Safeguarding the free flow of information amidst conflict | IGF 2023 WS #386
Event report
Speakers and Moderators
Speakers:
- irene khan, Intergovernmental Organization
- Tetiana Avdieieva, Civil Society, Eastern European Group
- Khattab Hamad, Civil Society, African Group
- Rizk Joelle, Intergovernmental Organization, Western European and Others Group (WEOG)
- Jason Pielemeier, Civil Society, Western European and Others Group (WEOG)
Moderators:
- Chantal Joris, Civil Society, Western European and Others Group (WEOG)
Table of contents
Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.
Knowledge Graph of Debate
Session report
Rizk Joelle
Digital threats and misinformation have a significant negative impact on civilians residing in conflict zones. The dissemination of harmful information can exacerbate pre-existing social tensions and grievances, leading to an increase in violence and violations of humanitarian law. Furthermore, the spread of misinformation can cause distress and a psychological burden among individuals living in conflict-affected areas. This hampers their ability to access potentially life-saving information during emergencies. The distortion of facts and the influence of beliefs and behaviours as a consequence of the dissemination of harmful information also contribute to raising tensions in conflict zones.
One concerning aspect is the blurred line between civilian and military targets in the context of digital conflicts. Civilians and civilian infrastructure are increasingly becoming targets of digital attacks. With the growing emphasis on shared digital infrastructure, there is an increased risk of civilian infrastructure being targeted. This blurring of lines undermines the principle of distinction between civilians and military objectives, which is a critical pillar of international humanitarian law.
Moreover, digital threats pose a threat to public trust in humanitarian organizations. Cyber operations, data breaches, and information campaigns not only damage public trust but also hinder the ability of humanitarian aid organizations to provide life-saving services. This erosion of trust compromises their efforts to assist and support individuals in need.
To address these challenges, it is crucial for affected communities to build resilience against harmful information and increase awareness of the potential risks and consequences in the cyber domain. Building resilience requires the involvement of multiple stakeholders, including civil society and companies. Information and communication technology (ICT) companies, in particular, should be mindful of the legal consequences surrounding their role and actions in the cyber domain. It is important that self-imposed restrictions or sanctions do not impede the flow of essential services to the civilian population.
In addition to community resilience and awareness-building efforts, policy enforcement within business models is crucial. Upstream thinking in the business model can help reinforce policies aimed at countering digital threats and misinformation. However, the discussion around policy enforcement in business models is challenging. It requires expertise and a feedback loop with tech companies to find effective and efficient solutions.
In conclusion, digital threats and misinformation have dire consequences for civilians in conflict zones. The dissemination of harmful information exacerbates social tensions and violence, while digital attacks on civilians and civilian infrastructure blur the line between military and civilian targets. These threats also undermine public trust in humanitarian organizations and hinder the provision of life-saving services. To tackle these challenges, it is essential to build community resilience, increase awareness, and enforce policies within business models. Collaboration between stakeholders and tech companies is key to addressing these complex issues and safeguarding the well-being of individuals in conflict zones.
Speaker
In conflict zones, technology companies face a myriad of risks and must carefully balance the interests of multiple stakeholders. These companies play a critical role in providing essential information and functions but can also unintentionally facilitate violence and spread false information. One major challenge is responding to government demands, such as granting access to user information, conducting surveillance, or shutting down networks. These demands can come from both sides of the conflict and may lack clarity or have excessively broad scope.
Dealing with government demands during peace is limited in conflict situations due to associated risks. Companies can request clarity on demand legality, respond minimally or partially, challenge the demands, or disclose them publicly. However, in conflict settings, these actions may pose significant risks.
To navigate these challenges, technology companies can implement various measures. These include establishing risk management frameworks, clear escalation procedures, and consistent decision reviews. By doing so, companies can better manage risks of operating in conflict zones. Collaboration with other organizations in coordinating responses in conflict regions and consulting with experts to understand potential implications of decisions can also help.
Respecting international humanitarian law is a key principle of corporate responsibility in conflict situations. Companies are expected to respect human rights and require guidance on respecting international humanitarian laws when conducting business in conflict-affected areas. Enhanced due diligence, considering heightened risks and negative human rights impacts, is recommended by the United Nations Guiding Principles on Business and Human Rights.
Further articulation is needed on what international humanitarian law means for technology companies, indicating further guidance is needed in this area. To address design issues in platforms, companies should consider building the capacity to apply a conflict lens during product development, better identifying and resolving issues in conflict zones.
Addressing information topics requires considering both upstream and downstream solutions. This comprehensive approach takes into account the flow of information from sources (upstream) to distribution and consumption (downstream).
Overall, technology companies operating in conflict zones face unique challenges and must navigate complex risks. Implementing effective risk management frameworks, respecting international humanitarian law, and incorporating a conflict lens into product development can better address the multifaceted issues they encounter. Further guidance is needed in certain areas to ensure operations in conflict zones align with established principles and standards.
Chantal Joris
The analysis delves into the challenges surrounding the free flow of information during conflicts. It starts by highlighting the digital threats that journalists and human rights defenders face in such situations. These threats include mass surveillance, content blocking, internet shutdowns, and other forms of coercion aimed at hindering the dissemination of information. The sentiment towards these challenges is negative, as they pose a significant threat to the values of freedom of expression and access to information.
Another significant aspect explored in the analysis is the role of tech companies in conflicts. Digital companies have become increasingly important actors in these situations, and the analysis argues that they have a responsibility to develop strategies to avoid involvement in human rights violations. This neutral stance reflects the need to address the complex ethical dilemmas faced by tech companies, balancing their business interests while safeguarding human rights.
