Internet Governance in Times of Conflict | IGF 2023 Open Forum #152

11 Oct 2023 02:30h - 03:30h UTC

Event report

Speakers and Moderators

Speakers:
  • German Federal Foreign Office, Co-host
  • AccessNow, Co-host
  • CyberPeaceInstitute, Co-host
  • ICANN, Co-host
  • Co-hosts from Korea, Israel and Argentina, None
Moderators:
  • Nicole Manger, Onsite Moderator
  • Max Schuhmann, Online Moderator

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis examines a series of speeches discussing the issue of internet shutdowns and their implications. The speakers express grave concern over the seriousness of internet shutdowns and advocate for the imposition of sanctions on those responsible. They argue that internet shutdowns violate humanity and have far-reaching consequences on safety, health infrastructure, and access to information.

One speaker emphasises the need for better early crisis warnings and suggests integrating internet shutdown indicators into forecasting procedures for crisis surveillance. By recognising internet shutdowns as crisis indicators, governments and relevant authorities can respond more effectively to impending crises.

The importance of private sector governance in protecting the internet against political pressures is highlighted. The International Corporation for Assigned Names and Numbers (ICANN), which operates as a private corporation with multi-stakeholder representation, is praised for its ability to resist pressures to remove domain names or participate in political sanctions. This private sector governance is valued as a key characteristic in safeguarding the internet against subordination to military and political ends.

The analysis raises concerns about internet access and digital transformation in conflict areas. It highlights the negative impact of the Taliban takeover in Afghanistan, where the digital transformation project funded by the World Bank was halted. Furthermore, the potential problem of the military owning internet service providers is mentioned, as it raises concerns about impartiality and the potential for censorship.

The role of social media networks and platforms in crisis management is discussed, with a call for better coordination with stakeholders and civil society. It is observed that people are more likely to rely on social media apps for reporting incidents or following news rather than traditional websites.

One speaker emphasises the need for clarity on how international humanitarian law should be applied in digital warfare situations where physical force is not involved. The use of cyberspace, spyware, and internet shutdowns in warfare creates challenges in interpreting and applying the rules of distinction, targeting, proportionality, and humanity.

In conclusion, the analysis highlights the gravity of the issue of internet shutdowns and advocates for sanctions as a means to address the problem. It calls for better early crisis warnings, the integration of internet shutdown indicators, and recognises the importance of private sector governance in protecting the internet. The challenges surrounding internet access and digital transformation in conflict areas, the potential concerns with military-owned internet service providers, and the pivotal role of social media networks in crisis management are also discussed. Finally, there is a need to clarify the application of international humanitarian law in the context of non-kinetic warfare involving cyberspace, spyware, and internet shutdowns.

Roman Jeet Singh Cheema

Access Now, a renowned digital security organization, receives daily requests for assistance in digital security issues. They prioritize global cybersecurity policy and advocate for the application of human rights law in Internet Governance. Access Now has observed an alarming increase in surveillance-related measures and spyware attacks targeting civil society, posing risks to individuals and communities.

One of Access Now’s key concerns is internet shutdowns. They strongly oppose decisions that lead to blacklisting the internet in specific regions, seeing it as a dangerous precedent. The organization actively works against internet shutdowns, recognizing the potential dangers they bring.

Access Now emphasizes the importance of reaching global consensus on various aspects of internet governance. They argue for the protection of cybersecurity incident response teams during times of conflict, asserting that emergency responders should not be targeted. They believe this principle should be extended to similar teams.

Regarding international governance conversations, Access Now supports the idea, advocating for stricter standards against cyber destructive activity. They express concern about separating and creating different internet standards, preferring a reduction in conflict over a permissive approach. They emphasize the need for preventive measures to address cyber conflict and establish stronger international governance norms.

Access Now highlights the universal unacceptability of internet shutdowns, noting that they are often used to hide impunity, violence, and targeting. They call for consequences for states that consistently perpetrate internet shutdowns and urge member states to demonstrate stronger commitment.

Lastly, Access Now advocates for active prevention of internet shutdowns through international media attention and domestic challenges. They believe the UN system, including organizations like the WHO, should play a more active role in addressing and preventing internet shutdowns.

In conclusion, Access Now, as a digital security organization, assists with digital security issues and pushes for global cybersecurity policy. They emphasize the application of human rights law in Internet Governance and oppose decisions that blacklist the internet. Their goal is to establish stricter standards against cyber destructive activity and prevent internet shutdowns through international governance conversations, media attention, and domestic challenges.

Mauro Vignati

During armed conflicts, the internet infrastructure often experiences disruptions, which have negative implications. The ICT infrastructure is frequently targeted or taken down, causing significant disruptions in communication and information flow. This poses challenges for civilians, as their ability to receive relief operations and maintain contact with their families is severely affected.

Furthermore, the absence of specific technologies in conflict zones hampers the work of international organizations. These organizations need to operate on both sides of a conflict to provide critical assistance and support. However, the disruption of technology makes it difficult for them to coordinate and execute relief operations effectively.

One of the underlying issues is the lack of distinction between civilian and military internet use. The internet architecture was not originally built to differentiate between these two categories. Consequently, during conflicts, civilian infrastructure often becomes disrupted, as it is not protected or prioritised. To address this, there is a need to establish clear guidelines and mechanisms to distinguish and protect civilian infrastructure from military targets.

Addressing this issue, it is recommended that the state takes measures to segment data and communication infrastructure used for military purposes from civilian ones. This segregation would help protect civilian infrastructure and ensure a more efficient and secure digital environment during conflicts. Additionally, tech companies should also consider implementing segmentation when providing services to military or civilian entities to prevent unintentional disruptions or compromise of civilian infrastructure.

Looking towards the future, it is vital to carefully consider how the digital infrastructure should be structured. As conflicts continue to evolve and technology advances, it is crucial to establish a robust and resilient digital framework that ensures the smooth operation of critical communication and information systems.

The International Committee of the Red Cross (ICRC) plays a significant role in conflict management and humanitarian efforts. They work in more than 100 countries and are devoted to upholding International Humanitarian Law (IHL) during conflicts. This includes the protection of critical civilian infrastructure and refraining from targeting civilian objects.

The ICRC also advocates for the consideration of data protection within IHL. They aim to convince states to include data protection as an essential aspect of international humanitarian standards. Recognising the importance of data as an object to be protected aligns with the increasing reliance on digital infrastructure during conflicts and the need to safeguard sensitive information.

In conclusion, during armed conflicts, the internet infrastructure is often disrupted, impacting civilian access to vital services and hindering the work of international organizations. The differentiation between civilian and military internet use, along with the segmentation of data and communication infrastructure, is crucial to protect civilian infrastructure and ensure an efficient and secure digital environment. As conflicts continue to unfold, it is essential to consider the future of digital infrastructure and uphold International Humanitarian Law to safeguard civilian lives and maintain connectivity in conflict zones.

Moderator – Regine Grienberger

Global internet governance is facing significant challenges due to conflicts occurring between different groups and nations. These conflicts include the ongoing Ukraine war, terrorist attacks in Israel, and military coups in the Sahel region. The competition between authoritarian and liberal systems further exacerbates these conflicts, along with the global north-south divide concerning justice issues.

Regine Grienberger highlights the negative impact of these conflicts on global internet governance. This sentiment is supported by the fact that these conflicts impede the stability and functionality of the internet. In response, Grienberger emphasizes the importance of protecting the global, free, and open internet. Governments often intend to preserve internet freedom, but their actions can inadvertently undermine these efforts. Additionally, interfering with the architectural characteristics of the internet poses significant dangers.

Regarding potential solutions, it is noted that sanctions should not be the first response against internet shutdowns. Sanctions are viewed as a complex diplomatic instrument and not the primary course of action in addressing this issue. Instead, it is crucial to integrate internet shutdowns as a crisis indicator in early warning and forecasting procedures. By incorporating this information into crisis management protocols, social upheaval, riots, and civil wars can be prevented.

