Morning - Afghanistan Internet Governance Forum (IGFA 2023)

    4:59AM Dec 6, 2023

    Speakers:

    Wolfgang Kleinwächter

    Keywords:

    internet

    afghanistan

    igf

    create

    content

    internet governance

    ai

    digital

    community

    apnic

    security

    work

    governments

    year

    cybersecurity

    online

    presentation

    youth

    question

    information

    My name is Donna

    except today metadata interval

    as you sell ombre Savannah Maggie Shambo

    social MOBA Hi she will make an Amazon daddy luncheon on it

    on Mr chanin as I want to increase seem economical elastic a

    recording in progress Wi-Fi For that all snuggle banana is broken in case I will Let's move on

    to mute color within IQ Africa so why Misha wanted to get on was I Matthew Jordan happening

    Hello and good morning everyone I welcome you all

    from wherever you join into this session of youth ID kamistan 2023 and amosite Jr Mal. I'm one of the board member of Internet Society Afghanistan, and this year coordinator of youth IDF Afghanistan. So glad to moderate this session today.

    Before introducing our horrible speakers, I would like

    to share some information about youth IDF Afghanistan and its program in Afghanistan. For those who are newly participated this year in this event. Youth ID phase journey in at the Youth Internet governance workshop during a workshop during Afghan Afghanistan first understand first national IDs now IDs I IgG key stakeholders, youth IDSA envisions youth powered digital transformation for Afghanistan. The mission is to empower Afghan youth in shaping the future of Internet Romaine full participation and inclusion in governance decisions.

    Again, after two years, we are happily organized this online edition to bring Afghan us together. I just checked that some of our speakers are still not online. I will keep checking if all of our speakers are online

    or participate for our

    participants. I have to say

    that we have also a q&a at the end of the session to kindly note your questions and ask them at the end of the session or write them in our chat box. Our speakers will answer them all. At the end of the session.

    After Nazzaro Git we will take a group photo at the end of the session care of it

    just ticking if two of our speakers are still here,

    we got a start with introducing our speakers.

    Okay, so we have all of our speakers right now. They're all online.

    And I would like to introduce our all speakers in this session

    Yeah, Miss sub article,

    the role of youth, with ID topia, and also representative of Africa and

    Middle East advisor.

    Jeff also Anya again goes from UN Secretariat for Internet governance volume. Also Mr. Hadley Vahid senior international security specialist

    at ebony also Mr Omar antari from APNIC foundation also have a lot of one hell that's not coordinator the hand we have also miss you Paralympic Committee member Myanmar youth ID and also member at APA youth ideas

    Big meaning I would

    like to invite Miss Saba people to introduce herself or our participants.

    Also keep her presentation on visioning the Internet in 10 to 20 years and insert into the perspective 10 years challenges and opportunities as a vehicle, Mr. batiko. Followers us if you could

    share your presentation. Thank you very much. Such

    I hope I'm audible.

    Thank you. Thank you very much. Hello, everyone, distinguished guests to say colleagues, and also

    my fellow young leaders. Honored to be here today at this remarkable event of the Afghanistan, US ATF. Just to introduce myself. My name is Saba indem, a member of the UN IGF multi stakeholder advisory group, and also a representative of Africa in in Middle East at the US coalition on Internet governance or the YC. He is also the founder and coordinator of the US, IGF Ethiopia. So I would like to express my gratitude to the organizers of the Afghanistan use it for extending this invitation and giving me the opportunity to share my thoughts with all of you. Okay.

    So, today, as we all gather here, we all find ourselves at

    a critical juncture in the evolution of the Internet. You know, the Internet has transformed the way we live, the way we work, the way we connect with one another For me, it's it is also continues to shape our future in in profound ways. So the topic I've been given visioning the Internet in 10 to 20 years, which is an insight into a perspective changes, challenges and also the opportunities is Both timely and also thought provoking as we stand at the short of the next decade we all know that The internet's poised to undergo a profound transformation driven by the relentless pace of technology advancement, and also the evolving needs of a digitally connected world. So let us delve a bit into the realm of possibilities. And also let's explore about the prospective dangers that lie ahead. So in the next 10 to 20 years, we can expect a hyper connected world where Internet will permeate every aspect of our lives. For example, universal connectivity will extend beyond our devices seamlessly integrating into our physical surroundings. You can imagine cities where restrict lamp is a Wi Fi hot spot, home where every app every appliance is connected, and also cars that communicate with each other, enhance the safety and also the efficiency as a result of IoT or Internet Internet of things. Internet with also transcend the boundaries of screens, up creating an immersive experiences that blur the line between the digital and also the physical world as well. If we take augmented reality and virtual reality with become a commonplace, allowing us to, to explore virtual landscapes and angles to interact with holograms, and also allowing us to experience education and entertainment in ways we never imagined before. Artificial Intelligence will also permeate every aspect of our digital lives, enhancing decision making. automating tasks and providing personalized experiences as well will play a very important role in revolutionizing industries as well as augmenting human capabilities, so it must be prepared for the transformative impact of technologies like blockchain and also quantum computing as well. Data will also become a cornerstone of informed decision You're making allowing governments and organizations to make a data driven policies mentors optimize a resource or location However, this will also necessitate a robust data governance frameworks to protect privacy and also ensure the responsible data usage.

    So, I mean, that

    promises of this increasingly interconnected future, we

    also must acknowledge the challenges that lie ahead. And these challenges demand our attention, as well as our proactive engagement to ensure that the Internet remains the force for good. If we take for example, that digital divide is a gap between waste and without access to the Internet, and it remains a persistent challenge must strive to connect the unconnected, ensuring that the benefits of the Internet reach every corner of the globe. As resilience on Internet also deepens. So do the cybersecurity threats that we face in must also priority, prioritize cybersecurity, developing a robust cyber, robust defense against cyber attacks, and also fostering a culture of cybersecurity

    awareness.

    There is AI and also other emerging technologies also raise ethical concerns, you know, around privacy, and also some kind of job displacement as well. So we also establish an ethical framework in order to guide the development and deployment of this technology, ensuring that they benefit society without compromising the fundamental rights. The internet's transformative power as a whole is,

    you know, only realized when individuals process

    digital literacy in also skills digital skills to in order to navigate it effectively.

    So we have to invest in education,

    we have to invest in training programs in order to give individuals with the skills they need to thrive in the digital age. So amidst these challenges, this changes, there are also immense opportunities that await us. As young leaders, we play a pivotal role in shaping the future the Internet, we are the driving force behind innovation behind the we advocates for Equity and Inclusion. The architects of a sustainable and ethical digital future can become instantly champions by engaging them in governance discussion like this, at the national or regional level, and also at the global level, advocating and contributing to the development of norms and standards for responsible and also for an inclusive intimate, can empower communities through digital literacy

    by sharing our knowledge by sharing our

    skills with other by organising workshops, training programs, and bridging the divide that digital divide by empowering communities to to harness the internet's potential. Sorry, we can also foster a global collaboration by collaborating with young leaders from around the world, sharing our innovative ideas and by building a global network of youth advocates for a better infinite future. It's also very essential for governments for civic society.

    For the technical community in the, for the private sector to work together for all the stakeholder groups, in shaping

    policies, in building infrastructure, and also in fostering a digital environment, can harness technology for social good by utilizing technology to address

    key critical social challenges

    by developing innovative solution for sustainable development,

    and promotes peace,

    promote understanding and promote tolerance through digital platforms. So envisioning the Internet in the next 10 to 20 years, requires us to be a forward thinking requires us to be adaptable and inclusive. So let's all embrace the potential that lies before us and Let's all work together to create an Internet that's open and secure accessible and beneficial for all of us so that we can ensure that the Internet remains a powerful force for positivity Ainge connecting us across borders in unlocking boundless possibilities and opportunities As a young leaders we have a poll to shape this future. So I would like to say let's all grab into this opportunity for us. Let's all engage in Internet governance discussion like this one today. Let's empower our communities. And also let's foster global collaboration and utilize technology for social good. Thank you once again, and I will now give the floor to the moderator. Thank you very much for your very informative presentation.

    In your speech. You mentioned there are harmlessly many changes,

    chances and challenges with Internet but there is also opportunities for us as a young generation to use from these opportunities to make a better world a better world for everyone.

    Thank you very much. Friends, you may have some question, please note your questions and we will ask them all the hands of the session.

    Now I would like to invite Miss

    Ania gain cool, gave this stage for her to present her

    presentation on basic of Internet governance and multi stakeholder participation. As Anya, if you're here. Thank you. Good morning. Thank you very much Surya and hello

    to everyone. It's a great pleasure to join you on the occasion of the youth Afghanistan, Nigeria.

    At the beginning on behalf of the IGF Secretariat, I would like to congratulate the multistakeholder organising committee, or Secretariat, ISOC, Afghanistan, Nigeria, of course, thank you very much for moderating this session. Thank you for bringing us all together after a few years and after a very challenging period for all of you and all the people gana, Stan. Regardless if you are in the country or outside, it's just wonderful to reconvene again and address some of the most important digital public policy issues. I think Saba sent a very nice motivating message on the importance of young people to Internet governance, digital governance discourse. And I don't need to further underline that. I would like to focus now on the practical ways of voting engagement in Internet governance and how young people can really make a change through the existing mechanisms. Allow me to start from the concept of Internet governance and the Internet Governance Forum in the next couple of minutes. Dalio pragmatically How can you be part of the global discussion process? And with that impacting and influencing the decision making practices from value perspective? First of all, we could go to the next slide, please. Such Yeah.

    The slides are not changing for

    me, I only see the color slide.

    I don't know if that's the case when other colleagues

    yes, no, I can see a thank you.

    A little bit of history, I won't go deep into this quite

    complex history that is now more than two decades

    old. But what you need to I think to know and to understand is the concept of the World Summit

    on the Information Society with us. That emerged

    in late 90s, early 2000s as a United Nations concept through which all stakeholders could discuss matters pertaining to what we call that time Internet Society today, you will hear maybe more prevalent term which is knowledge society, but essentially it comes to the same it's technically, people being informed people working through using means of the Internet for everyday activities. So in in two phases, the business was hosted in Tunisia and in Geneva. And at that time, Internet was gaining more and more momentum and the stakeholders called for its governance. Since it was such a new concept, including with the United Nations, United Nations formed a group, a working group to define or describe what Internet governance is. And this definition that you can see on a slide is a working level definition that was coined in 2000. And I believe, five by the leg, this working group for internal governance, which had a multi stakeholder composition, and it's something that's very much present today we're working with that definition. And that is that the Internet governance is the development and application by governments, the private sector and civil society in there. respective roles, shared principles, norms, rules, decision making procedures, and programs that shape the evolution and use of the Internet. Having the definition, the very, very shortly after the first Internet Governance Forum was hosted following its convening by the Secretary General of the United Nations. So that title, just copy. So if we go to the next slide, I would like just to quickly speak about

    what Internet governance includes.

    And this is a slide that we borrowed from our friends

    deploy Foundation, and definitely really nicely

    illustrates the complexity of the issues and concepts domains that fall under Internet governance realm, you can see that there are various issues ranging from those associated with human rights to legal domain to development, domain, cybersecurity, that domain, social, cultural domain, and so on. Of course, the concept of all the content for the infrastructure and standardization is nation probably the most critical layer for all this. Because without meaningful connectivity without standards as such, we we can't have a meaningful way to discuss internal governance issues.

    Going to the next slide.

    In terms of the I believe, actors, a single entity has absolute control over the Internet. That was the essence of the Internet governance, defined by the, by the Widowmaker, that I've just introduced to you. And the concept since the beginning of Internet governance with the United Nations was that the oversight and development of the Internet is cyclically managed by a range of participants through what we call a multi stakeholder model where we will have a say in equal manner. This of course, includes the government into government organizations, civil society, organizations, businesses, and a very important layer of technical community. Next slide, please. Just to complement this slide that I've shared with you with Diplo, this is

    an overview of the key digital policy issues stemming from

    the latest annual IGF meeting that was hosted by the Government of Japan in Kyoto. I won't go in details about this, but you can see that the momentum really the situation in the world very much dictates what is the bottom up agenda of the IGF and what people want to discuss. So for example, this year, the idea was very much dominated by matters related to governance of artificial intelligence, its regulation, but also about the concept of to avoid Internet fragmentation to keep our online domain safe and secure. Data governance was of course central cross cutting, all of our sub teams are questions related to access and connectivity, digital inclusion We're all so important, all the way to concepts of human rights and freedoms online, just for example, particularly discussing disinformation and misinformation online, but also concepts of jurisdiction online, access to information, further expression and so on. And then finally, the past couple of years we've seen really drawing attention to matters related to sustainability and environment, in terms of how can we regulate, for example, e waste, how can we switch to Circular Economy, climate change, finance And and support to digital technologies reducing digital footprint and so on or going to the next slide Right

    yes

    this is something that I I wanted to bring to your attention just because

    I think it's very much relevant in some I've mentioned that when she introduced herself

    Can you be part of the IGF well let me first tell you what are the IGF structure and working mechanisms the heart of the IETF is it's more The stakeholder advisory group, it's a 40 members group that is tasked to advise the Secretary General of the United Nations. On the program and agenda for the annual meeting. The mag is appointed by the Secretary General following an open consultation process with the community where anyone can nominate anyone. And every year, the magazine totally renewed for approximately 1/3 of its membership. We did last this year, are planning on the next year's meeting which will be in in Riyadh in Saudi Arabia. And Saba is a member of the multi stakeholder advisory group, and especially an important one because she has close linkages with many of the youth initiatives and she runs a youth initiative. She is a young person by the UN definition of the youth and that's very important to us to have the voices of young people channeled into the really internal decision making processes with the IGF. Since the last two years, the Secretary General of the UN has appointed the leadership panel as well that is chaired by Mr. Vint Cerf, the leadership panel has a task to elevate the IETF to make it more impactful to translate its outputs to to help decision making and other types of processes. Everything is neutrally facilitated as a process by DHS Secretary, which is the office where I work is at the United Nations Office in Geneva. I said at the beginning and also following the definition of internal governance, that Internet Governance Forum, establish the internal governance ecosystem is really relates to a value based framework, or the way we address Internet governance and the way we want to govern the Internet. And that framework of values relates also to the core principles of the IETF which means it's about the stakeholder forum, a process open to everyone it's bottom up, which means it's really for the people and it follows the pulse of the community in all its procedures and practices, close and transparent and non commercial. Moving to the next slide.

    This whole structure is happening throughout the year. There are two major components of the IGF, which is relevant

    to people who would like to engage, including, of course, many of the young people. That is that there is the annual meeting of the IGF that is every year hosted by a different government. And in between the two annual meetings, everything that's happening it's called the intersection No work which takes different forms for example best practice forums listening networks those are community driven working groups that work On unpacking certain Internet governance issues the most important for you to know is that they are open to anyone to join and they really welcome anyone's input you can just go to the IDF website Subscribe to the mailing list and then start engaging with the existing groups. Thank you Next slide. I'm just following my time. I know I have around

    10 minutes. I'm close to my remarks. Let me just

    not speak a lot about what happened at the IGF in Kyoto this year, or the intersessional work because I think you can visit the IGF website to learn more about the great outputs from the IGF in Kyoto, including the Kyoto messages, and the intersessional work. But I want to ask just to Jaya to please go all the way at what Harun to please help me to go all the way to the concepts of digital Corporation, our common agenda on slides. There are a couple of slides there. Next one, please. Next, I think you there are three four slides to skip.

    Next one, next one. One more.

    The IGF facilitates youth engagement throughout, they are also through the Youth Track. And I will make sure to make these slides available to

    you, you are most welcome to join the Youth Track through your coordinator and support channeling voices of young people into the annual IGF meeting. But also into the IGF ecosystem as we work a lot with the regional IGF as well. So I will make sure that the colleagues that are coordinating the Youth Against IGF receive the invitation so they can join our practices, concepts of digital cooperation, our common agenda is something that you will hear a lot about in the discussions that currently Internet Governance Forum. And I just want very briefly to say that both of these concepts relates to the two reports that the Secretary General issued. Very recently, everything was happening in the past three, four years. While digital cooperation and the roadmap for digital corporations recognizes the importance of NRIs, including the young people and encourages the IGF to connect better to forge linkages with these. It also established leadership panel. So that's the outcome that I was just mentioning. And if you go to the two more slides, please head of the global digital compact. So one more please.

    One more common agenda is the latest report from the Secretary General it

    speaks about the future of global cooperation. underline

    the importance of digital that's really cross cutting almost all areas of our lives. And it calls for agreement on the global digital compact to outline shared principles for an open, free and secure digital future for all. The next slide that hadn't will help me to go through now illustrates what this digital compact is about. There are a couple of areas that are hopefully to be agreed by the next year, Senate of the future, the global digital compact that was subject to multi stakeholder consultations for a certain amount of time. And now we will hear from the member states, discussing how potentially the GDC could be agreed, taking of course into account the valuable inputs from the multi stakeholder community received during that consultative practice. Don't play to the last slide. I just want colleagues to see the email address you can email us and we will be very happy to hear from you. Thank you very much for your attention. Thank you very much on your for your informative presentation.

    Now I like to appreciate if Mr. Attlee while he is there and explain us from ABCs and importance of cybersecurity, Mr. Warhead I'm here Thank you sagia. Am I able to share my slides? Or are you guys gonna do that for me?

    I can share my screen. The team have the presentation if

    I'm just asking if they can share it or if they can allow

    you to share your screen

    okay,

    I'll share my screen now. Perfect. One second.

    You see my presentation?

    And you can see Yes. Okay. am I sharing the right

    Yes, we can say

    yes, absolutely. Okay. Thank you so much. So thank you once again. Good morning. Salam aleikum, everyone, my name is Ali from APNIC. And I am here to

    share the ABCs. And importance of cybersecurity, there was a topic given to me, cybersecurity is actually a big topic. And I've been doing cybersecurity for a long time. And normally, we need more time to discuss this, but let's see how far we can go. And I'm really glad that you have this topic. As one of the key issues to be discussed in your meeting today. And definitely we need more people, especially young ones, to participate and have some discussions and collaboration in cybersecurity. Before that. You guys have LinkedIn or social media, let's connect so that we can continue the conversation after the presentation. So let me start off by by asking a question, why is cyber security critical, everybody's talking about it, every program that we hear about today will have security or something related to security, protection, you know, safety, and so on, and so forth. One of the main reasons for this is that cybersecurity of cyberspace is very pervasive. We use it for every single thing that we do today. And not just learning, but also, you know, Transaction Banking, information, sharing tons of information stored in someone else's computer or the cloud. And therefore, you know, there's a lot of sensitivities that needs to be protected. And this is because of the evolution of technology. Because we are digitizing everything, we're putting lots and lots of information everywhere on the Internet. And if there are no protection, the information, the infrastructure that is protecting or storing the information, like your network, your systems, your phones, your devices, how are people who manage all of this do not know, security issues, then we are all in trouble. That information can be accessed by those without authorities or those who do not have privilege or rights to access those information. This information could be abused or used against the original intention of that information. That is why cybersecurity is very, very important. And of course, there are many other reasons for that. But I think the bottom line is we think about cybersecurity, think about information that are being collected and stored. And what happens if this information is being accessed by malicious actors. From another perspective, especially from

    the business side, and if you are trying to pursue cybersecurity education formally, then it

    is always said that when we do cyber security, we have some goals in mind. So what are those goals? So those goals are to make sure that information that are supposed to be confidential remains confidential, to make sure that whenever we are processing information that we can trust the output. So if I receive an email from saija, it is actually an email from her inviting me to a meeting a fake person using her name, and trying to trick me into paying money into her account. Integrity is very, very important. And especially today, we are looking at information or action being taken. without human intervention, a machine receives input from another machine. And if that system is acting on input information, or modified information, then we could be at risk. And last but not least availability. Imagine, you know, you have everything set up the cyber world, and attackers, such an attack against it, making it unavailable, making it not accessible. And this can have various impacts to organisations to users, and so on and so forth. If you have been following the cybersecurity industry, lately, you may have heard of attacks called ransomware, where you know, computer systems are being compromised by attackers. And then not only that, they lock up the computer, the threat the organization, you pay us money, you don't get your data back, or we will publish it on your behalf. And thus exposing a lot of confidential information secrets and things like that of the users of the organization. have been also, you know, data breaches incident impacting hospitals or banks, as well. And these types of incidents have impact the security goals that I've mentioned earlier confidentiality, integrity and availability. So from the security managers perspective in for organization, the game is to secure the infrastructure and security information so that the business can continue can operate so that customers can trust us when we collect their information that their information is as being safeguarded, when government collect information from citizens know that, you know, we are protecting your private information? Well, the question is how do we secure things? Now, the bad news is that there is no one way to do this. This is where things becomes a bit complicated. Many literature talks about how to achieve this, we need a combination of a couple of things, we need good process. We need people with expertise with knowledge. Also, we need technology. If we zoom in into the technology, there are many technologies that are involved. The security community talks about security controls, and they are not just one or two controls, but there are many, they have a list of them up here. Security, assessment, encryption, antivirus backups, and the list can go on and on and on. The idea is that you have an infrastructure, and you have information that you want to protect, you have to know where they are, they look like and then think about how do we protect these things against unauthorized access, making sure that, you know, people without privilege do not have access to this information, that we have backups, and so on, and so forth. The thing is security controls. And security expertise costs money. So security is not free security

    is not cheap, something that you have to have, or you have to do, you

    are in the business, you know, in doing business in the in the cyber world. Last but not least, I have a picture of a floppy disk. I'm not sure if any of you recognize this this floppy, floppy disk. But the idea here is that over time, technology changes, and therefore we have to stop our security approaches to protecting information, where they are. So in the old days, floppy disk, then USB sticks, and now things are in the cloud. All this talk about needing the need to secure things, right needs to protect,

    who are we really trying to protect this information? From? Right,

    who are we defending against? So Hollywood has a version of a hacker that wears a hoodie. And as you can see in this picture, no one ever hacks like this by being so close to the screen. It doesn't make any sense. But really, we are up against people with motivation means to do so. So let's say I really want

    something from you. So I will try to think what can

    I get this information, oh, email, email could be a goldmine with lots of interesting information about an individual or business. So they will try to go through the email, maybe try to get the password or maybe you know, send a piece of malware, when you click on it, then it will give you access to that email program. So generally, you know, in the in the security community world, there are labels given to these kind of people, you have hackers crackers, there are nation states, you know, state sponsored actors government who are actually attacking one another, for several reasons that they have cyber criminals who are doing this for money. There are people who are doing this full time job as a full time job. There are fraudsters information that are stolen and use that to trick you into giving them money, and so on and so forth. So there are all these labels. But the point is, motivation. And means are two key fundamentals that we have to understand security people, anybody with a motivation, anybody with the means, people that I need to defend the system against. And a lot of these activities that are done by this group of people or groups of people are actually illegal, right. So this is where if you have laws in place, or if you have policies, all of these activities are against those policies and laws. For example, to gain access to an information in someone else's computer, you are actually committing unauthorized access, because you don't have access to these things, you are doing it illegally. So, these are all some other areas and I highly recommend because all of you are some of you might be interested in this field to check out these two books count down to zero day and that is another book.

    So why we are we care about security? Number one, because organization does a lot

    of information accesses and you know and services and therefore organizations need to do security, no matter how big or small they are. If they are on an intranet, if they use technology, they are exposed to some of the security challenges that we are talking about. Some organizations or many organizations, depending on where they are, have to do security because it's the law, right? It's a requirement to comply. So It's not just because it's a good thing to do, but because if they don't do it, they can get fined, right, or they cannot operate, or something like that. And then organization security consists of many activities. So it's not just one job for one person, could be multiple roles within multiple departments of people, and so on and so forth. Right could be managing, printing, more Technical lettering, the response date, and also indication like talking to less of the employees about why we need to do security, and so on and so forth. And maybe as an exercise, you can think of what sort of security job to the hospital do within within a hospital, and what kind of security work does bank need to do financial institutions, you will find that they are on basically the same thing. Because these two institutions, they handle lots of sensitive information. dividuals also need to be concerned about security. Because a lot of us have a lot of information online, we access to a lot of systems or services related to work or personal, these have to be protected as well. And we trust many providers with our data. So it's twofold. One is that you have to be aware of what you need to do security wise, number two, in associations or service providers that you deal with, to give data to them, you must make sure that they actually know how to handle security for your data. Because it takes it takes two to tango, basically, right? You need to do your part. And physician who takes information from you need to do their part as well. So individuals must have a strong sense of understanding what security is. And I think each and every one of us, also, tech support for our family, friends as well. So we need to tell them about security, that they don't fall for some of this ever attacks. Our security ecosystem is something else that we normally think about

    security to happen, takes for its

    from various players across multiple domains. So there are different stakeholders, policymakers, vendors, who produces tools, software, engineers who write protocols, civil society, law enforcement agencies, the security community, the incident handler community, for example, telcos and ISPs. So there's a lot of players and everybody has to work together different different areas. And this is one of the things that we APNIC tried to do in our various engagement with the community across the region, trying to make sure that people talk to one another, understand the need to talk to one another, and discuss how we can defend better together so that we can protect our users, right. So collaboration normally happens at national level or local level. Regional, right, and also international level. So if we have more time, I can go into some of the examples. Those collaboration. So in summary, it is without a doubt that cybersecurity is very critical, both organization and personal. It's just not a technical thing, having technical knowledge is definitely useful. And definitely there is a lot of areas where inequalities is needed. It's bigger than that, right? It's bigger than that it's legal, you know, it's marketing, its business, you know, it's different areas that you need to combine forces with protection of assets, through protection of information assets, lead to achieving the security goals, right. So that's kind of the bottom line of what we are trying to do. And as I mentioned earlier, this is not cheap. You have to invest some money, some resources, some time some expertise into building or maintaining security, being aware of the issues is the beginning, normally, right? So we have to know what is out there. What are what are people talking about what makes CEOs sleepless at night when they think about security. But also I feel that we need more people be in this domain. So to have the opportunity, maybe consider being a cybersecurity expert or one of the cybersecurity experts, that you can help organizations you can help communities you can help individuals to be more secure. And these days, you know, advantage of the free resources that are available on the Internet, there are plenty of them, take advantage of experts are still alive, you know, they can be contactable. And one of those resources that I would like to share is the APNIC Academy. We have some free courses for people to learn at their own pace, and maybe that will spark some ideas and motivation to pursue this domain. And with that, I'd like to end my presentation and happy to take up any questions if anyone has any later point.

    Thank you

    Thank you very much Mr. Hadley. I'm sure it was a very great and useful presentation

    for everyone here and I'm sure you would receive a bunch of questions.

    Now, I would like to

    use from this great opportunity to have Mr. Omar and sorry to share his presentation about technical

    training for young engineers in Afghanistan and South Asia. So I'm sorry the virtual Flores worse um, thank you very much.

    Can you see my screen?

    Yes, we can see.

    All right, great. Okay, tulta Salah Mona Farah last. But am I getting a push on my date Megan? Days Dr.

    Scholl, MJ, pasta Toka Luna IGF one is Lankesh Telkom, I'd like to thank all the people who are behind organizing ITF Afghanistan after a long break of my guest who years. I remember organizing the last idea of Afghanistan in 2019. It was great, great event in Kabul and physical but it's glad to be back in this unit in a Congo to lead the Afghanistan Internet Society. The old team that organize the event as well as bringing the young people together and the youth IDF Afghanistan. My name is Omar and sorry, I worked in Afghanistan's private sector civil society. But my last job was with the Afghanistan telecom regulatory authority. In currently working with the APNIC foundation. I'm running a project that's called the Afghanistan project, which I'd like to introduce. But generally, I'd like to introduce opportunities that are available through the APNIC foundation and APNIC in general, as well as some other opportunities in terms of fellowship, events in activities that the young people in Afghanistan could participate in. But before anything else, I'd like to introduce the foundation, the APNIC foundation to you it's the the fundraising arm or the the development arm of the APNIC. The mission of APNIC foundation is to default increase Internet investment and the Internet investment in the Internet development across Asia Pacific region. And this is through education training, and capacity building, as well as community development research and related activities at the foundation is in.

    You can see in the map

    the three foundation led projects 22

    SFP, shipments

    to SF Asia awards and seven foundation community assistance programs. So this is a list of activities. More informations on the website. But how do we work is there

    think we lost Mr. Omar I'm sorry.

    I'm sorry, we don't have your videos and presentation sorry that other device disconnected

    so I'm

    gonna continue

    right so

    I don't have the slides for

    you so back

    do you want me to share your presentation? There's

    there's also please share the screen The answer is

    not yet It

    probably is Hey

    See you

    trying to solve the problem and download the presentation server I'm sorry back

    you see my screen now

    we can see it answer say thank you. Okay, sorry for that. Me Right so, the three programs are infrastructure inclusion and in knowledge, we do a lot of support,

    tactical training in assistance, community development grants we provide grants and awards. Also the foundation supports infrastructure development projects and research and collaboration activities. This is to empower and strengthen communities of network engineers, security professionals in the Internet governance professionals in general. So all together it contributes to a global open affordable, accessible and stable and secure Internet. The programs that I have mentioned, the infrastructure including in in knowledge are further explained here. The purpose is to increase Internet speed reduce maintenance in operational costs, improve the reliability and security from a technical and operational perspective. So in order to achieve this, the foundation supports network deployment and operations, network monitoring and management and security and privacy projects across the Asia Pacific under the inclusion program, the purpose is to ensure that everyone has a meaningful in efficient access to the Internet, the online applications in services from a technical and operational perspective. So under this program, the foundation supports projects related to availability and connectivity, Internet access in affordability, accessibility and diversity. The knowledge program aims to develop technical capacity

    in or research around the Internet network operations from technical and operational perspective as well. So under this program, the foundation supports professional development, new information and training resources, translation of knowledge resources into the Asia Pacific languages. And that's because there are many people who are non English speaking. In order for them to be able to access this information. We believe the best way is to provide localized content and solutions for them. How do we invest in capacity development

    there? There are a number of examples listed here. Number

    one, the foundation supports APNIC Academy in terms of training, delivery and community trainers, so it's one of the sponsors of APNIC Academy. It also supports curriculum development for non technical audiences in support, research and Internet development, and the cybersecurity the foundation supports a project called Honey net and I think Adly we just spoke is, is is leading the effort and also threat sharing initiatives. The foundation also supports technical,

    runs a project that I'm leading for, it's specific to Afghanistan and then offers technical training at a mentoring for Internet professionals in the country. There's another project called switch, which is about gender in diversity in Asia Pacific. There's the foundation also supports school on Internet, Asia or soy Asia project. The soy funding mechanisms that are available for the community includes SFA Asia. funding or grants. There is an open qualifier proposal for 2024. And there's ipv6 grants available for for the communities across the region to apply for. There's also a foundation community assistance program available and trust type, this discretionary funding availability. So I'm gonna share with you a little bit about the project that I've been working on the project is called Afghanistan project was started in January 2042. But the project is now in the process of expanding to the countries in South Asia and the new name of the project would be digital leap South Asia in early 2024. We plan to start this project. So the Afghanistan project in their full name is technical training, mentoring support for Internet professionals in Afghanistan, where we

    kind of recruit 24, the

    32 African participants, who have background in network engineering and technology, there were 206 courses in learning activities listed or requested by these professionals, which included professional certification programs. So far 40% of these activities have been completed, the participants received 83 training and professional certifications. So far in about 60% of the participants have been reporting their monthly progress with with their training, the project, Ganesan project will be expanded the scope is you know, expanding both the geographic scope of the of the project would be changed and new. Project Name as I said would be is to leave South Asia. This is starting with with four countries of Afghanistan, Bangladesh Maldives in Pakistan, but in January we'll be able to launch Afghanistan Maldives in Pakistan, look for the resources and planning for Bangladesh at later stage. But obviously we are interested in expanding to to more countries in South Asia certainly to the availability To have the funding goal of the project is to enhance technical capacity and Internet development operations in security and policy and regulatory areas. objectives are to to enhance awareness and engagement. That is through supporting programs like IETF Afghanistan, six schools on Internet governance in Knox We are interested in doing the same in other countries and I'm glad empowered to to to see that You know Foundation has been supporting the initiative It is currently taking place in Afghanistan developments technical knowledge and skills is the key objective of the of the program were interested in supporting the network engineers across the target region so they can work together and learn more skills in also, finally to contribute to strengthening regional collaboration in policy and infrastructure. There is an expression of interest available on the link here it's Survey Monkey link if you're interested in joining, or future potential digital leap South Asia, opportunities that you can respond to this expression of interest and will be in contact with you some other opportunities to available. These are training fellowships and events. If anyone in the organizing team can look for them in post, the links in the chat would be great. This includes national and regional IDs, schools on Internet governance, network operators groups. APNIC 57 is coming up that's in Thailand. Next year. IETF is going to be taking place in Australia at api GA, which is Internet governance Academy. This is taken in Korea, APR IGF is coming up in Taiwan. There other programs for the engagemedia Digital Rights festival and Sanok. So these are some of the opportunities which also includes fellowships, which perhaps the African professionals can apply for and take benefit. For contacts. In more information about the foundation in SF Asia, here are some links you can you can perhaps use to to learn more about the activities. Thank you so much back to you. Yeah, and if there are any questions, we'll be happy to respond. Thank you, as I say, for delivering us very important information. And for sure, it's a very great opportunity for young people to use from

    these trainings. Thanks a lot. At this time, we would like to invite Miss.

    We have a lot more hail if you're online. Half

    your presentation on a very important topic on line 60.

    Hello, everyone. Thank you.

    Mr. Chairman,

    my audible in my audible, we have your Yes, yes, you have your presentation on the screen. Thanks for having me, Mr.

    Chairman. And mahalo monkey, and the coordinator of the

    Ganesa network operators group.

    Next slide, please.

    Internet and social media have become

    an important part of our daily lives. So I'm

    here to present about online safety. Despite the opportunities and benefits that the Internet offers, are also risks and dangers. According to the UN's broadband commission for sustainable development estimated that around 4.1 billion people are online and the majority of those are youth. That means that youth and teenagers are more susceptible to

    the harms and dangers of the Internet.

    According to another study by ISED Foundation,

    the The study shows that

    half of the youths online have been cyber bullied. And also another study by the John Hopkins Bloomberg School

    of Public Health shows that those who spent more than three hours

    a day on social media may have doubled the risk of mental health problems, such as depression, anxiety and loneliness. So considering the dangers, we might, we may ask the question that is abandoning social media works. The short answer to that would be the way Internet and social media shapes our societies and relationships today, abandoning social media and Internet is entirely impossible. So how can we make Internet a safe and better place? Online Safety

    is A crucial aspect of our digital lives.

    As more and more aspects of our personal and professional activities move online with the level of advancements in artificial intelligence, specifically generative AI, it's really important that we prioritize and practice good online safety habits. Next slide please.

    Once like back please

    slide back one slide back please the rest one sentence

    Thank you. So we all agree that ensuring a secure online environment involves more than just safeguarding technical

    protocols and identifiers of the Internet protocols. Protecting protocols such as HTTP or FTP, and identifiers of the Internet, such as DNS or IP is crucial for preventing unauthorized access and data breaches. That online safety extends to various other aspects. For example, user education and awareness for example, behavioral aspects, content moderation, legal and regulatory compliances, and many more slides like this.

    So these are some of the challenges

    and dangers of the online environment. Of course, some of these were

    already raised by Adly on his presentation, so for the sake of finishing on time, I just won't go into details again. But you, you can see some of the dangers and challenges you will face. Online, they are all listed here. Of course, they are not all but some of them.

    Next slide please.

    So there is a single solution for all of the issues we mentioned in the previous slide. But there are steps

    and processes that assures a

    Safety Online. One of these steps is privacy and protection, have to be cautious about the type of information we share online. For example, we don't have to share our digital ID numbers are what we call it in Afghanistan, D and Tomari taskray electronic key ID theft is a serious problem out there

    in the online environment. The second thing

    we should consider about privacy and protection is

    that we have to think about with

    whom we are sharing our information. So most of the online platforms have settings that you can manage that who should be the audience of that post.

    In that platform. Also think before you click on the links that you receive in Messenger and also in your email

    to regularly review privacy settings on social media accounts. Because sometimes the companies change their default settings and also understand how your data is being used by social media platforms. The risk we face isn't the technology itself. It is more about people and behavior. It is the person who who would use technology in a way to harm others. Another step of course, another important step is cyber safety, awareness

    and education. Education and Awareness is

    really important. Educate your parents, educate your siblings, your friends about cyber safety steps. Just as teaching kids about crossing the road is a crucial step in their growth. Education on cyber safety is as vital. The before you buy any digital device for your kids, your siblings, you should make sure that The no online safety measures. Of course, youth IGFA platform is a suitable platform for raising awareness about online safety. But we all know that it is also necessary to take these discussions into schools and universities,

    we have the skills to critically,

    we should have the skills to critically evaluate information on online platforms and do not fall for any trap or disinformation. Are they important step is that we have to improve our emotional intelligence skills. There is really hard to be in social media without getting some negative emotions. Sometimes, by seeing fancy social media stars, we would feel we would feel bad about ourselves. So you don't have to compare yourself with others, people lie and you want to present themselves in the way they want you to see them not in a way they necessarily are. So Internet access is also an important public health issue. There are serious cyberbullying possibilities in online platforms, which results in depression and anxiety. And it is not just in social media, you have to also be careful, be careful of the gaming applications. There are also addiction concerns with heavy use of digital devices, which also leads to

    health issues. And

    if you experience cyber bully, there are processes you can report them. Of course, in case of addiction, you can download apps that stops you from using too much of social media, that we have to be very cautious about our online and private lives. Next slide please.

    To conclude,

    Internet has incredible things to offer, but also has serious

    challenges. And you don't have to be security expert

    to or a master hacker to be safe online. Just need to be cautious about deferring reliable and unreliable sources and understanding the potential consequences of your online actions you are so social media should be a combination of all of the good things in the world. Everything you see is up to you. If if anything doesn't inspire, you just remove it, get rid of it. And of course, clean up your digital footprints. There are some good books I have listed them down here. Please read these books if you want to control what you have already shared in the online platforms. Next slide, please.

    Thank you. Let's all work to make the Internet a better place for everyone. Thank you, Mr. Chairman.

    I'm gonna have back can have the mic back.

    Thank you very much for your presentation. Mr. Altman. Hale. A great presentation. As we are getting close to our timeline, at the hand, I would like to ask

    our next speakers to hop off her presentation on youth IGF initiatives Miss Miss fuel theory li with a member at Myanmar, youth IGF and also member at APAC youth idea. I would like to invite you to have your presentation

    Thank you. Thank you sir for

    inviting me.

    Thank you for having me today and it was a very great pleasure to be here. I am a project coordinator of the EU Internet gov for and Myanmar as my as committee member had the issue Pasiphae you have Next slide please.

    Can use some in a bit?

    Yep. Asia Pacific

    you IGF?

    Eu Internet gov for N pan eu 23 was

    hosted in Brisbane, Australia with the team You frankly hours of their day to day governance where innovations and safety so well being this this is an annual meetings of the Asia Pacific region to where the young leaders and participants from the Asia Pacific region to discuss about the policy related issue at this forum. And the organizers of this forum is an admission or Asia which is an hour of their passionate you from the Asia dedicated to engage in some power powering you in the Internet government is core with the aim to enhance mobility and create the impasse into Asia. Next slide please. This is the highlights of the highlights of the US Asia

    Pacific view Internet. gov for

    answer. It has been more

    than 55 individuals joined the this foreign on board on sites and allies. And we the organizer organizing committee has been have to facilitate and to host the IGF Internet Governor 2023 You try watch all three in The Brisbane Australia as well that that is what and you're mentioned before this is year round or workshop initiated by the organized by the crews of the multi stakeholder group where the US A GF coordinator and as well as HOST gantry and RGS gantry as our Begin are also the power of the organizing team to make it happen and so far it do you wash your face what's happened in the Asia Pacific region co

    holdings, the Asia Pacific RGF this

    year, and also the EU leader role there Asia, Asia Pacific au Igea organizing committee. were invited to join the EU presentation you representation at the Pallium mentary track from the Asia Pacific community as well. More than that, we have the Asia Pacific EU IGF had been facilitate to adopt the EU policy statement for the mission and diversity where where the participants are both online and offline participant contribute to this new policy statement to making sure the yen pupil prices making sure that the yen people are wiser from the Asia Pacific region regarding inclusion and diversity. The most prominent part of the permanent permanent session of the Asia Pacific are you IGF is which was recently initiated and initiators as a youth leader dialogue session, that was a session where the youth leader from the especially youth coordinator from youth coordinators are you as per for the Asia Pacific region, this cares about this, about the digital policy role is the issue and Arthur Internet issue among the Asia Pacific region that that is one of the prominent session that was recently initiated by the Asia Pacific you RGF Next slide please. Next slide please.

    This photo were taken

    to render your first session as you see here, there are also the on sites and

    online participants who try to this UTRA workshop. The there was a discussion about the trust and humor humor i paspa days. villas is related to violence in privacy securities, free dance is Persian. Next slide please. times after Saturday, Git data Asia Pacific grsc.

    The over Hunter registration from the 19

    economy in the Asia Pacific regions and participants are, as I mentioned before, 55 individuals are trying to foreign and over 20 industry is a suppressor also support and try these foreign as well. Thank you. Next slide please.

    Yeah,

    very recently, Asia pacifies. You IGF have been initiated

    a lot the steering committee for

    organizing the Asia Pacific, you actually had 2024 As this idea, and this emperor was proposed by the young people during the Asia Pacific to young people to rent the Asia Pacific view for us. And also it was also if you read the US statement, it was also included that it has been proposing by the young people to have the steering committee of the Asia Pacific IGF so it was not up this year. And well. Well, the EU coordinator from the Asia Pacific region, studying engaged in steering committee for for having an support in the Asia Pacific au Igea 2024 aligned with the approach by you for you, which when people are also important for young people as well, and he was kinda like encouraging young people to get involved more in get involved more and supporting each other. Like please.

    Answer that I also would like to briefly introduce about your IGF member

    as well. As a coordinator, you IGF member is usually initiated and our very first four rounds were initiated in 2022 talking about the Healthy digital life. In this forum, we have been discuss about missing information this information as well as the impact of the as well as the impasse of the impasse of the information for all because of that particular timeline. As you may know that Nima has been detained by the military in February 2021. It has been very challenging for us to set up this first foreign as they are lots of Internet curfews and Internet censorship and Internet discretion as to on Korean in certain areas so far. So, I like the previous speaker mentioned like, when we are talking about

    online safety

    you have to know their emotional intelligence right. So far why we are facilitate one one we are hosting this intern verifies you Internet gov for anymore, we also have to aware of the emotional intelligence or online safety issue because we would like to bring the CS pace for their party span where we can discuss freely and openly in this in this fast for and so has been has been a very hard time for it to to make it happen so far west has a fully hosted online and on Next slide please.

    Continuously this year, we asked recall also

    Meki happened said can you Internet gov forum as

    our mission is to advocate Internet gov meaningful inclusive trials, transform tees and safer Internet through the UNCF Myanmar we this year for was talking about the aisense security as well as digital security capacity building to the party SPAM for our memory is leaving behind leaving behind intense in many way the impact in front of politics crisis and on Korean civil war. We are trying the organizing committee has been trying to pay the not to bridge the gap between the AI is that future challenges that might probably we face in the future as in so the main purpose of that forum is campus deviating as well as we also have a session talking about the online Karishma presently about the online harassment research paper as a as as well as panel discussion where the panelists are De Luca speaker from the from from the private sector, academia as well as from the on the civil society sector. So we have for inclusive panel where we call that a participant called and code is two years and hearings. opinions from a different perspective, please

    in terms of that status, ticket theater or has

    been 42 registry, add the first

    you Internet gov foreign other a was 42 registry. We also we only got invited 30 party spent as we are with you we always support the Internet PLRs to the participant because of the expensive data package after the 2021 February. We have we have a challenge of the budget constraint so we could only provided that T participant. And also we also recruit the 10 volunteer to support this program. First you Internet gov forum. And but just only 15 parties parent code tried the foreign however, into town center 23. They were they were receipts that there was a 47 registry at the SEC Can you Internet gov for rent and 20s for products been

    called tried

    for rent to pay their capacity as far as to understand more about eight highs and challenge of the member having through the panel discussion capacity baiting program More than that. That according to the survey, they have been getting a wealth of data security as well as online harassment problem in their in our community, which are their biggest issues and challenge during

    this political crisis period.