The analysis also discusses the reliance of civilians on information communication technologies (ICT) during conflicts. Civilians often use ICT to ensure their safety, gain information on conflict conditions, locate areas of fighting, and communicate with their loved ones. This neutral sentiment highlights the significance of ICT in providing vital communication channels and access to information for affected civilians.
The analysis further sheds light on the attempts made by the army and political parties to control the narrative and shape the discourse during conflicts. Conflict parties often aim to manipulate information and control the narrative for various reasons. This negative sentiment highlights the detrimental impact of information control on the public's understanding of conflicts and the potential for shaping biased opinions.
A key observation from the analysis is the necessity of a multi-stakeholder approach in conflict contexts. It stresses the importance of different actors, such as ICT companies, content moderators, and organizations like the International Committee of the Red Cross (ICRC), working collaboratively to tackle the diverse threats to information flow. This positive sentiment reflects the recognition that no single entity can address the complexities of information challenges during conflicts alone.
Moreover, the analysis calls for identifying gaps in understanding and addressing the issues related to information flow during conflicts. This neutral sentiment highlights the need for more clarity and targeted efforts to bridge these gaps. The conclusion emphasizes the importance of comprehensively addressing the challenges and harnessing the potential of information communication technologies to ensure the free flow of information during conflicts.
In conclusion, the analysis explores the various challenges and dynamics surrounding the free flow of information during conflicts. It highlights digital threats, the role of tech companies, civilian reliance on ICT, information control by conflict parties, the necessity of a multi-stakeholder approach, and the need for identifying gaps for clarity. With this comprehensive understanding, stakeholders can work towards developing strategies and policies that uphold the values of information access and freedom of expression in conflict situations.
Khattab Hamad
Sudan is currently embroiled in a civil war between two allied forces that began in 2013. However, the conflict has been riddled with challenges and disagreements, particularly regarding security agreements and the unification of the armies in Sudan. These disagreements resulted in the conflict's end on April 15th. Unfortunately, the sentiment surrounding this war is negative.
Information control has played a significant role in the conflict, with internet disruptions and the spread of misinformation being notable events. Internet shutdowns during exams and civil unrest have been used by authorities to manipulate public opinion. The sentiment towards these events is negative.
Another issue in the conflict is the misuse of social media platforms, which have been exploited by both sides to spread their own narratives and manipulate public opinion. This misuse has prompted concerns about information imbalance and led platforms like META to take down accounts associated with the Rapid Support Forces. The sentiment towards this misuse is negative.
The RSF (Sudanese Armed Forces) and the Arab Support Forces have been criticized for their harmful practices towards civilians and the nation's infrastructure. Privacy violation cases, including the use of spyware, have been reported. The RSF imported the predator spyware of Intellexa, while the National Intelligence and Security Service (NISS) imported the remote control system of the Italian company hacking team in 2012. The sentiment towards these privacy violations is negative.
The conflict has also had a significant impact on the ICT (Information and Communication Technology) sector in Sudan. Power outages have impaired network stability and e-banking services, forcing ICT companies to rely on uninterruptible power supply systems and generators. The sentiment towards this situation is negative.
On a positive note, telecom workers have been recognized as crucial for maintaining access to information infrastructure during conflicts. It is argued that they should be given extraordinary protection, similar to doctors and journalists, due to their vital role in ensuring the continuous flow of information. The sentiment towards this proposal is positive.
In conclusion, Sudan's civil war has had far-reaching consequences, impacting security agreements, information control, privacy rights, the ICT sector, and the protection of key players in the information infrastructure. Efforts to address these challenges and protect these key players are essential for promoting peaceful resolutions and mitigating the impact of future conflicts.
Tetiana Avdieieva
During the armed conflicts in Ukraine, there have been severe restrictions on free speech and the free flow of information. Since the war began in 2014, the country has witnessed a decline in the protection of free speech and access to information. This has resulted in mass surveillance, content blocking, Internet shutdowns, and sophisticated manipulation of information.
Digital security concerns have also arisen during these conflicts. Attacks on media outlets and journalists largely originate from Russia, with DDoS attacks on websites disrupting connectivity. Coordinated disinformation campaigns on social media and messaging platforms further exacerbate the situation, influencing public opinion and spreading false narratives.
One key issue highlighted is the control over narratives and the free flow of information during armed conflicts. The ability to shape public opinion becomes a powerful tool in these circumstances, with the potential to influence the course of the conflict and its outcomes. It is crucial to address this issue by formulating an exit strategy that lifts restrictions from the outset of the armed conflict. This strategy should consider the vulnerability of post-war societies to malicious narratives and work towards reestablishing human rights that were restricted during the conflict.
Another significant concern is the gap in international law regarding the handling of information manipulation during peace and conflict. Current legal frameworks do not adequately address the issue, leaving room for exploitation and the spread of disinformation that incites aggression and hatred.
There have also been attempts to shift the focus away from the harm inflicted upon civilians and the suppression of opposition during these conflicts. These attempts to change the narrative divert attention from the atrocities committed and the need to protect the rights and safety of civilians.
The extensive support for the invasion among the Russian community is a cause for concern. According to data from Meduza, a significant portion of Russian citizens, ranging from 70% to 80%, support the invasion. This highlights the challenge of countering misinformation and disinformation within Russia and addressing the narratives that drive aggression and illegal activities.
