At the opening of the 5th Workshop on the Future of Security |
On 16 March, the 5th Graz Workshop on the Future of Security took place in Graz. It was dedicated to "Human Security in the Information Society: Regulating Risks – Empowering People" and I was one of the organizers.
We'll publish the presentations in the next edition of Human Security Perspectives (here's the link to last year's papers) and here's a short report on the university's media site (in German).
I've made some notes on the presentaitons of the four invited keynote spakers. Please find them enclosed (but remember, they are my notes and summaries, not the speaker's, so don't quote or cite, but wait for publication of the workshop papers in May 2012).
Keynote Session I: Human Rights, Technology and Online
‘Securities’
Wolfgang Benedek |
Human Security in the Information Society
Wolfgang Benedek
Institute of International Law and International
Relations and European Training and Research Center of the University of Graz,
Austria
Calling ACTA a useful hysteria Wolfgang Benedek introduced some of the key challenges to human rights online. Everybody is concerned with cybersecurity, he argues. Misuse of cyberspace affects the individuals seriously. The examples of Georgia and Estonia have shown the extent to which cyberspace can be instrumentalized to exert power. But the Internet is also an interesting tool to fight for human rights, as the (not unproblematic) “Kony 2012” campaign shows.
A central problem is the “complicity” of some companies in human rights violations. But in filtering, blacking out the Internet, the state is also endangering human security. Human security has a wider focus than state security. Individuals need to be empowered in the information society. We need to ensure access and freedom of information. We need democratic and decentralized responses.
Transparency is important also with regard to state. Examples of good practice are Google’s Tranparency Reports, websites such as Chilling Effects, and the Council of Europe which has passed important guidelines on human rights in the information society. Self-regulation by stakeholders, by example through cyber-cops, is not enough. What we need is a common, multistakeholder-based approach to refining the principles on which Internet Governance will be based.
Cyberspace is not a lawless zone, there are responsibilities for states, individuals and companies. The “10 Internet Rights and Principles”, developed by the Internet Rights and Principles Coalition, can provide important guidance.
Wolfgang Slany |
The Threats of Social Engineering and Malicious
Insiders to IT Security
Wolfgang Slany
Institute for Software Technology, Technical University Graz, Austria
Wolfgang Slany reminds us that there is too little awareness about the threats
of new technologies. Too many network administrators are naive to the threats
of social engineering and malicious insiders. The biggest problem is manipulable
human beings. We are all much too ready to open up and tell our stories. People
are the weakest link in IT protection infrastructure. The Internet will never
be virus-free, just like human health will always be in danger.
We need to rethink trust in the information society. But we also need to
rethink what we throw away - this enables identity theft. There is too much
miscommunication between the technical and the human rights communities. We
cannot just give up responsibility to the technical community.
Keynote Session II:
Political Contributions and Military Challenges to
Human Security in the Internet Age
Ernst M. Felberbauer |
Ernst M. Felberbauer
Head of Research Management, National Defence Academy, Ministry of Defence and Sports, Austria
Ernst M. Felberbauer identifies some of the central challenges that the Internet poses for human rights. The Internet changes the way we think about issues of war and peace. The “Kony 2012” is one case in point, as is the public reception of “Assad-Gate”, the publication by the Guardian of emails from the Syrian president to his wife. The Internet makes information spread incredibly quickly without reflection.
These dynamics need to be taken into account, as we consider the evolution of conflict in 20th century. Today, especially after the Arab Spring, it has become clear that legitimacy of governments is important. There is nothing like a humanitarian military intervention. Military logic will predict in war what will happen. The question is when we stop to make this relation get out of hand.
Governments have a certain responsibility not only to protect the networks but also to protect their people. Cybersecurity is an issue that is by now at the forefront of a number of international organizations.
Currently, the Austrian authorities are working on a National Cybersecurity Strategy which will be made public in the near future. A Cybercrime Resource Center will be created. Within the military, a reshuffling of capacities will lead to more cybersecurity personnel.
People should not get hurt. In order to protect them, we need to conclude the legal framework.
Jörg Leichtfried |
How the European Parliament Safeguards Human Rights on
the Internet
Jörg Leichtfried
Member of the European Parliament, President of the Delegation of the Social
Democratic Party of Austria to the European Parliament
There are three dimension to policy-making, Jörg Leichtfried explained: what is
meant to happen politically, what actually happens, and what is applied in
practice.
The EU is clearly an export-oriented continent and it is quite a problem that
our successful trademarks are being pirated. While ACTA has a legitimate goal,
its realization is problematic. It covers WTO law, and could thus be brought
before the Dispute Settlement Body.
But
there is another problem: the second part on intellectual property rights in
connection with virtual products. Big international companies are protected,
but a whole generation of people might be illegalized.
Further, the negotiations process was much too opaque. Also, penal law should not be used to counter IPR violations. Private data could be compromised if business interests are at stake.
Further, the negotiations process was much too opaque. Also, penal law should not be used to counter IPR violations. Private data could be compromised if business interests are at stake.
As the case of German lobbying for dual use technology has shown, governments sometimes act against the interests of human rights.
Leichtfried underlined that it makes much sense to pressure European
parliamentarians to ensure human rights-sensitive policies. The Internet can be
used to effectively mobilize civil society. In fact, anti-ACTA protest
was the first real revolution of civil society in Europe.
Organization committee
(left to right) Wolfgang Benedek |
Cristina Pace|
Pascoal Santos Pereira Heike Montag | Paul Gragl | Matthias C. Kettemann |
No comments:
Post a Comment