon Musk is because Elon Musk actually shared this bill draft saying that Australia is creating this bill. And after Elon Musk tweeted it, it’s the government receive. And behind that, there’s another local parliamentarian that say like, if you want to disagree with this bill, this is how you do it. And after that, there’s 16,000 submission saying how this bill should not go. So that bill was failed, although the effort should be appreciated. The second is having public and joint attribution. And for example, in the attribution might be difficult and cannot be done. For example, for countries that small and medium country that said, what’s the benefit of saying that big country, major power are conducting information operation to us, and we cannot, you know, respond to it. So the way Australia responds to the APT40 cyber threat activities. is by actually calling other like-minded actors, like-minded states that also become the victim of this advanced persistent threat 40, that infiltrating government computer system. So they call, the government also call the US, UK, Canada, New Zealand, South Korea and Japan to issue a joint attribution. And this is, this is called to a specific Chinese state sponsored group. And the way it does it is not political attribution, but technical attribution. So maybe this is one of the way that can be done. And the third way is fact checking and awareness campaign. And the government endorse and support, although the effort is done by independent institutions such as RMIT Fact Lab and Fact Checked AAP, that is systematically debunk false claim. I think other countries in Southeast Asia region have that, like such as Mafindo in Indonesia and Fair File in Philippine, for example, that maybe Maria will share later. So if I can go to the next slide, how this is relevant for Southeast Asia, because in Southeast Asia also have diverse social political environment that present unique vulnerabilities to information manipulation. I think it is, Australia experience is similar with Southeast Asia. But the differences is there’s fragmented regulation that hinders platform accountability. If I can give you example, the top right is one of the example, how in several university journalism majors in Indonesia. recently have signed an agreement, MOU, with Russia’s state media Sputnik to share how to do journalism. So it can be a bit concerning. And meanwhile, other countries in Southeast Asia, for example, Singapore, actually implement sanctions toward Russia. So there’s a discrepancy of regulation addressed on certain, as Peter was saying, actors that conduct information operation to the region. And this can be a concern, especially when there’s limited public awareness that actually exacerbates susceptibility. So what happened in the region, I think, as well as in Australia, is that the government then is called to play a greater role in actually verifying what is fact and what is disinformation. The bottom example of the photo is where Singapore Law Minister Shah Mugam actually clarifying and saying how Israel diplomat are being insensitive of posting a comment on how many times Israel actually, the word Israel is actually mentioned in Quran. It’s actually, it’s insensitive because that posting was shared in the hate of Gaza conflict, but that how Singapore manage it is managed to control and the harmony of the country to not escalate the issue. So I call for the need of regional cooperation to counter shared threat, to actually communicate together to share information of what happened in one country. And perhaps the content sharing agreement, for example, need to be something that the region needs to talk to each other because having content sharing agreement, for example, with Sputnik or with other countries, state media that might not be democratic or might not be correct in reporting the certain issue might increase tension in the region unnecessarily. If I can go to the next slide on the recommendation on Southeast Asia, there’s actually in terms of Transcribed by https://otter.ai of what there’s a diagram in terms of how what kind of content that can be addressed and regulate. First, the measurement is to address the one that leads most harms and and that would be equal with the level of intervention. There’s five step here that I suggest on how Southeast Asia can, you know, address information operation or information influence versus adopt clear regulation. So if there is a violation in certain social media platform, therefore, the if the government have established clear and enforceable regulation, then that violation can be brought to to the criminal and justice law processes. So, for example, the regulation should include minimum content moderation standard that is that is published, for example, and mechanism of how to hold platform accountable. The second is having the threatening of regional cooperation and intelligence sharing as well as capacity of the government to address disinformation campaign. The third one is enhanced media literacy and and ASEAN actually did this with trainer of trainers and under the the education minister in share in countering disinformation. And we have model in ASEAN. What the next step is to actually translate that model to two different ASEAN language. The third one is to promote transparent. The fourth one is sorry to promote transparency by encouraging platform to label trusted source, for example, to label whether this image is AI generated, whether the video is AI generated. The more difficult is perhaps the voice. How can we actually label voice to be to be AI? generated, but maybe we can find a way. The last one is to build multi-stakeholder framework with civil society and the private sector because somehow the technology that hosts the disinformation are owned by the private sector. And the civil society is the one that do mostly the checking while the government is the one that supervise how the game is played. I think that’s the end of my presentation. I thank you so much for the time given to me. I intend to go as a moderator. Thank you, Fitri. Perhaps two minutes elaborations on what kind of lessons does Southeast Asian country can learn from the Australian experience in developing the code of conduct against misinformation and disinformation, and what kind of parallels that can Southeast Asian country adopt, whether unilaterally or through original organization. I think good practical question. I think one that can be done is actually asking, for example, Google, as well as other social, other platform actually rank the website that is most credible to show first, like news from the government. And actually what happened with the COVID time, there’s a labeling or this is new related to COVID-19. So that actually would help the people to actually be more aware. If they can do that on COVID-19, I think they can do that for other things, like, for example, scam that actually quite prevalent not only in Australia, but also perhaps in Southeast Asia, because there’s a lot of scam generating, taking on platform as well. And while the platform is actually showcasing, for example, job opportunities or advertisement. discount or sale somewhere, they need to have this verification, that government disclaimer that please check, double check before you like input your details, for example. I think those two are the one that I recommend. Thank you.

BELTSAZAR KRISETYA: Thank you. Thank you, Vitry. Let’s move on to Maria Elise from the Philippines, from the University of the Philippines, Jiliman. You have 10 to 15 minutes and place for yours.