The role of ICT companies in moderating harmful content in conflict settings is crucial. These companies need assistance, both globally and locally, to effectively combat harmful information. This includes distinguishing between harmful information and illegal content, as well as understanding the localized contexts in which they operate. Local partners can provide valuable insights into regional issues, such as identifying and addressing local slur words and cultural sensitivities.
However, it is important to approach the role of tech giants with caution, avoiding a strategy of blaming and shaming. Over-censorship and driving people to unmoderated spaces can be unintended consequences of such an approach. Instead, a collaborative approach that involves ICT companies, multi-stakeholder engagement, and responsible corporate practices is necessary to foster a safer online environment.
In conclusion, the armed conflicts in Ukraine have led to significant restrictions on free speech and the free flow of information. Digital security concerns, information manipulation, and the spread of disinformation within Russia pose additional challenges. It is crucial to adopt an exit strategy that lifts restrictions and safeguards vulnerable post-war societies from malicious narratives. Efforts should also be made to address gaps in international law regarding the handling of information manipulation. The support for the invasion among the Russian community and attempts to divert attention from civilian harm and opposition suppression further complicate the situation. ICT companies play a crucial role in moderating harmful content, and a collaborative approach is necessary to strike a balance between curbing misinformation and ensuring freedom of expression.
Audience
An analysis conducted by Access Now reveals that prevailing trends in content governance are endangering freedom of expression and other fundamental rights. Several issues have been identified in relation to parties involved in conflicts, highlighting the dangers faced by these rights.
During times of crisis, content governance has been exploited in various ways, breaching international humanitarian law. One concerning practice is the intentional spread of disinformation as a warfare tactic. Additionally, platforms have been used for population movement, and sharing content depicting prisoners of war illegally has been observed. These actions not only violate international laws but also contribute to the erosion of freedoms.
While internet restrictions exist in conflict zones, it is interesting to note that Russia maintains significant accessibility to various platforms. Many Ukrainian media and telegram channels continue to be effectively available in Russia. Furthermore, despite restrictions, information can still flow through various social media and messaging platforms. This highlights the complexity of internet restrictions and the need for further examination.
The analysis also underlines the need for international laws addressing informational warfare. Both Russia and Ukraine face internet warfare, yet there is a lack of legal frameworks specifically designed to address this issue. The absence of such laws creates a significant gap in addressing and countering the threats posed by disinformation campaigns and cybersecurity breaches.
Russia particularly faces numerous cybersecurity threats and disinformation campaigns, primarily originating from Ukraine. Instances of Russian citizens' personal data being leaked and published online have been identified, along with the identification of over 3,000 disinformation narratives against Russia. These threats pose challenges to the integrity and security of information in the country.
Social media platforms' over-enforcement is flagged as a major problem for media and journalists, with many legitimate news sources having their accounts suspended or restricted. This issue is particularly prevalent in cases involving conflict settings, such as Palestine and Afghanistan, where the presence of dangerous organizations contributes to heightened enforcement measures.
The complexity of platform rules is highlighted as a concern in conflict settings. In such situations, rules can be confusing and easily violated, with typical infractions including the posting of images depicting dead bodies. This observation sheds light on the challenges faced by content creators and users as they navigate restrictive guidelines during conflicts.
Addressing misinformation requires the implementation of upstream solutions, as highlighted by Maria Risa. This approach focuses on addressing misinformation at its root causes, rather than solely addressing its dissemination. By focusing on upstream solutions, it is possible to create more effective strategies to combat misinformation and its harmful effects.
The analysis raises questions about the design of platforms and the role of algorithms and business models in managing information. It suggests the need to reconsider and possibly redesign these aspects to ensure fairness, accuracy, and accountability in content dissemination. This observation emphasizes the ongoing need for innovation and improvement within the digital landscape.
BSR, a leading global organization, provides a toolkit for companies on how to conduct enhanced human rights due diligence in conflict settings. This initiative aims to promote the respect and protection of human rights, even in challenging circumstances. The toolkit, developed in collaboration with Just Peace Labs, offers detailed guidance, making it an invaluable resource for responsible business practices.
Furthermore, the analysis advocates for human-centered approaches in digital transformation, particularly in conflict zones. Stakeholder consultation can be challenging in war zones, highlighting the importance of ensuring that the interests and needs of all individuals are considered and that no one is left behind in the process.
There is a noted lack of focus on countries like Afghanistan and Sudan in discussions surrounding these issues. This observation emphasizes the need to broaden the scope of discourse and pay equal attention to conflicts and human rights violations occurring in these regions.
Global media platforms play a substantial role in shaping public opinion, primarily through their recommendation algorithms. However, concerns arise regarding the impartiality and bias of these algorithms. The analysis reveals that global media platforms often alter their recommendation algorithms to favor one side in informational wars, despite presenting themselves as neutral. This highlights the potential influence and manipulation of public opinion through these platforms.
Given the significance of global media platforms, the analysis argues that global society should exert more pressure on these entities. Increased accountability and transparency are necessary to ensure that these platforms operate in an unbiased and fair manner, considering the critical role they play in shaping public discourse.
In conclusion, the prevailing trends in content governance pose a threat to freedom of expression and fundamental rights. Exploitation of content governance during times of crisis, the need for international laws addressing informational warfare, and the over-enforcement by social media platforms are among the challenges highlighted in the analysis. The complexity of internet restrictions and the design of platforms also warrant further consideration. Additionally, the importance of upstream solutions, human-centered approaches, and the inclusion of marginalized regions in discussions emerge as key insights. Efforts towards increasing platform accountability and transparency are crucial to safeguarding a fair and unbiased digital landscape.
Speakers
A
Audience
Speech speed
162 words per minute
Speech length
2320 words
Speech time
861 secs
Arguments
Prevailing trends in content governance are putting freedom of expression and other fundamental rights in danger
Supporting facts:
- Mapping of trends by Access Now
- Several issues identified related to parties involved in conflicts
Topics: Content Governance, Freedom of Expression, Fundamental Rights
Internet restrictions in conflict are not as severe in Russia as seen from abroad, due to various platforms still being accessible.
Supporting facts:
- Lots of Ukrainian media and telegram channels are effectively available in Russia.
- Information can still flow through various social media and messengers.
Topics: Internet restrictions, Russia, Conflict
Russia faces numerous cybersecurity threats and disinformation campaigns, primarily from Ukraine.
Supporting facts:
- Russian citizens' personal data has been leaked and published online.
- Over 3,000 disinformation narratives against Russia have been identified.
Topics: Cybersecurity threats, Disinformation campaigns, Russia, Ukraine
Over-enforcement from social media platforms is a problem for media and journalists
Supporting facts:
- Many legitimate news sources have had their accounts suspended or restricted
- Cases like Palestine and Afghanistan are particularly affected due to the presence of dangerous organizations
Topics: Social Media Regulation, Press Freedom, Conflict Reporting
Need for upstream solutions in handling misinformation
Supporting facts:
- Statement by Maria Risa on the need for more upstream solutions
Topics: upstream solutions, misinformation, content management
BSR provides a toolkit for companies on how to conduct enhanced human rights due diligence in conflict settings
Supporting facts:
- The toolkit was developed alongside Just Peace Labs and is detailed, targeted to companies
Topics: Human rights, Due diligence, Conflict settings
Global media platforms control public opinion with their recommendation algorithms
Supporting facts:
- Facebook can alter news feed affecting public opinion
- Media platforms are against publishing their recommendation algorithms
Topics: Global media, Recommendation algorithms, Media platforms
Global media platforms take sides in informational wars
Supporting facts:
- Global media platforms alter recommendation algorithms for one of the war sides
- Media platforms pretend to be non-biased but they are not
Topics: Global media platforms, Informational war, Bias
Global society should put more pressure on global media platforms
Topics: Global society, Global media platforms, Accountability
Need for more transparency in recommender systems, and roles for platform accountability in times of crisis
Supporting facts:
- Digital Services Act has been adopted in the EU
- Joint declaration of principles on content governance and platform accountability in times of crisis
Topics: Recommender systems, Transparency, Platform accountability, Crisis
Report
An analysis conducted by Access Now reveals that prevailing trends in content governance are endangering freedom of expression and other fundamental rights. Several issues have been identified in relation to parties involved in conflicts, highlighting the dangers faced by these rights.
During times of crisis, content governance has been exploited in various ways, breaching international humanitarian law. One concerning practice is the intentional spread of disinformation as a warfare tactic. Additionally, platforms have been used for population movement, and sharing content depicting prisoners of war illegally has been observed.
These actions not only violate international laws but also contribute to the erosion of freedoms. While internet restrictions exist in conflict zones, it is interesting to note that Russia maintains significant accessibility to various platforms. Many Ukrainian media and telegram channels continue to be effectively available in Russia.
Furthermore, despite restrictions, information can still flow through various social media and messaging platforms. This highlights the complexity of internet restrictions and the need for further examination. The analysis also underlines the need for international laws addressing informational warfare. Both Russia and Ukraine face internet warfare, yet there is a lack of legal frameworks specifically designed to address this issue.
The absence of such laws creates a significant gap in addressing and countering the threats posed by disinformation campaigns and cybersecurity breaches. Russia particularly faces numerous cybersecurity threats and disinformation campaigns, primarily originating from Ukraine. Instances of Russian citizens' personal data being leaked and published online have been identified, along with the identification of over 3,000 disinformation narratives against Russia.
These threats pose challenges to the integrity and security of information in the country. Social media platforms' over-enforcement is flagged as a major problem for media and journalists, with many legitimate news sources having their accounts suspended or restricted. This issue is particularly prevalent in cases involving conflict settings, such as Palestine and Afghanistan, where the presence of dangerous organizations contributes to heightened enforcement measures.
The complexity of platform rules is highlighted as a concern in conflict settings. In such situations, rules can be confusing and easily violated, with typical infractions including the posting of images depicting dead bodies. This observation sheds light on the challenges faced by content creators and users as they navigate restrictive guidelines during conflicts.
Addressing misinformation requires the implementation of upstream solutions, as highlighted by Maria Risa. This approach focuses on addressing misinformation at its root causes, rather than solely addressing its dissemination. By focusing on upstream solutions, it is possible to create more effective strategies to combat misinformation and its harmful effects.
The analysis raises questions about the design of platforms and the role of algorithms and business models in managing information. It suggests the need to reconsider and possibly redesign these aspects to ensure fairness, accuracy, and accountability in content dissemination.
This observation emphasizes the ongoing need for innovation and improvement within the digital landscape. BSR, a leading global organization, provides a toolkit for companies on how to conduct enhanced human rights due diligence in conflict settings. This initiative aims to promote the respect and protection of human rights, even in challenging circumstances.
The toolkit, developed in collaboration with Just Peace Labs, offers detailed guidance, making it an invaluable resource for responsible business practices. Furthermore, the analysis advocates for human-centered approaches in digital transformation, particularly in conflict zones. Stakeholder consultation can be challenging in war zones, highlighting the importance of ensuring that the interests and needs of all individuals are considered and that no one is left behind in the process.
There is a noted lack of focus on countries like Afghanistan and Sudan in discussions surrounding these issues. This observation emphasizes the need to broaden the scope of discourse and pay equal attention to conflicts and human rights violations occurring in these regions.
Global media platforms play a substantial role in shaping public opinion, primarily through their recommendation algorithms. However, concerns arise regarding the impartiality and bias of these algorithms. The analysis reveals that global media platforms often alter their recommendation algorithms to favor one side in informational wars, despite presenting themselves as neutral.
This highlights the potential influence and manipulation of public opinion through these platforms. Given the significance of global media platforms, the analysis argues that global society should exert more pressure on these entities. Increased accountability and transparency are necessary to ensure that these platforms operate in an unbiased and fair manner, considering the critical role they play in shaping public discourse.
In conclusion, the prevailing trends in content governance pose a threat to freedom of expression and fundamental rights. Exploitation of content governance during times of crisis, the need for international laws addressing informational warfare, and the over-enforcement by social media platforms are among the challenges highlighted in the analysis.
The complexity of internet restrictions and the design of platforms also warrant further consideration. Additionally, the importance of upstream solutions, human-centered approaches, and the inclusion of marginalized regions in discussions emerge as key insights. Efforts towards increasing platform accountability and transparency are crucial to safeguarding a fair and unbiased digital landscape.
CJ
Chantal Joris
Speech speed
157 words per minute
Speech length
2388 words
Speech time
911 secs
Arguments
Digital threats against journalists and human rights defenders, mass surveillance, content blocking, internet shutdowns are some of the challenges posed to the free flow of information during conflicts.
Supporting facts:
- There are currently about 110 active armed conflicts in all regions of the world
- States that are not part of the conflict often need to grapple with questions regarding sanctioning propagandists, banning foreign media outlets, etc.
Topics: Armed Conflicts, Control of Information, Human Rights
Civilians rely heavily on information communication technologies during conflicts.
Supporting facts:
- Civilians use ICT to keep themselves safe, to know the conflict conditions, where fighting takes place and also for communication with their loved ones
Topics: Civilians, ICT, Conflicts
Necessity of multi-stakeholder approach in conflict contexts
Supporting facts:
- ICRC may not be an expert in content moderation
- ISP providers may not be experts in conflict settings
- Need for different actors to work together to tackle different threats
Topics: Multi-stakeholder cooperation, ICT companies, Content moderation, Conflict settings, Misinformation
Report
The analysis delves into the challenges surrounding the free flow of information during conflicts. It starts by highlighting the digital threats that journalists and human rights defenders face in such situations. These threats include mass surveillance, content blocking, internet shutdowns, and other forms of coercion aimed at hindering the dissemination of information.
The sentiment towards these challenges is negative, as they pose a significant threat to the values of freedom of expression and access to information. Another significant aspect explored in the analysis is the role of tech companies in conflicts. Digital companies have become increasingly important actors in these situations, and the analysis argues that they have a responsibility to develop strategies to avoid involvement in human rights violations.
This neutral stance reflects the need to address the complex ethical dilemmas faced by tech companies, balancing their business interests while safeguarding human rights. The analysis also discusses the reliance of civilians on information communication technologies (ICT) during conflicts. Civilians often use ICT to ensure their safety, gain information on conflict conditions, locate areas of fighting, and communicate with their loved ones.
This neutral sentiment highlights the significance of ICT in providing vital communication channels and access to information for affected civilians. The analysis further sheds light on the attempts made by the army and political parties to control the narrative and shape the discourse during conflicts.
Conflict parties often aim to manipulate information and control the narrative for various reasons. This negative sentiment highlights the detrimental impact of information control on the public's understanding of conflicts and the potential for shaping biased opinions. A key observation from the analysis is the necessity of a multi-stakeholder approach in conflict contexts.
It stresses the importance of different actors, such as ICT companies, content moderators, and organizations like the International Committee of the Red Cross (ICRC), working collaboratively to tackle the diverse threats to information flow. This positive sentiment reflects the recognition that no single entity can address the complexities of information challenges during conflicts alone.
Moreover, the analysis calls for identifying gaps in understanding and addressing the issues related to information flow during conflicts. This neutral sentiment highlights the need for more clarity and targeted efforts to bridge these gaps. The conclusion emphasizes the importance of comprehensively addressing the challenges and harnessing the potential of information communication technologies to ensure the free flow of information during conflicts.
In conclusion, the analysis explores the various challenges and dynamics surrounding the free flow of information during conflicts. It highlights digital threats, the role of tech companies, civilian reliance on ICT, information control by conflict parties, the necessity of a multi-stakeholder approach, and the need for identifying gaps for clarity.
With this comprehensive understanding, stakeholders can work towards developing strategies and policies that uphold the values of information access and freedom of expression in conflict situations.
KH
Khattab Hamad
Speech speed
118 words per minute
Speech length
1460 words
Speech time
743 secs
Arguments
Sudan is going through a war between two forces that have been allied since the year of 2013
Supporting facts:
- Disagreement came to an end on April 15th due to differences in security agreements related to the unification of the armies in Sudan.
