Diplo Internet Governance Community

Stay networked. Get informed. Broadcast your projects.

8.30 Shuttle from hotels
9.00 Briefing at the Diplo booth at IGF Village (must come)
9:30 Main Session Workshop "Managing Critical Internet Resources" - Transition from IPv4 to IPv6, ITU (recommendation)
10.30 Debate at Diplo booth: "Should ITU and ICAAN merge into one organization on Internet" (recommended)
11:00 Workshop 59. Building a Global Capacity Building Curriculum Framework and Primer for Internet Governance (recommended)
15:00 Open dialog. Transition from IPv4 to IPv6: Arrangements for Internet governance – global and national/regiona (recommended)
16.30 Best Practice Forum - Internet Governance Capacity Building Internet Governance Capacity Building, Diplo (must come)
18.00 Evaluation of the day (must come)
19:00 Simulation (at hotel)

FYI: December the 5th is the International day of Volunteering.

Views: 121

Replies to This Discussion

Highlights of Day 3 at IGF Hyderabad

9.00am. The Protection of Personal Data and Privacy in Information Society
After our Diplo briefing, this was my first session. The panel described developments in their respective areas - Latin America, Europe and Africa - with regards to privacy and security issues. Each area has its own set of issues and the ways in which they are being addressed. The Microsoft presentation described an identity card which has been developed using cryptographic techniques to ensure individual privacy.

11.30am. Getting the Pacific Online – Access Challenges, Issues and Opportunities
Thanks to the initiative of PITA (Fred Christopher chaired the session), there was actually something at the IG Forum in India that addressed the issues of the Pacific. Richard Misak, CEO Telecom Palau, raised all the problems of internet connectivity experienced by Pacific countries. IT consultant Provind Sharmar explained the types of delivery models and the challenges to equipment on a Pacific island. An interesting addition to the panel was Maui Sanford (CEO PITA) who attended by skype from Tahiti and made a presentation about “Opportunities for Pacific Islands” and the importance of International collaborations. (More on a separate blog)

After the lunch break I was finally caught by Charity to do my interview for the Diplo film about the participants at the Forum and how they have built on the raised awareness of Internet Governance from their studies in their work in their own countries and other related studies.

4.30pm Best Practice Forum – Internet Governance Capacity Building
This was an interesting session for me as it provided an overall summary about the work of the Diplo Foundation and its role in enhancing knowledge about Internet Governance. There were contributions from Diplo staff who explained to model good internet governance practices especially the use of hubs to enable distance students to participate in this year’s Forum programme.
11.30am. Getting the Pacific Online – Access Challenges, Issues and Opportunities

This session was of interest to me because of the concerns of the Cook Islands with regards to:
1.Accessibility – a big issue - basic to internet governance
2.eGovernment Portal development – there is a need for a user-friendly model to coordinate already established online government information for use by the public and private sectors
3.Regulatory and Policy frameworks – this is an urgent area
4.Security – in order to use eGovernment to encourage economic development, especially in the outer islands, it need to introduce e-transactions and e-commerce but there is a reluctance by users because of a lack of confidence in the security of the internet and putting personal data online. How can we assure them that it will be safe ? What systems are already in place elsewhere that we can replicate in the Cook Is?

Today’s session was coordinated by PITA (Pacific Islands Telecommunications Assocn) and the panel included Fred Christopher (PITA), Richard Misak (Palau, CEO Telecom), Provind Sharmar (India, but working in the Pacific) and Maui Sanford (CEO PITA) who participated via skype from Tahiti.

Fred introduced the session and gave an overview of the programme including the importance of access - a critical feature of governance but the problems compounded by distances across wide expanses of water, sparse populations, least developed or developing nations, lack of skilled resources and strong frameworks, lack of the scale of economy, strong communal bonding and responsibilities, and very dependent on external funding and trying to do more with less,

Richard explained country issues and challenges which include: Reliance on satellite for internal, rural and outer island communications; Huge costs to deploy and maintain infrastructure and access to spare populations; Access cost making about 60-80% of costs; Different and mixture of technologies employed; Growing deployment of wireless applns via wire links; Business case for DSL; Small market issues; Skills and retention; Universal services: USO and USF: government assistance; Weak regulatory and policy frameworks. The Cook Islands network was explained with its double hop concentration and latency challenges (similar for French Polynesia but theirs is more complicated). There is a demand for growth but it is difficult to fulfil expectations. Cost of setting up is an issue for telecom providers. How can we deal with that?

Provind explained different types of delivery models in the Pacific, eg VSAT - Growing deployment of VSAT satellite communication. Systems, central site Hub or aggregation equipment and the remote terminal equipment; VSAT – very small aperture terminals suitable for particular terrains – Pacific islands are widely dispersed so VSAT can provide an option when no other terrestrial communication infrastructure is economically possible; Can also be used as a bandwidth delivery solution for WiMax and cellular ‘last mile’ distribution systems that is, to island resorts; They can be deployed really quickly as long as there is visibility towards a satellite – support costs are also lower; VSAT can be used for data, voice (VOIP or POTS), cellular backhaul, Wimax backhaul; So VSATs are used both as a backbone as well as for backups. CBAND has wider coverage and is available from several satellite producers throughout the Pacific. It is less susceptible to rain and weather but requires large antennas, making them expensive to purchase and expensive to install. Until recently it was the only option available in many locations. KU BAND can operate with smaller antennas, this reduces cost of logistics and installation. It is affected by rain fade much more than Cband, so careful system design is needed to maintain availability of services. A narrow beam of Ku band has been considered to cover a part of the Pacific region – would be capable of quite dense usage

CHALLENGES to the delivery of internet and ICT in the Pacific
1.Environmental = weather factors place heavy requirements on the integrity of equipment and installation practices
2.Logistics- many remote sites only accessible by boat or aircraft – limited size and weight of remote terminal equipment is crucial to achieve a relatively economic site
3.Project management – remote site locations are not only difficult to access but sometimes the travel can take several days to reach the destination. Crucial that all remote site installation requirements are fully catered for as there is no local support.
4.Training – VSAT systems operators and remote site installers require training in order to perform their tasks correctly. Cost of sending staff for training is often prohibitive.
5.Installation competence – inadequate training can results poor system performance
6.Support – remote site support is very expensive and time consuming. Sites must be designed for reliability and simplicity in order to ensure the most competent systems
7.Economics – Pacific nations reliant on donor agencies for funding
8.Regulatory - Pacific has many small nations, in the past many nations insisted on implementing their own Hub stations when it would be a more economical option to purchase services from another nation
9.International cooperation – situation is slowly changing with nations purchasing services from outside its own borders eg Pacific wide RICS system and Telecom Fiji selling services to Vanuatu
10.Theft and vandalism – education is important
11.Service revenue collection – most services operate in the prepaid principle. Necessitated because of the setup costs are high
12.Technology race – many nations feels they are being left behind and struggle to adopt the latest and greatest technology regardless of the relevance of that technology to the customers’ environment
13.Latency – inherent characteristics of satellite systems
14.True bandwidth requirements. Most customers do not need to bandwidth they want (this is a Telecom perspective!)
-Regional cooperation would help separate countries meet their access communication requirements if they were willing to cooperate and work together to provide collaboratively and mutually beneficial solutions
-Working together across borders – regional cooperation would also help less developed countries to access and enhance local skills, knowledge and support for the development of internet services
-RICs – Pacific Wide VSAT system - hub based in the USA

Maui explained further opportunities for Pacific Islands.
a) Affordability of access and optimizing resources: localising content; hubbing and exchange points; aggregation; cost effective technologies – minimum technology; use of other technologies eg mobile; dynamics of IP based tech; incentive pricing schemes
b) International collaborations: initiatives by manufacturers and suppliers for small scale and resilient solutions; addressing unfair charging regimes; technical and financial assistance.
Dynamic Coalition: Safety Child on line
Cyber Peace Initiative (Egypt)
They use the private-pub-social partnership for long term impact/plan.
They have been able to get a new protection law which covers on-line child exploitations and sexual abuse as well as a law enforcement agency against cybercrime. During their work with Information Technology industry Development Agency, the industry has been able to make subscription to a safe internet possible for homes to avoid children’s access to issues that are not safe for them. There is a strong interest of parents in safety groups and so parents are also trained on internet issues.
Youth Protection Round Table (Germany)
The YPRT execute their mission by merging two strategies which are technology enhanced strategies and education based strategies for youth protection. The organization dialogues with youths to know their problems and their desired solutions as well as encourage parents to take a stand on protecting their children from cybercrime and child abuse.
A survey was done on the risk of real life and it was observed that it was also present in the virtual world. Below are some questions asked and the answer of the majority:
1. Where do you locate responsibility for youth protection in the internet? The users.
2. Who should take care of the safety of the children? Parents.
3. Which measures are adequate? Parents control, empowerment of education of digital literacy.

Microsoft’s efforts on child protection
Based on the trust worthy computing efforts which also covers cybercrime, child protection is very much on the list. They have been able to provide law enforcement agencies with softwares to track child abusers.
The Microsoft representative was asked an important question concerning the new internet explorer (where one can browse anonymously) that was to be launched in the UK and the possible negative effect it may have in the fight against cybercrime. The representative however makes it clear that Microsoft has confirmed with law enforcement agencies who gave the go ahead based on the fact that it will not hinder their jobs and that presentation of age clarification is a check to subscription.

One point that seems to be obvious is the fact that parents have a major role to play in child protection not just in the secular world but in the digital world as well.

Best practice forum: Children On-line – Access challenges, issues and opportunities
Looking at children as either recipients, participants, or as actors, a variety of online risks were looked at ranging from commercial, aggressive, sexual, values risks. Though most of these risks differ from one nation to the other there are some similarities such as disclosing of personal data, exposure to pornography, being bullied or harassed, exposure to violent contents, receipt of unwanted comments, meeting of online contact offline, and threats.
Some youths were approached on these issues and they said “provide for technical support for online safety as far as possible and then rely on our own will to act with awareness of the risks and with responsibilities in regard to our conduct”. This further emphasizes the point that users can be responsible for what they do with the internet when they are aware.
Some of the major strategies that are being applied are Bottom-up, top down, national hotlines amongst others.
There was however a correction on the term frequently used “child pornography”. It was said not to be recognized by the law enforcement agencies as that but as “child abuse”.
Report: December 5, 2008

I could attend the following sessions:

1) 09:30 - 10:00 - Panel Discussion - Transition from IPv4 to IPv6
Most of the panelists highlighted the need for IPV6 transition. One point which was new to me was that apart from the vast address space of IPV6, IPV6 does not offer any new advantages which cannot be done with IPV4.

2) 10:15 - 11:15 Debate on whether ICANN and ITU should merge
I learnt from the debate that the ITU and ICANN need to collaborate more on the overlapping issues faced by the Internet community. So, there seems to be less need for merging the ICANN and ITU if they collaborate efficiently.

3) 11:00 - 12:30 Workshop 28 - An Interpol for the Internet?

I learnt the following from the session:

1) The Council of Europe is the only International treaty which includes 45 countries. Countries like India have not signed it as it asks for changes in the local policies of the government which would take a lot of time to implement.

2) The terrorists use a single free mail account, communicate the username and password to their subordinates in various countries, and then put in their instructions in the Drafts folder so that everyone can login and view them. This eliminates the need to send emails and thus makes it harder to track their activities.

4) 14:30 - 16:00 Workshop 7. Low Cost Sustainability Access

This session was very innovative in their approach. Four groups were made (which included the pre decided panelists and people from the attendees) to discuss on Access, Content and Policy (one more topic was discussed but I forgot its name). The discussions went on for 35 mins and then one of the group lead presented what should be done by the governments about its sustainability and low cost.
I was part of the access group which discussed the need for low cost and stable connectivity, power, and devices (mobiles / computers). Also a need for sustainable models were discussed.

5) 16:30 - 18:00 Best Practice Forum 62 - Internet Governance Capacity Building Internet Governance Capacity Building

I attended this session conducted by Diplo and shared my views about how the Diplo IG Foundation course helped me in understanding the basics of IG.

Love, Danny Nagdev
Day 3 - 5 Dec.
i attend the panel discussion on transition from IPv4 to IPv6 and it moved as fellows:

15% of networks got ready to apply v6 and most of networks already working on IPv6 and both versions can work at the same networks ...

obstacles of migrations

- softwares and core equipments should be upgraded then can be used
- the prices of the new products that operated with version 6 and thats adding more costs on vendors or providers

the other thing is that v4 and 6 already selling together then the solution will be by encoraging customers to buy the new version thats why we see it will be working side by side for sometime

Vendors point of view :

Transition already started since a while and as a review for what happened and what’s happening , the process will take long and what’s important is to get ready.

Experience required and understanding how the new products going to work is important also ,ipv6 will reach all customers as soon as customers want that .. and now manufacturers already start producing compatible equipments
Some perceptions in the developing countries that the new version same as the old one thats why there is a need for more capacity building programs and more education

The business case for v6 is to keep the internet continuous and more secured and helping in constructing networks.. More benefits of using the new version is "addresses "which is the main reason to invent the new version
Day 3 report

IGF day 3 was the most determinant to take any opportunity of my participation. I check first to the important issues with regard to Africa and Burkina Faso context. I attend to the following discussion and workshop:
1. Transition from IPv4 to IPv6,
2. Discussion about ICANN and ITU,
3. Building confidence and security in the use of ICTs for African Countries
4. Access to Knowledeg
I participated during only 30 mn for the first workshop: transition from IPV04 to IPv06. All recognized the benefit provide by IPv6 in term of Qualities of services, security, and business. The debate was about the slowness of the transition and the limited readiness of developing countries to move to IPv6. For some participants, technologies providers must developed for instant solution to allow both IPv4 and IPv6 to coexist in order to avoid discrimination from those who can not shift to IPv6 today. One panellists draw out that those solutions must be limited in order to avoid slowing down the transition.
The discussion at diplo booth about the merge of ICAN and ITU was very interesting. One group support the merge of ITU and ICANN and the other state that is not necessary. The first group argue that today, we are living in ICT institutional reform; convergence (Technologies, services, etc..). The role of the two (2) organisations must be reform and converge. Standardisation can not be managed separately for the same purpose. Changes is necessary and this change can be the merges of ITU, ICANN and other institutions if necessary.
For the second group, the principle of ICANN is its independence. ICAN is not the government organisation. Even there role look to be the same it is not necessary to merge with ITU. ITU can move to match with nowadays ICT reality without merging with ICANN.
In this session, I provide my view that ITU is an old organisation (more than 100 years ago) and its responsibilities at its starting time are obsoletes. Focussing only in telecommunication are no sens in today information society. In order to avoid costly institution management and the future disappearance of ITU, one solution can be the merge with others strong experience organisations

For the third workshop attended in day 3 one, I did not have satisfaction. Building confidence and security in the use of ICTs for African Countries is very important but there was only one presentation (instead 3 proposed). The other panelist that must make presentation was absent.
In the only one presentation, the panelist outlines the key issues facing Africa in cyber security. For him, they are technological problem (luck of technologies), mythological and legal framework. Hence, he recommended the creation of CERT (Computer Emergency Response Team) to tackle cybercrime. Government must support capacity building in ICT, develop local solution and tools to track cyber crime, improve R&D capability and make research. He provides also the progress maid by Tunisia and Morocco in their institutional framework. I intervene after the presentation to outline the security issues in telephony in Africa, were Mobile telephony services is increasingly developing. I take the example of “social engineering” that is increasing in Africa. I ask to know what is the view of the panelist in Africa were most mobile subscribers are not identified and it rise security issues. I give the case of Burkina Faso were less than 50% of subscribers are not identified and gave the position adopted by the regulator to deactivate unidentified subscribers. As an answer, the panelist give the meaning of social engineering (I knew) and state that it is emerging issue.

The last workshop is about Access to Knowledge. The following issues were discussed: Access to information and contents and copyright. It is important to set policy such open source, freedom of expression and intellectual right protection. For region were there lack of content, government must encourage content development and promote research using ICT solutions. Students must get access to full, non discriminate, and various knowledge and learn also from university to respect copyright and government must ensure that. E-government is also necessary to provides full informations about public services.




Follow us

Website and downloads

Visit Diplo's IG website, www.diplomacy.edu/ig for info on programmes, events, and resources.

The full text of the book An Introduction to Internet Governance (6th edition) is available here. The translated versions in Serbian/BCS, French, Spanish, Arabic, Russian, Chinese, and Portuguese are also available for download.


Karlene Francis (Jamaica)
Ivar Hartmann
Elona Taka (Albania)
Fahd Batayneh (Jordan)
Edward Muthiga (Kenya)
Nnenna Nwakanma (Côte d'Ivoire)
Xu Jing (China)
Gao Mosweu (Botswana)
Jamil Goheer (Pakistan)
Virginia (Ginger) Paque (Venezuela)
Tim Davies (UK)
Charity Gamboa-Embley (Philippines)
Rafik Dammak (Tunisia)
Jean-Yves Gatete (Burundi)
Guilherme Almeida (Brazil)
Magaly Pazello (Brazil)
Sergio Alves Júnior (Brazil)
Adela Danciu (Romania)
Simona Popa (Romania)
Marina Sokolova (Belarus)
Andreana Stankova (Bulgaria)
Vedran Djordjevic (Canada)
Maria Morozova (Ukraine)
David Kavanagh (Ireland)
Nino Gobronidze (Georgia)
Sorina Teleanu (Romania)
Cosmin Neagu (Romania)
Maja Rakovic (Serbia)
Elma Demir (Bosnia and Herzegovina)
Tatiana Chirev (Moldova)
Maja Lubarda (Slovenia)
Babatope Soremi (Nigeria)
Marilia Maciel (Brazil)
Raquel Gatto (Brazil)
Andrés Piazza (Argentina)
Nevena Ruzic (Serbia)
Deirdre Williams (St. Lucia)
Maureen Hilyard (Cook Islands)
Monica Abalo (Argentina)
Emmanuel Edet (Nigeria)
Mwende Njiraini (Kenya)
Marsha Guthrie (Jamaica)
Kassim M. AL-Hassani (Iraq)
Marília Maciel (Brazil)
Alfonso Avila (Mexico)
Pascal Bekono (Cameroon)

© 2023   Created by Community Owner.   Powered by

Badges  |  Report an Issue  |  Terms of Service