    Next slide, please. Thank you very much.

    And thank you for giving this opportunity to me sharing about the issue Pasiphae you actually have

    antar Mr. upang GF. Thank you very much. slain. I'm thanking you for your very thoughtful explanation and presentation. Thanks a lot.

    If you're close to your timeline,

    we are going to open our q&a session.

    If anyone has any question from our speakers, please write in chat box

    so I can read and ask from our speakers.

    I have a question from Mr. Mark Hale. Which is referring to miss Anya. If you're still

    there, Anya. Sam, wait. So he's asking about the

    GTC, he's asking about your perspective on the United Nations global digital compact and shaped is, especially by some community leaders. Why some communities leaders perceive the GDC as an option as optional, rather than an opportunity. Are there particular aspects of the initiative or as implementation that that have rise? Within the community leadership?

    Thank you very much for a very good question, while the global digital compact is envisioned by the by the word of the

    report of our common agenda, as an outline of shared principles, and I think that's how we as a community also regard it as a very important framework of values and principles within which the governance and potential regulation would be established. What is interesting to know is that in the global digital compact, and also in the outcome of an agenda, there is this concept present of multi stakeholder model. And that to the IGF, of course, that's been nurturing that concept for almost two decades now, is critically important, because it gives a basis for the inclusion of all stakeholders, having a say in the way the domain areas that the global digital compact outlines Well, could be governed. So that's how we see it. I think, in terms of the young people and their inclusion, the Secretary General, but I think the UN system really, as a whole has been very dedicated to an engagement of young people. And probably you've seen that, as of I believe, this year, there is the office of the of the youth center with the with the United Nations, with the Secretariat, the Executive Secretariat, which speaks about the concrete commitment of the UN to meaningfully engage young people and to have their voice heard, but not just there to have them really integrated in all the discussion processes. So this is as much as I can say, I don't know if it completely completely response to your a very good question. But that's where we are. This is how we regard the GDC. And we're very much focused on contributing within our capacity, including the Secretariat, to the GDC practices we did during the consultation period that the leadership panel, for example, have contributed and input many of the national and regional IGF contributed inputs to the consultative period consultative process of the GDC. And now many of the member states will be engaged in the negotiation process. I just yesterday last evening, actually, I spoke at the Latin American and the Caribbean IGF listening for many of the colleagues there in Colombia and from the region. And we did exchange rules that while the government so the member states will be directly speaking, you know, through the NRI through the national regional IGS on many levels, we do have opportunity to inform our governments through a multi stakeholder input to make sure that our voices are channeled there. And on the enterprise level, we do see quite a lot of good collaboration called variation of the government's with the National IGF and the regional IGF. However we do so your challenges, I have to be very honest. And I think just last year, the lack IGF, we did agree that really there more needs to be done on all levels to raise awareness with inclusion of governments and have them really recognized about stakeholder, national regional IGF processes as their avenues for discussion before decisions are made. Thank you very much. Um, yeah, there's one more question which is not

    asked, which is not mentioning the name, but I like to

    read the question. And it's from NASA heavy ask, we request that the restriction on kids to for Afghanistan be removed. But Go girl family link, we can efficiently we can affect effectively control and manage our children's digital device user just clothing setting limits, and content filters.

    And I can quickly just so you know, when I was in Kabul, for the National IGF of Afghanistan, that was the first time

    I witnessed in the history of the NRI practices to a very meaningful capacity development engagement of children. Later I saw some others follow the trend, the very few unfortunately, not, it's not still endorsed by Paul in their eyes. But I think that was such a good process. First of all, get our children engaged to understand that the Internet and its associated tools and services is an opportunity. But at the same time that they need to know how to use it and colleagues, it spoke before me about just before this part, about safety, about security, insisting on capacity development, insisting that safety and security is not just about our devices, in our cables, being safe and secure our signals. It's also about people, knowing how to navigate through this complex environment to use it safely. And start building that capacity from early age on is extremely important Afghanistan, IGF, as I said, set an example how that can be done through the kid side. Yep. We've seen that, for example, with Bangladesh later, but I hope that we can continue with that practice. And they're sharing it as a good practice with the other MRIs. I hope that response. Thank you. Thank you. Oh, by the law also asked a new challenge is

    the big issue. So many question is how can so many question How can be minimized at rest? How to deal with it? And finally, how to recognize it and separate that from reality? Anybody? Yeah, if I had just that question,

    Miss Yama. So of course the challenge.

    Artificial Intelligence. I mentioned,

    AI and specifically, the generative AI imposes a serious security and safety challenge and

    recording the specifically regarding the deep fake issue. There are ongoing research about how to develop tools to identify these fake posts than the real ones. So to have a short answer for that, it would be good to course raising awareness would help much about it. I mean, you have to know about deep fake mechanisms and how deep fake works. And also, of course, the skill of identifying the key information. Reliable and unreliable information is also very

    helpful to tackle that specific vacation.

    Very much mr.

    Ansari also writes I'm seeing Thank you.

    I'm glad that I'm here mentioned the

    kids Academy in Afghanistan,

    IGF and I'm very saddened that we don't have in actually I was the coordinator of that little kids Academy. Together my four facilities was

    my biggest one, the

    ATF. The IG scene in general. Marilyn came home we unfortunately lost a just shared the video of the kids Academy. The kids are sharing their experiences about the African IGF in attending the African IGF in 2019, you will be amazed to see, you know, what they have learned and the knowledge they have gained through that Academy. We try to do a virtual academy this year. But since this you know, when the fall of the government, many of those children were not at the school. But we will, in our world personally tried to identify some of those kids and see if we can do this again next year in 2024. With the local school in Afghanistan, thank you and yet, and friends.

    Thank you, everyone, for

    your very useful and informative

    presentations. I'm thanking everyone who joined us as a participant

    in our session. At the end, I like to ask everyone if it's possible to on your camera, so we can we could take a group photo for us. And we like to share that on our social media. If anyone has a problem with that. Please mention it, we will learn the names and identities. Let's make our cameras on and take a group photo. I'm very sorry to interrupt you. So John, I think we heard that Lee raised his hand if you give him one minute.

    Okay, so using from the last time I would like to also share with you all that we

    have our next session which is moderated by Lima John. So let's stay online and join the next session as soon as we finish our session in a few minutes.

    Like handles has synesthesia, that's not that was Olmec monkey

    online book Born in masage antibody for that Chanda Philia, Sharon Maconie,

    Lima John Madami. Say John Shanna moderate forscan I'm re Bakunin topical APCR Jolliff has que me emotional Mitani Mazel Tov requests for that but anyway it would be almost same

    actually, I'm taking the screenshots so do the smiley faces

    okay

    one of

    the pages is a stem

    Okay, second place clear videos on

    one page

    right, thank you, everyone. Thanks a lot. Let's go to the next session.

    Like you said to John and everyone. Good. It's sitting in Afghanistan. Good morning, Afghanistan and wherever you are. Have I hope you started a great day or

    if it's an evening Good evening, and I hope the previous session was insightful and you gather something from that. Salam superhigh cabal so but I have one son, Amit, whereas some key the crows a hobo Hashem all of us can abortion. Heraclitus manana Deena to support among set away and in our today's sessions, which is about future of Internet connecting the unconnected, we will have some very distinguished speakers And I would like to welcome them all to our session today. And thank you for being with us. We have Mr. Wolfgang Klein, Klein, Wachter, I'm sorry, if I'm not pronouncing your last name correctly, please let me know. The professor and at professor emeritus at the University of Aarhus, we have Terry Switzer, from the training delivery manager of South Asia, or Oceania APNIC. We have Ahmed for him leader, Executive Director of artists, professional services. And we have waste by up project approval and oversight manager at CDT. Thank you, everyone. I hope we have all our speakers here. I would like to start with Mr. Wolfgang, thank you for being here. I think I see you in the participants. If you could please introduce yourself to us. And we will hear from you over to you. Thank you, and good morning, or good afternoon, wherever you are.

    My name is thank you for the invitation. It's

    a great honor and also pleasure to address the IGs in Afghanistan. So unfortunately, I've never been there. But I hope and I see from the first conversation that you have already a very active small community there supporting the IGF, which is very good. You know, I'm one of these veterans in this field. I was involved on the middle of the 1990s in the making of ICANN and in the making of the World Summit on the Information Society which finally produced the Internet Governance Forum as a discussion platform for everybody not only for governments, but also for non governmental actors. So at this time, I was a member of the UN Working Group on Internet Governance, which was established by the Secretary General of the United Nations at this time by Kofi Annan and Kofi Annan called the Business Summit on the future. It was very interesting to listen to his argument because he said, normally un summits are about problems of the past where we have in our president time to manage problems which has been created in the past. But with the Internet, we have now a chance to look into the future and to manage it at an early stage. So this was in the year 2003. And now, the future of the Internet is here. And we are looking towards another UN summit on the future of the planet not only on the future of the Internet, which is discovered on the future which will take place next year and part of this summit on the future will be a global digital compact I will come back to this in in a minute. So the World Summit on information society had to discuss you know what to do visit the the Internet and some governments were in favor to create a NASA UN organization only for the Internet but in the weak and this Working Group on Internet Governance.

