War crimes and gross human rights violations: e-evidence | IGF 2023 WS #535

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

John Hering

John Hering, a prominent figure in the field of cybercrime and war crimes, highly commends the Budapest Convention as an invaluable tool in combating international cybercrime. He also suggests that the UN cybercrime negotiation process should draw inspiration from the Budapest Convention, which has been successful in addressing cybercrime globally.

Hering discusses the challenges posed by the rise of cyber-enabled war crimes and hybrid warfare. He highlights the potential for traditional war crimes to have a cyber component and cites the conflict in Ukraine as a significant example of hybrid warfare, combining conventional military tactics with cyber operations.

In relation to the role of Microsoft in conflicts, Hering believes that the company should increase transparency and reporting. He appreciates Microsoft’s efforts in providing greater transparency in response to the challenges presented by conflicts, particularly in Ukraine. By increasing reporting on the breadth of cyber operations occurring in these conflicts, Microsoft can contribute to a more comprehensive understanding of the situation.

Hering proposes the expedited collection of digital evidence of traditional war crimes. He advocates for the development of tools and support to capture digital evidence, which could aid in the investigation and prosecution of war crimes.

Hering expresses concerns about the widespread use of cyber capabilities in armed conflicts, as it brings forth the possibility of cyber-enabled war crimes. The submission of Article 15 reports to the International Criminal Court alleging cyber-enabled war crimes, along with reports from multiple technology companies providing evidence of malicious cyber activities during conflicts, highlights the need to address this emerging issue.

Transparency and disclosure of data requests are key aspects emphasized by Hering. He highlights the importance of transparency in understanding when and for how long data is requested, advocating for disclosure of relevant information within a reasonable timeframe.

Highlighting the valuable role of technology companies, Hering mentions Microsoft’s partnership with Accenture in supporting the International Criminal Court (ICC) with the creation of the OTP Link platform. This platform serves as an objective system for creating a digital chain of custody and a tamper-proof record of evidence, aiding the collection and preservation of digital evidence for war crime cases.

Hering values the independent tools created by technology companies, such as the OTP Link platform, as they ensure neutrality and preserve the integrity of digital evidence. By fostering collaboration between technology companies and international institutions, a more objective and robust platform for addressing war crimes can be achieved.

In light of the emerging domain of conflict in relation to cyber operations, Hering calls for innovation in international systems. He believes that international institutions should step in to uphold expectations in the digital domain, just as they would in the physical domain. The recent decision by the ICC prosecutor to investigate cyber-enabled war crimes is seen as a positive development, reflecting the growing recognition of the need to adapt international systems to address cyber-related conflicts.

In conclusion, John Hering’s insights encompass a wide range of issues related to cybercrime, war crimes, and the role of technology companies. He highlights the effectiveness of the Budapest Convention in combating international cybercrime and encourages the adoption of its principles in the UN cybercrime negotiation process. Hering also underscores the challenges posed by cyber-enabled war crimes, the importance of transparency and data disclosure, and the instrumental role of technology companies in collecting and preserving digital evidence. Through his observations, Hering advocates for innovation in international systems and emphasizes the need for international institutions to address the emerging domain of conflict in relation to cyber operations.

Giorgi Jokhadze

During the discussion, the speakers explored the significance of open source intelligence (OSINT) in uncovering evidence of war crimes and gross human rights violations. They highlighted the extensive experience of Giorgi Jokhadze in Ukraine, where he has utilised OSINT techniques. Notably, he has been actively involved in supporting Ukraine through the Council of Europe since the beginning of Russian aggression in 2022.

The Budapest Convention on Cybercrime, specifically Article 32, was emphasized as a powerful tool for member states to access OSINT from both public and private domains with consent. It was argued that these provisions could greatly assist Ukraine in obtaining compelling evidence for both domestic and international investigations. The tools provided by the Budapest Convention were also seen as instrumental in facilitating the collection of such evidence.

Furthermore, the discussion emphasised that open source intelligence should be considered as an integral part of the overall chain of evidence in criminal investigations. It was acknowledged that open source intelligence plays a crucial role in providing leads and clues that can lead to more comprehensive investigations and successful outcomes.

The speakers also raised the challenges posed by electronic evidence, which often transcends borders. This highlighted the importance of cross-sharing evidence among relevant parties to ensure a unified approach to investigations and the pursuit of justice across jurisdictions.

In addition to the technical aspects of open source intelligence and cybercrime conventions, the discussion touched upon the need for a clear and applicable legal framework. The speakers recognized the importance of integrating open source intelligence and data from open sources within a comprehensive legal framework. Such integration is crucial for ensuring that perpetrators are brought to justice while adhering to legal requirements and due process.

Overall, the speakers concluded that open source intelligence and data obtained from open sources are invaluable assets in the pursuit of justice. However, to maximize their effectiveness, they must be employed within an applicable legal framework. These insights highlighted the need for proper communication and implementation of conclusions derived from discussions with the IGF Secretariat.

In summary, the discussion highlighted the value of open source intelligence in uncovering evidence of war crimes and human rights violations. It also emphasized the role of the Budapest Convention on Cybercrime in supporting Ukraine’s evidence collection efforts. The integration of open source intelligence within the overall chain of evidence and the importance of cross-sharing electronic evidence were also stressed. Additionally, the need for a clear and applicable legal framework that incorporates open source intelligence and data from open sources was underlined. The speakers concluded that integrating open source intelligence and data within a legal framework is crucial for ensuring that perpetrators are brought to justice.

Audience

The Budapest Convention is seen as a potentially beneficial legal framework for dealing with cyber crimes and war crimes, especially in relation to SDG 16: Peace, Justice, and Strong Institutions. However, there is skepticism about its applicability to crimes originating from Ukraine. Examples of alleged crimes committed by Ukrainian forces and Ukrainian-based scammers have raised doubts about the effectiveness of the Budapest Convention in addressing these specific crimes.

Access to e-evidence is considered crucial for effectively resolving crimes. The importance of obtaining electronic evidence for the purpose of investigation and prosecution is highlighted, emphasizing its role in uncovering the truth and holding perpetrators accountable.

Concerns have been raised regarding the lack of effective safeguards in both the Budapest Convention and the UN Cybercrime Treaty. Law enforcement officials involved in war crimes, crimes against humanity, and human rights abuses, along with dissatisfaction among civil society groups regarding the absence of adequate safeguards, have generated worry about potential misuse of these conventions.

There is frustration over the lack of communication and fear that the provisions within these conventions might be abused to commit crimes with impunity. This highlights the need for stronger and more effective safeguards to prevent the misuse of these legal frameworks.

War crimes are a pressing issue, and it is argued that they should be addressed regardless of the perpetrators involved. The need for applying international law and cooperation in conflicts is emphasized. It is paramount to hold all parties accountable for their actions, promoting justice and upholding human rights.

During discussions, questions were raised about war crimes committed by Ukrainians, beyond the focus on Russian activities. The structure of the convention for crimes committed by Ukrainians remains unclear, and it is suggested that some war crimes may be committed without Russian involvement, indicating a need for further clarity.

Assertions were made about war crimes committed by the Ukrainian army against civilians, highlighting the gravity of the situation and the urgency to address these crimes.

In conclusion, the Budapest Convention is seen as a potentially beneficial legal framework for cyber crimes and war crimes. However, doubts persist regarding its application to crimes originating from Ukraine. The importance of access to e-evidence is emphasized, while concerns are raised about the lack of effective safeguards in the Budapest Convention and UN Cybercrime Treaty. The necessity to address war crimes, regardless of the perpetrators, using international law and cooperation is stressed. The need for clarity in dealing with crimes committed by Ukrainians and the alarming allegations of war crimes committed by the Ukrainian army against civilians are also highlighted.

Jayantha Fernando

The Budapest Convention, in conjunction with its Second Additional Protocol, offers valuable tools for collecting and sharing electronic evidence. These tools are crucial in combating cybercrime and promoting cooperation between countries and service providers.

The Second Additional Protocol was negotiated by the State Parties to the Convention following the finalisation of the Cloud Evidence Report in 2017. It facilitates direct cooperation between countries and domain name registration information providers and includes measures for expedited disclosure of computer data in emergency situations. It also outlines procedures for international cooperation, even when parties and experts are in different locations.

However, the effectiveness of these tools depends on the domestic capacity of each country to handle and utilise them effectively. The Budapest Convention, also known as the Council of Europe Convention, has a capacity-building initiative that supports global action against cybercrime. Countries that have implemented these initiatives have benefited from training expert judges who can then train judges in their respective regions.

A significant provision of the Budapest Convention is Article 32, which concerns the open-source framework provided under the Convention. It addresses the issue of cross-border access to data and is only available to state parties.

Parties to the Budapest Convention form a community of trust and must uphold principles of the rule of law and human rights, as described in Article 15. Compliance with international standards and respect for fundamental rights are emphasised.

Law enforcement authorities regularly use Article 32, provided they have received appropriate training and comply with minimum standards. This provision applies to a wide range of offences, including drug-related crimes. The use of these tools is guided by standard operating procedures that respect the principles outlined in Article 15, ensuring that they are used in a manner that upholds human rights.

Procedural safeguards and adherence to standards are essential to protect human rights and maintain the rule of law. State parties to international conventions have introduced measures to enable judicial authorities to effectively oversee the process. For example, Sri Lankan law enforcement authorities, as a state party to the Budapest Convention, have revised their standard operating procedures to ensure that electronic evidence gathering and international cooperation comply with international standards.

The Budapest Convention applies to any crime involving digital evidence, including war crimes. Specific procedural provisions, such as Article 14, 18, and 26, are particularly relevant in the context of war crimes. These provisions allow for the invocation of Article 14 in war crime investigations, facilitate the acquisition of evidence from any service provider under Article 18, and enable the spontaneous sharing of information among law enforcement authorities under Article 26.

In summary, the Budapest Convention and its Second Additional Protocol play a crucial role in collecting and sharing electronic evidence. However, their effectiveness relies on the domestic capacity of each country. Upholding the principles of the rule of law and human rights is essential. Law enforcement authorities frequently utilise Article 32, guided by procedural safeguards and minimum standards, to address various offences, including war crimes.

Patrick Penninchx

The Council of Europe was commended for its active promotion of human rights, the rule of law, and democracy. Its crucial role in promoting basic values, combatting war crimes, and addressing human rights violations was highlighted. The session focused on the role of investigative journalism and open-source information in investigations, recognizing their significance in holding accountable those responsible for war crimes.

The Budapest Convention was lauded as a global instrument for fighting cybercrime and promoting accountability. It was noted that the convention has been ratified by 68 countries, with more nations having signed or invited to accede. The opening of the second additional protocol to the Budapest Convention in May 2022 was also mentioned. The convention provides a legal basis for disclosing domain name registration information and direct cooperation with service providers.

The session also expressed support for the active role of various actors in combating disinformation and holding those responsible for war crimes accountable. The engagement of the private sector and organizations like Bellingcat in combating disinformation was acknowledged. The importance of investigative journalism and reliance on open-source information in exposing war crimes were emphasized.

However, it was stated that not all open-source information can be used as evidence in trials. The admissibility of open-source information was discussed, highlighting the need to comply with existing legislation and best practice procedures. Information used as evidence must be reliable, authentic, complete, and believable.

Concerns were raised about the rise of deep fakes and systemic disinformation in the current era. It was noted that some countries are actively promoting disinformation campaigns, posing significant challenges in maintaining information reliability and accuracy.

Regarding electronic evidence and data manipulation, it was observed that technological advancements have enabled individuals, states, and regimes to easily manipulate electronic data. The credibility and authenticity of data were emphasized as crucial factors, and it was argued that questions about their credibility and authenticity are legitimate.

The preservation, authentication, and availability of data for trial purposes were highlighted as essential criteria. It was mentioned that data must be preserved, securely guarded, protected, authenticated, verified, and available for review to ensure its admissibility in trials.

The role of the court in determining the validity of data for trials was discussed. It was stated that the court should ultimately decide whether information can be used as evidence in a trial or not.

While the Budapest Convention was praised as an effective instrument, it was noted that it does not cover all countries. Joining the convention implies compliance with its principles, including the protection of human rights, the rule of law, and pluralist democracy. It was also mentioned that countries not part of the convention are not covered by it.

Furthermore, it was clarified that the Budapest Convention is primarily a criminal law convention, rather than specifically focusing on war crimes. Nevertheless, Article 2 of the convention was highlighted for its importance in enabling cross-border access and obtaining of open-source information for use in trials.

The expulsion of the Russian Federation from the Council of Europe was mentioned, resulting from its illegal invasion of Ukraine and its failure to respect human rights and basic values.

In conclusion, the session highlighted the Council of Europe’s active promotion of human rights, the rule of law, and democracy. The Budapest Convention was celebrated as an effective global instrument for combatting cybercrime and ensuring accountability. The significance of investigative journalism, open-source information, and the need for data credibility and authenticity were emphasized. However, challenges regarding the admissibility of open-source information, the rise of deep fakes and disinformation, and the limitations of the Budapest Convention were also discussed. The expulsion of the Russian Federation from the Council of Europe was noted as a consequence of its violations of human rights and basic values.

Nick Waters

The development of open-source investigation has revolutionized the way footage from conflict zones is analyzed. By extracting detailed information from videos, it allows for a deeper understanding of events that take place in these regions. Nick Waters, an expert in open-source investigation, described an example where his team was able to geolocate a potential location from a video related to a series of executions in Benghazi. Working with three to four people for three weeks, they meticulously analyzed the footage to accurately determine the location.

Open source information, if extracted correctly, has the potential to be used as evidence. By using the latest high-resolution satellite imagery and overlaying the video footage on top of it, Waters and his team were able to definitively confirm the location of the execution. They also used the individuals in the video as sundials to establish the accurate time of the incident. These successful uses of open-source information demonstrate its potential as valuable evidence in various contexts, particularly in the realms of peace, justice, and strong institutions.

However, the Russian legal system has expressed skepticism towards the use of open-source information as evidence in previous incidents. Waters emphasizes the importance of ensuring the credibility of information in the Ukraine civilian harm database. He cautions against attributing incidents to any state party without extensive investigation. The dismissive attitude of the Russian legal system presents challenges in using open-source information effectively in this context.

To address the need for verification of authenticity in legal evidence, collaboration with the Global Legal Action Network has led to the development of a methodology for verifying digital evidence. The process involves locating images and videos in space and time, and excluding misleading information. This methodology not only ensures the admissibility of evidence but also provides a framework for verification in legal proceedings.

Although AI has made significant advances, it is not yet reliable enough to create believable content. Waters acknowledges that the majority of problems in this field arise from real content being repurposed for different events. AI, such as AlphaZero, currently cannot produce credible fake content. Therefore, caution is necessary when relying on AI-generated content for verification purposes.

Waters emphasizes the importance of hiring individuals with deep local knowledge to gather a more accurate understanding of situations. By doing so, it is possible to reduce bias and enhance the comprehension of events, ultimately leading to more reliable and nuanced investigations.

The responsibility of social media platforms for the information they post is a notable concern. Different moderation policies exist within and between platforms, leading to inconsistent treatment of content. Additionally, their algorithms play a significant role in determining what information is shown to users. Platforms have often tried to distance themselves from responsibility by claiming they are not publishers. However, Waters argues that social media platforms should bear partial responsibility for the information they disseminate, highlighting the need for greater accountability.

Cyber-enabled war crimes provide valuable information for investigating atrocities. The International Criminal Court (ICC) has recently announced its plans to investigate cyber-enabled war crimes for the first time. While this presents new opportunities, it is essential to note that computer-generated evidence should not replace traditional evidence. It must conform to legal admissibility and be used in conjunction with other forms of evidence to ensure a comprehensive and valid investigation.

In conclusion, the development of open-source investigation has revolutionized the way footage from conflict zones is analyzed. Open-source information has the potential to be used as evidence, but challenges arise in adopting it within certain legal systems. Collaboration with the Global Legal Action Network has led to the formulation of a methodology for verifying digital evidence in legal contexts. AI, although advancing, is not yet reliable enough to create believable content. Hiring individuals with local knowledge is crucial for accurate comprehension of situations. Social media platforms bear responsibility for the information they post. Cyber-enabled war crimes offer new insights, but computer-based evidence should not replace traditional evidence. Ultimately, a multi-faceted approach to evidence collection and verification is necessary for effective investigations in the pursuit of justice and peace.

Nataliya Tkachuk

The analysis highlights the importance of international cooperation in addressing cyber threats. It emphasizes the need for coordination and control activities among state actors involved in information and cybersecurity in Ukraine. Nataliya Tkachuk, responsible for coordinating these activities, specifically mentions the Russian Federation as the first country to use cyberattacks and disinformation as tools for special information operations. Tkachuk also points out the Russian Federation’s manipulation of social media platforms to spread disinformation and influence public opinion and elections in democratic states. This highlights the need for collaboration between nations to effectively combat cyber threats.

The analysis also underscores the role of electronic evidence in documenting and investigating war crimes. Tkachuk discusses how the law enforcement in Ukraine has registered over 90,000 war crimes since the Russian aggression began. She emphasizes that it would be impossible for any single law enforcement agency or country to document and investigate all of these crimes without the assistance of civil society, international partners, and NGOs. This highlights the significance of electronic evidence, which can provide a comprehensive understanding of war crimes and aid in holding perpetrators accountable.

The analysis reveals instances of cyberattacks on critical infrastructure facilities in Ukraine, such as electric power stations, conducted by the Russian Federation. This highlights the detrimental impact of cyberwar on civilian infrastructure and emphasizes the need for international cooperation to address and mitigate these attacks effectively.

Furthermore, the analysis mentions the success of Ukraine and the United States in attributing cyber crimes to specific individuals and states. The Armageddon Hacker Group is cited as an example, identified as part of Russian counterintelligence. This showcases the possibility and importance of attributing cyber crimes, offering hope for accountability and deterrence in cyberspace.

The analysis emphasizes the significance of international partnerships and efforts in tackling cyber war crimes. It calls on the international community to support these initiatives, recognizing the need for collective action to combat cyber threats effectively.

Moreover, the analysis highlights the Budapest Convention as an effective instrument in investigating cybercrimes. It acknowledges that Ukraine is still working towards complete implementation of the Convention and, prior to the conflict, faced challenges in providing full disclosure and preservation of technical data as required by the Convention.

The analysis also discusses the role of common democratic values in Ukraine’s fight against Russian aggression. It advocates for the upholding of justice and the rule of law, as these values are fundamental for ensuring peace and stability.

In addition, the analysis acknowledges the role of civil society in collecting evidence of war crimes in Ukraine. It recognizes their crucial involvement in gathering information and supporting investigations into these crimes.

Lastly, the analysis appreciates the Council of Europe’s efforts in training judges, prosecutors, and civil society in Ukraine. This training is seen as a valuable contribution to Ukraine’s justice system and evidence collection processes.

In summary, the analysis emphasizes the importance of international cooperation in countering cyber threats, the role of electronic evidence in war crime investigations, and the need for effective implementation of international conventions. It also underscores the significance of common democratic values, the attribution of cyber crimes, the role of civil society, and the contribution of the Council of Europe in supporting Ukraine’s efforts in documenting and addressing war crimes.

Moderator

The session aimed to discuss the use of open source intelligence and digital evidence in the prosecution of war crimes and human rights abuses. It highlighted the Budapest Convention on Cybercrime and Electronic Evidence as an important tool in these efforts. The convention provides guidance on how electronic evidence is collected, presented, deemed admissible, and safeguarded.

The importance of investigative journalism and open source information in holding those responsible for war crimes accountable was emphasized. It was mentioned that investigative journalism and open source information play a vital role in investigations, and the speaker emphasized the importance of bringing those in charge to account. The role of Bellingcat, an organization that specialises in open source investigation, was discussed, and its impact in conflict zones was highlighted. It was mentioned that Bellingcat utilised various methods of analysis and verification to ensure the accuracy of their findings in conflict zones such as Ukraine.

Cooperation with international partners in the fight against human rights violations and cyber crime was also emphasized. The Budapest Convention was mentioned as promoting international and cross-border cooperation in the realm of cybersecurity. The speaker highlighted the effectiveness of international cooperation in handling violations and cyber crimes, and the importance of a coordinated approach in gathering evidence and presenting it in various forums.

Concerns were raised about Russian aggression and cyber warfare, with 90,000 cases of war crimes registered since the Russian aggression started. The continued cyber attacks on Ukraine’s critical infrastructures by Russia were also highlighted. It was mentioned that Russia has chosen not to join the Budapest Convention.

The session also addressed concerns about data manipulation and the need for data authentication. It was mentioned that technological advancements have made data manipulation easier, and electronic evidence is vulnerable to manipulation. The importance of preserving data and authenticating data sources to ensure credibility and admissibility in court was stressed.

The role of social media platforms in enabling harmful events was discussed. The differences in moderation policies among platforms, as well as the accusation of Facebook enabling ethnic cleansing in Myanmar, were highlighted. It was mentioned that social media platforms bear some responsibility for the information shared on their platforms, and the influence of algorithms on what is shown to users was also acknowledged.

The importance of joining the Budapest Convention was emphasized. It was mentioned that the convention now covers 68 states, and countries that join the convention comply with the principles of human rights, the rule of law, and democratic society. It was stressed that more states need to join the convention to strengthen international cooperation in addressing cyber crimes and human rights violations.

In conclusion, the session highlighted the significance of open source intelligence and digital evidence in prosecuting war crimes and human rights abuses. The Budapest Convention was recognised as an important tool in this regard, providing guidance on the collection, admissibility, and safeguarding of electronic evidence. The session also brought attention to the role of investigative journalism, international cooperation, and the need for improved handling of open source intelligence and electronic evidence. Moreover, concerns were raised about Russian aggression, data manipulation, and the responsibility of social media platforms in enabling harmful events. Overall, the session emphasized the importance of international cooperation and effective legislative tools in addressing these pressing issues.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Viewing Disinformation from a Global Governance Perspective | IGF 2023 WS #209

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Corway Wu

In the realm of disinformation, politicians are also actively involved in creating and spreading false information, not just news media and social media. This amplifies the scope of actors responsible for misleading the public. The negative sentiment towards politicians indicates a lack of trust in their intentions.

Timing is a crucial aspect in the dissemination of disinformation. The example of Brexit voting behavior is used to demonstrate this. Voters may be influenced by inaccurate information without realizing it until it is too late. This implies that the impact of disinformation can have lasting effects, shaping important decisions.