Topics: Sudan, Civil war
Internet disruptions in Khartoum, Nyala, Zalingei, and Al-Junaina, and the spread of misinformation were some notable events in the conflict
Supporting facts:
- These events are considered as efforts of information control during the war, and authorities used to shut down the internet during exams and civil unrest.
Topics: Internet disruption, Misinformation
Privacy violation cases including physical phone inspection and use of spyware are common
Supporting facts:
- RSF imported the predator spyware of Intellexa and NISS, the National Intelligence and Security Service, imported the remote control system of the Italian company hacking team in 2012.
Topics: Privacy violation, Spyware
ICT companies in Sudan faced major challenge due to the lack of electricity especially in time of war
Supporting facts:
- Before war, only 40% of the citizens had power from national grid
- War led to even larger power outage impairing network stability, e-banking services
- ICT companies had to rely on uninterruptible power supply systems and power generators
Topics: ICT companies, Sudan, war, electricity shortage
Social media platform such as META were misused by conflict parties for spreading their narratives of the war
Supporting facts:
- Both sides of conflict used social media to manipulate public opinion
- META took down accounts of Rapid Support Forces prompting concerns about information imbalance
Topics: social media, META, conflict, Sudan
Telecom workers should be given extraordinary protection like doctors, journalists etc.
Supporting facts:
- Telecom workers are crucial for maintaining access to information infrastructure
Topics: Telecom workers, protection, justice
Report
Sudan is currently embroiled in a civil war between two allied forces that began in 2013. However, the conflict has been riddled with challenges and disagreements, particularly regarding security agreements and the unification of the armies in Sudan. These disagreements resulted in the conflict's end on April 15th.
Unfortunately, the sentiment surrounding this war is negative. Information control has played a significant role in the conflict, with internet disruptions and the spread of misinformation being notable events. Internet shutdowns during exams and civil unrest have been used by authorities to manipulate public opinion.
The sentiment towards these events is negative. Another issue in the conflict is the misuse of social media platforms, which have been exploited by both sides to spread their own narratives and manipulate public opinion. This misuse has prompted concerns about information imbalance and led platforms like META to take down accounts associated with the Rapid Support Forces.
The sentiment towards this misuse is negative. The RSF (Sudanese Armed Forces) and the Arab Support Forces have been criticized for their harmful practices towards civilians and the nation's infrastructure. Privacy violation cases, including the use of spyware, have been reported.
The RSF imported the predator spyware of Intellexa, while the National Intelligence and Security Service (NISS) imported the remote control system of the Italian company hacking team in 2012. The sentiment towards these privacy violations is negative. The conflict has also had a significant impact on the ICT (Information and Communication Technology) sector in Sudan.
Power outages have impaired network stability and e-banking services, forcing ICT companies to rely on uninterruptible power supply systems and generators. The sentiment towards this situation is negative. On a positive note, telecom workers have been recognized as crucial for maintaining access to information infrastructure during conflicts.
It is argued that they should be given extraordinary protection, similar to doctors and journalists, due to their vital role in ensuring the continuous flow of information. The sentiment towards this proposal is positive. In conclusion, Sudan's civil war has had far-reaching consequences, impacting security agreements, information control, privacy rights, the ICT sector, and the protection of key players in the information infrastructure.
Efforts to address these challenges and protect these key players are essential for promoting peaceful resolutions and mitigating the impact of future conflicts.
RJ
Rizk Joelle
Speech speed
157 words per minute
Speech length
3062 words
Speech time
1168 secs
Arguments
Digital threats and misinformation harm civilians in conflict zones
Supporting facts:
- Harmful information can increase pre-existing social tensions and grievances.
- Information narratives can encourage acts of violence against people or violations of humanitarian law.
- Misinformation can increase vulnerabilities, cause distress and psychological weight in conflict-affected zones.
- Distorted information in times of emergencies compromises people's ability to access potentially life-saving information.
- Online behavior counter to international and humanitarian law may occur, including incitement to target or kill civilians.
Topics: Digital threats, Misinformation, Conflict zones, Online narratives, Harmful information
The global advisory board for ICRC focuses on the emerging digital threats and new digital threats.
Supporting facts:
- The global advisory board for ICRC was set up two and a half years ago.
- The board is comprised of legal, military policy, tech companies, and security fields experts.
- The board advices on the behavior of parties to armed conflict in cyber space, and disruptions to infrastructure services and data.
- Disruptions may affect the functioning of society and human safety.
Topics: Information and communication technology, cyber threats, digital transformation
Distortion of facts, influencing beliefs and behaviors and raising tensions are common consequences of harmful information dissemination.
Supporting facts:
- The digitalization of communication systems and platform amplifies the scale, reach, and speed for spreading harmful information.
- There is a call to build resilience against harmful information and uphold the right to freedom of expression.
- It's recommended for digital platforms to take more measures to detect and manage harmful content.
Topics: Misinformation, Fake news, Social media
The blurred line between civilian and military in digital conflicts is concerning.
Supporting facts:
- Civilians and civilian infrastructure are becoming targets of digital attacks.
- The more digital infrastructure is shared, the more risk of civilian infrastructure being attacked.
- This undermines the principle of distinction between civilians and military objectives.
Topics: Cyber warfare, Digital security
Digital threats are undermining public trust in humanitarian organizations.
Supporting facts:
- Cyber operations, data breaches and information campaigns damage public trust in aid organizations.
- This impacts the ability of these organizations to provide life-saving services.
