Action line C-10: Ethical and Legal Implications of Darknet

UNESCO


Session 257

14:30–16:15, Monday, 12 June 2017 Popov Room 1, ITU Tower Interpretation: E/F Interactive Action Line Facilitation Meeting

Share on:  Facebook  Twitter  Twitter

Action line C-10: Ethical dimensions of the Information Society

The darknet refers overlay network that can be accessed only with specific software (e.g. P2P networks and Tor Browser as opposed to www which is ClearNet or standard internet), configurations, or authorization, often using non-standard communications protocols and ports that is difficult for authorities or non-state actors to monitor. This is usually achieved through encryption or by layering networks.

Darknets in general may be used for various reasons, such as:Computer crime (hacking, file corruption etc.); Protecting dissidents from political reprisal; File sharing (warez, personal files, pornography, confidential files, illegal or counterfeit software etc.); To better protect the privacy rights of citizens from targeted and mass surveillance; Sale of restricted goods on darknet markets; Whistleblowing and news leaks

Darknet is used by terrorist group for youth radicalization leading violent extremism, terrorist recruitment and communication.Jeffrey Feltman, the UN under-secretary-general for political affairs reported that that IS was adapting in several ways to military pressure by resorting to increasingly covert communication and recruitment methods, including by using the “dark web,” encryption and messengers.

The session will address some of the legal and ethical challenges of the Darknet.

  • Can you legally manage and block fallout of darknet within the existing legal and policy regime?
  • What are ethical implications of the Darknet?

Moderator

Dr Hara Padhy, UNESCO


Speakers/Panellists

  • Mr. Dan Shefet, Lawyer, Cabinet Shefet, Denmark
  • Mr. Pavan Duggal, Cyberlaws.net, India
  • Dr. Rayna Stamboliyska, Désidédata and RS Strategy, France

Session's link to WSIS Action Lines

  • AL C1 logo C1. The role of public governance authorities and all stakeholders in the promotion of ICTs for development
  • AL C5 logo C5. Building confidence and security in the use of ICTs
  • AL C10 logo C10. Ethical dimensions of the Information Society

Session's link to Sustainable Development Process

  • Goal 16: Peace, justice and strong institutions logo Goal 16: Promote just, peaceful and inclusive societies

Links

Link to this session
Facebook
http://www.lesechos.fr/finance-marches/marches-financiers/0211169586296-reseau-tor-le-reseau-internet-activiste-infiltre-par-les-activites-criminelles-2017742.php?google_editors_picks=true http://www.abc.net.au/news/2016-01-27/explainer-what-is-the-dark-net/7038878 http://indianexpress.com/article/world/is-adapting-to-military-pressure-by-shifting-to-dark-web-un-official-4513446/ Use of internet for terrorist purposes (UNODC) https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf