A paper writing submission on an existing or emerging area in Internet Governance, leveraging the learnings from the course (Internet Governance) and Internet Society 2021 Projects. Papers will be evaluated by a selection committee and the best submissions will be selected as IGF Youth Ambassadors.
A paper writing submission on an existing or emerging area in Internet Governance, leveraging the learnings from the course (Internet Governance) and Internet Society 2021 Projects. Papers will be evaluated by a selection committee and the best submissions will be selected as IGF Youth Ambassadors.
The paper highlights the importance of the intranet as a means to enhancing governance and speeding up institutional reform. It discusses the advantages and uses of an intranet and briefly explains the steps needed in designing an intranet
Indonesia Internet Sehat on Child Online ProtectionICT Watch
Indonesia INTERNET SEHAT Best Practice on Child Online Protection Education and Awareness. (Sehat means Healty). Presented at the International Telecommunication Union (ITU) - ASEAN Workshop on Child Online Protection, Manila, 13 September 2016.
A paper writing submission on an existing or emerging area in Internet Governance, leveraging the learnings from the course (Internet Governance) and Internet Society 2021 Projects. Papers will be evaluated by a selection committee and the best submissions will be selected as IGF Youth Ambassadors.
The paper highlights the importance of the intranet as a means to enhancing governance and speeding up institutional reform. It discusses the advantages and uses of an intranet and briefly explains the steps needed in designing an intranet
Indonesia Internet Sehat on Child Online ProtectionICT Watch
Indonesia INTERNET SEHAT Best Practice on Child Online Protection Education and Awareness. (Sehat means Healty). Presented at the International Telecommunication Union (ITU) - ASEAN Workshop on Child Online Protection, Manila, 13 September 2016.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Data mining applied about polygamy using sentiment analysis on Twitters in In...journalBEEI
Polygamy remains one of the interesting key topics in various society, especially Indonesia. Polygamy is the act of marrying multiple spouses that means having more one wife at the same time, is common case in worldwide. In this problem, the most of Muslim in Indonesia adopt Islamic law that let men to do the polygamy with certain requirements. In worldwide communities, this has been a prominent feature and has become the subject of numerous books, heated debates, journal articles, discussion papers, and so on. Furthermore, in Indonesia the polygamous marriage has recently become a heated topic. Despite controversy, Indonesia’s law, of recent, allows people for doing polygamy in certain conditions. Because the polygamy is often debated, this study focuses on assessment of Indonesian’s perceptions through sentiment analysis and would determine people’s perception about polygamy issue from 500 tweets on Twitter. To conclude, it elucidates that the polygamy in Indonesia is a normal thing and few assume the case is as negative thing.
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
The Financial Times, in association with HP, recently hosted a forum to discuss the latest security threats being faced by public sector institutions in Brussels and the steps which are being taken to address them. Read this report to see the key insights gathered from the event.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Data mining applied about polygamy using sentiment analysis on Twitters in In...journalBEEI
Polygamy remains one of the interesting key topics in various society, especially Indonesia. Polygamy is the act of marrying multiple spouses that means having more one wife at the same time, is common case in worldwide. In this problem, the most of Muslim in Indonesia adopt Islamic law that let men to do the polygamy with certain requirements. In worldwide communities, this has been a prominent feature and has become the subject of numerous books, heated debates, journal articles, discussion papers, and so on. Furthermore, in Indonesia the polygamous marriage has recently become a heated topic. Despite controversy, Indonesia’s law, of recent, allows people for doing polygamy in certain conditions. Because the polygamy is often debated, this study focuses on assessment of Indonesian’s perceptions through sentiment analysis and would determine people’s perception about polygamy issue from 500 tweets on Twitter. To conclude, it elucidates that the polygamy in Indonesia is a normal thing and few assume the case is as negative thing.
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
The Financial Times, in association with HP, recently hosted a forum to discuss the latest security threats being faced by public sector institutions in Brussels and the steps which are being taken to address them. Read this report to see the key insights gathered from the event.