However, an opposing viewpoint is presented, disagreeing with Jeanette’s argument about the significance of timing when discussing disinformation. It is argued that Jeanette’s failure to consider timing weakens their argument. The negative sentiment expressed towards this disagreement suggests a potential blind spot in understanding the issue.

Overall, this analysis illustrates the multifaceted nature of disinformation and its wide-ranging consequences. Politicians, news media, and social media platforms are all complicit in perpetuating false information. The timing of disinformation is highlighted as a crucial factor, as it can significantly influence its impact on individuals and societies. The disagreement regarding the importance of timing further emphasizes the complexity of this subject.

Audience

The analysis delved into the multifaceted nature of misinformation and disinformation. One of the speakers put forth the argument that these actions have the potential to incite individuals to act against democratic institutions. To support this claim, they highlighted the example of the January 6th Capitol riots, which they believed were inspired by misinformation and disinformation. The speaker’s sentiment was negative, suggesting concern about the impact of these actions on democracy.

However, another speaker expressed a more neutral stance, highlighting the challenge of settling on a clear definition of disinformation. They pointed out that assessing the longitudinal impact of disinformation is challenging. This sentiment indicates a level of uncertainty regarding the extent to which misinformation and disinformation can influence actions and outcomes.

A disagreement emerged regarding the possibility of completely eliminating disinformation. One speaker argued that efforts should be directed towards reducing its spread and minimizing the damage caused, rather than striving for complete elimination. This sentiment aligned with a more positive outlook on the issue.

In the specific context of Switzerland, it was suggested that disinformation does not possess enough influence to significantly sway elections. The speaker based this claim on the observation that Switzerland has a stable multi-party system with relatively consistent voting patterns over the past 30 years. This sentiment reflects a more neutral perspective on the impact of disinformation in the Swiss political landscape.

The analysis also examined the potential effects of disinformation on internet infrastructure and connectivity. There was evidence suggesting that disinformation governance can impact internet infrastructure, with an example cited of Europe implementing IP blocking of Russian websites spreading disinformation. This negative sentiment implies the belief that the weaponization of disinformation through online platforms has had widespread consequences.

The audience raised concerns regarding the potential threat disinformation poses to the fundamental right of freedom of expression. Historical examples, such as the information war of the Cold War and the use of radio for propaganda during Nazi Germany, were provided to illustrate this point. This sentiment highlights the importance of protecting freedom of expression in the face of disinformation.

Notably, the analysis explored the effectiveness of the Christchurch Call initiative in response to live-streamed terrorist attacks in New Zealand. The sentiment here was negative, as it was argued that rushed solutions to govern and regulate disinformation can cause unintended harm. The speaker stressed the need for a nuanced approach to address disinformation, referencing the impact of tackling disinformation in G7 declarations.

The audience member supporting the Christchurch Call initiative expressed a positive sentiment, believing in its effectiveness. They emphasized the significance of trust-building and multi-stakeholder involvement in addressing terrorism facilitated by online platforms. This aligns with the overall positive sentiment of utilizing a multi-stakeholder model and engaging governments, tech firms, and civil society in combating disinformation.

In conclusion, the analysis highlighted the complex nature of misinformation and disinformation. The arguments presented ranged from the potential dangers of these actions in undermining democratic institutions to the challenges in defining and assessing their impacts. The disagreement regarding the elimination of disinformation reflected a difference in perspectives, with one side advocating for reducing its spread. The analysis also shed light on the specific impacts of disinformation on internet infrastructure, the threat it poses to freedom of expression, and the potential effectiveness of initiatives such as the Christchurch Call in preventing terrorism. Overall, the analysis underscores the need for nuanced approaches and multi-stakeholder involvement to address disinformation and its various repercussions.

Anriette Esterhuysen

The analysis provides a comprehensive overview of perspectives on disinformation in South Africa, covering various viewpoints and arguments. One viewpoint suggests that disinformation is not a major problem in the country, with more concern placed on trusting the government. The public tends to rely on the media, which is regarded as well self-regulated and proficient in dealing with disinformation. Fact-checking is also a common practice in South Africa, swiftly and efficiently debunking false information.

Another argument highlights the successful media regulation in South Africa, which ensures accuracy across different ideological spectrums. It is noted that a commitment to accuracy exists among right-wing, center, and left-wing media outlets in the country. Fact-checking is a prevalent practice, further enhancing the reliability and trustworthiness of the media. This observation supports the notion that media regulation in South Africa effectively maintains accuracy and minimises the spread of disinformation.

The analysis also emphasises the need for careful consideration in the international regulation of disinformation. It is crucial to explore the implications of such regulation on access to information and freedom of expression. While national initiatives regarding disinformation regulation are controversial, existing international instruments may serve as a baseline for effectively governing disinformation.

Furthermore, the analysis highlights the distinct dynamics of weaponising disinformation in online platforms compared to traditional broadcasting platforms. Unlike traditional platforms, online platforms allow for the widespread distribution of disinformation without requiring significant political or economic power. This observation emphasises the need for tailored approaches in combating disinformation across different digital platforms.

A noteworthy observation from the analysis is the advocacy for considering bottom-up approaches and self-regulation measures alongside governmental regulations. Anriette Esterhuysen argues that jumping to governmental regulations without exploring more bottom-up ways may be premature. While a regulatory response might be necessary, Esterhuysen highlights the importance of not dismissing self-regulatory and bottom-up approaches to tackle disinformation. This perspective demonstrates a concern that solely relying on governmental regulations might overlook effective alternatives.

Overall, the analysis offers valuable insights into the various dimensions of disinformation in South Africa. The perspectives presented shed light on the strengths of the country’s media regulation, the challenges faced in international regulation, the dynamics of online platforms, and the importance of considering diverse approaches to combat disinformation.

Remy Milan

Misinformation poses a significant threat to the stability of state institutions, as it undermines citizens’ confidence in these establishments. This erosion of trust has detrimental effects on democracy and should not be underestimated. Remy Milan also shares this view, considering misinformation to be a high-level danger to state institutions. The spread of false or misleading information can have far-reaching consequences in a democracy. It confuses and disenchants citizens, weakening the democratic fabric by eroding trust between the governing and the governed. This issue is especially relevant to SDG 16: Peace, Justice and Strong Institutions, which aims to ensure inclusive governance and access to justice for all. Misinformation disrupts this goal by sowing doubt and creating divisions within society, hindering efforts to achieve peace and justice. It is worth noting that advances in technology, particularly social media platforms, have facilitated the spread of false information, making it easier for malicious actors to manipulate public opinion. Addressing this issue requires a multi-faceted approach, including education, media literacy, regulation, and responsible platform governance. Overall, the danger of misinformation to state institutions is significant, impacting citizens’ confidence and threatening democracy itself. Remy Milan emphasizes the importance of addressing this issue for achieving SDG 16 and ensuring peace, justice, and strong institutions. Efforts must be made to promote media literacy, regulate false information, and foster trust and critical thinking to uphold the integrity of state institutions and democratic values.

Jeanette Hofmann

This discussion explores the impact of disinformation on people’s minds and voting behaviour. One participant criticises the limited knowledge surrounding this issue due to the lack of empirical evidence. They argue that it is essential to conduct research to better understand how disinformation affects individuals and their decision-making processes.

Another participant highlights the strategic intent of disinformation, stating that it is often used as a tool to manipulate people’s behaviour and influence their worldviews. Disinformation is seen as a deliberate tactic that focuses on achieving specific objectives.

The conversation also emphasises the need to expand research on disinformation beyond platforms and consider the wider media landscape. It is noted that context plays a crucial role, and solely examining platforms and algorithms is insufficient. The impact of disinformation should be studied within the broader media environment to gain a comprehensive understanding of its effects.

Furthermore, it is observed that individuals sharing disinformation may not necessarily believe the information themselves. Instead, they may be using it as a means to signal their belonging or loyalty to a certain group or ideology. This highlights the complex motivations behind the sharing of disinformation and the need to consider social and psychological factors in analysing its influence.

The conversation also touches upon the rising disregard for truth and the detrimental impact it has on public discourse and democracy. This trend of increasing tribal attitudes and a lack of concern for distinguishing truth from falsity has severe consequences for the functioning of society and democratic processes.

Regarding the governance of the internet, there is a recognition that infrastructure standards need global agreement to ensure a cohesive global network. However, content regulation should not be undertaken at a global level, as it may impinge upon freedom of speech and local autonomy.

The Digital Service Act, proposed by the European Commission, is viewed as an interesting development. It extends the scope of human rights to not only govern the relationship between people and governments but also guide platform behaviours. This recognition that the private sector’s influence on the exercise of human rights should be guided by human rights principles is seen as positive.

The Act’s provision for data access related to systemic risks caused by platforms is supported. This data access allows for a better, evidence-based understanding of the impact of disinformation. However, the concept of needing to mobilise systemic risk to gain access to data is criticised, highlighting the need for more efficient mechanisms.

The discussion concludes with the suggestion that the Internet Governance Forum (IGF) could serve as a platform to discuss and implement best practices derived from Article 40 of the Digital Service Act. This highlights the potential for international collaboration and knowledge-sharing in addressing disinformation and its consequences.

Overall, this discussion emphasises the urgent need for comprehensive research, consideration of wider media environments, and the recognition of the complex motivations behind the sharing of disinformation. It also addresses the importance of upholding human rights principles and the challenges of content regulation in a global and interconnected digital landscape.

Bili Drake

The impact of disinformation on democracy is a complex issue that is influenced by various factors and is context-dependent. Different perspectives exist on the extent to which disinformation can affect democratic processes. Some argue that disinformation can have a significant negative impact on democracy, while others caution against oversimplifying the issue and relying on false dichotomies.

It has been observed that a considerable amount of disinformation originates from broadcast media and is then amplified through social media platforms. This highlights the interconnectedness between different forms of media in the spread of disinformation. Several studies have indicated this behavior, emphasizing the importance of understanding the role played by different media channels in the dissemination of disinformation.

One key aspect that complicates the issue of disinformation is the lack of a standardised definition. Leading organisations like the European Union and the UN Special Rapporteur have differing definitions of disinformation, which can give rise to confusion and inconsistencies in tackling this problem. It becomes crucial to establish a common understanding to effectively address disinformation.

Tribal loyalty is identified as a significant factor that can lead individuals to believe in disinformation. In cases like the United States, where tribal affiliations and identity politics play a prominent role, people may align with certain narratives or disinformation due to their loyalty to a particular group. This highlights how social and political factors can impact an individual’s susceptibility to disinformation.

Identity politics further compounds the issue, distorting the perception of truth. Some individuals develop their identities around opposing certain groups or ideologies, leading them to embrace disinformation that aligns with their pre-existing biases. This phenomenon highlights the role of emotions and personal beliefs in shaping the acceptance of disinformation.

Efforts to regulate disinformation on a global level have been proposed, but doubts remain about their effectiveness. Discussions in the United Nations have seen various proposals related to disinformation, such as China’s suggestion to criminalise its spread and UNESCO’s guidelines for digital platforms. However, the complexities and geopolitical divisions inherent in regulating disinformation make it challenging to achieve meaningful global regulation. As a result, long-term engagement is advocated, focusing on building infrastructure to challenge disinformation effectively.

The proposal for a code of conduct on information integrity for digital platforms is seen as an attempt at global internet governance. This proposal aims to govern the information that flows through digital networks, aligning with the definition of internet governance. It raises questions about the extent to which such regulations should be implemented and their potential impact on freedom of expression and privacy.

The primary responsibility to counter disinformation lies with states, according to the UN General Assembly’s resolution. While platforms such as social media play a role, governments bear the primary responsibility to address the issue effectively. Simply pressuring platforms to act does not address the root causes of disinformation.

It is important to recognise that disinformation can originate from various sources, including the dark web. This highlights the need for a comprehensive approach that looks beyond platforms alone. Strategies should encompass multiple sources and channels through which disinformation can be generated and disseminated.

Civil society participation is crucial in the discussion on countering disinformation. While there have been limited discussions on proposals like the UN Secretary General’s Global Digital Compact, greater involvement of civil society in such initiatives can ensure diverse perspectives and balanced decision-making.

In conclusion, addressing the issue of disinformation requires a multifaceted approach that involves governments, platforms, and civil society. The complex nature of disinformation and its impact on democracy necessitate a nuanced understanding, taking into account various factors such as media channels, definitions, tribal loyalty, and identity politics. Efforts to regulate disinformation at a global level should be complemented with long-term engagement and infrastructure-building, recognising the challenges and limitations faced in achieving effective global regulation.

Nighat Dad

Disinformation, which can impact democratic processes, is a topic of concern. However, solid evidence is needed to support this claim. Caution must be exercised in interpreting the complex and contextual definitions of misinformation and disinformation. Disinformation has the potential to harm marginalized groups, and a UN report highlights its negative effects on gender equality. Global governance instruments exist, but their application needs improvement as regulations and laws often suppress freedom of expression. State actors and companies have a shared obligation to provide accurate information and prevent the spread of misinformation. Synergy between existing systems is crucial, and the performance of oversight boards and governance mechanisms must be reviewed. Concerns are raised about governments misusing guidelines and the lack of accountability. Regulatory mechanisms are needed to hold state actors accountable. User rights should not be forgotten in regions with restrictions. The local context is vital, and more global oversight boards are necessary to hold companies accountable. Transparency reports play a key role in holding platforms accountable.

Clara Iglesias Keller

Disinformation has the potential to undermine democracy, although its impact varies depending on the context. While there is currently no solid empirical evidence to suggest that disinformation directly changes voters’ behaviors or affects election results, there is a consensus that further research is necessary to fully understand its implications.

The existing research on the impact of disinformation is primarily focused on the United States and Europe, highlighting a need for expanding studies to include other regions such as Latin America, Africa, and Asia. It is important to understand how disinformation strategies can influence political transformations in different contexts.

Disinformation is considered a communication practice and an online harm, along with misinformation, propaganda, and fake news. Its intent holds significant legal relevance, further emphasizing the need to address the issue.

In some instances, disinformation serves as a form of political intervention. For example, in Brazil, it has been used to express dissatisfaction or directly attack democratic institutions, including the electoral system and high courts. This highlights the destructive potential of disinformation as a tool in political disputes.

However, the concept of disinformation poses a challenge within statutory regulation, as there is no clear space for its definition and regulation.

Global governance solutions, although important, may not be sufficient to address the impact of misinformation and disinformation on political disputes. It is necessary to confront the ultimate convertibility of economic power into political power, particularly within the media landscape. This is evident in countries like Brazil, where traditionally concentrated and unregulated media landscapes contribute to the spread of disinformation.

Additionally, global solutions often rely on consensus-based governance structures, which may lack the power needed to modify digital business models and data usage effectively.

More empirical evidence is needed, especially outside of the global north. In countries like Brazil, internet usage is strongly associated with platforms such as WhatsApp, Facebook, and Instagram, facilitated by zero rating policies. Understanding the impact of disinformation in these regions is crucial for developing effective countermeasures.

In conclusion, addressing the challenges posed by disinformation requires not only further research but also more institutional innovation. This innovation should create an apparatus that allows diverse stakeholders and civil society to engage in the disputation of truth and content. By confronting the convertibility of economic power into political power and exploring alternative governance structures, we can work towards mitigating the harmful effects of disinformation and safeguarding democratic institutions.

David Kaye

Disinformation is a complex issue that involves the dissemination of false or misleading information. It can have various impacts and is spread through different platforms, including legacy media and social platforms. Understanding the nuances of disinformation is crucial, as there is no one-size-fits-all solution to address it.

David Kaye, an advocate for human rights, highlights the importance of clear definitions and understanding in addressing disinformation through legal regulation and governance. However, he expresses concern about the lack of shared definitions, which may impede the process of regulation. Kaye also raises concerns about emerging regulations in Europe and the UK that rely on platforms to define disinformation, as this may affect transparency and risk assessment.

While global regulation of disinformation may seem desirable, Kaye argues that it is not achievable. Instead, he suggests the development of a common set of guiding principles based on human rights. These principles should be the foundation for addressing disinformation, providing a framework that ensures legality, necessity, proportionality, and legitimacy of objectives.

In shaping policies and strategies to combat disinformation, Kaye believes that civil society should play an active role. They should be included in the drafting and adoption process to ensure a more inclusive approach. Additionally, Kaye argues that governments should be held responsible for their behavior and should support public service media, as excluding them would undermine the effectiveness of addressing disinformation.

Over-reliance on platforms for handling disinformation is a matter of concern. Relying solely on platforms may create challenges in terms of transparency, accountability, and bias. Therefore, it is necessary to explore alternative approaches and strategies to combat disinformation effectively.

The leadership of New Zealand in promoting multi-stakeholder approaches and prioritising human rights in times of trauma, such as after the Christchurch attack, is commended by Kaye. He recognises the importance of keeping human rights at the core of global governance. In this regard, Kaye highlights the Internet Governance Forum (IGF) as a platform where human rights and access to information should be given priority.

However, Kaye also warns against adopting ideas that disregard human rights in response to traumatic events, such as the Israel-Palestine conflict. While people may have natural responses to such events, it is crucial to ensure that any responses or measures taken are rooted in human rights principles.

In conclusion, addressing disinformation requires nuanced understanding and a combination of approaches. Clear definitions, shared principles based on human rights, civil society participation, government responsibility, and cautious reliance on platforms are all essential factors in effectively combating disinformation. New Zealand’s leadership and the IGF’s emphasis on human rights in global governance are notable examples of positive progress. However, it is crucial to avoid compromising human rights in times of trauma or conflict.

John Mahob

A recent discussion highlighted the detrimental effect of disinformation on democracy in the Philippines. The concern was voiced by the current president, Marcos, who is the son of the former dictator. One of the key arguments made was that disinformation played a significant role in influencing the outcomes of the recent elections.

Disinformation in the political landscape is seen as a serious threat to the country’s democratic processes. It is suggested that the spread of false information and manipulation of facts can lead to citizens making ill-informed decisions, thus undermining the democratic values of transparency and accountability.

Supporting this viewpoint, John Mahob, a representative from the Foundation for Media Alternatives in the Philippines, also expressed concern over the impact of disinformation on the country’s democracy. He stressed the need to address and counter disinformation, as it has the potential to distort public opinion and undermine the credibility of democratic institutions.

The speakers argued that the negative consequences of disinformation are far-reaching. By spreading false narratives and distorting facts, disinformation can erode trust in institutions and create divisions among citizens. It is seen as a tool that can be used by those in power to manipulate public sentiment and secure their own interests.

The evidence presented by both speakers raises important questions about the state of democracy in the Philippines. The influence of disinformation on the recent elections serves as a warning sign that steps need to be taken to protect the integrity of democratic processes. Efforts to combat disinformation and promote media literacy are crucial in order to safeguard the principles of democracy, uphold freedom of expression, and ensure that citizens are adequately informed to make informed decisions.

In conclusion, the discussion reveals a shared concern about the negative impact of disinformation on democracy in the Philippines. The speakers, including the current president and John Mahob, emphasize the urgent need to address this issue and prevent disinformation from undermining democratic values. It is hoped that by raising awareness and taking appropriate measures, the Philippines can work towards creating a more informed and resilient democratic society.

Aaron Maniam

The analysis explores several key aspects of global governance, regulations, misinformation, and digital regulation. One of the main challenges in defining global governance arises from the presence of different models and guidelines, which leads to variations in the level of guidelines and enforcement, resulting in a lack of consensus on the precise meaning of global governance.

Concerning global governance regulations, it is crucial to distinguish between basic standards and additional issues. Examples such as the Digital Services Act (DSA) in the European Union and online safety regulations in Singapore and the UK emphasize the significance of addressing both fundamental standards and more complex issues in regulating global governance. These regulations play a significant role in achieving Goal 16 of the Sustainable Development Goals (SDGs): Peace, Justice, and Strong Institutions.

Governments can have contradictory impacts on global governance efforts. On one hand, they can be a source of misinformation, hindering progress towards effective global governance. However, governments also possess the authority and skills necessary to continuously update legislation to keep pace with rapidly evolving technology. This ability is essential for achieving Goal 16 of the SDGs.

Interoperability, the ability for different systems to communicate seamlessly, is a vital aspect of digital regulation. Aaron Maniam highlights the importance of interoperability among different countries, as it enables coherent communication and collaboration. This is linked to Goal 9 of the SDGs: Industry, Innovation, and Infrastructure.

A polycentric approach is crucial in combating disinformation. Governments should move away from solely having an authority-based role and embrace a convening function. By engaging in consultation and deliberation, governments can prioritize and address issues related to disinformation in a bottom-up fashion. Additionally, community building, space building, and urban planning should be part of the government’s role in fighting disinformation.

Education and literacy play a pivotal role in tackling disinformation. In Singapore, various organizations, including the National Library Board, the Information and Media Development Authority, and the Cybersecurity Agency, collaborate to operationalize strategies. Education that starts at home and in schools and libraries is highlighted as a key factor in enhancing literacy among citizens. This aligns with Goal 4 of the SDGs: Quality Education.

In summary, the analysis underscores the complexities and challenges of global governance and the importance of clear regulations. It also highlights the dual role of governments as potential sources of misinformation and as crucial actors in updating legislation. Interoperability is crucial for effective digital regulation, and a polycentric approach is essential in combating disinformation. Lastly, education and literacy are vital components in mitigating the impact of disinformation.

Greta

Greta strongly believes that disinformation is significantly weakening democratic systems. This issue is related to the topics of disinformation and democracy and is associated with a negative sentiment. However, no specific supporting facts or arguments were provided to support the claim that disinformation undermines democracy.

Disinformation, the deliberate spread of false or misleading information, poses a serious threat to the democratic process. It can manipulate public opinion, deceive voters, and erode trust in democratic institutions. Greta’s agreement with this viewpoint suggests that she recognizes the detrimental effects that disinformation can have on the functioning of democracies.

Although no specific supporting facts or arguments were presented, it is worth considering the widespread impact of disinformation in recent years. The rise of social media platforms has enabled the rapid spread of false information, often disguised as legitimate news or opinions. This has the potential to sway public opinion and distort democratic discourse.

Furthermore, disinformation campaigns have been known to target elections by spreading false information about candidates or manipulating public sentiment. Such tactics can undermine the integrity of electoral processes and compromise the ability of citizens to make informed choices.

