Diplo Internet Governance Community

Stay networked. Get informed. Broadcast your projects.

8.30 Shuttle from hotels
9.00 Briefing at the Diplo booth at IGF Village (must come)
9:30 Main Session Workshop "Managing Critical Internet Resources" - Transition from IPv4 to IPv6, ITU (recommendation)
10.30 Debate at Diplo booth: "Should ITU and ICAAN merge into one organization on Internet" (recommended)
11:00 Workshop 59. Building a Global Capacity Building Curriculum Framework and Primer for Internet Governance (recommended)
15:00 Open dialog. Transition from IPv4 to IPv6: Arrangements for Internet governance – global and national/regiona (recommended)
16.30 Best Practice Forum - Internet Governance Capacity Building Internet Governance Capacity Building, Diplo (must come)
18.00 Evaluation of the day (must come)
19:00 Simulation (at hotel)

FYI: December the 5th is the International day of Volunteering.

Views: 121

Replies to This Discussion

i am a panelist on the 9:30 freedom of expression workshop. I recommend it .
Nkurunziza Jean Paul : Programme for day 3 : Friday, 5th December 2008 ( updated)

9: 30 to 11: 00’ : Panel Discussion : Managing Critical Internet Resources :Transition from IPv4 to IPv6 : Main session Room
11:00 to 13:00 : Best practice Forum “The European approach to empowering and protecting children online : Room 3
13:00 to 14:00 : Diplo Booth
14:00 to 15:30 : Best practices forum : Equal access, equal opportunities : Room 6
16:30 to 18:00 : Best practices forum Internet Governance capacity building : Room 7
will be there from 10:30 have some morning appointments
will attend
1 Debate at Diplo Booth
2. Open Dialog on Transition from IPv4 to IPv6
3. Best Practice Forum and the Evaluation discussions.
930-1100 Panel Discussion Transition from IPv4 to IPv4

Based on several studies it is projected that IPv4 addresses will be globally exhausted by 2011 however address space will still be available at a local level. Seamless take up of IPv6 is expected with the exhaustion of IPv4 and there is on going discussion – to define policy to facilitate smooth transition for operators and ensure that new comers have minimum IPv6 address space allocation to start up business.

The following issues were discussed from different perspectives:

Issues from operators’ perspective:
- Deployment of IPv6 enabled equipment in the core networks should be done increment – however uptake is low because there is no extra revenue generated with the implementation of IPv6 i.e. the lack of commercial drivers. However this is expected to change with the as customer numbers grow.

- Need for upgrade – therefore operators from developed countries stand at an advantage as they have the resources and are nearly exhausted their local allocations.

- Getting operational experience is a challenge – there is need to invest in operational tools to run IPv6 in terms of software configuration utilities management and trouble shooting

- Participation in standardization – where users have equipment that supports only IPv4 – how do they access services that are available only on IPv6-based networks? The IETF is working on the transition mechanisms however the co-existence of both protocols is expected for a long time

- Operators are pushing for IPv6 support in customer premise equipment (CPE) as well as software that supports the new protocol version. However it is expected that legacy applications will be available in the foreseeable future

Issues from a vendor perspective
- Transition has been going on for some time in the vendor world. The transition has been a long process for vendors and operators – in terms of getting the technology and standards ready

- As IP is the core of the internet – transition to ipv6 – is significant particularly with the increase of IPv6 enabled devices connected to the internet specifically mobile phones

- need to understand technology and therefore need for operational and implementation experience

- managing customer demand/expectations for IPv6 enabled services and devices

- cost of staff training

- there are mistakes that will be made – therefore need for mutual support in the implementation of v6

Social and economic perspectives-
- Transition should be cooperative endeavour with social and economic and policy considerations

- Gradual implementation and interoperability between IPv4 and v6 expected so as to preserve the investment already made

- There is a general understanding that IPv6 will compliment and supplement the existing IPv4 as well as provide improved routing, multicasting, efficient infrastructure. The following questions however arise:

o The advantages that IPv6 offer are good reasons to invest in the new IP version.
o Would transition be transparent and would backward compatibility required

- Users want the stability of the internet to be maintained and hope that IPv6 will offer opportunities for addition to personality features on the internet – this is what makes the business case

- In the India case there are a large number of service providers – and there is only a 1/8 usage – therefore demand is low – the need to enhance cultural diversity however provides opportunities to create demand through local content development including E-government programme and Info-tainment

- It is important to break the myth that IPv6 is a new internet - It is not a new internet rather continuation of the internet

- The main benefit is the address space addition- which may allow for efficiency

- There is no need to establish a deadline or regulate the implementation of IPv6 – as it will be market driven. Additionally users should have rights to use IPv4 and IETF is working on coexistence

Policy perspective
- With the impending exhaustion of IPv4 – further implementation will be problematic – as not all players will support transition therefore it is important to examine measures – for continued use of IPv4 and possible migration of users to private IPv4 address space

- creation of action plan to be implemented by 2010 – for example offering of incentives such as tax exemption and capacity building

- examination of existing programmes and mechanisms

- establishment of taskforce of IPv4 exhaustion

- the messages of ISPs is that they must carry IPv6

- IPv4 scarcity and demand for more security are the 2 major challenges driving the uptake of IPv6

- Institution of market transfer or reclamation mechanisms of IPv4 resources not required by local internet registries to the regional internet registries when transition to IPv6 is implemented. However this would be a challenge as RIRs have no contractual authority this may create a grey market. This challenge may be overcome through a loose membership association that allows others to use others resources

- Institution of secure routing objects including PKI to authenticate users raises governance/control issues – RIRs have centralized control which may make it efficient and better able to address security issues this makes an RIR an central governance institution. Membership of security/government associations in the RIR would result in infiltration of technical, policy agendas that may make the transition to IPv6 complicated

- However it is argued that RIRs should remain neutral and trans-national institutions which:
o maintain a homogenous technical group
o maintain a bottom-up approach in policy making
o guarantee the stability of the internet and business continuity of members

- main challenges in the deployment of IPv6 include:
o lack of public education, information and skill
o limited network policy decisions to make deployment happen
o lack of incentive to deploy ipv6
1100-1230 Workshop 59:Building a global capacity building curriculum framework and premier

- Integration of IG capacity building in existing ICT and public policy courses was advocated.

- The training may be offered either online, offline or through short term executive courses.

- Collaboration between different stakeholders who have different needs is imperative in order create an understanding of the issues arising from increased used of the internet particularly those that transcend the geographical, and cultural borders.

- internet security awareness programme set up in India

- Presentations on the Diplo IG capacity building programme – including a demonstration of the online platform.

- The Diplo approach includes the training course (foundation and advanced), policy research, policy immersion and community interaction.

- The impact associated with the IG capacity building programme have been varied and impressive including the establishment of IG governance masters programme in Srilanka and the use of telecentres to disseminate IG related information.

- Diplo has successfully offered the training to professional worldwide for the last 4 years leading to the establishment of national, regional and global community
1400-1530 Workshop 29: Building confidence and security in the use and security in the use of ICTs for African countries

Main challenges in Africa
- lack of infrastructure
- lack of services

Therefore opportunity to learn from mistakes in developing countries and establish of computer emergency response team currently there is only one active CERT in Africa in Tunisia, South Africa is in the process of setting up a CERT with the deadline of 2010 before the FIFA world cup. While countries such as Morocco, Kenya and Ivory Coast are thinking about set in up CERTs.

The approach in dealing with Cybersecurity in developing countries

Success of Cybersecurity is based on 3pillars

1. technology pillar – ICT/security tools –including:
o PCs / networks, physical security tools, data tools (storage media and cryptography), availability of infrastructure and application (redundant servers and PKI)

2. Methodology pillar – policy, procedures and regulations on three levels:
o managerial level (security policy, management procedures and capacity building, audit) Legislative level (law and regulation)
o operational level (acces control rules, implementation plans, monitoring, watch, incidence handling)
o continuity of services level ( business continuity plan, crisis management, drill exercises)
- actors in this pillar include the government, security professionals and users

3. Social behaviour pillar – creating a culture of cyber security
o cultivate culture of cyber security through continuous action of raising awareness using diverse media/channels
o the target audience includes managers, decision makers, security, children, parents, teachers


Case study: CERT-TCC - Tunisia

The functions of the CERT include:
- Watch- collect information from different sources eg CISCO, HP. Microsoft, network of CERTs, community of hackers
- Training
- Coordination
- Response
- Incidence handling
- Incident analysis
- Awareness
- Warning alert

Key issues:
• Information, warning and alert – carried out to in collaboration with ISPs, managers decision makers, internet community through mailing list, call centre, media

• Oriented campaign – utilizing prospectus, posters, email, radio, cartoons, video, attack simulation and guides

• Incident handling - training in new tools

• Coordination important in the effective functioning of the CERT – incident coordination procedures and information including regional CERTs, other CERTs within the country (for example Brazil has more than one CERT), ISPs and operators, vendors and integrators, and national authorities.

Need for the formation of CERTs in Africa however the challenges of lack of “know how” in IT security need to be overcome through:
- capacity building
- encouragement of the development of national solutions based on open source components
- improved R&D capabilities and making it more responsive to urgent needs
- encouraging academic research in the important topics of security (cryptography, methodologies…)

My comment: Here I see an opportunity for a research project before the IGF 2009 in Cairo – on culture of Cybersecurity in Africa taking case studies of various African countries which I would like to be engaged in.


The following questions and comments were raised:
- the need for social engineering through the creation of a culture of cyber security to be addressed specifically because of the increased requirements by government to obligate to provide subscriber identification information

- how can African countries start up a cert- through collaboration for example with existing CERTs

- in establishing a culture of cybersecurity – consideration should be given to the fact that there are different social cultures in different countries however there is consensus on issues such as child pornography, identity theft

- how can a regional approach be developed where there are differences in level of ICT infrastructure and use of infrastructure in the delivery of services, what tools can be used to encourage decision makers to be involved in the issues of cyber security?

o It was recognised that funding and expertise was required for example AFDB, World Bank and Islamic Bank while ITU have regional workshops on cyber security
o As African countries build on infrastructure and services – there is an opportunity to learn from those that have already developed CERTs.

- How does the CERT monitor traffic: with the collaboration of ISP and operators as well as supporting legislation

- Regulators need to advice the government to use ICT in development – this is a manifestation of government commitment

- The role of policy making was emphasized – as it provides government commitment to using ICT for social economic development and governance and consequently support for cyber security initiatives – including the formulation of legislation.

- There should not use a piece meal approach to cyber security to prevent ineffectiveness for example Mauritius has electronic transaction act but PKI not yet established.
Protection of Personal Data and Privacy in the Information Society: towards an international instrument with a global reach?

Synopsis: Europe has had a strong legislative platform for data protection for quite some time. Privacy and data protection are no longer considered separate rights. These rights mirror an individualistic component, prevents others from interfering with personal and family life. The IBM presenter argues that privacy technology is very important because laws may not be adequate on their own. The issue is that its not just one database with personal data but a pattern of browsing etc represent a complex mesh of interactions and shows ones pattern of thought and personality.

The trouble with PKI encryption is that it reveals more than is necessary for the transaction.

OECD Ministerial

Synopsis: Online advertising revenues increasing rapidly but still only 1/5 of television advertising. Consumer behavior being predicted to create niche markets. Users are not fully aware of implications of sharing info on online social networks e.g Facebook

Should personal data be a commodity? Depends on your expectations, and trust of the organization, depends on the context, different types of data. Businesses need to be transparent about their business ties and the purpose for data collection, legal documents written in very technical terms.

Behavioural targeting on the Internet is still in infancy but massive gathering is being done at present. Privacy concerns from profiling and data mining. Non-relevant advertising is seen as annoying but relevant advertising more acceptable. Credit card fraud is detected by data mining applications and this is a useful purpose.

I also attended Diplo’s capacity building workshop. They presented the online training and methodologies of the Diplo and students have their experiences which were very positive. Commonwealth Connects was also presented as a means of maximizing return on limited human resource capacity. Marilia went through the steps of remote participation and highlighted the fact that there are approximately 2000 remote users participating through the Dimdim platform.

I also participated in the ICANN and ITU debate and posted my arguments under the debate group. I visited a number of booths such as IMPACT which is doing interesting work on Internet security and threat prediction and interception in partnership with ITU. I visited the ITU booth and we discussed whether or not the organizational structure was evolving to deal with Internet issues. There were o specific changes in its structure to reflect this. I also gathered some materials from the child online protection agency. I did some networking today with ICANN officials, thought provoking conversations about ICANN and developing countries. I spoke with a member of the GAC and he was of the view that it needed to play a greater role but ITU was not the agency to take over full Internet governance because it did not have the flexibility to respond quickly to changes. It was also subject to political interference.
1st I attend today ipv6 translation in the main Hall, In the beginning They take brief about the ipv6and its important in IG, security, growth the users of Internet.
Some expert expect that 15% of global network ready to transform to ipv6, and there is period of time ipv4 will work with ipv6.
The developing country need more time to transform to ipv6, one problem hoe to install it, how adapt the programs with ipv6, need to learn the users how to use it spatial the end user (the is the task of ipv6 task force).
Then the Nokia research shows the important of ipv6 to mobile because now there are 4 billion mobile lines in the world!! And the no. wills growth rapidly.
The unity, integrating and harmony between the programs and ipv6 is important, ipv6 will take security
The Japan experience in ipv6: they prepare the infrastructure, and then they make training to the engineer how concern, then make media activity and inform the users about the benefit of ipv6.
Then I am meeting IMPACT institution that’s followed to ITU, and its specialize in cyber security, they take me a lecture about how to built the IPV6TF in Iraq, and he encourages me to attend the task force group specially they have task force meeting around the world.
Then I attend IGCBP session by Diplo, 1st there is present of Diplo IGCBP and how its work. And information about the students and their backgrounds, present the advantages of Diplo study.
About my opinion about that I want to say it in the meeting is IGCBP is a good example for e-learning program , and in this few months its make change in my life , one thinks I want to add to Diplo distinguished is the team work spirit , although its NGO , and I work with government and NGOs and not seen like this team work !!
Transition from IPv4 to IPv6 . Dec. 5. 9.30 -11.30

the chair, Gulshan Rai, started the session commenting the fact that there are more than 3 billion mobile connections and 1 billion Internet users, thus IPv6 addresses will be enough for the foreseen growth.
And he mentioned the efforts that many countries are taking for upgrading to Ipv6, like Japan, Korea, U.S., Europe and India.
He leaded the Indian Education research network, which has a successful experience in ipv6 transition.

Bernadette Lewis, Secretary General, Caribbean Telecommunication Union (CTU), Trinidad and Tobago, the moderator of the panel, said that although the IPV6 was created in 1999, the deployment has been slow. She suggest that the stakeholders and communities have to work together for achieving a smooth transition from IPv4 to Ipv6 (cooperative actions). It's important to see the social and economic implications. So she asked the panels the challenges and hurdles this issue rises.

Adiel Akplogan, AFRINIC, expressed the concern about the fact that the networks operators have not implemented Ipv6.
Regarding the policy process of these Internet resources, he stressed the bottom up and open model of the process for developing policy in many regions, where the communities debate and define policy that will soften the transition (Regional Internet Registries framework).
15% globally of networks are ipv6 ready.
Ipv6 and Ipv4 will coexist longer.
Predicted Ipv4 depletion date: 2010-2011

Kurtis Lindqvist, Netnod, operator perspective.
Upgrading equipment is slow.
There is not commercial driver for operators to move to IPv6
Obstacles for the sector:
-There is not real customer demand of Ipv6
-he said that they can't charge extra fee to the clients for accessing their favorites websites with another protocol.
-Vendors has charged the operators extra fees for IPV6 support, but operators cannot charge extra fee for the final client e.g for accessing their favorites websites with another protocol.
-costs related to hardware and software, training, and human resources hours for doing the conversion.

But in general vendors are starting to offer IPv6 as part of their product offers.
He questioned about the clients that will only support Ipv4, and said that IETF is working on mechanisms to reach the ones that use Ipv6 (translation mechanisms between v4-v6)

Jonne Soininen, Nokia, Finland. Remarked some actions of cooperation between vendors and operators. They adopted the new protocol very early for their products, and
their peer companies also have introduced ipv6. The PC and O.S manufacturers have also introduced it, and said that many people are already running it but without realize it.

Tulika Pandey, Government of India. Talked about their promotion and good adoption of Ipv6. They have an e-governance project in India, to show the citizens the importance of Internet as a tool, its advantages and remarked that education and entertainment are keys for the demand of IP addresses.

Satoru Yanagishima Director of Internet Policy, Ministry of Communications , Government of Japan
-Japan focus on making IPv6 the standard Internet service for their customers.
-they have a study group on Internet Smooth Transition to Ipv6. August 2007 - June 2008, which its tasks are: estimate the exhaustion date of international IPv4 addresses, and the problems of that; examine the programs of the measures and solutions.
-IPV6 Task Force

Final Remarks by Bernadette:
-need of public awareness, education and training.
-need for private, public sector and civil society to be involved in the process (multistakeholder process), responsibility of promotion and enabling a smooth transition from IPv4 dominance to an environment where IPv6 becomes dominant.
11:30 - 13:00 MAINSTREAMING HUMAN RIGHTS IN THE WORK OF THE IG

Please allow me to just highlight some points here on specific issues in relation to human rights:

Multilingualism and Human Rights:

[1] Education at all levels
[2] Promote software localization
[3] Documenting of languages spoken mostly in oral context
[4] Implementation of Language Policy

A2K and Human Rights

Lea Shaver (please correct me if I got the name incorrectly) of Yale Law School pointed out that "governance" of any sort should reflect and respect human rights. She also made an example of the A2K movement that should be persuaded to employ a rights- based approach. She added that A2K is considered a human right and as a benefit to access of resources, e.g., access to scientific progress.

Privacy and Human Rights

Ralf Bendrath believed that privacy issues pertains to human rights. In other words, privacy is a human right and that the emerging issue of digital identity is reflective of what was discussed in the WSIS 2005, in parargraph72.

Article 19 and Human Rights


The speaker mentioned about the insistence of China that there is no principle in the Human Rights Declaration.

In conclusion, the general population might not consider rights on the internet. If this is the case, it is better to translate that right to access to knowledge, as there are networks that are possible to create. Also, there is that need to simply agree on the technology to use.
Arrangements for Internet Governance, Global and National-Regional
Dec. 5. 11.30-13.00

Emily Taylor, Nominet (UK), Director of Legal and Policy, the moderator,
gave an introduction of the framework of the panelists exposition. The phrase "enhanced cooperation" that appears in the final resolution of the Tunis Agenda, is was not well defined it scope. But in general the speakers talked about arrangements at all levels for the management of critical Internet resources, naming, numbering, etc.

Haiyan Qian, Director, Division for Public Administration and Development Management, UNDESA, presented the survey they did to the number organization requesting an annual report on enhanced cooperation on the public-policy Internet issues. Target Organizations: Council of Europe, ITU, ICANN, ISOC, NRO, OECD, UNESCO, WIPO, and W3C.
She talked about the results and conclusions of the reports:
-the general adopted concept for enhanced cooperation comprises: facilitate and contribute a multistakeholder dialogue, formal or informal cooperative arrangements.
-importance of sharing experiences, funding, building consensus for transmitting technical knowledge and training.

Everton Lucero, Ministry of Foreign Affairs, Brazil, presented arrangements at the three levels, national, regional and global.
He talked about the brazilian initiative of combating online child pornography, that involves many stakeholders, like google, law enforcement agents, and nongovernmental organizations. A great achievement about this topic of highly national concern.
Regional initiative, he criticized the Convention on Cybercrime, ACTA, as their decision making process are restricted, behind-doors arrangements to negotiate new legal instruments.
At the global level, he stressed the positive performance that the NRO (Number Resource Organization), bottom-up process, transparency in decision-making, full participation of all with independence.
And remarked the lack of this concept in the ICANN framework, because although is a non for profit organization, it's a market driven (domain names) and ICANN is under the oversight of U.S. It should be avoided the restricted models and be driven by one government.
The Internet is supposed to be centered on people, not money.

Parminder Singh, IT for Change, said that the enhanced cooperation concept were created because the perception of Inetrnet changed, from technical infrastructure to a strong social political force, thus it needs to be driven by public interest.
And remarked the characteristics that Internet should focus, a people-centric Internet, development oriented and inclusive Information Society.
He notice many changes within ICANN, RIRs and other technical organizations, and said that these changes are at thanks to the good impact of the WSIS.



Raul Echeberria, IGF MAG member and CEO of LACNIC, mentioned the ambiguity of the expression enhanced cooperation.
The enhanced cooperation is the challenge to improve the relationship between stakeholders, enable the participation of all stakeholders in the policy development process. Enhanced cooperation is a living concept and process.
He talked about how LACNIC has strengthen the relationship with the regional stakeholders, governments, private sector, civil society, it participate in intergovernmental organizations in an equal footing with governments. And governments of the region are more involved in LACNIC activities.
There are some forums that do not exactly go in the enhanced cooperation direction, and there is a need to improve that. In this sense he gave the example of the WTSA of ITU at the end of October, because many relevant issues which were discussed in this Assembly, are related to things that other stakeholders are doing, but there is not a clear process to participate in the decisions, in an equal footing with the governments.
Repport for Nkurunziza Jean Paul for day 3 : Friday, 5th December 2008.

Session 1 : 9: 30 to 11: 00’ : Panel Discussion : Managing Critical Internet Resources :Transition from IPv4 to IPv6 : Main session Room
The session was rich, we got points of view from vendors, operators and policy makers.
The fact is that we are going to have a shortage of IPv4 ( 32 bits ) adresses in 20012. The IPv6 ( 128 bits) will allow many advantages as the number of addresses available will respond for instance to the mobility applications and devices to be introduced on the market. Technically, the IPv6 will allow autoconfiguration, but the user will still have to take security measures. Also, there must be a soft process of cohabitation between the 2 versions. Technician are now studying the problem of interoperability.
It’s forseen that IPv4 devices are going to disappear due to the market exigencies but some users and some applications may choose to stay on IPv4.
For a smooth evolution, Japan Government had set up a task force of diverse stakeholders to prepare a plan of action.

Activity 2 : The Diplo debate : Diplo Booth
The subject was : for or against the marriage of ITU and ICANN to form a new international organization in charge of Internet Governance ?
The group “FOR” has lost the debate. But, it have seen that ITU and ICANN could just have dinners together and each one continue to deal with it’s issues. It looks that for Internet, an international organization in the traditional way won’t be suitable

12:00 to 13:00 : Best practice Forum “The European approach to empowering and protecting children online : Room 3
13:00 to 14:00 : Diplo Booth : 6 visitors. One of them wanted to get the booklet on IG in Spanish. The others are interested to apply for the forthcoming IGCBP.

14:00 to 15:30 : Best practices forum : Equal access, equal opportunities : Room 6
This session didn’t happen. We went into the room, we waited for one hour and no panellist was present after that time. Meanwhile, we were asking the organising team members if it will happen and were told to wait. But in vain.

16:30 to 18:00 : Best practices forum Internet Governance capacity building : Room 7
The panel was held by Diplo. Views on the online platform for IGCBP were shared. The advantages of online ecosystem like the fact that everyone has to learn on his own pace were highlighted. Techniques used to simulate the real class even behind a computer screen have been discussed. At the end, we got experiences shared by students themselves.
After, the partnership in this program was evoked as well as the actions undertaken by diverse students in their local communities : The remote participation through DIM DIM was an initiative from alumni. It was recommended that other institution use online learning platforms to benefit of the information era.

RSS

Members

Groups

Follow us

Website and downloads

Visit Diplo's IG website, www.diplomacy.edu/ig for info on programmes, events, and resources.

The full text of the book An Introduction to Internet Governance (6th edition) is available here. The translated versions in Serbian/BCS, French, Spanish, Arabic, Russian, Chinese, and Portuguese are also available for download.

Interviews


Karlene Francis (Jamaica)
Ivar Hartmann
(Brazil)
Elona Taka (Albania)
Fahd Batayneh (Jordan)
Edward Muthiga (Kenya)
Nnenna Nwakanma (Côte d'Ivoire)
Xu Jing (China)
Gao Mosweu (Botswana)
Jamil Goheer (Pakistan)
Virginia (Ginger) Paque (Venezuela)
Tim Davies (UK)
Charity Gamboa-Embley (Philippines)
Rafik Dammak (Tunisia)
Jean-Yves Gatete (Burundi)
Guilherme Almeida (Brazil)
Magaly Pazello (Brazil)
Sergio Alves Júnior (Brazil)
Adela Danciu (Romania)
Simona Popa (Romania)
Marina Sokolova (Belarus)
Andreana Stankova (Bulgaria)
Vedran Djordjevic (Canada)
Maria Morozova (Ukraine)
David Kavanagh (Ireland)
Nino Gobronidze (Georgia)
Sorina Teleanu (Romania)
Cosmin Neagu (Romania)
Maja Rakovic (Serbia)
Elma Demir (Bosnia and Herzegovina)
Tatiana Chirev (Moldova)
Maja Lubarda (Slovenia)
Babatope Soremi (Nigeria)
Marilia Maciel (Brazil)
Raquel Gatto (Brazil)
Andrés Piazza (Argentina)
Nevena Ruzic (Serbia)
Deirdre Williams (St. Lucia)
Maureen Hilyard (Cook Islands)
Monica Abalo (Argentina)
Emmanuel Edet (Nigeria)
Mwende Njiraini (Kenya)
Marsha Guthrie (Jamaica)
Kassim M. AL-Hassani (Iraq)
Marília Maciel (Brazil)
Alfonso Avila (Mexico)
Pascal Bekono (Cameroon)

© 2023   Created by Community Owner.   Powered by

Badges  |  Report an Issue  |  Terms of Service