Data privacy and security in ICT4D - Meeting Report UN Global Pulse
On May 8th, 2015 UN Global Pulse hosted a workshop on data privacy and security in technology-enabled development projects and programmes, as part of a series of events about the Nine Principles for Digital Development. This report summarizes the presentations and discussions from the workshop. http://unglobalpulse.org/blog/improving-privacy-and-data-security-ict4d-projects
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Information Technology Republic of Indonesia in The Indonesia Information Security Forum 2012
Bandung, 10 October 2012
The Adoption of a National Cloud Framework for Healthcare Delivery in NigeriaIJERA Editor
National cloud framework (NCF) , based on the cloud computing framework, is the idea of a cloud that is completely owned and managed by the government of a country for the sole purpose of delivering social amenities for the citizenry of that country with the aim of achieving the mandate of governance.The emergence of the internet and more specifically the idea of a cloud have brought about the application of information technology in almost all area of human activities, one such area is the healthcare sector.This paper tries to draw out a framework for the adoption of eHealth into cloud computing through the NCF model for the easy delivery of healthcare services by the government of Nigeria.The paper tries to address challenges concerning eHealth as regards Nigeria health sector and how the NCF model will help resolve these issues and also propose the adoption of this framework by other developing countries.
Global Technology Governance Report 2021: Harnessing Fourth Industrial Revolu...Prachyanun Nilsook
Global Technology
Governance Report 2021:
Harnessing Fourth Industrial
Revolution Technologies in a
COVID-19 World
In Collaboration
with Deloitte
I N S I G H T R E P O R T
D E C E M B E R 2 0 2 0
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet /...ICT Watch - Indonesia
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet / internet governance). Site: igf.id. E-mail: contact [at] igf.id. Uploader: donnybu.id
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Vincent Ouma Mwando - strong encryption and protection of human rights-the virtuous cycle
1. Page 1 of 8
Strong Encryption and Protection of Human Rights: The Virtuous Cycle
Vincent Mwando
1.0 Introduction
The role of internet governance has gained prominence today especially with the setting in of
the Covid-19 pandemic. As the pandemic started spreading around the globe, government,
private and community institutions closed their doors to mitigate the negative effects.
Uncertainty grew with every passing day as the pandemic claimed lives and led to many more
being hospitalised. Many people were cut off from essential services such as health services
and access to food. This caused despair among many people. There was concern not just about
the daily human activities but about the future of the humanity. Throughout all these situations,
the internet kept the world going. As the Internet Society 2020 Impact Report noted, ‘The
Internet is a lifeline’. With internet access, people in remote areas of the globe have been able
to access healthcare services and food supply. Countries such as Rwanda, Malawi and Ghana
were already using drone before the pandemic. They modified the drone operations to deliver
regular medical and Covid-19 supplies.1
This was facilitated by internet access.
The internet had to quickly adjust to accommodate the usual and emerging uses. This is
evident in the fact that ‘A record number of people were online in 2020’ as noted by the section
of the Internet Society 2020 Impact Report which assess how the internet fared during the
setting in of the pandemic. The report further notes that internet usage surged up to 70 percent.
A new world record in data consumption was set with the Deutsche Commercial Internet
Exchange (DE-CIX) in Frankfurt reaching 9.1 Terabits per second in March 2020.2
However, the increased usage of the internet also saw the increase in the challenges to
internet access. Issues of availability and stability of infrastructure as well as the security of the
activities being conducted online were brought to the limelight. Most aspects of human life
‘moved’ online. Consequently, internet governance had to address the emerging challenges.
On the one hand, some people were not able to access essential services due to unavailability
of infrastructure. On the other hand, some people were able to access internet services, but the
quality of access was compromised due to security challenges such as hackings. It was
therefore necessary for the stakeholders in internet governance to urgently address the situation.
The Internet Society played a role in addressing the challenges. For example, in collaboration
with the African Union Commission (AUC) and African Telecommunications Union (ATU),
1
UNICEF Supply Division, How drones can be used to combat COVID-19, Rapid Guidance, Page 1
<https://www.unicef.org/supply/media/5286/file/%20Rapid-guidance-how-can-drones-help-in-COVID-19-
response.pdf.pdf> accessed 30 August 2021.
2
Internet Society, 2020 Impact Report: The Internet is a Lifeline, May 2021, page 4.
2. Page 2 of 8
the Internet Society conducted a series of seven seminars on African Internet resilience with
the aim being to maintain and strengthen networks.3
The Chapters of the Internet Society also
took part in activities including trainings on Mutually Agreed Norms for Routing Security
(MANRS) which highlighted in details the two ways we get to engage and refer to routing;
inside Autonomous Systems and between Autonomous Systems.
To further address these challenges and find innovative ways to move forward, the
Internet Society has come up with the 2021 action plan. The Action Plan is aimed at
‘Empowering People to Create a Bigger and Stronger Internet’. It seeks to achieve this through
three focus areas: growing the internet; strengthening the internet; and empowering people to
take action. Under growing the internet, the Action Plan seeks to accomplish the following
objectives: building community networks; fostering infrastructure and community
development; and measuring the internet. Under strengthening the internet, the action plan
seeks to accomplish the following: promoting the internet way of networking; extending
encryption; securing global routing; and preserving the open internet model at the WTSA.
Under empowering people to take action, the action plan seeks to achieve the following:
supporting community participation; building expertise and capacity; and securing resources
for growth and greater impact.
This paper focuses on the objective of extending encryption, which falls under the
second focus area of the Action Plan. The aim of the paper is to draw a connection between
strong encryption and the protection of human rights. The protection of human rights features
prominently during this year’s annual Internet Governance Forum (IGF) meeting to be hosted
by the Government of Poland in December with the theme: Internet United. The IGF ‘is a
global multistakeholder platform that facilitates the discussion of public policy issues
pertaining to the Internet’.4
It is convened by the United Nations (UN) Secretary General
pursuant to the resolution adopted by the UN General Assembly on 16 December 2015,
(70/125) ‘Outcome document of the high-level meeting of the General Assembly on the overall
review of the implementation of the outcomes of the World Summit on the Information
Society’.5
The Tunis Agenda for the Information Society sets out the mandate of IGF to include
bringing together the stakeholders in internet governance such as governmental organizations,
academic, scientific and technical communities, private bodies and internet users, to discuss
3
Internet Society, 2020 Impact Report, page 4.
4
Internet Governance Forum (IGF) <https://www.intgovforum.org/multilingual/> accessed 30 August 2021.
5
United Nations General Assembly, Resolution 70/125: Outcome document of the high-level meeting of the General Assembly
on the overall review of the implementation of the outcomes of the World Summit on the Information Society, 16 December
2015, A/RES/70/125.
3. Page 3 of 8
public policy issues with the aim of fostering sustainability, robustness, security, stability and
development of the Internet.6
In furtherance of its mandate, the IGF has identified issue areas for 2021. The issues
are grouped into two baskets: a main focus area basket; and an emerging and cross cutting issue
basket. The main focus area helps the IGF maintain focus while the emerging and cross cutting
area ensures that the IGF remains open to tackle arising issues. Under the main focus area
basket are economic and social inclusion and human rights, and universal access and
meaningful connectivity. Under the emerging and cross cutting issue basket are: emerging
regulation: market structure, content, data and consumer/users rights regulation; environmental
sustainability and climate change; inclusive Internet governance ecosystems and digital
cooperation; and trust, security, stability. This paper draws the connection between
strengthening the internet through strong encryption and protecting human rights. It seeks to
create synergy between the Internet Society 2021 Action Plan and the 2021 IGF Issue Areas.
2.0 Strong Encryption
Encryption is ‘the process of scrambling data so it can be read only by someone with the means
to return it to the original state’.7
It takes the following broad forms. There is symmetric
encryption where an identical key is used to encrypt and decrypt the message. In asymmetric
encryption, the keys come in pairs (public and private), and the message encrypted with the
public key can only be decrypted with the corresponding private key. In end-to-end encryption,
only the sender and the recipient can read the message. Data-at-rest encryption is where the
data is protected by encryption in the places where it is physically stored in digital form.8
These
aspects of encryption are essential for the proper functioning of the Internet. Encryption ensures
that the data stored on computer systems, those on cloud computing such as Apple and Google,
and those being transmitted through computer networks, including the Internet, are protected.
It ensures that only those intended to receive the message do. Additionally, encryption assists
in the maintenance of the Internet model of development as it ensures that the information flow
in the internet does not fall into the control of a few governments and private sector institutions.
The development of encryption has not been without controversy. Despite its huge
advantage of ensuring the privacy of both stored and information in transit, governments and
law enforcement agencies always point out the fact that criminals can use encryption to hide
6
World Summit on the Information Society, Geneva 2003 – Tunis 2005, Tunis Agenda for the Information Society, 18
November 2005, paragraphs 72-78 <https://www.itu.int/net/wsis/docs2/tunis/off/6rev1.html> accessed 30 August 2021.
7
Internet Society, Policy Brief – Encryption, 03 June 2016, page 1 <https://www.internetsociety.org/wp-
content/uploads/2020/07/PolicyBrief-Encryption.pdf> accessed 30 August 2021.
8
Internet Society, Policy Brief – Encryption, page 2.
4. Page 4 of 8
their activities.9
This often leads to debates in this area being framed as ‘security versus
privacy’.10
On the one hand, government and law enforcement bodies are of the opinion that
access to encrypted data is necessary to ensure the security of citizens. Citizens and civil society
groups, on the other hand, argue that encryption is essential for private communication without
the interference of government and commercial actors. The debate has in many instances been
escalated to court cases where law enforcement agencies seek orders to compel the
manufacturers of encrypted communication devices to unlock the devices or create a backdoor.
There are many examples including instances where the Federal Bureau of Investigation (FBI)
of the United States government was seeking to access iPhones of persons involved in the
shooting in San Bernardino, California, where 14 people were killed in 2016, and the shooting
in Pensacola, Florida, in 2020, where three people were killed.11
Owing to the refusal by the manufacturers of encrypted devices to create backdoors,
some private actors in the technology industry, for example, Grayshift, have developed tools
intended to be used by law enforcement agencies to access the data in encrypted devices.
Grayshift states on its website that ‘Access is the cornerstone of digital forensics. Grayshift has
developed GrayKey, a state-of-the-art forensic access tool, that extracts encrypted or
inaccessible data from mobile devices. GrayKey accesses more data than any other technology
to help you solve more cases.’12
The tool is used for both iOS and Android operating devices.13
While tools such as the one above are developed with the intention of being used by law
enforcement agencies to fight crime, there are legitimate concerns that the tools can be used to
violate the human rights of innocent persons. The first concern is that some officers within the
law enforcement agencies may use the tools to pursue personal vendettas. The tools may be
used to target individuals who have personal differences with the officers. Many law
enforcement agencies have codes of conduct that guide the use of official resources but the
same are not always enforced. In fact, in some instances, the law enforcement agencies may be
using such tools at the behest of the political class in the government. Some dictatorial regimes
may use such avenues to target political opponents, journalists, human rights activists, and the
civil society generally.
9
Internet Society, Policy Brief – Encryption, page 2.
10
Internet Society, Policy Brief – Encryption, page 3.
11
Jack Nicas and Katie Benner, ‘F.B.I. asks Apple to help unlock two iPhones’ The New York Times, 7 January 2020
<https://www.nytimes.com/2020/01/07/technology/apple-fbi-iphone-encryption.html> accessed 30 August 2021.
12
Grayshift, Introducing GrayKey <https://www.grayshift.com/graykey/> accessed 30 August 2021.
13
Lily Hay Newman, “How Law Enforcement Gets Around Your Smartphone’s Encryption” Wired US, 13 January 2021
<https://www.wired.com/story/smartphone-encryption-law-enforcement-tools/> accessed 30 August 2021.
5. Page 5 of 8
The second concern is that while the tools are developed for law enforcement agencies,
there is the possibility that they will fall into private hands and be used by criminals to target
the civilians. There are many ways in which such devices can end up in the hands of criminals.
Examples include instances where the devices are stolen from or lost by law enforcement and
where officials sell or hire out the devices to criminals due to corruption within governments.
These concerns pose a real threat to the security of the Internet and the protection of human
rights generally.
3.0 Human Rights Protection
Human rights are the entitlements that we have by virtue of being human beings.14
They are
not granted by law; the law only safeguards them. Additionally, the rights are inherent to all
human beings regardless of aspects such as race, sex, religion, and nationality. The protection
of human rights is guided by principles including the following: universal and inalienable; and
indivisible and interdependent. Universality captures the fact that all human beings are equally
entitled to human rights. Human rights are inalienable since they should not be taken away
except in line with due process. Human rights are indivisible and interdependent since ‘one set
of rights cannot be enjoyed fully without the other.’15
They are protected by legal instruments
including the Universal Declaration of Human Rights (UDHR), the International Covenant for
Civil and Political Rights, and the International Covenant for Economic, Social and Cultural
Rights, which make up the International Bill of Rights.
However, the recognition of human rights principles and the enactment of the various
laws and policies is yet to ensure that all human beings attain the required protection in practice.
Many people in various parts of the world continue to suffer violations of their rights by
government entities and private actors. This situation was worsened by the Covid-19 pandemic.
As noted in one of the main focus areas of IGF 2021 – Economic and social inclusion and
human rights, ‘The COVID-19 pandemic has shed light on existing and growing inequalities
around the world.’ Additionally, while the Internet Society 2020 Impact Report notes that ‘The
Internet is a lifeline’ and ‘has allowed people to continue to exercise their rights and advocate
for change,’ it also highlights that this is ‘only the reality for people with Internet
connectivity.’16
It adds that ‘For those without it, closing the digital divide has never been more
urgent. Internet access should not be a luxury, and it can no longer be neglected.’17
14
United Nations human Rights Office of the High Commissioner, ‘What are human rights?’
<https://www.ohchr.org/en/issues/pages/whatarehumanrights.aspx> accessed 30 August 2021.
15
United Nations human Rights Office of the High Commissioner, ‘What are human rights?’.
16
Internet Society, 2020 Impact Report, page 3.
17
Internet Society, 2020 Impact Report, page 3.
6. Page 6 of 8
Consequently, the Internet Society 2021 Action Plan, which seeks to empower people to create
a bigger and stronger internet, takes note of the unfortunate situation of those suffering due to
the inability to access the internet, and points out that:
Everyone should have access to this transformative resource. Yet nearly half the world’s
population is unconnected, missing out on possibility and opportunity. The pandemic
illustrates the urgency of our vision that the Internet is for everyone.18
The above statement is in line with the efforts of researchers and the key founders whose desire
was that the internet be a tool for spreading information, collaboration and interaction at all
levels and be able to be used no matter the geographic location. This bold move by the Internet
Society finds synergy with the issue areas of the 2021 IGF. The main focus areas are: economic
and social inclusion and human rights; and universal access and meaningful connectivity. The
emerging and cross-cutting issue areas are: emerging regulation: market structure, content, data
and consumer/users rights regulation; environmental sustainability and climate change;
inclusive Internet governance ecosystems and digital cooperation; and trust, security, stability.
Under the main focus areas of economic and social inclusion and human rights, the IGF notes
that:
Human rights need to be at the centre of inclusive digital societies and economies, and
technologies and policies alike need to be designed, used and implemented in a human
rights-centred manner. The protection of both civil and political rights, and economic,
social and cultural rights in the digital space should remain a priority for all
actors…This holistic awareness and integration of human rights can only be achieved
through collaboration, learning and capacity development, and open and constructive
dialogue among all stakeholder groups.19
This illustrates the need to ensure that internet connectivity reaches every part of the world.
The human rights framework is a good way to implement this since it seeks to ensure that every
person is given what is due to them. As noted above by the Internet Society 2021 Action Plan,
nearly half of the world’s population is not connected to the internet. This implies that as the
pandemic has been ongoing, nearly half of the world’s has encountered challenges in accessing
basic services such as food and medical services, and lacked the opportunity to exercise their
rights fully and advocate for change. While those with internet connection have managed to
move forward, all the stakeholders have to come together and find ways to ensure the internet
18
Internet Society, 2021 Action Plan: Empowering People to Create a Bigger and Stronger Internet, page 4.
19
IGF, Economic and social inclusion and human rights <https://www.intgovforum.org/multilingual/content/economic-and-
social-inclusion-and-human-rights> accessed 30 August 2021.
7. Page 7 of 8
access reaches everyone; the world cannot become better and peaceful if one half of the
population is thriving while the other half is suffering.
4.0 Strong Encryption and Protection of Human Rights: The Virtuous Cycle
As noted above, strong encryption is instrumental to the proper functioning of the internet.
Encrypted internet communication plays a vital role in the realisation of human rights. When
the communications of human rights activists, journalists, and the academic community are
secured by strong encryption, the fight for economic and social inclusion and human rights,
universal access and meaningful connectivity to the internet, consumer rights, environmental
sustainability and climate change, and good governance is enhanced. As strong encryption is
used to protect the communications of those advocating for human rights, the state of the
internet is improved since the human rights advocates will advocate for rights including the
right to privacy and freedom of expression. This illustrates that these two aspects reinforce
each other; strong encryption protects the fight for human rights and in return, the better
protection of human rights advances encryption even further. This is also evidenced by the fact
that weaker encryption systems would lead to lesser protection for the fight for human rights,
which would in turn imply that encryption would increasingly become weak as more and more
human rights are violated.
The above is true since, as noted in the previous sections, human rights are indivisible
and interdependent. Strong encryption systems would enhance the fight for all human rights
and not only those enjoyed in the digital space. When the communication between human rights
activists and international organisations are securely encrypted, other aspects of human rights
are also protected such as the right to life of those who obtain relief food and medical services
owing to help by international organisations following communication by local human rights
activists. In such an instance, encryption would have enhanced not only the fight for the right
to privacy but also the right to food and medical services. In return, encryption would benefit
since the civil society would advocate for the protection of human rights, including those
enjoyed in the digital space.
It is also worth pointing out that stronger encryption would protect communications that
may have a negative impact on security as noted above. However, as the Internet Society has
noted, trust in the internet services stems from a sense of both privacy and security – people
and institutions can only rely on internet services if they know that, for example, messages are
secure in that they can only be read by the intended recipients.20
The credibility of the internet
20
Internet Society, Policy Brief – Encryption, page 3.
8. Page 8 of 8
is greatly eroded if people and institutions know or believe that their communications are
monitored, and others have access to the messages before they reach the recipients. They would
shy away from making full use of the internet and the internet would no longer become a place
of opportunity for all. It is therefore necessary to combat threats to encryption such as those by
NSO Group’s Pegasus spyware which is said to have been used to hack phones of journalists
and activists.21
5.0 Conclusion
The discussion above has noted the role of strong encryption systems (extending encryption)
in the better protection of human rights, and the fact that the two aspects reinforce each other,
hence creating a virtuous cycle. Additionally, the two also prominently feature in the Internet
Society 2020 Impact Report, the 2021 Action Plan, and the 2021 IGF Issue Areas. The
multistakeholder meetings and discussions at the 2021 IGF will further examine the
relationship between the two and explore additional ways to ensure the two aspects reinforce
each other in making sure that internet is united and is for everyone. This will make a key
contribution to the 2021 IGF main focus areas of economic and social inclusion and human
rights, and universal access and meaningful connectivity. The multistakeholder discussions
scheduled to take place in December will delve into these issues and find the way forward
achieving the theme of Internet United. The spirit of this year’s theme has already been realised
by the fact that the IGF issue areas are a result of a call for thematic inputs, which saw
contributions from government, international organization, civil society, technical community,
and the private sector from all regions in the world.
Personally, I have been engaged through the ISOC Fundamental program and the Kenyan
chapter on advocating for extending encryption. We organised for a webinar to sensitise on
why encryption, and to instil a sense of ownership among the youth to stand out, inform others
and champion for encryption. The webinar was on 25th
June, 2021, and brought over 40
together participants to engage in discussions on the importance of encryption.22
The webinar
also engaged with the Office of the Data Protection Commissioner in Kenya, and learnt more
about its role in digital privacy and the role that the youth can play, for example, in the process
of lodging complaints on violation of privacy of data. These engagements at the lower level
and through bottom-up approach offer important input to the discussions at the 2021 IGF.
21
Dana Priest, Craig Timberg and Souad Mekhennet, ‘Private Israeli spyware used to hack cellphones of journalists, activists
worldwide’ The Washington Post, 18 July 2021 <https://www.washingtonpost.com/investigations/interactive/2021/nso-
spyware-pegasus-cellphones/> accessed 30 August 2021.
22
ISOC Live Noticeboard, WEBCAST: ISOC Kenya – ISOC Fundamentals Program 1 – Encryption / Securing Web Servers
25 June 2021 <https://isoc.live/14227/> accessed 30 August 2021.