The conclusion drawn from Greta’s strong agreement is that urgent actions are needed to address the problem of disinformation. Safeguarding the democratic process involves countering disinformation through fact-checking, promoting media literacy, and strengthening regulations on social media platforms. It is essential to restore trust and ensure that accurate and reliable information prevails in democratic societies.

In summary, Greta strongly believes that disinformation is undermining democracy. While specific arguments and supporting facts were not provided, the existence of disinformation poses a clear threat to democratic systems. Addressing this issue requires collective efforts to counter disinformation, promote media literacy, and protect the integrity of democratic processes.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

The Virtual Worlds we want: Governance of the future web | IGF 2023 Open Forum #45

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Pearse O’Donohue

The European Union (EU) has set out its vision and strategy for the future of virtual worlds, emphasizing the importance of aligning them with EU values and principles while respecting existing legislation. The aim is to establish a technological transition that allows for a seamless connection between people and machines.

In July, the EU released its strategy, which highlights the need for virtual worlds to mirror EU values and adhere to EU legislation. This ensures that the digital landscape remains in line with EU principles and regulations. The EU envisions a future where virtual worlds serve as a reflection of its values and operate within the existing legal frameworks.

The EU’s strategy also focuses on the broader transition towards web 4.0 and virtual worlds. This transition aims to create an environment that supports the growth and development of businesses. The EU aims to foster world-leading applications and provide businesses with certainty regarding the principles they must follow. By doing so, the EU aims to prevent virtual worlds from being dominated by a small number of major players, ensuring a more diverse and competitive market.

Additionally, the EU recognizes the importance of global governance in shaping the future development and use of virtual worlds. The EU plans to establish an expert group that brings together member states and other stakeholders to share a common approach and exchange best practices. By relying on recognized instruments such as the European Declaration on Digital Rights and Principles and a Declaration for the Future of the Internet, the EU aims to create a framework that promotes effective governance of virtual worlds on a global level.

One prominent advocate for empowering individuals and promoting diverse participation in virtual worlds is Pearse O’Donohue. O’Donohue supports the EU’s efforts to create an environment where the European industry can develop world-leading applications. The goal is to ensure that people and businesses have control over the transfer of their data, virtual assets, and identities. By prioritizing individual empowerment and diverse participation, the EU seeks to foster a more inclusive and user-centric virtual world environment.

In conclusion, the EU’s strategy for the future of virtual worlds focuses on aligning them with EU values and legislation, promoting open and interoperable development, establishing global governance frameworks, and empowering individuals. By embracing these principles, the EU aims to shape virtual worlds that reflect its values, foster innovation and competition, and empower users in an evolving digital landscape.

Elena Plexida

ICANN, the Internet Corporation for Assigned Names and Numbers, is responsible for coordinating the global internet and its unique identifiers, such as domain names, IP addresses, and protocols. Without ICANN’s coordination, the internet would not function as seamlessly as it does.

One of ICANN’s key strengths lies in its multistakeholder governance model. This model ensures that decisions and policies regarding the internet involve the participation of various stakeholders, including governments, businesses, and civil society. This inclusivity and collaboration have been crucial in protecting and enabling the global internet.

The integration of virtual worlds with the real world presents governance challenges that need to be addressed. As virtual worlds become more interconnected with the physical world and with each other, effective governance mechanisms are required. It is proposed that a multi-stakeholder approach, involving all relevant stakeholders, be adopted to find solutions that accommodate the integration of virtual and real worlds on a global scale.

While standards in virtual worlds are elective rather than normative, some level of standardization is necessary to ensure interoperability and a seamless experience across different virtual worlds. The multi-stakeholder model can play a vital role in setting these standards, as it allows for a collaborative and consensus-based approach. This approach avoids premature imposition of heavy-handed normative standards, promoting flexibility and adaptability in standardization.

ICANN recognizes the potential of immersive meetings as the next application of its work. Immersive meetings aim to enhance communication and collaboration by creating virtual environments where colleagues from around the world can interact as if they were in the same physical space. This vision aligns with ICANN’s global outlook and its commitment to promoting an interconnected and inclusive internet.

The emphasis on interoperability in the metaverse by Elena Plexida highlights the importance of seamless communication and connectivity across virtual worlds. ICANN’s motto, “One world, one internet,” reflects their goal of achieving a unified and cohesive experience in the digital realm. Elena Plexida’s perspective sheds light on ICANN’s broader vision and its dedication to shaping a cohesive and inclusive digital landscape.

In summary, ICANN’s coordination of unique identifiers and its multistakeholder governance model are pivotal in ensuring the smooth functioning of the global internet. The integration of virtual and real worlds requires a multi-stakeholder approach to address governance challenges effectively. While standards in virtual worlds are elective, collaboration and consensus play a vital role in achieving interoperability. ICANN recognizes the potential of immersive meetings and supports interoperability in the metaverse. Overall, ICANN’s work and the perspectives of Elena Plexida contribute to the ongoing efforts to shape an inclusive and interconnected digital landscape.

Audience

During the discussions on the impact of the metaverse, several key points were highlighted. Firstly, there was a consensus on the need for governance and a review of existing instruments to fully comprehend the complexities and impact of the metaverse on human rights, the rule of law, and democracy. The Council of Europe is even currently working on a report specifically focusing on this matter. It was acknowledged that the current instruments in place may not adequately cover the various complexities of the metaverse, such as its impact on the brain and mental autonomy.

The evolving nature of the metaverse was also emphasized. As the metaverse is still in its early stages of development and constantly evolving, it is challenging to anticipate all its implications. This raises questions about the sufficiency of existing instruments and the need for more dedicated frameworks, such as the proposed new AI treaty, to address the unique challenges posed by the metaverse.

Additionally, discussions highlighted the crucial role of certain bottleneck technologies in the development of the metaverse. Janne Hirvonen particularly emphasized the importance of enabling technologies and technology standardization in realizing the full potential of the metaverse.

Another important aspect discussed was the effective handling of data accumulation and access. It was recognized that the construction of the metaverse heavily relies on data handling. To ensure the development of artificial intelligence (AI) and virtual worlds within the metaverse, it is crucial to effectively manage the accumulation and access of data by both individuals and companies.

Furthermore, the role of regulation in the technology industry was emphasized. Regulation was seen as a driver for digital innovation and ethical behavior. It was suggested that economic tools could promote responsible innovation, and businesses could benefit from behaving ethically. Notably, implementing ethical behaviors was seen as a way for businesses to financially benefit.

In conclusion, the discussions on the impact of the metaverse highlighted the need for governance and a review of existing instruments to address the complexities and impact on various aspects of society. The crucial role of bottleneck technologies, data handling, and regulation in the development of the metaverse were also emphasized. It is evident that further exploration and collaboration are needed to fully understand and navigate the challenges and opportunities posed by the metaverse.

Masahisa Kawashima

The analysis reveals several key points regarding challenges and potential developments in technology for the future internet. One major challenge identified is the enforcement of data privacy and AI governance policies. The current internet cannot guarantee that transported data is not fake, raising concerns among users who want assurance that their data is protected. To address this challenge, there is a need for standardization to ensure that data privacy and AI governance policies are effectively implemented.

Another major challenge highlighted is network latency in the context of virtual reality (VR) and extended reality (XR) technologies. For VR and XR, a high capacity and low latency network is needed, with network latency for interactive virtual rendering services being less than 10 to 20 milliseconds. This challenge emphasizes the importance of robust and reliable networks to support these emerging technologies.

Regarding communication infrastructure, the analysis points out the instability of the high frequency radio band used for achieving high capacity and low latency communication. The instability of radio links operating in this high frequency band makes it unsuitable for supporting industrial use cases. This poses further challenges for industries that rely on high capacity, low latency communication.

On a positive note, there is a suggestion for closer integration of radio and optical communication to enhance radio communication. This integration is believed to enable high bandwidth and low latency radio communication. A mention is made of Nokia being on the board of directors of Eye on Global Forum, supporting the credibility of this suggestion.

Additionally, the analysis highlights the promising potential of training and education in the virtual world. VR and XR technologies offer new opportunities for immersive and interactive learning experiences, aligning with the goal of achieving quality education (SDG 4). The positive sentiment towards training and education in the virtual world suggests that it can be a valuable tool in enhancing educational approaches and outcomes.

Lastly, the analysis briefly mentions the emotional benefits of meeting late family members in the virtual world. While no supporting facts are provided, this observation highlights a concept that could have personal significance for individuals.

In conclusion, the analysis emphasizes the need for standardization to enforce data privacy and AI governance policies in the future internet. It also identifies challenges related to network latency and high frequency radio communication and suggests potential solutions such as integrating radio and optical communication for better quality communication. The analysis recognizes the promising role of VR and XR technologies in training, education, and potentially emotional connections. These insights provide valuable considerations for future advancements in technology and infrastructure.

Tatsuya Yanagibashi

The current state of Metaverse-related standards is characterized by fragmentation and a lack of a unified approach. There is no single standard organization, similar to the 3GPP for wireless communication, that is leading the way in driving innovation in this field. This disunity hampers progress and poses challenges for the development of a fully functional Metaverse.

However, proponents of a better governance model argue that establishing a single organization, such as the Metaverse Standard Forum, could pave the way for interoperable Metaverse standards. Nokia, for instance, is actively involved in the Metaverse Standard Forum and is optimistic about its potential. Such a unified approach, with shared standards and guidelines, could foster collaboration and lead to a more streamlined and efficient Metaverse ecosystem.

Networks play a crucial role in elevating the performance of Extended Reality (XR) devices. Currently, XR devices carry the heavy load of intensive computing processes. However, networks can alleviate this burden by offloading some of the processing to the edge. By distributing computational tasks, networks make XR devices lighter and more energy efficient, ultimately enhancing the user experience.

Furthermore, XR devices are predicted to surpass smartphones as the dominant user-end device by 2030. As technology continues to evolve, XR devices are anticipated to become more advanced and accessible, attracting a wider audience. This shift in dominance has far-reaching implications for various industries, including entertainment, gaming, education, and communication.

Traffic analysis indicates that the rapid growth of mobile broadband traffic, along with the increasing volume of XR device-generated traffic, may exceed the capabilities of existing 5G networks. This prompts the need for 6G-like technology to handle the aggregate traffic effectively. It is anticipated that by 2028, the demand for a more advanced and capable network infrastructure will emerge, requiring the implementation of next-generation technologies.

Looking ahead, future generations of network technology, such as 6G, hold great promise for enhancing virtual conferences and telepresence experiences. The aim is to create a more immersive and realistic virtual environment where participants can feel as if they are physically present in the same room. This can be achieved by capturing users’ surroundings in high resolution and accurately representing the lighting conditions within the virtual environment. These advancements have the potential to revolutionize communication, collaboration, and remote work, leading to multiple innovations, particularly in the field of telepresence.

In conclusion, the current state of Metaverse-related standards is fragmented, lacking a unified approach and hindering innovation. However, there is a growing advocacy for better governance, represented by organizations like the Metaverse Standard Forum. Additionally, networks play a vital role in improving the performance of XR devices by processing at the edge. XR devices are predicted to become the dominant user-end device by 2030, necessitating the development of more advanced network technologies like 6G. Future advancements in 6G technology hold the potential to enhance virtual conferences and telepresence experiences, ultimately transforming the way we communicate and interact in the virtual realm.

Bitange Ndemo

The analysis explores the importance of accessibility and inclusivity in infrastructure and education, highlighting their role in promoting equal opportunities and reducing inequalities. It argues that considering accessibility and inclusivity from the beginning, especially in terms of who builds the infrastructure, is crucial. Government-led initiatives in creating road infrastructure ensure equal usage and minimize access issues and competition problems that may arise from private infrastructure creation. Successful examples of countries that have built infrastructure serving everyone further demonstrate the positive impact of such efforts.

In the realm of education, the analysis discusses the evolution of learning, from ancient philosophies to the concept of connectivism with the rise of the internet. It emphasizes the growing use of virtual reality technology, particularly in Africa, and the potential benefits it can offer if accessible to all. The adoption of virtual immersive learning is seen as a significant step towards creating inclusive educational experiences, as it fosters better understanding of the content.

Throughout the analysis, a positive sentiment towards accessibility in infrastructure and inclusive education is evident. The involvement of governments in constructing accessible infrastructure is highlighted as essential to ensure equal access for all individuals. Likewise, the argument is made for education systems to embrace technological advancements, such as virtual reality and the metaverse, to provide improved and inclusive learning experiences.

In summary, the analysis underscores the significance of accessibility and inclusivity in infrastructure and education as means to reduce inequalities and promote equal opportunities. Government-led efforts in constructing accessible infrastructure are crucial, while incorporating technological advancements into education, like virtual reality, can enhance inclusivity. By considering and implementing these factors, societies can strive towards a more equitable future.

Cathy Li

The analysis highlights the crucial importance of international collaboration for the successful establishment of the metaverse. Currently, there are prohibitions or limitations in place in 62 countries regarding the flow of data across their borders. This presents a significant challenge for the development and functioning of the metaverse, as data is an essential element in its operation. To overcome these barriers, new governance solutions are needed that can facilitate the free flow of data across jurisdictions, ensuring the smooth operation of the metaverse globally.

The World Economic Forum (WEF) has been actively involved in addressing the challenges and opportunities presented by the metaverse. Prior to October 2021, the WEF has been covering the topic of the metaverse and Web 4.0. The organization has initiated efforts to ensure the responsible deployment of technology in the metaverse. It has convened a community of more than 300 experts with the aim of generating a socially useful, inclusive, equitable, and responsible virtual world. The WEF’s engagement in this area demonstrates its commitment to mitigating risks and harnessing the benefits of the metaverse for the betterment of society.

A comprehensive governance framework and new regulations and policies are essential to address the advancements and complexities of technologies such as the internet, AI, and the metaverse. Current laws and regulations may not suffice to adequately govern and regulate these rapidly evolving technologies. There is a pressing need to establish a comprehensive governance framework that takes into account the diverse aspects of the metaverse, including consumer metaverse, industrial metaverse, and the implications for identity, privacy, security, and interoperability.

Interoperability is not just a technical issue but also influenced by market factors and economic incentives. Standards bodies often have multiple competing standards, and the one that aligns best with market economics usually prevails. Therefore, fostering interoperability requires considering the economic incentives and market dynamics in addition to technical requirements.

Technical interoperability involves addressing various infrastructural requirements, such as data privacy, security, identity, asset ownership, and payments. These aspects must be carefully worked out through a standard-setting process that takes into account market signals. Achieving technical interoperability will be crucial to ensure seamless integration and interaction within the metaverse.

Usage and jurisdictional interoperability are also important considerations. Usage interoperability should take into account global design and collaboration from the onset, ensuring that different regional access and demographic usage patterns are accommodated. Different regions across the globe may have varying levels of access to compute and networks, and the usage patterns of different user groups, such as children, may differ from those of adults. Jurisdictional interoperability involves addressing issues related to data compliance, transacting, accountability, and the establishment of an identity framework. The importance of jurisdictional interoperability is emphasized by the Japanese government’s long-standing advocacy for data free flow, highlighting the significance of ensuring seamless data flow across jurisdictions.

The topic of data ownership is subject to debate. Some argue that data ownership should not be determined solely by market power or regulations and policy. Instead, a balanced approach involving both policy and business innovation is advocated. This approach entails businesses innovating and coming up with convenient, user-friendly business models and use cases that facilitate data ownership. Data ownership is considered key to the development of generative AI and can contribute to the overall advancement of the metaverse.

In conclusion, the analysis underscores the critical need for international collaboration, comprehensive governance frameworks, and new regulations and policies to successfully establish and govern the metaverse. Key considerations include the free flow of data across borders, responsible technology deployment, interoperability (both technical, usage, and jurisdictional), and a balanced approach to data ownership. By addressing these aspects, stakeholders can harness the immense potential of the metaverse while mitigating risks and ensuring inclusivity, security, and sustainability in this emerging virtual realm.

Paul Fehlinger

Paul Fehlinger, the Director of Policy Governance Innovation Impact of Project Liberty, is a strong advocate for responsible innovation and ethical governance of technology. He believes that this can be achieved through an inclusive, multi-stakeholder approach. Fehlinger emphasizes the importance of taking a comprehensive view of the innovation cycle. He suggests that responsible innovation should be assessed from various stages including design and development, funding, commercial deployment, and regulation. By considering the entire cycle, Fehlinger believes that a more holistic and effective approach to responsible innovation can be achieved.

In addition, Fehlinger points out that economic incentives play a crucial role in making responsible innovation practical and viable. He argues that responsible innovation should not only align with ethical principles but should also make good business sense and offer economic benefits. Striking a balance between responsibility and competitiveness at a global level is essential.

Ethics by design is another key aspect highlighted by Fehlinger. He believes that ethical principles should be embedded in the design of technology itself. This includes considerations such as the necessary public interest digital infrastructure, the balance between centralization and decentralization, and the importance of interoperability and user data control. Fehlinger asserts that the technological dimension is of paramount importance, and that ethics need to be ingrained from the outset.

Furthermore, Fehlinger calls for a shift in mindset regarding user participation. He argues that users should be viewed as more than just consumers in virtual worlds. He believes that the societal aspect of virtual worlds should be factored in from the beginning, empowering users and involving them in a more meaningful and active role.

Fehlinger expresses concern about the rapid pace of technological development and the urgency in understanding its implications. He believes that there is still much to be learned and that it is crucial to get it right. Engaging with different communities early in the innovation cycle, despite uncertainties, is essential. Fehlinger suggests making early attempts to regulate technology and updating approaches as necessary.

It is worth noting that Fehlinger has been involved in various initiatives and consultations globally. He is working towards developing ethical principles for responsible technology in an inclusive, multi-stakeholder manner. His expertise and experience shape his stance on responsible innovation and ethical governance.

In conclusion, Paul Fehlinger advocates for an inclusive, multi-stakeholder approach to responsible innovation and ethical governance of technology. He highlights the importance of considering the entire innovation cycle, incorporating economic incentives, embedding ethics in technology design, and rethinking user roles. Fehlinger’s insights underscore the need for a holistic and proactive approach to ensure responsible and ethical use of emerging technologies.

Miapetra Kumpula-Natri

The concept of virtual worlds and the metaverse becoming a tangible reality is rapidly approaching, thanks to advancements in technology. These virtual environments hold tremendous potential and can bring numerous benefits to various sectors such as healthcare, education, design, logistics, and engineering.

However, alongside this optimism, concerns have been raised regarding the division between the real world and the virtual world. There are worries about the internet becoming fragmented, as our existence becomes split between these two realms, rather than enjoying a unified online space.

Another challenge lies in the feasibility of taxation and financing within virtual worlds, raising questions about how governments will adapt to these new digital economies. Additionally, the adaptation of laws and justice systems to virtual worlds is a significant consideration. This includes determining how criminal activities will be tracked and judged within these environments.

To ensure the success and inclusivity of virtual worlds, it is crucial to advocate for an open, stable, and globally interoperable virtual world. Creating an environment that allows for seamless communication and interaction between users regardless of their location or technological infrastructure will be essential.

The reliability and security of the technological infrastructure supporting virtual worlds are paramount. Efforts must be made to establish robust systems that safeguard user data and ensure a safe online experience.

One challenging aspect that arises in virtual worlds is the behavior of avatars and the legal and ethical questions it raises. The actions of avatars within virtual worlds can have real-world implications, particularly concerning the interaction between adult avatars and minor avatars. These scenarios require careful consideration and appropriate regulations.

Furthermore, data accumulation and its impact on the development of virtual worlds and artificial intelligence (AI) should not be overlooked. The concentration of vast amounts of data in the hands of a few can influence the direction and progress of AI and virtual worlds. Managing personal and organizational data is a crucial issue that needs to be addressed to mitigate potential risks.

Building the metaverse, the ultimate embodiment of virtual worlds, presents a significant puzzle, with data management being a key challenge. The proper handling of user and company data is of utmost importance, and issues related to data management will continue to be significant in the formation of the metaverse.

In conclusion, while virtual worlds hold great promise and offer exciting possibilities, navigating the challenges they present is essential for their successful implementation. Promoting open and inclusive virtual worlds, ensuring a reliable and secure technological environment, addressing legal and ethical concerns, and managing data effectively will be crucial in shaping the future of virtual worlds and the metaverse. Despite these challenges, efforts are being made towards a better future through digital transformation, paving the way for a new era of virtual experiences.

Alexandra Kozik

The concept of the metaverse is gaining momentum as the next step in the evolution of the internet. It is described as a more immersive and embodied internet experience, where users can interact in virtual worlds using advanced technologies. Alexandra Kozik, a prominent figure in the field, believes that the metaverse will be built by different stakeholders using a constellation of technologies and platforms.

To ensure the success of the metaverse, the development of common technical standards is crucial. Kozik emphasizes that without these standards, the metaverse risks becoming fragmented, with each platform operating on its own terms. To prevent this, industry, governments, and experts must work together to establish these standards. By doing so, interoperability can be achieved, allowing users to seamlessly navigate between different platform destinations and experiences. This not only promotes economic benefits, competition, and consumer choice but also creates a cohesive and connected metaverse.

Moreover, Kozik advocates for active multi-stakeholder participation in setting rules and standards for the metaverse. She highlights the importance of multi-stakeholder cooperation in developing both technical and governance standards. This approach encourages participation from European industries and fosters collaboration between various stakeholders. Kozik mentions notable initiatives such as the European Metaverse Research Network, which researches the risks, opportunities, and governance of the metaverse. By involving different perspectives and expertise, the metaverse can be shaped in a way that benefits all stakeholders.

Additionally, there is support for lowering barriers to entry and promoting inclusivity in the metaverse. This includes ensuring that small businesses and developers have equal opportunities to participate and contribute to the metaverse. The aim is to create an inclusive space that facilitates access for all individuals, regardless of their size or resources. This aligns with the sustainable development goals of decent work and economic growth, industry innovation and infrastructure, and reduced inequalities.

Furthermore, immersive technology has shown potential applications in various sectors, including healthcare training and education. Kozik mentions engaging in discussions with surgeons who are already using the technology to enhance their skills. The immersive nature of the technology enables a more realistic and interactive training experience, benefiting aspiring healthcare professionals. Additionally, there is an exploration of using immersive technology in education, allowing students to learn subjects like physics and history in a more immersive and engaging way. The potential of immersive technology extends beyond these sectors, with possibilities being explored in manufacturing as well.

