Yes, I said cyber. Digital security and rights in international development coop

Video in TIB AV-Portal: Yes, I said cyber. Digital security and rights in international development coop

Formal Metadata

Yes, I said cyber. Digital security and rights in international development coop
Title of Series
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this license.
Release Date

Content Metadata

Subject Area
Cyber. the word entails controversy: hype, misunderstandings, misappropriation, and above all many yet unanswered questions. Due to this and especially now this notion and topic are becoming increasingly important within international cooperation. Between network policy and security policy, between cyber arms race and cyber cynicism, one thing is often left out: What about the digital security of the poorest and most remote regions and populations? The more countries like Germany address the protection of their own digital infrastructures, the more it becomes apparent that we also have a global responsibility in this regard. However, an official "cyber development policy" does not...
Area Dialect Context awareness Software developer Multiplication sign Digitizing Projective plane Information privacy Twitter Connected space Arithmetic mean Word Process (computing) Computer animation Different (Kate Ryan album) Single-precision floating-point format Video game Integer Quicksort Musical ensemble Fiber (mathematics) Reading (process)
Context awareness Spezielle orthogonale Gruppe Online help Open set Bit rate Internet forum Internetworking Operator (mathematics) Authorization Information security Position operator Punched card Condition number Area Digitizing Forcing (mathematics) Software developer Projective plane Variance Virtualization Line (geometry) Informationstheorie Lattice (order) Computer animation Telecommunication Object (grammar) Musical ensemble E-learning Spacetime
Matching (graph theory) Cybernetics Internetworking Length State of matter Software developer Infinite conjugacy class property Range (statistics) Moment (mathematics) Electronic mailing list Fiber (mathematics)
Word Internetworking Physical law Family
Cybernetics File format Internetworking Term (mathematics) Multiplication sign Student's t-test Open set Information security
Observational study Cybernetics Electronic Government Field (computer science) Frame problem Degree (graph theory) Internet forum Software Term (mathematics) Computer crime Office suite Extension (kinesiology) Information security Physical system Library (computing)
Dependent and independent variables Cybernetics State of matter Digitizing Image resolution Moment (mathematics) Directory service Water vapor Disk read-and-write head Mereology Inequality (mathematics) Event horizon Causality Computer programming Computer-assisted translation
Area Frequency Game controller Meeting/Interview State of matter Multiplication sign Video game
Open source State of matter Modal logic Information privacy Meeting/Interview Internetworking Hacker (term) Kinematics Operating system Information security Physical system Arm Electric generator Cybernetics Digitizing Software developer Moment (mathematics) Physical law Staff (military) Informationstheorie Pivot element Equivalence relation Word Personal digital assistant Blog Order (biology) Statement (computer science) Aerodynamics Right angle Pressure Window
Context awareness Word Computer animation Personal digital assistant Operator (mathematics) System administrator Projective plane Combinational logic Energy level Physical law Quicksort Line (geometry)
Sensitivity analysis Theory of relativity Vector space Computer network Authorization Similarity (geometry) Right angle Informationstheorie Information security Measurement Fundamental theorem of algebra Number
Point (geometry) Slide rule Thread (computing) Primitive (album) Cyberspace Mereology Perspective (visual) Wave packet Goodness of fit Strategy game Meeting/Interview Term (mathematics) Computer programming Green's function Energy level Cybernetics Information security Area Mapping Channel capacity Cellular automaton Bit Informationstheorie Arithmetic mean Computer animation Commitment scheme Integrated development environment Website Right angle Information security
Domain name Context awareness Cybernetics Software developer Digitizing Multiplication sign Projective plane Bit Mereology Proper map Power (physics) Meeting/Interview Right angle Information security
Point (geometry) Building Pascal's triangle Multiplication sign 1 (number) Informationstheorie Collatz conjecture Information privacy Field (computer science) Machine vision Area Surface of revolution Independence (probability theory) Coefficient of determination Strategy game Radio-frequency identification Meeting/Interview Energy level Cybernetics Extension (kinesiology) Information security Fiber (mathematics) Service (economics) Dependent and independent variables Cybernetics Channel capacity Software developer Moment (mathematics) Digital signal Line (geometry) Cyberspace Mathematics Type theory Latent heat Computer animation Buffer solution System programming Right angle Energy level Information security Domain name Address space
Building Channel capacity Link (knot theory) Projective plane Moment (mathematics) Online help Heat transfer Mereology Proper map Wave packet Word Strategy game Meeting/Interview Energy level Software framework
Building Channel capacity Hazard (2005 film) Cybernetics Multiplication sign Digitizing Informationstheorie Mereology Dimensional analysis 4 (number) Word Software Meeting/Interview Term (mathematics) Quantum Right angle Information security Spacetime
Group action Algorithm File format Digitizing Software developer Digital signal Sound effect Device driver Shape (magazine) Parameter (computer programming) Informationstheorie Mereology Theory Number Type theory Word Machine learning Meeting/Interview Internetworking Personal digital assistant Right angle Pattern language Personal identification number (Denmark) Physical system
Point (geometry) Context awareness Dependent and independent variables Mapping ACID Letterpress printing Plastikkarte Mass Information privacy Theory Connected space Number Type theory Word Meeting/Interview Self-organization Right angle Information security Eccentricity (mathematics)
Ocean current Implementation Presentation of a group Software developer Multiplication sign Digitizing Digital signal Numbering scheme Bit Informationstheorie Information privacy Strategy game Meeting/Interview Computer configuration Telecommunication Statement (computer science) Right angle Information security
Point (geometry) Context awareness Goodness of fit Strategy game Telecommunication Projective plane Right angle Clique problem Information security Position operator Vulnerability (computing)
Multiplication sign Forcing (mathematics) Projective plane Basis <Mathematik> Staff (military) Informationstheorie Information privacy Meeting/Interview Term (mathematics) Encryption Self-organization Right angle Software framework Endliche Modelltheorie Information security Computing platform
Strategy game Meeting/Interview Order (biology) Cuboid Power (physics)
