version: 29 june 2016 - ieee internet initiative · 2016-07-27 · the next regional ieee etap...
TRANSCRIPT
1
Version: 29 June 2016
2
ContentsExecutiveSummary..................................................................................................................................3Introduction:IEEEInternetInitiativeandIEEEETAPForumSeries..........................................................4BeijingIEEEETAPForumInvitedSpeakers...............................................................................................5OpeningChat:RodBeckstrom,TheBeckstromGroup,andXiaodongLee,CNNIC..............................5KeynotePresentation:WeiLu,InternetSocietyofChina.....................................................................7PanelDiscussion:BuildingEnvironmenttoEnableInteractionofTechnologistsandPolicymakers....8KeynotePresentation:GregAustin,EastWestInstitute.....................................................................11KeynotePresentation:YuejinDu,Alibaba..........................................................................................12
DiscussionsandNextSteps....................................................................................................................13Cyber-threatstoCriticalInfrastructure,IncludingeGovernment/eCommerce..................................13TransparencyAsaSourceofObtainingDataforEvidence-basedDecisionMaking...........................14BiodiversityintheInternetEcosystem...............................................................................................14
Conclusion..............................................................................................................................................16AppendixI:Program...............................................................................................................................17AppendixII:Participants........................................................................................................................23AppendixIII:TopIssues..........................................................................................................................25AppendixIV:CombinedIssues,Beijing/Delhi/Washington/TelAviv/SanJoseIEEEETAPForums.........26
3
ExecutiveSummaryMorethan50individualsparticipatedintheIEEEExpertsinTechnologyandPolicy(ETAP)ForumonInternetGovernance,Cybersecurity,andPrivacyon17May2016—themed“ClosingtheCyberspacePolicy-TechnologyDividetoDrivetheFutureoftheInternet”—attheChinaWorldHotelinBeijing.Theinvitation-onlyeventattractedtechnologydevelopersseekingabetterunderstandingoftheInternetpublic-policylandscapetohelpdriveproactivetechnologydesign,aswellaspolicyexpertsseekingreliabletechnicalguidancetomakeinformedInternetpublic-policydecisions.ThefifthinaseriesofregionallyorientedgatheringshostedbytheIEEEInternetInitiativesincelastyear,theBeijingeventwasco-sponsoredbytheChinaInternetNetworkInformationCenter(CNNIC).FocusareasforthisIEEEETAPForumincludedassessingtechnologyandpolicyfactorsandactorsthataffectthedevelopmentandmanagementoftheInternet;globalacceptanceoftechnologyprotocolsandstandardsversuspolicylocalization;andbuildinganenvironmentthatenablestheinteractionoftechnologistsandpolicymakers.AttendeesinBeijingheardkeynotepresentationsandpaneldiscussionsonchallengesandopportunitiesintechnologyandpolicy,discussedtheirtechnologyandpolicyconcerns,andconvenedbreakoutsessionsforin-depthconversationaroundthreetopics:
• Cyber-threatstocriticalinfrastructure,includingeGovernment/eCommerce• Transparencyasasourceofobtainingdataforevidence-baseddecisionmaking• BiodiversityintheInternetecosystem
ThenextregionalIEEEETAPForumgatheringisscheduledforTelAviv,Israel,on22June2016.
4
Introduction:IEEEInternetInitiativeandIEEEETAPForumSeriesAlongwithexcitingopportunitiesinareassuchasrevolutionaryservicesanduserexperiences,improvedproductivityandefficiency,real-timedecision-making,andfundamentallynewbusinessmodels,thedrivetowarduniversalconnectivity,proliferationoftheInternetofThings(IoT),andadaptationofinformationandcommunicationstechnologies(ICT)innewindustriesarebringingtotheforeacomplexsetofnewissuestobesolved,aswell.Collaborationacrosstraditionalprofessional,technological,andgeographicbordersiscrucialinanenvironmentthatissointerconnectedandsocomplex,inordertosuccessfullysolvetheemergingissuesincybersecurity,privacy,andInternetgovernancewithoutbluntingthehistoricpromiseofInternetinnovation,intermsofencouragingsustainabledevelopment,spurringeconomicgrowth,enhancingpublicsafetyandsecurity,etc.OutofthisawarenesshasgrowntheIEEEInternetInitiative.Theinitiativefacilitatestwo-waydialoguebetweenthehistoricallyseparateworldsoftechnologyandpolicy.InthesamewaythatongoingInternetinnovation,sustainability,andmarketgrowthareintimatelylinkedwithinformedInternetpolicy,itisalsotruethateffectiveInternetpublicpolicyisreliantonsound,unbiasedtechnicalguidance.TheIEEEInternetInitiativeservesasaneutralplatformacrosswhichengineers,scientists,industryleaders,andothersengagedindisparatetechnology,policy,andindustrydomainsgloballycollaborate—withincontextofadvancingtechnologyforthebenefitofhumanity.OrganizedbytheIEEEInternetInitiative,theIEEEETAPForumsonInternetGovernance,Cybersecurity,andPrivacyhaveemergedasanintegralvenueforthisconversation.Aseventco-moderatorOlegLogvinovexplainedtotheattendeesinBeijing,theIEEEETAPForumsarestaged“aroundtheworldinordertocreateafabricofconnectivity”andcreate“acohesivecrosspollination”amongtechnologyandpolicydevelopersglobally.ThefirstIEEEETAPForumoccurredinMay2015inSanJose,California,intheUnitedStates(http://sites.ieee.org/etap-sanjose/).AsJaredBielby,co-chairoftheInternationalCenterforInformationEthics,toldtheparticipantsinBeijing,“Ourinitialideawastotrytoidentifythekeyissues—whataretheyregionally,andwhataretheyinternationally,andwhatwouldacommunitylookliketoaddressthesecollaboratively?”IEEEETAPForumeventssubsequentlytookplaceinTelAviv,Israel,inAugust2015(http://sites.ieee.org/etap-israel1/);inWashington,D.C.,USA,inFebruary2016(http://internetinitiative.ieee.org/events/etap/etap-forum-in-washington-dc),andinDelhi,India,inMarch2016(http://internetinitiative.ieee.org/events/etap/etap-forum-in-delhi-india).Mr.Bielbysaidanintegratedonlinecommunity,theIEEECollabratec™forum,facilitatesfollowthroughoncommonissuesidentifiedacrosstheIEEEETAPForums.“Wewouldreallyloveyourfurtherparticipation,”Mr.Bielbysaid.“Thereareanumberofwaysyoucangetinvolved.”
5
BeijingIEEEETAPForumInvitedSpeakersAftereventco-moderatorandIEEEInternetInitiativechairOlegLogvinovthankedCNNICforitsassistanceintheorganizationoftheday’sagenda,theBeijingIEEEETAPForumopenedwithwelcomingremarksfromthreespeakers:
• ShilongZhongrepresentedtheBureauofITDevelopment,CyberspaceAdministrationofChina.HediscussedtheurgencysurroundingconcernsinInternetgovernance,cybersecurity,andprivacyasChinapursuesits“Internet+”strategytodriveeconomicgrowthbymorefullyintegratingICTthroughoutmanufacturingandbusiness.“Asweknow,arapiddevelopmentcouldnotberealizedwithoutsupportforanorderlysituationandtheharmonybetweenpolicyandtechnology,”hesaid.“Itisimportanttofindcoherentinterestsofpolicyandtechnology—thisisalsothemainmissionoftheETAP.”
• BruceKraemer,presidentoftheIEEEStandardsAssociation(IEEE-SA)andamemberofthe
IEEEBoardofDirectors,stressedtheneedforanopenandaccessibleInternet,whilebuildingtrustworthinessandmaintainingsecurity,astheworldstandsatthepointtodayofroughlyhalfofhumanityconnectedandhalfunconnected.“IEEEcanhelpbridgegeographicaldifferencesofopinionthatexistastowhattheInternetisandhowitshouldbemaintainedandmanagedgoingintothefuture,”hesaid.“PromotinguniversalInternetaccessisinherentinIEEEmissionoffosteringinnovationforbenefitofhumanity…Tothisend,IEEEcallsupontheworldwidecommunityofengineersandscientistswhoareresponsibleforbuildingtheInternet,alongwiththepolicymakersandotherstakeholdersintheInternet,toapplytheirskillsandsolutionsthatareneededtoextendthesuccessoftheInternetmovingforward.”
• XiaodongLee,chiefexecutiveofficer(CEO)andchieftechnicalofficer(CTO)ofCNNICandCEO
ofNATlab,spokeaboutChina’sexplodingInternetpenetration—700millionusers,andover90percentofthemaremobileusers.“Wehaveanother700millionpeoplewhodonotconnecttotheInternet,”hesaid.“It’saverybigchallengeforustoconnectthem,astheydon’thavetheeducationtousetheLatincharactersonthekeyboard.It’sabigbarrier;it’salsoabigopportunityforus.…Howpreparedareweforthechangesoftodayandtomorrow?Iwanttoaskalloftheexpertsheretobearthesequestionsinmindduringtoday’sdiscussion.”
Followingthewelcomingremarks,theBeijingeventmovedontoanopeningchat,aseriesofkeynotepresentationsandapaneldiscussion.
OpeningChat:RodBeckstrom,TheBeckstromGroup,andXiaodongLee,CNNICXiaodongLeeintroducedRodBeckstrom,presidentofTheBeckstromGroupandamemberofGlobalCouncilonFutureofGovernment,WorldEconomicForum,whodeliveredapresentationtitled,“It’saMADMADMADCyberWorld.”Hediscussedhisexperienceon11September2001,andhowhisthoughtsthatday—aboutthesmallnessandfragilityoftheworldandhownooneissafeuntileveryoneissafe—ledhimtore-orienthiscareeraroundservingpeaceand,specifically,cybersecurity.
6
“HowdowemaketheInternetsafeforeveryone?”hesaid.“Because,rightnow,itissafefornoone.”Heassociatedtoday’sinnovationsandchallengeswiththeadvancesthatallowedhumanitytotraveltheworldinthe1500s,suchasglobes,astrolabesandclocks.Suchdevelopmentsledtoadvancesinwaysoflivingandmarketcreation,buttheyalsoledtonegativethingssuchaspiracy.HegaveexamplesofChineseandDutchpiratesandthenthecreationofprivateerswhoweresanctionedbytheirgovernmentstobepirates.HepointedoutasimilaritytoInternethackersoftoday.“Aroundtheworld,therewerenation-statepirates,privateerswhowereworkingonbehalfofstates,andsimplecriminals,workingcompletelyindependently,”hesaid.“…Sothisworldofhackingandpiracythatweareinisnotnew.”Mr.Beckstromnotedthatittook300to400yearstogetlawstoaddresspiracy.Withthedevelopmentofthenuclearthreat,hesaid,ittookabout40yearstogetanagreementtoslowproliferationofweapons.Creditcardswereinventedinthe1950s;credit-cardfraudwasinventedoneyearlater,andithasbeenwithuseversince.Butthefraudiscontainedandmanageable,andcreditcardsareusedglobally.“Whatistoday’sreality?”heasked.“Anythingnetworkedcanbehacked.Everythingisbeingnetworked.Everythingisvulnerable.These12wordsdescribethebaselinerealityofthismagnificent,interconnected,electronicworld…Whyisita‘MAD,MAD,MADworld?’”
• Nuclearmutualassureddestruction–“Therehavebeennoworldwarssincetheinventionofnuclearweaponsbecauseofdeterrence.Soitworks,andit'srelevanttocyber.Thereare14nuclearpowers,andthereareahandfuloftruecyberpowers,butit’sastabilizingforce…becauseofmutualdeterrenceandmutualassureddestruction.”
• Cybermutualassureddisruption–“Itisthecapabilityofmultiplenation-statestowreakhavoc
withothercountries…It’smoreproblematicthannuclearMAD,becausewecancountmissiles;wecancountthecountries;wecandrivenuclearnonproliferation;andwecanstarttocontaintheproblem.ButwithcyberMADwedon’tknowhowmanyplayersthereare…wedon’tknowhowmanyweaponsthereare;thereare200,000newstrainsofmalwareinventedeveryday.”
• Internetmutualassureddependence–“Whateconomyintheworldtodaywouldchooseto
unplugfromtheInternet?TherealityisalleconomiestodayneedtheInternet.Weneeditfortrade,welfare,transport...everything.”
Thesethreeinterdependencies,Mr.Beckstromsaid,arewhycyberhacking,whilecertainlyaglobalproblem,“hasnotspunoutofcontrol.”Instead,wecomeupwithacceptableriskandlossbasedonmanagingcyberrisk.Hesuggestedthatwider-scaleadoptionoftechnologiesfromthefinancialservicessectorcouldbealeadingedgeofinnovation.Becauseofthehugeeconomicstakesofcybersecurityinthatindustry,itcouldprovidetheimpetustotacklecybercrimeeffectivelyinotherareasoflife.InconversationwithDr.Leetoclosethesession,Mr.Beckstromsaidthatcollaborativeefforts,
7
systems-levelthinkingandmoregametheorywillallbekeytoaddressingthesituation.“Ithinkwehavetostartwiththeprinciplesfirst:collaboration,reciprocity,andthehighestformofreciprocity,respect…respectingteachotherashumanbeings,cultures,countries.Andanotheroftheprinciplesistruth;wehavetogettogroundtruth,”hesaid.“Thegoodnewsisthatthisisaproblemforeverycountryintheworld,everycompany,andeveryperson…Thiskindofforumistheperfectplacetoadvancethesediscussions…Therearedifferencesinopinions,perceptions,andnationalinterests.Butit’sthroughdialogueandworkingtogetherthatI’mhopefulwecanmakeprogress.”
KeynotePresentation:WeiLu,InternetSocietyofChinaWeiLu,secretarygeneraloftheInternetSocietyofChina,offeredanoverviewofcoordinatedanti-spam/malwareeffortsandhisorganization’sworkwithInternetcompaniesandgovernmenttoaddressthesechallengesincludingwaystotrackabusesandsupportingcommitteesexaminingtheproblems.Forexample,theorganizationhascreatedareportingsystemforenduserinvolvementandregularlyreleasespublicationsintendedtoadvancecybersecurity.TheInternetSocietyofChinaisanationalnon-profitorganizationsetupin2001tosupportdevelopmentoftheindustryandthegovernment.Therearemorethan600members,includinglegalcompanies,researchinstitutes,academicassociations,universities,andtelecomscompanies.Theorganizationhasestablished30workingcommitteesonspecificfields(e.g.,InternetCopyrightWorkingCommittee).Mr.LusharedstatisticsonthechallengesfacedinChinaforInternethacking,includingspamandmaliciousmobileapplications.Forexample,whentheInternetSocietyofChinalauncheditsanti-spamcampaign,Chinawastheworld’ssecondlargestsourceofspam,hesaid.HesaidtheMinistryofInformationIndustrypublisheditsfirstanti-spammeasurein2006,and,accordingtoaBritishreport,spamoriginatingfromChinawasreducedfrom22.3percentto4.1percent.Smartmobiledeviceshaveintroducedparticularchallengeswithregardtocybersecurity,hesaid.MaliciousappswithTrojansandvirusesspreadwithdevelopments,resultingintheftofprivateinformationandotherformsoffraud.China'sMinistryofInformationIndustry,withthehelpoftheInternetSocietyofChina,launchedthe12321Centretofieldcomplaintsfromusersaboutspamtextmessages.Since2013,therehavebeenmorethan900millionreportsofmaliciousapps,and60,000appshavebeenremoved.TheInternetSocietyofChinathenorganizesthird-partytestingorganizationstovalidatetheeffortstorectifytheapps.Similarly,ithasrecentlyinitiatedacollaborativeanti-spamcampaignaroundWeChatmobiletextandvoicemessaging.Mr.Lusaid,detailedcollaborativeworkundertakenbytheInternetSocietyofChinainotherinterrelatedareas:
• Theorganizationhasworkedeffectivelywiththenation’sthreelargesttelecomsserviceproviderstoreinforceshortmessageservice(SMS)spamreportingandtreatmentthroughanationalsystem.
8
• TheInternetSocietyofChinahascooperatedwithindustryleaderstoshareanti-cheating
informationtoenhancetheindustry’sdetectionabilities.
• TheorganizationhascooperatedwithappstorestoreduceinformationfraudandrolloutpublicmobileInternetsecuritymanuals.
Furthermore,theInternetSocietyofChina“hasrecruitedvolunteerswhoarededicatedtosocialresponsibilityandasenseofjustice.BynowwehavethousandsofusersvolunteeredtojointhisactionofpurifyingtheInternet.”Mr.LudescribedtheInternetSocietyofChinaas“abridgethatactivelyconnectspolicymakersandindustries.Weencouragecollaboration…tocreateahealthy,orderlyandharmoniousonlinenetwork.”
PanelDiscussion:BuildinganEnvironmenttoEnabletheInteractionofTechnologistsandPolicymakers
Next,theBeijingIEEEETAPForummovedtoapaneldiscussionthatengagedAlainDurand,principaltechnologistwithICANN;MinJiang,associateprofessorofcommunicationwiththeUniversityofNorthCarolinaCharlotteandaffiliateresearcherattheCenterforGlobalCommunicationStudiesattheUniversityofPennsylvania;JamesSeng,CEOofBeijingXianyuShumaTech.Co.Ltd.,andBaopingYan,chiefengineerofCNICanddirectoroftheChineseAcademyofSciencesInformatizationCommitteeofExperts.
FacilitatingGlobalCoordination
AlainDurandmadethedistinctionthatgovernanceistheprocessbywhichglobaldecisionsaremade—itisnotgoverning.HesaidtheInternethasbeenanenormoussuccesslargelybecauseit’soneInternet,notmanysmallInternets.But,hesaid,thatbenefitcomeswithaprice:theneedforglobalcoordination.Mr.Durandsaidthereisaneedforopenness,transparencyandaccountabilityinthisglobalcoordination—andthateveryone(acrossdisciplinesandgeographicregions)shouldbeinvitedtoparticipate.Heparticularlyemphasizedtheimportanceoftransparency.“Ithinkthisisperhapsthemostimportantthing.Thereisasayingaboutquality:‘Saywhatyoudo,anddowhatyousay.’Butyouneed,too,toverifywhathasbeendone.Everytimethereismissingorhiddendata,wearelosingtransparency,andwearelosingtrust.”HenotedthatICANN’sregionalteamsareworkingtoaddresssuchneeds.“Attheendoftheday,thisisaboutincreasingthecommunication,”hesaid.“WhenIwenttoonemeeting,thegovernmentpeoplewerewearingsuitswithties,andtheIETF(InternetEngineeringTaskForce)peoplewerewearingT-shirts…Thesearecommunitiesthatusuallydon’ttalkwitheachother.Anythingthatcanbedonelikethisforumthatcancausecrosspollinationandenablethesecommunitiestotalktoeachotherisvery,veryimportant.”
9
LearningtoListen
JamesSengdiscussedhisworkasatechnologistworkingwithgovernmentsinternationally.“Iamheretoeducatethepolicymakers.Ifweastechnologistsdonoteducatepolicymakers,theywillcomeupwithbadpolicy,”hesaid.“Thisisnotbecausetheyareignorantorincompetentbutbecausetheyarenotgiveninputsfromengineers,thepeopleontheground.Soitisuptoustokeepupaconstantdialogue.”Mr.Sengsaidthereexistsatensionbetweenthecommunitiesoftechnologistsandpolicymakers.Hestressedtheneedforpatienceinthesediscussionstobeabletotrulylistentooneanotheraboutneedsineacharea.“Ihaveseenverygood,smartpeopletalkingtoeachotherandlisteningbutnotreallyabletounderstandbecausetheylackthepatiencetolearnaboutthesethingstheyarenotfamiliarwith,”hesaid.HeaffirmedtheimportanceofenvironmentssuchastheIEEEETAPForum,atwhichtechnologyandpolicyexpertscaninteract.Buthealsopointedoutthatittendstobemoredifficulttogetgovernmentdecisionmakerstoengage.“Weareluckytodaytohavesomepolicymakershere,”hesaid.“Asengineers,weneedtoreachouttothepolicymakersmoreoften.”
BuildingandPreservingTrust
MinJiangaskedhowtobridgethegapbetweentechnologistsandpolicymakersandnotedtheneedtoalsoincludeindustryleaders,users,andnon-governmentalorganizations(NGOs)inadiscussionunderpinnedbytrustandaccountability.Sheobservedthatusersinparticularoftenlackavoiceindecisionmaking.“Trustishardtobuildandveryeasytolose,”Dr.Jiangsaid.“TrustbetweentechnologistsandpolicymakersworkssomewhatdifferentlywithinChinaandbeyondChina.Domestically,technologistsandentrepreneursaregivenalotofincentivesinChina,aspolicymakersreallyunderstandthatsmartpeopleandsmartideasarethedriversofathrivingeconomy…Thisbasicunderstandingbetweenthepolicymakersandtechnologistsreallyhelpstobuildtrust.Buttherearealsoconstraintsontechnologiststhattheircounterpartselsewheredonotface.Someofthisistodowithcontentregulation,but,inadditiontothat,it’swellrecognizedthattechnologistsareintricatelyinvolvedinissuesofcybersecurityandnationalsecurity…It’sunclearhowthesefactorsaffecttrust.”Dr.JiangreferredtoexamplesofproblemsintheUnitedStates(e.g.,EdwardSnowden,aformerU.S.CentralIntelligenceAgencyemployeewholeakedclassifiedinformationilluminatingglobalsurveillanceprograms)andinChina(e.g.,astudentwhorecentlydiedafterexperimentalcancertreatmentbasedoninformationofpoorcredibilitythatwasdiscoveredbyInternetsearch)thathaveerodedtrustbecausetechnologistsandpolicymakers.Shenotedthatethicalconsiderationsalsoneedtobepartofthediscussion.“ForalongtimeIbelievepolicymakersinChinaandelsewheresawtheInternetasanengineofinnovationandgrowth,”shesaid.“Buttheyhavepaidverylittleattentiontochallengesofprivacy,security,andaccountability,whichreallynowdemandsomesortofresolution.”
10
UnderstandingtheInternet’sEco-environment
BaopingYandiscussedhowthereisaneco-environmentfortheInternet,justasthereisinnature.“Weneedtoexamineandbuildthiseco-environmenttoincludeinformationsociety,aswellastechnologistsandpolicymakers,”shesaid.ShediscussedherworkondatabasesrelatedtoChina’sQinghaiLakenaturereserve,whereICTisbeingadaptedtoenhanceenvironmentalprotectionwork.“Ihavewitnessedengagementwithgovernment,andpeopleandevenwiththemonksandthelama,andthewaywehaveovercomeprejudicetoworktogetherisreallypositive,”shesaid.“…ThebiggestachievementisthatwehavebuiltalocalteamofpeopleinTibet,theChineseandlocalTibetans,whereweusetheInternettoshareinformation.”Ms.Yansaidshebelieveswearestillprocessingwhattheconvergenceofhealth,technology,andindustryontheInternetwillmeanforhumanity.ShesaidthatdetermininghowwewillusetheInternettoprotecttheeco-environmentsweallliveinwillbevitallyimportant.“IftodaytheInternetisthemostproductivesourceinsociety,whatcanwedotoprotectthisenvironment?”
Q&A
OlegLogvinovbuiltontheindividualtalksinthepaneldiscussiontomoderatealargerconversationamongtheparticipantsaboutspurringmeaningfulconversationsbetweenpolicymakersandtechnologists.Hesynthesizedthepanelists’pointsbysayingthattheInternetisa“newecosystemthatneedstobeprotectedasafragilegardenthatweneedtogrow”andthattoolsfordoingsoaretransparency,accountability,openness,andethics.“ThereisadifferenceinspeedbetweenwhatishappeningontheInternetandwhatregulatorsaredoing,”Mr.Durandsaid.“Anythingwecandotoreducethisgapandmakesurethattherecanbediscussionbeforethingsbecometoomuchofaproblemwouldcertainlyhelpmoveforward.”Mr.Sengadded,“Everygovernmentworksdifferently…andsomehavedifferentcomfortzonesforwhattheyconsidertobeasafedialoguespace.Ithinktherearegoodpeopleineverygovernment;theytrytocreategood,productivepolicy…IthinktheChinesegovernmentisbeingsmartinsomeeffortstocombatfakegoods,fakenews,andpropagandaofrankings…However,thewaythattheChinesegovernmentofficialswouldfeelcomfortabletoengageindustryandtechnologyisverydifferentfromtheU.S.governmentorSingaporeorJapangovernment.Eachworksslightlydifferently,andweasaglobalcommunitymustacceptthatdifferentgovernmentshavedifferenttendencies,andwehavetoadaptforlocalenvironment,aswell.”Ms.Jiangnotedachallengeinbridgingthetechnologyandpolicydevelopmentcommunities.Shedescribedtechnologydevelopersas“rulebreakers,”whowanttomakenewthings.Policydevelopment,however,isessentiallyrulemaking.Bridgingthisculturalgapbetweenthetwoworldsiscrucial,shesaid,becausethetwoworldsareinseparable.Mr.DurandofferedacaveatonthequestionsofregulatingtheInternetbasedonethicalconsiderations.“Thereisadifferencebetweenapplications,whereyoucanencodetheethicsina
11
searchengineasaperfectexample,andtheunderlyingtechnologyonwhichtheInternetisbuilt,”hesaid.“OneofthereasonsfortheInternet’ssuccessistheenvironmentofpermission-lessinnovation.Ifyoutrytoencodeethicstoomuchintothefundamentalbuildingblocks,youruntheriskoflimitingtheinnovationthatishappeningthere.”Dr.Jiangofferedthatshebelieves,asateacher,thatthereisanopportunitytoencouragestudentstotakeintoconsiderationethicalissuesastheyaredesigningsystems.
KeynotePresentation:GregAustin,EastWestInstituteGregAustin,aprofessorialfellowwiththeEastWestInstituteandprofessorofcybersecurity,strategy,anddiplomacywiththeAustralianCentreforCyberSecurityatUniversityofNewSouthWalesCanberra,presentedon“InternetFutures:ClosingthePolicy-TechnologyDivideinResearch,Education&InternationalCollaboration.”Hesaidthatthecyberspaceenvironmentkeepsshiftingwithprioritiesofgovernmentsandinternationalrelations.So,bothpositiveandnegativetrendsarepresent,hesaid.Atthesametimethatstatesaresteppingupthearmsraceincyberspace,forexample,theyalsoaresharingmoreinformationwithoneanotherabouttheirchallenges.“Sovereigntyincyberspaceremainsahighlycontestedpolicypriority,butitisunderminedandconditionedbyrealitiesofentanglementandunrelentingforcesthathaveglobalizing,anti-sovereigntyeffects,”hesaid.“I’mreallyafanofthepropositionthatgovernmentscanwantforsovereigntyincyberspacealltheylike;theywillnevergetit.”Hedescribed2015asayearof“amazingdevelopmentsincyberspacehistory,”noting,forexample,scientists’consideringadvancedartificialintelligence’srelationshiptohumanexistence;China’spresidentandtheU.S.presidentagreeingnottoengageincommercialespionageagainsttheother;ChinaandRussia’sbilateralagreement,moreorlesscreatingacyberalliancebetweenthem;andtheUnitedStates’publishingavisiondocumentofcyberoptionsforalllevelsofthearmedforces.Mr.AustinsaidthateducationaroundInternetfuturestodayisstrugglingtokeepupwithtrendsintechnologyandpolicy.Hesaidthereisastrongneedforpolicyresearch,research-basededucation,andinternationalcollaboration,andhesaidthatpolicyresearchislateincomingandbeingovertakenbyevents.Therearealsosubstantialgapstobeclosed,particularlyontherelationshipsamongkeycountries.Insomecases,hesaid,today’sresearchtendstobebiasedbytheresearchers’specificnationalperspectives.ResearchcomingoutoftheUnitedStatesmightilluminateU.S.-ChineserelationshipsbutshowanignoranceofChinese-EuropeanorChinese-Russianrelations,when,indeed,thecontrastisveryfrequentlystark.Inothercases,Mr.Austin,saidresearchissimplylacking.Forexample,hesaid,theNATOCooperativeCyberDefenseCentreofExcellenceinTallinn,Estonia,isoneofthekeyresearchcentersintheworld,butevenitdoeshardlyanyresearchonRussia.Policymakersonthewhole,heconcluded,aredrawingfromaverythinpoolofusefulresearch.Mr.AustinsaidhebelievesIEEEcanplayarolebeyondminingnuggetsofinformation,suchas
12
throughtheIEEEETAPForums.HerecommendedthatIEEEpursuewiderpartnershiptohelpsettheresearchagenda,deliverit,andpromote/advocateresults.“Wemustdomoretoharvesttheoutcomesinawaythatcanprojectthemforward,”hesaid,proposing“moreresearchandmorecollaboration,butfindingmechanismsforpracticalprojects,whichdoinvolveresearch,whichcanbetranslatedintoeducation,andwhichcansetthefoundationformoreeffectiveinternationalcollaboration.”
KeynotePresentation:YuejinDu,AlibabaDr.YuejinDu,seniorresearcherandvicepresidentoftechnologywiththeAlibabaGroup,presentedon“CybersecurityintheNewEraofInternet+.”Dr.Duasked,whyhavewespentsomuchtimeandeffortoncybersecurityandthesituationisgettingworse?ThethreatstandstogrowevenworsewiththeproliferationoftheIoT,hesaid,asvirtuallyanythingcouldbehackedremotely.Dr.DunotedtheconvergencethatisconveyedinChinathroughInternet+,wheretheInternetwillbringeverythingtogetherinthefuture.“SotodayInternetisnolongerandinformationandcommunicationplatform;it’saplatformforeverything,aplatformformanufacturing,aplatformforliving,”hesaid.“Wedonothavetosay‘eCommerce’inthefuture;inthefuture,eCommerceiscommerce.Inthefuture,‘Internet-basedfinance’isfinance.Inthefuture,‘eGovernment’isgovernment.ThetraditionalworkingconvergedwithInternetisnotonlytoincreaseefficiency;it’schangingyourworkingmode.”However,whereverwecangowiththeInternet,thehackerscanfollow,Dr.Duwarned.Asinterconnectionexpandstomorethingsandusersthemselves,“thisisgoodforbadguys,”hesaid.“Badguyscancontrolyourvehicle.Badguyscankillpeople.Badguyscanmakeyoursocietyturnintochaos.Inthefuture,theInternetwillbeanetworkoflivingorsurviving,socrashingtheInternetcancrasheverything.”Theprogrammability,ubiquity,andconvergenceofthesystemsintheemergingInternetintensifysecuritychallenges.“Inthepastwetriedtoenhancesecuritybydividing,buttodayeverythingisworkingtogether,”hesaid.“Thismakesdefenseverydifficult.”Henotedthattechnologistsmustfindwaystoexplainthesecurityrisksinunderstandabletermsandthatthetraditionallyisolateddisciplinesofphysicalsecurityandcybersecuritymustbeintegrated.“Wehaveachancetoturnchallengesintochances,toavoiddatathreat,”hesaid.“Weneednewtechnology,newmodes,andnewmindsetsforpolicymakerstodealwiththesethreats.”
13
DiscussionsandNextStepsTheBeijingIEEEETAPForumshiftedtodiscussionoftheindividualconcernsidentifiedbyattendeesduringtheeventregistrationprocess,aswellassomenewtopicsgeneratedduringrapid-fireconversationattheevent.Co-moderatorClintAndrewsreviewedthetopicsassynthesizedinto18setsofissues,andthentheattendeesvotedthreeofthemforconcentrateddiscussionwithinbreakoutgroups:
• Cyber-threatstocriticalinfrastructure,includingeGovernment/eCommerce
• Transparencyasasourceofobtainingdataforevidence-baseddecisionmaking
• BiodiversityintheInternetecosystem“Wewillonlyfocusonthreetopicssowecanhaveadeepdiscussiononthem,”eventco-moderatorOlegLogvinovsaid.“Butthetopicsthatdon’tgetchosenwillbedocumented,withthepotentialtocollaborateonlater.”
Cyber-threatstoCriticalInfrastructure,IncludingeGovernment/eCommerceThegroupdiscussedhowtraditionalinfrastructure,government,oracybersystem,suchasadomainnamesystem(DNS),couldbeconsidered“criticalinfrastructure.”TheInternetitselfcanbeconsideredaninfrastructure.Originallyviewedstrictlyasacommunicationsmedium,theInternettodayismuchmorethanthatwithcrucialsubsystems(DNS,routing,wiredandwirelesscommunications,etc.),allofwhicharesusceptibletocyber-threats.Nationstodayareonlynowbeginningtodocumentthreatstocriticalinfrastructure,thegroupsaid,andcyber-threatsspecificallyaregenerallylessunderstood.Motivationsforcyber-attackspanattainingprofit,inflictingdamage,orruiningreputations.Weaknessescanbeexploitedanywhereintheincreasinglyconnectedworld,thegroupdiscussed.Evenverysmallutilitiesandcompaniescanbetargetsforlarge-scaleattack,becauseoftheglobalnatureoftheInternet.Anadditionalchallengethatthegroupidentifiedisthat,whereasthe“goodguys”areboundbynationalrulesandnorms,the“badguys”arenot.Protectionagainstcyber-threatmustsomehowbridgenationalboundarieswhilestillrespectingnationalneeds.
14
Thegroupproposedthatthreatintelligencestandardsareneededtodefinethreatterminology,tocategorizethevarioustypesofthreats,andtocreatemethodologiesforsharinginformationaboutthreats.Furthermore,thegroupsaidaplatformsuchasIEEEcouldallowresearchers,industry,andauthoritiestocarryoutarangeofimportanttasksincombatingcyber-threatstocriticalinfrastructure:
• Buildingandsharingbestpractices• Bridgingtoday’snation-by-nationmethodologies• Facilitatingmorerapidresponseinacomplexandevolvingworld• Establishingcybersecurityasanotherelementofphysicalsecurity• Prioritizingwhatneedsthemostprotection• Promotingtheneedfora“globalInternetpolice”
TransparencyAsaSourceofObtainingDataforEvidence-basedDecisionMakingInthisbreakoutsession,IEEEETAPForumattendeesarticulateddifferencesamongtransparency,openness,andaccountability.Transparency,thegroupsaid,hastodowithaccesstodata,whileopennesssuggestsaprocessinwhicheveryonecanparticipate,andaccountabilityaddressesusingdatatovalidatedecisions.Thegrouplookedatreasonswhytransparencyisnotpresentinsomeinstancesofdecisionmaking:
• Businessneeds• Localizationissues(suchascybersecurityandcross-bordercoordination)• Privacy• Costandcapabilityhurdles(notallcompanieshavetheresources)• Politicalconcerns(organizationsmighthideordoctorunfavorabledata)
Finally,thegroupexploredpotentialsolutionssuchasencouragingbestpractices,buildingusertrust,fosteringcompetitionanddiversity,andseparatingthetasksofdatacollection,analysis,andusageinordertoavertpotentialconflictsofinterest.Thegroupaffirmedtheneedforastandardizedbenchmarkfortransparencythatcouldaddressquestionssuchashowtomeasureandtracktransparencyovertime.Thegroup,furthermore,askedwhethertoomuchtransparencyasameanstowardevidence-baseddecisionmakingcouldenduphavingbadeffect,intermsofsaturatingdecisionmakerswithinformationthatisnotmeaningful,relevant,and/ornavigable.
BiodiversityintheInternetEcosystemThisbreakoutgroupappliedthebiodiversityanalogytotheInternetandexploreditsexplanatorypowerandlimitations.TheInternetisanaturalsystemthatweliterallycannotcontrolbutmaybecansteer/manage/police,thegroupsaid.ThebiodiversityoftheInternetecologyisreflectedinitsdiverseelements(e.g.,
15
humans,systems,andprotocols),diversegrowthpaths(theInternettakesondifferentformsindifferentcountries),diverseeconomies(anythingfromcommercialtofree),anddiversegoverningbodiesandworkingcommunities(e.g.,ICANN,ISO,andIEEE).Atthesametime,analogizinghasitslimits.Fundamentally,companiesandorganizationsaredistinctfromindividualhumanbeings,animals,andotherorganismsandareguidedbydifferentassumptionsandbehavioralpatterns.AnurturingandopenenvironmentwasdeemedcrucialtothegrowthoftheInternetinboththeUnitedStatesandChina.WhiletheU.S.governmentprovidedinitialfunding,thegroupsaid,developmentoftheInternetintheUnitedStatesgainedmomentumfromavibrant“techno-culture”oftinkeringandexperimentation.InChina,thegroupsaid,thenation’sopeningandreform,whichstartedinthelate1970s,providedamoreopeneconomicandintellectualenvironmentforgrowingtheChineseInternetsincethemid1990s.Besidesadecentralizedtechnicalinfrastructure,theexponentialgrowthoftheInternetecosystemalsobenefitedfromvariouseconomicincentives,thegroupsaid.Inaddition,a“survival-of-the-fittest”modeofcompetitionfueledinnovationsandadaptationsinvariousfoodchainsandlifecyclesintheInternetecology.Overtime,thegroupdiscussed,predatorsandmonopolists(i.e.,dominantindustryplayers)haveemergedtoposethreattothebiodiversityoftheInternetecology.Thishasdemandedinterventionforthebiodiversitytobesustained.Inthisprocess,bothpolicymakersandtechnologistscanplayaroleasconscientiousgardenerstoensurediversity,resilience,andsustainabilityoftheInternetecology,thegroupsaid.Whilediversityincertainareas(e.g.,technicalstandards)mayposechallengestotheoverallsystem’sefficiency,competitionasaresultofchoicesandalternatives,especiallyinareasofproductsandservices,isbeneficial.Forexample,thegroupsuggested,thereshouldnotbejustoneDNSclearinghouse,andanInternetthatisgoodforallofhumanityneedssupportfromalldirectionsandshouldnotbestrictlytop-downregulated.
16
ConclusionEventco-moderatorOlegLogvinovconcludedtheBeijingIEEEETAPForumbyencouragingattendeestostayinvolvedandengagedintheconversationssparkedatthemeeting.“Thisisnotjustaone-offdiscussion,”hesaid.“Thepurposeisforyoutobecomepartofthecommunity,partofthemovementthatpropelshumanityforward.”ThenextregionalIEEEETAPForumgatheringisscheduledforTelAviv,Israel,on22June2016.Mr.Logvinovsaid,too,thathehopestoorganizeapanelattheInternetGovernanceForuminGuadalajara,Mexico,on6-9December2016thatwouldengageparticipantsfromeachIEEEETAPForum,inordertoprovideperspectiveonthefullspectrumoftheregionalevents.
JointheConversation
TheIEEEInternetInitiativeisacross-organizational,multi-domaincommunitythatconnectstechnologistsandpolicymakersfromaroundtheworldtofosterabetterunderstandingof,andtoimprovedecisionsandadvancesolutionsaffecting,Internetgovernance,cybersecurity,andprivacyissues.TherearemanywaystoengagethroughtheIEEEInternetInitiative.Pleasevisithttp://internetinitiative.ieee.orgoremailinternetinitiative@ieee.orgformoreinformation.
17
AppendixI:ProgramTheIEEEExpertsinTechnologyandPolicy(ETAP)ForuminBeijing,China,on17May2016wasthefifthinaseriesofregionalmeetingstoadvanceaglobal-scalediscussionabouttoppublic-policyissuesincybersecurity,privacy,andmulti-stakeholderInternetgovernance.Diversestakeholdersfromaroundtheworld—governmentandindustryrepresentatives,legalpractitioners,andacademics—gatheredfortheone-dayeventorganizedbytheIEEEInternetInitiativeandtechnicalco-sponsorChinaInternetNetworkInformationCenter(CNNIC).Location:ChinaWorldHotel,BeijingModerators:ClintAndrewsandOlegLogvinovClintAndrewsClintAndrewsisaprofessorintheBlousteinSchoolofPlanningandPublicPolicyatRutgersUniversity,andwaspreviouslydirectoroftheUrbanPlanningprogram.Hisexpertiseisinthesubstanceandprocessesofenergyandenvironmentalplanningandpolicy.HewaseducatedatBrownandMITasanengineerandplanner.HeisamemberoftheAmericanInstituteofCertifiedPlanners,aLEEDAccreditedProfessional,andalicensedProfessionalEngineer.Previousexperienceincludesworkingintheprivatesectoronenergyissues,helpingtolaunchanenergypolicyprojectatMIT,andhelpingtofoundasciencepolicyprogramatPrinceton.AndrewscurrentlyservesontheBoardofGovernorsoftheAmericanCollegiateSchoolsofPlanning,andisapastmemberoftheBoardofDirectorsoftheInstituteforElectricalandElectronicsEngineers(IEEE)andtheInternationalSocietyforIndustrialEcology,andawinneroftheIEEE’s3rdMillenniumMedal.HisbooksincludeIndustrialEcologyandGlobalChange,RegulatingRegionalPowerSystems,andHumbleAnalysis:ThePracticeofJointFactFinding.OlegLogvinovOlegLogvinovisthePresidentandCEOofIoTechaCorporation,anindustrialIoTsolutionsprovider.InMarch2016,Mr.Logvinovco-foundedIoTechaCorporation.PriortojoiningIoTecha,Mr.LogvinovwasadirectorofspecialassignmentsinSTMicroelectronics’Industrial&PowerConversionDivision,wherehewasdeeplyengagedinmarketandtechnologydevelopmentactivitiesintheareaofindustrialIoT,includingtheapplicationsofIEEE1901powerlinecommunicationtechnologyinharshenvironmentsofindustrialIoT.Duringthelast25yearsMr.Logvinovhasheldvariousseniortechnicalandexecutivemanagementpositionsinthetelecommunicationsandsemiconductorindustry.AftergraduatingfromtheTechnicalUniversityofUkraine(KPI)withtheequivalentofamaster’sdegreeinelectricalengineering,Mr.LogvinovbeganhiscarrierasaseniorresearcherattheR&DLaboratoryoftheUkraineDepartmentofEnergyattheKPI.InJanuary2015,Mr.LogvinovwasappointedasthechairoftheIEEEInternetInitiative.TheIEEEInternetInitiativeconnectsengineers,scientists,industryleaders,andothersengagedinanarrayof
18
technologyandindustrydomainsgloballywithpolicyexpertstohelpimprovetheunderstandingoftechnologyanditsimplicationsandimpactonInternetgovernanceissues.Inaddition,theInitiativefocusesonraisingawarenessofpublicpolicyissuesandprocessesintheglobaltechnicalcommunity.HeisalsoapastmemberoftheIEEEStandardsAssociation(IEEE-SA)CorporateAdvisoryGroupandtheIEEE-SAStandardsBoard.Mr.LogvinovalsochairstheindustryengagementtrackoftheIEEEIoTInitiativeandhascreatedaseriesofworldwideIoTstartupcompetitionevents.Mr.LogvinovactivelyparticipatesinseveralIEEEstandardsdevelopmentworkinggroupsthatfocusonIoTandcommunicationstechnologies.Mr.LogvinovischairoftheIEEEP2413“StandardforanArchitecturalFrameworkfortheInternetofThings”WorkingGroup.HehelpedfoundtheHomePlugPowerlineAllianceandisthepastpresidentandCTOoftheAlliance.Mr.Logvinovhas24patentstohiscreditandhasbeenaninvitedspeakeronmultipleoccasions.StartTime EndTime TentativeProgram
8:15am 9:00am NetworkandContinentalBreakfast
9:00am 9:10am Introductions
OlegLogvinov,Chair,IEEEInternetInitiative;PresidentandCEO,IoTechaCorporation;Moderator
9:10am 9:30am WelcomingremarksShilongZhong,DeputyDirectorGeneral,BureauofITDevelopment,CyberspaceAdministrationofChinaBruceKraemer,President,IEEEStandardsAssociationandMember,IEEEBoardofDirectorsXiaodongLee,CEOandCTOofCNNIC;CEOofNATlabBruceKraemer,IEEEStandardsPresident,2016.Hehas30yearsofexperienceinhigh-techresearch,development,andstrategicmarketingwithcompaniesincludingFoxboro,Harris,Intersil,andConexant.HeiscurrentlywithMarvellSemiconductorinStrategicMarketing.Mr.Kraemerhas13yearsofstandardsdevelopmentexperienceinETSI,IEEE802.11,andIEEE802.15,servingaschairofnumerousactivities.HehasbeenchairoftheIEEE802.11nTaskGroupforsixyears,whichinSeptember2009completeditsstandardsdevelopmentworkforanewhigh-throughputMACandPHY.Dr.XiaodongLeeistheCEOandCTOofCNNICandCEOofNationalEngineeringLaboratoryofNamingandAddressingTechnologies(NATLab).HeisaResearchProfessorattheChineseAcademyofSciences,aboardmemberoftheInternetSocietyofChina,andtheformervice-presidentforAsia-PacificofICANN.Dr.LeeisamemberoftheGlobalAgendaCouncilonCybersecurityofWorldEconomicForum,amemberoftheMulti-StakeholderAdvisoryGroupofInternetGovernanceForum(IGF),amemberoftheIANAStewardshipFunctionTransitionCoordinationGroup(ICG),andamemberoftheICANNSecurityandStabilityAdvisoryCommittee.Dr.Leehasbeenpreviouslyhonoredasoneofthe“TenOutstandingYouth”inChina'ssoftwareindustryaswellasaYoungGlobalLeaderofTheWorldEconomicForumin2014.Hereceivedthe“OutstandingYouthMedalofChina”in2009,andiscurrentlyamemberoftheAll-ChinaYouthFederation.
19
StartTime EndTime TentativeProgram
9:30am 10:10am OpeningChatRodBeckstrom,Member,GlobalCouncilonFutureofGovernment,WorldEconomicForumXiaodongLee,CEOandCTOofCNNIC;CEOofNATlabMr.Beckstromisawell-knowncybersecurityauthority,Internetleader,andexpertonorganizationalleadership.HeistheformerPresidentandCEOofICANN,foundingDirectoroftheUSgovernment’sNationalCybersecurityCenterintheDepartmentofHomelandSecurity,andco-authorofthecriticallyacclaimedbook,TheStarfishandtheSpider:TheUnstoppablePowerofLeaderlessOrganizations.HeisPresidentoftheBeckstromGroup,whichinvestsinandbuildshigh-technologycompanies.Thegroupalsoadvisesmultinationalcompaniesandinternationalinstitutions.HeisamemberofthecoreteamontheFutureoftheInternetattheSwiss-basedWorldEconomicForum.HeisanadvisortotheStanfordUniversityCybersecurityPolicyProgram.HegraduatedfromStanfordUniversitywithaBA(withHonorsandDistinction)andanMBA,andhewasaFulbrightScholarineconomicsattheUniversityofSt.Gallen,Switzerland.
10:10am 10:30am KeynotePresentationWeiLu,SecretaryGeneral,InternetSocietyofChina;SeniorEngineerWeiLuisSecretaryGeneralofInternetSocietyofChina,SeniorEngineer.Withvastmanagementexperienceintheindustry,hehaslongbeenengagedinmanagementofICTprogramsandInternet-relatedfields.