MARIA ELIZE H. MENDOZA: Okay. Hi. Good day, everyone. Good evening from Manila. I’m sorry. I also cannot join you physically, but I’m also pleased to be given this opportunity to join the panel. So I am Assistant Professor Maria Elise Mendoza from the Philippines, and I’m here to present the case of Philippines in terms of addressing information manipulation. So I don’t have slides, so I’ll just be going through the suggested talking points. First, is to provide an overview of the Philippines information landscape. So one thing that the Philippines has been known for many years is that we are the social media capital of the world, and we are also known as the patient zero of global disinformation, almost like the petri dish or the lab experiment of disinformation. So Filipinos are hyper-connected to social media and are among the top internet users in the world, especially Facebook. So that’s the top social media application being used in our country. Television, radio, and the internet are among the top three sources of people of information about politics and the government. But since the 2016 presidential campaign of former President Rodrigo Duterte, the country has seen an increase in the use of social media for political and electoral purposes. So the 2016 presidential elections marked a pivotal shift towards social media-driven campaigning. So Duterte set the playbook for it. His victory was significantly influenced by coordinated digital campaigns on Facebook and YouTube, where content creators that we have come to know as social media influencers or bloggers have spread and amplified narratives supporting his policies, including the controversial and violent war against illegal drugs. So in the 2019 midterm elections, which were in the vote for several national positions and local positions, the same playbook was adopted and the opposition suffered an extreme blow in the Senate race. No opposition candidate won in the senatorial election. So all candidates allied with the Duterte administration won in the 2019 midterm elections. And in our next presidential elections, our most recent one, last 2022, the victory of Ferdinand Marcos, Jr., who is the son of the late dictator Ferdinand Marcos, Sr., was also largely attributed to the spread of online disinformation across different social media platforms. And these contents spread on social media did not necessarily promote Marcos, Jr. as a candidate, but rather they twisted historical narratives, attempted to cleanse the family name of the Marcoses because they still have a lot to answer regarding the atrocities committed during the dictatorship, and it also contributed to the demonizing of the political opposition. So this information during Duterte’s time also attempted to demonize the political opposition and discontinued until the 2022 presidential elections. Investigative reports from civil society groups and independent media outlets show that Marcos, Jr. benefited the most from this information at the expense of the main opposition candidate who is our former vice president. So at present, the Philippine information system is saturated. with so-called independent media practitioners. These are technically the vloggers or the influencers who are not necessarily nor formally affiliated with any political party. What’s interesting is that these vloggers and influencers who are followed and watched and heard by many Filipinos, millions of Filipinos are not covered by existing media accreditation policies or the regulations surrounding journalists, for example. So they exert influence when it comes to shaping public opinion compared to official campaign teams of candidates because their online contents are extensively consumed by the general public. There is also evidence that they have been hired by politicians in previous elections and that millions of pesos, which is around thousands of dollars or almost millions of dollars, have been spent for these kinds of campaigns. And what’s troubling is that the social media domain of these vloggers and influencers remains largely unregulated. So the contents are there and add to that the poor content moderation policies of platforms such as Facebook and YouTube. These are aggravating the problem. So as a result of the saturation in the information ecosystem, a survey conducted in 2022 found that majority of Filipinos find it difficult to detect fake news. And similarly, despite the internet being a top source of information about politics and the government, the internet is also perceived as a top source of disinformation, mostly spread by influencers. So moreover, Filipinos have developed a growing distrust towards traditional media and journalists. And these findings together with the fact that Filipinos are among the top social media users in the world is a dangerous combination. So how does foreign information manipulation and interference, or PHIMI, enter the picture? So we have had our share of PHIMI in the past, of PHIMI in the form of… is a sponsor of disinformation and propaganda, has been around during Duterte’s time, who is relatively more friendly to China as compared to previous Philippine presidents. From 2018 to 2020, China launched a disinformation campaign known as Operation Naval Gazing, an attempt by China to penetrate the Philippine information space. So what happened was that a network of fake accounts originating from China promoted and supported the Duterte family and Aimee Marcos, who is the sister of the current president. So from 2018 to 2020, these fake accounts attacked the government critics, Duterte critics, including opposition senators and Philippine media. However, platforms such as Facebook have taken down some of these or pages and groups linked to China for coordinated inauthentic behavior. So in a nutshell, Phimi has not yet made impacts comparable to the domestic level of influence operations. A media outlet in the Philippines named SMNI is pro-Duterte and pro-China, but it was recently denied a legislative franchise to operate on television, so they are mostly operating on social media. So in the Philippines, disinformation and influence operations are mostly domestically created and spread by these social media influencers, bloggers, celebrities, digital workers, independent media practitioners, or even ordinary Filipinos who make a living out of creating and spreading disinformation or hyper-partisan content online. The last part is actually interesting, the hyper-partisan content, because not all contents are fake or false. Some are facts, but these were exaggerated and twisted to suit political agenda. But still, the threat of Phimi must not be disregarded because we’ve had a glimpse of it in the form of pro-China content. One thing that we must also be wary of would be the potential use and misuse of generative AI in the upcoming elections. Very recently, a few months ago, our own president was a victim of this. An AI-generated audio of him ordering an attack against China in light of the West Philippine Sea issue was spread and flagged by the government as false. So given this, how has the Philippine government worked to address these challenges? Over the years, the Philippine government has failed to effectively address electoral disinformation. Three electoral cycles have passed since 2016, yet we are still facing a worsening problem and we have an upcoming election in 2025, this coming May. Legislative proposals to combat false information and regulate social media campaigns have not seen any progress. As a result, civil society actors, particularly media groups and academic institutions, have shouldered the responsibility of ensuring the integrity of facts by launching fact-checking initiatives, digital literacy campaigns, voter education programs. However, without robust government support, a comprehensive legal framework, and systemic changes, the impact of these initiatives is limited. It was just last September 2024 when the country’s election commission released a resolution that provided guidelines on the use of artificial intelligence and the punishment for the misuse or for the use of mis- or disinformation in elections just in time for the upcoming elections in 2025. This September 2024 resolution also establishes the COMELEC or the Commission on Elections Formal Collaboration Networks with Civil Society Actors. However, this is very late and it remains to be seen whether it will be really implemented effectively given the extent of the problem that we have now. On the other hand, social media platforms such as Meta and TikTok have expressed their commitment to cooperate in the upcoming elections. This is bad news because proactive content moderation measures and accountability must be demanded from and exercised by social media platforms. At present, content Contents that are obviously false and hyper-partisan, even if they were posted in the last electoral cycle, are still present in these platforms. They have not yet been taken down despite multiple reports, so these content moderation policies really have to be looked at. Moving forward, COMELEC must also sustain and strengthen its engagements with civil society. Civil society actors alone cannot solve this problem, and they’ve been shouldering the burden of fighting against this information for the longest time. So this strong cooperation between the government and civil society is needed. Moreover, cybersecurity infrastructure in the country must also be strengthened. Outside of elections, Filipinos are highly susceptible to online scams, fraud, banking scams, and phishing attempts. Multiple government websites have also been hacked recently. There were also instances of data breaches in government agencies where millions of data have been allegedly sold in the dark web. Lastly, to end my short presentation, in the long run, digital and media literacy must be fully incorporated in basic and higher education because at present, under the Philippine education system, only students in their last two years of high school have media literacy in their curriculum. The rest are not really institutionalized. So this needs to be expanded across all levels of education to fully empower citizens in the fight against disinformation and information manipulation. So that’s my short presentation on the case of the Philippines. I’m very much looking forward to the questions and the discussion later.

BELTSAZAR KRISETYA: Thank you very much for having me. Thank you so much, Maria. Again, another quick question. I remember during COVID times, there was an influence corporation allegedly done by the Pentagon for the Philippine public to sow disbelief against Chinese-issued vaccines. And the Filipino public bought that idea. They chose to wait for a more non-Chinese version. vaccine instead, and it creates little consequences to the Philippine public health during that time. So would you say that in the realm of influence corporations, what is happening, is it what happened in digital realm serves as an extension to geopolitical realities, particularly in Philippines’ relations to the great powers?

MARIA ELIZE H. MENDOZA: Probably yes, because some of, in another forum that I attended who were in, there were some analysts who looked at posts in China that are related to the Philippines. Some posts are actually discrediting the US-Philippines alliance, and at the same time, still supporting the Duterte’s, because Duterte is known as a president who is friendly to China, and Marcos Jr. is not exactly that. It is greatly perceived that Marcos Jr. is more leaning towards the United States. So there are posts being spread on Chinese social media wherein they are discrediting Marcos because he’s pro-US, discrediting the Philippines-US alliance. So yeah, I think these kinds of disinformation can also be related to the geopolitical realities.

BELTSAZAR KRISETYA: Thank you. So we’ve got the case study from Indonesia, from Australia, from Philippines. None of them seems to bear good news. So we rely on you, Dr. Bik Chan, from Vietnam. How does the situation look like in Vietnam?