Topics: Trust, humanitarian aid, Cyber threats
Business models should reinforce the enforcement of policies
Supporting facts:
- Upstream thinking in the business model helps in policy enforcement
Topics: Policy enforcement, Business models
Report
Digital threats and misinformation have a significant negative impact on civilians residing in conflict zones. The dissemination of harmful information can exacerbate pre-existing social tensions and grievances, leading to an increase in violence and violations of humanitarian law. Furthermore, the spread of misinformation can cause distress and a psychological burden among individuals living in conflict-affected areas.
This hampers their ability to access potentially life-saving information during emergencies. The distortion of facts and the influence of beliefs and behaviours as a consequence of the dissemination of harmful information also contribute to raising tensions in conflict zones. One concerning aspect is the blurred line between civilian and military targets in the context of digital conflicts.
Civilians and civilian infrastructure are increasingly becoming targets of digital attacks. With the growing emphasis on shared digital infrastructure, there is an increased risk of civilian infrastructure being targeted. This blurring of lines undermines the principle of distinction between civilians and military objectives, which is a critical pillar of international humanitarian law.
Moreover, digital threats pose a threat to public trust in humanitarian organizations. Cyber operations, data breaches, and information campaigns not only damage public trust but also hinder the ability of humanitarian aid organizations to provide life-saving services. This erosion of trust compromises their efforts to assist and support individuals in need.
To address these challenges, it is crucial for affected communities to build resilience against harmful information and increase awareness of the potential risks and consequences in the cyber domain. Building resilience requires the involvement of multiple stakeholders, including civil society and companies.
Information and communication technology (ICT) companies, in particular, should be mindful of the legal consequences surrounding their role and actions in the cyber domain. It is important that self-imposed restrictions or sanctions do not impede the flow of essential services to the civilian population.
In addition to community resilience and awareness-building efforts, policy enforcement within business models is crucial. Upstream thinking in the business model can help reinforce policies aimed at countering digital threats and misinformation. However, the discussion around policy enforcement in business models is challenging.
It requires expertise and a feedback loop with tech companies to find effective and efficient solutions. In conclusion, digital threats and misinformation have dire consequences for civilians in conflict zones. The dissemination of harmful information exacerbates social tensions and violence, while digital attacks on civilians and civilian infrastructure blur the line between military and civilian targets.
These threats also undermine public trust in humanitarian organizations and hinder the provision of life-saving services. To tackle these challenges, it is essential to build community resilience, increase awareness, and enforce policies within business models. Collaboration between stakeholders and tech companies is key to addressing these complex issues and safeguarding the well-being of individuals in conflict zones.
S
Speaker
Speech speed
169 words per minute
Speech length
1338 words
Speech time
476 secs
Arguments
Technology companies operating in conflict zones face a complex web of risks and must balance multiple stakeholder interests.
Supporting facts:
- Companies provide critical information and functions but can also indirectly facilitate violence and spread false information
- They must navigate risks to people, their own infrastructure and personnel, particularly in the case of telecom companies with ground offices
- Companies may have to respond to government demands for aspects such as access to user information, surveillance, network shutdowns and more
- Such demands can come from both sides of the conflict and may be unclear or extremely broad in scope
Topics: Information and Communication Technology, Armed Conflicts, Human Rights, Freedom of Expression, Privacy
The usual ways of dealing with government demands during times of peace can be limited in conflict situations.
Supporting facts:
- Companies can request clarity on legality, respond minimally or partially, challenge the demand or disclose it to the public during peace times
- However, these actions may be difficult to undertake in the context of a conflict due to the associated risks
Topics: Government Regulations, Conflict Situations, ICT Companies
ICT companies may need more guidance on how to respect international humanitarian laws in addition to human rights while conducting business in conflict-affected areas
Supporting facts:
- A core principle of the corporate responsibility to respect human rights is that in situations of armed conflict, companies should respect the standards of international humanitarian law
- UNGP states that when operating in areas of armed conflict, businesses should conduct enhanced due diligence, resulting from potentially heightened risk and negative human rights impacts
Topics: ICT industry, Business and human rights, International humanitarian law, Conflict-affected areas
Companies should start to build in the capacity to apply a conflict lens to the development of their products in order to address issues of design of platforms
Supporting facts:
- ICRC is working on building and working with companies to build out this capacity.
Topics: design of platforms, development of products, conflict lens
Report
In conflict zones, technology companies face a myriad of risks and must carefully balance the interests of multiple stakeholders. These companies play a critical role in providing essential information and functions but can also unintentionally facilitate violence and spread false information.
One major challenge is responding to government demands, such as granting access to user information, conducting surveillance, or shutting down networks. These demands can come from both sides of the conflict and may lack clarity or have excessively broad scope.
Dealing with government demands during peace is limited in conflict situations due to associated risks. Companies can request clarity on demand legality, respond minimally or partially, challenge the demands, or disclose them publicly. However, in conflict settings, these actions may pose significant risks.
To navigate these challenges, technology companies can implement various measures. These include establishing risk management frameworks, clear escalation procedures, and consistent decision reviews. By doing so, companies can better manage risks of operating in conflict zones. Collaboration with other organizations in coordinating responses in conflict regions and consulting with experts to understand potential implications of decisions can also help.
Respecting international humanitarian law is a key principle of corporate responsibility in conflict situations. Companies are expected to respect human rights and require guidance on respecting international humanitarian laws when conducting business in conflict-affected areas. Enhanced due diligence, considering heightened risks and negative human rights impacts, is recommended by the United Nations Guiding Principles on Business and Human Rights.