10:30am 10:45am Break
20
StartTime EndTime TentativeProgram
10:45am 11:30am Panel:BuildinganenvironmenttoenabletheinteractionoftechnologistsandpolicymakersOlegLogvinov,ModeratorAlainDurand,PrincipalTechnologist,ICANNMinJiang,AssociateProfessorofCommunication,UNCCharlotte;AffiliateResearcherattheCenterforGlobalCommunicationStudies,UniversityofPennsylvaniaJamesSeng,CEOofBeijingXianyuShumaTech.Co.Ltd.ProfessorBaopingYan,ChiefEngineerofCNICandDirectorofInformatizationCommitteeofExperts,ChineseAcademyofSciencesAlainDurandisaPrincipalTechnologistintheOfficeoftheCTOatICANN.HisresponsibilitiesincludeapplyingexperttechnicalknowledgeandexperiencetoimproveICANN’stechnicalcapabilitiesandstature.PriortoICANN,AlainwasadistinguishedengineeratJunipernetworks,alargeInternetequipmentvendor.PriortoJunipernetworks,AlainworkedatComcast,averylargecableserviceprovider.HeservedComcastasdirectorofIPv6andInternetgovernance.WhiledevelopingthefirstIPv6deploymentplanforaserviceproviderofthissize,AlainrepresentedComcastinvariousInternetgovernanceforums.AlainhasbeenpartoftheInternettechnicalcommunityforover20years,beingapioneerinIPv6standardizationanddeployment.Inparticular,hehasservedasworkinggroupchairforseveralworkinggroupsatIETFandauthoredover14RFCs.MinJiang,PhD,isAssociateProfessorofCommunicationatUNCCharlotteandanAffiliateResearcherattheCenterforGlobalCommunicationStudies,UniversityofPennsylvania.HerresearchfocusesonChineseInternettechnologies,politics,andpolicies.Highlyinterdisciplinary,herworkblendsnewmediastudies,politicalcommunication,internationalcommunication,legalstudies,andinformationscience.ShehaswrittenonChinesedigitaltechnologies(searchengine,socialmedia),business,policies,anddigitaldiplomacy.Shehaspublishedover25journalarticles,bookchaptersandconferenceproceedings.HerresearchhasappearedinJournalofCommunication,NewMedia&Society,Information,Communication&Society,SocialScienceComputerReview,Policy&Internet,ElectronicJournalofCommunication,andInformationVisualizationamongothers.Arecipientofovertwodozenresearchgrants,shehasreceivedfundingfromandpresentedherworkatvariousinstitutionsincludingSocialScienceResearchCouncil(SSRC),NationalCommitteeonUS-ChinaRelations(NCUSCR),OxfordUniversity,HarvardUniversity,UniversityofPennsylvania,JohnsHopkinsUniversityandFrenchInstituteofInternationalRelations(IFRI).Priortopursingherdoctor’sdegreeintheUS,sheworkedatChinaCentralTelevisionandKillBillIinhernativecountryChina.Mr.JamesSengisnowtheCEOofBeijingXianyuShumaTech.Co.Ltd.Jamesisawell-knowninternationalexpertontheInternet.Heisalsoknownasthe“fatherofinternationalizeddomainnames.”Hestartedhiscareerin1993withTechnet,thefirstISPinSingapore(theprecursortoPacificInternet).HewasinvolvedinanumberofpioneeringInternetprojectsintheearlydaysoftheInternet,includingthedevelopmentandstandardizationofinternationalizeddomainnames.PreviouslyJameswaswithInfocommDevelopmentAuthorityofSingapore,responsiblefortheNextGenerationalInternet.HewasalsotheadvisorandconsultanttoMiTVthatrolledoutU-MobileinMalaysia.HealsoadvisesfamilyofficesabouttheirTMTinvestmentsinChina.In2008,JamesjoinedPPTVasCTOofacompanythatbecameoneofthelargestvideostreamingservicesinChina.In2010,hefoundedavideoplatformcompanythatwasacquiredbyHiSense.In2014,Jamesjoined21VianetGroupastheVicePresidentresponsibleforthetechnologystrategyforitsNewBusinessdivision.ProfessorBaopingYanisChiefEngineerofCNICandDirectorofInformatizationCommitteeofExperts,ChineseAcademyofSciences.ShegraduatedfromXi’anJiaotongUniversityandtheInstituteofComputingTechnology(ICT),CASwithherbachelor’s,master’sanddoctoratedegrees,andsheaccomplishedherpostdoctoralresearchatICT,CAS.Since2006,ProfessorYanhasbeentheChiefEngineerofCNICanddirectoroftheInformatizationCommitteeofExperts,CAS.SheisstandingdeputydirectoroftheCommitteeofExpertsforScientificDatabaseofCAS,deputydirectoroftheInternetSociety,ChinaComputerFederation,aswellasthestandingtrusteeoftheChinaComputerUserAssociationandtrustee-generalofBeijingComputerUserAssociation.SheisamemberoftheNationalTechnology&ScienceInfrastructureCommitteeofExperts,MinistryofScience&TechnologyofChinaandChina’sNext-GenerationInternetCommitteeofExperts,NationalDevelopmentandReformCommission,alsoamemberoftheTibetDevelopmentandAdvisoryCommitteeandthesupervisoroftheInformationGroup.ProfessorYanisatrusteeoftheChineseISOCCouncil,ACmemberofW3CCommittee,andamemberoftheInternationalCouncilforScience(ISCU),WorldDataScientificCommittee(WDS-SC).
21
StartTime EndTime TentativeProgram
11:30am 11:55p.m. Rapid-fireidentificationofissuesClintAndrews
11:55am 12:15pm ReviewandcomparisonofpreviousETAPForumoutputsanddiscoveriesJaredBielby,Co-Chair,InternationalCenterforInformationEthicsJaredBielbyreceivedadoublemaster'sdegreeattheUniversityofAlberta,Canada,ininformationscienceanddigitalhumanitieswithathesisrouteinthefieldofinformationethics.Heworksasanindependentconsultantininformationethicsandinternetgovernance.Hecurrentlyservesasco-chairfortheInternationalCenterforInformationEthicsandeditorfortheInternationalReviewofInformationEthics.HeismoderatorandcontentwriterfortheInstituteofElectricalandElectronicsEngineers'(IEEE)CollabratecInternetTechnologyPolicyForum(IEEE-ETAP)andisfounderandeditor-in-chiefofTheFreelanceNetizen.Hisresearchandwritinglooksattheinterdisciplinaryconnectionsbetweeninformation&communicationtechnologies(ICTs)andinformationethics,digitalcitizenshipandculture.Bielbyhaswrittenandspokeninternationallyonsubjectsofinformationethics,internetgovernanceandglobalcitizenshipinadigitalera.
12:15pm 1:15pm Lunch
1:15pm 1:35pm KeynotePresentationGregAustin,EastWestInstituteDr.GregAustinisaProfessorintheAustralianCentreforCyberSecurityintheUniversityofNewSouthWales.HealsoservesasaProfessorialFellowattheEastWestInstitute,whereasvice-presidentfrom2006-2011hehelpedsetupandleaditsWorldwideCyberSecurityInitiative.Gregisaco-chairoftheEastWestworkinggrouponMeasuresofRestraintinCyberArmaments.HehasheldseniorpostsintheInternationalCrisisGroupandtheForeignPolicyCentre(London).Otherassignmentsincludeserviceingovernment,defenseintelligence,academia,andjournalism.HeistheauthorofseveralbooksonChina’sstrategicpolicy,includingChina’sOceanFrontier(1998)andhismostrecentbook,CyberPolicyinChina(Wiley2014).Thelatestbookoffersthefirstcomprehensiveanalysis(military,economicandpolitical)ofChina’sleadershipresponsestotheinformationsociety.ItexploresthedilemmasfacingChinesepoliticiansastheytrytomarrythedevelopmentofaninformationeconomywitholdwaysofgoverningtheirpeopleandconductinginternationalrelations.GreghasaPhDininternationalrelationsandamaster’sdegreeininternationallaw.HeisanAustraliancitizen.
22
StartTime EndTime TentativeProgram
1:35pm 1:55pm KeynotePresentationYuejinDu,SeniorResearcherandVPofTechnology,AlibabaGroupDr.YuejinDuiscurrentlyworkingasSeniorResearcherandVPofTechnologyatAlibabaGroup,focusingondatasecurity,threatintelligence,standards,andoutsidecooperationoncybersecurity.HeisafamousexpertoncybersecurityinChina.HewasoneofthefoundersofChinesenationalcomputeremergencyresponseteam(CNCERT/CC)andtheAsia-PacificcooperationgroupofCSIRTS(APCERT).BeforehejoinedAlibaba,hewasthefounderanddirectorofNationalEngineeringLaboratoryforCybersecurityEmergencyResponseTechnology,thedirectoroftheNationalInstituteofNetworkandInformationSecurity,anddeputyCTOofCNCERT/CC.Dr.Duhasmorethan15yearsofexperienceinInternetsecurity.HecontributedgreatlytonationalInternetsecuritycapacitybuilding,leadingthedevelopmentofaChinesenationalInternetintrusionmonitoringandwarningplatform,playingakeyroleonsettingupaChinesenationalincidentresponsecooperationframework,andraisingpublicawarenessDr.Duhasalsoplayedandactiveroleininternationalcooperation.HeproposedaChina-ASEANcooperationframeworkonnetworksecurity,leadanAPEC-TELprojectonbotnetcountermeasures,andhasmadepresentationsatvariousinternationalconferences.
1:55pm 2:15pm SynthesizeandrefineselectionofhighestpriorityissuesClintAndrews,Professor,RutgersUniversity
2:15pm 3:15pm BreakoutSession—DelvedeeperintohighestpriorityissuesVolunteerbreakoutleads
3:15pm 3:30pm Break
3:30pm 4:15pm Report-outsfrombreakoutteamsVolunteerbreakoutleads
4:15pm 4:30pm Nextsteps,actionplanandwrapupClintAndrews
23
AppendixII:ParticipantsThefollowingindividualsattendedtheBeijingIEEEETAPForum:SandeshAcharya,Student
ClintAndrews,Rutgers,TheStateUniversityofNewJersey,ProfessorandAssociateDean,PlanningandPublicPolicy
GregAustin,EastWestInstitute,ProfessorialFellow;AustralianCentreforCyberSecurityatUniversityofNewSouthWalesCanberra,Professor
RodBeckstrom,TheBeckstromGroup,President;GlobalCouncilonFutureofGovernment,World,Member
JaredBielby,InternationalCenterforInformationEthics,Co-Chair
UdoChima,SchlumbergerOilfieldServicesNigeriaLimited,MaintenanceTechnicianElectronics
NanChu,CNNIC,PolicyAdvisor
JulieCongZhu,CNNIC,PolicyLiaison
LucianCristache,LucommTechnologies,IOTArchitect
ShefaliDash,NationalInformaticsCentre,Govt.ofIndia(Retd.),FormerDirectorGeneral
Dr.YuejinDu,AlibabaGroup,SeniorResearcherandVicePresidentofTechnology
AlainDurand,ICANN,PrincipalTechnologist
MarkEpstein,QualcommInc.,SeniorVicePresident
Jean-PhilippeFaure,memberIEEEStandardsAssociationBoardofGovernors;Progilon
SamahGhanem,HuaweiR&DLabs,SeniorResearchScientist
ShuyiGuo,CNNIC,PolicyLiaison
Dr.BrahamDeoGupta,JiwajiUniversity
LiyunHan,CNNIC,PolicyExecutive
YanjunHu,BIIGroup,ExecutiveAssistant
NingHua,IEEE,SeniorDirector,AsiaOperations
MinJiang,UniversityofNorthCarolinaCharlotte,AssociateProfessorofCommunication;CenterforGlobalCommunicationStudiesattheUniversityofPennsylvania,AffiliateResearcher
KonstantinosKarachalios,IEEEStandardsAssociation(IEEE-SA),ManagingDirector
KarenKenney,IEEEStandardsAssociationSeniorDirector,BusinessOperationsandAdministration
NingKong,CNNIC,DirectorofInternationalDepartment
BruceKraemer,IEEE-SA,President;IEEEBoardofDirectors,Member
XiaodongLee,CNNIC,CEOandCTO;NATlab,CEO
ConglunLiu,InternetSocietyofChina,SecretaryofForeignAffair
24
DongLiu,IEEE-SA,BoardMember
OlegLogvinov,IEEEInternetInitiative,Chair;IEEEP2413InternetofThings(IoT)ArchitectureWorkingGroup,Chair;IoTechaCorporation,PresidentandCEO
WeiLu,InternetSocietyofChina,SecretaryGeneral
CongMa,IEEE,MeetingandConferenceManager
JayMerja,MUVR.in,FounderDirector
AndrewMyles,member,IEEEStandardsAssociationBoardofGovernors;Cisco
MaryLynneNielsen,IEEE,GlobalOperationsandOutreachProgramDirector,Standards
PaulNikolich,IEEE802LMSCchair
GlennParsons,Ericsson,StandardsAdvisor
TrishRafferty,IEEE,AssociateManager,EMS
JamesSeng,BeijingXianyuShumaTech.Co.Ltd.,CEO
JessicaShen,CNNIC,HeadofIPOperations
LinjianSong,BeijingInternetInstitute,BIILabDirector
ZhengSong,InternetCorporationforAssignedNamesandNumbers,HeadofChina
YatinTrivedi,Synopsys,Director,StandardsandInteroperability
LanWang,IEEEChinaoffice,ProjectManager
SelinWang,CNNIC,CooperationExecutive
ZhiminWang,SUNWODAElectronicsCo.,Ltd.
PingWu,InternetSocietyofChina,Coordinator
XiuchengWu,CoremailInformationTech.(Beijing)Co.Ltd.,VP
HongXue,BeijingNormalUniversityInstituteforInternetPolicy&Law,Director
BaopingYan,CNIC,ChiefEngineer;ChineseAcademyofSciencesInformatizationCommitteeofExperts,Director
JiankangYao,CNNIC,SeniorEngineer
TianxueZhai,CNNIC,PRSupervisor
TianyuZhang,BeijingJiaotongUniv,Student
MengZhao,IEEEChinaoffice,StandardProgramManager
ShilongZhong,DeputyDirectorGeneral,BureauofITDevelopment,CyberspaceAdministrationofChina
LinlinZhou,CNNIC,StandardizationResearcher
MengqiZhou,IEEEChinaCouncil,PastChairman
JudyZhu,Alibaba,StandardizationDirector
25
AppendixIII:TopIssuesFromtopicssuggestedduringregistrationandattheBeijingIEEEETAPForum,thefollowing18keyissueswereconsideredfortargetedbreakoutsessions:
• Findingmoreeffectiveforumstobringtogethertechnologists,marketdecisionmakers,andpublicpolicymakers
• IoTandcybersecurity
• Internetgovernance
• Identitymanagement
• Diplomacy
• Connectivityandruraltelecommmanagement
• Whatkindsofcyber-threatsdoestheInternet-criticalinfrastructurebringtoacountryandhowthatrelatestoeGovernmentstrategies
• Privacy,informationsecurity,businessdevelopment
• Netneutralityanditsimplications
• NTIAIANAfunctions’stewardshiptransition
• IEEEroleincurrenttransitionscenario
• Policysegmentation:howfine-grainedcanitbeinordertoberepresentativeofasubstantial
majorityoftheaffectedcommunity?
• Needforinformationsystemstoallowcommonrepresentationofknowledgeandinformationsharingbetweencomputeremergencyresponseteams(CERTs)andbetweencountries
• Internetbiodiversity• Cross-borderdataflow• Biometrics• Transparencyasasourcetogetdataforevidence-baseddecisionmaking• Balancingvaluedofsharedataandprivacy
26
AppendixIV:CombinedIssuesList,Beijing/Delhi/Washington/TelAviv/SanJoseIEEEETAPForums
Beijing
• Cyber-threatstocriticalinfrastructure,includingeGovernment/eCommerce• Transparencyasasourceofobtainingdataforevidence-baseddecisionmaking• BiodiversityintheInternetecosystem
Delhi
• ProtectingInternettraffic,managingmeta-dataanalysis,andhowtoimplementbothsecurityandprivacyatscale
• Multi-stakeholderInternetgovernance• Optionsandchallengesinprovidinguniversalaccessforsocialandeconomicinclusion
Washington
• Datalocalization• Educationandethics• End-to-endsecurity/privacybydesign• Technology-policydevelopmentprocess
TelAviv
• Userassessmentoftrustworthinessofdevices,enterprises,andgovernments• Educatingusersaboutcharacteristicsofinformationsociety• Machine-readableprivacyagreementsandwhoenforcesthem?
SanJose
• Threatsandopportunitiesindataanalytics• Multi-stakeholderInternetgovernance• ProtectingInternettraffic,managingmeta-dataanalysis,andhowtoimplementbothsecurity
andprivacyatscale• FragmentationoftheInternetduetolocalpoliciesandhowtoavoidit• Algorithmicdecisionmakingthatexacerbatesexistingpowerbalancesandethicalconcerns• HowtobestengageIEEEasaplatformforcontributingtotheresolutionoftheseandrelated
issues