Server (computing) Cybernetics State of matter Multiplication sign Insertion loss Information privacy Mereology Event horizon Radical (chemistry) Mathematics Meeting/Interview Term (mathematics) Different (Kate Ryan album) Matrix (mathematics) Series (mathematics) Information security Thumbnail Vulnerability (computing)
Compact space Scaling (geometry) State of matter Physical law Moment (mathematics) Code Set (mathematics) Informationstheorie Surface of revolution Human migration Category of being Meeting/Interview Right angle God
Cybernetics Physical law Code Set (mathematics) Water vapor Informationstheorie Information privacy Rectifier Meeting/Interview Operator (mathematics) Normal (geometry) Right angle Information security Form (programming)
Area Group action Service (economics) Digital electronics Cybernetics Diaphragm (optics) Software developer Multiplication sign Digitizing Informationstheorie Fault-tolerant system Mereology Vector potential Data management Rectifier Meeting/Interview Self-organization Right angle Quicksort Remote procedure call Information security
Dependent and independent variables Statistics Cybernetics Meeting/Interview Hypermedia Computer crime HD DVD Touch typing Informationstheorie Information security
Point (geometry) Divisor Stress (mechanics) Right angle Form (programming)
Multiplication Algorithm Artificial neural network Software developer Multiplication sign Moment (mathematics) Quantification Sound effect Exploit (computer security) Type theory Software Integrated development environment Meeting/Interview Term (mathematics) Personal digital assistant Hacker (term) Complex number Physical system
Data mining Meeting/Interview Multiplication sign Summierbarkeit Basis <Mathematik> Right angle Game theory Information security Substitute good
Area Dependent and independent variables Meeting/Interview Software developer Electronic mailing list Planning Database transaction Basis <Mathematik> Informationstheorie Information privacy
Goodness of fit Meeting/Interview Projective plane Stability theory
and what about the sort of the but the the the the was and for
the target to to how it
thank you very much an ICT for the means of ICT for development and so yeah the so it is a great
pleasure to open an integers this last session and sound and I'm very happy that so many of you came after 3 full days of excitement and I'm sure you all a very eager to hear and the bands and to party and so on yes 1st let me explain who we all and I'm representing the Federal Ministry for Economic Cooperation and Development insured the beams at and we have been at the Republic our full 4 times already now on Y and actually do we come here because we like you agree that digitization affects all areas of life everywhere around the world and we believe that digitalization is a process we have to accompany 9 the practically but also critically today we have already discussed how to juggle possibility a possible dystopian and Chopin futures of a truly interconnected digital world and that world could actually bring prosperity and peace signify the end of privacy and personal connection and we have discussed and will keep discussing how the most remote and impoverished regions of our world can benefit from new trends and that is the reason why I and we support it's better place our in writing this trend drawdown and this is where we are and trying to find out which future gents are actually important for on development cooperation I highly recommend that we also launched today our digital agenda and so on and so on it's it's a good read that the and and yes and this is a strategic paper actually that we hope will change on development cooperation for the years to come and we set our strategic goals that's and my ministry is going to proceed so and after this quick promotion and fiber I know it's it's some it's aware that everybody uses and yes I said yes we say sigh them and for a development ministries that is perhaps not the most obvious you might say but as policy makers we do see that the word side there is often attached to other words to render them meaningless but the words may not go away because the raising threats and uncertainties in this digital age will not go away and to be very frank here we and the other session I was just saying listen and we as the Federal Ministry for Development Cooperation now we have around 3 100 projects in different areas of ICT for development in all developing areas on that we and so now do not have a single project on cybersecurity for as this is still an upcoming issue and we feel that this is going to be more and more important but we actually struggling and we need your comments and we need your advice to help us shape future projects how we can actually support developing countries in that sector of cybersecurity on
I last my better breaking the panelists and I enjoyed I a quick chat with you Nathaniel outside and maybe if I may quote that because I found really eye opening you know like we're still looking at it
in which sectors coal we've become active as development cooperation and you said something like is said listen there is a war on trust rate a war on data and open up sitting a punch lines but on a really really hate it and he explained to mean that there are forces that actually worked very intensively in trying to discredit civic society projects N G O's development cooperation using fake news and thus undermining the trust and the opposition in countries that tried to strive for a more democratic place and so this is really an area I think where we have to get active and yeah well things again for I opener so digitization we believe in that can be a game-changer and places for schools may be too far away or for children to reach build said a great session today from Kiran they're doing online education and I think this is also a very sensitive topic when we look at refugees because those are the most vulnerable persons and so invulnerable context where we need to support a position it is also a question of data security when it comes to protecting the data from know those refugees from their position so this is would be another sector where I would imagine there would be a a space where we could get our active on but let's go back online education digital finance electronic exist authorities virtual meeting spaces and always available information and communication tools on the Internet can have much more impact there in the developing world that probably here if the right conditions are in place and yet Mona I'd like to quote you a can I find really good stop last nite and and you were looking at me because I was trying to be honest music saying OK where should we you know that active you were looking at me and saying well constrained you know look at all your development operation works and projects that you have and all of these would not be possible or would not work as good as they do if cybersecurity was not them so if the base variance and well think so my ministry as embraced digitalization as an important tool in objective and our work but we want to get active security sector and now we need your help your suggestions and I'm very very happy that we have used free here and I'll as the moderator today and I am very much looking for all that's where all your comments thank you very much