In the context of the digital divide, it is revealed that nearly 12 percent of the Sustainable Development Goals (SDGs) have regressed rather than progressed. Despite this, collaboration between countries through digital partnerships remains a viable solution. Estonia, for example, actively engages in digital cooperation with almost every country, including initiatives in Afghanistan. This showcases the potential of digital cooperation to address global challenges in an increasingly divided digital landscape.

In conclusion, conflicts between groups and nations pose a significant threat to global internet governance. The need to protect the free and open nature of the internet is emphasized, alongside urging governments to be mindful of unintentional interference. Furthermore, while sanctions should be approached cautiously, integrating internet shutdowns as crisis indicators and fostering digital cooperation contribute to mitigating the challenges presented by conflicts in the digital realm.

Nele Leosk

The analysis examines the role of cyberspace and technology in modern conflicts, focusing on the war in Ukraine. It highlights the negative impact of cyberattacks on Ukraine’s telecommunication infrastructure and their ripple effects on other countries. These attacks disrupted telecommunication services, and they often preceded physical attacks during the war. The analysis also emphasizes the importance of digital society and secure infrastructure in combating cyberattacks, citing Estonia’s secure digital identity system as an example. It stresses the need for collaboration between the private sector and governments to maintain data and services during conflicts. The analysis further addresses the increasing targeting of everyday services, like hospitals and schools, by cyberattacks and their detrimental effects on individuals. It highlights the significance of public goods and digital public infrastructure in democratizing and making states more accessible. Estonia’s collaboration with Finland and Iceland on digital solutions is also discussed, emphasizing the benefits of global collaboration. Overall, the analysis underscores the urgent need for robust cybersecurity measures in modern conflicts and advocates for cooperation and innovation to address these challenges effectively.

David Huberman

The functionality of the internet on a global scale is attributed to the adoption of common technical standards, which guarantee interoperability. These standards are developed by engineers around the world who contribute their expertise to ensure the quality and efficient operation of the internet. The internet’s infrastructure relies on a system of routing and domain name system (DNS), which everyone voluntarily adopts. This system enables the internet to work uniformly across different regions.

Another crucial component that supports the functioning of the internet is the root server system. This system ensures that all DNS queries work smoothly, allowing users to access websites and online services. Even during times of conflict, if regional root servers are taken down, it does not significantly impact internet users. This resilience is a testament to the robustness of the root server system and its ability to maintain the internet’s accessibility.

The governance model of the technical layer of the internet plays a pivotal role in keeping the internet online for everyone, even when individual systems go offline. This governance model is particularly effective during times of conflict, ensuring that the internet remains operational and accessible to users. It provides a framework for coordination and cooperation among various stakeholders to address challenges and maintain the internet’s functionality.

Building and securing the internet is no longer solely an engineering endeavor. It requires a collaborative effort involving multiple stakeholders, including civil society, government, academia, and engineering. The internet has become a matter of national security for countries, and the preservation of its public core must be achieved with neutrality. Recognizing the real-world implications, stakeholders from different sectors come together to ensure the security and stability of the internet.

Economies in transition or remote areas prioritize the construction and development of the internet to connect their people and share information with the rest of the world. Once initial construction is complete, securing the internet becomes a crucial focus to prevent vulnerabilities that may compromise the economy and infrastructure.

The Internet Corporation for Assigned Names and Numbers (ICANN) is tasked with ensuring the security, stability, and resilience of a part of the internet through its multi-stakeholder model. This model has proven effective in maintaining the internet’s functionality during times of conflict, as acknowledged by David Huberman when appreciating Dr. Mueller’s explanation of its efficacy.

In conclusion, the internet’s functionality and continued accessibility are made possible by the adoption of common technical standards, the resilience of the root server system, and the effectiveness of the governance model of the technical layer. The collaboration of multiple stakeholders and the recognition of the internet’s security implications play a vital role in building and securing the internet globally.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more