Surveillance, ICANN transition dominate NETmundial meeting
A non-binding statement called for Internet governance decisions by consensus among all stakeholders
IDG News Service - A global Internet governance conference in Brazil concluded Thursday with a strong focus on countering surveillance, including asking for a review of the implications on privacy of existing practices and legislation.
The meeting also spoke of the need for consensus among global stakeholders in the development of international Internet-related public polices and Internet governance arrangements.
A large issue before Internet users, organizations and governments is planning the transition after the U.S. National Telecommunications and Information Administration ends its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN), which expires in September next year.
The non-binding outcome of the meeting in San Paulo also stressed the need to protect intermediaries, and called for cooperation "among all stakeholders" to address and deter illegal activity, consistent with fair process. The meeting did not take a stand on net neutrality, which many activists were demanding, and listed it among the issues that need to be better understood and further discussed in appropriate forums.
The two-day Global Multistakeholder Meeting on the Future of Internet Governance, also called NETmundial, was largely influenced by disclosures by former U.S. National Security Agency contractor Edward Snowden since June last year of large-scale surveillance of the Internet by the agency and spying on foreign leaders, including Brazil's President Dilma Rousseff.
Nnenna Nwakanma, Africa Regional Coordinator of the World Wide Web Foundation, thanked Snowden in her speech during the opening ceremony Wednesday. She reminded the audience that Rousseff had said at the U.N. General Assembly in September last year that "in the absence of the right to privacy, there can be no true freedom of expression and opinion and there is no effective democracy."
In the event, a new paragraph was added in the final statement that asked that the "procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, including mass surveillance, interception and collection, should be reviewed, with a view to upholding the right to privacy by ensuring the full and effective implementation of all obligations under international human rights law."
The statement, however, fell short of the demand of some activists that the text should address the surveillance by the U.S. including the participation by Internet companies. Documents released by Snowden had alleged that Internet companies like Facebook and Google had given the NSA real-time access to content on their servers. The companies denied their participation in the project called Prism.
Some civil society groups have criticized the final document for, among other things, not acknowledging net neutrality and for not sufficiently denouncing mass surveillance as being inconsistent with human rights. "We feel that this document has not sufficiently moved us beyond the status quo in terms of the protection of fundamental rights, and the balancing of power and influence of different stakeholder groups," the groups said in a statement.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts