Child participation online: policymaking with children | IGF 2023 Open Forum #86

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The articles analysed cover a range of topics related to youth engagement and online safety. One article explores the effectiveness and necessity of age verification systems online. It discusses Marie Stella’s investigation into the opinions of youth and children regarding age verification. Stella found that, while adults haven’t found a perfect solution, the issue still needs attention.

Another article focuses on the opinions of young people regarding age verification. It raises the question of whether awareness-raising education alone is enough to prevent access to harmful online content. This article emphasises the importance of further examination and dialogue within the context of quality education and strong institutions.

The third article highlights the importance of engaging companies in child participation, particularly in areas with restricted democratic participation. It discusses how companies can contribute to the design and decision-making processes that affect children. While Microsoft is suggested as a potential partner, other companies are also encouraged to get involved. This article emphasises the role of SDG 16 (Peace, Justice and Strong Institutions) and SDG 8 (Decent Work and Economic Growth) in promoting child participation.

The fourth article stresses the need to develop convincing strategies to engage companies in child participation. It emphasises the importance of partnership for the goals and industry innovation and infrastructure, as outlined in SDG 17 and SDG 9. Microsoft is suggested as a possible partner, but other companies are also welcomed.

In conclusion, the articles highlight the importance of addressing these issues to ensure the online safety and well-being of young people. They emphasise the need to explore effective age verification systems, consider youth opinions, and promote awareness-raising education. Engaging companies in child participation and developing convincing strategies are also seen as vital. These discussions align with various Sustainable Development Goals, such as SDG 4 (Quality Education), SDG 16 (Peace, Justice and Strong Institutions), SDG 8 (Decent Work and Economic Growth), SDG 17 (Partnership for the Goals), and SDG 9 (Industry, Innovation and Infrastructure).

Courtney Gregoire

The digital environment, although not originally designed for children, has a significant impact on their rights and potential. The policies of technology providers play a crucial role in shaping this impact. It is important to transition from a mode of protection to empowering youth voices. For example, Microsoft has a long-standing commitment to children’s online safety. They recognize the need to understand how children use technology in order to better design it. One way they have addressed this is through their gaming platform, where they introduced ‘Home Sweet Hmm’ to promote online safety.

The argument put forth is that children learn through play, highlighting the role of educational gaming in their development. Microsoft’s ownership of a gaming platform further emphasizes their involvement in promoting learning through play and fostering a safe digital environment for children.

Regarding product development, it is crucial to engage children in the process. Microsoft has convened three councils for digital good, where children aged 13 to 17 have provided valuable feedback on their services and apps. This demonstrates Microsoft’s commitment to involving children and incorporating their perspectives in the development of their products.

The potential of Artificial Intelligence (AI) is also highlighted, particularly its positive impact when used responsibly. The argument suggests that AI has the ability to do good, though responsible use is key to ensuring positive outcomes.

The summary also emphasizes the importance of incorporating children’s online behavior into policy-making. This reflects the need to understand how children ask for help online and to consider their experiences when shaping policies related to child safety and well-being.

Microsoft’s approach to child participation is noted, as they leverage existing organizations to engage children in product safety and design. They have previously convened Councils for Digital Good, collaborating with NGOs and academia to gather information and stimulate conversations on these issues.

Finally, the argument is made that children’s voices should influence both company rules and regulatory/legal rules. Microsoft actively involves their child participants in direct interactions with regulators, demonstrating their belief in the importance of children’s influence at various levels of decision-making.

In conclusion, the expanded summary outlines the significance of the digital environment on children’s rights and potential, the importance of empowering youth voices, the role of play and education in their development, engaging children in product development, responsible use of AI, integrating children’s online behavior into policy-making, and Microsoft’s efforts to involve children in shaping rules and regulations.

Afrooz Kaviani Johnson

The analysis emphasises the importance of actively involving children in decision-making processes and policy development, particularly in the area of online safety. The Convention on the Rights of the Child recognises and upholds children’s right to freely express their views. The speakers in the analysis highlight that by involving children, policymakers can tap into their creativity, skills, and unique understanding, leading to more effective and tailored policies and programs.

It is crucial to consider that children interact with digital technology in ways that differ greatly from adults. Therefore, their perspectives and experiences must be taken into account when formulating policies and programmes related to online safety. Including children’s insights allows policymakers to gain a better understanding of their needs, enabling the creation of more relevant and effective guidelines.

Several supporting facts demonstrate the benefits of involving children in decision-making processes and policy development. The Committee on the Rights of the Child proposes nine basic requirements for effective child participation, including transparency, voluntariness, respect, child-friendly approaches, inclusivity, support through training, safety considerations, and accountability.

Examples from Tunisia and the Philippines illustrate how children’s voices have helped shape national plans and legislation. In Tunisia, children’s voices played a crucial role in formulating the National Plan of Action on Child Online Protection. By consulting with children, policymakers were able to gain valuable insights and develop a plan that truly addressed their concerns and needs. Similarly, in the Philippines, consultations with children informed the development of a new national plan of action on children’s issues and other legislative instruments.

The analysis also highlights that involving children in decision-making requires careful planning, allocation of resources, and adequate training. In the consultations held in the Philippines, young adults from the communities acted as facilitators, ensuring that children felt comfortable and supported. Additionally, programming for parents and caregivers was implemented, and an emergency response plan was in place to safeguard children in case of any disclosures.

To conclude, actively involving children in discussions and decision-making processes is essential for developing effective policies, particularly in areas like online safety. The Convention on the Rights of the Child recognises their right to express their views, and involving them leverages their unique perspectives and understanding. Transparency, respect, inclusivity, and accountability are all key elements for successful child participation. Examples from Tunisia and the Philippines highlight how children’s voices can shape national plans and legislation. However, it is important to note that involving children in decision-making requires careful planning, allocation of resources, and adequate training to ensure meaningful and impactful participation.

Hillary Bakrie

The Protection Through Online Participation (POP) initiative aims to provide a safe online space for children and youth to access protection support. It emphasizes the importance of peer-to-peer support and encourages children-led solutions and initiatives. Hillary Bakrie, a supporter of POP, believes that the internet can be a valuable tool for young people to seek support and highlights the value they place on peer-created solutions. Young people also desire to be included as partners in decision-making processes, particularly regarding online safety and cybersecurity. This inclusive approach ensures that policies and measures are effective and relevant to their needs. To enable effective youth participation, addressing the digital divide and investing in education and skills are essential. Transparency, accessibility, and the recognition of young people’s contributions in policy-making processes are also emphasized. Overall, POP and its supporters advocate for an empowering online environment that values the expertise and experiences of young people.

Moderator

The discussion focused on the importance of child participation in policymaking, particularly in the context of online safety. Participants highlighted the significance of involving children in discussions and considering their rights in the digital environment. It was stressed that children have a unique understanding of their experiences online, and their perspectives should be taken into account when designing policies and interventions.
The Child Online Protection Initiative (COP) and ITU’s role in implementing guidelines for child safety online were mentioned as important efforts in this area. COP aims to facilitate the sharing of challenges and best practices among member states. The ITU has been co-leading the initiative, providing support to countries in implementing the guidelines.
The discussion noted that the involvement of children in policymaking can help ensure that their views and experiences are considered, leading to more effective and relevant policies and programs that address the specific needs of young users.
The role of Microsoft in promoting child online safety was also highlighted. Microsoft has a longstanding commitment to this issue and has developed a suite of products and services that intersect with children’s online lives. The company engages in conversations with young people to understand their needs and enhance the way they interact with technology.
Examples from Tunisia and the Philippines showcased the value of children’s input in shaping national action plans and legislative instruments related to online safety. In Tunisia, consultations with children helped shape the first-ever National Plan of Action on Child Online Protection. In the Philippines, involving children in consultations contributed to the formation of national action plans.
The ITU In-Country National Assessment was proposed as a valuable resource for governments to improve child safety online. By conducting a comprehensive assessment of the existing situation and developing a strategy and action plan based on global best practices, countries can enhance their policies, standards, and mechanisms.
Overall, the discussion highlighted the importance of involving children in policymaking and designing online safety interventions. Children’s participation ensures that their perspectives are taken into account, leading to more effective and relevant policies and programs. The involvement of youth in decision-making processes was also stressed, emphasizing the need for an inclusive approach that reflects the realities and aspirations of young people. The discussion recognised the value of partnerships between stakeholders, such as the ITU, Microsoft, and governments, in promoting child online safety.

Amanda Third

Children’s meaningful participation in the design of services and online safety interventions is considered crucial. The drafting of the UNCRC General Comment 25, which focuses on children’s rights in relation to the digital environment, was informed by consultations with children in 27 countries globally. This approach ensured that the key issues reflected not only the perspectives of adults but also the lived experiences of children themselves.

The International Telecommunications Union has taken steps towards promoting online safety by developing an online safety app, game, and trainings for three different age groups of children. What sets these initiatives apart is the involvement of a children’s advisory group, ensuring that the voice of children contributes to the creation of these tools.

To further support children’s participation, Amanda led the establishment of national child task forces in five countries. These task forces serve as guides for the government’s approach to online safety policy, emphasizing the importance of involving young people in crafting policies that directly affect them.

Youth participation in policy-making is highly valued and encouraged. Amanda suggests that shadowing decision-makers could enhance children’s influence in shaping online safety policies. Additionally, Amanda proposes that organizations’ platforms should actively seek young people’s input in a daily, approachable manner. This ongoing, real-time conversation would allow organizations to better understand children’s needs and preferences.

A notable finding from the consultations conducted in 27 countries is that children expressed their desire for improved online protections and data security. This highlights the importance of addressing these concerns to ensure a safe digital environment for children.

It is worth mentioning that attempting to restrict children’s online activities without considering their input can often lead them to find ways to circumvent such systems. Therefore, involving children in the decision-making process can lead to more effective and sustainable solutions, as children become active participants rather than passive subjects.

In conclusion, the engagement and participation of children in the design of services and online safety interventions are crucial. Through consultations, the UNCRC General Comment 25 incorporates children’s perspectives, ensuring that their unique experiences are reflected. Initiatives such as the online safety app and the establishment of national child task forces further demonstrate the commitment to involving children in shaping online safety policies. Encouraging youth participation and seeking their input in an ongoing manner will create an environment that better meets children’s online safety needs. By addressing their desires for better protection and data security, we can foster a digital environment that is safe and supportive for children.

Boris Radanovic

The analysis highlights the positive and impactful role played by youth in addressing various pressing issues. One notable example is the development of the Bully Blocker app by a group of teenagers, which aims to combat cyberbullying. This app demonstrates how youth-led initiatives can effectively address societal challenges, particularly in the realm of online safety. Another inspiring initiative is the creation of an online fake shop by a Polish high school student, intended to assist domestic abuse victims during the virus lockdown period. These examples exemplify the creative and innovative solutions that young people bring to complex problems.

Furthermore, the analysis emphasizes the importance of involving youth in decision-making processes regarding their own issues. It argues that discussions on how to support children often lack the direct participation of children themselves. However, in order to create valuable actions and solutions, it is essential to include youth input. The presence of youth-led advisory boards is acknowledged, but it is stressed that following through on their advice is crucial to ensure meaningful outcomes.

In terms of online safety, the analysis recommends government representatives apply for the ITU In-Country National Child Safety Assessment. This assessment provides a comprehensive understanding of the existing situation of children’s online safety and aids in drafting national strategies and action plans that incorporate global best practices. It is argued that such assessments can enhance national policies, standards, and mechanisms to protect children in the digital realm. Additionally, the analysis highlights the importance of local adaptations of global strategies, as local cultural, social, and regulatory differences impact the effectiveness of online safety measures.

The analysis also addresses the issue of children encountering adult or abusive content unwillingly on the internet. It argues that children do not want content that is not intended for them in their online spaces, emphasizing the need for adults to implement protections to prevent children from accessing inappropriate material. It acknowledges that the internet and its content were not specifically created for children and therefore, proactive measures are necessary to safeguard their online experiences.

Furthermore, the analysis recognizes that age verification poses a significant challenge in ensuring online child safety. However, it suggests that with children’s input, a solution can be achieved. It is concluded that working collaboratively with children and implementing their perspectives and ideas can lead to more effective and comprehensive measures to protect them online.

Overall, the analysis highlights the important contributions of youth in tackling critical issues, the need to involve them in decision-making processes, the recommendation for government action in enhancing online safety, and the significance of age verification in protecting children online. By considering these insights and recommendations, society can better empower and protect the younger generation in an increasingly digital world.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

CGI.br’s Collection on Internet Governance: 5 years later | IGF 2023 Open Forum #98

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Vinicius W. O. Santos

The open forum, co-organized by CGI.br (The Brazilian Internet Steering Committee) and ICANN (Internet Corporation for Assigned Names and Numbers), aimed to facilitate the exchange of experiences and knowledge on memory and documentation in the field of Internet Governance. CGI.br presented its efforts in designing a specialized library on Internet Governance and publishing official documents related to the subject.

Discussions at the forum focused on the challenges of managing and retrieving information in the dynamic field of Internet Governance. Participants expressed a strong interest in creating a comprehensive collection to organize, preserve, and retrieve the wealth of information generated in this rapidly evolving domain.

The project initiated by CGI.br and ICANN has grown significantly, incorporating various tools, practices, methodologies, and content types. This progress demonstrates the commitment and dedication of the organizations involved in ensuring accessibility and availability of valuable resources in Internet Governance.

Looking ahead, the session addressed the challenges and future prospects of the project. There are various obstacles to be addressed in the short and long term. The forum aimed to provide an overview of the project’s progress and foster discussions on overcoming these challenges.

Partnerships and collaboration emerged as fundamental pillars for successful work within Internet Governance, particularly in informational and archival projects. The absence of partnerships could impede the implementation and deployment of these initiatives, while collaborative efforts form the foundation of achievements in this field.

In conclusion, the open forum organized by CGI.br and ICANN served as a valuable platform for exchanging experiences and knowledge on memory and documentation in Internet Governance. It highlighted the importance of specialized libraries, the publication of official documents, effective management and retrieval of information, and establishing partnerships and collaborations for success in this domain. The project has evolved significantly, but challenges remain. Future prospects were discussed for continued progress.

Audience

The role of libraries in providing access to knowledge and the internet is significant, with a major impact on internet history and facilitating access. They bridge the digital divide by ensuring access to information and resources. In the context of internet governance-related events, having content available in the Brazilian language is seen as crucial for effective engagement and reducing inequality. Cgi.br collections greatly contribute to qualifying Brazilian participation in internet governance-related processes, while systematic organization and documentation are commended. Additionally, there is a call for a larger project on internet data archive that would benefit researchers, policymakers, and civil society. The use of machine learning algorithms for data categorization and the importance of partnerships and collaboration in internet governance projects are also highlighted. The absence of a taxonomy initiative in internet governance sparks curiosity, and the library sector recognizes the importance of the internet in delivering services and promoting information dissemination. Libraries are seen as more than just buildings, playing a vital role in educating for digital and information literacy. The close connection between libraries and internet service providers is emphasized, and there is a suggestion to explore the use of large language models for taxonomy extraction. Overall, the analysis underscores the significance of libraries, language inclusivity, collaboration, and technological advancements in internet governance.

Jean Carlos Ferreira dos Santos

The project at hand is primarily concerned with the development of the CGI.br and NIC.br collections, encompassing various activities such as documentation, publishing, and the design of a physical library. To efficiently manage and organize the collections, the project relies on the usage of tools like DSpace for the creation of digital repositories, Koha for library system operations, and ViewFind as a discovery tool.

Additionally, the library serves as an educational resource for capacity-building initiatives, providing valuable information and resources to enhance knowledge and skills. However, the project faces certain challenges. One of these challenges is the construction of controlled vocabularies, a crucial aspect in the field of internet governance. Likewise, the implementation, development, and maintenance of open-source tools present significant complexities.

Nevertheless, the project also brings forth several potential benefits. Collaboration and dialogue within the IGF community, for instance, can lead to numerous fruitful collaborations and exchanges of experiences. The project is open to establishing networks with other organizations and aims to maintain constant dialogue with the IGF community.

Furthermore, the project recognizes the potential of machine learning algorithms in the categorization of documentation, using them in the OECD AI Policy Observatory. Additionally, NIC-BI produces a substantial amount of data, reflecting the project’s commitment to data production.

However, challenges concerning data description, preservation, and reusability are noticeable. Describing the data effectively, preserving it for future use, and ensuring it can be reused poses significant hurdles that the project aims to address.

To improve data usage, the project actively seeks tools and standards that can be employed to utilize data more efficiently. Additionally, by incorporating standards and practices from library studies, the project hopes to organize the vast amount of content produced in the field of internet governance.

Standardised identifiers are deemed crucial for better content recovery and preservation within the internet governance community. The usage of digital object identifiers is recommended to prevent the loss of content.

A noteworthy objective of the project is to establish a taxonomy for internet governance. This initiative requires the cooperation of various stakeholders, including information science professionals, the technical community, and others. Creating a taxonomy will enable better organization and understanding of the interdisciplinary aspects of internet governance.

The importance of specific terms and concepts is acknowledged as aids in understanding the boundaries and components of the field of internet governance. By having a shared understanding of these terms and concepts, stakeholders can effectively communicate and collaborate.

The library created by the project seeks to meet the information requirements of the internet governance field. It has been designed to provide a comprehensive range of resources, expanding beyond traditional books. Additionally, efforts are being made to enable the Brazilian community and others to contribute to internet governance through the library.

Lastly, the project emphasises its openness to collaborations and contributions. By actively involving the community, the project aspires to build a stronger and more inclusive internet governance framework. After the session, the project encourages open dialogues, welcoming any questions or further discussions.

In conclusion, the project focuses on the development of the CGI.br and NIC.br collections. It employs various tools and technologies to manage and disseminate information effectively, while also addressing challenges such as the construction of controlled vocabularies and the implementation of open-source tools. Collaboration, dialogue, and the utilization of machine learning algorithms are recognized as valuable assets. The project also emphasizes the importance of data description, preservation, and reusability. By incorporating library studies, standardized identifiers, and establishing a taxonomy, the project aims to enhance information organization and understanding within the internet governance field. Furthermore, the project seeks to build a comprehensive library, engaging the community and encouraging collaborations and contributions. Overall, it demonstrates a commitment to the continued development and improvement of internet governance practices.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Building Diplomatic Networks for a Safe, Secure Cyberspace | IGF 2023 Open Forum #140

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Pablo

The analysis raises awareness about the importance of cybersecurity and provides several key points to support this notion. One of the main insights is the need to convince authorities and agencies about the significance of cybersecurity. It acknowledges that countries often confront complex and pressing issues which may cause cybersecurity to be overlooked. Therefore, there is a requirement to advocate for cybersecurity to be prioritized by governments and administrations.

Another crucial aspect discussed is capacity building. The analysis emphasizes the necessity of developing expertise at the national level in order to effectively address cybersecurity issues. Without this capacity building, countries will struggle to tackle the rapidly evolving challenges posed by cyber threats.

Partnerships with stakeholders are also stressed as vital factors in cybersecurity. The analysis highlights the importance of engaging with stakeholders such as the private sector, academia, and civil society. These collaborations are seen as crucial at both national and international levels. Governments need to recognize and appreciate the relevance of including stakeholders in the decision-making processes pertaining to cybersecurity.

The analysis also takes a positive stance towards governmental and international collaboration. It stresses the importance of partnerships with stakeholders and the necessity of prioritizing cybersecurity for governments and administrations. The supporting evidence for this stance includes communication about the significance of partnerships and the need to prioritize cybersecurity.

Additionally, the analysis advocates for capacity building as a means to effectively address cybersecurity challenges. It emphasizes the need for expertise at the national level and identifies capacity building as strategically important for combatting cybersecurity issues.

In conclusion, the analysis underscores the importance of cybersecurity and highlights the need to convince authorities and agencies about its significance. It emphasizes the necessity of capacity building and partnerships with stakeholders, and supports governmental and international collaboration. These insights provide a comprehensive perspective on the importance of cybersecurity, the strategies required to address it, and the key stakeholders who should be involved.

Audience

The discussion focused on multiple key topics related to digital policy and cybersecurity. The participants highlighted the significance of emerging technology and artificial intelligence (AI) in shaping digital policy and diplomacy. They acknowledged the challenges faced by diplomats and policymakers in adapting policy and legal frameworks to handle these innovations. The emergence of new technologies and AI presents opportunities for enhancing digital policy and diplomacy, as well as addressing global challenges.

Public-private partnerships were identified as crucial in the field of cybersecurity. Cooperation with the private sector was seen as bridging the gap between technical expertise and technological resources. The involvement of the private sector in the implementation of policies was considered valuable. It was noted that public-private partnerships provide an opportunity for private sectors to contribute their knowledge and resources towards addressing cybersecurity threats effectively.

Participants stressed that cybersecurity is a transnational issue that cannot be handled by a single nation alone. International cooperation was identified as paramount in mitigating cyber threats. The interconnected nature of cyber threats necessitates collaboration and information sharing among nations. It was highlighted that effective cybersecurity measures require collective efforts and coordination.

The importance of multilateralism and multi-stakeholderism in tackling digital and cybersecurity issues was advocated. Participants expressed a need for a collaborative approach involving multiple stakeholders, including governments, international organizations, civil society, and the private sector. It was argued that engaging different stakeholders can lead to more comprehensive and effective solutions to cybersecurity challenges.

The discussion also drew attention to the digital divide between the global north and south. Concerns were raised about the disparities in digital access, infrastructure, and skills between developed and developing nations. Participants emphasized the need for international cooperation to address this divide. They called for increased capacity building initiatives and the role of digital ambassadors in developing countries to enhance digital literacy and bridge the gap.

The introduction of new internet standards called zero trust, announced by the United States, was seen as a positive development in enhancing internet security. The concept of zero trust re-architects how the internet works, placing security at its core. It was highlighted that everyone owning their own IP address based on public-private key pairs can contribute to a more secure internet ecosystem.

The importance of reflecting the lessons learned from programs and initiatives in policies was emphasized. Participants encouraged ambassadors to apply their knowledge of internet security to their respective ministries and governments. They stressed the need for policy changes to incorporate the insights gained from addressing cybersecurity challenges.

Estonia was recognized as a small but influential country in the field of technology and cybersecurity. It was noted that Estonia’s national leadership, investment, and focus have resulted in the development of world-defining expertise in these areas. The relatively low capital expenditure required for technology development in Estonia was also mentioned.

The impact of online threats on development efforts, particularly in small island nations like Jamaica, was discussed. Participants acknowledged that online threats intersect with various developmental concerns. They emphasized the need to address online threats as they can undermine progress in areas such as industry, innovation, infrastructure, peace, justice, and strong institutions.

Participants also highlighted the importance of prioritizing issues wisely in countries with limited resources. They acknowledged that different priorities often compete with each other in small states. Effective decision-making and resource management were seen as key factors in maximizing the impact of limited resources.

Overall, the discussion shed light on the complex and interconnected nature of digital policy and cybersecurity issues. It emphasized the importance of collaboration, multilateralism, and multi-stakeholderism in addressing these challenges. The need for bridging the digital divide, enhancing international cooperation, and prioritizing resources wisely were key takeaways from the discussion.

Garima Vatla

During a series of discussions on cybersecurity and digital issues, the importance of the human component was highlighted. It was observed that this aspect is often overlooked in these conversations, despite its significance. Participants stressed the need to consider how individuals interact with and are impacted by technology. Empowering individuals with knowledge to understand these issues effectively emerged as a crucial factor.

Another key finding from the discussions was the nuanced nature of technology. While it presents numerous opportunities, it also poses significant threats in the form of cybersecurity issues. This highlights the need for a balanced approach in addressing these challenges and maximizing the benefits of technology.

One area that requires increased understanding and clarity is the definitions of cyber and digital diplomacy. Participants noted a lack of consensus and confusion surrounding the terminology and scope of these concepts. It is important to address this confusion to facilitate effective communication and collaboration in the field of cyber and digital diplomacy.

The discussions also emphasized the significance of integrating digital and cyber issues within the broader context of global policy. It was highlighted that these issues should not be viewed as separate entities but rather as integral parts of the overall global policy landscape. Recognizing and integrating these components into policy-making processes is essential for effectively addressing the challenges posed by digital and cyber issues on a global scale.

To summarize, the discussions underscored the importance of considering the human component in cybersecurity and digital issues. Empowering individuals with knowledge, clarifying definitions in the field of cyber and digital diplomacy, and integrating digital and cyber issues within global policy frameworks are crucial for effectively tackling the challenges and opportunities presented by technology in the digital age.

Hideo Ishizuki

Japan is taking significant steps to strengthen its cybersecurity measures. The National Police Agency has established a Cyber Affairs Bureau and a National Cyber Unit to address cyber threats effectively. The Ministry of Defense is also committed to increasing the number of personnel in cyber-specialised units to enhance their ability to respond to cyber attacks.

Efforts are being made to introduce active cyber defense to eliminate the possibility of severe cyber attacks. This proactive approach aims to detect and counter cyber threats before they can cause significant damage. Additionally, there is a focus on enhancing public-private collaboration and reforming the government structure for better coordination in dealing with cyber threats.

The increase in cyber threats has shifted responsibility towards the Ministry of Foreign Affairs. They are tasked with international cooperation for information gathering, analysis, and the formulation of international frameworks. The geopolitical competition, including incidents such as Russia’s war on Ukraine, has heightened the risks of cyberattacks against critical infrastructure.

To build up cybersecurity capacity, regional mechanisms and worldwide efforts led by organisations like the World Bank are proving to be effective. The ASEAN-Japan Capacity Building Centre, established five years ago in Bangkok, has trained over 1,000 individuals from ASEAN member states. Furthermore, the World Bank has set up a fund called the multi-donor capacity building trust fund and multi-donor cybersecurity trust fund to support global cybersecurity capacity building initiatives.

However, a common issue is a lack of resources dedicated to cybersecurity. The Ministry of Foreign Affairs in Japan suffers from a staff shortage in dealing with cybersecurity issues. Leadership does not adequately prioritize the importance of cybersecurity, which further affects resource allocation in this area.

To address this issue, it is crucial to highlight the importance of investment in cybersecurity. Efforts are being made to demonstrate the return on investment in cybersecurity measures. However, one challenge is that the impact of these efforts is not easily visible until a cyber attack occurs.

The Ministry of Foreign Affairs plays a crucial role in collecting and disseminating threat information and incident cases from abroad. This information is essential for government agencies to protect themselves from threats effectively. The dissemination of this information within the government is vital to ensure a coordinated response to cyber threats.

International participation by law enforcement agencies in countermeasures is also crucial. Japan is actively involved in the United States’ counter-ransom initiative, which has more than 40 countries participating. Such international cooperation helps generate interest and investment in cybersecurity.

In conclusion, Japan is committed to strengthening its cybersecurity measures through the establishment of specialized bureaus, increasing personnel, introducing active defense measures, and enhancing public-private collaboration. While regional mechanisms and global efforts are proving to be effective, a lack of dedicated resources poses challenges. Nonetheless, the Ministry of Foreign Affairs plays a significant role in collecting and disseminating threat information, and international cooperation in law enforcement agencies is essential for effective cybersecurity.

Nathaniel Fick

The extended summary focuses on the importance of technology and cybersecurity in building diplomatic networks and creating a safe cyberspace. It emphasizes that success in these areas requires the involvement of people, processes, and technology, with the human element being particularly significant. By building connections and strengthening diplomatic networks, countries can work together to address cybersecurity challenges effectively.

The need for a global network of trusted counterparts is emphasized as essential for responding to emergency situations. When a crisis occurs, being able to rely on a trusted counterpart to provide assistance and support is crucial. Developing a framework for responsible state behavior in cyberspace can contribute to the creation of such networks.

Mainstreaming technology diplomacy globally is seen as of great importance. This entails building diplomatic networks to ensure a safe and secure cyberspace. Ambassadors Ishizuki Hideo and Regina Greenberger are lauded as pioneers in this field, showcasing the impact of technology diplomacy.

The significance of achieving basic connectivity for the unconnected is emphasized. With around 2.8 billion people still lacking access to basic connectivity, it is essential to prioritize efforts to bridge the digital divide. Without basic connectivity, individuals are unable to participate in the advantages offered by emerging technologies, further exacerbating inequalities.