and the running of the bulls your names accounting and I'm left hand over the microphone so that to help yeah and when the internet range you and later a match for those having arrived and length of a list being here and understand the plate
and I am a HAL elsewhere condemning developments and I well I have the pleasure to welcome to the states the panelists who will introduce themselves and as you do an interview 2 minutes each to tell us pretty who you are and what you do roughly but as you do perhaps ancestor
question when did you start thing fiber and why does it matter it the many detection and OCR sold uh we start talking about cyber at the moment
we realized that when we want to use the internet it means that we are going into a new word that is called side so in this since some of sense or more 10 years old more than dentists and uh we talk cyberscience because we have the other we we see and some complicates things happening in our society because of moving to this new word so we were obliged to some have been kind of uh of the family tool start I don't think this new word excellent and who are we 1st of all I'm a professor of
long I got involved in an cybersecurity so our NGO which is that body the formation Technology Association and because our students in all we have seen this as didn't understand what does it mean to bold online and do some bad or risky behavior so that there we go and we were so concerned about our use we were concerned about protecting them from others and from there on activities their on the Haitian online and the also we have later on seen that it wasn't possible for us as given society or the Benes county to be safe online if we don't cooperate with us often we have understood that it's not possible we would not living alone in this work was an internet with this openness toward the whole work and then we created the but I will ready for cyber security where we have a public private sector and not only that these people we have also the have uh countries involved is asked the some on a public institution and there's some artifact private and I am at the same time at the final 4 cybersecurity which is at the with additional scientists and the tetrad thank 11 yeah so
I'm a researcher on the politics of cyber security and I think that the term cyber often have something very political
to it and I'm also a fellow at a think tank in Berlin called Global Public Policy Institute and the Internet Governance Forum Germany but so how did I actually end up here at the convection upon my background is in political science and when I was studying in my master's degree at a so-called War Studies Department that's where came across the term 1st and think that office held a lot about em the perception we often have about library is that it belongs to the Military anyway or that we often associated with an cyber-warfare cyber-terrorism cybercrime you know and so I studied these aspects and then and you know you got more into this internet governance field and so on and actually the best for me cybersecurity really means the security of networks and systems and then the extended security of individual users using these technologies and this is I I think that the definition of cyber security that is more and more adopted also by some different communities of a society and that technical communities and so on I just like to very much push for this and definition often my work because I think it's very difficult political and it always and depend on the framing and that use and we need to redefine is the more you know positive about at a way Harry
all doing the origin and
so on the Raymond I directs the signal Program at the Harvard Humanitarian Initiative at the Harvard School of Public Health it's a real pleasure to be here thanks for dragging me across oceans ocean so for for me my journey into cyber isn't work but really began in Biloxi Mississippi in 2005 in the aftermath of Hurricane Katrina I was deployed with Oxfam America down on the peninsula which was the hardest hit area and on the Mississippi part of the Gulf Coast it was about 72 hours how from landfall of the Cat 5 hurricane Katrina was this pretty much as strong as against and a wall water had gone up over the peninsula like a blanket over dead and gone over the other side of the in the peninsula primarily what he's African-American population and undocumented immigrant population that works in the casinos yeah and for 72 hours there was no federal or state agencies on the peninsula they were all up in the primarily white community so this about 12 years ago we're scratching our heads trying to understand is this just racism why was this population so invisible and we begin to realize that the whole population become digitally invisible to responders that our way of seeing the need in that scenario cost us become blind to a certain demographic and now fast for 12 years and really for me you know on we do not feel No 102 not is founder of the International Committee of the Red Cross he was in a carriage going past the battle of solve free no the aftermath of and all the dying soldiers just left there for me that was my personal free know it made me realize that we're beginning to cause big data disasters through digital inequity in digital disparities in that we had to not find out what to do with tax but to figure out how to think about what text does 2 people and events so for me that was that was the moment that was my personal suffering but thanks they're we
also is in the room with us and so I have 3 questions for you and would like you to that of no by show of hands and festival
in everyday life you personally do you say and now need to use the phrase again fabric frequency is so that all the
time and the the 4th and
2nd question and of thinking perceive argued that state tivity and perhaps you digital persona how no do you feel in control it already a hand you're fooling yourself
and anything not the
same people who were then area at that by birth and who in this room currently can not sleep at nite so literally and metaphorically speaking and thinking about all the things that same thing in the digital Realm in our world but so
that that the majority of these questions
and In many of and at this at this session of the Republic of perhaps some of these people can't sleep well because they've been hearing a lot about hacking democracy about digital security the by about the Internet having gone terribly wrong how that is everything
on and we it that we we don't you we don't even have a science of knowing how bad it this arm so
as Katrina said on in this critical fixed phrase here is that we're at a moment a pivot moment in modality of attack for me I translate that into English if you if you go back to arms for movies like hackers was Angelina Jolie in the late nineties they seem amazingly quaint where the concern was how people got into data and systems to do things with that that were that also known as Cyber kinetics of right that's quite compared where we are now where we are now is where the moment of the war on trust where the state actors and non-state actors or weaponizing information in the way that information works in human systems and institutions to engage in Japanese word here at Quito to use what makes them open and free against them so we're not just talking about infiltration were talking about weaponization which in many cases depends on but what's a big problem the problem here is that on we need of greater operating system which is we don't have clarity on what human rights people have to protection from data protection from attack cyber attack In rights to information we don't know if information is humanitarian assistance we don't know if information development is a human like we haven't agreed that now flip it again are Geneva convention is basically were run in Windows 5 you know who where where were were run and international humanitarian law equivalent of you know Netscape on in the sense that right now we don't have a Geneva convention for cyber warfare who is an order combat who was removed from battle I don't know and so I'm going to say when state Newman close here and I wanna hear from a college this that there much more cogent I am without jet on the so someone said a statement 2 days ago that right now the weaponization of information represents what the threat to the future of liberal western society was an activist was that some guy from Harvard was a someone of blogs know the US Deputy Army Chief of Staff In a security notice that went out to the panic attack OK we're not talking South by southwest here on the US for me has said that we are at a moment of war against how we trust institutions in each other so sorry to tell you all but what you guys do about this will define your generation and no pressure here the future but the future of human freedom in the 21st century so take care of that and get back to me alright so Mona due to work with young people
you do work with the future generations and and that bring this combination of how bad it is that's that your context to 1 of these developing countries that was picking up and what the situation like and where you were in terms of and the threat scenarios and readiness to handle them well I think that and in my
country traits project uh at many levels at the government level word cholera that would be that up is not protected on the and when I say not protected I'm saying this at the technical level as well as at the legal level I mean we don't in case of breaches in the case of as having to be cautious about protecting the that go operations or even the public administration don't have this obligation in a text in legal text saying that you have the obligation to protect that people that are doing a protection out of that interest I would give you an example for the dual I don't know if you have an idea but in Lebanon the banking sector is the most developed 1 we are kind of uh speed of and all of the other feasible and all the word soul and that our economy heavily at the line on banking sector so you see that the banking sector is the 1 who is working on protecting our that he I mean that you can see the banks very have very very secure system and they are training data employee we have kind of sorts each bank and so while in the other sectors we don't have this really and serious interest or awareness of things and health for example on our Republic has sector is not so always of the importance of this sensitive that that it has and the in the election to solve and the AIDS or something like this I don't remember the exact date the director of the 2 people of of our
person and that that was both online by the Ministry of Interior without any measure of security whole ever in the work good have access this vector so that
this is his it's but I thought that it was that on the net ever wanted to go online and sialic that sea water our relatives I would look at formal but have seen it and I think that there are some countries who have already so that um also our education and institution where you know there are lot of that that I've met sold Reggie for or I've not protected and you know we had that this problem when we had this some special court for delivered on the international Court fundamental as where they asked the Ministry of Interior for data communication that you know who holds the room and a whole has which number which is sensitive information and personal information then we had this prices and we send this some Committee to flow to say to study if the government has the right to give this that tool foreign authorities to this support don't for the investigator on base that out so you see we are exposed yeah we are working as NT all we odd working actually on having any legislation to protect our customers that thank you because they the great key because we do have a similar question eg
present that we want to get to but the document legislation and even like for you because as part that was the
site of the area and this slide from the International Telecommunications Union ITU of the UN from 20 40 minutes if you can read the Sybase so security commitments levels green meaning high good if we believe cybersecurity getting wet meaning low and that Anakin what we've been talking about in legislation missing in certain areas that primitive means legislations have missing you that and why might record your problem are there why why might the red part of this mapping problematic wise is an issue that cell and blue means
very high then and just looking for a very high and is looking how Germany is doing this and well so I think the last thing that we need to understand you know everyone says that really understand that and this cyberspace we're talking about are let's say just the digital realm that we surface is borderless right and so any threat emanating come from anywhere in the world that is an online thread can spread anywhere can affect anyone technically so and in that sense I think it doesn't really matter where it's red here I mean just in terms of the online perspective because I in the Digital Realm you'll have the threat emanating from these places that so what what can you do about that and I think this is when the map matters because you can and then look at OK where do we where we need to improve cybersecurity in terms of the infrastructure but also in terms of the training that strategy around that in terms of from the budget that is needed to build sustainable and education programs for our policy and that is I think where we need to do something and and this is where I think a lot of countries there may be a bit more blue on the map you know can help and hand and also transfer some of their knowledge some of their information some of their and skills and to really help us help out there you know and build partnerships right of that at that point countries can help so when Germany right now Jeremy is blue and you know the Germans uh capacity environment fairly well can Germany held yeah so that we that the difficult question of course and I think that Germany is doing pretty well we have our 2nd cybersecurity strategy from
last year and we heard that Germany is um during more than 300 decides Asian projects abroad uh within the development context