    I think we lost Mr. Welcoming I don't know if you can hear me. Oh

    yes, until the connection established

    back and we have him back. If I could please

    have KV Switzer to introduce to us and and let us know a little bit about himself would be really nice. Thank you. Thank you Lima for that invitation. Yes. I'm Terry Sweetser. I'm an Ozzy, but right now,

    I'm actually sitting in a hotel room in the Kingdom of Tonga in the middle of the Pacific Ocean, because I'm here doing some capacity building with the local operators teaching ipv6 deployment this week in Tonga. So that gives you a very good idea of one of the things I do a lot of at APNIC and that's that capability building across both South Asia and ocean Janya so those are two rather large areas to work with in the Pacific the population density is quite low But it's a very large continent we refer to it as the blue continent here here in the Pacific and of course was South Asia One of our primary concerns is what's happening in our Obviously places India, Pakistan, Bangladesh, but especially Afghanistan as well, which is why we're here at this conference today in force from foundation and from APNIC, as well. My, my role concentrates on training delivery. And we use that as a vehicle for the development agenda of APNIC and APNIC. Foundation. And as I was saying, we trained on things like ipv6, but we also attend things like IGF snugs, and so on, and contribute to conferences and events like this, as part of the technical community, in some fashion, we are very much to give anybody and everybody a chance at learning something from us. And I think that is one of the great privileges of my position is I am pre eminently a teacher these days, which I think is great. But I think we do have Wolfgang reconnected. So you've had my introduction, but when the agenda returns to me, I'm going to give the audience a demonstration of our academy platform, which is automated and also in person training platform for APNIC. I'll give the floor back to Wolfgang now that he is not online. Thank you. I'm, so I lost the connection. And I hope this will not

    reappear that I will be now try

    to be very brief. And to come to my main points. So I mentioned that the IGF was the result of the World Summit on the Information Society. And the basic idea was that before you take decisions on the governmental level, you have to add a broad discussion, which includes all stakeholders, not only governments, but also the business to civil society, the technical community, academic community, and many more. And so the IETF became this great success story. And we will have already the 19th, one in this year in next year in Saudi

    whizzes plus 20, with few confines of what was

    achieved 19 years ago in Tunis. So we have seen a lot of various events and the recent idea to strengthen the process for human centered Information Society came out from the discussion on the agenda for peace of the Secretary General of the United Nations. And this was we need a summit on the future, and the future of the planet will include the future of dance. And so the idea came up to have a global special global digital compact. So that means a document where the 193 governments of the United Nations agree on certain guardrails and objectives, how the digital world could be organized and trade. So and this is now ahead of us. And I think this is a main issue for the discussion in the year 2024. And I mentioned already some of the problems. So one, my understanding of this process is that the global digital compact will be an annex of the Pact of the future, which will be also adopted at a summit meeting in September 2024. But it is not yet clear, you know how this global digital compact would look like? Will this be a big, compact, you know, 20 pages with a lot of articles and agreements among governments, or whether this will be just a short document, which gives you some inspiration, you know, how to continue with the development of the Internet. So there's no need to reinvent the wheel because in the

    last week send arrangements and negotiations which shaped the future development of the Internet. And in Tunis,

    we did have less than 1 billion Internet users as was just 500 million. And within 20 years, the number of Internet users in the world was growing to 5 billion now, the problem is and you have this in your title of the session, there are still two points three people and connected so the challenge will be you know, to move forward and to connect the unconnected. So that's a document with like a global digital compact. will help here is a good questions and it needs to efforts Not only of governments but of all stakeholders. And this brings me to the second point, because you know, on the government sits on the negotiation table, then you miss a lot of other active stakeholders in the club. And so far, it's a little bit unclear, you know, how the stakeholders will be involved in the making of this global digital compact. So this is a challenge. And as Anya has said, you know, it's a good idea, if everybody in the world, from the stakeholders connect to their governments inform their national governments, you know, about the problems we have in this proach complexity in the Internet governance ecosystem, from AI to infrastructure, you know, from cybersecurity, to bridging the digital divide, and all these issues, because very often, you know, in particular, in smaller governments, they do not have the capacity to follow all these details. And so it's up to community to take the responsibility and to contribute, so that the national government can raise the voice in this negotiation in a relevant way. And the final point is, you know, after the Compact is, agreed, what will happen is to compact and here is a proposal on the table, which is in my eyes, very important. So there is no need to establish a NASA process or another international organization, for the implementation of the global digital compact, we have the Internet Governance Forum, the Internet Governance Forum is an established platform, which has demonstrated that it has the capacity to deal with a lot of issues. And so the best thing would be if the global did punk compact, which say that the lending place and the the network for the implementation of the global digital compact would be the IGF. So this would strengthen the idea of the IGF would get the duty and responsibility to

    employ a global digital compact,

    this is also important because the mandate of the IETF

    terminates in 2025. So

    the mandate was originally only for five years, then it was, you know, trusted for 10 years, now we have 20 years to IETF. But the World Summit at the review, conference versus plus 20, have to renew the mandate. And it would be a great thing, if the global digital compact would say, Okay, we need this mechanism, we have to strengthen the mechanism. This is the right mechanism for implementation of the global digital compact, this would it make it much more easier for governments to extend the mandate of the IGF beyond 2025. So we have for the next two years, have a lot of problems ahead of us. So it's the global digital compact, is the basis plus 20. And I'm so also very impressed that you had in the opening us forum, because this is a challenge for the US. This is the future. So we old veterans, we are now the grandfather's of all this. But the future is in the hands of the next generation. And in so far, it's very exciting to see so many young people who are becoming engaged and have identified this as an issue for their for their future. And I always argue that climate change is important. But the stability in cyberspace and a digital future is also important for the next generation. And business. I give back to the moderator. Thank you very much and sorry for the technical problems I created with the loss of my connection. Thank you. It's all right. Thank you so much for giving us a very good perspective

    of what

    ITF is, where it started and how important it is for the stability of the technological community and for the stability of the Internet governance itself. Thank you so much. Now I would like to request Mr. For him the dark mud for Hindi they're the executive director of Allah is always a professional services. Supreme Leader, you are here with us. Thank you so much. If you could please introduce yourself and let us know about how we could encourage local contents create creation and innovation. Thank you so much. Thank you, lemon in everyone. It for inviting me.

    And first of all, for putting this

    information session after a long time, it's very good to see some faces and names, which I haven't seen for a long time and also being introduced to some new, knowledgeable individuals here. This is not for him the DAR I manage a company called RAS professional services. And thank you very much Mr. And sorry for giving this name to my company. So Mr. Ansari is here who is my true inspiration? The reason why my company is named is Rs. And the reason why I choose startups as a career path for myself and my company is Mr. Ansari. So thank you, Mr. Ansari, for being the inspiration for me. So today, I'm given a topic to talk about which I initially saw this topic, I thought, I don't know anything about that. So I was about to write to Mr. Bowery that, and I don't know about it. But as I started writing, just found no, I know a lot about it, because creating our pin by myself, and I will tell you a short story. Talk, you know, this tick tock in Instagram and things this is becoming very popular among team. So I saw a guy here in Turkey where I live, that's creating a lot of content. He has a lot of power in content creation and exploration. But actually, he's not using it the right way. So I had a chat with him. One day, it happened to be just spontaneous. We discussed about how he can make this topics and discussions much better with a short amount of time we did a calculation. And we found that if he manages it very well, he can earn at least $50 per day a few days ago, I received a call from him telling me that sir, every week, I need to transfer $1,000 to my account, and Turkey, but I don't know how to do it. So I told them now, from where you're getting this money, he told me that it's coming from Instagram and Tiktok Leafly Chuck. So I said, Okay, if you give me 250 of this 1000 per

    week, I can manage it for you, I can learn that safely to your bank account.

    So now, it means that if we look around everyone is creating content in content creation has become some people even don't know that they're creating content. But content is getting everywhere, especially with having Internet connectivity, more than any time in the era now is giving this opportunity to basically create contents. So with that said, I would like to share my screen. I hope I I have the right to share. So everyone's seeing

    my screen. We can see your screen. Okay,

    so this session will be interactive. First

    of all, I would like to have some views

    from the participant as well while we are moving ahead with our discussion. So for that, how I frame this discussion today is that I will go with some definition about the content. And then we talk about the content ecosystem, some trends in Afghanistan, which will be a, an interactive session with the audience, especially those who are in Afghanistan. And then finally, we talk about some opportunity and resources. So before we move to the whole presentation, I would like everyone to go to slider.com use this code when you're asked the code is used this code to enter the interactive session just also copied the bank and the code in the chat. So please make use of that. And the let me also myself, go

    to this site now

    So I hope everyone is on the website. Now, we will use it in few

    seconds or minutes.

    So they definitely

    contain something that we express or abuse or ideas

    through speech through writing through a wide visual

    or various forms of art

    applications in marketing materials. So basically, whenever our thoughts are brought out of our mind to another form, it is actually created content.

    So, that's the basic definition of content. And content creation is

    the process where we produce the information and share it that becomes the process of content creation. Now, this process can be through various forms of presentation visuals,

    speeches, books, writings, and

    many, many things. And if I give the business perspective definition of content, so then creation for a business is to first create a topic in ideas, which can appeal to the buyer of the business, then present it in written or visual or any form, which eventually can grab the attention of the target buyers and generate revenue. So these are the some of the definitions to just make the ground. And then we talk about the ecosystem. So like any other endeavor, content and content creation is actually part of an ecosystem, you need to be in an ecosystem, you need to know your ecosystem in order to create meaningful contents. So who are creating contents? Those outlets Academy's businesses, authors, writers, government and users users when I say users, I mean every one of us, whoever is using Internet can create content is majorly created nowadays. So current affairs you know, those agencies want to report about what's happening in the world. Stories people tried to say stories through forms of funds, movies, journals, PR and advertising mostly companies use this for their marketing purposes, sponsored research. So, there are companies who are paying some of the research agencies to do research on topics and create some content out of that, which was start steak lost knowledge and of course, nonsense. So, what is with the advent of Internet and all these availability of different mediums nonsenses also creating apps unfortunately accountant and where traditional media where these contents are distributed,

    traditional media, social media, events, blogs,

    video services and books and Internet, overall social media and Internet platforms are now the dominant and content distribution channels. Why? Why this

    concern contents are created so some created for tarp for example, news agencies, TV channels they create for

    TARP, occasional perverse purposes innovation, drive sales. And some people can tends to dry fend to themselves, or in order the ornaments create contents to educate people on law and order. Make them abiding, law abiding citizens political agenda satisfaction, some people just for the sake of satisfying themselves, especially users, they create the content and some people bleed for reducing boredom or killing the free time. So this is basically when you combine all of these together you can see the picture of the content creation ecosystem with that said now I am entering into a interactive show with The audience I'm going to start

    Paul together with you

    so I hope so Riemann is now on slider because I have a question here and the question says that the two are creating contents in Afghanistan

    so let's

    let's start with this

    I want everyone to review

    all of this

    options provided to you and please select

    the ones which you feel is appropriate in terms of your own understanding

    whether there is any problem accessing this

    please let me know

    Well, seems like less media Yeah, you learn

    artists, business, celebrities, writers and Academy I'm sorry that writers Academy and Afghanistan is

    getting much and

    so forth, that five people are there? Like come on guys, we need more data to make sure that we are

    coming to the right conclusion. So I see that 43 People in the call but what I see

    some people are there on the

    game. Alright, so as you can see, we see that major league events are created in Afghanistan first by media, taken

    by businesses start by users formed by artists, then writers celebrities in Acadia, think this represent somehow I don't know how businesses are creating content. Because as per my understanding businesses are not creating that much of content apart from what I see that they're creating advertising on the Internet and media. But I would say the the way that we see this right now, in Afghanistan, users are creating much of the data. But anyhow, this is something which I will share later in the presentation slides. So media, business users, artists, writers, laboratories, Academy's zero so let's go back when this I'm going to next question what contents are created actually so I'm just starting the second poll here

    okay, what contents are created in Afghanistan

    so this is a poll where you are open to write whatever

    you feel

    so you need to just type it

    there I see that I

    have only three minutes left

    us

    one participant here.

    contents are buried in Afghanistan

    so as news Yes, news is created a lot in Afghanistan

    and besides that, what I see

    videos are created especially the YouTubers are creating a lot of video which can come into the entertainment form. Now we have a picture with what kind of information is being created.