Capacity building is discussed as a challenge for the State Department and not limited to developing nations. It is recognized that building capacity within organizations is applicable to everyone.

The positive stance towards the priority of achieving basic connectivity for the unconnected is reiterated. By ensuring universal access to basic connectivity, more individuals will have opportunities to benefit from emerging technologies.

The importance of collaboration and open-mindedness in decision making is highlighted. It is crucial to assume good intentions and be open to considering other points of view. The ability to hold opposing ideas simultaneously is deemed a mark of intelligence.

A fresh perspective is seen as beneficial, particularly amongst those new to government bureaucracy. Nathaniel Fick, who has been in government bureaucracy for little more than a year, is mentioned as an example.

The importance of building digital and cyber skills within countries, regardless of their size, is underlined. Estonia’s success in cybersecurity despite being a small country is commended, highlighting the notion that any country can develop world-defining expertise with focus and discipline.

Cybersecurity is regarded as a cost, with efforts focusing on avoiding negative consequences. The prioritization of cybersecurity by leaders is highlighted, with a call to emphasize the positive aspects and opportunities associated with the digital shift. The integration of digital and cyber issues into global policy matters is recommended.

The conclusion of the Jellix Fellows program is acknowledged, expressing gratitude towards Regina and Hideo for their contributions and partnership. Anticipation for ongoing collaboration with the fellows in the future is expressed, and the fellows are looked upon to set the tone for future classes.

In summary, the extended summary emphasizes the significance of technology, cybersecurity, collaboration, and the acquisition of digital and cyber skills in building diplomatic networks, ensuring a safe cyberspace, and addressing emergency situations effectively. It highlights observations such as the need for a global network of trusted counterparts, the role of pioneers in technology diplomacy, and the importance of open-mindedness and fresh perspectives.

Regine Grienberger

The discussion highlighted the significance of cyber diplomacy and its cross-cutting approach. It was argued that cyber diplomacy requires a holistic, governmental approach, involving coordination among different departments and ministries to address cybersecurity challenges. It was emphasized that foreign ministries, military, and various agencies are key players in cyber diplomacy.

Additionally, the role of career diplomats in cyber diplomacy was discussed, with an emphasis on their ability to bring a generalist approach and connect commonalities among security policies. The relevance of the diplomatic toolbox in cyber diplomacy was also highlighted.

The speakers stressed the need for an entrepreneurial spirit and confidence in cyber diplomacy, as it is a new concept that requires promotion and adaptability. Diplomats in this field may need to take risks and be comfortable with uncertainty.

The discussion also acknowledged the relevance of cybersecurity to national and international security, with the potential for cybersecurity concerns to turn into national security threats.

The interlinkage between digital transformation and cybersecurity was emphasized, with a suggestion to focus on opportunities rather than just risks. Both aspects were seen as interconnected and requiring attention.

Investment in cybersecurity capacity building was discussed, noting the indirect rewards of programs that assist law enforcement in tackling cybercrime in other countries. The need for international collaboration in addressing cyber threats was highlighted.

Lastly, the importance of increasing international competencies in dealing with cybersecurity across all government players was emphasized, pointing to the formulation and implementation of a national cybersecurity strategy.

Overall, the discussions provided insights into the nature of cyber diplomacy and the various factors that need to be considered for effective implementation. These insights are valuable for policymakers and stakeholders involved in cybersecurity and diplomacy efforts.

Sharif

Collaboration between technology and policy discussions plays a critical role in bridging the gap, as highlighted by various speakers at the conference. They emphasized the necessity of collaboration in achieving SDG 9 (Industry, Innovation, and Infrastructure) and SDG 17 (Partnerships for the Goals). The dialogue from the United Nations Global Goals (UNGG), the Expert Working Group, and the Collaborative Research Initiative (CRI) all stressed the importance of collaboration.

To further facilitate these discussions, it has been suggested that specific bodies responsible for maintaining discussions be established. Noteworthy examples include the National Cyber Security Coordination Centre in Nigeria and the National Authority for Cyber Security in Albania. By having dedicated agencies, countries can ensure effective communication and cooperation between various stakeholders in the technology and policy realms.

Foreign programs, such as the GLX programme, have also been recognised as valuable resources in understanding the interplay between technology and policy entities. These programmes offer insights into the complex dynamics and interactions between different sectors, providing additional perspective on how to bridge the gap effectively.

Overall, the sentiment from the conference was positive regarding the importance of collaboration between technology and policy discussions. It is evident that it is crucial to work together to address the challenges highlighted by SDG 9 and SDG 17. By embracing collaboration and establishing dedicated bodies responsible for maintaining discussions, stakeholders can foster meaningful dialogue, overcome barriers, and collectively work towards achieving the goals outlined by the United Nations.

Maritza Ristiska

The GEL-X network is a highly regarded asset in the realm of cyberspace security. Comprising dedicated diplomats and experts from around the world, this network is pivotal in advancing international cooperation, building trust, and bolstering resilience to cyber threats. By facilitating collaboration among nations, the GEL-X network plays a crucial role in addressing the global challenge of cybersecurity.

One key argument in support of the network is its ability to enhance cooperation on a global scale. This is achieved through its experience within the OEWG on ICT and the UN Ad Hoc Committee on Cybercrime. By serving as a platform for the timely sharing of information related to cyber threats, the network promotes proactive and coordinated responses to emerging challenges in the cyber domain. This exchange of information is instrumental in enabling nations to stay abreast of evolving threats and develop effective countermeasures.

Moreover, the network’s impact lies not only in its ability to facilitate cooperation but also in its potential as a coordination hub during and after cyber incidents. During large-scale cyber attacks, the network enables swift communication and coordination among nations. This real-time collaboration is essential for mounting effective responses to mitigate the damage caused by cyber threats. Furthermore, the network provides technical forensic evidence, aiding in the attribution process during cyber incidents. This attribution capability is crucial in holding responsible parties accountable for their actions and deterring future cyber attacks.

Notably, the GEL-X network’s efforts align with the overarching goal of promoting responsible state behavior in cyberspace. By advancing international cooperation, sharing information, and enabling swift coordination, the network contributes to establishing a more secure and stable cyberspace environment. Responsible state behavior is critical in maintaining peace, justice, and strong institutions, as well as fostering continued innovation and infrastructure development.

In conclusion, the GEL-X network is an invaluable asset in cyberspace security. Its role in advancing international cooperation, enhancing coordination during cyber incidents, and promoting responsible state behavior makes it instrumental in addressing the challenges of cybersecurity. As the landscape of cyberspace continues to evolve, the GEL-X network’s contributions will play a pivotal role in securing the digital domain and safeguarding global interests.

Sumiya

The analysis delved into the importance of understanding cyber landscapes and cyber diplomacy from three different perspectives. Firstly, one perspective highlighted the crucial nature of comprehending a country’s cyber landscape. The argument presented was that in order to navigate the complexities and challenges of the ever-evolving cyber realm, it is imperative for countries to have a deep understanding of their own cyber landscape. This involves understanding the various agencies and entities involved, as well as recognising the role of foreign ministries in facilitating collaboration between public and private entities.

The second perspective explored the benefits of learning from the U.S. cyber diplomacy and cyberspace. It was noted that the U.S. State Department organizes a program that provides insight into U.S. cyberspace, thereby enhancing the participants’ ability to understand their own ecosystem. By studying the approaches and experiences of the United States in the realm of cyber diplomacy, countries can gain valuable knowledge and apply best practices to their own contexts.

The third perspective advocated for supporting collaboration and understanding in cyber diplomacy. The discussions stressed the importance of foreign ministries in fostering partnerships and collaboration between different stakeholders. The analysis emphasized the need to continue such collaboration and understanding in order to address the complex challenges of cyberspace effectively. By working together, countries can create a more secure and resilient cyber environment that promotes peace, justice, and strong institutions.

In conclusion, the analysis highlighted the significance of understanding cyber landscapes and cyber diplomacy from multiple angles. It emphasized the role of foreign ministries in fostering partnerships and collaboration, and the benefits of learning from the experiences of other countries, such as the United States. A comprehensive understanding of cyber landscapes and effective cyber diplomacy is crucial in today’s interconnected world to ensure the security and stability of cyberspace.

Christopher Tate

The United States has introduced new standards called zero trust to enhance internet security. These standards enable the re-architecting of the internet core, providing improved protection against cyber threats, and ensuring the confidentiality, integrity, and availability of information. This proactive approach aims to mitigate potential risks and addresses the growing concern for internet security.

Connect Free has unveiled a revolutionary concept where individuals can own their IP addresses. This concept is based on a public-private key pair, ensuring a secure and unique identification for each user. Connect Free’s aim is to promote internet accessibility and reduce inequalities in terms of internet connectivity.

Recognizing the complexity of the internet, there is an acknowledgment of the challenges faced by diplomats. Christopher Tate, an IT expert, has apologized on behalf of the IT community for making diplomats’ jobs more difficult due to the intricate nature of the internet. This recognition highlights the need for collaboration between the technical and diplomatic sides.

However, there is a belief in the potential of productive collaboration between the technical and diplomatic realms in addressing internet security and accessibility. By bridging the gap between technical expertise and diplomatic efforts, effective strategies and solutions can be developed to tackle the complex issues related to internet security and accessibility.

In conclusion, the introduction of zero trust standards by the United States and the concept of individual IP address ownership by Connect Free are significant advancements in the field of internet security and accessibility. Despite the challenges posed by the complexity of the internet, there is optimism and appreciation for collaboration between the technical and diplomatic sides to overcome these challenges. This cooperation is crucial in ensuring a secure and inclusive internet for all.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Beneath the Shadows: Private Surveillance in Public Spaces | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

During the discussion, various topics related to technology and data were explored, including the use of blockchain technology for collecting biometric data. An audience member asked for opinions on this matter. The sentiment towards this question was neutral, with no specific arguments or evidence provided for or against using blockchain for biometric data collection. However, it was mentioned that blockchain might be beneficial in controlling access to data, suggesting a potential advantage in using this technology for biometrics.

Another concern raised by an audience member was the issue of real-time surveillance in India. The sentiment expressed was negative, with the argument focusing on the lack of protection and rights for users in the face of such surveillance. The audience member questioned whether individuals are adequately informed when their data is being processed and if they are aware of being under surveillance in public areas. Unfortunately, no supporting facts or evidence were provided to further substantiate these concerns.

Furthermore, an audience member from Australia discussed the increasing use of advanced technology in accumulating data and enhancing private surveillance. This sentiment was negative, and the argument emphasized the implications this has for user privacy. It was highlighted that developed nations are acquiring wealth and control through the collection of data using advanced technologies. However, no specific evidence or examples were provided to support this claim.

In conclusion, the discussions surrounding blockchain technology, data security, biometric collection, and surveillance touched upon important implications for data protection and user rights. While the use of blockchain for biometric data collection was not extensively debated, the potential of blockchain in controlling data access was acknowledged. The concerns raised about real-time surveillance in India and the increasing use of advanced technology in data accumulation and private surveillance highlighted the need for protections and solutions to safeguard user privacy. Nonetheless, the lack of concrete evidence and specific supporting facts weakened the arguments presented.

Beth Kerley

The rapid increase in network surveillance of physical spaces, alongside traditional digital surveillance, has become a growing concern. It exposes individuals to potential targeting by both public and private entities. By 2021, it was predicted that the number of surveillance cameras globally would exceed 1 billion, blurring the lines between public and private surveillance.

Emerging technologies such as biometric surveillance and ’emotion recognition’ are giving those who control cameras in public spaces new capabilities. Facial recognition technologies are being sold as part of the surveillance package, enabling the identification of individuals in real time. Emotion recognition technology is also being used in different countries to monitor students, drivers, and criminal suspects. These new developments raise ethical and privacy concerns as they can be intrusive and have significant implications for personal freedom and autonomy.

The involvement of private companies in surveillance poses challenges to transparency and accountability. Private entities are inclined to protect their intellectual property, making it difficult for citizens and non-governmental organizations (NGOs) to understand how surveillance systems operate. Additionally, contracts between public and private partners often lack specific provisions on how private entities can utilise the resulting data. This lack of clear guidelines raises the risk of misuse and potential violation of privacy rights.

While biometric identification has its controversies, it also has legitimate uses that should not be overlooked. It distinguishes itself from biometric surveillance, which involves the monitoring and tracking of individuals without their explicit consent. Biometric identification allows users to intentionally use their physical attributes, such as fingerprints or facial recognition, to access a space or account. However, appropriate safeguards are needed to ensure that biometric data is properly protected and not misused by unauthorised entities.

The integration of sensitive data with blockchain technology is met with scepticism. Storing sensitive data in a system designed to be unerasable raises concerns about data security and privacy. The immutability of blockchain can be seen as both a benefit and a risk, as any potential breaches or unauthorised access may have long-lasting consequences.

European digital rights groups argue for a ban on real-time surveillance in public spaces. They believe that real-time surveillance is difficult to control and regulate, which can lead to potential abuses of power. Striking a balance between security and privacy is crucial to maintain public trust.

Furthermore, public awareness and understanding of surveillance systems and the information possessed by the government are vital. In countries like Estonia, where elaborate e-government systems are in place, public awareness is a key safeguard to ensure trust in surveillance practices.

In conclusion, the rapid expansion of network surveillance in physical spaces, coupled with emerging technologies, raises significant concerns regarding privacy, transparency, and accountability. The involvement of private companies, appropriate safeguards in biometric identification, scepticism towards integrating blockchain with sensitive data, and the need for public awareness and trust all play crucial roles in shaping the future of surveillance systems. Striking a balance between security and individual rights is essential for the responsible development and use of surveillance technologies.

Yasadora Cordova

The debate centres around the issue of control and consent regarding users’ biometric and personal data. One perspective in the debate argues that user control is vital in order to prevent the misuse of data and protect privacy. They suggest implementing rules and ethical frameworks that increase user awareness of data collection. This approach emphasises the importance of separating different types of identification technologies to improve user control and promote data privacy.