what is a bit shocking to me here I have to say is that there is no security projects aims well it's about time right so am I think if we really engage abroad with digitalization and security as was reviewing stated has to be the 1st part and cannot be an afterthought because no and technology will be sustainable or work in a sustainable well way if it's not secure securely felt but also not securely applied and this does not mean that we need security technologies but this also means that we need to deal with it responsibly and and you know do everything around it that we can and to build this so I think German cybersecurity and is probably compared to other countries pretty well but of course that we have a huge human resource problem as everyone knows I think and the ministry that is now really and taking over the cyber domain let's say is the defense Ministry in Germany as you probably also although and so I think and and what we have here there is a broad societal recession ain't am I think we just need more actors in this discussion right and we also more ministries and this discussion because cybersecurity does not only belong to 1 part and of government ought not only to 1 stakeholder and so in in that sense we need to combine also and the power of all the stakeholders that we find here for example at be we have the Chaos Computer Club we have a lot of resources you have proper party of people who can train people also broad so what partnerships can work with that and I think we have a lot of potential here thank
you and when I you will know that the lines of the paper that you wrote at the proper this and where you you're saying that Lebanon needs a new national cybersecurity strategy and if I I'm right Lebanon does not currently have a national fiber secured strategy German as with demi has recently just heard recently published at 2nd
1 and and in this that you Yukon involved for new strategy and Air Force Center for for for for for cybersecurity in Lebanon even I know has better paper in detail and I'm patina Daniel an entity have when countries like Lebanon say they want to develop and in S is secured strategy can countries like Germany and we are speaking about Germany's involvement in some extent realistically work together and doing something like this collaboratively US how
that this that the way to think about this is that when you hear the title of this panel development in securities it may sound like we're talking about helping poor people import countries that that's the point actually about everybody been so start to think about cyber security and the role the central leadership all that development in mentoring agencies of both the government and NGO level not should must in will play as similar to how we think about global public health if you don't have the capacity metaphorically to stop the ball in the field right if you don't have capacity building that the type that moments talking if you don't hit the red spots that Isabel's talking about then going to go while fire in your the point as an audience so Our approach developed world security depends on seeing the interconnectedness of an ecosystem of threats that means now it is the responsibility of governments and non-governmental actors together to see this data as people that data protection is people protection right let's say it again data is people the data is people as all the time a to which are never going to happen but if I did I would have been as people right here because that's the true things so get out of thinking about ones and zeros if we are going to protect people we must protect the and to do that we must build capacity now that means that for Germany to say yes yes Germany not only has a role to play it's time for someone to be the lead sled dog here it's time not just work resources buffer vision go do that
alright if we were to go through that morning having a paper in mind where what is the 1 where you see the most they're the biggest that's where supported support is needed at many levels let's start by the strategy and then by all in that the and organizational framework and capacity building because you know I that let me just and talk about an idea I had since i've word about the project to have a
without any cybersecurity you want when a country help or cooperates In with another country on cybersecurity proper project it's not helping got to these other countries it's helping you itself because when the positive I'm not protected I'm not secured doesn't know how to protect themselves then had week this week link will later on in fact influence there other countries account you who can or who is supposed to know how to think that something is so as for the moment for example I can think of uh and capacity-building training had in the shading uh trading knowledge transfer of knowledge and don't forget that attract is part of the EU so you have this Asimo all of text of legislation and of experience of approaching as the subject thank you so
1 word that heard credited as the 4th cybersecurity capacity-building and not only a quantum room said retiree regularly and this other word of term is quite long you that what is it but I and I mean I could get it at the time
so 1st let us start with cyber security and just to get a straight again anything cybersecurity has 3 different dimensions and in my mind it's 1st technical security of the networks and the devices that you look at secondly it's individual security or user security of those users that use that the technologies and this is very much intertwined obviously and thirdly we often also speak about national security right we practice a lot here on the panel as well so all of these different dimensions are intertwined but can also as you know season revelations and so on can also conflict sometimes in my opinion and cybersecurity is an essential part of national security often the technical security sense because only if we have secured technologies in our countries in art critical infrastructures and our citizens are secure I we countries secure so that's why I say you know technical security individual security is the foundation of national security when it comes to cyber security now when it comes to capacity-building on it means that and I think 1st of all it's a neutral term do capacity building here in Germany and we really need we need to build capacity here we see it we're seeing this right now when we talk about how to implement all these policies you know and have an abuse and uh Federal Office for Information Security that you might know and which is responsible for information assurance hazard a capacity-building has to train people and the Ministry of Defence had to do a lot of capacity building so we need to build up our competences to use technologies but also the technologies themselves that we use and i think now in the international space and we need to partner up to build capacity together the capacity to use technology responsibly and securely to build the foundation for it a sustainable and really responsible digitalization that will last so that's what I would find it like that there might be other definitions around things you a responsible and sustainable digitization that will last and that
makes me think of to further that effort in the course of the day to day and 1 of them was very recently at the previous session where the parameters that Secretary of that's very Minister was speaking and effects that we want to so use and shape digitization for sustainable development worldwide that is very morning and there was another top right in your mind from Electronic Frontier Foundation you and he was talking about the early days of the internet and what I would like to build the Internet and he said in shorts it was going to be great and then the bad thing happens I think I so Nathaniel is a bad thing going happen in our case as well that we have we have to to big
bad things on but the 1st thing that thing that I'm going to say some words that you're going be like what is he talking about in the elementary and so on or ethics in our human rights in legal theory as it relates to these issues is entirely about what's called PII does anyone know a PI ideas personally identifiable information so you work on in the United States it's a social security number right your driver's license number your blood type while we live in the the theory that I've laid out in a recent book chapter is we live in a DII wall India III means demographically identifiable formation these digital systems and digital data and algorithms in machine learning are making it very easy for us to identify the behavior patterns of groups of people who may not even know the part of the same demographic right and the type of legal and ethical issues that come now from what is truly not mostly non-consensual experimentation often on some of the most vulnerable people in the world data where is this type of information DII that we can kill people with not even though we did this
in not be technically unethical because our Essex about PII right so that the 1st big bad
things already happened it's like this where we're trying to take a bicycle on not OK it's not going so were using PII 6 about individual data for what's fundamentally VII problems let me give you an example from the European context a LGBT lesbian gay bisexual transgender organizations in a unnamed European on the 1st security reasons were dealing with an attack by skinheads against LGBT LGBT population in the city so they created a mass we put the map out 2 as an advocacy tool to say here's where the attacks are happening within 48 72 hours of the map of the attacks went through the roof more people were not asked what did do that organization created BDI-II clearing house for the skinheads where them situational awareness that was better than what they had chosen were all the gay bars work OK and so we come into this work thinking that our assumptions and aspirations or going to make people safer Macon well so you're right we assume these things of technology but what we're not doing is saying what is the right and responsibility obligations for a type of data that we haven't even defined so the big nasty here is the i and the last point from a social of 2 words to leave you with writing down get out the print a necessary In eccentricity very quick story colleagues from MIT Eve demand have a theory that he could track the Kardashian sisters you know keeping up the connections they could take a random episode the pedestrians in he could find the credit card data he did it was an episode WER Chloe and can were feeling down and they were taken by the sister I We according to a strip club in New York in Eve track that data he then turned into a number and thus the theory of city was born out of this experiment the flip s interest in a city is how you find individual large datasets eccentricities how you take individual data and locate them a large datasets it means privacy is dying because we can't weaponize PII to DII in back now if you're committing genocide if you're a solid acidic so go fix the go fix that or and come
to us with your questions the the and it would take some time to have a go have every bit of accommodation and so yes if you do have a question as to withstand that and you will receive a microphone the he promised to shut up so the thinking of microphone as in the stuff criticality yet there and I think and human rights person so I'm asking human rights questions and some I was hoping to learn a little bit more about the current initiatives or debates with Indians set some I know there's a human rights strategy for development cooperation and just from that of course a lot of questions that are raised arise that actually and think up very nicely the the last time statement for example I'd be interested in questions like what happens or what is the the current debate and surrounding the export of surveillance technology from Germany and Europe I might be interested to learn how implementing the human rights policy protecting human rights defenders in developing countries where you operate and how do you support human rights defenders of to access secures channels of information uh or communication or I'd also be interested like in India the implementing a social security scheme that is working with a lot of digital data and the impression I got so far is that everyone is happy that finally you got access to the social security system and you don't care so much or the people don't care so much about what happens to their data how do you deal with that with this the discussion that's just 3 examples of where would like to get some more session the current debate thank you thank you I'm going to take that present that to the panel enough to what options from your opinion technically aura regularly regulating the EU and support and the and if I understood your question I asking about how to protect your rights the that thorium asking about the current policy and implementation in the Ministry for the thousands alterations we OK so I can't speak for the ministry at all I'm I'm just a researcher on cybersecurity
and but yet what would be possible then so and and as we heard I think out of these 300 digitalization initiatives and as far as I understood there's no initiative yet really about them security or privacy protection port is that right no OK yes it is yes you think and well we do have those 300
projects and dumb that of course we also deal with that and data security security and and when you look at our launched agenda there is a big chapter in here when we when we look at human rights in their and their scientists here so this is
actually the where we stand today of course that their colleagues from that human Rights Department which is not mine minus the ICT agitation department they also work on the strategy so I think this is something that we can you know maybe you talk about later because you know this is something that the cliques are more familiar with the human rights which in itself and so on so this 1st thing and you are asking about exports of anions I think this is really a very um important issues still it is the export of German goods is of course not the mandate of our ministry is a different ministries right we don't exports thanks and my mind my ministry you mean yet but if think this still is like that that mandate of that still the Ministry for Economic Affairs so this is something also what these colleagues are tackling and then that secure channels of communication just to be really quick how we also doing and projects here mainly I if I'm if I'm not mistaken but correct me if I'm wrong I Dutch Bennett together so there we have like risk so projects also to and safe and and security position in now well I think it was 1 1 particular 1 in each of on and then you will have our raising the question for that project in India the public health uh data security project not I'm sorry the public health project and this is really and at a point where it's a weak point I'm not sure how exactly we do security this data and I really think that this is something that we have to look on particularly and then and more closely so thank you very much again for raising the awareness and so on yeah so yet and I just like to jump
in terms of what we can do so I'm I think uh you know just look around for example here in Berlin or in maybe whatever city you come from I think there are many small there many small initiatives like Adam now I can think
of the quot apparently in which you might know you know people who teach you how to encrypt information people organizations like Tactical Tech who teach journalists human rights defenders how to and use technology securely and I think we do have a lot of people here for example in Germany that know how to improve and digital security for our and you know it protecting people's humans rights and I think that it would be very good is I'm since the Ministry of Economy Ministry of development for example has forces on the ground right they have people in these countries and uh abroad and maybe also the Foreign Office but that's the 2 ministries and I think my suggestion would be you know pair up go there and do workshops with people the you know teach them how to and improve security ends and probably not only in the big cities but also go out and I think this has to be very local endeavor as well then another thing would be to do this maybe by online platforms and I think in many and projects you're already using online platforms for education for example and I think these initiatives are important and then obviously and we also have legal frameworks yeah in Europe and in Germany bad and could serve as a basis for our for other countries to adopt and end so German policy makers good you know explain the policies the advantages disadvantages and also kind of export this policy model and this is already happening for example if you look at the European Data Protection lies and they have been adopted throughout the world in many countries already and I think we should maybe invested but more you know force into this and at at this time just very briefly just work staff and I
think also what can be done is uh you have to step
up and work 40 because there is no policy or strategies that can do the work for you you you understand what i years mean I mean and you have to work for you I mean even if it would and then the policy it's your agility to be active and to protect yourself and say what you need and do what you love and later on policy order ever dated on legislation or whoever is in the power will be obliged to to the goal box to do what you want but they added stigma
present and we don't have too much time so take 3 questions at the time of their athletes and then will have the final but at this is a question for thumbnail and when you are talking to our policy makers me trying to events people to see this is a real important issue you actually use the term cyber security is this an easy way for you to fall to trap of other states who were trying to argue that this is something new or even though their existing loss adjusted to be transferred and translated into on this new around overall isn't really that different from next I almost never sees server
security and on the in we we have all of in Europe when you say data protection and when we say that protection United States means different things we privacy sometimes means different things in terms of advisory roles in my colleagues and I have played with the United Nations specifically on these issues on what is very clear is we we mostly are not talking about viruses and we're not talking about servers that's part of what we're what we're really talking about is on more than anything we've got the mood lighting up now is so big that it was it where they single what we're really talking about is human security series on around how vulnerability the vulnerability matrix is change and I was I love your terminal when you said where were engaged in the movement light
from 1 state to another and
on we we are at this moment of of migrated With this industrial revolution based on what the tag could do and we made no investors no investments in everything that human beings need which is good laws have evidence on social compact so what we're having to do now is to retrofit the social compact under the back and we issued something in January called the signal coat that signal co . org we've red all available international humanitarian and human rights law and we
ate I asked my team OK I this is a funny moment I went to my team and I said their work and have some very technical people we do a lot of things wrote sensing a set for the next 6 months I don't want you to innovate anything if I catch you innovating you fire OK please for the love of God do not have a good idea on in do not talk to me about adoption a scaling I will throw something as 1st 6 months we will do nothing but read all law everywhere in i that related to humanitarian related to laws of warfare Morgan identifying what rights related to information
cyber is what we're calling cybersecurity the data protection in people protection exist
we found 5 1 people have a right to information during disasters
equal to food water shelter medicine other forms of human humanitarian to people have a right to be protected in how information in data is deployed stringy people level right back to emerging norm from European privacy law thank you Europeans but have a right to data privacy and security for this is critical people have a right to data agencies to know what is being done with the data to be involved in it and to not be a subject of experimentation without consent in 5 people have a right
to redress In rectification so really mostly we talk about is how we take that from some white guys in appeared telling yourself into a set of workflows and operational policies does mostly where do in cyber security is sometimes lasting the I we do