    Right so I'm just saying Now going with the final

    and third all here we have some good information here seeing that the news and entertainment

    is the largest content creator Afghanistan as of now.

    So let's go to the third poll because we are given

    colors the time is short.

    Which mediums are used for content publishing and distribution in Afghanistan? So how close is their build their contents the contents, which you just mentioned,

    how people are

    they view things as content to their audience

    social media, network,

    YouTube, Facebook,

    etc, Qatar. Yeah, I know that Facebook is a popular medium in Afghanistan,

    social media.

    All right, everyone, thank you for taking part in this, this will be letter of this will be placed in the same presentation,

    which will be shared with you by IGF team. So the media, which is very popular in Afghanistan is YouTube, Facebook, and Twitter. So these are the media through which people are distributing their content. Right. Now, based on what we just saw in the screen,

    what gaps Do you see

    the gap that you see there? That is the opportunity, I would say that this unfortunate that Academy is not creating much of content on the piano son, that this has been an issue for a long time. If we look into our university systems, or educational entities, we actually see that we are teaching very old, very old metal materials, and we cannot compete, that's the problem that we can even not compete with, or original university so that that's an issue, which is totally damaging our education system, unfortunately. But apart from that, I think the way businesses should create the right content in Afghanistan, that's not being that's also a gap in while there is a gap that there is

    also an opportunity. So for all of the youth

    who are present here today, in others, I think there's a huge potential for you to come up with a business model over content, because content itself is a product and when something becomes a product, you can easily create a business model that so I would say that opportunity. And because we have Internet

    because

    you have access to the Internet, you cannot

    limit yourself just to Afghanistan market, why you should

    create local content, but think of the local content, how it is you can make it available, how you can make it based on the demand or the whole world because you have the power of Internet in hand and you have the power of Internet and what that means the whole world is your market. So think of this as well. We know that currently a lot of YouTubers are creating the same kind of videos, so their thoughts are getting the videos of the shops, we deserve the environment. We deserve the restaurants and everywhere but clearly is that all what we need has huge potential or news international news agencies who cannot come to Afghanistan who resources may not allow them to come to Afghanistan, how you can create content for them. Let's say when you want to search something about content creation, can you find it in Persian language? Can you find that in Pashto language, all the local languages that we have in Afghanistan Unfortunately, these content I would say in the word is in our local languages. So there is huge potential, create the existing content into local languages. So make See, see what gaps are there consider it as an opportunity and create a business model over that. Now, the advent of AI we're not alone anymore. So I know content creation requires a lot of efforts. But what now AI, artificial intelligence can provide you more than anything else, the content creation has become very easy. So now everyone has spent tons and 100 tons of yourself the number of tools, you know, it means you can multiply yourself by the number of

    tools that you understand how to operate them. I'm

    listing few of the major AI tools that can help you in creating content so plage T, which can help you turn any text to voice gin, which can help you turn any text to video chat JpT Of course, everyone that can even write you computer applications, and mobile applications. Gravity, right, that's something which can create writings for you know, fairly, which can create any enhance any photo the way you want, with rapid. So this is a very interesting tool, if you want to know something about a video on YouTube, it just takes you the right and the most, it can summarize the video for you. In Guide, which helps you create the dramatic, let's say when you share your screen when you make some educational videos that helps you with that auto draw, you just if you're not a good browser, you just make a shape of let's say, a flower, you'll see that have such a beautiful flower sort of on the screen by help of AI. And then Internet is open. So you can find 1000s of tunes, which can help you in content creation. So to wrap up, find out the gap based on the information that you have from the ecosystem. See which gap you can fall. If you cannot fill it alone, you have the help of other partners in the ecosystem. Then you have the help of AI and Internet. And based on that those gaps, go ahead and create a business model over it. Finally, I'm sharing a few resources. If you want to create our content base in this model, and you don't know how to do it, you can go to any of these three resources, startup Valley Startup Grind. And this theory startup Valley can give you online courses on how to build a business model. The Startup Grind can give you 1000s of events every month, where you can learn about how to build a business. Especially there are some categories. And then finally, the CR which is a toolkit, which helps you in building a business. Thank you very much. I know my time is limited now. And I'm Dan lemma John. I'm here for any questions or feedback. So much leader. So

    it was it was a very interactive and useful session. I'm sure everyone was

    excited, and they were sending on their answers and interacting with the session, which was very beautiful. Thank you so much. Now I'd like to request Mr. Terry Switzer. If he could please let us know about APNIC Academy technical trainings and opportunity for young young engineers in Afghanistan and APEC. That will be great. Thank you. I would like to invite Mr. Terry switch over to you I hope we have had

    can someone from the team please confirm if we have him?

    I think he lost we

    can action What was your question Lima?

    Because he started his we were waiting to have his presentation and

    was basically what I was saying if he has, if he could have. But we could go ahead with questions. Yes.

    technical thing is take care of this. Thank you. So I will go for some questions. I was recently noticing in the chat that there was a question from someone I'm sorry, if I missed

    your name, I couldn't take it. If you could please write your name. It was a question for Mr. Wolfgang. The question was appreciate for your nice speech, let me ask a simple question related to the risk and challenges of challenges of next generation Internet, our Internet of Things seems that there are needs for some security compliance to manage the cybersecurity. I think he meant the cybersecurity of IoT devices. That's That's what I think he meant. Yesterday, and I answered already, in the in the chatted, the dilemma of all these fantastic

    developments around the Internet is that everything has a flip side. And so that means if I'm moving into a new applications and new services, Internet of Things, and the same is with AI, we have huge new opportunities. But all of this raises also, or widens the window of vulnerability for our society. So that means before we move forward, we have always to take an assessment risk, which includes both the risks and the opportunities, you get not the opportunities with risks. So and the only way you can manage this is to try to maximize the opportunities and to minimize the risks. So there is no silver bullet, you have to live with some some risks. But if you know them, if you can identify, then it's you can manage it better. And if it comes to the question of what are the vulnerabilities, if you move to IP version six for Internet of Things, applications, then the best say is you looking around the community, because the knowledge distributed, not everybody knows everything. So and you have the right place where you can get the right knowledge. And in case of IP addresses. The best source is always your Regional Internet Registry. In this case, reach out to APNIC for a sham, they have an awesome technical experts to explain to you and to give you recommendations, how to manage the risks, which are linked to the transition from ipv4 to IP, version six and two IoT applications. But I want to add just one point, that is there is sometimes confusion in the language. So that means if you read about technical risks and technical security problems, that's a different thing. What politicians in the United Nations discuss around cybersecurity. So cybersecurity is on the behavior of individuals or states. So, and this is related to the misuse of ICT and other of the use of ICT. So that means in this whole field of cybercrime, which is part of cybersecurity. So this is the misuse of IT technology for criminal purposes by individuals, or by gangs or by mafia groups or something like that. Even some states behave in a criminal way. And if you speak about cybersecurity, in a more military sense, or international security, then it's the behavior of states. So that's not the technology, which is insecure. It's the secure behavior of states and we see this now in the two big wars we have in the in the Crimean War. So this is a war with drones, where it technology plays an important role. If you look into the Gaza Strip, this is a war with AI. So it's like identify, you know, even faces of Hamas fighters and try to find them, you know, via drones, and To kill them. So this is behavior of states in cyberspace, which are related to cybersecurity. And so my recommendation would be to have a differentiated approach this, you speak about the technical security problems, which are related to new applications and services. And then the bigger security problems we have, as a result of misuse on bad behavior of individuals, groups or states. Thank you so much for the answer. Thank you. I think

    we have someone from the audience that raise

    his hand, it was more of a more HIPAA law it man hey, if you if our technical team could please unmute, or so he could ask a question. Thank you. Thank you, everyone, specifically to Wolfgang for

    giving us your time and joining us. I just wanted to have your remarks on the concerning rise of the Internet fragmentation. Its impacts on the underdeveloped communities such as Afghanistan, in terms of inequalities in health care, access economic and educational opportunities. And also there are observations that even some of the supporters of the open and free Internet from the democratic countries contribute to the digital divide through their content moderation policies, and additionally the GDC the global digital compacts challenge with concerns raised that it may it may change decision making heavily towards governments, excluding other crucial stakeholders will increase the digital divide more. Thank you for the question. Let's go one by one.

    So you're seeing Internet fragmentation, you also think is a confusion in the debate.

    So we had in the IGF in Addis I

    can think we lost?

    I think we lost Mr. Wolfgang and so, until we had

    on board,

    I would extend I have a question from the presentation of Mr. Dadar leadership,

    during your presentation, you

    mentioned about the identifying the gaps in the content and, and creating contents according to the gaps that exist, I think it will be very useful that that you also let the audience's know about how they could identify these gaps, what could be a proper method that they could use to identify these gaps and, and apply that and be good content creators have a business out of that, for example, that we see in a lot of countries in the world, we are having out this content creation as a very well paid job. So that could be an opportunity for our youth to use and, and enhance their their information about this and use it identify gaps and create contents to do have it as a job for like themselves. Alright, so I think the process of finding gaps

    is always by doing some research.

    But I think that can start from ourselves. If we are going on to learn something we want to know about something and we are looking for that content. See the content that you find it is it's something which fulfills your need. It's not if there is something that you are missing and you cannot find it. Then see how many how many people are there like you that cannot find the same kinds of information. So

    if you can start from your close surroundings,

    and slowly go ahead and ask from others in the network in even out of your network, you can easily identify what gaps are there as in this very short poll that we had right now we find out that academia is an area where content is not created in Afghanistan. So it does not mean that we don't have the capacity of creating content. But maybe people don't see the demand for that, clearly, so we need to find those demands. And this can be done through surveys and research and easy research. That's why at the very end, I presented some of the resources, which can help you to understand more how to find these gaps. So because my focus was that content is a product and you can create content oriented business. So when you create a content oriented business, it means you need initially to do a research, do some customer development to find out who what kind of customer are there? What kind of content product is missing there? So that starts with that beside? What are the things on the Internet that you don't like? What do you see every day in social media, which you don't like? This can also be another source of finding the gap. Because when you don't like things, it means that should be replaced it with someone that you something that you like, when you find that like, then you can, again, go ahead to your network and see that how many people are there, which don't like the same content and watered with something else, that replacement is actually the need in the gap that you can bring to the market? Thank you so much. For him the Dar, as I see.