Another viewpoint suggests that the control over sensitive biometric data should be entrusted to a neutral third-party or citizens’ counsel. The proponents of this argument raise concerns about law enforcement having access to and retaining the ability to edit videos, as this encroaches on personal freedom and raises privacy concerns. They caution against potential abuse of data by law enforcement agencies.

Furthermore, it is argued that user control over their data is essential not only for privacy but also to prevent potential misuse. The introduction of new rules and ethical frameworks is proposed to enhance user awareness of data collection practices. By doing so, users would have more control over their personal information and be able to protect their privacy more effectively.

A related point that arises in the debate is the need for user control in data privacy. It is observed that both industries and governments are collecting data indiscriminately. The cost of maintaining the integrity of personally identifiable information is said to be increasing. Therefore, it is suggested that obtaining permission or consent for the use of a dataset is crucial, ensuring that the dataset belongs to the person it represents.

Transparency and ethical considerations in data handling are also highlighted as significant concerns. It is noted that structuring and cleaning data are among the most expensive activities in the machine learning process. The demand for transparency through regulation is seen as a potential driver for governments and industries to clarify their data practices. Transparency is seen as the foundation upon which user control can be built.

In conclusion, the debate surrounding user control and consent over biometric and personal data highlights the importance of protecting privacy and preventing data misuse. Various arguments propose different ways to achieve this, including implementing rules and ethical frameworks, entrusting control to neutral parties or citizens’ counsels, and promoting transparency in data handling. These discussions aim to establish a balance between leveraging the benefits of technology and safeguarding individuals’ rights and privacy in the digital age.

Barbara Simao

Private surveillance companies in Brazil, such as Gabriel and Yellow Cam, are providing readily accessible 24/7 surveillance solutions to neighborhoods without oversight or accountability. This poses major risks for privacy, human rights, transparency, and data sharing. The lack of sufficient information and oversight surrounding these surveillance practices is of particular concern, potentially impacting historically marginalized groups and leading to exclusion. Additionally, the demand for private surveillance solutions highlights a lack of trust in public government solutions. The regulatory gaps in Brazil regarding the use of technology and data for public security contribute to the lack of oversight and accountability. Users should be informed about the risks, legal grounds, and potential access to their data. Moreover, more legal guarantees and safeguards need to be developed to regulate the activities of private surveillance companies. Overall, greater transparency, public awareness, and comprehensive regulatory frameworks are essential to protect privacy and individual rights in the context of private surveillance in Brazil.

Swati Punia

Swati Punia raises concerns about surveillance automation and its approach to crime and criminality. She argues that current surveillance practices tend to focus on handling petty crimes, while larger, structural crimes like financial crimes are often overlooked. Swati emphasises the need to reassess our conceptions of crime and criminality to address these systemic issues more effectively.

Swati highlights the importance of an interdisciplinary approach in civil society to tackle surveillance-related challenges. She believes that conversation and collaboration among academics, lawyers, and NGOs are crucial in effectively addressing these issues. Swati points out that working in silos can limit the effectiveness of addressing systemic problems, and therefore, calls for shared learning and interdisciplinary efforts.

Furthermore, Swati stresses the need for collaboration and shared learning among the global majority to address surveillance-related challenges. She suggests that conferences and discussions can provide platforms for stakeholders from different parts of the world to engage in dialogue and share their experiences. Understanding shared experiences within similar socio-political and cultural contexts can lead to more effective solutions and responses.

Another aspect Swati discusses is the importance of digital literacy and empowerment. She notes that even educated individuals may lack digital literacy skills, such as understanding financial matters online. Swati suggests that the government should do more in terms of digital empowerment, ensuring that individuals have the necessary skills and knowledge to navigate the digital landscape.

In terms of technology, Swati argues that it should focus on building privacy and security by design. She proposes that with the lack of digital literacy, there should be technologies that inherently secure and respect the user’s privacy. Swati believes that prioritising privacy and security in technological developments can mitigate potential harms and protect individuals’ rights.

Swati also highlights the role of civil society organisations (CSOs) in capacity building. She mentions that her organisation, the Center for Communication Governance, actively works on initiatives such as the privacy law library, regional high court tracker, and professional training. Swati believes that CSOs play a vital role in enhancing understanding and expertise in surveillance-related matters.

Lastly, Swati suggests that countries like India should not simply copy-paste solutions from Europe or other developed countries. Instead, they should consider their own social, cultural, and political environments when implementing digital solutions. Swati notes that many developing nations are rapidly adopting advanced privacy norms without sufficient preparation, which may not be suitable given their unique contexts.

In conclusion, Swati Punia’s discussion on surveillance automation highlights the need to reassess our approach to crime and criminality. She advocates for an interdisciplinary approach in civil society, collaboration and shared learning among the global majority, digital literacy and empowerment, privacy and security by design in technology, and the role of civil society organisations in capacity building. Swati encourages countries like India to consider their own context when implementing digital solutions in order to better address surveillance-related challenges.

Moderator

The session titled “Beneath the Shadows: Private Surveillance in Public Spaces” focused on exploring the involvement of the private sector in surveillance and public security solutions, highlighting the associated risks, implications, and necessary safeguards. Despite Estela Aranha, the on-site speaker, being unable to attend, the session featured three online speakers, including Bárbara Simão, the Head of Research in Privacy and Surveillance at Internet Lab.

Bárbara Simão provided an overview of the topic, emphasising the role of the private sector in surveillance solutions and public security. Internet Lab, a think tank based in Brazil, specialises in digital rights and Internet policy. Bárbara holds a Master’s Degree in Law and Development and has extensive experience in digital rights research.

Beth Curley, a programme officer with the National Endowment for Democracy’s International Forum for Democracy, contributed to the session. Beth, who has a background in history and foreign services, discussed the challenges associated with private surveillance in public spaces. She offered insights based on her experience as the former associate editor of the Journal of Democracy.

Swati Punia, a technology policy researcher based in New Delhi, India, focused on the intersection of technology, law, and policy in society. With her legal background and expertise in privacy, data protection, and emerging technologies, she highlighted the importance of addressing these issues, particularly in developing countries. Swati’s current research involves exploring the potential of non-crypto blockchain in India and its implications for socio-economic challenges and privacy in the global South.

Representing the private sector’s perspective, Iezodara Córdova, the principal privacy researcher at Unico Idetec, a biometric identity company, shared valuable insights. With a history of collaborating with esteemed organizations such as the World Bank, the United Nations, Harvard University, and TikTok, Iezodara has worked on projects concerning digital citizenship, online security, and civic engagement.

During the session, questions from the audience were addressed, allowing for engaging discussions. The speakers also shared their final thoughts on the importance of regulation and policy to tackle the concerns surrounding private surveillance in public spaces.

Overall, the session provided a valuable contribution to the ongoing discourse surrounding the role of the private sector in surveillance and public security. The speakers’ diverse backgrounds and expertise added depth and richness to the discussion, offering attendees and online participants valuable insights to consider in this ever-evolving domain.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Barriers to Inclusion: Strategies for People with disability | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Saba

The session aims to explore policies, strategies, and technologies that promote inclusive and accessible digital services for people with disabilities. It acknowledges the challenges faced by individuals with disabilities in bridging the digital divide and aims to address these challenges by examining ways to close the gap and provide equal opportunities for all. Key policy questions to be addressed include inclusive technology and digital services design, bridging the digital divide, and accessible training programs. The session emphasises the importance of inclusivity and accessibility in digital technologies and services, and highlights the ongoing efforts and commitment in this regard. The panel discussion will feature guest speakers Judith, Gunela, Teoros, Denise, and Mohamed Kamran, who are experts in the field, and their contributions will be appreciated. The session aims to provide a platform to discuss and explore innovative solutions for promoting inclusivity and accessibility in the digital realm.

Audience

During the discussion, the speakers focused on the challenges and opportunities of digital inclusion for people with disabilities. They emphasized the importance of adopting a granular approach to address the specific needs of each disability type. It was argued that people with disabilities have diverse requirements, and efforts in digital inclusion need to be both broad and deep to cater to these specific needs.

Collaboration between governments, businesses, and individuals was identified as a key driver for meaningful change in digital accessibility. The speakers stressed that fostering a collaborative environment can lead to impactful initiatives and solutions that benefit people with disabilities. This collaboration could involve sharing resources, knowledge, and expertise to achieve greater accessibility and inclusion.

Furthermore, it was emphasized that the inclusion of people with disabilities should go beyond technical accessibility and encompass the content and functionality of digital platforms. The speakers argued that it is not enough to simply make digital platforms technically accessible; it is equally important to ensure that the content and functionality of these platforms are designed in a way that caters to the needs of people with disabilities.

Another important point raised during the discussion was the need for better recognition of different types of disabilities and parameters in countries. The classification of disabilities varies from country to country, leading to inconsistencies in support and accessibility measures. Therefore, addressing this issue and working towards a more inclusive and comprehensive understanding of disabilities is crucial.

Additionally, the speakers highlighted the low representation of people with disabilities at the Internet Governance Forum and the low internet use among this population in some countries. These observations underscored the urgent need to focus on including people with disabilities in all fields, especially in internet access and participation. Increasing the representation of people with disabilities at forums and conferences, as well as improving the availability of accessible internet services, are crucial steps in ensuring their equal participation and inclusion.

In conclusion, the discussion shed light on the challenges and opportunities of digital inclusion for people with disabilities. It emphasized the importance of a granular approach, collaboration, and recognition when addressing the specific needs of different disability types. The inclusion of people with disabilities should extend beyond technical accessibility to include the content and functionality of digital platforms. Moreover, improving representation and increasing internet accessibility for this population are vital for their equal participation and inclusion.

Marjorie Mudi Gege

Stigmatization of people with disabilities is a pervasive issue that affects individuals across all sectors of society. However, it is particularly detrimental for people with disabilities as they often face additional challenges and barriers due to the stigma associated with their conditions. One of the main factors contributing to this issue is the fact that some disabilities are not immediately visible, leading to misunderstandings and further stigmatization.

Education and policy play crucial roles in combating stigmatization towards people with disabilities. Education has the power to reshape attitudes and perceptions by teaching individuals about the humanity and capabilities of people with disabilities. By educating society about the diverse range of disabilities and the unique challenges faced by individuals living with them, empathy and understanding can be fostered, reducing stigma and promoting inclusivity.

Furthermore, the implementation of effective policies is essential in addressing the issue of stigmatization. It is important to examine whether policies exist to protect individuals with disabilities and promote equal opportunities. However, determining the existence and accessibility of such policies can be a time-consuming process. Nevertheless, it is imperative to ensure that policies are in place and readily available to support individuals with disabilities, as they serve as a foundation for fostering a more inclusive and accepting society.

In addition to education and policy, advocacy is considered a never-ending but necessary process in battling stigmatization. Advocacy plays a significant role in raising awareness and promoting the rights and needs of people with disabilities. By amplifying their voices and experiences, advocates can challenge misconceptions and break down stereotypes, facilitating social change and progress towards a more equitable society.

In conclusion, the stigmatization of people with disabilities poses a significant challenge that needs to be urgently addressed. Education, policy, and advocacy are essential components in combating this issue. By promoting inclusive education, implementing effective policies, and advocating for the rights of individuals with disabilities, society can work towards creating a more accepting and inclusive environment. It is crucial that we strive to dismantle the misconceptions and prejudices surrounding disabilities, fostering a society where everyone is treated with dignity, respect, and equal opportunities.

Theorose Elikplim Dzineku

Advocacy work is crucial in making technology and digital services accessible for people with disabilities. Currently, there are several challenges that need to be addressed. Firstly, content creators often overlook the needs of individuals with disabilities, resulting in inaccessible content. Secondly, many users are unaware of the accessibility options on their devices, which limits their ability to access digital content effectively. Additionally, those who cannot afford devices with built-in accessibility features are left out, leading to a significant accessibility gap.

The issue is particularly pronounced in Africa, where limited awareness exists on how to make content accessible. This lack of understanding perpetuates the accessibility gap, further marginalising individuals with disabilities. To tackle this, capacity-building initiatives are needed to educate content creators and users on the importance of accessibility and provide them with the skills to make content accessible.

Involving people with disabilities in problem-solving and content creation is crucial. By including individuals with disabilities in the design and development of accessible content and applications, the products can better cater to their needs. Opportunities should be created to utilise the skills of people with disabilities, who often have computer science expertise.

Collaboration between organisations, governments, and civil services is essential for effective inclusion. This collaboration can lead to increased funding and support for initiatives like the inclusive tech programme in Ghana, led by Dr. Millicent, a disabled individual. The programme organises hackathons and technology training sessions for people with disabilities, empowering them with the skills to navigate digital technologies.

Stigma in online spaces is a significant challenge for individuals with disabilities, which needs to be addressed through policy interventions. People with disabilities often face discrimination and abuse online, amplified by misconceptions and the complexity of disabilities. Policies should be implemented to counteract this stigmatisation and create a safe and inclusive online environment.

Education and awareness are vital in combating stigma and prejudice. Many people have misconceptions about disabilities due to a lack of understanding. By promoting quality education and raising awareness, society can develop a more inclusive attitude towards people with disabilities, reducing inequalities.

Advocacy for disability rights and awareness must continue as an ongoing process. It is crucial to advocate for the rights of individuals with disabilities, promote accessibility and inclusion, and challenge societal barriers. This will create a more inclusive and accessible digital landscape that empowers individuals with disabilities and reduces inequalities.

Judith Hellerstein

The analysis highlights the issue of digital accessibility and inclusion for people with disabilities. Judith Hellerstein, who represents multiple interests in the sector, is an important figure. She runs her own firm, Halicyn Associates, and works directly with the US government on accessibility. Hellerstein has participated in events organized by the International Telecommunication Union (ITU) and is a co-coordinator of the Dynamic Coalition on Accessibility and Disability.

Hellerstein advocates for the development of stronger digital economies and increased accessibility. She helps countries develop their digital economies and emphasizes accessibility. Currently, only 3% of the internet is accessible for persons with disabilities worldwide. With over 1.3 billion people with disabilities globally, there is a clear need to make technology and digital services more accessible and inclusive.

The analysis supports efforts to update the Americans with Disabilities Act (ADA) and enforce Web Content Accessibility Guidelines (WCAG). These initiatives aim to legally mandate digital accessibility and ensure that companies follow guidelines to make their online content accessible to all users. Updating the ADA and enforcing WCAG 2.1 or 2.2 standards are seen as important steps in achieving greater accessibility for people with disabilities.

The analysis also points out the need for better awareness and practices in developing and designing accessible content. Companies often fail to inform developers about accessibility guidelines, creating barriers for people using screen-readers. Issues with metadata and image descriptions also contribute to the lack of accessibility. Therefore, improving awareness and incorporating accessibility practices in the development and design of digital content are necessary.

In terms of education, there is a strong argument for making programs accessible and inclusive for people with disabilities. Programs should be designed to be accessible to all, regardless of their disabilities. This applies to both online and in-person education. The analysis also highlights the importance of adequately describing pictures and diagrams used in educational materials to ensure that persons with disabilities can fully understand the content. An example is given of a person who developed a special Braille keyboard for STEM education, underscoring the need to adapt educational materials for different learning needs.

It is acknowledged that there is no “one-size-fits-all” approach to meeting the educational needs of people with disabilities. Different disabilities, such as visual impairments, hearing impairments, and cognitive disabilities, require tailored approaches to address their specific needs. Therefore, to achieve true accessibility and inclusion, it is crucial to understand and address the unique challenges faced by different groups of individuals with disabilities.

Lastly, the analysis stresses the importance of testing platforms used for education programs for accessibility. Many programs claim to be accessible, but when used as a whole, they may not meet accessibility standards. To ensure that these platforms are truly accessible, it is essential to have accessibility testers and firms that can thoroughly audit and test the programs. This will help identify and address any accessibility barriers, ensuring that people with disabilities can fully participate in education programs.

In conclusion, the analysis highlights the need for greater digital accessibility and inclusion for people with disabilities. Judith Hellerstein’s advocacy for stronger digital economies and increased accessibility, efforts to update the ADA and enforce WCAG guidelines, as well as the need for better awareness and practices in developing and designing accessible content, are all important steps towards achieving this goal. Additionally, the analysis underscores the importance of making education programs accessible and inclusive, tailoring approaches to meet the specific needs of different disabilities, and testing platforms for accessibility.

Denise Leal

The analysis suggests that there is a pressing need for greater inclusion and visibility for people with disabilities in Brazil and Latin America. The speakers argue that in order to achieve this, policies need to be implemented and there needs to be a better understanding of these policies to make education and training programs more accessible. It is highlighted that only 14% of people with disabilities in Brazil pursue higher levels of education, indicating a significant gap in access to quality education. Additionally, there is a large wage gap of almost 25% less for people with disabilities in terms of salaries in Brazil, further emphasizing the need for equal opportunities.

The analysis also points out the crucial role that technology plays in increasing accessibility and connectivity for people with disabilities. It is noted that the legal system in Brazil is primarily online, which enables individuals with disabilities to participate more effectively. Social media platforms are also becoming key venues for speech for individuals dealing with disabilities, enabling them to have a voice and share their experiences.

However, the analysis also highlights the need for appropriate moderation on social media and online spaces to protect people with disabilities from online bullying and hate speech. Instances of online bullying and hate towards people with disabilities in Latin America have been reported, and it is emphasized that moderation is necessary to safeguard individuals from online harm.

The analysis further emphasizes the importance of recognizing and accepting invisible disabilities. People with disabilities that are not easily visible often face difficulties and prejudice. It is argued that their rights are not immediately recognized, and it is imperative to raise awareness and promote acceptance of invisible disabilities.

Furthermore, the analysis emphasizes the role of communities in providing internet access for disabled individuals and other minorities. A successful example in Brazil is mentioned, where indigenous and traditional communities have taken the initiative to self-organize internet access. This highlights the potential of communities as key players in bridging the digital divide and ensuring accessibility for all.

An interesting point raised in the analysis is the question of the economic feasibility of making online content more inclusive. There is a consideration that economic interest plays a role in determining the inclusivity of online content, raising questions about the prioritization of accessibility in commercial ventures.

Lastly, the analysis laments the lack of attendance at events discussing disability issues. It is argued that more space and voice should be given to discuss situations for the improvement of infrastructure and technology for people with disabilities.

In conclusion, the speakers in this analysis shed light on various aspects related to inclusion and visibility for people with disabilities in Brazil and Latin America. They stress the importance of policies, understanding, and accessibility in education and training programs. Technology is seen as a powerful tool for connectivity and accessibility, while moderation is necessary to protect individuals from online harm. Recognition and acceptance of invisible disabilities, the involvement of communities, and the economic feasibility of inclusivity are also key considerations. The analysis highlights the need for increased attention and dialogue to address the challenges faced by people with disabilities and work towards a more inclusive society.

Gunila Astbrink

Gunila Astbrink, an influential advocate in the field of accessibility and disability within internet governance, actively supports individuals with disabilities and promotes accessibility. She is championing inclusivity by accompanying three persons with disabilities to the IGF meeting and mentoring them in their journey within internet governance. Astbrink argues that mainstream legislation and policy should include provisions for accessibility, highlighting Australia’s national disability strategy and the Telecommunications Act. She commends the Australian Communications Consumer Action Network (ACAN) for enforcing accessibility-related policies. Astbrink emphasizes the importance of including disabled individuals in policy implementation and praises ACAN’s representation of consumers and consumers with disabilities. She also promotes the use of public procurement provisions to ensure widespread use of ICT accessible products. Astbrink believes that organizations should have accessibility champions to collaborate with content and tech developers. She highlights the employment challenges faced by people with disabilities and stresses the need for greater opportunities and support. Astbrink calls for more representation from the disability community in internet governance discussions and encourages individuals to voice their concerns to the IGF Secretariat and the Multistakeholder Advisory Group (MAG). She mentions the existence of a funding program and a training program on disability in digital rights and internet governance. Overall, Astbrink’s work aims to reduce inequalities and create a more inclusive society.

Muhammad Kamran

The analysis reveals several important points discussed by the speakers. Firstly, Muhammad Kamran, a practicing lawyer from Pakistan, is highlighted as an expert in cyber crime. This establishes his credibility in the topic and sets the stage for further discussions.

The speakers also discuss the increasing prevalence of cyber crimes with the advancement of technology. This negative sentiment implies that as technology evolves, so do the methods and sophistication of cyber criminals. This poses a significant challenge for individuals, governments, and organizations to protect themselves from cyber threats.

To address these issues, the Internet Governance Forum (IGF) is presented as a platform for finding solutions to cyber crime. This positive sentiment emphasizes its importance in bringing together various stakeholders to tackle the complex issues surrounding internet governance and cyber security.

The broader impact of technology on our lives and future generations is acknowledged. This neutral sentiment indicates that technology is seen as a powerful force that influences various aspects of society. It can bring numerous benefits but also raises concerns about its potential negative consequences.

One of the positive aspects highlighted is the use of technology to assist people with disabilities. The existence of assistive apps and devices like Google Assistant is mentioned as evidence to support this argument. The sentiment here is positive, implying that technology has the potential to improve the lives of disabled individuals by providing them with greater accessibility and independence.

The speakers also emphasize the importance of making digital platforms accessible to everyone. This requires implementing features such as screen readers or captioning and involving disabled individuals in policy-making. This positive sentiment highlights the need for inclusivity and ensuring that technology is designed with consideration for people with disabilities.

The topic of disability and inclusivity continues with the understanding that disabled individuals should be considered “specially abled”. This neutral sentiment challenges societal perceptions of disability and promotes a more empathetic and positive approach towards disabled individuals.

To effectively utilize technology, it is argued that training and resources should be provided to disabled individuals. The sentiment here is positive, indicating the importance of empowering disabled individuals with the necessary skills and tools to fully engage with technology. The mention of alternative formats such as Braille or audio versions further highlights the need for accessibility.

Collaboration between tech organizations, government, and disability organizations is seen as essential to address the challenges faced by disabled individuals. This positive sentiment acknowledges that by working together, these stakeholders can combine their expertise, resources, and influence to create meaningful change and greater inclusivity.

Furthermore, the argument is made that disabled individuals should be actively involved in policy designing. This positive sentiment emphasizes the importance of consulting disabled persons when developing effective policies and programs. Their lived experiences provide valuable insights that can help create more inclusive and sustainable solutions.

Finally, the responsibility for promoting disability rights and advocacy is also stated to fall on disabled individuals themselves. This neutral sentiment implies that it is not solely the government’s responsibility, but disabled individuals should also actively participate and advocate for their own rights. This promotes a sense of empowerment and agency within the disabled community.

In conclusion, the analysis highlights various important discussions regarding cyber crime, the impact of technology, and inclusivity for disabled individuals. It stresses the need for collaboration, accessibility, and the active involvement of disabled individuals in policy-making and advocacy. These insights provide valuable considerations for addressing the challenges and opportunities presented by technology in creating a more inclusive and secure society.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Beyond North: Effects of weakening encryption policies | IGF 2023 WS #516

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis of the speakers’ arguments regarding encryption reveals a variety of key points and perspectives. Overall, there is a prevailing negative sentiment towards anti-encryption policies due to the potential risks they pose.

One notable concern is the risk of fragmentation in encrypted services. The mention of various policies that could threaten end-to-end encryption in Europe, the UK, and the USA raises alarms. Additionally, the gathered public views indicate a potential fragmentation in the encrypted services offered. This fragmentation could disrupt the seamless communication and interoperability that users currently enjoy.

The extraterritorial effects of anti-encryption policies are another significant concern. The internet ecosystem and human rights can be affected if encrypted applications become region-specific, leading to a fragmented online environment. There is also anxiety surrounding the possibility of surveillance or the implementation of backdoors to encryption. These concerns highlight the potential infringement on privacy and human rights.

Furthermore, there is strong opposition to anti-encryption policies and the possibilities of surveillance and backdoors, with some participants expressing the belief that the issue of child pornography is being weaponised to strengthen these policies.

Contrary to the compliance or denial dichotomy that is often presented, there are alternative solutions to consider. Technological literacy can empower individuals to access platforms in different ways within a given jurisdiction. This undermines the notion that compliance or denial are the only options. The false dichotomy of compliance or denial is seen as limiting, and there is optimism that technological literacy can pave the way for innovative approaches.

Blockchain technology is suggested as a positive solution that could provide a global, interoperable network without relying on encryption. The launch of a standardised blockchain platform by the MLS from the ETF is cited as a successful example. By preventing the monopoly of a single entity on a billion people, blockchain could offer a decentralised solution that empowers users while ensuring security and functionality.

The potential consequences of removing encryption services, such as WhatsApp, are also highlighted. Many migrants and citizens with families in other parts of the world rely on services like WhatsApp to communicate. The removal of these services could potentially oppress diasporic populations and the global South, as they were among the earliest users and audiences. This raises concerns about reduced connectivity and the potential disruption of social bonds.

Additionally, the dominance of Facebook and Google in the technology sector is seen as an issue that limits competition. The disproportionate influence and control exerted by these companies are believed to hinder opportunities for other players in the industry. The audience perceives this dominance as detrimental to fair competition and the exploration of alternative technological solutions.

In conclusion, the analysis reveals a negative sentiment towards anti-encryption policies. Concerns about the fragmentation of encrypted services, the potential infringement on privacy and human rights, and the dominance of certain tech giants echo throughout the discussions. However, there is a strong belief in the possibility of alternative solutions, such as technological literacy and blockchain technology, to address these issues. The potential impact on diasporic populations and the global South is also a significant factor that adds to the urgency of preserving encryption services.

Pablo Bello

This analysis explores the various arguments and stances surrounding encryption and its implications for online safety. It specifically focuses on WhatsApp, a widely used encrypted messaging platform, which strongly opposes anti-encryption policies and regulations. WhatsApp argues that weakening encryption would pose a significant threat to the security and privacy of its users on a global scale.

One of the main concerns raised by WhatsApp is the risk of internet fragmentation that could arise from policies undermining encryption. The platform has even stated that it would consider leaving the UK if the proposed online safety bill is implemented in a way that compromises encryption. This highlights the potential implications of lower security standards for the interconnected global network.

On the other hand, some experts argue against the commonly perceived trade-off between safety and privacy. They assert that the idea that reducing privacy will automatically increase security is false and disproven. They suggest that it is essential to maintain a balance between both aspects rather than compromising one in favour of the other.

Discussions also focus on who should decide encryption standards and whether multiple protocols should be encouraged. Questions have been raised regarding the potential implications of having a single standard and the decision-making process involved. Careful consideration must be given to ensure that the best standards are implemented.

Importantly, WhatsApp collaborates with other companies and civil society groups to resist encryption regulations. This coalition is working together to avoid regulations that would impact encryption. WhatsApp actively advocates for maintaining the highest standard of protection with end-to-end encryption worldwide, emphasising its duty and responsibility to protect its users.

Furthermore, the analysis underscores the critical nature of encryption for society’s safety, with encryption being vital to protect millions of individuals, particularly those in the Global South. The argument against weakening encryption is supported by the belief that it does not make society any safer.

In conclusion, this analysis presents a range of arguments and stances on encryption and its impact on online safety, with WhatsApp taking a strong stance against anti-encryption policies and regulations. The platform highlights the potential risks of internet fragmentation and advocates for the protection of high encryption standards. It actively opposes encryption regulations and emphasizes its duty to protect users worldwide. Encryption plays a crucial role in ensuring online security and privacy, and finding the right balance between safety and privacy is essential.

Juliana Fonteles da Silveira

The analysis explores the impact of anti-encryption policies on human rights in the Americas. It reveals that these policies may infringe upon the rights protected by the American Convention on Human Rights by granting access to personal information and allowing its processing. This argument is presented with a negative sentiment, highlighting concerns about the potential repercussions of anti-encryption policies.

The analysis also highlights that anti-encryption policies extend beyond privacy concerns to broader implications for freedom of expression and human rights. It asserts that encrypted communication is essential for activists, protesters, and journalists to communicate securely. It further points out that in many countries in the Americas, the absence of the rule of law, judicial independence, and democratic stability exacerbates the impact of these policies. This negative sentiment reflects a critical stance towards the rise of anti-encryption policies.