BICH TRAN: Thank you, and I’m grateful for the opportunity to be here. So, you know, first I would like to give a brief description of Vietnam’s information landscape. So there are three main components here. So the first one is domestic media and foreign media with Vietnamese language service and social media. So in terms of domestic media, most of them are state-owned or related to the government. So they are heavily regulated by the Communist Party of Vietnam, and they, of course, they adhere to official narrative. And in terms of foreign media with Vietnamese language service, there are actually several of them, but I will give some examples from China and some Western media. So for China, there are the China Global Television Network, or CGTN, and then the PeopleGov Radio and TV. So both of them have Vietnamese language. And then for the Western media from the UK, there’s BBC, and then there’s like US-funded as well, like Voice of America or Radio Free Asia. And the third one is social media. And, you know, unlike China, actually you can access a lot of Western platforms in Vietnam, you know, like according to, you know, several sources, Facebook, YouTube, and Instagram, actually among the tops of social media in Vietnam. And besides that, also there is a Vietnamese platform called Zalo. It’s a messaging app like WhatsApp. And then also TikTok was so very popular. So there is a kind of very many social media platforms that the Vietnamese can access and use. So in terms of foreign information manipulation and interference, so I will focus on the foreign interference part of this. So in Vietnam, you know, because of its political system, so phimmy in election is actually not a big issue. The Vietnamese government is mostly concerned about China’s disinformation, about the South China Sea disputes, and also what they call peaceful evolution from the West. So peaceful evolution is kind of defined as efforts by external forces seeking regime change without the use of militaries. I’m sorry. Okay. So with this, you know, sometimes, you know, in terms of South China Sea issues, you know, China has a lot of disinformation out there. But related to phimmy, I would say that the first one is that sometimes they misquote Vietnamese leaders. For example, in 2016, only two days after the ruling of the arbitral tribunals regarding the case initiated by the Philippines against China, only two days then, you know, the Vietnamese prime minister met the Chinese counterpart in Mongolia. And then after the event, a lot of Chinese media, you know, newspapers kind of reported that the Vietnamese prime minister actually said that Vietnam supported China’s stance regarding the ruling. But actually, he didn’t say so. So the Vietnamese media immediately, you know, because they got the permission from the government to kind of clarified on that. So they said that during the meetings, the Vietnamese prime minister mentioned things like the agreement in 2011 that Vietnam and China had regarding principles to settle the sea related issues. And then things like the declaration on the code of conduct, or the code of conduct itself and UNCLOS. And he never said anything about Vietnam supporting China’s stance. So, you know, with this kind of false information, it can, you know, undermine the legitimacy of the Vietnamese Communist Party. So that’s the concern here. And also, other China’s narrative is to try to drive a wedge between Vietnam and Western partners by saying that, you know, close relationship with external powers will not help Vietnam in the South China Sea disputes. And then in terms of peaceful evolutions. So for Vietnam, for the Vietnamese government, they perceived any kind of criticism on the Communist Party is peaceful evolution. So it’s sometimes it can be like narrative, for example, the government is too weak in terms of response to China’s behavior in the South China Sea, for example, try to undermine their legitimacy. Or sometimes, you know, even the promotion of human rights or democracy can be seen as a peaceful evolution. And then other kind of narrative to try to advise Vietnam to, you know, the Vietnamese people try to be, you know, they should be anti-China or pro-US. So this kind of discourse can cause disunity in the society. And then sometimes, you know, with the South China Sea disputes, there are some certain groups, kind of urge the people to stand up and to join the protest. So this is, you know, with this, the Vietnamese government is concerned about, you know, from the protest against China, it could, you know, lead to some other issues as well and cause instabilities in the society. So here, I just want to emphasize that, you know, between this information and PHIMI, there is actually very thin line that we can work here. So they are related, but they are two different concepts. And in the case of Vietnam, sometimes, you know, the perceived PHIMI can be also quite significant because for the government and for the Communist Party of Vietnam, they have their concerns as well. So, you know, so for that, I think it’s very difficult for them to strike the balance between political stability and freedom of speech sometime. So in terms of action on how the Vietnamese government has done to deal with PHIMI, so I focus on the government part because there are not much to, you know, from the civil society itself. So for the government, you know, they repeatedly rebuked China’s full narrative on the South China Sea, either through the spokespersons of the Ministry of Foreign Affairs or through state-owned media. So they try to do that every time they discovered any disinformation from China. And, you know, to deal with peaceful evolution, in 2016, the Vietnamese Ministry of Defense created what they call Task Force 47 to counter wrong view on the internet. And after that, in 2017, only one year later, they created a cyber comment. So, you know, it’s interesting because, you know, compared to some other cyber comments, then the Vietnamese one actually also in charge of countering peaceful evolution. So I will end here and hope to open to the discussion. Thank you. Thank you, Dr. Bic. Before we get on to the discussion part of the session, one little question for you. You mentioned something about the balance between regulation, also freedom of expression, but I believe that’s not the only balance that the government is also facing because there is also this balance of countering information manipulation while also the dependence or interdependence economically to a certain actor. So how does the Vietnamese government balance between this dependence and also, you know, combating the foreign interference? Can you hear me now? Yes. Okay. So, you know, I forgot to mention that, you know, to deal with phimmy, actually in Vietnam, people can still access the Chinese media, you know, the Chinese newspapers with Vietnamese language service, but they cannot access, you know, other media, for example, BBC or Voice of America. So I think for the Vietnamese government, you know, because they know that I think very, so this very, it speaks to what Peter and if you already mentioned that I think for the government, they know that no matter what the Chinese say about the South China Sea, the Vietnamese people will not believe. Yeah, so they’re not too concerned about Chinese media. But for the Western one, it’s a different issue because in Vietnam, it’s a one-state party. So I think they are a little more sensitive in that area. And to your question about some kind of dependence on economic issues with some partners, I think that could be one of the reasons as well. But I believe that what I mentioned earlier is the main reason why, because for Chinese media, there’s not much worry. Thank you.

BELTSAZAR KRISETYA: So I believe we have at least time for three questions. So for anyone that wants to raise questions, please make yourself identifiable, and then our staff will come to you. Sorry.

AUDIENCE: So, hello. Thank you for your presentation. It was very insightful. My name is Luisa. I am an advisor for the German-Brazilian Digital Dialogue Initiative to Promote Digital Transformation, and we also address this information as a topic. So I haven’t had many contacts with the Southeast context so far, so I wanted to ask you if you have any cases of this information having effects on the physical world, so to say. Because like in Brazil, we had the attack to the Supreme Court, and also in South Africa. I know there has been some complications with the Electoral Commission and et cetera. So are there any records of this in Southeast countries as well, from Asia? Thank you.

BELTSAZAR KRISETYA: So that’s one question on the impact of this information to real-life incidents. Shall we gather two more questions? Please, sir. And then the lady in the back. Okay. Thank you.

AUDIENCE: My name is Koichiro from Japan. I’m a cyber security expert, and I have a few questions. First of all, with the Fitorani’s presentation, I feel it is contradictory, because on one hand, we need to expect performers to do more in this regard. And at the same time, countries like Australia, the United States, and others, we already decide to ban certain online performers from our market. So I’d like to ask any panelists for their view on which is better. Expect more for performers, or ban them from your own economy. Of course, some of this initiative is funded by one giant performer. So how you can trust one performer, how you can say one performer is trustworthy than others. My last question is, there’s a movement to revitalize the discussion at the ASEAN Regional Forum. I was wondering, while listening to you, all the presentation, I was wondering which is the best platform to discuss our step forward in FEMI and disinformation, since at the ASEAN Regional Forum, we have China, Russia, and others. Of course, IGF might be a decent platform as well. But I’d also like to ask panelists where we should go for our next round of discussion. Thank you very much. Fantastic.