In conclusion, the metaverse is seen as the next evolution of the internet, offering a more immersive and embodied experience. To ensure its success, the development of common technical standards, active multi-stakeholder participation, inclusivity, and the exploration of immersive technology in various sectors are essential. These efforts will shape the metaverse into a connected, cohesive, and inclusive space for users worldwide.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

University Diploma South School on Internet Governance | IGF 2023 Launch / Award Event #9

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Mark Datysgeld

The South School on Internet Governance is highly respected for its unique and inclusive approach to training. It caters to a larger cohort while providing ample support, which sets it apart from other programs that either cater to highly specific audiences or leave students to self-learning. This approach makes the South School invaluable in internet governance training. The positive sentiment surrounding the South School stems from its ability to strike a balance in catering to a broader audience while still offering the necessary support.

On the other hand, traditional models of training in internet governance face scalability problems when it comes to mass training needs. These models typically consist of closed courses with high participation requirements or self-taught courses with no support. Both of these models are unable to handle large numbers of students. For example, when faced with the challenge of training 200 journalists and 300 lawyers, the current traditional models fall short.

The South School, however, has shown its effectiveness in training large numbers of individuals. It is capable of handling mass training needs, making it a valuable solution. The success of the South School’s experiment of holding the training in the Brazilian countryside further demonstrates its ability to overcome challenges. Despite facing infrastructural obstacles, the event was attended by many foreigners, and local students were able to participate remotely. This successful and transformative experiment validates the South School’s approach to internet governance training.

Additionally, the South School plays a crucial role in qualifying individuals for other programs such as ICANN’s Fellowship or NextGen. By providing the necessary knowledge and skills, the South School empowers individuals to apply for these prestigious programs. It acts as a stepping stone, enabling individuals to take on more challenges and further their involvement in internet governance.

In summary, the South School on Internet Governance stands out for its unique and inclusive approach to training. It effectively caters to a larger audience while providing the necessary support, setting it apart from traditional models. Its success in handling mass training needs and transformative experiment in the Brazilian countryside highlight its capabilities. The South School also acts as a gateway to other programs, qualifying individuals for opportunities in the field of internet governance.

Cláudio Lucena

The South School of Internet Governance plays a pivotal role in promoting and advancing knowledge about internet governance. One of its key successes lies in its ability to engage students, universities, and civil society in understanding the importance of internet governance. By disseminating the concept to diverse stakeholders, the school contributes to a broader understanding of the digital ecosystem and its impact on various sectors of society.

Furthermore, the school has made notable efforts to expand its reach beyond the main capitals, a move that has positively affected local communities. By bringing the school to different regions, it is able to reach a wider audience and give individuals from various backgrounds the opportunity to participate and learn. The commitment and hard work required to make this expansion possible exemplify the school’s dedication to ensuring inclusivity and accessibility.

The school’s focus on research and debate in Europe and DC has provided valuable space for dialogue and exploration. However, it is also important to engage with the Latin American environment, as this region presents unique challenges and opportunities in the field of internet governance. By actively seeking to bridge this gap, the school demonstrates its commitment to addressing global internet governance issues comprehensively.

In the larger context, internet governance is understood to be a crucial aspect of our modern digital lives. The digital ecosystem is ever-evolving, and having effective internet governance policies and practices is essential in ensuring a sustainable, secure, and inclusive digital environment. The South School of Internet Governance, along with other similar institutions, plays a significant role in fostering this understanding and promoting the importance of internet governance.

In conclusion, the South School of Internet Governance stands as an influential institution that engages stakeholders, expands access to knowledge, and promotes a deeper understanding of internet governance. Through its efforts to reach diverse communities, facilitate research and debate, and promote the concept of internet governance as a vital part of our digital lives, the school continues to make significant contributions to the field.

Osvaldo

Osvaldo expresses his sincere gratitude for the partnership established with the university in the second semester of 2021. He wholeheartedly finds the experience to be extremely attractive, emphasizing the positive impact it has had on his work and professional development. The partnership has provided Osvaldo with valuable resources, support, and opportunities for growth in the field of education.

Furthermore, Osvaldo firmly believes that this fruitful initiative should continue and expand in the future. He specifically highlights the importance of the diploma format in contributing to the training and development of human resources. This format has proven to be effective in imparting crucial skills and knowledge to individuals in the education sector, equipping them with the necessary tools to make a meaningful impact.

Moreover, Osvaldo affirms the university’s unwavering commitment to maintain a collaborative approach. This commitment inspires confidence in the sustainability and further progress of the partnership. The university’s dedication to working together hand in hand ensures that both parties will continue to benefit from each other’s expertise, ideas, and resources.

In conclusion, Osvaldo’s sentiment towards the partnership with the university is overwhelmingly positive. The initiatives undertaken by the university have created a profound impact on Osvaldo’s work and professional journey, giving him a deep sense of appreciation. This partnership has opened doors to new ideas, possibilities, and growth, establishing a strong foundation for continued collaboration and mutual success. The positive sentiment expressed by Osvaldo reflects the immense value and potential of such partnerships in achieving the goal of quality education.

Audience

Olga Cavalli discusses her team’s work and partnerships in the field of internet governance and professional development. Her team consists of individuals responsible for various aspects such as video management, webmastering, and mentorship. They have been continuously contributing since 2014 and have received positive feedback for their efforts. Their work, particularly in collaboration with a university in Mendoza, has been highly regarded.

During the discussion, Maria, an audience member, congratulates the initiative, recognizing its importance in preparing diverse voices for quality participation. This highlights the significance of the initiative, particularly in reducing inequalities. Maria then inquires about the future expansion plans of the initiative, expressing curiosity about the integration of other voices from the Global South.

In response to Maria’s question, it is revealed that the School of Internet Governance initiative is developing new formats and content aimed at a deeper understanding of specific topics. They have also partnered with a university in Buenos Aires to offer Fortinet certifications to students who meet the evaluation criteria. This showcases their commitment to quality education and the development of individuals from the Global South or the developing world.

Moreover, the audience suggests incorporating contemporary themes like digital governance or AI governance into the curriculum. This suggestion, made by the coordinator of the Bangladesh School of Internet Governance, indicates the audience’s appreciation for the initiative and their desire to stay updated with emerging trends in the field.

In conclusion, Olga Cavalli and her team have made significant contributions in the area of internet governance and professional development. Their partnerships, positive feedback, and efforts to expand and include diverse voices from the Global South demonstrate their commitment to quality education and reduced inequalities. The audience’s suggestions further highlight the importance of staying up to date with contemporary themes in the ever-evolving field of internet governance.

Raitme Citterio

In a recent discussion, Raitme Citterio eloquently emphasized the importance and numerous benefits of participating in an internet school. Citterio highlighted how being part of the internet community and engaging with various related aspects allowed him to gain a comprehensive understanding of his Caribbean colleagues’ vision, thus broadening his educational perspective.

Citterio’s argument puts forth the notion that internet schools provide invaluable opportunities for students to interact with a global community and broaden their knowledge base. By actively participating in online education, individuals can experience firsthand the advantages of being part of a larger network of learners. This connectivity fosters a sense of camaraderie among students from diverse backgrounds, ultimately enriching the educational experience.

The speaker’s appreciation and gratitude shine through in his stance, as he expresses profound thanks for the chance to participate in such an internet school. This sentiment not only reflects Citterio’s personal experience but also echoes the gratitude felt by many others who have had the opportunity to engage with online educational platforms.

Overall, the speakers in this discussion have a positive sentiment towards participation in internet schools, acknowledging the crucial role they play in achieving SDG 4 – Quality Education. The emphasis on the benefits derived from being part of the internet community further highlights the significance of these schools in fostering inclusive, accessible, and quality education for all. The sharing of ideas, perspectives, and visions among colleagues across the globe contributes to a holistic educational approach that prepares students for a globalized world.

This analysis sheds light on the profound impact of participating in an internet school, emphasizing its role in nurturing critical thinking, fostering cultural understanding, and promoting collaboration among students. Furthermore, it underscores the potential of these educational platforms to empower individuals and societies by equipping them with the skills necessary to thrive in the digital age.

Mariela Ovaldo

Upon analysing the statements, several key points emerged. Firstly, one speaker expressed their pleasure in working with the team, emphasising that it has been a positive and challenging experience since last year. However, this claim lacks specific evidence to support it.

Another speaker expressed optimistic expectations for Diplo this year, especially in regard to the students. It was mentioned that they anticipate a group of students who will collaborate with Diplo and produce high-quality work. Although no supporting evidence was given, this speaker’s positive sentiment suggests a belief in the capabilities of the students.

Lastly, gratitude was expressed towards Olga and the team, acknowledging the opportunity to participate and contribute. However, no further details were provided regarding the specific collaboration or work they have done together.

Overall, the sentiment of all the speakers was positive, with each expressing satisfaction or optimism in their respective contexts. However, the analysis lacks specific evidence or examples to further support these assertions. Consequently, questions may arise regarding the depth and validity of the speakers’ experiences.

In conclusion, the speakers’ statements highlight various positive aspects, including the pleasure of working with a team, high expectations for student collaboration and work, and gratitude towards the team. Nevertheless, the analysis would benefit from additional evidence or examples to strengthen and enhance the veracity of these claims.

Olga Cavalli

The South School of Internet Governance, established in 2009, aims to enhance Latin America’s participation in internet governance processes. It offers three stages of training, including online courses, one-week intensives, and research opportunities. Notably, the school has been recognised by the WSIS prizes for its capacity building efforts. It has expanded its student base globally and now includes students from countries like Bangladesh, Chile, Colombia, Haiti, Iran, Jamaica, Mali, and Zambia. The recent collaboration with the University of Buenos Aires allows students to receive university diplomas. The school offers engineering degrees with a focus on internet-related topics like cybersecurity and the impact of the internet on the economy. Collaboration and teamwork are valued, and individuals like Carolina, Don Osvaldo, and Raidme are appreciated for their contributions. Sandy, a cybersecurity specialist, is commended for her professional growth. Challenges, such as limited budgets for travel, have been faced, but the team remains resilient. Cláudio Lucena recognises the importance of understanding internet governance in the digital ecosystem. Mark and Claudio Lucena’s commitment to the school is admired. Raidme, a former fellow, continues to be a valuable team member. Efforts are being made to include voices from the Global South in the school’s activities. Overall, the South School of Internet Governance is dedicated to providing high-quality education and building capacity in internet governance.

Sandy Palma

The school counselor’s experience in Buenos Aires was extremely positive and transformative, leaving a lasting impact on her professional development. By participating in the program, she not only enhanced her professional profile but also acquired a vast knowledge network in the field of cybersecurity from around the world. This experience allowed her to maintain regular professional contacts with colleagues working in cybersecurity globally.

In addition to her experience in Buenos Aires, the counselor made significant contributions to the field of cybersecurity by creating and contributing to Honduras Cybersecura, a free-support association focused on raising awareness of cybersecurity issues and preventing cybercrime among schools, parents, and both public and private sectors. Her involvement in this association was inspired by her school experience and the belief that unshared knowledge is lost knowledge.

The impact of the school program on the counselor’s professional growth in cybersecurity cannot be overstated. She credits her participation in the program as the foundation of her professional growth in cybersecurity. The program equipped her with valuable skills and knowledge, enabling her to receive numerous awards and be recognized as the Top Women Cybersecurity Latin American by ONCE for two consecutive years.

Furthermore, the counselor emphasizes the importance of lifelong learning and continued participation in the school program. She hopes that the program will continue for many more years, as it has opened up opportunities for her, particularly as a woman in a country where such opportunities were limited. This commitment to lifelong learning is a testament to her dedication to staying up-to-date with the latest developments in cybersecurity and continuing her professional growth.

Overall, the counselor’s experience in Buenos Aires and her involvement in the cybersecurity field have had a profound and positive impact on her professional profile, growth, and contributions. Her story serves as an inspiration, highlighting the significance of seizing opportunities, creating networks, and embracing lifelong learning for success in the rapidly evolving field of cybersecurity.

Carolina Gonzalez

The Universidad de Mendoza offers a range of engineering degrees, including disciplines such as telecommunications, computer science, electronics, and bioengineering. The university prioritizes topics related to internet governance in their curriculum, giving importance to subjects like cybercrime, security, privacy, and the economic impact of the internet. This ensures that students are well-prepared to navigate the evolving landscape of internet governance.

The university actively participates in activities and events related to internet governance, demonstrating their commitment to staying involved and up-to-date with the latest developments in the field. Furthermore, the university values student participation and considers it an honour. They are advocates for student engagement and encourage students to take advantage of opportunities such as the South School of Internet Governance.

The Universidad de Mendoza’s involvement in the South School of Internet Governance is considered both relevant and beneficial. By incorporating internet governance into their courses, the university not only prepares students for the challenges and opportunities in this field, but also contributes to the advancement of knowledge and collaboration in internet governance in Latin America. Carolina Gonzalez expresses her gratitude towards the team of the Internet Governance School, emphasizing the honour she feels in being part of such a esteemed institution.

In conclusion, the Universidad de Mendoza stands out for its focus on internet governance in Latin America and its commitment to providing quality education in engineering disciplines. The university’s involvement in the South School of Internet Governance further solidifies its reputation as an institution that values student participation and embraces the latest developments in internet governance.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

The Digital Town Square Problem: public interest info online | IGF 2023 Open Forum #132

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Martin Wimmer

The African Union data policy framework is receiving significant support from BMZ (The Federal Ministry for Economic Cooperation and Development) and the German government, as they have committed €20 million to the initiative. This funding is part of a wider effort to provide a total of €57 million in European contributions towards the implementation of the framework in 10 to 15 partner countries. The aim of this initiative is to enhance data governance and strengthen data-related sectors in Africa.

The framework focuses on several key areas, including data policy, data value creation, and data infrastructure. By emphasising these areas, the African Union aims to pave the way for a more effective and inclusive data ecosystem on the continent. This initiative recognizes the importance of data-powered policymaking and its potential to drive positive change by allowing governments and policymakers to rely on data-based evidence for decision-making. Consequently, the framework supports efforts to increase the availability and accessibility of data for citizens and encourages the use of data to address societal challenges.

Another crucial aspect of the framework is its commitment to addressing inequality in data sets under the guidance of feminist development policy. By integrating a gender data lab into the National Statistics Office in Rwanda, the initiative is taking steps to ensure that data captures the experiences and perspectives of all genders, thereby promoting greater gender equality in data-driven decision-making.

Promoting digital and technical skill development is also a significant objective of the African Union data policy framework. The initiative acknowledges the importance of equipping individuals, particularly young women, with the necessary knowledge and skills to navigate the digital landscape. By supporting the public sector, the private sector, and civil society in acquiring digital skills, the framework seeks to empower individuals to actively participate in the digital economy and benefit from the opportunities presented by digitization.

Countries around the world are recognizing the increasing significance of regulating data to protect their citizens and their digital ecosystems. The African Union data policy framework acknowledges that data represents a package of commodities such as knowledge, education, news, music, art, products, software, identities, rights, and money. Hence, countries are seeking to regulate data to ensure that harmful programs like spyware and false information like fake news do not cross their digital borders. This regulation aims to create a safer and more secure digital environment for citizens while also promoting economic growth and reduced inequalities.

However, it is worth noting that the author of one argument believes that the focus should be on open data and an open internet for everyone, rather than just data markets that primarily benefit a few tech companies. This perspective suggests that prioritizing openness and accessibility can lead to a more inclusive digital landscape and foster greater innovation and collaboration across various sectors.

In conclusion, the African Union data policy framework is receiving substantial support from BMZ and the German government, with a commitment of €20 million. This initiative aims to enhance data governance, promote data-powered policymaking, address inequality in data sets, and foster digital and technical skill development. Moreover, countries are recognizing the importance of regulating data to protect their citizens and promote economic growth. However, there is an ongoing debate regarding the focus on open data and an open internet for all, emphasizing inclusivity and equal access to digital resources.

Audience

The analysis focuses on various aspects of data management and governance, highlighting the importance of both informal and formal internal processes. It asserts that informal processes within organisations play a crucial role in ensuring quality assurance in data management, particularly in managing incorrect or suspicious data. This implies that organisations need mechanisms in place to identify and address data discrepancies effectively.

Furthermore, it is argued that a combination of formal and informal internal processes is necessary to ensure data accuracy while developing capacity. The analysis provides specific examples, such as the management of inaccuracies in data from the population registry, such as age or income errors. This suggests that organisations need to establish robust internal processes to handle data inaccuracies effectively, thus ensuring the reliability and integrity of the data they manage.

The analysis also sheds light on the challenges faced by African countries in implementing multiple data policies and conventions. It suggests that the popularisation of the African Union data policy framework at national and regional levels is crucial. Additionally, the ratification of the Malabo Convention is deemed important, as it addresses key issues such as personal data protection, electronic commerce, and cybersecurity.

Notably, concerns are raised regarding the inclusion of foreign private corporate data collection in the AU framework. This observation indicates that there is ambiguity around how such data collection should be considered within the framework, highlighting the need for clarity and guidelines in handling this aspect.

Another noteworthy point is the concern around how the Africa Data Policy Framework addresses issues of capacity and usage by small and medium-sized enterprises (SMEs). The analysis highlights that whilst some organisations in Africa collect large amounts of data, SMEs are reportedly not able to effectively utilise the data they collect. Additionally, data collection is observed to be happening in silos, resulting in limited movement and usage. This indicates a need to address capacity building and enhance the utilisation of data by SMEs.

In conclusion, the analysis emphasises the importance of both informal and formal internal processes for data management. It calls for the popularisation of the African Union data policy framework and the ratification of the Malabo Convention. Furthermore, the analysis highlights concerns regarding foreign private corporate data collection, as well as the capacity and usage of data by SMEs. The need for collaboration, data movement, and usage within African organisations is also emphasised. Overall, the analysis provides valuable insights into the challenges and recommendations relating to data management and governance in various contexts.

Alexander Ezenagu

The analysis focused on the importance of data governance in Africa, highlighting several key points. Firstly, it was mentioned that interconnectivity and broadband expansion at national, regional, and continental levels are critical for effective data governance. This is because access to high-speed internet is essential for data transmission, storage, and analysis. Additionally, investment in Green ICT, which promotes environmentally friendly practices in information and communication technology, was identified as necessary to ensure sustainable data management.

Regarding data ownership, it was argued that irrespective of the funding source for data generation, countries in Africa should have the right to manage and own their data. Some African countries are currently renegotiating donor grants specifically concerning data ownership rights. This demonstrates the growing recognition of the importance of sovereignty over data.

Cultural, religious, and policy differences among African countries were emphasized in the context of data generation. The analysis pointed out that data usage and generation practices may vary based on the specific cultural and religious values of different countries. For instance, there may be different data usage provisions in Kenya compared to a Sharia-compliant country. The negotiation of sovereignty issues in the digital space by many African countries further highlights the need to consider these differences in data governance frameworks.

The need for a continental standard on data collection and usage, based on cultural values, was discussed. By establishing a standard, it becomes possible to ensure that data practices align with the cultural values of African societies. An example was given of the discussion between Kenya and TikTok, where some Kenyan government sects expressed concerns about the impact of TikTok on the morality of young people. This highlights the need to incorporate cultural values into data governance to address such concerns effectively.

Another important aspect discussed was the implementation of digital service taxation to prevent countries from creating barriers to data penetration. It was argued that if tax laws are not harmonised, countries may block digital platforms like Facebook, Twitter, or Netflix, viewing them as extraterritorial and wanting a share of their revenue. Therefore, digital service taxation is seen as a solution to prevent such barriers and facilitate data flow.

The analysis also emphasised the holistic consideration of digital trade and data generation. Non-tariff barriers were identified as a challenge to the successful implementation of the African Continental Free Trade Agreement (AFCFTA). Tax issues and the lack of harmonisation of laws were mentioned as examples of these non-tariff barriers. By addressing these barriers, African countries can enhance digital trade and the generation of data, contributing to economic growth and development.

Finally, the analysis raised the question of data’s role in society’s morality and potential issues of taxation. The impact of data on morality and whether it should be treated as an asset or a flow were discussed. These considerations reflect the ethical and economic dimensions of data governance.

In conclusion, the analysis highlights the importance of interconnectivity, investment in Green ICT, and data ownership rights in Africa’s data governance framework. It emphasises the need to consider cultural, religious, and policy differences among African countries and develop a continental standard on data collection and usage. The implementation of digital service taxation and the holistic consideration of digital trade and data generation were also discussed. The analysis further raises questions about data’s role in society’s morality and potential taxation issues. Overall, these insights provide valuable guidance for shaping effective data governance strategies in Africa.

Liping Zhang

The analysis explores various perspectives on Africa’s Data Policy Framework, providing insights into key arguments and supporting evidence. It commends the collaboration between the EU Commission and African member states in developing the framework, which is seen as a strong foundation for enhancing data policies across Africa. The analysis expresses optimism that the framework will enable Africa to actively participate in international discussions on data policies.

Regarding data governance, the analysis identifies the need for a coordinating mechanism in the UN system to address the challenges posed by multiple data governance processes. It argues for a common approach at the African Union (AU) level to guide member states in international discussions. This perspective maintains a neutral sentiment, acknowledging the complexity of data governance and advocating for streamlined coordination.

The significance of capacity building and development is underlined as a key factor in maximizing the benefits of the data era. The analysis highlights the lack of infrastructure and human capacity as major challenges that need to be addressed. The data is viewed as a value chain, requiring capacity at each stage. Additionally, the analysis emphasizes the limited financing available for developing countries to capitalize on the opportunities presented by the data era. This perspective views capacity building and development as critical for African countries to fully harness the potential of data.

Standards and quality assurance play a vital role in ensuring reliable and valuable data. The analysis argues for the necessity of standards to ensure quality assurance, and highlights the role of metadata standards in enhancing overall data quality. This viewpoint recognizes the importance of standardized approaches in data management and quality control.

The necessity of strengthening public data ability is also emphasized, with a positive sentiment towards this recommendation. Enhancing public data ability is seen as essential in effectively utilizing data-driven solutions and promoting transparent and accountable governance.

Cooperation in data areas, both at the AU and global level, is emphasized as crucial for successful data policies. The analysis asserts that international cooperation in data areas is essential, and suggests that the experience gained from cooperation at the AU level can serve as a valuable example for global cooperation efforts. This perspective acknowledges the interconnectedness of data-related challenges and the need for collaborative solutions.

Lastly, the analysis expresses appreciation for the AU Data Policy Framework as a significant achievement on a continental scale. It characterizes it as the largest continental-level data policy framework and underscores the importance of collective efforts towards data policy development in Africa.

In conclusion, the analysis provides a comprehensive overview of the viewpoints surrounding Africa’s Data Policy Framework. It commends the collaborative efforts of the EU Commission and African member states in developing the framework and identifies key areas such as data governance, capacity building, standards, cooperation, and public data strengthening as crucial for successful data policies. The analysis offers valuable insights into the challenges and opportunities presented by the data era in Africa and highlights the importance of sustained efforts and collaboration in harnessing the potential of data for sustainable development.

Souhila Amazouz

The African Union (AU) has adopted the AU Data Policy Framework with the aim of raising political awareness about the strategic importance of data. This framework addresses both personal and non-personal data, as well as value creation and cross-border data flow. It seeks to provide a comprehensive approach to data governance.

One of the key objectives of the framework is to facilitate the smooth flow of data across African countries. This emphasises the importance of cooperation and includes action points at both the continental and regional level. The framework acknowledges the need for digital infrastructure, connectivity, and appropriate legal and regulatory frameworks. By highlighting these aspects, it aims to create an enabling environment for the flow of data, which can drive innovation and economic growth.

The AU Data Policy Framework is built on principles such as trust, fairness, safety, accountability, and cooperation. It aims to implement the principle of solidarity and collaboration among African countries. These principles are considered essential for fostering a reliable and secure data ecosystem that respects individuals’ rights.

Furthermore, the AU is complementing the Data Policy Framework with additional initiatives such as guidelines on integrating data in digital trade agreements and an open data strategy. These initiatives further strengthen the AU’s commitment to harnessing the potential of data for sustainable development and partnerships.

The implementation of the framework is currently underway, with various activities to support its adoption. Capacity-building workshops have been organised to promote understanding of the framework, and a self-capacity assessment tool has been developed. These activities are crucial for ensuring that countries have the necessary skills and knowledge to effectively implement the framework and protect citizens’ data.

In terms of progress, African countries are actively developing their data policies and legislation. Some countries have already started working on their national data policies, while others are focusing on legislation for personal data protection. Moreover, regional and continental efforts are also being made to facilitate collaboration and cooperation in data governance.

Notably, the AU Data Policy Framework has a complementary relationship with the Manapur Convention. The Manapur Convention serves as the instrument that regulates data protection, cybercrime, and electronic transactions. In contrast, the AU Data Policy Framework shapes data governance and policy across the continent. This relationship highlights the multifaceted approach that the AU is taking to address data-related challenges.

In conclusion, the AU Data Policy Framework is a significant step towards realizing the potential of data in Africa. By addressing key aspects of data governance, facilitating data flow, and promoting principles such as trust and accountability, the framework sets the stage for a robust and sustainable data ecosystem. Ongoing implementation efforts and the support of various initiatives are helping African countries progress in developing their data policies and legislations. The AU Data Policy Framework, in conjunction with the Manapur Convention, provides a comprehensive framework for data protection and governance on the continent. Capacity-building activities are crucial for successful implementation. This comprehensive approach will create an enabling environment for data-driven innovation, economic growth, and regional collaboration in Africa.

Moderator – Alison Gillwald

The African Union Data Policy Framework, which was passed early last year, is not just a data protection framework but rather a comprehensive data governance framework. It supports the broader continental developments around the digital transformation strategy. This framework is essential for enabling the successful implementation of the digital transformation strategy in the African Union. It leverages the African Continental Free Trade Area Agreement and mandates the creation of a data policy framework and a digital ID interoperability framework.

The digital services protocol, which is currently being negotiated as part of the African Continental Free Trade Area Agreement, plays a crucial role in establishing a common digital market. Without the necessary digital underpinnings and established frameworks, the continental common market could become very uneven. Therefore, the digital services protocol is of great significance for ensuring a fair and balanced digital market integration across the continent.

However, in order to implement these frameworks effectively, capacity building is essential. The challenge lies in the implementation and domestication of these enabling frameworks at the national level. There is a need for countries to develop their national data policies and establish the necessary infrastructure and capabilities through capacity building workshops. Additionally, technical standards for standardisation amongst national systems for cross-border data flows can be put in place to ensure interoperability.

It is important to note the role of data in spurring economic growth, particularly in terms of economies of scope and scale needed for international engagement. The creation of value through data is crucial and should be balanced with protecting the interests of citizens and economies. Data flows in and out of Africa are currently asymmetrical, with limited control and enforcement. It is therefore necessary to address these imbalances to ensure that the continent has better control and enforcement over data flows.

Global governance and cooperation are also crucial for effective enforcement of data policies. Many of the issues related to data governance and digital transformation cannot be enforced without global governance and cooperation.

Alignment of national objectives, particularly in terms of commercial value creation, should emphasise public value creation as a priority. Public data holds significant potential for informing policymaking, and there should be a focus on its management, access, and open data frameworks. This alignment is necessary for achieving sustainable economic growth while considering the broader societal impact.

In conclusion, the African Union Data Policy Framework, along with the digital services protocol, plays a vital role in the digital transformation strategy and the establishment of a common digital market. However, implementation and domestication at the national level pose challenges. Capacity building, standardisation, and interoperability are key factors for effective implementation. It is also crucial to ensure a balance between value creation, economic development, and the protection of citizens’ interests. Improved control and enforcement of data flows, along with global governance and cooperation, are necessary. Additionally, aligning national objectives with public value creation and utilising public data for policymaking are essential components for achieving sustainable economic growth in the African Union.

Paul Baker

The African Union (AU) has established a data policy framework that places great importance on the proper handling of data. This framework is considered innovative as it sets out core principles that should be followed when dealing with data. These principles include ensuring the free and secure flow of data, upholding human rights and security, and ensuring equitable access to the benefits derived from data. These principles are also incorporated within the digital trade negotiations under the African Continental Free Trade Area (AFCFTA) protocol, demonstrating a commitment to prioritising data policy in the context of cross-border trade.

Additionally, the AU emphasises the significance of inclusivity, interoperability, innovation, and accountability when it comes to treating data. These principles are highlighted in the AU’s data policy framework and are also a fundamental part of the digital services covered by the AFCFTA protocol. By adopting these principles, the AU aims to ensure that data treatment is conducted in a fair, effective, and responsible manner.

However, one major challenge observed is the time-consuming implementation of conventions, such as the Manapur Convention. This convention, which relates to peace, justice, and strong institutions, took nine years to be fully implemented despite being adopted nearly a decade ago. This delay raises concerns about the effectiveness and efficiency of the implementation process, and consequently, the ability to achieve the desired outcomes.

Another issue worth noting is the lack of recognition by the European Union (EU) of certain African countries as being compliant with the General Data Protection Regulation (GDPR). Even African countries that have implemented legislation aligned with the GDPR are not acknowledged as compliant by the EU. This lack of equivalence poses a significant challenge, as it prevents the sharing of data between European Union and African subjects. This issue underscores the need for strong data protection measures and cooperation between regions.

In conclusion, the AU has made significant strides in developing a data policy framework that prioritises the proper handling of data. The core principles set out in this framework, as well as those incorporated in digital trade negotiations, aim to ensure the free and secure flow of data, protect human rights, and ensure equitable access to data benefits. However, challenges remain, such as the time-consuming implementation of conventions and the lack of recognition of GDPR compliance by African countries. These challenges highlight the need for continued efforts to enhance data policy and ensure effective implementation for the benefit of all.

Trudi Hartzenberg

Digital trade is currently a key area of focus in the agenda of the African Continental Free Trade Area (AFCFTA). Discussions on digital trade were included in the AFCFTA agenda in 2021, highlighting its increasing importance in the global economy. A comprehensive legal instrument is being developed under the AFCFTA, covering various aspects of digital trade such as cloud services, streaming, and gaming. This indicates that the agreement will address a wide range of issues and provide a robust framework for digital trade within the African continent.

Negotiations on the Draft Protocol for Digital Trade are currently underway. Several rounds of meetings and negotiations have already been concluded, demonstrating the commitment to reaching a consensus on digital trade issues. However, there are still some outstanding matters that need to be resolved, including cross-border data transfers, the location of computing facilities, and customs duties on digital transactions. These unresolved issues highlight the complexity of digital trade and the need for careful consideration and negotiation.

It is crucial for national policy and legal frameworks to align with the continental framework to ensure coherence and consistency in digital trade regulations. Currently, the alignment of national policies and legal frameworks with the continental framework is an important topic that has not yet been agreed upon in the negotiations. This emphasizes the need for further deliberation and consensus-building among AFCFTA member countries to harmonize their policies and regulations.

Data policy and governance are seen as cross-cutting policies that intersect with various aspects of digital trade. The African Continental Free Trade Area protocol on digital trade, along with its connections to other protocols, contains provisions related to data governance. This indicates the recognition of the significance of data management and protection in the digital era. The inclusion of data policy and governance in the AFCFTA framework reflects a commitment to ensuring responsible and secure data practices within the continent.

However, there are implementation challenges in various areas, including data, data governance, consumer protection, trade in services, and intellectual property rights. These challenges not only affect the protocol on digital trade but also impact other aspects of trade within the AFCFTA. It is important to address these challenges to fully realize the benefits of digital trade and foster sustainable economic growth within the African continent.

To effectively embed the commitments in data policy and governance frameworks, technical assistance is required at the national level. This highlights the need for capacity building and support to ensure that countries have the necessary expertise and resources to implement and enforce digital trade regulations. Collaboration and partnerships between AFCFTA member countries and development partners are vital in achieving the objectives related to data policy and governance.

In conclusion, digital trade is a significant area of focus in the AFCFTA agenda. The ongoing negotiations on the Draft Protocol for Digital Trade demonstrate the commitment to address various issues related to digital trade. The alignment of national policies and legal frameworks with the continental framework remains a topic of importance. Additionally, data policy and governance are considered cross-cutting policies that require careful attention and inclusion in the AFCFTA framework. However, there are implementation challenges that can be overcome through technical assistance and support from development partners. By effectively managing digital trade, the AFCFTA has the potential to unlock economic opportunities and drive inclusive growth within the African continent.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Taxing Tech Titans: Policy Options for the Global South | IGF 2023 WS #443

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Victoria Hyde

The analysis explores various perspectives on international taxation and global tax rules. One significant aspect is the commendation of the OECD Amount A Multilateral Convention for its comprehensive and inclusive approach to international taxation. The framework minimises tax arbitrage opportunities, reduces the risk of double taxation, and promotes responsible tax practices for multinational corporations. It also addresses the unique challenges posed by the digital age.

However, an alternative viewpoint emphasises the importance of tailoring tax policies to suit the economic, political, and administrative landscapes of individual countries. This approach promotes revenue generation in developing countries, addresses issues of profit shifting, tax havens, and harmful tax practices, and supports a fair redistribution of taxing rights. It aligns with SDG 8: Decent Work and Economic Growth and SDG 16: Peace, Justice, and Strong Institutions.

Regarding Digital Services Tax (DST), it is noted that several countries in Europe, as well as Malaysia, India, and Pakistan in Asia, have implemented DST in the absence of a global solution. These taxes on imported digital services vary in scope and application. The lack of a unified approach to DST has led to potential market distortions and the risk of double taxation, highlighting the need for a global solution.

The inclusive framework is recognised as a significant step forward in establishing international tax rules. The OECD has sought input from various stakeholders, including countries, industries, trade associations, and non-governmental organisations. This collaborative approach aims to achieve global consensus for fair taxation rules, in line with SDG 10: Reduced Inequalities and SDG 17: Partnerships for the Goals.

The analysis also acknowledges the validity of the delay in implementing the inclusive framework, considering its complexity and long-lasting impact. The goal is to avoid unintended consequences by incorporating stakeholders’ perspectives through an extensive and intricate process.

Stakeholder engagement emerges as a crucial factor in developing and implementing tax arrangements. Victoria Hyde emphasises the importance of engaging with stakeholders, as their concerns can significantly impact the success and effectiveness of tax systems.

Furthermore, the support for globally agreed and consistent tax rules is reinforced. Standardised global tax rules can reduce complexity and uncertainty faced by multinational entities (M&Es) due to varying tax regulations. This facilitates more transparent and predictable tax governance, simplifies compliance for M&Es, and enables them to determine their tax obligations across multiple jurisdictions more easily. These benefits align with SDG 10: Reduced Inequalities and SDG 17: Partnerships for the Goals.

The analysis concludes by addressing the risk of uncoordinated unilateral measures and retaliatory trade sanctions resulting from the absence of a global consensus-based solution. It highlights the need for a globally agreed approach to international taxation and tax rules to mitigate the potential for trade conflicts and ensure peaceful relations among nations.

Overall, the analysis highlights the multifaceted nature of international taxation and the complex considerations involved in establishing global tax rules. It emphasises the importance of inclusive and collaborative frameworks, stakeholder involvement, tailored tax policies, and globally agreed solutions to effectively address challenges and achieve desired outcomes in a fair and equitable manner.

Gayani Hurulle

Large multinational technology companies generate significant revenue from countries in the Global South, yet often operate outside the formal tax regulations of these countries. Over 60% of the world’s population are now online, with the majority residing in the Global South. These countries accounted for around 30% of Meta’s (formerly Facebook) revenue in 2022, with the remaining 70% coming from the US, Canada, and Europe.

To address this, several countries in South and Southeast Asia, including India, Pakistan, Nepal, Vietnam, and Malaysia, have implemented digital taxes. Tax rates range from 2% in India and Nepal to 10% in Pakistan. Different tax options are available, such as domestic measures like direct and indirect taxes, and treaty-based solutions like the UN’s Article 12B and the OECD/G20’s Inclusive Framework.

However, there are concerns about the OECD/G20 multilateral system. Countries that agree to the deemed ‘first best solution’ under the OECD/G20 amount A convention must limit the implementation of domestic measures until the end of 2024. The convention’s implementation depends on the US signing it, adding further uncertainty.

Moreover, the deadline for OECD convention negotiations has been repeatedly postponed, reflecting the complexity of reaching an agreement among participating countries. In the meantime, some countries have implemented low national-level taxation policies and intend to maintain them until an OECD agreement is reached.

There is also uncertainty about whether tax payment cooperation will continue under the Mountie Convention. Gayani Hurulle questions whether companies’ compliance with tax payments will change under the Mountie Convention, an alternative to the current tax system.

Despite these developments, tax officials in India and Nepal have reported a cooperative attitude from companies in paying taxes, adopting a light touch approach to taxation.

It is worth noting that it is not necessary for the Global South to sign up to the OECD agreement now. These countries have the option to wait and observe before deciding to join later.

In conclusion, the issue of taxing large multinational technology companies in the Global South is complex and multifaceted. While countries in the region have taken steps to implement digital taxes and explore various tax options, challenges and uncertainties persist regarding the OECD/G20 multilateral system and the implementation of tax regulations.

Mathew Olusanya Gbonjubola

Nigeria currently does not have a digital services tax in place. Instead, the country relies on a nexus rule, which connects businesses of non-resident persons to Nigeria for tax purposes. This means that if a non-resident business carries out transactions in Nigeria without a physical presence, the income or profits arising from those transactions can still be taxed in Nigeria.

The advancement of technology has made it possible for businesses to operate without a physical presence in Nigeria. Examples of such businesses include online businesses, international consulting firms, and telemedicine services. This technological progress has expanded the scope of taxation for countries like Nigeria, allowing them to tax businesses that exceed a certain threshold of transactions within their jurisdiction.

To ensure compliance with tax regulations, monitoring businesses and their transactions is made possible through financial institutions, as payments need to pass through the banking system. Additionally, companies are also given the option to self-declare their transactions, further enhancing transparency and accountability.

Nigeria’s intention with its tax approach is not to harm businesses but to ensure that taxes are paid where transactions take place. The goal is to create a fair and level playing field where businesses contribute their fair share in the countries they operate in. This approach is similar to that taken by countries like India and Nepal. Nigeria has adopted simplification methods and tax rates that will not significantly affect the profitability of businesses.

Nigeria has actively participated in discussions with the Organisation for Economic Cooperation and Development (OECD) since 2014 regarding tax rules and regulations. However, Nigeria did not sign the OECD treaty in October 2021 due to concerns with several elements of the rules, particularly surrounding issues related to Ammon’s aid. This decision by Nigeria highlights the country’s commitment to carefully evaluate the potential impacts on its economy and ensure that any international tax agreements align with its specific needs and circumstances.

The case of Nigeria not signing the OECD treaty also serves as a cautionary note for developing countries in general. It emphasizes the importance of thoroughly scrutinizing the specific impacts on their revenue before signing any international tax treaties. Matthew Olusanya Gbonjubola shares a similar cautious stance, underlining the need for developing countries to fully understand and consider the implications on their revenue before committing to such agreements.

In conclusion, Nigeria currently relies on a nexus rule rather than a digital services tax to tax non-resident businesses. The advancements in technology have allowed businesses to operate in Nigeria without physical presence, and as a result, Nigeria has implemented measures to tax businesses that exceed a certain transaction threshold. Nigeria’s approach aims to ensure taxes are paid where transactions occur, without significantly impacting business profitability. While Nigeria has actively engaged in discussions with the OECD, the decision to not sign the OECD treaty in 2021 highlights the country’s commitment to carefully evaluate the potential impacts on its economy. This also serves as a reminder for developing countries to carefully consider the implications before signing international tax treaties.

Abdul Muheet Chowdhary

The debate revolves around tax collection and the implementation of digital service taxes. One argument presented is that countries do not necessarily need tax treaties to collect taxes; they can adopt domestic law measures to achieve this. It is highlighted that tax treaties do not grant taxing rights but rather restrict them. Additionally, even without a tax treaty, the residence jurisdiction can still provide unilateral relief. The argument emphasizes that tax is a fundamental aspect of sovereignty.

Another argument put forth is that the United Nations (UN) option of Article 12B provides higher revenue potential for developing countries compared to the solution proposed by the Organisation for Economic Co-operation and Development (OECD). The UN’s Article 12B, particularly with its broad scope, is seen to provide developing countries with almost double or sometimes even triple the revenue compared to the OECD solution.

In terms of digital service taxes, the gross method is described as offering a treaty-based solution to eliminate double taxation. This method, which was developed by the United Nations, involves withholding a portion of each payment made for a digital service as a tax by the government. It is presented as a means to address the issue of double taxation effectively.

Interestingly, despite concerns that the introduction of digital service taxes would lead to companies exiting markets, this has not been observed in practice. Examples, such as Kenya, Uganda, and Tanzania, which have implemented a 5% digital service tax, demonstrate that company investments have not been significantly affected.

Moreover, the claim that companies would pass the cost of digital service taxes onto consumers is largely unsubstantiated. Little empirical evidence supports this notion, suggesting that the common threat of companies transferring costs to consumers is often not followed through.

One noteworthy observation is that multinational companies have attempted to prevent developing countries from implementing their own digital tax measures. This signifies the conflict of interest between multinational companies, which aim to minimize their tax liability, and developing countries seeking to collect taxes from these companies.

Another notable insight is that non-compliance with taxation in the digital economy can potentially be addressed through banks. For instance, Pakistan has implemented a process where banks are responsible for withholding taxes in the digital economy, ensuring greater compliance.

Furthermore, India has introduced an “equalisation levy” strategy, imposing a 6% tax on online advertising targeting companies like Facebook and Google. This strategy restricts payment to tech companies and forces them to file tax returns, enabling India to collect taxes from these firms regardless of their physical presence.

Finally, Abdul Muheet Chowdhary advises waiting for the ratification of the tax measures by the United States and other OECD countries before proceeding with further steps. This suggests the importance of ensuring international cooperation and agreement in tax matters.

In conclusion, the debate surrounding tax collection and digital service taxes is multifaceted. Arguments range from the necessity of tax treaties to domestic law measures, the revenue potential for developing countries through Article 12B, and the effectiveness of the gross method to eliminate double taxation. The lack of observed market exits and limited evidence supporting cost transfers to consumers challenge these concerns. Additionally, the actions of multinational companies, the role of banks in tax compliance, and the implementation of strategies like equalisation levies provide further insight into the complexity of the issue. Ultimately, international cooperation and ratification by key countries are deemed critical to progress in this domain.

Audience

The audience members, including Bagheesha from the Internet Governance Project at Georgia Tech, Kosi from Benin’s Ministry of Economy and Finance, and Kunle, are seeking a clear understanding of how digital tax calculations are performed for companies that operate remotely and do not charge for their services. They believe that it is crucial to establish a clear and detailed process to tax companies like Facebook that do not have a physical presence in certain countries but are extensively used by its people.

Bagheesha, a PhD scholar working with the Internet Governance Project at Georgia Tech, shares their perspective on the matter. Their expertise in the field makes their comment valuable in gaining insights into the complexities of the issue. Kosi, a senior representative from Benin’s Ministry of Economy and Finance, also highlights the need for this information for policy purposes. This indicates that governments and policymakers are grappling with the challenge of effectively taxing digital companies in the absence of a physical presence.

Furthermore, Kunle raises an important question regarding quantifying the amount that digital companies should pay. This aspect adds another layer of complexity to the discussion, as determining the appropriate tax amount for companies operating remotely can be challenging.

The sentiment of the audience is neutral, indicating that they are not taking a strong position on the issue. This is likely because they are seeking clarification and information rather than advocating for a particular stance.

In terms of related topics, the discussion encompasses Digital Tax, Internet Governance, Remote Working, and Social Media. These topics are closely connected as they all contribute to the broader conversation surrounding the digital economy and its impact on taxation.

The discussion also relates to Sustainable Development Goals (SDGs) 9, 10, and 17. SDG 9 seeks to promote industry, innovation, and infrastructure, while SDG 10 focuses on reduced inequality. Moreover, SDG 17 emphasizes the importance of partnerships for achieving sustainable development goals. The linkage to these SDGs underscores the significance of addressing digital tax calculations and ensuring a fair and equitable system.

Overall, the audience seeks clarity on how to calculate digital tax for companies operating remotely. They believe that a detailed process is necessary to tax companies like Facebook, which have a significant user base in certain countries but lack a physical presence. The insights provided by Bagheesha, Kosi, and Kunle, along with the broader topics and SDG connections, highlight the multidimensional nature of this issue and the need for effective policies and partnerships to address it.

Alison Gillwald

The taxation of global digital services has become increasingly complex, with many countries relying on telecommunications operators as their primary tax base. However, a significant issue is that policies surrounding taxation are often developed in isolation, failing to consider the interconnectedness between various sectors such as trade, competition, and digital rights. This siloed approach neglects the potential impact of taxation policies on these sectors and can lead to unintended consequences.

One specific example of these unintended consequences is seen in Uganda, where taxes on social networking and mobile transactions have had negative long-term effects. These taxes have pushed people off networks and reduced the profitability of telecoms operators. This undermines initiatives such as the Digital Uganda program and highlights the need for a more comprehensive and balanced approach to taxation.

Countries are encouraged to consider signing up to the OECD’s BEPS (Base Erosion and Profit Shifting) program. By doing so, they would be able to tax multinational corporations regardless of whether they have a physical presence in the country. This is particularly relevant in the digital age where multinational corporations can generate significant profits without a physical presence. The implementation of a 15% taxation rate through BEPS could provide a significant revenue boost, even for countries with low internet penetration rates.

Outdated tax systems are identified as a key hindrance to potential revenues for states. These systems fail to adapt to the rapidly changing global landscape and often lack the streamlined and integrated approaches necessary for effective taxation. There is a clear need for tax systems to be updated and modernised to ensure governments can capture the appropriate levels of revenue.

Caution is advised when it comes to the potential negative impacts of trade agreements on revenue generation. The African continental free trade area, for example, may reduce intercontinental trade taxes, potentially impacting revenue streams for countries. It is crucial to carefully assess trade agreements and consider the impact they may have on taxation systems.

Alison Gillwald, a prominent advocate for fair taxation, argues for a universal and binding agreement for taxing tech companies. She emphasises the need for a level playing field in which tech companies, especially those without a national presence, are subject to fair and appropriate taxation. Gillwald notes that the current taxation of tech companies is subpar given their super profits and points out that the US is holding out on international taxation agreements. She believes that unless there is universal agreement and binding commitments, the situation will not improve.

Gillwald supports signing up for the OECD’s initiatives but conditions her support on the potential for countries to exert pressure and increase taxation percentages. She suggests that a digital multinational corporation pullout may be necessary from the 15% tax, as it may only apply to giant monopolies rather than multinational corporations as a whole. This highlights the need for careful consideration and negotiation when participating in international tax agreements.

In conclusion, the taxation of global digital services presents complex challenges for governments. It is essential to move away from siloed policies and towards a more integrated and comprehensive approach. This includes considering the interconnectedness of taxation with sectors such as trade, competition, and digital rights. By signing up for initiatives like the OECD’s BEPS program, countries can improve their ability to tax multinational corporations and generate crucial revenue. Updating outdated tax systems and carefully assessing the impact of trade agreements are also crucial steps in ensuring fair and effective taxation. Achieving a universally agreed and binding international taxation system for tech companies is a key goal, with collective action within the OECD having the potential to bring about significant change.

Moderator

The discussion centred around the urgent need for revenue in Southern countries due to the current economic challenges they are facing. Factors such as high inflation, the devaluation of local currencies, and the impact of the COVID-19 pandemic have led to an increased need for revenue generation in these countries.

One of the main concerns raised during the discussion was the unfair distribution of tax revenue from big tech companies. It was noted that the majority of tax revenue goes to a few countries, such as the United States and China, while countries in the global south that generate content and users receive only a small portion of the revenue. This raises important questions about digital justice and the need for a more equitable distribution of tax revenue.

The audience strongly supported the idea of imposing taxes on big tech companies, with 75% in favor of such measures. This indicates a growing consensus that addressing the issue of taxing big tech is crucial for achieving goals related to decent work, economic growth, and reducing inequalities.

Various policy options for collecting tax revenue from big tech were discussed, including direct taxation measures like digital services taxes and indirect taxes like consumption taxes. While there have been global, regional, and national efforts to collect tax revenue from big tech, there is no clear consensus on the most effective approach at this point.

The discussion also highlighted the significant revenue generated by the global south for tech multinational companies. With over 60% of the world’s population online, countries such as India, Indonesia, Brazil, and Nigeria contribute substantially to the revenue of tech companies like Facebook. However, many big tech companies often avoid formal tax nets in the countries where they operate, making it difficult to collect tax revenue.

Countries have multiple policy options for taxing the digital economy, including both direct and indirect measures. This includes introducing domestic law measures and implementing treaty-based taxation systems. However, each option comes with its own challenges, and there is ongoing debate on the most effective approach.

Concerns were raised about the drawbacks of certain approaches, such as the high transaction costs associated with local Digital Services Taxes (DSTs) for companies. Additionally, treaty-based options can reduce the risk of double taxation but come with challenges such as bilateral treaty negotiations and global and market-level revenue thresholds.

Stakeholder engagement and the need for a fair and transparent international formula for taxing the digital economy were emphasized. Global tax rules were seen as a way to provide consistent approaches to allocating profits, simplify compliance, and reduce complexity and uncertainty for multinational companies.

The moderator expressed support for reaching an OECD agreement on digital taxation but acknowledged the challenges and skepticism surrounding the process. The importance of signing up for the OECD agreement was discussed, as it would bring larger countries to the negotiation table and potentially make compliance easier for all countries involved.

The discussion also highlighted the need for clarity and further dialogue about the detailed elements of digital taxes, considering the diverse audience’s varying levels of understanding and expertise.

Overall, the discussion underscored the complex nature of taxing big tech and the digital economy. It highlighted the need for fair and equitable distribution of tax revenue, the challenges in implementing effective tax measures, and the significance of stakeholder engagement and international cooperation in finding viable solutions.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Strengthening Worker Autonomy in the Modern Workplace | IGF 2023 WS #494

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Eliza Aspen

The analysis explores the impact of technology on various social issues, including labour exploitation, inequality, poverty, and workers’ rights. It begins by discussing the prevalence of sweatshops in countries with less stringent labour laws, which has been exacerbated in the digital era. Digitisation and technology are argued to be catalysts for increased inequality, as the majority of global wealth is concentrated in the hands of a few wealthy individuals.

Policy mismanagement is highlighted as a contributing factor to labour exploitation and inequality. Ineffectively enforced tax policies and austerity measures are identified as direct triggers for human rights abuses, while lax tax policies have led to global inequalities. It is suggested that poverty is not a random occurrence but a result of deliberate labour and economic tax practices.

AI technology is scrutinised for its dependence on hidden human labour, particularly in the gig economy. AI startups in the EU were found to use human labour rather than fully automated tools. Furthermore, the development of AI models can infringe upon rights and ethical considerations, with vulnerable populations such as refugees and incarcerated individuals increasingly engaged in tasks such as image labelling.

The analysis argues for policy attention to protect vulnerable populations who may be targeted for AI development. Companies are accused of concealing the human labour involved in creating AI tools, leading to a lack of transparency regarding their methods. Desperate groups such as refugees and asylum seekers, lacking other employment options, may be exploited through digital piecework.

The future development of AI is seen as a potential exacerbator of labour exploitation and inequality. The pressure for companies to assert their relevance in the market may lead to a “race to the bottom” where marketing overshadows the actual functionality of AI tools.

The presence of hidden human labour in AI technologies is viewed as problematic by Eliza, who argues that companies maintain this secrecy to preserve the illusion of advanced technology. Many AI tools and technologies lack transparency, making it difficult to determine the extent of human involvement.

The analysis also emphasises the importance of broadening the scope of the digital rights and tech policy community by promoting interdisciplinary collaboration with fields such as unionisation and climate change. It is believed that the tech sector has significant potential in addressing wealth and racial inequalities.

In conclusion, the analysis highlights the negative impact of technology on various social issues, including labour exploitation, inequality, poverty, and workers’ rights. It emphasises the need for policy reform, transparency in AI development, and interdisciplinary collaboration to address these concerns. Additionally, it underscores the role of the tech sector in tackling inequality.

Wilneida Negron

The digital transformation of work has led to the development and proliferation of intrusive products that collect sensitive data on workers. This data is collected at various stages of work, including biometric data, sentiment analysis, and productivity monitoring. The collected data is then used for purposes such as surveillance, training AI models, and making predictive analyses on workforce risk. However, the increasing influence of ‘Little Tech’ – smaller technology companies – has resulted in the fragmentation and diversification of industries, making it challenging to implement effective privacy regulations.

There is a pressing need for stronger privacy regulations in the workplace due to the growing invasion of technology into workers’ privacy. An extensive and fragmented ecosystem of workplace tech tools collects sensitive data points on workers, with many workers not being aware of these tools or understanding their privacy implications. This lack of awareness highlights the urgency for policy and regulatory action to establish basic protections for workers facing increasing workplace surveillance.

Algorithmic tools also require regulation and impact assessments to prevent the misuse of sensitive data. Legislation is being introduced in the US that focuses on auditing the use of such tools for hiring and recruitment. It is essential to scrutinize the use of sensitive types of data, such as biometric data, to ensure it is handled appropriately.

The rapid pace of market dynamics in technology and work poses a significant challenge for legislation. With hundreds of new products being introduced each year, it becomes increasingly difficult for regulations to keep up. This highlights the need to address and tackle the market dynamics driving technology and work trends to ensure fair and ethical practices.

Private markets, including venture capital, lack accountability and require greater transparency. Companies like Facebook gather capital in private markets before going public, making early-stage intervention necessary. Greater oversight and transparency in these markets can help address issues related to accountability and fairness.

Furthermore, there is an untapped opportunity in building cross-class power with workers across different regions and industries to foster equitable workplaces and reduce inequalities. This involves encouraging shared analysis and collaboration among workers from diverse backgrounds. By creating connections and solidarity, it becomes possible to work towards more equitable and inclusive work environments.

In conclusion, the digital transformation of work has raised concerns about privacy and the collection of sensitive data on workers. Stronger privacy regulations, policy and regulatory action, and impact assessments are needed to protect workers in the face of increasing workplace surveillance. Addressing market dynamics and ensuring transparency in private markets is also essential. Furthermore, fostering cross-class power and building connections among workers can help create more equitable workplaces and reduce inequalities.

Raashi Saxena

The analysis focuses on several topics related to the gig economy, employee rights protection measures, the gender digital divide, online violence against women, digital inclusion for differently-abled women, support for female founders in the venture capital ecosystem, and the need for holding companies accountable.

In the context of the gig economy, the analysis highlights the challenges faced by workers in India, such as low pay, lack of job security, long working hours, and the absence of social protections like healthcare or pension benefits. Additionally, it mentions the efforts made by Kali Piri taxi drivers in Mumbai, who formed their own app to negotiate better wages. Furthermore, a nationwide strike organized by the Indian Federation of App Transport Workers in 2020 demonstrates workers’ demand for improved pay and conditions.

With regards to employee rights protection measures, the analysis takes a supportive stance. It mentions the legislation introduced by the Rajasthan government to provide basic pension and social scheme benefits for gig workers, as well as the labor code implemented by the Indian government aiming to provide social security benefits to gig economy workers. These measures are seen as positive steps towards ensuring decent work and economic growth.

In contrast, the analysis criticizes the implementation of labor protection measures, arguing that issues of exploitation and unfair treatment of workers persist despite the introduction of labor codes. It also notes that during the COVID-19 pandemic, many industries faced inadequate support despite the shutdown of factories, indicating a potentially insufficient safety net for workers.

The analysis also explores the gender digital divide and the potential solutions offered by the WSIS 20 renewal process and the global digital compact. It mentions that these initiatives can help identify barriers preventing women from accessing technology, boost digital literacy skills among women, promote locally relevant content and services, and ensure equal opportunities for women in the digital revolution.

Another important issue highlighted is online violence and harassment against women. The analysis states that with the advancement of artificial intelligence, the phenomenon of online violence has increased. However, it also suggests that robust policies and collaborations with organizations such as T-RIC can help combat online violence, promote digital safety, and provide effective support to victims.

Furthermore, the analysis emphasizes the need for digital inclusion for differently-abled women. It states that women with disabilities face disproportionate challenges and social stigma, and access to digital devices and platforms can facilitate their social and cultural participation, leading to dignified livelihoods.

In the context of venture capital, the analysis notes that only 7% of female founders globally are backed by VC firms, indicating a lack of support for female entrepreneurs. It also states that the venture capital ecosystem is often insular and favors those from established networks, further hindering female founders’ access to funding and resources.

Lastly, the analysis highlights the importance of holding companies accountable. It suggests that more conversations and information-sharing are needed to effectively band together and hold companies accountable for their actions. This aligns with the goals of reducing inequalities and promoting peace, justice, and strong institutions.

Overall, the analysis provides valuable insights into various issues surrounding the gig economy, employee rights, the gender digital divide, online violence against women, digital inclusion, support for female founders, and corporate accountability. It highlights both positive measures and persistent challenges, offering a comprehensive overview of these topics and emphasizing the need for continued efforts to create a more inclusive and fair society.

Eduardo Carrillo

The implementation of digital technologies in Paraguay exacerbates poverty and inequality by amplifying historical surveillance and control of workers. Workers’ exploitation is further intensified as the current capitalist system evolves to maximize surplus and exploit them. The gig economy in Paraguay reflects a prevailing normalization of precarious work, which limits economic opportunities for workers.

One of the contributing factors to the vulnerability of workers in Paraguay is the lack of personal data protection and anti-discrimination regulations. Paraguay does not have a personal data protection law or a law against all forms of discrimination, leaving workers without essential regulatory protection for their rights. The absence of these regulations, when combined with digital technologies, expands structural injustices faced by workers.

To address these pressing issues, collective organization among workers is crucial. The struggle for a fair digital future necessitates workers coming together to exercise their rights to freedom of expression, association, and autonomy in a surveillance-free environment. However, Paraguay faces a significant challenge in this regard, as it has one of the lowest rates of unionization in Latin America. This lack of organized resistance hampers worker organization in the gig economy.

Another important aspect is the need for workers to understand the complexities of digital technologies and their intersection with labor rights. Workers who attempt to organize are often fired before they can form a union, creating a culture of fear and uncertainty. Overcoming this requires a cultural shift and an understanding of the risks and challenges posed by digital technologies.

Concerns also arise regarding the implementation of complex governance systems for shared data access, particularly in the global south where the gig economy is still being understood. It is a challenging task to develop effective governance systems that account for the nuances and specific context of the gig economy in the global south.

Recognizing worker dependency is crucial for pursuing worker rights in the digital economy. Most regulations and organizations are yet to fully acknowledge the dependency of gig economy workers, which hinders their ability to access proper protections and benefits.

The concentration of the digital economy is another prominent issue. Currently, it is highly concentrated, limiting competition and negatively impacting working conditions. Encouraging competition in the digital economy is essential to improving working conditions and creating a more equitable environment.

Furthermore, the failure to address the issue of “ghost sweatshops” prevents the exploitation of workers from being effectively addressed. These hidden exploitative practices go unnoticed and unrecognized by platforms, perpetuating the cycle of worker exploitation.

One potential solution that offers hope is platform cooperativism. This emerging concept promotes the exploration and growth of work platforms that are more autonomous and fairer. It involves workers building their own digital infrastructure, giving them greater control over their work and ensuring fairer conditions.

In conclusion, the implementation of digital technologies in Paraguay exacerbates the existing problems of poverty and inequality. The normalization of precarious work in the gig economy, coupled with the lack of personal data protection and anti-discrimination regulations, further accentuates the vulnerability of workers. Workers need to collectively organize and strive for a surveillance-free work environment to address these issues. Additionally, recognizing worker dependency, promoting competition, and exploring platform cooperativism can contribute to creating a fairer digital future. However, challenges such as the low rate of unionization and the need for a cultural shift must be addressed to effectively protect workers’ rights in the digital economy.

Moderator – Ayden Ferdeline

The analysis focuses on several topics related to SDG 8: Decent work and economic growth. One significant issue highlighted in the analysis is the lack of accountability in venture capital. It calls for greater disclosure in this sector, pointing out that private markets, where companies like Facebook go before launching IPOs, currently have very little accountability. This raises concerns about transparency and potential risks for investors and the wider market.

Another area of concern is the market dynamics in the data brokerage industry. The analysis notes that mergers and acquisitions frequently occur in this industry, with smaller data brokers that collect sensitive employment data being acquired by larger data brokers. This concentration of power raises questions about fair competition and potential impacts on the privacy and security of employment data.

The analysis also emphasizes the value of collective rights to worker data. It suggests that the collective use of such data could have significant benefits for both workers and their employers. This argument highlights the importance of establishing mechanisms that allow workers to have control over their data while also enabling its responsible and ethical use in decision-making processes.

Advocating for intervention in the early stages of private markets, the analysis highlights that intervening during the early stages can shape the future trajectory of companies like Facebook while they are still in the private market space. This argument underscores the potential positive impact of early-stage intervention in influencing the direction and practices of companies in terms of decent work and economic growth.

Another concern raised in the analysis is the intricate issue of data governance in the Global South. It points out that people in the Global South are still learning how the digital ecosystem works, and complex data governance systems could potentially be misused by some companies in this region. This observation highlights the need for carefully designed and well-implemented data governance frameworks that protect against exploitation and ensure fair and equitable outcomes.

Shifting focus to the gig economy in Latin America, the analysis reveals significant issues regarding worker dependency. It highlights that none of the gig platforms in Latin America currently recognize worker dependency, which raises concerns about workers’ rights and socio-economic stability. Governments are considering alternative approaches, with a potential hybrid model being pondered to address these challenges.

The growth of the workers’ rights movement through platform cooperatives is presented as a positive development. The analysis notes that workers are attempting to build their own digital infrastructure, and platform cooperatives provide an opportunity for workers to design their own working platforms. This empowerment of workers in the digital economy aligns with the goal of achieving decent work and economic growth.

Lastly, the analysis explores the potential of UN instruments like WSIS plus 20 and the Global Digital Compact in aiding female workers. It highlights the need to bridge the gender digital divide and empower women in the workforce. However, no specific arguments or evidence are provided in this aspect of the analysis.

In conclusion, the analysis offers insights into various aspects related to SDG 8: Decent work and economic growth. It calls for greater accountability in venture capital, highlights concerns about market dynamics in the data brokerage industry, advocates for collective rights to worker data, emphasizes the benefits of early-stage intervention in private markets, raises concerns about complex data governance systems in the Global South, sheds light on challenges in the gig economy in Latin America, outlines the growth of the workers’ rights movement through platform cooperatives, and explores the potential of UN instruments in empowering female workers. Overall, the analysis provides valuable perspectives on promoting decent work and economic growth and calls for measures to address the challenges and opportunities identified.

Speakers

&

’Eduardo

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Moderator

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Raashi

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wilneida

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Surveillance technology: Different levels of accountability | IGF 2023 Networking Session #186

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The panel discussion explored various important topics concerning the connection between gender and human rights defenders. Stephanie Mickelson, representing the UNFPA, highlighted the importance of considering gender when analysing reports on human rights defence. Mickelson posed a question about whether the gendered element of human rights defenders is adequately examined in these reports and how progress in this area is monitored.

Another significant point raised during the discussion was the issue of digital attacks on women and human rights defenders. These attacks were identified as a form of gender-based violence, with limited research conducted on their psychological impact. Specific examples, such as Abdessam Saag in Bahrain and Hala Ahed in Jordan, who have experienced digital attacks, were given. It was also noted that these attacks have a negative impact on family life.

The fear of surveillance and the potential release of personal data were identified as factors that compel women to adapt their activism. This adaptation was seen as another form of oppression that women face. The panel highlighted that women, particularly those involved in activism, are significantly affected by the constant threat of surveillance. It was argued that this fear not only hinders their activities but also violates their rights.

Surveillance was also examined in terms of its secondary effects on journalism. The panel discussed how the publication of articles revealing surveillance technologies like Pegasus has led journalists, even in the Western world, to feel intimidated and fearful of contacting human rights activists and other journalists. Some journalists expressed hesitation in covering certain activities or organizations due to prevailing surveillance practices.

In conclusion, the panel stressed the importance of considering gender in reports on human rights defence and addressing the gendered aspect of human rights defenders. It shed light on the impact of digital attacks on women and the lack of research on the psychological consequences. Additionally, it highlighted the fears and constraints imposed on women’s activism in the face of surveillance and the resulting intimidation of journalists. This comprehensive discussion provided valuable insights into the complexities surrounding gender, human rights defenders, and the harmful effects of surveillance in modern society.

Marwa Fatafta

Access Now and the Gulf Center for Human Rights have collaborated to establish the MENA Coalition at Rights Con 2021. This coalition aims to address the widespread use of spyware and digital surveillance in the MENA region, particularly targeting human rights defenders, journalists, lawyers, and civil society. The negative sentiment surrounding this issue stems from the fact that surveillance technology from democratic countries often ends up in the hands of authoritarian regimes.

One of the main challenges in holding the surveillance industry accountable lies in its lack of transparency and accountability. Companies involved in these activities often operate under hidden identities and conceal information about their investors. Additionally, the transfer and sale of surveillance technologies are shrouded in secrecy, making it difficult to attribute responsibility on an individual level. This lack of accountability is further exacerbated by the absence of robust rule of law and law enforcement in the home countries of the victims.

Targeted surveillance of women represents a significant concern and a gendered dimension in this issue. Women are disproportionately affected by privacy violations resulting from surveillance. Adversarial governments exploit personal information to discredit and tarnish the reputation of women. Women also become targets of doxing campaigns, where personal information is shared without consent, leading to various forms of harm. Moreover, women may face increased risks during protests, as authorities can confiscate their devices, potentially exposing them to danger if personal information falls into the wrong hands. Recognizing this, international norms should acknowledge the intersection between gender-based violence and targeted surveillance.

To effectively address these challenges, there is an urgent need for democratic countries to regulate their surveillance industries and enforce human rights due diligence. Such regulation would help prevent the export of surveillance technologies to authoritarian regimes and ensure that human rights principles are upheld. It is also crucial for these countries to prioritize the protection of individuals and communities impacted by targeted surveillance.

The ultimate purpose of surveillance, particularly in the MENA region, appears to be the suppression of dissent and independent media reporting. Surveillance serves as a tool for authoritarian regimes to silence activists, journalists, and other individuals critical of the status quo, allowing them to maintain control over information and prevent the exposure of human rights abuses.

On a positive note, the awareness of surveillance issues has prompted more people, including journalists, to prioritize their digital security. Individuals are seeking assistance from digital security helplines to have their devices checked and scanned, recognizing the importance of safeguarding their data and communications.

Exposing and holding spyware companies accountable is seen as a crucial step in safeguarding journalists and uncovering the truth. Digital security has become paramount for journalists working with limited resources, and efforts should be made to ensure their protection.

The MENA Coalition aims to map surveillance technologies and spyware in the region, prioritizing advocacy campaigns. By shedding light on the surveillance industry and promoting accountability, the coalition aims to protect the rights and privacy of individuals and communities across the MENA region.

In conclusion, the establishment of the MENA Coalition is a critical step in combating spyware and digital surveillance in the MENA region. By addressing the targeted surveillance of human rights defenders, journalists, and civil society, regulating the surveillance industry, and prioritizing the protection of women, the coalition seeks to promote peace, justice, and strong institutions in line with the relevant UN Sustainable Development Goals.

Samuel Jones

Investors have the potential to significantly contribute to advancing corporate accountability by encouraging rights-respecting behavior from companies. This can be achieved through direct engagement with companies to improve their policies, practices, and governance. By doing so, investors can send a strong public signal that certain sectors, such as surveillance technologies, should be considered toxic asset classes.

One area of concern is spyware, which presents high risks to companies and their shareholders. Potential regulatory enforcement, litigation, operational disruptions, and brand damage pose material financial risks. For instance, the Israeli spyware maker NSO Group faced strategic litigation and regulatory blacklisting, resulting in massive financial and reputational costs. Other companies, including Google, Nokia, Thales Group, and Sun Corporation, have also made contentious business decisions regarding surveillance technologies.

To address these risks, it is recommended to designate spyware as a toxic asset class among public and private equity investors. This would involve developing investment exclusionary criteria and releasing a white paper highlighting the severe human rights and financially material risks associated with the technology. Collaboration with investors and companies would be crucial in tackling the threats posed by spyware.

Integrating grassroots civil society experts on targeted surveillance into investor-led company engagements would strengthen efforts to address the risks associated with spyware. Collaborating with partners to map out the spyware ecosystem is also essential. In addition, organizing a global gathering that integrates experts on targeted surveillance into investor-led company engagements would further enhance accountability in this area.

Engaging tech industry leaders in private collaborative discussions is another important step in addressing surveillance-related risks. This collaboration, in partnership with a coalition of North American and European investors, would focus on various ways to address surveillance-related risk. This includes better market entry analysis, improved harm-value chain monitoring, and implementing contractual and operational human rights guardrails.

It is crucial to shift the focus from high-level policy discussions to the operational impacts of technologies on people on the ground. Understanding the direct consequences of tech companies’ technologies is key to ensuring accountability. By doing so, investors can mitigate potential harm and promote responsible practices.

Investors should exercise caution when considering spyware investments, especially in light of the controversies surrounding NSO Group. Education is necessary to help investors recognize how spyware may manifest in different forms within their portfolios. Spyware, often marketed under the rubric of law enforcement or counterterrorism, requires a deeper understanding of its true nature and implications.

To gain a comprehensive understanding of the impact of their investments, investors need to rely on information from human rights defender organizations. These organizations provide critical insights that help investors assess the human rights implications of their investments and make informed decisions.

There is optimism about ending the unaccountable cooperation between companies and democracies in the near future. A collective effort, including the involvement of investors, is expected to lead to increased corporate responsibility and accountability.

Overall, investors have a significant role to play in advancing corporate accountability in relation to surveillance technologies. Through engagement with companies, designation of spyware as a toxic asset class, collaboration with experts and industry leaders, and a focus on operational impacts and human rights, investors can contribute to a more responsible and accountable corporate culture.

Asya Abdelkarim

The ANSIM Network in Iraq plays a crucial role in supporting and empowering internet activists who advocate for human rights and digital security. They provide comprehensive training on digital security and privacy, equipping activists with the necessary skills and knowledge to navigate the online landscape safely. Additionally, they document and report on cases of surveillance and digital attacks, shedding light on the extent of these threats and ensuring they are not overlooked.

One of the main challenges faced by activists in Iraq is the risk of threats and attacks from pro-government groups, including militias. These groups exploit online platforms to intimidate, harass, and even arrest activists, leading to severe consequences. Despite the importance of digital security and privacy, activists still face significant risks and challenges.

The ANSIM Network recognizes the urgent need to protect internet activists against surveillance and digital attacks. They actively advocate for policies and laws that safeguard digital rights, ensuring legal frameworks that support and preserve the rights of activists. Moreover, they provide crucial support to activists who come under attack, serving as a reliable source of assistance and guidance.

However, it is important to note that accountability for digital rights in Iraq is still in its early stages. The ANSIM Network engages in discussions with members of parliament concerning cyber crimes, data protection, and access to information. Nevertheless, the government has been slow to pass and implement laws that effectively protect digital rights, posing a hurdle for activists seeking justice and accountability.

Asya Abdelkarim, a human rights defender, is actively involved in efforts to safeguard human rights in Iraq. She maintains direct communication with the Iraqi political leadership, regularly sending reports of violations to the Media and Communication Commission and the Ministry of Communication. Asya also organizes meetings to highlight the importance of recognizing and preserving digital human rights.

Recognizing the power of international pressure, Asya Abdelkarim utilizes international press releases to put pressure on the Iraqi authorities. This approach can be effective, particularly given the influence of external political interference in Iraq. By bringing attention to human rights violations through international channels, Asya seeks to hold the authorities accountable and push for change.

In Iraq, women face significant challenges and digital violence. Asya conducted research that revealed a majority of Iraqi women have experienced digital violence, yet many are afraid to report these incidents due to fear of backlash. Tragically, there have been cases where women who reported threats have faced dire consequences, such as the case of Youtuber Thiba Ali who was found dead after reporting threats from her father. Even sharing an image of a woman without her hijab is considered a violation and can attract threats.

To address this pressing issue, Asya and her team have launched a hotline helpdesk that aims to assist women facing digital blackmail and related issues. This platform provides a safe and secure channel for women to report incidents and seek support, emphasizing the need to create a supportive environment that encourages reporting and addresses the prevalence of digital violence.

Asya Abdelkarim stresses the importance of collaboration in addressing the threats faced by human rights defenders, activists, and journalists. She expresses concern over the shared challenges of threats and surveillance and calls for collective action to confront these issues. By working together, they can develop effective strategies and mechanisms to protect human rights and foster a more secure environment for activists and journalists.

In conclusion, the ANSIM Network’s efforts in supporting and empowering internet activists in Iraq are commendable. Through training, advocacy, and documentation, they equip activists with the necessary tools to navigate the challenges of the digital landscape. However, there is still a need for increased accountability for digital rights in Iraq. Asya Abdelkarim’s work in engaging with political leadership and utilizing international channels showcases the importance of collective action in addressing threats and advocating for change.

Moderator-Khalid Ibrahim

Concerns have been raised regarding the misuse of surveillance technology in the Middle East and North Africa (MENA) region, particularly in relation to oppressive spyware tools. Authoritarian governments in the region have obtained and used these tools without transparency or accountability, leading to serious human rights violations. Examples of this misuse include the murder of Saudi journalist Jamal Khashoggi and the case of Ahmed Mansour. The Israeli software company NSO has come under scrutiny for its role in these violations, with the Gulf Center for Human Rights filing a complaint against them.

To combat the sale of surveillance tools to repressive governments, the MENA Coalition to Combat Surveillance (MCCS) was established. This coalition advocates for accountability and action against the misuse of digital surveillance tools. The Gulf Center for Human Rights has taken legal action by filing a complaint in France against NSO.

Marwa Fatafta emphasizes the need for a united front among civil society organizations in the MENA region to combat the proliferation of digital surveillance strategies. Activists and human rights defenders face challenges, as the surveillance industry operates across borders, allowing their home countries to target them abroad. Access Now and other partners have formed a forensic analysis team to investigate whether the devices of these individuals have been infected or targeted.

However, the victims of surveillance face obstacles in seeking justice. The lack of rule of law and enforcement in their home countries prevents them from pursuing legal action against responsible parties. Efforts are underway to find alternative ways to enable victims to seek remedy, including the initiation of lawsuits against surveillance companies like Dark Matter.

The targeting of women through digital attacks is a significant concern. Research in Iraq has revealed cases of digital violence against over 100 Iraqi women, including blackmail, hate speech, and even instances where victims have been killed after reporting threats. Recognizing these attacks as gender-based violence is essential to provide appropriate support and protection to the affected women.

The psychological impact on women who have been victims of spyware attacks also requires further investigation. Cases in Bahrain and Jordan have shown negative impacts on family life. More research is needed to fully understand the psychological consequences and develop suitable interventions.

Respecting the right to privacy is crucial, as it is a fundamental human right. Any infringements should be addressed, and action should be taken against companies and governments involved in such activities. Journalists play an essential role in exposing the illegal activities of companies supporting oppressive governments and should continue to shed light on these issues.

Despite the challenges posed by surveillance, tools are available to ensure privacy when communicating sensitive information. It is vital to explore and utilize these tools to safeguard individuals’ privacy rights in the digital age.

In conclusion, addressing the misuse of surveillance technology in the MENA region requires cooperation between governments, civil society organizations, and individuals. Holding accountable those responsible for human rights violations and establishing robust mechanisms to protect the right to privacy is of utmost importance.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Shaping a UN Cyber Programme of Action | IGF 2023 Open Forum #84

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The participants in the discussion addressed various significant aspects of counterterrorism policies in relation to cyber issues and human rights. One of the main arguments raised was the critical need to broaden the cybersecurity discussion within counterterrorism policies. It was noted that the current mandate of the CTED (Counter-Terrorism Committee Executive Directorate) and the UN Office on Counterterrorism is too narrow when it comes to cybersecurity. This limitation restricts the discussion on crucial matters like state-sponsored cyber warfare, hindering the development of comprehensive strategies to address cyber threats in counterterrorism efforts.

Another key argument put forward during the discussion was the necessity of incorporating human rights laws in online contexts. The OHCHR (Office of the High Commissioner for Human Rights) and the Special Rapporteur for Human Rights and Counterterrorism stressed that human rights laws should be applicable online as well as offline. This recognition underscores the importance of protecting fundamental rights in the digital realm. Including human rights laws in counterterrorism policies is vital to ensure a balanced approach that safeguards both security and individual rights.

The participants also emphasised the need for an advanced counterterrorism approach that effectively intercepts the exploitation of information and communication technology (ICT) for terrorist purposes. The CTED is currently finalising non-binding guiding principles for member states on ICT and its prevention of terrorist exploitation. This initiative demonstrates the acknowledgement that terrorists are increasingly utilising digital platforms and technologies to advance their objectives. Developing effective strategies to counter this exploitation is essential in addressing the evolving nature of modern threats.

Furthermore, the discussion highlighted the importance of supporting the work of the OEWG (Open-Ended Working Group) and other General Assembly bodies in the development of counterterrorism strategies. It was suggested that the Security Council should refine its counterterrorism strategies with input from other UN bodies. This collaborative approach can lead to a more comprehensive and inclusive framework for tackling the multifaceted challenges posed by terrorism.

In conclusion, the discussion shed light on various critical aspects of counterterrorism policies concerning cyber issues and human rights. Expanding the cybersecurity discussion within counterterrorism policies and including human rights laws in online contexts were identified as crucial steps. Intercepting the exploitation of ICT for terrorist purposes and promoting collaboration among UN bodies were also emphasised as important strategies. However, it was noted that the current mandate of the CTED and the UN Office on Counterterrorism is limiting in its scope. Efforts are currently focused on training law enforcement officers to monitor online content, but there is a need for broader discussions and strategies to effectively address cyber threats in counterterrorism efforts.

David Hevey

Australia has been a long-standing advocate for the establishment of the Plan of Action (POA) as an institutionalised UN mechanism. They were heartened by the broad cross-section, cross-regional support for the UN General Assembly resolution on the POA last year. Australia believes that the POA should build on the hard, collaborative work of the open-ended working group and provide practical guidance to implement the UN framework on responsible state behavior. This signifies a positive sentiment towards the POA.

From Australia’s perspective, a functioning POA should have clear scope, flexibility both substantive and procedural, functionality in terms of its framework being put into practice, and inclusion of states and non-state actors. They suggest that the framework of the POA may be further developed by consensus. Australia values the POA as a means to facilitate all countries, irrespective of their size or level of development, to determine their own digital future. This reflects a positive sentiment towards the POA’s role in promoting peace, justice, and strong institutions, aligning with Sustainable Development Goal 16.

Australia’s advocacy extends to the participation of all member states and non-state actors in the POA. They view this as a key aspect of the POA’s success. In line with this, Australia has included this messaging in their stance, indicating a positive sentiment towards inclusivity in the POA.

Furthermore, Australia sees the POA as a way to implement permanent changes and emphasizes the importance of capacity building. They strongly support the emphasis on capacity building, considering it a significant component for achieving the objectives of the POA. This highlights their positive stance towards using the POA to bring about long-lasting and actionable measures.

To summarise, Australia has been a staunch supporter of the establishment of the POA as a UN mechanism. They believe it should be built upon the collaborative work of the open-ended working group and provide practical guidance for responsible state behaviour. Australia emphasises the need for clear scope, flexibility, functionality, and inclusion in the POA. They advocate for the participation of all member states and non-state actors, view it as a way to implement permanent changes, and stress the importance of capacity building. Their approach is geared towards an actionable, permanent, and inclusive approach to security. The general sentiment expressed by Australia regarding the POA is positive.

Joyce Hakmeh

States have already agreed on a framework for responsible behaviour in cyberspace, but the challenge lies in successfully implementing it. This framework agreement, known as the Plan of Action (POA), has been achieved three times, in 2015 and twice in 2021. However, failure to implement this framework usually stems from a lack of capacity, resources, and a structured approach. The POA can help address these challenges by bringing in resources and fostering a sustainable and permanent forum.

Open dialogues and dedicated discussions within the POA are crucial in promoting understanding and progress in cyber capacity building and the application of international law in cyberspace. By having separate streams for different pillars of the framework, such as confidence-building measures (CBMs), international law, and norms, their entanglement can be avoided. Regular conversations among states foster better understanding and learning in these areas. Furthermore, the inclusion of non-state stakeholders in these discussions can provide valuable expertise and perspective.

However, one key issue that needs attention is the lack of interconnectivity among the United Nations’ (UN) cyber processes. The UN’s cyber processes should be interconnected in order to address this issue effectively. It is important to understand the sensitivities involved in making these connections.

To address this challenge, multi-stakeholders can play an important role in linking the different issues related to cyber processes. They can help in understanding where these issues connect and where the links and overlaps are. The hope is that the POA can serve as a vehicle to accomplish this.

Notably, Joyce Hakmeh appreciates the push for multi-stakeholderism and inclusion in the initiative. The emphasis on including various stakeholders and perspectives is seen as a positive aspect of the initiative. Hakmeh also advocates for enhanced collaboration among multi-stakeholders, recognizing its importance in advancing the conversations beyond just having multi-stakeholders in the room.

In conclusion, while states have already agreed on a framework for responsible behavior in cyberspace, the challenge lies in successfully implementing it. The POA can help address this challenge by bringing in resources and fostering a sustainable and permanent forum. Open dialogues and dedicated discussions within the POA are pivotal in promoting understanding and progress in cyber capacity building and the application of international law in cyberspace. Multi-stakeholders have an important role to play in linking these issues and enhancing collaboration among different stakeholders. The push for multi-stakeholderism and inclusion in the initiative is applauded, and the hope is that the UN’s cyber processes can be interconnected to address the challenges effectively.

David Fairchild

The analysis explores different perspectives on cyber policies, focusing on the contributions and approaches of various stakeholders. One key observation is the positive recognition of Canada’s active participation in Global Governance Entities (GGEs) and Open and Working Groups, demonstrating its commitment to shaping global cyber policies. Canada’s policy development process is highlighted for its co-creation model, which involves engaging multiple stakeholders to ensure inclusivity and a human-centric approach.

Another important argument presented is the significance of a human rights framework as the basis for cyber policies. The analysis emphasizes that the human rights framework is currently under attack and must be protected. Canada, in line with SDG 16 (Peace, Justice and Strong Institutions), aims to ensure that the transition to a program of action is firmly framed within the context of human rights. This demonstrates a commitment to protecting individuals’ rights and privacy within the cyberspace ecosystem.

The analysis also introduces the concept of cyberspace as a co-owned space. This perspective emphasizes the need for dialogue and partnerships among member states to collectively address cybersecurity issues. By recognizing cyberspace as a shared responsibility, countries can work together to create a more secure and equitable online environment. The analysis underscores the importance of dialogue and providing a platform for addressing these issues, promoting collaboration and building partnerships.

The Programme of Action (POA) is highlighted as a valuable tool for institutionalizing dialogue and addressing cyberspace issues. The POA acts as an aggregator, bringing together diverse stakeholders to work through challenges and bridge gaps. It is seen as an effective means to foster cooperation and find solutions to complex cyber-related problems. This aligns with SDG 16’s goal of promoting peace, justice, and strong institutions.

In conclusion, the analysis commends Canada for advocating multi-stakeholder and human-centric approaches to cyber policies. Additionally, it stresses the importance of a human rights framework, a co-owned perspective of cyberspace, and the institutionalization of dialogue through the POA. These perspectives and arguments provide a comprehensive understanding of the complexities and challenges associated with cyber policies, offering valuable insights for creating more inclusive and secure digital ecosystems.

Ellie McDonald

Ellie McDonald has presented the concept of a Cyber Programme of Action (POA), which has garnered support from a group of UN member states. The POA aims to address threats in cyberspace and promote engagement and cooperation among stakeholders in a human-centric and rights-respecting way. It supports the implementation of the Responsible State Behaviour Framework and primarily targets states and actors involved in the UN’s Open-Ended Working Group on Information and Communication Technologies (ICTs).

Supporters argue that the POA has the potential to establish permanent, open, transparent, and inclusive discussions. It recognizes shared but differentiated responsibilities and encourages the contributions of stakeholders to be heard and acted upon. The POA also emphasizes the importance of capacity-building and operationalization to ensure effective implementation.

Furthermore, the POA must be responsive to real-life events and threats, demonstrating its relevance and effectiveness. Diversity of views is considered essential to inform the discussions, ensuring inclusivity and representation. Additionally, the POA should be co-created and co-owned, involving various stakeholders in its development.

In summary, the proposal for a Cyber Programme of Action aims to address cyber threats and foster collaboration among stakeholders. It advocates for open, transparent, and inclusive discussions that respect human rights and international law. The POA should prioritize capacity-building and operationalization, responsiveness to real-life events, and the inclusion of diverse views. Co-creation and co-ownership will contribute to its success as a collective effort in combatting cyber threats.

Raman Jit Singh

Raman Jit Singh highlights the need for the Program of Action (POA) on cybersecurity to address real-world threats, particularly those targeting civil society and human rights actors. Singh argues that proactive measures must be taken to protect these vulnerable groups. Singh expresses concern about the increase in harmful cyber operations against humanitarian and civil rights actors, including human rights defenders who face various forms of cyber intimidation. He emphasizes the urgency of addressing these pressing issues in the POA. Singh’s overall sentiment is one of concern.

Another important concern raised by Singh is the proliferation of spyware and the ‘hack-for-hire’ industry, which he believes significantly undermines global cybersecurity. Singh urges the POA process to explore, challenge, and take action against these dangerous activities. He maintains a critical stance, emphasizing the importance of confronting these threats head-on.

Singh also stresses the need for more detailed discussions on cybersecurity concerns, state collaboration, and joint action. He asserts that the POA should delve deeper into current threats and specific topics such as cybersecurity vulnerabilities. Singh advocates for tangible cooperative actions between states to effectively address these challenges. His sentiment is assertive, reflecting a strong call for collaboration and action in the cybersecurity domain.

In terms of protection, Singh advocates for actors at immediate risk, particularly Computer Security Incident Response Teams (CSIRTs), who play a critical role in advancing and maintaining cybersecurity. He highlights the need to discuss and take actionable steps to protect these first responders in cybersecurity. Singh’s sentiment is supportive, emphasizing the significance of safeguarding these key players.

Furthermore, Singh points out the complexity and lack of clarity in combining the counterterrorism debate with the cyber conversation within the United Nations. He highlights the sensitive nature of discussions around non-state actors in the existing Open-Ended Working Group (OEWG) process. Singh notes the reliance on previous rulings such as the Delhi Declaration and the outcomes of the Counterterrorism Committee and Security Council. His sentiment is negative towards the current challenges faced in integrating counterterrorism and cyber issues in UN discussions.

Singh also stresses the need to incorporate human rights and their defense in the cyber conversation. He highlights resistance to discussing human rights defenders (HRDs) and the targeting of HRDs within the OEWG. Additionally, Singh points out the challenging nature of the conversation for humanitarian actors and international humanitarian law. His sentiment is positive towards the inclusion of human rights in the cyber conversation.

Singh supports a comprehensive approach in the cyber conversation, advocating for not only establishing norms but also implementing security measures. He emphasizes the importance of balancing both aspects to effectively combat cyber threats. Singh’s sentiment is positive, highlighting the need for a holistic strategy.

Despite acknowledging the contentious nature of topics such as HRDs, counterterrorism, and cyber issues, Singh advocates for addressing them in the POA process. He encourages open discussions and the pursuit of solutions despite initial reluctance. Singh holds a positive sentiment towards addressing these contested topics.

Additionally, Singh expresses concern that the POA process is primarily anchored in UN headquarters locations, limiting international participation. He believes that wider participation is crucial to ensuring a comprehensive and inclusive approach to cybersecurity. Singh’s sentiment is negative regarding the current lack of international involvement.

Furthermore, Singh encourages governments and actors to have consultations on the POA process in their respective capitals or locations. This approach will allow for a broader range of perspectives and ensure the inclusion of diverse voices in shaping the POA. His sentiment is positive towards fostering dialogue and engagement.

In conclusion, Raman Jit Singh highlights several key points related to the POA on cybersecurity. He emphasizes the need to address real-world threats targeting civil society and human rights actors, while also taking action against the proliferation of spyware and the ‘hack-for-hire’ industry. Singh advocates for detailed discussions on cybersecurity concerns, state collaboration, and joint action. He supports the protection of key actors at immediate risk, the inclusion of human rights in the cyber conversation, and a comprehensive approach that balances norms and security measures. Singh also calls for addressing contested topics and increasing international participation. Finally, he emphasizes the importance of fostering frankness and ambition in the POA process.