Another viewpoint discussed in the analysis raises concerns that anti-encryption policies in the Americas and Europe may contribute to the introduction of new repressive internet regulations in the region. The argument is made that any restriction on expression must meet the three-part test, which requires it to be provided by law, based on legitimate reasons, and in line with the principles of necessity and proportionality. This underscores the belief that anti-encryption policies should be subject to scrutiny to ensure compliance with human rights principles.

The analysis also mentions the role of the Inter-American Commission on Human Rights, which issues reports and recommendations on the impact of non-encryption policies on human rights to states and private companies. It also facilitates public hearings for civil society and other actors to address violations related to encryption legislation. These observations are presented in a neutral sentiment, highlighting the involvement of international bodies in addressing potential human rights violations resulting from anti-encryption policies.

Additionally, the analysis notes that there is no substantial evidence to support the effectiveness of non-encryption policies in ensuring safety. This negative sentiment raises doubts about the necessity and proportionality of such policies.

On the other hand, there is a positive sentiment expressed in support of encrypted and protected private communications. This viewpoint aligns with the importance of upholding human rights, privacy, and encryption. Although no supporting facts are provided for this support, it reinforces the notion that safeguarding private communication is crucial.

Overall, the analysis emphasizes the significance of protecting human rights while considering encryption policies. It underscores the potential consequences of anti-encryption measures on various facets of human rights, including privacy, freedom of expression, non-discrimination, and human dignity. The analysis calls for a careful examination of these policies to determine their compatibility with international human rights standards.

Prateek Waghre

During the discussion, several issues regarding internet regulations and digital sovereignty were explored. The focus was specifically on the impact of Western institutions on the global South. It was argued that actions taken by Western institutions can have significant consequences for parts of the global South, and this sentiment was expressed in a negative manner.

The discussion highlighted concerns regarding the regulations imposed on digital services in India. These regulations include the retention of customer data for up to five years, the tracing of original messages on end-to-end encryption in accordance with Indian internet laws, and the broadening definition of Telecommunication, which may impose licensing requirements on all internet services. These measures were viewed negatively by the participants and were seen as potentially harmful.

The exportation of regulatory designs to other countries was also a key topic of discussion. It was noted that countries such as Malaysia, Vietnam, Kenya, and Venezuela have adopted similar regulations to those enacted in Germany, including intermediary liability regulations. This observation was made without expressing a particular sentiment, indicating a neutral standpoint.

The control exerted by the Indian government over digital spaces raised concerns among the participants. The Data Protection Act, which grants the state the power to process large amounts of personal data while exempting the state from the right to privilege, was mentioned. Additionally, potential obligations to intercept messages and the involvement of a state-appointed grievance committee in content moderation decisions were seen as alarming. These points were discussed in a negative light and raised concerns about potential reductions in digital inequalities.

The importance of protecting encryption and end-to-end encryption was positively emphasized. The need for solidarity in safeguarding encryption in the coming years was underscored, highlighting its significance in preserving privacy and security.

The discussion also touched on the traceability issue in India, particularly in relation to a high court traceability order that WhatsApp managed to obtain a stay for. The impact and implications of this order were presented in a neutral manner, suggesting the need to cautiously monitor developments in this area.

Overall, the participants advocated for the protection of encryption and stressed the importance of vigilance in monitoring traceability developments. They highlighted concerns over the regulations imposed on digital services in India and the potential exportation of similar regulatory designs to other countries. The need for solidarity in protecting encryption and the significance of observing the traceability issue were recurring themes throughout the discussion.

Masayuki Hatta

The discussion focuses on the impact of encryption on the economies of the Global North and Global South. It acknowledges that many individuals are using encryption without being aware of it, highlighting the need for greater awareness and education about these services. The lack of understanding could lead to problems if encryption is prohibited or removed.

Regarding Japan’s role in encryption regulation, it is noted that the country generally follows the policies of the Global North. This raises questions about whether Japan should be categorized as part of the Global North or Global South. The discussion is further complicated by Japan’s technical and socio-political characteristics, causing confusion about its position. Additionally, Japan’s inclination towards authoritarian tendencies may have implications for privacy and internet freedom.

The Global South is increasingly implementing regulations on encryption. However, it is important to recognize that technology is not constrained by geographical boundaries or regulations. Services like WhatsApp, Apple, and Signal remain accessible to users regardless of regulatory measures. This demonstrates that technology is universal and not limited by individual countries’ decisions.

The main point of the discussion appears to be uncertain and confused. There is a lack of clarity regarding the focus and objectives of the conversation. Additionally, the issue at hand is seen as multifaceted and political, contributing to the uncertainty surrounding the discussion.

In conclusion, the analysis underscores the importance of raising awareness and understanding among users about encryption. It highlights the potential problems that could arise if encryption is prohibited or removed. The discussion also raises intriguing questions about Japan’s role and position in encryption regulation. Moreover, the differing approaches taken by the Global North and Global South in regulating encryption reflect the evolving landscape of technological governance. Overall, the discussion necessitates further exploration and clarification of the main points and objectives.

Mariana Canto Sobral

The analysis examines various aspects related to encryption, privacy, and global trends. One key argument posits that global south countries often feel compelled to conform to trends set by the global north out of necessity or a perception of trendsetting. However, the analysis cautions that transnational regulations like the General Data Protection Regulation (GDPR) can impose compliance requirements on global south countries, risking exclusion from the market. This highlights the challenge these nations face in balancing global norms with their own interests.

Regarding privacy, the analysis emphasises that its definition and understanding are primarily shaped by Western, white, middle-class perspectives. As a result, privacy is seen as a privilege, disregarding the experiences and needs of marginalized groups. The historical example of people of color being obligated to carry lanterns for surveillance further illustrates how such perspectives perpetuate inequality and social injustices.

Encryption evokes mixed sentiments. While it is viewed as a threat to vulnerable groups, it is also recognised as a powerful tool that can benefit the underprivileged and address power asymmetries. Challenging the prevailing notion that encryption hinders protection calls for a reevaluation of the narrative surrounding its role.

The analysis also disputes the notion that the absence of privacy automatically leads to increased security. It suggests that alternative approaches should be explored to achieve a balance between privacy and security.

Moreover, the analysis asserts encryption as a matter of human rights, emphasising the importance of protecting it as a fundamental right that contributes to peace, justice, and strong institutions. It calls for the Global South to embrace and safeguard encryption instead of perceiving it as a threat.

Additionally, the analysis recommends implementing regulations and policies to strengthen encryption in Latin America. It cites the example of Brazil, where revelations by Edward Snowden led to the establishment of a comprehensive civil rights internet framework. This demonstrates the potential positive impact of proactive measures in addressing encryption.

In conclusion, the analysis underscores the complex dynamics surrounding encryption, privacy, and global trends. It highlights the need to challenge prevailing narratives, redefine privacy, and recognise encryption as both a potential threat and a valuable asset. The analysis stresses the importance of safeguarding encryption as a human right and implementing appropriate regulations to promote security and reduce inequalities.

Moderator

Multiple legislative proposals introduced in the Global North, specifically in the USA and EU, are causing concerns about the potential negative impact on end-to-end encryption. These proposals, including the Online Safety Act and the Kids Online Safety Act in the USA, as well as the Chat Control proposal in the EU, pose a threat to the privacy and security provided by encrypted services.

There are fears that these proposals could lead to a fragmentation in the availability of encrypted services worldwide. If certain encryption services are only accessible in specific regions, it could create a situation where some users have access to secure communication while others do not.

Adding to the complexity is the lack of awareness among users about their reliance on encryption in everyday tech usage. Many people are unaware that they are using encryption when using applications like WhatsApp or LINE. This lack of awareness makes it difficult for users to understand the value and implications of restricting encryption.

The potential consequences of these legislative measures extend beyond privacy concerns. There are significant worries that these policies could curtail human rights and freedom of expression. Weakening encryption poses a risk of reducing global standards of security and privacy, especially impacting vulnerable populations who already live under non-democratic regimes.

It is crucial to defend against regulations that weaken encryption as encrypted communication plays a vital role in protecting freedom of speech, privacy, and security globally. The absence of data protection laws in many countries in the Americas contributes to state abuses and enhances state capacity for arbitrary measures on private communications.

Furthermore, there is no evidence to suggest that mass surveillance enabled by non-encryption policies has been effective in ensuring safety in proportionate ways. The potential for abuse in surveillance policies and the infringement on privacy rights is a major concern.

In conclusion, the legislative proposals threatening end-to-end encryption in the Global North have sparked concern for the global internet ecosystem and human rights. Defending encryption is crucial as weakening it not only compromises privacy but also threatens human rights and freedom of expression. The lack of awareness about the role of encryption among users further complicates the understanding of its value and implications. Protecting encryption is essential for maintaining higher standards of security and privacy globally, especially for vulnerable populations.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Juliana

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Mariana

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Masayuki

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Pablo

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Prateek

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Beyond universality: the meaningful connectivity imperative | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Martin Shepherd

The International Telecommunication Union (ITU) and the Office of the United Nations Secretary General’s Envoy on Technology have collaborated to establish targets for achieving universal and meaningful connectivity. To promote and measure the progress towards this goal, the ITU, along with the European Commission, has launched a project. The project has three key work streams: advocacy, measurement and capacity building, and research. These work streams aim to bring the concept of universal and meaningful connectivity to policymakers, collect and disseminate data, and track progress. This initiative acknowledges the need for everyone to have safe, satisfying, enriching, and productive online experiences at an affordable cost.

Accurate data tracking is regarded as crucial in order to make informed decisions related to universal and meaningful connectivity. The ITU’s Telecommunication Development Bureau plays a vital role in maintaining an online dashboard to track progress. This data-driven approach helps policymakers and stakeholders understand the areas that require attention and improvement. Furthermore, enhancing the statistical capacity of countries is essential to effectively measure the concept of universal and meaningful connectivity. The ITU, through its Data Analytics Division, is involved in collecting and disseminating data to support this effort.

The ITU indicators play a significant role in this project. These indicators are not limited to technical aspects but also encompass the number of internet users, their online activities, their perceptions of the connections, and their skill sets. This quantitative approach provides comprehensive insights into the supply and demand side indicators of universal and meaningful connectivity. In addition to the ITU’s quantitative indicators, UNESCO takes a qualitative approach, including many qualitative indicators in their data collection. This combination ensures a holistic assessment of universal and meaningful connectivity, enabling individual country assessments.

While the efforts of ITU and UNESCO in data collection are complementary, they are not perfectly coordinated. Nevertheless, both organizations share a common objective and are members of the Partnership on Measuring IST for Development. This cooperative approach facilitates the exchange of information and promotes a collaborative environment for advancing the measurement of universal and meaningful connectivity.

One area that presents a challenge is the lack of good quality data on how communities use the internet. The ITU has yet to collect comprehensive data that accurately reflects the usage patterns and needs of different communities. This knowledge gap hinders the formulation of targeted policies and interventions to ensure equitable access and usage of the internet.

ITU’s focus on connectivity also means acknowledging the need to address safety, affordability, and the quality of internet services. The concept of meaningful connectivity extends beyond mere access; it encompasses the quality of the connection and affordable data plans. However, assessing the value of what people do on the internet remains a complex task, and the ITU intentionally maintains its focus on connectivity rather than evaluating specific services.

The organization led by Martin Shepherd takes a human-centred approach to internet usage. They emphasize the importance of considering the needs and experiences of individuals and communities, rather than solely focusing on businesses. Additionally, they are exploring alternative sources of data to enhance understanding and measurement.

While progress continues to be made, there are areas that require improvement. Martin Shepherd’s organization acknowledges the lack of good indicators for safety and security, as well as speed, and recognizes that the realities of rural regions may not be fully reflected in the data collected. However, the commitment to continuing the ITU project and the belief in its importance remain strong.

In conclusion, the ITU, in collaboration with various stakeholders, is working towards achieving universal and meaningful connectivity. This ambitious goal involves promoting and measuring connectivity, ensuring accurate data tracking, enhancing statistical capacity, and adopting a human-centred approach to internet usage. While challenges and areas for improvement exist, the commitment to this project and belief in its significance remain unwavering. By addressing these issues and leveraging partnerships, the goal of universal and meaningful connectivity can be realized, ensuring that everyone can benefit from safe, satisfying, and enriching online experiences at an affordable cost.

Anir Chowdhury

The analysis examines the state of internet usage and connectivity in Bangladesh, shedding light on both positive advancements and areas that require improvement. One significant point of progress is the increase in internet access and broadband connectivity across the country. It is noted that different cell phone providers have successfully covered 98% of the nation with 4G network, marking a considerable achievement. Moreover, 3,800 rural locations have been connected with fibre through collaboration with the private sector, while a service obligation fund has facilitated the connection of over 700 hard-to-reach locations, such as islands or hilly areas. Additionally, a new project was initiated recently with the aim of connecting around 110,000 institutions with fibre, further enhancing connectivity.

However, concerns are raised regarding the affordability and availability of devices, which still pose barriers to internet access for many individuals. Although the regulator has managed to maintain affordable internet pricing, the penetration rate of smartphones in the country is only 52%. This indicates that a significant portion of the population still lacks access to devices that can utilise internet connectivity. Despite the progress made in extending 4G network coverage, it is highlighted that only approximately half of the available network is being utilised, further underscoring the hindrances posed by device accessibility and affordability.

Another noteworthy point discussed in the analysis pertains to advancements in AI and large language models, which have the potential to redefine digital skills and literacy. Large language models in AI could compel people to adapt and acquire new digital literacy skills, while the inclusion of native languages in these models could simplify digital interaction for individuals with low literacy levels. This demonstrates the transformative role that AI and language models can play in shaping digital skills and accessibility.

Furthermore, there is a recognition of the need to design content and services that cater to specific groups in order to bridge the digital divide and reduce inequalities. The analysis highlights that services have not been tailored for the ultra-poor, persons with disabilities, women, or Cottage Micro Small and Medium Enterprises (CMSMEs). To address this issue, attention and effort must be devoted to designing services in a meaningful manner for these specific groups.

It is worth noting that policies and technologies are being implemented to improve connectivity and digital literacy in Bangladesh. Efforts are being made to address policy matters and deploy skills and technology for development. The importance of universal and meaningful connectivity is emphasised, particularly in relation to skills development and service design. Furthermore, an equality index is being worked on, indicating a focus on promoting gender equality and the inclusion of marginalised groups.

Looking towards the future, strategic insight is highlighted as a crucial aspect. The analysis mentions the prediction of humans, devices, and robots exchanging data, and stresses the importance of adequately preparing for the needs of the next five to ten years. This emphasises the need to future-proof connectivity and explore innovative approaches for data exchange.

In conclusion, the analysis provides a comprehensive overview of the internet usage and connectivity landscape in Bangladesh. It highlights the positive developments in increasing internet access and broadband connectivity, as well as the advancements in AI and large language models. However, concerns remain regarding device affordability and availability, the need for inclusivity in content and services, and the existence of a digital divide. Policy implementations and technological advancements aim to address these issues, with an emphasis on universal and meaningful connectivity. The analysis also acknowledges the importance of gender equality and strategic foresight for future-proofing connectivity. Overall, it appreciates the insightful discussion and the attention given to the various pertinent issues.

Cosmas Zavazava [Video 1]

During the analysis, the speakers emphasized the importance of enhancing internet connectivity and accessibility for those who are still offline. They highlighted that approximately 2.6 billion people are currently without internet access worldwide. The aim is to improve the internet experience for those who are already connected and make it accessible to those who are offline.

The speakers argued that this goal can be achieved through partnerships and collaborations. They mentioned a recent partnership between ITU and the European Union, which aims to adopt holistic approaches to enhance the statistical capacity of countries. This collaboration demonstrates the willingness to work together for enhancing internet connectivity.

Moreover, the discussion focused on the importance of universal and sustainable digital transformation. The speakers emphasized the need for initiatives, research, and technical assistance to enable this transformation. By implementing these measures, they believe that the benefits of digital technology can be harnessed in a way that ensures inclusivity and sustainability.

The analysis provided a positive sentiment towards efforts to enhance internet connectivity. The speakers recognized the challenges involved in reaching the vast number of people who currently lack internet access. However, they expressed optimism that through strategic partnerships, collaborations, and focused initiatives, progress can be made in bridging the digital divide.

In conclusion, the analysis underscored the significance of enhancing internet connectivity and accessibility for those who are offline. It emphasized the importance of partnerships and collaborations in achieving this goal, highlighting the recent partnership between ITU and the European Union. Additionally, the analysis highlighted the focus on universal and sustainable digital transformation through the implementation of various initiatives, research, and technical assistance.

Audience

The discussion centered around the concept of meaningful connectivity and highlighted the various aspects that need to be considered to ensure its effectiveness. One key point raised was that internet access is not limited to merely establishing a connection but should also take into account the availability of services and content in local languages. This emphasises the importance of tailoring internet offerings to meet the specific needs and preferences of local communities.

Furthermore, concerns were expressed regarding the adequacy of existing indicators used to measure meaningful connectivity. It was argued that these indicators may not fully capture the complexity and granularity of the issue, and that there is a need for more nuanced data measurements to identify and address disparities within countries. The quality and accuracy of the data used in measuring meaningful connectivity were also called into question, emphasizing the importance of improving the overall quality of the data used in such measurements. There is a need for more granularity in data measurements to fully understand and address the inequalities that exist.

In addition, the discussion highlighted the importance of adopting a human-centered approach in defining meaningful connectivity. This involves considering the needs and perspectives of communities and ensuring that the benefits of connectivity are equitable and accessible to all. Policy-making should be informed by a community-centric viewpoint to better understand what aspects of connectivity are meaningful and desired by different communities.

The session also addressed the issue of limited device availability, particularly in rural areas, which hinders the full utilization of network services. Strategies to address the affordability and accessibility of devices were emphasized to ensure that connectivity reaches its full potential.

In conclusion, the discussion underscored the need to go beyond simplistic measures of connectivity and focus on meaningful and inclusive approaches. It emphasized the importance of considering local languages, addressing disparities, improving data quality, and adopting a human-centered perspective. The session highlighted the importance of ensuring that connectivity is accessible to all, regardless of their geographic location or socioeconomic status. Overall, there is a need for comprehensive strategies to ensure meaningful connectivity for all.

Alexandre Barbosa

In Brazil, there is a pressing need to address inequalities in connectivity at various levels. Firstly, there is a need to understand and tackle inequalities in terms of infrastructure, usage, and proficiency. The quality of connectivity in terms of high speed and advanced devices is crucial. However, barriers to digital usage, such as education level, socioeconomic income, age, and gender, have resulted in unequal access and usage. Proficient usage of the internet also leads to tangible outcomes such as content creation and the promotion of well-being.

Low-income households in Brazil still face limited internet access, with only 62% of such households having internet access compared to 98% of high-income households. Moreover, rural areas in Brazil also have a lower proportion of internet access compared to urban areas. This creates a significant digital divide, both geographically and socioeconomically. The South and Southeast regions of Brazil, which are wealthier, have higher proportions of fixed broadband households, while connectivity in the Amazon forest region and Northeast is mostly covered by radio or satellite. These disparities highlight the need to bridge the gap and ensure equal connectivity for all.

Despite these challenges, Brazil has embraced the concept of meaningful and universal connectivity. The country has experienced significant growth in internet usage over recent years, and there has been a rapid expansion of fiber optic connection. Policy makers in Brazil have been proactive in conducting surveys into internet usage since 2004, demonstrating a commitment to understanding and addressing connectivity issues.

In addition to access and infrastructure, digital skills play a pivotal role in promoting meaningful connectivity. Mobile-only users in Brazil display a lesser proportion of digital skills compared to computer and mobile phone users. Without digital skills, the full potential of the internet cannot be harnessed.

Furthermore, Brazil places importance on data protection and privacy. The country has implemented surveys to measure alignment with personal data protection laws, indicating a strong commitment to safeguarding individuals’ information.

To enhance connectivity and address inequalities effectively, it is crucial to have universal and meaningful connectivity indicators in a disaggregated format. National averages without disaggregation may not accurately capture the extent of inequalities within a country. Therefore, a more nuanced approach is needed to accurately assess the state of connectivity and identify areas that require improvement.

However, concerns about the quality and availability of data persist. It is important to ensure the reliability and accessibility of data, as well as to promote the production of high-quality data. This can be achieved through conducting primary data and using internationally recommended methodologies with probability samples that provide disaggregated data.

Despite efforts to bridge the digital divide and promote universal and meaningful connectivity, a human-centered approach is lacking in the design and implementation of connectivity initiatives in Brazil. By prioritising the needs and perspectives of individuals, a more inclusive and equitable approach to connectivity can be achieved.

The concept of Universal Media Connectivity (UMC) is of utmost importance in the current era of disinformation and lack of skills for content creation and critical use of the internet. Digital literacy and content creation skills are vital for individuals to navigate the digital landscape effectively and contribute meaningfully. Brazil, along with other countries, should produce data that can measure progress towards achieving the UMC concept, further emphasising the importance of tracking and monitoring connectivity goals.

In conclusion, Brazil faces significant inequalities in connectivity in terms of infrastructure, usage, and proficiency. While progress has been made, challenges remain, particularly in bridging the digital divide and promoting universal access. By prioritising digital skills, data protection, and a human-centered approach, Brazil can enhance connectivity and ensure that all individuals have equal opportunities to benefit from the digital era.

Peter Mariën

The European Union (EU) strongly supports the concept of universal meaningful connectivity, recognizing its importance in achieving sustainable development goals. The EU is collaborating with the International Telecommunication Union (ITU) to work on this concept. It believes that robust data collection is crucial for measuring progress and success in achieving objectives. This perspective aligns with the EU’s emphasis on data governance and the value it places on accurate and comprehensive data to drive effective decision-making.

In line with its commitment to promoting digital transformation, the EU advocates for a human-centric approach. It prioritises the individual and aims to bridge the digital divide by ensuring access to an open and free internet. The EU also emphasises the protection of privacy and security in the digital realm.

The EU has taken initiatives to enhance cybersecurity, a vital aspect of safe and secure connectivity. It has established a regional cybersecurity hub in the Dominican Republic and is actively involved in the BELA program, focusing on cybersecurity. The EU mainstreams cybersecurity in its programming, recognising its significance in the rapidly evolving digital landscape.

A key argument put forth by the EU is the need to link infrastructure investment with investments in soft elements such as data governance, digital skills, and e-government. The EU’s collaborative efforts with Kenya in the digital package collaboration highlight the importance of this approach. Measures to improve last-mile digital connectivity, enhance vocational education, and implement data protection and procurement legislation have been implemented to ensure a comprehensive and inclusive digital ecosystem.

Data collection is deemed fundamental for effective planning and implementing strategies. However, collecting data at local levels can present challenges. The EU recognises both the importance of having data and the difficulties faced when collecting it in field and partner countries. This understanding underscores the EU’s commitment to leveraging partnerships for data collection and analysis to make informed decisions.

Despite the EU’s efforts, last-mile connectivity remains a challenge. It recognises that achieving universal connectivity necessitates the participation of both private and public operators, who must find it appealing to invest in infrastructure in remote areas.

The EU also acknowledges the need for foresight about future requirements. New technologies, skills, and systems may be necessary to address the evolving demands of the digital era. This highlights the EU’s commitment to staying ahead of the curve and ensuring that its strategies and policies are adaptable to technological advancements.

In conclusion, the EU is strongly committed to various aspects of digital development. It supports the concept of universal meaningful connectivity, promotes a human-centric digital transformation, and takes initiatives to enhance cybersecurity. The EU emphasises the importance of investing in both hard infrastructure and soft elements like data governance and digital skills. It recognises the significance of data collection and the challenges associated with it at the local level. The EU acknowledges the struggle with last-mile connectivity and the need to anticipate and adapt to future requirements. Finally, the EU advocates for taking action and making things better through organisations dedicated to improving health, education, and combating climate change.

Video 2

Universal and meaningful connectivity is crucial for driving digital transformation and working towards the achievement of sustainable development goals. It allows individuals to access a wide range of essential services such as education, healthcare, government services, and job opportunities. Universal connectivity helps bridge the digital divide, ensuring that everyone can participate in the digital age.

To effectively track progress towards universal connectivity, measurement and data are essential. Proper data usage enables better decision-making by providing insights into past, current, and future positions. The International Telecommunication Union (ITU) and the Office of the United Nations Secretary-General’s Envoy on Technology have established aspirational targets to guide efforts in this area. The ITU’s Telecommunication Development Bureau maintains an online dashboard, which transparently monitors and tracks progress towards universal connectivity.

Promoting universal connectivity requires a combined global effort. Recognizing this, the ITU and the European Commission have launched a global project that facilitates the expansion of connectivity. This project demonstrates the positive stance towards achieving universal connectivity and the commitment of various stakeholders to collaborate and make it a reality.

In conclusion, universal and meaningful connectivity are fundamental for digital transformation and the attainment of sustainable development goals. It provides individuals with access to essential services and promotes inclusivity in the digital era. By utilizing effective measurement techniques and tracking progress through data, we can move closer to achieving universal connectivity. The collaborative efforts of organizations like the ITU and the European Commission highlight the importance of global partnerships in accomplishing this noble goal.

Moderator

The session focused on the importance of universal and meaningful connectivity and the role of policymakers in achieving this goal. Its aim was to discuss the definition, reach, and impact of universal and meaningful connectivity, with the goal of exploring how it can improve the quality of life for all people. The concept of meaningful connectivity was emphasized throughout the session as a way to understand and address digital inequalities. The session also highlighted the need for robust measurement policies to ensure connectivity, with a suggestion to create a Universal and Meaningful Connectivity (UMC) Dashboard. Lithuania was commended for its progress in reaching UMC targets, particularly in ensuring broadband connectivity in rural areas. The importance of developing digital skills and promoting gender diversity in the tech industry was emphasized. Collaboration between governments, the private sector, and civil society was deemed essential for successful implementation of digital strategies. The digital divide in Brazil was discussed, along with issues of data accuracy and granularity in data consumption indicators. The challenges of last mile connectivity and the need for foresight in anticipating future needs were also explored. The session emphasized the significance of universal and meaningful connectivity in promoting sustainable development.

Agne Vaiciukeviciute

Lithuania is making significant efforts to achieve meaningful connectivity and digitization through a range of strategies. These strategies primarily focus on rural broadband connectivity, affordability, and the promotion of digital skills.

To ensure widespread access to the internet, Lithuania has invested in broadband deployment in rural areas through a non-profit organisation under the Ministry. By leaving the last mile of connectivity to the operators, the country has been able to keep costs affordable nationwide. In fact, Lithuania boasts the lowest prices for end users across Europe.

The commitment to digitisation is evident through the state digitalisation development program, which involves every ministry. This approach ensures that each ministry creates its plan to meet specific digital targets. The digitisation strategy is intended to be horizontal, cutting across all sectors, thereby promoting comprehensive digitisation efforts.

Public libraries play a crucial role in imparting digital education and skills, particularly through their network of 1200 public internet access points across urban and rural areas. Additionally, various NGO initiatives, such as Safer Internet Week, All Digital Week, and the Women Go Tech programme, contribute to promoting digital education and skills. These initiatives aim to enhance digital literacy and encourage women to enter the tech and IT world.

To achieve meaningful connectivity and digitisation, collaboration between the government, private sector, and civil society is deemed necessary. This collaborative approach enables the implementation of digital strategies and maximises their reach to different segments of society. It ensures that a wide range of perspectives and expertise is considered in the planning and execution of these strategies.

Municipalities and regional levels are recognised as crucial players in the digitisation process. They are the closest organisations to the people and hold the potential to significantly affect the digitisation process within their cities. In Lithuania, the majority of initiatives are taken by the municipalities, which highlights their importance in driving digitisation efforts.

Recognising the importance of rural areas, Lithuania aims to extend digital strategies beyond dense cities. It recognises that there is a need to attract and implement initiatives in these areas as well, to ensure that all citizens can benefit from digitisation.

Lithuania ranks highly in digitalisation for public services, as evidenced by its 8th place worldwide ranking according to the World Bank’s digitalisation for the public service index. The country utilises new technologies to enhance accessibility to services, and the majority of services can now be accessed through digital service approaches. However, initiatives like GovTech are also created to address the gap for services that cannot be reached yet through the internet.

The importance of local content and internet accessibility to digital services is emphasised in Lithuania. The country acknowledges that digital solutions should be customised to fit the local environment, rather than being copied from elsewhere. They actively involve civil society, the public sector, and the private sector in creating digital solutions. The successful GovTech project in 2019 serves as an example of this collaborative effort, which resulted in tailored solutions that fit the Lithuanian context.

Collaboration and coordination within the government and stakeholders are crucial aspects of achieving meaningful connectivity and digitisation. By working together, these entities can align their efforts, share resources, and ensure a cohesive approach towards achieving digital goals.

Furthermore, the importance of data quality is emphasised for insightful decision-making and progress measurement. Accurate and reliable data are essential in shaping effective digital strategies and tracking progress towards digital goals.

Lastly, considering the fast-paced nature of technological advancements, adaptability and flexibility are recognised as key attributes. It is important to be able to adapt and adjust measures and strategies in response to rapid changes in the digital landscape.

In conclusion, Lithuania’s multifaceted approach to achieving meaningful connectivity and digitisation encompasses strategies focused on rural broadband connectivity, affordability, and digital skills. Through collaboration among the government, private sector, and civil society, as well as the involvement of municipalities and regional levels, Lithuania strives to ensure comprehensive digitisation efforts. The emphasis on local content, data quality, and adaptability further enhances the effectiveness of these initiatives.

Speakers

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Agne

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Anir

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Dr

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Martin

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Moderator

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Peter

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Video

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

AI and EDTs in Warfare: Ethics, Challenges, Trends | IGF 2023 WS #409

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The expanded summary examines the impact of artificial intelligence (AI) on global security from various perspectives. One viewpoint raises concerns about the potential for AI to make the world more insecure, particularly in the context of warfare. This perspective highlights the evolution of the massive retaliation strategy, which now considers preemptive strikes due to the capacities of AI. The comparison of AI capacities on the battlefield may favor preemptive actions. Overall, the sentiment towards the effect of AI on world security is negative.

Furthermore, the development of deep learning in AI has raised worries about the easier generation of bioweapons, leading to concerns about biological warfare. With AI and deep learning, the process of generating bioweapons has become more accessible, posing a significant threat. This argument emphasizes the need to ensure biosecurity and peace. The sentiment surrounding this issue is also negative.

In addition to the concerns about AI in warfare and biological warfare, ethical considerations play a crucial role in the development and deployment of autonomous weapon systems. It is recognized that there is a need for ethical principles to guide the use of AI in armed conflicts. The sentiment regarding this perspective is neutral, but it highlights the importance of addressing ethical issues in this domain.

On the other hand, AI can potentially be used to reduce collateral damage and civilian casualties in conflict situations. This observation suggests a potential positive impact of AI on global security, as it can aid in minimizing harm during armed conflicts. The sentiment towards this notion is also neutral.

In conclusion, the analysis reveals mixed perspectives on the impact of AI on global security. While there are concerns regarding its potential to make the world more insecure, particularly in warfare and biological warfare, there is also recognition of the potential benefits of AI in reducing collateral damage and civilian casualties. It is crucial to ensure that ethical principles are followed in the development and deployment of AI in armed conflict situations. Additionally, the maintenance of biosecurity and peace is of utmost importance. These factors should be considered to navigate the complex landscape of AI and global security.

Fernando Giancotti

A recent research study conducted on the ethical use of artificial intelligence (AI) in Italian defence highlights the importance of establishing clear guidelines for its deployment in warfare. The study emphasises that commanders require explicit instructions to ensure the ethical and effective use of AI tools.

Ethical concerns in the implementation of AI in defence are rooted in the inherent accountability that comes with the monopoly on violence held by defence forces. Commanders worry that failure to strike the right balance between value criteria and effectiveness could put them at a disadvantage in combat. Additionally, they express concerns about the opposition’s adherence to the same ethical principles, further complicating the ethical landscape of military AI usage.

To address these ethical concerns and ensure responsible deployment of AI in warfare, the study argues for the development of a comprehensive ethical framework on a global scale. It suggests that the United Nations (UN) should take the lead in spearheading a multi-stakeholder approach to establishing this framework. Currently, different nations have their own frameworks for the ethical use of AI in defence, but the study highlights the need for a unified approach to tackle ethical challenges at an international level.

However, the study acknowledges the complexity and contradictions involved in the process of addressing ethical issues related to military AI usage. It notes that reaching a mutually agreed-upon, perfect ethical framework may be uncertain. Despite this, it stresses the necessity of pushing for compliance through intergovernmental processes, although the prioritisation of national interests by countries further complicates the establishment of universally agreed policies.

The study brings attention to the potential consequences of the mass abuse of AI, highlighting the delicate balance between stabilising and destabilising the world. It recognises that AI has the capacity to bring augmented cognition, which can help prevent strategic mistakes and improve decision-making in warfare. For example, historical wars have often been the result of strategic miscalculations, and the deployment of AI can help mitigate such errors.

While different nations have developed ethical principles related to AI use, the study points out the lack of a more general framework for AI ethics. It highlights that the principles can vary across countries, including the UK, USA, Canada, Australia, and NATO. Therefore, there is a need for a broader ethical framework that can guide the responsible use of AI technology.

The study cautions against completely relinquishing the final decision-making power to AI systems. It emphasises the importance of human oversight and responsibility, asserting that the ultimate decision for actions should not be handed over to machines.

Furthermore, the study highlights the issue of collateral damage in current defence systems and notes that specific processes and procedures are in place to evaluate compliance and authorise engagement. It mentions the use of drones for observation to minimise the risk of unintended harm before any decision to engage is made.

In conclusion, the research on ethical AI in Italian defence underscores the need for clear guidelines and comprehensive ethical frameworks to ensure the responsible and effective use of AI in warfare. It emphasises the importance of international cooperation, spearheaded by the UN, to address ethical challenges related to military AI usage. The study acknowledges the complexities and contradictions involved in this process and stresses the significance of augmenting human decision-making with AI capabilities while maintaining human control.

Paula Gurtler

The discussion surrounding the role of Artificial Intelligence (AI) in the military extends beyond legal autonomous weapon systems. It includes a broader conversation about the importance of explainable and responsible AI. One key argument is the need for ethical principles to be established at an international level. This suggests that ethical considerations should not be limited to individual countries but should be collectively agreed upon to ensure responsible AI usage.

Another significant aspect often overlooked when focusing solely on legal regulations is the impact of AI on gender and racial biases. By disregarding these factors, we fail to address the potential biases embedded within AI algorithms. Therefore, it is crucial to consider the wider implications of AI and its contribution to societal biases, ensuring fairness and equality.

Geopolitics and power dynamics further complicate the utilization of AI in the military. With nations vying for supremacy, AI becomes entangled in strategic calculations and considerations. The use of AI in military operations can potentially affect global power balances and lead to unintended consequences. This highlights the intricate relationship between AI, politics, and international relations, which must be navigated with care.

Although various ethical guidelines already exist for AI deployment, one question arises: do we require separate guidelines specifically designed for the military? The military context often presents unique challenges and ethical dilemmas, differing from other domains where AI is utilized. Therefore, there is a debate over whether existing guidelines adequately address the ethical considerations surrounding AI in military applications or if specific guidelines tailored to the military context are necessary.

In conclusion, the debate regarding AI in the military extends beyond the legality of autonomous weapon systems. It encompasses discussions about explainable and responsible AI, the need for international ethical principles, the examination of gender and racial biases, the influence of geopolitics, and the necessity of specific ethical guidelines for military applications. These considerations highlight the complex nature of implementing AI in the military and emphasize the importance of thoughtful and deliberate decision-making.

Rosanna Fanni

During the discussion, the speakers explored the potential dual use of artificial intelligence (AI) in both civilian and military applications. They acknowledged that AI systems originally developed for civilian purposes could also have valuable uses in defense. The availability of data, machine learning techniques, and coding assistance makes it feasible for AI to be applied in both contexts.

A major concern raised during the discussion was the lack of ethical guidelines and regulations in the defense realm. While there are numerous ethical guidelines, regulations, and laws in place for the civilian use of AI, the defense sector lacks similar principles. This highlights a disconnect between the development and use of AI in civilian and defense contexts. Developing ethical guidelines and regulations specific to AI in defense applications is crucial to ensure responsible and accountable use.

The European Union’s approach to AI, particularly the exclusion of defense applications from the AI Act, was criticized. The AI Act employs a risk-based approach, yet its exclusion of defense applications contradicts this approach. This omission raises questions regarding the consistency and fairness of the regulatory framework. The speakers argued that defense applications should not be overlooked and should be subject to appropriate regulations and guidelines.

Another important issue discussed was the need for international institutions to take on more responsibility in terms of pandemic preparedness. The COVID-19 pandemic has demonstrated the necessity of being prepared to tackle challenges and risks arising from the rapid spread of bio-technology. The speakers emphasized that institutions should be better prepared to ensure the protection of public health and well-being. Moreover, they stressed that equal distribution of resources is crucial to prevent global South nations from being left behind in terms of bio-risk preparedness. The speakers highlighted the importance of avoiding a race between countries in preparedness and ensuring that global South countries, which often lack resources, are provided with the necessary support.

In conclusion, the discussion revolved around the need to address the potential dual use of AI, establish ethical guidelines and regulations for defense applications, critique the exclusion of defense applications in the European Union’s AI Act, and emphasize the role of international institutions in pandemic preparedness and equal distribution of resources. These insights shed light on the ethical and regulatory challenges associated with AI, as well as the importance of global collaboration in addressing emerging risks.

Pete Furlong

The discussion revolves around the impact of artificial intelligence (AI) and emerging technologies on warfare. It is argued that AI and other technologies can be leveraged in conflicts, accelerating the pace of war. These dual-use technologies are not specifically designed for warfare but can still be used in military operations. For example, AI systems that were not initially intended for the battlefield can be repurposed for military use.

The military use of AI and other technologies has the potential to significantly escalate the pace of war. The intent is to accelerate the speed and effectiveness of military operations. However, this raises concerns about the consequences of such escalated conflicts.

One of the challenges in implementing AI principles is the broad interpretation of these principles, as different countries may interpret them differently. This poses challenges in creating unified approaches to AI regulations and ethical considerations. While broad AI principles can address a variety of applications, there is a need for more targeted principles that specifically address the issues related to warfare and the military use of AI.

Discussions about the use of AI and emerging technologies in warfare are increasing in various summits and conferences. The UK Summit for AI Safety is an example of such discussions. Additionally, the concern about the use of biological weapons is growing, as it is noted that they only need to work once, unlike drugs that need to work consistently. This raises significant ethical and safety concerns.

AI’s capabilities are dependent on the strength of sensors. The cognition of AI is only as good as its sensing abilities. Therefore, the value and effectiveness of AI in warfare depend on the quality and capabilities of the sensors used.

One potential use of AI in warfare is to better target strikes and reduce the likelihood of civilian casualties. The aim is to enhance precision and accuracy in military operations to minimize collateral damage. However, the increased ability to conduct targeted strikes might also lead to an increase in the frequency of such actions.

One of the main concerns regarding the use of AI in warfare is the lack of concrete ethical principles for autonomous weapons. The RE-AIM Summit aims to establish such principles; however, there remains a gap in concrete ethical guidelines. The UN Convention on Certain Conventional Weapons has also been unsuccessful in effectively addressing this issue.

In conclusion, the discussions surrounding AI and emerging technologies in warfare highlight the potential benefits and concerns associated with their use. While these technologies can be leveraged to enhance military capabilities, there are ethical, safety, and interpretational challenges that need to be addressed. Targeted and specific principles related to the military use of AI are necessary, and conferences and summits play a crucial role in driving these discussions forward. The impact of AI on targeting precision and civilian protection is significant, but it also raises concerns about the escalation of conflicts. Ultimately, finding a balance between innovation, ethics, and regulation is essential to harness the potential of AI in warfare while minimizing risks.

Shimona Mohan

The discussions highlight the significance of ethical and responsible AI methodologies in military applications. Countries such as the United States, United Kingdom, and France have already implemented these strategies within their military architectures. However, India has chosen not to sign the global call for Responsible AI, prioritising national security over international security mechanisms and regulations.

The absence of national policy prioritisation of military AI poses challenges in forming intergovernmental actions and collaborations. Without a clear policy framework, it becomes difficult for countries to establish unified approaches in addressing the ethical and responsible deployment of AI in the military domain.

Gender and racial biases in military AI are also raised as important areas of concern. Studies have shown significant biases in AI systems, with a Stanford study revealing that 44% of AI systems exhibited gender biases, and 26% exhibited both gender and racial biases. Another study conducted by the MIT Media Lab found that facial recognition software had difficulty recognising darker female faces 34% of the time. Such biases undermine the fairness and inclusivity of AI systems and can have serious implications in military operations.

The balance between automation and ethics in military AI is emphasised as a crucial consideration. While performance in military operations is vital, it is equally important to incorporate ethical considerations into AI systems. The idea is to ensure that weapon systems maintain their level of performance while also incorporating ethical, responsible, and explainable AI systems.

The use of civilian AI systems in conflict spaces is identified as a noteworthy observation. Dual-use technologies like facial recognition systems have been employed in the Russia-Ukraine conflict, where soldiers were identified through these systems. This highlights the potential overlap between civilian and military AI applications and the need for effective regulations and ethical considerations in both domains.

Additionally, the potential of AI in contributing to bio-safety and bio-security is mentioned. A documentary on Netflix titled “Unknown Killer Robots” showcased the risk potential of AI in the generation of poisons and biotoxins. However, with the right policies and regulations in place, researchers and policymakers remain optimistic about preventing bio-security risks through responsible and ethical AI practices.

In conclusion, ethical and responsible AI methodologies are crucial in military applications. The implementation of these strategies by countries like the US, UK, and France demonstrates the growing recognition of the importance of ethical considerations in AI deployment. However, the absence of national policy prioritisation and India’s refusal to sign the global call for Responsible AI highlight the complex challenges in achieving a global consensus on ethical AI practices in the military domain. Addressing gender and racial biases, finding a balance between automation and ethics, and regulating the use of civilian AI systems in conflict spaces are key areas that require attention. Ultimately, the responsible and ethical use of AI in military contexts is essential for ensuring transparency, fairness, and safety in military operations.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more