BELTSAZAR KRISETYA: Thank you, Koichiro-san. And last question for this term, please.

AUDIENCE: Yeah. Hi, my name is Nidhi. And I have a question. When it comes to dealing with misinformation, I think that we’ve all discussed how you can have digital literacy campaigns and maybe something along those lines, some technical solutions. But as you talked about, a large part of, I think, misinformation comes from confirmation bias. And also, I think there is something to be considered that the people who are in most power actually tend to have a greater role in spreading it. So even if you did manage to achieve digital literacy, which I think there are a lot of technical solutions for, this is a larger sociological problem at this point, where if you’re getting views for it or if you’re getting power out of it, there’s no reason for anybody to stop sort of putting out disinformation. And even if you know it’s wrong from believing it, so unless you have some way of sort of tackling that larger sociological problem on what has become alternative truth, it won’t really matter so much what technical solutions you come up with. But I’m not so sure how you would go around doing that because nobody has incentive to do that right now.

BELTSAZAR KRISETYA: Thank you for the intervention. So let’s go on with the three questions first before we go open another session. So the first question from Lisa, whether disinformation ever transform into real life incidents in Southeast Asia, from Koichi Urosan. So specifically to P3, which one is better? Should platform do more or should we ban them entirely? And also a question to the general speakers, what will be the best platform regionally to discuss this issue further, whether it is a multilateral platform such as Asian Regional Forum or multi-stakeholder forum such as APR-IGF, for example. And some remarks from Randy on no matter how technical solution is available to address this session, there’s this key opinion leaders that can, you know, breeze through and confirms to the confirmation bias of the audience. So whether there is a means for us to curb or to curb the influence of these people in power, whether it is true, whether in government or in tech platform. Please, Peter, you want to go first?

PIETER ALEXANDER PANDIE: Sure. I think for the first one, cases of disinformation affecting the physical world, I think the case that we discussed earlier on, on the US’s influence operations in the Philippines that was actually posted, declassified by the Pentagon and posted again by Reuters, a Reuters investigation. So the influence operation was more or less them trying to sow disconfidence against Chinese made vaccines in the Philippines, which resulted in people not taking the vaccine and waiting for Western options. So I think that’s a really big example of a foreign entity outside of Southeast Asia creating an influence operation that had real life physical effects. And I’m sure there are others as well. But I think that’s off the top of my head. That’s a big one that we could reference. And then to the question from Koichi Rosan about the best platform to discuss FEMI in the Asia Pacific. I think the conversation shouldn’t start where the best platform is. I think we should take the discussion a little back towards whether or not countries in Southeast Asia or the Asia Pacific have the same threat perceptions towards FEMI and whether or not that’s the case. Because I think I can speak from a Southeast Asian perspective where I don’t think everyone is on the same page as far as FEMI. I’ve said before that ASEAN has a cyber security cooperation strategy and a lot of different cyber initiatives. But they mostly focus on cyber crimes, so financial scams, deepfakes and financial fraud and so on. But as far as Southeast Asia-wise, but I think FEMI, especially in the Asia Pacific where you have some victims and you have some threat actors, government and non-state, I think the conversation shouldn’t start which platform is best and getting everyone on the same page first I think is the real challenge because everyone has different threat perceptions and dealing and addressing how they want with FEMI. And for the intervention from a colleague about confirmation bias and a broader socio-psychological problem with this information, I fully agree with your statement and I think it’s why Fitri and I and other, Bik and Maria is sort of proposing for this research to take on a more multi-stakeholder, multi-disciplinary approach because I think most of us in this panel are sort of IR or cyber security specialists and I think involving people from different lines of academia or others as well I think would be a good step forward in understanding the problem a bit broadly.

BELTSAZAR KRISETYA: Fantastic.

BICH TRAN: Bik, you want to do next? I would like to add on what Peter said, you know, regarding to Nidhi’s question. Yes, so even though, you know, like certain bias make, you know, the readers have more appetite for disinformation, for example, but I still believe that digital literacy campaigns will help because especially for those who haven’t formed their opinion yet, then, you know, the skills to identify trusted sources will serve them in a lot of issues.

BELTSAZAR KRISETYA: Thank you. Fitri, specific question on platforms.

FITRI BINTANG TIMUR (FITRIANI): Thank you. In Australia we have Australian Communication and Media Authority, ACMA, Voluntary Code that actually call for platform digital media to develop and report on safeguard to prevent harm that may arise from the propagation of mis and disinformation on their services. So it’s a voluntary code. But there’s a concern of how about if the code does not work as especially we know there’s a certain platform that after some rich people buy that platform, that platform is being used for disinformation. And that’s why in Australia, there’s a call for the bill, disinformation and misinformation bill that failed to be tabled, it shut down. So whether we call to regulate the platform or just do away with it, I think it’s good to have a voluntary code is very mature. And if we kind of expect the platform have goodwill in doing their business, they need to be able to show that they can prevent harm. But we know their platform like telegrams that actually very rarely responds to the government call when there’s like information of like terrorism and whatnot, that is quite concerning. So that kind of so perhaps we can do both side, we can allow the voluntary code to let the platform to, you know, to safeguard themselves. And as well, when that doesn’t work, the government need to have tool to actually intervene. So that’s one. And for me, I want to if I may answer what how can we discuss in the regional platform, I think in ASEAN, we have the ASEAN task force, or countering fake news, and that task force actually managed to issue the guideline on how the government can manage and combat fake news. It is the task force only issued last year, established last year, and the guidelines also just recent. So I think if if ASEAN can do it, I encourage other region, perhaps able to do it because that guidelines is actually telling what the government pen weighs, for example, what the government do when the when there’s fake news detected. So that’s my insight. My, my suggestion. Thank you.

BELTSAZAR KRISETYA: Thank you, feature. Maria, you want to respond to any of the question?

MARIA ELIZE H. MENDOZA: Okay, so hi, yeah, the transformation of this information or the effects of this information on the physical world, the vaccine example is a good one. And aside from the campaign against Chinese vaccines, this is this information surrounding the side effects of vaccines in general have also made physical effects here in the Philippines, because there is a high there has been a high level of vaccine hesitant, hesitancy in the past years, because of another issue, another vaccine before COVID. So that’s one. And also probably the lies that the Marcus family spread about themselves were actually being cited by their supporters as the reasons for voting for them, especially when they attend campaign rallies and are interviewed by the vote for the Marcus. So I think that’s also an effect of this information on the physical world that people actually wholeheartedly believe these lies spread on social media. And regarding the confirmation bias, I think the question of confirmation bias, an additional insight that I can provide would be tech platforms would still have a responsibility regarding this issue because of how they control the algorithm. So we know that if we react to the same kinds of posts, or comment on the same kinds of posts, these, these posts will keep appearing on our on our feeds. So if we are, if hyper partisan contents keep appearing on our feeds due to the algorithm, then it worsens the problem. So with that, tech platforms also have a responsibility with regards to the transparency of the algorithm probably or controlling the algorithm in general, because Facebook, for instance, has been under fire for allegedly prioritizing posts that have more angry reactions. So those that are really emotionally charged get more exposure on people’s news feeds. And in that way, they also contribute to the problem. So still, even if it’s a sociological issue, Peter is correct, a multi-sectoral approach involving digital platforms of society would still be an important step in terms of solving this problem. Thank you.

BELTSAZAR KRISETYA: Thank you, Maria. One or two more questions before we close the session. Okay, the lady in the back.

AUDIENCE: Hi, my name is Eliza, I’m from Vietnam and working in Germany. And my question is actually addressed to the first speaker, but I welcome responses and contributions from other speakers as well. So in your research, how would you define FEMI? Do you include people from the diasporic communities as perpetrators of disinformation? And in your research, sorry, in your findings, you mentioned that there are state and non-state actors. Can you please give us an example of non-state actors? And in your research, did you also find evidence of the participation of the Islamic state in spreading disinformation in the case of Indonesia? And I just want to add one kind of like input to the question of Eliza. Actually, when you ask about online disinformation and the real life, you know, incidents and court, I must emphasize in the case of Vietnam, only the government can decide what is disinformation or not. And in the case of one party in Vietnam, one party state in Vietnam, we have the legislative, executive, and judiciary powers belonging to the state, which means the head of all these state agencies must be the Communist Party members. And so when they say that is disinformation, they have the power to punish. So I would say that on a monthly basis, there are cases where online disinformation, whether it’s just a small post critical of a state-backed company, or just one small video mimicking a state leader, can be punished. And the highest punishment in the case of Vietnam is 20 years of imprisonment. So I just say that disinformation in Vietnam is very hard to detect. Oh, sorry, I forgot one question for twofieldtree. How do you see the political will of ASEAN in fighting disinformation spread and created by the government? So you talked about ASEAN fighting disinformation in general. How about the disinformation spread deliberately by the government? Thank you.

BELTSAZAR KRISETYA: Thank you. And one last question from the gentleman in the back. Preferably a quick question.

AUDIENCE: Thank you so much. I’m Fawaz from Center for Communication and Governance, New Delhi. We’ve been having very similar conversations. It was very interesting, very useful to join this. We also had a general election this year. And one problem that I think across the board we are facing, that the last question also spoke to, is the discourse around disinformation, misinformation has also now become weaponized, where fact-checking or countering disinformation, often these narratives are appropriated by the people, you know, who sometimes might be causing real world harm. So I fully, this is just a short intervention to say we are seeing very real world harm linked to online disinformation. At the same time, the lack of the kind of multi-stakeholder research that we’ve been talking about is leading, you know, it’s making possible this kind of appropriation. So yeah, just a short intervention to say we really do need. Not just multi-stakeholder, but also maybe inter-regional cooperation to bring out how disinformation is happening, how it’s related to online events, and also how the discourse is being misappropriated. Thank you.

BELTSAZAR KRISETYA: Thank you, Fawaz. I think the parallel between Fawaz and Elie’s intervention is, who is the arbiter of truth? Like in which power should we endow the government or the civil society or tech platform to be the arbiter of truth, and what kind of multi-stakeholder, multilateral cooperation can be done to that. Last response from each of the speakers regarding these two interventions. You can go first. Okay. Hello?

PIETER ALEXANDER PANDIE: Can you hear me? Okay. Yes. Great. So addressing the question about defining FEMI. So the way we’ve defined FEMI is with a pattern of mostly manipulative information that threatens or has the potential to negatively impact values, procedures, and political processes in a country conducted by a foreign state or non-state actor and their proxies. Still, I think while we’ve conducted this research, we’ve also conducted a focus group discussion with various experts from both Southeast Asia and external countries. And what we found through those discussions is that FEMI is still a very, very hard thing to define. You know, FEMI was first coined by the European Union External Action Service, and that’s where we drew the first definition. But I think another step forward that we can take is sort of taking a more maybe Southeast Asian or Asia Pacific specific definition for FEMI, and I think that’s one of the research direction that we could take is finding a definition for FEMI that is context specific and more palatable, I would say, or more applicable to different information landscapes. So I understand that it is a very difficult thing to define. And another question I think was about the role of the Islamic State in information operations in Indonesia. Our time period for research was 2019 to 2024, and I think from the top of my head, while we’re still early in the data set and we’re still adding cases to it, I don’t think we’ve found cases of Islamic State perpetuating influence operations in Indonesia, although I would say with a disclaimer that this is still very early on in the data set, and we could find cases later on that were reported. But so far, I don’t think we’ve found any. And I think an explanation for that, it could be because I think terrorism cases in Indonesia, I’m not a terrorism studies expert, but I think broadly speaking, terrorism and terrorist groups in Indonesia have taken a downturn in activity in recent years. I could be very, very wrong in that regard, but that is, I think, a broad assumption that I could make as to why that has not occurred. Thank you.

BELTSAZAR KRISETYA: Bit, you want to add to that?

BICH TRAN: So I just want to say something about your question, actually, about who should we give the power to be a visual of truth. So because in the discussion, we mentioned about digital literacy campaigns. So I think if we make it mandatory to be taught in school, it will reach more people, of course, but then who textbook would we use, right? So what kind of curriculums and the definition, so that’s actually the very big issue that we…

BELTSAZAR KRISETYA: There you go. Okay. Okay. Fitri and Maria, quick response.

FITRI BINTANG TIMUR (FITRIANI): Thank you. Difficult question. The text, the textbook that… that the guidance, the ASEAN guideline on management of government information in combating fake news and information in media is actually strategically saying that this is the perspective and stand of the ASEAN government. But interestingly, there’s a chapter there if you want to take a look of it, there’s type of how government address this information. So there’s whole of government approach, and there’s strategic government approach or combination. The whole government approach is having a different agency, civil society as well. But the strategic government approach, as you know, how we know this government side of things, as Beltanzan mentioned, is the one that decide what’s the truth and what the people can listen to. And I think ASEAN embrace that and it’s aware of that. But having this, you know, being aware of it and having multiple ways of approaching the issue would actually not alienate countries that actually non-democratic in a way, but also struggling with this information or foreign information coming from abroad. So that trying to separate or wedge ASEAN countries against each other. So that’s why the ASEAN is actually trying to address this information.

BELTSAZAR KRISETYA: Thank you. Maria, one last remark.

MARIA ELIZE H. MENDOZA: Yeah, I would just like to agree with the last intervention regarding cooperation within the region, whether it’s in Southeast Asia or the Indo-Pacific, because as in the case of the Philippines, we really have a lot to catch up on in terms of addressing this information. And as I keep mentioning in my presentation, there are no clear legislative frameworks at present to address this problem, but we also have to be very careful with passing legislation that might infringe on freedom of speech. Because as far as I know, there are some countries with anti-fake news laws, but these are being weaponized by the current government that anything that is dissent equals fake news. So must be careful regarding that. So we really have a lot to learn from our neighbors in Southeast Asia and the greater Indo-Pacific region in terms of addressing this problem. So I do agree that regional cooperation is important. And I think a single country like us engaging with tech platforms, calling them to be more accountable might have less effect as compared to when multiple countries come together and really demand action from the government. tech platforms that that latter action might be that latter strategy might be more effective for them to really be able to address this problem. So that’s it for my end. Thank you.