Henri Verdier

The UN Program of Action aims to create a more inclusive forum for conversations on cybersecurity, involving civil society and the private sector. It recognizes the importance of these actors in shaping the cyber space and the blurred boundaries between conflicts, belligerence, and civil society. Implementing international law in cyberspace is challenging due to the unique complexities and lack of infrastructure. Progress has been made in recognizing principles and norms, with ongoing efforts to further develop frameworks. A permanent body is needed to ensure the effective implementation of cybersecurity norms, providing continuity and facilitating knowledge sharing and capacity building. Building peace and security in the cyber space requires not only norms and laws, but also good organizations and infrastructure. A broader approach is necessary to address the evolving cyber threats, going beyond established frameworks.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Revitalizing Universal Service Funds to Promote Inclusion | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis examines various topics related to internet access and digital inequality. The GIGA project is highlighted as a cost-effective solution for improving internet access in schools. The project has helped in reducing the cost of schools by involving small providers who can offer more affordable options or better access to schools located near communities. This initiative aligns with SDG 4 (Quality Education) and SDG 9 (Industry, Innovation and Infrastructure).

Another important concern raised in the analysis is the concentration and monopolization of online platforms. This issue not only affects carriers but also content creators. The dominant position of certain platforms has led to a decrease in competition and options for both users and content creators. These concerns align with SDG 10 (Reduced Inequalities).

The analysis also discusses the misuse of Universal Service Funds (USF) in Paraguay. It is stated that these funds have been used to acquire surveillance and biometric technology, which have been deployed in the streets of the capital and other cities. This raises concerns about privacy, surveillance, and potential misuse of funds. The misuse of USF in Paraguay is seen as a violation of SDG 10 (Reduced Inequalities) and SDG 16 (Peace, Justice and Strong Institutions).

Private and public sector financing is highlighted as a factor that may influence the costs associated with entering the ecosystem for community networks. The analysis mentions different tiers of investment economics, suggesting that the availability and accessibility of financing can play a crucial role in determining the success and sustainability of community networks. This topic is linked to SDG 1 (No Poverty) and SDG 10 (Reduced Inequalities).

There is uncertainty expressed about a one-size-fits-all model or approach being applied to community networks. The argument presented suggests that different communities have unique needs and challenges that cannot be addressed effectively by a single approach. The analysis calls for a more tailored and context-specific approach to community networks, which aligns with SDG 10 (Reduced Inequalities) and SDG 4 (Quality Education).

The analysis also discusses the challenges faced by community networks in taking operational ownership. Specific reference is made to CowMesh, a community network in India, to illustrate the challenges faced in transitioning from external support to community-driven ownership. This highlights the importance of community engagement and empowerment for the sustainability and success of community networks. The topic aligns with SDG 1 (No Poverty) and SDG 11 (Sustainable Cities and Communities).

In addition, the analysis raises concerns about defining and understanding what the internet means for different communities. It highlights the need for a common understanding and language when it comes to concepts such as hypertext and hyperlinks. This indicates a potential gap in digital literacy and the importance of ensuring equal access to knowledge and understanding of internet-related concepts. This topic relates to SDG 4 (Quality Education) and SDG 10 (Reduced Inequalities).

In conclusion, the analysis sheds light on various aspects of internet access and digital inequality. It highlights the GIGA project as a cost-effective solution for bringing internet access to schools and raises concerns about the concentration and monopolization of online platforms. The misuse of USF funds in Paraguay, the influence of private and public sector financing on community networks, the challenges in community networks taking operational ownership, and the need for a common understanding of the internet are also discussed. Overall, the analysis emphasizes the importance of addressing digital inequality and ensuring access to affordable and equitable internet connectivity for all communities.

Nathalia Foditsch

The analysis of the provided information reveals several key points regarding universal service funds (USF). Firstly, it is noted that a significant portion of USF funding is being directed towards larger operators, which is seen as a negative aspect. This raises concerns about the fair allocation of resources and the potential exacerbation of inequality within the telecommunications sector. Argentina, Chile, Colombia, and Peru are cited as countries with high disbursement rates, indicating a potential bias towards larger operators in these regions. On the other hand, many countries either do not utilize USF at all or use it for other purposes, such as creative accounting, which further highlights the issue of improper allocation.

Furthermore, the analysis reveals that smaller internet service providers (ISPs) face obstacles in accessing USF funds. These ISPs are required to obtain a letter of credit amounting to 25% of the funds needed, along with a 25% match requirement. This poses a significant financial burden on smaller ISPs and effectively shuts them out of the Broadband Expansion and Enhancement Program (BEED). This observation underlines the need for a more equitable and inclusive approach to accessing USF funds, particularly for smaller players in the industry.

Advocacy for changes in the design and disbursement of USF is also highlighted. Organizations have partnered with other stakeholders to advocate for reforms that would facilitate a fair and transparent process for the allocation of funds. This includes ensuring the inclusion of all types of stakeholders, not just large operators, and developing a more accessible and streamlined application process.

The analysis also reveals an increased awareness and recognition of community networks within public and regulatory bodies. Over the past 2-3 years, there has been a growing awareness of the role that community networks can play in improving connectivity and bridging the digital divide. This has led to the creation of new working groups within national regulators, specifically advocating for community networks. This development suggests a shifting paradigm where the importance of community-driven initiatives is being acknowledged and integrated into policymaking and regulatory frameworks.

Another significant point raised in the analysis is the need for stronger public involvement and multi-stakeholder partnerships to ensure transparency and prevent the misuse of USF funds. Increased transparency is highlighted as a requirement to address concerns about the potential improper use of funds. Additionally, the analysis notes that not all stakeholders are adequately represented in the decision-making process. Therefore, a more inclusive approach that actively involves all relevant actors is necessary to foster a fair and accountable system for USF governance.

The analysis also brings attention to the growing possibility of including big tech companies in contributing to the USF. Following a recent national regulator consultation, there are rumors suggesting that big techs may be asked to contribute to the fund. This potential development has garnered support from some stakeholders who argue that involving big tech companies could provide additional resources to support the goal of industry, innovation, and infrastructure in line with Sustainable Development Goal 9.

However, the analysis reveals instances where the USF funds have been misused. For example, in Paraguay, surveillance cameras were purchased using USF money. This highlights the potential for inappropriate use of funds and underscores the need for proper oversight and accountability measures to ensure that USF funds are used for their intended purpose.

In conclusion, the analysis of the provided information underscores several significant issues pertaining to universal service funds. The preferential allocation of funds to larger operators, the challenges faced by smaller ISPs in accessing funds, and the need for reforms in the design and disbursement processes are key concerns. The growing recognition of community networks, the importance of transparency and multi-stakeholder partnerships, and the potential inclusion of big tech companies in contributing to the fund are also notable observations. However, instances of fund misuse and inappropriate usage serve as a reminder of the critical role of effective governance and oversight mechanisms. Overall, the analysis highlights the necessity for reform, inclusivity, and accountability in the management of universal service funds, ultimately ensuring equitable access to quality telecommunications services.

Jane Roberts Coffin

Universal service and access funds, established by regulators worldwide in collaboration with telecommunications companies, have been in existence for over 20 years. Originally intended to subsidise fixed fiber networks, these funds have had mixed implementation and impact. While some have been well-administered, others have been misused for purposes unrelated to network expansion, leading to a lack of accountability and hindered progress in reaching underserved areas.

With approximately 2.6 billion people still offline due to inadequate network coverage, there is a pressing need to review and find new ways of implementing universal service funds. One proposal is to diversify fund usage, directing them towards initiatives that address specific connectivity gaps, such as connecting women and girls, or supporting internet exchange points and community networks.

Jane Roberts Coffin argues for a complete reboot of these funds, advocating for a fresh approach to implementation and distribution. She suggests expanding fund usage to target specific connectivity needs, citing successful examples like Argentina.

The role of Ofcom, a regulatory body, is also discussed. Ofcom focuses on creating market conditions for network providers to thrive, rather than providing direct funding. Jane appreciates Teddy Woodhouse’s explanation of Ofcom’s function.

Challenges may arise when community service organizations (CSOs) work with regulators. Jane raises concerns about this and seeks advice on how CSOs can effectively collaborate with regulators and influence policy decisions. This highlights the importance of productive partnerships and dialogue between CSOs and regulatory bodies.

In conclusion, the implementation and impact of universal service and access funds have varied greatly. Reviewing fund usage, expanding their scope, and fostering collaboration between CSOs and regulators are vital in addressing global connectivity challenges.

Josephine Miliza

Universal Service Funds (USFs) play a crucial role in advancing network connectivity in Africa. Currently, 37 countries on the continent have established USFs. However, challenges exist regarding the ownership and sustainability of USF projects.

In many African countries, community networks, which are considered complementary access models, face obstacles when it comes to accessing USFs. Due to a lack of recognition, community networks are unable to benefit from the funds available. Advocacy efforts are being made to remove the clause that exempts community networks from making contributions to USFs. A successful example of this is seen in Kenya, where the removal of this clause has allowed community networks to benefit from the USF.

Regulatory experiments in Kenya have proven to be successful for community networks. The country’s regulator has taken steps such as developing a community networks service provider license and has plans to establish a hundred community networks. These efforts serve as examples of successful community network initiatives and highlight the importance of supportive regulatory frameworks.

Civil Society Organizations (CSOs) play a crucial role in advocating for community networks. They are actively involved in raising awareness, building capacity, and providing technical assistance. CSOs also have the responsibility of helping regulators understand how to effectively support community networks. Through their efforts, CSOs contribute to the creative regulatory solutions and awareness building necessary for the success of community networks.

Patience and resilience are emphasized as necessary qualities for CSOs engaging with regulators. Building sustainable relationships with regulators takes time and requires perseverance, as evident from the experience shared by Josephine’s team.

Collaboration and partnerships with existing stakeholders are highlighted as essential for effective advocacy for community networks. By leveraging resources from other countries and regions, collaborations can bring about positive outcomes. The UK Digital Access Program’s collaboration with the Kenyan regulator is given as an example of such partnerships in action.

The importance of utilizing existing resources, experiences, and advocacy efforts is stressed. Instead of starting from scratch, teams should build on the knowledge and expertise already available. The collaboration with the International Telecommunication Union (ITU) is mentioned as an example of utilizing existing resources for the benefit of community networks.

Transparency and accountability are significant concerns when it comes to USFs in Africa. A study currently being reviewed by the GSMA highlights the issue of fund reallocation in the region, with difficulties in tracking where the money is being spent. Clear reporting on how funds are allocated and utilized is necessary to ensure transparency and accountability.

In conclusion, USFs are essential for advancing network connectivity in Africa. However, challenges exist in terms of ownership and sustainability. To fully leverage the potential of community networks, it is essential to remove barriers to their access to USFs. Regulatory experiments, collaboration with CSOs, and the utilization of existing resources are instrumental in supporting community networks. Transparency and accountability in fund allocation and reporting are vital for the effective use of USFs in Africa.

Senka Hadzic

In this introductory session, six speakers were introduced to discuss various aspects of technology, connectivity, and digital inclusion. Natalia Fodic, the Director of International Programs at Connect Humanity, is an esteemed expert in technology and communications policy. With over 15 years of experience, Fodic brings a wealth of knowledge to the discussion. She is joining the panel online from Brazil.

Konstantinos Komaitis, currently a non-resident fellow and senior researcher at the Lisbon Council, is present in the room. With a background in policy development and strategy, Komaitis spent 10 years as Senior Director at the Internet Society. He is also a published author and public speaker, making him a valuable contributor to the session.

Ben Matranga, the Managing Partner of Connectivity Capital, focuses on impact investment in developing countries to expand internet access. With almost two decades of experience in leading private equity, venture capital, and debt investments in emerging markets, Matranga offers valuable insights into the challenges and opportunities in connecting underserved regions.

Teddy Woodhouse, the International Policy Manager at Ofcom, the UK Communications Regulator, is an ICT for development expert. He has extensive experience in both the public and non-profit sectors, including his previous role with the Alliance for Affordable Internet. Woodhouse is responsible for Ofcom’s engagement within the International Telecommunication Union (ITU) and provides a strong voice for the UK in the global discussions on connectivity.

Josephine Meliza, a Digital Inclusion and Transformation Consultant, is a pioneer of the community networks movement in Africa. Currently serving as the Regional Policy Coordinator for Africa within the APC’s LockNet project, Meliza brings a unique perspective on digital inclusion initiatives on the continent. Additionally, she co-chairs the Africa Community Network Summit and serves as a member of the MAG, the IGF Multi-Stakeholder Advisory Group.

Finally, Saul Luca de Tena, a Connectivity Solutions Specialist at Giga, a UNICEF-ITU joint initiative, aims to connect every school in the world to the internet by 2030. With 15 years of experience in strategic program management within technology and development, capacity building, and policy advocacy, de Tena’s expertise is essential in ensuring widespread access to education through connectivity.

With representatives from various stakeholder groups, including civil society, the private sector, government, and UN agencies, this diverse panel promises engaging discussions on how to improve connectivity globally. The wide range of expertise and experiences will contribute to a comprehensive understanding of the challenges and opportunities in driving digital inclusion.

Soledad Luca de Tena

The Giga initiative, a global collaboration between UNICEF and ITU, aims to connect schools worldwide by 2030. This is achieved through a multi-stakeholder approach involving the Ministry of Education, Ministry of ICT, private sector, and civil society organizations to ensure transparency and inclusivity in internet access and digital inclusion efforts.

Giga has successfully reduced connectivity costs in Kyrgyzstan by 43% and in Rwanda by 55%, resulting in significant financial savings and increased internet speeds. This highlights the importance of effective resource management in improving connectivity and reducing costs.

Revitalizing Universal Service Funds (USF) is crucial for enhancing school connectivity. Reforms in Brazil’s USF have unlocked $675 million for school connectivity, with Giga securing an additional $1.7 billion in financing. This emphasizes the need for appropriate policy frameworks to reduce inequalities in education.

Engaging various stakeholders and promoting collaboration is vital for progress in internet access and digital inclusion. Giga’s involvement with multiple ministries facilitates effective communication and coordination. The diverse experiences and perspectives of stakeholders enable addressing complex challenges and creating a common language based on evidence and facts.

Understanding underlying technologies and their implications is essential for lowering internet costs. Giga empowers stakeholders by providing knowledge and insights for informed decision-making.

Effective contract management ensures the involvement of small operators and equitable participation in the connectivity landscape. Giga emphasizes the importance of linking contract management to connectivity status for efficient payment processes.

In conclusion, the Giga initiative emphasizes transparency, stakeholder involvement, resource management, collaboration, and understanding of technologies to achieve global internet access, digital inclusion, and improved connectivity. By leveraging diverse expertise, Giga aims to foster productive partnerships and create a connected and inclusive digital future.

Teddy Woodhouse

The UK has implemented a universal service obligation for broadband connectivity, which came into effect in 2019. This obligation requires BT and KCOM to provide universal broadband service in specific geographic areas assigned to them, ensuring all citizens have access to a decent broadband connection.

Users without a decent broadband connection can request service from BT or KCOM, with the cost being no more than what an average commercial consumer would pay. Additionally, the build cost of connecting these users, up to £3,400, will be covered.

In rural areas, a shared rural network agreement between the UK government and major mobile network operators promotes competition and provides reliable mobile services to these areas.

Ofcom, the regulator, plays a crucial role in achieving universal service. It ensures transparency, enforces targets, and adapts the process to address challenges.

To address affordability, Ofcom negotiates with broadband providers to create affordable packages for low-income households, with specific expectations for minimum speeds and performance.

Collaboration between the regulator and industry is essential for protecting consumer interests. Both BT and KCOM are committed to meeting universal service obligations.

Ofcom creates a regulatory framework catering to both large and small operations. The strategic separation of BT from OpenReach fosters competition and diversification. While Ofcom doesn’t fund community networks directly, it creates market conditions for their existence.

Ofcom enables a diverse and competitive market for internet service providers, resulting in a good and affordable broadband experience for consumers.

Fair competition is promoted by ensuring a level playing field for communication providers.

Research, facts, and evidence are necessary for well-informed decision-making by regulators, enhancing transparency and understanding.

Regulators, communication providers, and stakeholders should collaborate to improve global connectivity, reducing the digital divide for equal access to information and opportunities.

The UK demonstrates a comprehensive framework for universal broadband connectivity. Ofcom’s role in transparency, competition, and consumer protection is significant. Collaboration with the industry and the availability of social tariffs for low-income households highlight the commitment to universal service.

Konstantinos Komaitis

The debate on internet infrastructure in Europe has been heavily influenced by the concepts of digital sovereignty and protectionism. Telco providers are demanding payment from content application providers for the traffic they carry. However, users argue that they are the ones generating the traffic, not the companies. This has led to a negative sentiment surrounding the fair share proposal.

The fair share proposal is seen as a potential disruptor to the way interconnection agreements are made. There are concerns that it could narrow down the scope of Internet Exchange Points (IXPs), which could ultimately lead to increased costs for consumers. This negative sentiment is shared by a coalition of global civil society organizations, who have released a statement expressing their opposition to these policies. They argue that such policies have adverse effects on users and the open Internet.

The implementation of similar policies is being considered by many jurisdictions, including Brazil, India, South Korea, Australia, and parts of the Caribbean. This suggests that the debate on internet infrastructure is not limited to Europe, but is gaining global attention.

Konstantinos Komaitis, a strong critic of the fair share proposal, has been resisting it since its inception. He believes that the proposal is an awful idea and needs to be resisted. Additionally, he emphasizes the importance of open and accountable discussions on infrastructure, as well as the need to create systems that allow maximum participation and have sufficient checks and balances against misuse.

The European Commission has handled public consultations remarkably by using an exploratory consultation process to identify issues before drafting legislation. This demonstrates their commitment to transparency and ensuring public input. However, there are concerns about the unclear policy objective to tackle connectivity issues in Europe. It is also noted that the Commission appears to be prioritizing access networks over other networks, which is viewed as potentially problematic.

Collaboration and working together are seen as key to infrastructure building. Various actors, including telecom providers, big technology companies, tower companies, and municipalities, should participate in the process. This is because increasing reliance on the internet requires a collective effort. Rather than pitting technology companies against telcos, it is believed that they should work together. Universal Service Funds (USFs) may provide the framework for this collaboration.

Konstantinos Komaitis also emphasizes the importance of open and accountable discussions on infrastructure. He highlights the need to ensure that funds are not misused or mismanaged and proposes the implementation of accountability mechanisms to avoid such issues.

In conclusion, the debate on internet infrastructure in Europe is shaped by the ideas of digital sovereignty and protectionism. The fair share proposal, which involves payment from content application providers, is viewed negatively due to concerns about the impact on interconnection agreements and potential increase in costs for consumers. Similar policies are being considered in other jurisdictions. Konstantinos Komaitis strongly opposes the fair share proposal and stresses the importance of open discussions and collaboration in infrastructure building. The European Commission has demonstrated transparency through its public consultations, but concerns remain about the clarity of policy objectives and prioritization of access networks. It is believed that maximum participation and accountability mechanisms are key to ensuring effective infrastructure development.

Ben Matranga

Global connectivity can be achieved by addressing coordination and access to capital. The issues surrounding connectivity are not merely technological but are also related to the coordination of efforts and access to sufficient capital. Once these two problems are effectively solved, broadband access can increase on a global scale. This suggests that improving coordination and ensuring access to capital are crucial steps towards achieving global connectivity.

Blended finance plays a critical role in building broadband networks in remote areas. In Europe and the US, blended finance is commonly used to subsidize telecommunications. However, in emerging markets, the challenge lies in determining who should bear the costs and how much subsidy is required. One positive development is that as the cost of network construction decreases, less subsidy is needed. This highlights the importance of blending finance to bridge the gap in remote areas and make broadband access more accessible.

Governments can extend the reach of broadband access by providing subsidies and extensions around anchor institutions such as universities and hospitals. This approach helps pull the distribution of backhaul into new areas, making data access more affordable in previously underserved communities. The presence of anchor institutions can effectively extend the access of broadband services.

It is argued that broadband access should be considered a commodity that is accessible to all, rather than a luxury. Many parts of the world still regard data as a luxury item. The goal should be to make data a commodity that people can access anytime and anywhere. This approach aligns with the Sustainable Development Goals of promoting industry, innovation, infrastructure, and reducing inequalities.

Universal service funds are commonly utilized by governments worldwide as a source of capital for market investments. These funds play a critical role in making capital available for broadband projects. By utilizing universal service funds, governments can support market investments and contribute to achieving the goals of industry, innovation, and infrastructure.

The cost of establishing networks and providing broadband services can be significantly reduced through coordinated builds and subsidies. Coordinated builds, which involve constructing various areas together, are more cost-effective than doing so individually. Additionally, subsidies play a role in offsetting the costs of establishing networks. It is estimated that subsidies typically account for only 10% to 20% of the total cost.

Public policy plays a crucial role in determining how different geographic areas, based on their economic buckets, are serviced. Areas with solid economics are usually serviced, while areas with marginal economics require access to long-term capital. Moreover, areas with insufficient economics need subsidies from Universal Service Funds to bridge the gap. This highlights the importance of public policy in ensuring universal broadband access.

However, higher interest rates are causing delays in global construction projects, particularly impacting emerging markets. The increase in interest rates worldwide has contributed to these delays, presenting challenges for the progress of infrastructure development, especially in emerging markets.

To manage high capital costs, there should be a focus on reducing the cost of service delivery. It is important to strike a balance between capital and labour, as higher labour costs in markets like the UK and the US can significantly increase the cost of building infrastructure. By finding ways to reduce the cost of service delivery, the challenges posed by high capital costs can be effectively managed.

Lower labour costs in emerging markets have the potential to contribute to delivering affordable revenue per user (ARPU). The affordability of broadband services is a crucial factor in achieving widespread adoption and usage. The lower cost of labour in emerging markets can help reduce the overall cost of delivering ARPU in the desired range of 10 to 15 dollars.

In conclusion, global connectivity can be achieved by addressing coordination and access to capital. Blended finance, subsidies around anchor institutions, and the provision of universal service funds are some of the strategies that can be employed to expand broadband access. Coordinated builds, public policy, and efforts to reduce the cost of service delivery also play important roles. However, challenges such as higher interest rates and high capital costs must be tackled. Overall, achieving global connectivity requires a comprehensive approach encompassing various factors and stakeholders.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more