Further articulation is needed on what international humanitarian law means for technology companies, indicating further guidance is needed in this area. To address design issues in platforms, companies should consider building the capacity to apply a conflict lens during product development, better identifying and resolving issues in conflict zones.
Addressing information topics requires considering both upstream and downstream solutions. This comprehensive approach takes into account the flow of information from sources (upstream) to distribution and consumption (downstream). Overall, technology companies operating in conflict zones face unique challenges and must navigate complex risks.
Implementing effective risk management frameworks, respecting international humanitarian law, and incorporating a conflict lens into product development can better address the multifaceted issues they encounter. Further guidance is needed in certain areas to ensure operations in conflict zones align with established principles and standards.
TA
Tetiana Avdieieva
Speech speed
150 words per minute
Speech length
2699 words
Speech time
1080 secs
Arguments
Control over narratives and free flow of information during armed conflicts is a key issue.
Supporting facts:
- Ukraine has experienced restrictions on free speech, free flow of information since the war started in 2014.
- Conflicts lead to mass surveillance, content blocking, Internet shutdowns, and sophisticated information manipulation.
Topics: Armed conflicts, Free Speech, Propaganda
Digital security concerns arise during such conflicts, including attacks on databases, media, and journalists.
Supporting facts:
- In Ukraine, attacks on media and journalists largely come from Russia.
- DDoS attacks on websites disrupt connectivity.
- Coordinated disinformation campaigns on social media and messaging services also exist.
Topics: Digital Security, Armed Conflicts
A gap exists in international law regarding handling information manipulation during peace and conflict
Topics: Information Manipulation, International Law
Discussion on incitement to aggression and hatred often shifts to disinformation spread inside Russia
Supporting facts:
- She referred the narratives shared inside Russia to instigate conflict, invite people to join armed forces and commit illegal activities.
Topics: Disinformation, Aggression, Propaganda, Russia
Concerned about attempts to change the actual topic of harming civilians and suppressing opposition
Topics: Civilians, Suppression of Opposition
Need for clear distinction between harmful information and illegal content in conflict settings
Supporting facts:
- Context of armed conflict amplifies the effect of harmful information
- ICT platforms need to respond when harmful information turns into illegal content
Topics: ICT companies, content moderation, conflict settings
Lack of jurisdiction over tech giants is a significant problem
Supporting facts:
- In Ukraine there is no actual mechanism to engage with platforms on the state level
- There is no opportunity to communicate with platforms except for voluntary cooperation from platforms
Topics: ICT companies, legal mechanisms, state-level engagement
Report
During the armed conflicts in Ukraine, there have been severe restrictions on free speech and the free flow of information. Since the war began in 2014, the country has witnessed a decline in the protection of free speech and access to information.
This has resulted in mass surveillance, content blocking, Internet shutdowns, and sophisticated manipulation of information. Digital security concerns have also arisen during these conflicts. Attacks on media outlets and journalists largely originate from Russia, with DDoS attacks on websites disrupting connectivity.
Coordinated disinformation campaigns on social media and messaging platforms further exacerbate the situation, influencing public opinion and spreading false narratives. One key issue highlighted is the control over narratives and the free flow of information during armed conflicts. The ability to shape public opinion becomes a powerful tool in these circumstances, with the potential to influence the course of the conflict and its outcomes.
It is crucial to address this issue by formulating an exit strategy that lifts restrictions from the outset of the armed conflict. This strategy should consider the vulnerability of post-war societies to malicious narratives and work towards reestablishing human rights that were restricted during the conflict.
Another significant concern is the gap in international law regarding the handling of information manipulation during peace and conflict. Current legal frameworks do not adequately address the issue, leaving room for exploitation and the spread of disinformation that incites aggression and hatred.
There have also been attempts to shift the focus away from the harm inflicted upon civilians and the suppression of opposition during these conflicts. These attempts to change the narrative divert attention from the atrocities committed and the need to protect the rights and safety of civilians.
The extensive support for the invasion among the Russian community is a cause for concern. According to data from Meduza, a significant portion of Russian citizens, ranging from 70% to 80%, support the invasion. This highlights the challenge of countering misinformation and disinformation within Russia and addressing the narratives that drive aggression and illegal activities.
The role of ICT companies in moderating harmful content in conflict settings is crucial. These companies need assistance, both globally and locally, to effectively combat harmful information. This includes distinguishing between harmful information and illegal content, as well as understanding the localized contexts in which they operate.
Local partners can provide valuable insights into regional issues, such as identifying and addressing local slur words and cultural sensitivities. However, it is important to approach the role of tech giants with caution, avoiding a strategy of blaming and shaming.
Over-censorship and driving people to unmoderated spaces can be unintended consequences of such an approach. Instead, a collaborative approach that involves ICT companies, multi-stakeholder engagement, and responsible corporate practices is necessary to foster a safer online environment. In conclusion, the armed conflicts in Ukraine have led to significant restrictions on free speech and the free flow of information.
Digital security concerns, information manipulation, and the spread of disinformation within Russia pose additional challenges. It is crucial to adopt an exit strategy that lifts restrictions and safeguards vulnerable post-war societies from malicious narratives. Efforts should also be made to address gaps in international law regarding the handling of information manipulation.
The support for the invasion among the Russian community and attempts to divert attention from civilian harm and opposition suppression further complicate the situation. ICT companies play a crucial role in moderating harmful content, and a collaborative approach is necessary to strike a balance between curbing misinformation and ensuring freedom of expression.