it we are writing at times we will take 2 quick questions and at this time 50 thank you some desserts are the data is people data can also be organizations or companies are amenable to the major the reasoning of the cyber attacks and all of the data for the whole and you know what countries are operated was held for ransom there was a very difficult thing to out of and the economic impact of warfare and the country's pretty serious the potential economic impact of cyberwarfare whether whether that is sort of like the stealing IP from 1 country for it to be made measured for things Remote place could have a detriment particularly to the inventors entrepreneurs small medium this business is to try to make things from the start up do we have to we have much of a sense of what the risk is to economic development of countries from sort of security and the financing of service that impressive the group hi my question I think I guess it's for you and the panel and when comes to the right to redress and Rick rectification and in particular I wanted to ask about I'm in areas of war and I mean particularly on the the diaphram war in Nigeria way and it happened see 50 years ago I think and and that was cut out from the curriculum or the government thought they were doing a good thing in expunging history and from the curriculum and so that get old information right and because of that we have been of new groups of on agitated is wanting to succeed because now all that information diesel um it's from every way so is there a way for some countries like the 9 Gerianne 1 like countries that have been torn apart by war genocide where on the right to information like factual information from organizations like the the red cross and you know Doctors Without Borders and he's distilled in a way that people can access it is accessable and it's not known to a misinterpretation and we're having to deal with you know you will wars and genocide of over again right from 1 let's go back 1st the economic impact in monitor you ready to respond to the economic impact of what that he these is so clear because if we go
back to that was if you will see that uh to benefit from the potential of ICT you have to build trust and then we'll talk about building trust you are with services it there is no digital economy without cybersecurity and cybersecurity self is becoming a part of the managing grace that cooperation and it is already a markets so it is economy that is the future economy cannot go without the cyber circuit and if you ILO me I can give
short answer for that I'm afraid that the question you are asking does
not to have tool uh to be uh and there under the cyber security because it is the responsibility of the those who are posting this information I mean this is a responsibility of the media and it's it touches the disk credibility of new was going online and it's the responsibility of those who do care for their history to put this information on this is my OPT and yet
they might think yeah I just like to add something to your reply about the economic aspects I'm not really aware of any it Diana always statistics that I would say a very reliable about the risks to are and businesses they are statistics about the cost of cybercrime and you know that there are
more than about 500 billion per year and so on you might be familiar with that but in the end I think it's very hard to to estimate that because how like you know which factors do you can't you only fact fragmented do only counter and monetary factors for what about reputational factors for example and for a small this is this can be kind of death right in the business does have a reputation you mark the trust is gone bad hot and so I think that it at it's very hard to measure trust in that way and so maybe we should work on that right now how do we measure the stress how we can how can we keep it up and that makes me also to Nathaniel point earlier so I sit on the World Economic forms of
artificial intelligence in I O T and the future of trust
ethics network basically were were trying to your point in through on were trying to figure out how we figure out a quantification answer OK on this in and because so instead of and I wanna introduce a term here that there are multiple types of exploitation of data going on with type holidays so types of exploitation that are different in the developing world I'm I call this in many cases data colonialism we're at a moment where there is extraction commodification in lower regulated environments that would not be possible in the United States the joke make all the time I wanna talk to humanitarian and on people used as you do stuff in Africa you might win the Nobel Prize for the you get arrested for in Kentucky and so the the so what we we don't know how to measure it yet but we're measuring it in the disparate way and we are primarily 6 companies control most artificial intelligence algorithms 6 this we're doing very good at measuring the economic cost of because that's where the economic interest is in terms of hacks of remittance data flowing from lesser developed countries or back-and-forth we actually don't yet know how to measure the totality of of the remittance environment because in many ways gender plays a really important role in culture we don't have basically what we call Teller demography a serious tell demographic assessment to be able to measure the scope of where does the economic effect lives in were primarily doing it for rich people you alright and
I say we can keep talking about this last question and after the system we have ever reached the end of it and before i at we would like to invite you to but this before and for a for each of the remarked and in 1 sentence and the 1 most urgent thing in this complicated and complex domain that we for about what's 1 thing
that we may be all of us in this room maybe the world needs what's your recommendation with a
microphone please time mine is cooperation there is no more
security or cybersecurity without cooperation even the traditional 1 doesn't always out by last
sentence is bad security is not a 0 sum game it's always there
when when no matter what we might hear again from intelligence agencies and that the basis for cooperation and again is American Educational serious Jonathan Kozol said charity is no substitute for justice and I say innovation is no substitute for rights and I wonder to beat up on 1 thing that we heard in this panel inspect our
original title deficits Tibor we're already speaking cost area that we need to start the yes I've had data is people without caffeine it would be a positive dynamic encrypting we have a microphone for you the let me let me just briefly thank everybody and also for the commons and their and their audience and what I learned is
some trust is a keyword within this particular discourse I learned that for financial transaction and also for a and all future Digital our economy cybersecurity is the basis thank you very much also for raising this issue I think is a sole something also very important I learned that actually people are weaponizing information but there is a war on trust on i we have the obligation to protect the face and I also learned that and I thank you very much is about 4 for really I'm emphasizing this that we can't just leave the whole issue of data protection all it's a cybersecurity to defense and military but that we as development cooperation to really have a responsibility here and and to do that that this is a sector plan that we need to get active and then I also will take on that there is a homework that we have to do and I heard you very clearly we have to get active else about the Nathaniel thing like this and this is something where also Germany within the whole development cooperation the schools could take a leading role and and I have of me to do this on my to do list 1st to date has people and
2nd watch the pedestrians and and the 3rd 1 is to final design good stable szepesva'ri projects thank you very much they're
all over the world playing a you