    Wolfgang is back with

    us. So I think you can continue with the answer is no clue what happened this morning with the connections. But anyhow, you know, there were three questions. One was

    the Internet fragmentation. And I, I started by saying you know that there has also been confusion about the understanding

    what indeed, is Internet fragmentation. Because,

    technically speaking, the Internet was fragmented from the very early days, it's a network of networks. And you can manage each network individually. So there are 10,000 100,000 of networks, which are connected via the same technical protocols. And in Zophar, you could say is, if you take all the network of networks together, we do not have

    indeed a fragmented network because everybody is

    using the same protocols to TCP IP protocol. We're using HTTP, we need the IP address protocols BGP, so that means everybody can communicate with everybody on the world. On the transport layer on the technical layer, there's a difference on the application layer. And this is where, let's say Internet related public policy issues come in. And here we have to face the reality that we have 193 member states of the United Nations, and each state has its own sovereignty, and makes individual Internet laws related to content related to the digital economy, to data transfer, to cybersecurity. And in so far, we have a fragmented Internet on the application layer, because each country has an individual legislation. Sometimes they have to same legislations they learn from each other, or just copy the law of the UK some neighbors, but some countries have more restrictive as I have a more free legislation. But I think it's important if you discuss the fragmentation of the Internet, to have this differentiation between the technical layer, which is a network that works using the same protocols, which is fortunately not fragmented, I can have still two slogan, one world one Internet, and this is true. We have still one world one Internet, but on the application layer, we have this diversity of different nationalities or entities and I think this is a natural process. problem is how the interlinkage. So that means the fathers of the Internet had the dream that the One World One Internet will go the application layer. So that means to hold

    legislation that this has set forth layer

    and to some national segment, and to introduce new technical protocols for managing the national Internet segment

    is going to be a risk that would be a danger for the One Belt One thing. And fortunately, we have ICANN so far, which has, you know, stopped such developments in various regions. You know, if it comes to content, moderation, this is also a very old story. And it started with the invention of the printing press, because who is right, who is wrong? So the Catholic Church were in the early days, excited about this new technology, the printing press, they could print the Bible. But after then, they discovered that some people use the printing press to write pamphlets against the Catholic Church and against the Bible, then the Catholic Church introduced censorship. And it's better who is right, who is wrong? What is good, what is bad content technology.

    And now we have to discuss in the in the in the Internet, where we have to decide, you know,

    what is good is content. So this can be done only case by case, and you need an independent third party, if you leave this in the hands of governments, you end up with censorship. If you leave it in the hands of the private sector, then this is private sector censorship. So that means you have to find a balance and design independent courts. That's when they that's why independent judiciary, independent courts are important element in managing all the conflicts around content. And my final question was about the engagement of stakeholders in the negotiation of the global digital compact, I mentioned that already in my speech, this is really a challenge now. So we had all the progress with the acceptance of the mighty stakeholder approach in the United Nations after the Tunis Agenda. But today, I see that a lot of governments are not interested to listen to the voice of non state actors. And this is a new battle ahead of us. And so that means the stakeholders from business, from civil society, from the technical community, academic community, have to be united, and to raise their voice and to say, you know, you cannot negotiate a contract without us. So here is our proposal, the digital compact we want. So this is a challenge. There is again, no silver bullet. So that's the task of today. Thank you. Thank you so much, far,

    very good. Like, like him. I was

    listening. And I learned a lot and it was a very whole site. Everything was there. And I think mahalo, Matthew was able to get his answer and have the information that he was looking for. Thank you. I, we have a lot of questions in the chat. I would also encourage everyone, if you want to talk, please raise your hands and we could give you the mic or unmute you in terms of online, zoom. And you could talk all those, that would be also a great thing if we could hear your voice. So thank you so much. We have a few questions, one of which are, what are my son asked? What are some of current trends, news or events that are relevant to your niche or industry and how you can provide your perspective or analysis of them? It was asked from Mr. Faheem leader. So if far I understand it correctly, it talks about my niche. So if I say my

    niche in my target market is

    helping youth to find jobs and create businesses, I'm sorry for cutting you out. I think he meant the niche of market because

    he asked trends, news or events. are irrelevant. I think we miss exactly my nature industry, which

    I'll say, enters young entrepreneurs

    and youths to just create jobs and create jobs for themselves. So I would say let's see, the current problem that Afghanistan is facing facing is the reduce of job rate, the reduction in Job rate after the change of government at the same time see, huge number of migrants from Pakistan are moved back to Afghanistan. See, these all are newly people which are coming to the economy. So they need to be integrated economically in Afghanistan. Here it is, a relevant opportunity for a company like myself for to create contents for educating these people how to be integrated into the economy of India, and even for some other end institution I think creating contents trainings to help these people because some of them don't know anything about Afghanistan they were born in pack Stand there is in Pakistan and suddenly now they come to another car Trees somehow they're becoming like bent and they're on kind Trade so how to deal with situation And of course most of this is done through content So I would say this is how we should keep by What's happening in the environment whether it is a For our local environment where it is, it's a virtual environment. So we need to look there. And I see that there are some questions are about different tools which are available in the Internet, which helps in content creation, like one brother has suggested about a Mr. Massoud has suggested about GBWhatsapp, I think are many of them. 1000s of them now available, and every day everyone is making different type of AI tools. The other days were experimenting with what tool where I changed. So nightgowns wise to my own wise, and then I played on for my children that see. And so these kinds of tools are available, see which one can be used properly. I would say positive way because as Mr. montrail. In other mentioned, the AI, the generative AI can be very destructive. So we as a users and as content creators, make sure that whatever tool we use V use it responsibility for safety of Internet users.

    Thank you so much. Thanks.

    For your answer. We have small

    and have a lot of questions. One of

    the question, I think, for Mr. Wolfgang eight is about AI advantages versus its disadvantages. So what are the advantages and disadvantages of the AI? And yeah, thank you over to you. I think

    we have now an AI hype, everybody is using AI and like I mentioned a little bit earlier,

    there's also the risk of a confusion so that you do not really understand anymore. What is mean, if government start G seven AI Hiroshima process, or the European Union has an AI act, and President Biden has adopted an executed order on AI. So all these are documents 100 and more pages. And it's difficult really to get an overview about what is going on on the political level. While in the shadow of this political discussions, you see an enormous wave of new applications and in particular, triggered by this activity from open AI. And all the better we see around in the various companies, which see, okay, there is money on the horizon, and AI could be a source of a new source of money making. It's primarily not you, I remember the.com boom in the 1990s, when the Internet to finance, the 90s, before the World Wide Web, Internet was just a small tool for the technical community. But when the World Wide Web was introduced, then people realized, Oh, the web can be used to make money. And this has produced the.com bubble, which then exploded in the year 2000. But as we have learned, so this was a bubble just for the 90s it's the bubble is now part of our digital economy. And so I have a class you know, for 2030 years, so it's not really new, but as the World Wide Web changed the Internet world now, I think the church GPT has changed the AI world and we see it I see the similarity to the.com bubble in the 90s that we have now and AI Papa. So, that means a lot of useful applications will appear and will help to solve a lot of problems in the health sector in the education sector, entire sector. So, that means you have a broad range of opportunities for application upon AI, then there will be

    you know some odd appliques This is unavoidable

    and the problem for the polymer is now to figure this out, you

    know what is right and what

    is wrong. Europe we have to so called risk based approach that we try to capitalize AI application. So more from the user's perspective and not from the provider perspective and say, you know, what could be create really harm, which is, you know, as to be forbidden, because this is again just human values. And then we have a second category where we say, you know, this is a risky applications. And we have here, we need strong rules, then we have applications with low risks, where we say, okay, we can have flexible rules. And then applications miss no risks, where we can say you can do what you want. So the problem is, if you create such a system with four categories, then you have to have somebody who defines, you know, and makes a selection, you know, belongs to category 123, or four. So, that means you have to create a bureaucracy, which has to investigate each application. So, that's a delicate issue. That's complex, nobody has to find the answer. And this will keep us busy for the next 10 years or even more. Thank you. Thank you so much. I think we are getting close to the end of

    our session. So I would

    I think we have two more questions, one of them, which Mr. Didn't answer in the chat. But I think if you could please also say it. While answering the question, it will be useful because maybe participants are not able to see the chat. So that will be really useful. We have another question also from Joly MacFie. I'm sorry, if I pronounced your name correctly, it says is the lack of data inhabitation AI application example, what Avast takes in Afghani. I'm not sure if I personally didn't understand the question, but I'm not sure if Mr. didn't understand the question or not. But over to you, Mr. For him leader. If you could, please let us know. And also there was a question about from Mr. Abdul Hafeez. It's about what are the most common type of gaps in content creation. So I will start the very last one, I would say in Afghanistan, the

    main content gap is the technology,

    business trends which is going on in the world. So most of the time we see these information are in English. But I would say that English is not a common language in Afghanistan. So I see that Korean content on technology trends and business trends in Erlang. local languages, enter all the mediums available to our local public. That's also a gap, which we can use maybe some other friends. Mr. Bowery in Mr. Ansari can put more lights, I see that there is a question if data inhabitation AI application CG why so texting Afghani? I would say that is not a gap anymore. Because AI there are few AI applications. In fact, the AI applications that I shared in my presentation, they can actually create Afghani contents, for example, an Afghan accent, you can just type your you can just record your own voice uploaded to one of these tools in that can create any content with your own why's every newer video that I think is something that AI is taking care of. And then what are some of the kinds of news image? I think I answered this.

    I think I'm done with my answers, but I would love Mr. Ansari,

    in some and Mr. Bowery and other colleagues here who have more wisdom on the subject to share their views. Thank you so much. We have a few Henry's I would like to give the floor to Mr.

    Omarama student sorry if

    he has or would like to add something to what has been discussed. appreciated. Thank you. Thank you Lima. I just wanted to to share a few

    thoughts on on the localization

    challenges in Afghanistan, we do face a, you know, challenging, catalyzing technology and content and upon is in the past I have worked on software localization in the country. That wasn't In fact, the first thing I started when I completed the university. So, between that was between 2024. And, sorry, 2014 2008, we did a project with Microsoft in an idea at that time, we needed local language content to train the software. But unfortunately, we didn't have much, you know,

    like E content, or digital content,

    later on the word some content created, but that's probably not sufficient to train AI, machine learning and, you know, all the software and technologies that now people are working on, I'm aware of a project that attracts a, an African, German, was born, is working on in it's like trade training software on various postal accent so it's able to, to to recognize

    the voice.

    But but I'm not sure where he has, but luckily, he's kind of collecting the voices for various regions of Afghanistan, you know, there's many dialects, that that requires no software training. So generally, in to conclude, this will require a lot of a lot of data, localizing content in push will vary in other African languages. So that we're able to train the software and train the AI and the technologies. Thank you. Moments students, sorry. And

    all of our distinguished speakers,

    unfortunately, we lost Terry and Mr. Weiss via we had a very intimate very insightful and rich discussion today. It was was exceptionally rich and I hope our audience and parents were able to to increase to add something to their knowledge and, and learn new things from our today's session. Thank

    you so much for being

    with us. Thank you, Wolfgang, thank you, Ahmed for Hindi dar for for your, for your presentation. And thank you for being with us. I think it's lunchtime in Afghanistan. And I would like to say issue I hope vac the hope yak side more back pain on your side roustabout Beta Delta Jose, whoo Yopa Sara, don't forget that it will be our opening session and we will be having the opening session of the afnog Afghanistan IGF and we would really, really appreciate and we'll be waiting for you to be back and be with us. And so see you in one hour. Eat well enjoy your food and come back in one hour with with

    a new

    and I'm sure you will learn a lot and you will be able to see a lot of new experts in the area. Thank you so much. Have a great day. And see you in one hour. Yeah,