BELTSAZAR KRISETYA: Thank you, Maria. Thank you all to all to all the speakers and from the participants for engaging the discussion. I will not conclude because simply one there is not much time and second the only concluding remarks that I can deliver is we have no option to isolate this information issue solely as an information issue because when it becomes an electoral issue then we have to answer it through an electoral means when it becomes an economic and trade issues we also need to consider the participation economic trade actors so forth as and so on and so forth. So the discussion needs to continue beyond this room and also beyond the region of Southeast Asia so please feel free to drop by to our booth whenever you have the time to learn more about our works and potentially you know cooperate for the for the next research. Thank you very much for your participation. Please join me in giving the round of applause to the speakers and best of luck for your IGF participation. Goodbye. Thank you. Thank you Vic and Peter. Hi, Petri. Bye-bye. Bye-bye. Thanks Belz, Dieter, Vic, Sifa and Maria. Good afternoon. you you you

P

PIETER ALEXANDER PANDIE

Speech speed

171 words per minute

Speech length

2225 words

Speech time

776 seconds

Indonesia faces increasing use of AI-generated disinformation in elections

Explanation

In the 2024 Indonesian elections, there was a greater proliferation of disinformation incidents involving generative AI, particularly in visual and audio forms. This marks a shift from previous elections where disinformation was mostly text-based and image-based.

Evidence

Examples include a deepfake video of a former president supporting a candidate, an audio of an argument between a candidate and party head, and a candidate giving a speech in fluent Arabic when they couldn’t speak the language.

Major Discussion Point

Information landscape and foreign interference in Southeast Asian countries

Indonesian election bodies are unprepared to deal with AI-generated disinformation

Explanation

Election bodies in Indonesia are still using strategies from previous elections to deal with disinformation. They were not adequately prepared for the proliferation of AI-generated disinformation in the 2024 elections.

Major Discussion Point

Government and societal responses to disinformation

Agreed with

MARIA ELIZE H. MENDOZA

Agreed on

Importance of digital literacy

Difficult to define and attribute foreign information manipulation and interference

Explanation

FEMI (Foreign Information Manipulation and Interference) is challenging to define and attribute. While the research used a definition based on the European Union External Action Service, there’s a need for a more context-specific definition for Southeast Asia or the Asia Pacific region.

Evidence

The research conducted focus group discussions with experts from Southeast Asia and external countries, revealing the complexity of defining FEMI.

Major Discussion Point

Challenges in combating disinformation

Agreed with

BICH TRAN

MARIA ELIZE H. MENDOZA

Agreed on

Challenges in defining and combating foreign interference

Differed with

BICH TRAN

Differed on

Perception of foreign interference threats

Multi-stakeholder approach involving government, civil society and platforms needed

Explanation

A comprehensive approach to addressing disinformation requires involvement from government, civil society, and social media platforms. This is particularly important in the context of rapidly developing AI technologies and increasing geopolitical tensions.

Major Discussion Point

Recommendations for addressing disinformation

Agreed with

MARIA ELIZE H. MENDOZA

FITRI BINTANG TIMUR (FITRIANI)

Agreed on

Need for multi-stakeholder approach

B

BICH TRAN

Speech speed

128 words per minute

Speech length

1490 words

Speech time

694 seconds

Vietnam is concerned about China’s disinformation on South China Sea disputes

Explanation

The Vietnamese government is primarily concerned about China’s disinformation regarding the South China Sea disputes. This includes instances of Chinese media misquoting Vietnamese leaders and spreading false narratives about Vietnam’s stance on regional issues.

Evidence

An example was given of Chinese media falsely reporting that the Vietnamese prime minister supported China’s stance on a 2016 arbitral tribunal ruling, which the Vietnamese government had to immediately clarify.

Major Discussion Point

Information landscape and foreign interference in Southeast Asian countries

Differed with

PIETER ALEXANDER PANDIE

Differed on

Perception of foreign interference threats

Vietnam created Task Force 47 to counter “wrong views” on the internet

Explanation

In 2016, the Vietnamese Ministry of Defense established Task Force 47 to counter what they consider “wrong views” on the internet. This was followed by the creation of a cyber command in 2017, which is also responsible for countering “peaceful evolution”.

Major Discussion Point

Government and societal responses to disinformation

Differed with

MARIA ELIZE H. MENDOZA

Differed on

Role of government in combating disinformation

Balancing political stability and freedom of speech is challenging

Explanation

The Vietnamese government faces difficulties in striking a balance between maintaining political stability and ensuring freedom of speech. This challenge is particularly evident in their efforts to combat what they perceive as foreign information manipulation and interference.

Major Discussion Point

Challenges in combating disinformation

Agreed with

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

Agreed on

Challenges in defining and combating foreign interference

M

MARIA ELIZE H. MENDOZA

Speech speed

149 words per minute

Speech length

2313 words

Speech time

928 seconds

Philippines information ecosystem is saturated with “independent” media practitioners spreading disinformation

Explanation

The Philippine information system is saturated with so-called independent media practitioners, including vloggers and influencers, who are not formally affiliated with political parties. These individuals have significant influence in shaping public opinion and are not covered by existing media accreditation policies.

Evidence

There is evidence that these influencers have been hired by politicians in previous elections, with millions of pesos spent on such campaigns.

Major Discussion Point

Information landscape and foreign interference in Southeast Asian countries

Philippine government has failed to effectively address electoral disinformation

Explanation

Despite three electoral cycles since 2016, the Philippine government has not effectively addressed electoral disinformation. Legislative proposals to combat false information and regulate social media campaigns have not progressed.

Evidence

Civil society actors, particularly media groups and academic institutions, have had to shoulder the responsibility of ensuring the integrity of facts through fact-checking initiatives and digital literacy campaigns.

Major Discussion Point

Government and societal responses to disinformation

Agreed with

PIETER ALEXANDER PANDIE

BICH TRAN

Agreed on

Challenges in defining and combating foreign interference

Differed with

BICH TRAN

Differed on

Role of government in combating disinformation

Lack of digital literacy exacerbates susceptibility to disinformation

Explanation

The rapid digitalization in the Philippines has not been accompanied by an increase in digital literacy. This gap makes the population, especially the youth, more susceptible to disinformation on social media platforms.

Evidence

A public opinion survey conducted by SAIL last year showed low numbers of people participating in government-held digital literacy programs, with many unaware of their existence.

Major Discussion Point

Challenges in combating disinformation

Agreed with

PIETER ALEXANDER PANDIE

Agreed on

Importance of digital literacy

Digital literacy must be incorporated into education at all levels

Explanation

To combat disinformation effectively, digital and media literacy must be fully incorporated into basic and higher education in the Philippines. Currently, only students in their last two years of high school have media literacy in their curriculum.

Major Discussion Point

Recommendations for addressing disinformation

Agreed with

PIETER ALEXANDER PANDIE

Agreed on

Importance of digital literacy

F

FITRI BINTANG TIMUR (FITRIANI)

Speech speed

114 words per minute

Speech length

2782 words

Speech time

1453 seconds

Australia experiences foreign interference attempts, particularly from China

Explanation

Australia has faced foreign interference attempts, with a notable focus on China’s activities. These attempts have included disinformation campaigns aimed at fostering division, confusion, and mistrust among the population and wedging distrust against allies.

Evidence

An example was given of an Australian-born individual known as a Russian spokesperson in Australia paying for a fake AI video claiming Haitian immigrants were engaging in voting fraud in Georgia, a US swing state.

Major Discussion Point

Information landscape and foreign interference in Southeast Asian countries

Australia is developing voluntary codes for platforms and considering legislation

Explanation

Australia has implemented a Voluntary Code through the Australian Communication and Media Authority (ACMA) that calls for digital media platforms to develop and report on safeguards against mis- and disinformation. There have also been attempts to introduce legislation, though a recent bill failed to pass.

Evidence

The disinformation and misinformation bill campaign in Australia faced opposition and was ultimately shut down.

Major Discussion Point

Government and societal responses to disinformation

Regional cooperation and intelligence sharing should be strengthened

Explanation

To combat foreign information manipulation and interference effectively, there is a need for enhanced regional cooperation and intelligence sharing. This includes improving the capacity of governments to address disinformation campaigns.

Major Discussion Point

Recommendations for addressing disinformation

Agreed with

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

Agreed on

Need for multi-stakeholder approach

B

BELTSAZAR KRISETYA

Speech speed

147 words per minute

Speech length

2319 words

Speech time

942 seconds

Confirmation bias makes people susceptible to believing disinformation

Explanation

Disinformation is most effective when it reinforces existing opinions or ideas that someone already holds. This confirmation bias plays a significant role in how disinformation spreads and is believed by individuals.

Major Discussion Point

Challenges in combating disinformation

Balance needed between effective governance and ensuring democratic freedoms

Explanation

There is a need to strike a balance between effective governance of the information landscape and ensuring that democratic freedoms for civilians are upheld. Policy responses to address disinformation should not infringe on civil liberties and freedom of expression.

Major Discussion Point

Recommendations for addressing disinformation

Agreements

Agreement Points

Need for multi-stakeholder approach

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

FITRI BINTANG TIMUR (FITRIANI)

Multi-stakeholder approach involving government, civil society and platforms needed

Philippine government has failed to effectively address electoral disinformation

Regional cooperation and intelligence sharing should be strengthened

The speakers agree that addressing disinformation requires collaboration between government, civil society, and tech platforms, as well as regional cooperation.

Challenges in defining and combating foreign interference

PIETER ALEXANDER PANDIE

BICH TRAN

MARIA ELIZE H. MENDOZA

Difficult to define and attribute foreign information manipulation and interference

Balancing political stability and freedom of speech is challenging

Philippine government has failed to effectively address electoral disinformation

The speakers highlight the difficulties in defining foreign interference and balancing efforts to combat it with maintaining freedom of speech and political stability.

Importance of digital literacy

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

Indonesian election bodies are unprepared to deal with AI-generated disinformation

Lack of digital literacy exacerbates susceptibility to disinformation

Digital literacy must be incorporated into education at all levels

The speakers emphasize the need for improved digital literacy to combat disinformation, particularly in the face of evolving technologies like AI.

Similar Viewpoints

Both speakers highlight the increasing sophistication of disinformation campaigns, particularly those originating from foreign actors, and their potential impact on domestic politics and regional disputes.

PIETER ALEXANDER PANDIE

BICH TRAN

Indonesia faces increasing use of AI-generated disinformation in elections

Vietnam is concerned about China’s disinformation on South China Sea disputes

Both speakers discuss the challenges posed by actors spreading disinformation, whether domestic ‘independent’ practitioners or foreign state-sponsored efforts, and the need for effective countermeasures.

MARIA ELIZE H. MENDOZA

FITRI BINTANG TIMUR (FITRIANI)

Philippines information ecosystem is saturated with “independent” media practitioners spreading disinformation

Australia experiences foreign interference attempts, particularly from China

Unexpected Consensus

Limitations of technical solutions

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

BELTSAZAR KRISETYA

Indonesian election bodies are unprepared to deal with AI-generated disinformation

Lack of digital literacy exacerbates susceptibility to disinformation

Confirmation bias makes people susceptible to believing disinformation

There was an unexpected consensus among speakers that technical solutions alone are insufficient to combat disinformation. They agreed that sociological factors, such as confirmation bias and lack of digital literacy, play a crucial role in the spread and belief of disinformation, necessitating a more holistic approach.

Overall Assessment

Summary

The main areas of agreement among speakers include the need for a multi-stakeholder approach to combat disinformation, the challenges in defining and addressing foreign interference, and the importance of digital literacy. There was also consensus on the limitations of purely technical solutions and the need to consider sociological factors.

Consensus level

The level of consensus among the speakers was moderate to high, particularly on the need for collaborative efforts and the complexity of the disinformation landscape. This consensus implies that addressing disinformation in Southeast Asia and beyond requires a comprehensive, multi-faceted approach involving various stakeholders and considering both technical and sociocultural aspects. However, the specific strategies and priorities may vary depending on each country’s unique context and challenges.

Differences

Different Viewpoints

Role of government in combating disinformation

BICH TRAN

MARIA ELIZE H. MENDOZA

Vietnam created Task Force 47 to counter “wrong views” on the internet

Philippine government has failed to effectively address electoral disinformation

While Vietnam has taken a more active and restrictive approach through government intervention, the Philippines has struggled to effectively address disinformation through government action, leading to civil society taking on more responsibility.

Perception of foreign interference threats

BICH TRAN

PIETER ALEXANDER PANDIE

Vietnam is concerned about China’s disinformation on South China Sea disputes

Difficult to define and attribute foreign information manipulation and interference

Vietnam has a clear focus on China as a source of disinformation, while the Indonesian perspective acknowledges the difficulty in defining and attributing foreign interference, suggesting a more nuanced view of the threat landscape.

Unexpected Differences

Approach to platform regulation

FITRI BINTANG TIMUR (FITRIANI)

MARIA ELIZE H. MENDOZA

Australia is developing voluntary codes for platforms and considering legislation

Philippine government has failed to effectively address electoral disinformation

While both countries face challenges with disinformation, Australia’s approach of developing voluntary codes and considering legislation contrasts with the Philippines’ lack of progress in this area. This difference is unexpected given that both are democratic countries facing similar challenges.

Overall Assessment

summary

The main areas of disagreement revolve around the role of government in combating disinformation, the perception of foreign interference threats, and the approaches to platform regulation.

difference_level

The level of disagreement among the speakers is moderate. While there is a general consensus on the need to address disinformation, there are significant differences in how each country perceives and approaches the problem. These differences reflect the varied political systems, levels of digital development, and geopolitical contexts of the countries represented. The implications of these disagreements suggest that a one-size-fits-all approach to combating disinformation in Southeast Asia may not be effective, and regional cooperation efforts will need to account for these diverse perspectives and approaches.

Partial Agreements

Partial Agreements

All speakers agree on the need for a comprehensive approach to combat disinformation, but they emphasize different aspects: Pandie focuses on multi-stakeholder involvement, Mendoza on education, and Fitriani on regional cooperation. While these approaches are not mutually exclusive, they represent different priorities in addressing the issue.

PIETER ALEXANDER PANDIE

MARIA ELIZE H. MENDOZA

FITRI BINTANG TIMUR (FITRIANI)

Multi-stakeholder approach involving government, civil society and platforms needed

Digital literacy must be incorporated into education at all levels

Regional cooperation and intelligence sharing should be strengthened

Similar Viewpoints

Both speakers highlight the increasing sophistication of disinformation campaigns, particularly those originating from foreign actors, and their potential impact on domestic politics and regional disputes.

PIETER ALEXANDER PANDIE

BICH TRAN

Indonesia faces increasing use of AI-generated disinformation in elections

Vietnam is concerned about China’s disinformation on South China Sea disputes

Both speakers discuss the challenges posed by actors spreading disinformation, whether domestic ‘independent’ practitioners or foreign state-sponsored efforts, and the need for effective countermeasures.

MARIA ELIZE H. MENDOZA

FITRI BINTANG TIMUR (FITRIANI)

Philippines information ecosystem is saturated with “independent” media practitioners spreading disinformation

Australia experiences foreign interference attempts, particularly from China

Takeaways

Key Takeaways

Foreign information manipulation and interference (FIMI) is an increasing concern in Southeast Asian countries, with different manifestations in each country

Governments in the region are struggling to effectively address disinformation, especially with the rise of AI-generated content

There is a need for multi-stakeholder approaches involving government, civil society, and tech platforms to combat disinformation

Digital literacy efforts are crucial but face challenges in implementation and reaching wide audiences

Balancing effective governance of information ecosystems with protecting democratic freedoms is a key challenge

Resolutions and Action Items

Explore developing a Southeast Asian or Asia-Pacific specific definition for FIMI

Strengthen regional cooperation and intelligence sharing on disinformation issues

Incorporate digital literacy education at all levels of schooling

Engage in multi-stakeholder and inter-regional cooperation to research disinformation

Unresolved Issues

How to define and attribute foreign information manipulation and interference in a consistent way

How to effectively regulate tech platforms without infringing on freedom of speech

Who should be the arbiter of truth in determining what constitutes disinformation

How to address confirmation bias and the sociological aspects of disinformation spread

How to balance political stability concerns with freedom of expression in addressing disinformation

Suggested Compromises

Implement voluntary codes for tech platforms while maintaining government ability to intervene if needed

Use a combination of whole-of-government and strategic government approaches to allow for different governance styles within ASEAN

Balance effective governance of information ecosystems with protections for democratic freedoms and civil liberties

Thought Provoking Comments

So in Southeast Asia, while there is, in ASEAN, for example, while there is the cybersecurity cooperation agreements and so on and so forth, these are still mostly led or hosted by countries such as Singapore or Malaysia, who have higher, I would say, cyber capabilities compared to other Southeast Asian states who are still building on those capabilities. So not everyone is on the same page, either threat perception-wise or capabilities-wise.

speaker

Pieter Alexander Pandie

reason

This comment highlights the disparity in cybersecurity capabilities and threat perceptions among Southeast Asian countries, which is a crucial factor in addressing regional information manipulation issues.

impact

It led to a deeper discussion on the challenges of regional cooperation and the need for context-specific approaches in combating disinformation.

Contents that are obviously false and hyper-partisan, even if they were posted in the last electoral cycle, are still present in these platforms. They have not yet been taken down despite multiple reports, so these content moderation policies really have to be looked at.

speaker

Maria Elize H. Mendoza

reason

This comment brings attention to the ongoing issue of ineffective content moderation by social media platforms, highlighting a critical gap in addressing disinformation.

impact

It shifted the discussion towards the responsibilities of tech platforms and the need for more effective content moderation policies.

So I think for the Vietnamese government, you know, because they know that I think very, so this very, it speaks to what Peter and if you already mentioned that I think for the government, they know that no matter what the Chinese say about the South China Sea, the Vietnamese people will not believe.

speaker

Bich Tran

reason

This comment provides insight into the unique dynamics of information manipulation in Vietnam, highlighting how cultural and historical factors influence the effectiveness of foreign disinformation campaigns.

impact

It introduced complexity to the discussion by showing how different countries may have varying vulnerabilities to foreign information manipulation based on their specific contexts.

Even if you did manage to achieve digital literacy, which I think there are a lot of technical solutions for, this is a larger sociological problem at this point, where if you’re getting views for it or if you’re getting power out of it, there’s no reason for anybody to stop sort of putting out disinformation.

speaker

Nidhi (audience member)

reason

This comment challenges the effectiveness of purely technical solutions to disinformation, highlighting the deeper sociological roots of the problem.

impact

It prompted the speakers to address the need for a multi-disciplinary approach to tackling disinformation, beyond just technical solutions.

Only the government can decide what is disinformation or not. And in the case of one party state in Vietnam, we have the legislative, executive, and judiciary powers belonging to the state, which means the head of all these state agencies must be the Communist Party members. And so when they say that is disinformation, they have the power to punish.

speaker

Eliza (audience member)

reason

This comment raises important questions about who has the authority to define and combat disinformation, especially in non-democratic contexts.

impact

It led to a discussion about the challenges of addressing disinformation in different political systems and the potential for misuse of anti-disinformation measures.

Overall Assessment

These key comments shaped the discussion by highlighting the complexity of addressing information manipulation and disinformation in Southeast Asia. They brought attention to the disparities in capabilities and threat perceptions among countries, the responsibilities of tech platforms, the influence of cultural and historical factors, the limitations of purely technical solutions, and the challenges of defining and combating disinformation in different political systems. The discussion evolved from a focus on specific country cases to a broader consideration of regional cooperation, multi-stakeholder approaches, and the need for context-specific strategies in combating disinformation.

Follow-up Questions

How can we define FEMI (Foreign Information Manipulation and Interference) in a way that is context-specific and more applicable to different information landscapes in Southeast Asia or the Asia Pacific?

speaker

Pieter Alexander Pandie

explanation

A more regionally-specific definition could help better understand and address FEMI issues in the context of Southeast Asian countries.

What are the best platforms or forums to discuss FEMI issues in the Asia Pacific region, considering the different threat perceptions and approaches of various countries?

speaker

Koichiro (audience member)

explanation

Identifying appropriate platforms for discussion could lead to more effective regional cooperation in addressing FEMI.

How can we address the broader sociological problem of confirmation bias and the incentives for spreading disinformation, beyond just technical solutions?

speaker

Nidhi (audience member)

explanation

Addressing the root causes of disinformation spread could lead to more effective long-term solutions.

How can we improve digital literacy campaigns and make them more effective, especially for those who haven’t formed their opinions yet?

speaker

Bich Tran

explanation

Effective digital literacy campaigns could help prevent the spread of disinformation and improve information resilience.

How can we balance the need for platform regulation with concerns about censorship and freedom of expression?

speaker

Fitri Bintang Timur (Fitriani)

explanation

Finding this balance is crucial for effective policy-making in combating disinformation while preserving democratic values.

How can we improve multi-stakeholder and inter-regional cooperation to better understand and address disinformation, its real-world impacts, and the misappropriation of anti-disinformation discourse?

speaker

Fawaz (audience member)

explanation

Enhanced cooperation could lead to more comprehensive and effective approaches to combating disinformation.

How can we develop curricula and textbooks for digital literacy that are objective and widely accepted?

speaker

Bich Tran

explanation

Developing appropriate educational materials is crucial for implementing effective digital literacy programs.

How can multiple countries work together to more effectively demand action from tech platforms in addressing disinformation?

speaker

Maria Elize H. Mendoza

explanation

Collective action by multiple countries could potentially have a greater impact on tech platform accountability.

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.