2013 AGENDA

DAY ONE: Sunday, March 17, 2013

LOCATION: William Doo Auditorium, 45 Willcocks Street, Toronto, Canada  |   MAP

 

13:00 – 14:15

REGISTRATION

Hors d’oeuvres and non-alcoholic beverages will be served.

14:00 – 14:30

OPENING AND WELCOME

Professor Ron Deibert: Welcome Presentation, CD12 and Citizen Lab 2012 Review, CD13 Objectives

14:30 – 16:30

PLENARY PANEL

STAKING OUT THE ISSUES: WHAT’S AT STAKE?

Moderator Nora Young of CBC Spark leads a dialogue on salient topics and issues for CD13 and beyond. Panelists and participants will contribute topics and questions to help frame next day sessions.

18:00 – 21:00

RECEPTION (University Ballroom)

DINNER (Queen’s Park South and Central Ballrooms)

LOCATION: Park Hyatt Hotel, 4 Avenue Road, Toronto, Canada   |   MAP

21:00 – 23:00

NIGHT OWL SESSIONS (Mezzanine Lounge)

Discuss and debate hot topics of the day in a relaxed socially lubricated atmosphere.*
Opportunities for Chatham House rule meetings. Topics TBD.

LOCATION: Park Hyatt Hotel, 4 Avenue Road, Toronto, Canada | MAP

*If you intend to imbibe, please plan a safe ride.

DAY TWO: Monday, March 18, 2013

LOCATION: William Doo Auditorium, 45 Willcocks Street, Toronto, Canada  |   MAP

 

07:45 – 08:30

BREAKFAST

A selection of pastries and fresh fruit will be served.

08:30 – 10:00

PANEL ONE

CYBERSPACE GOVERNANCE: Exploring constitutive principles and values, today and into the future

The 2012 WCIT meeting of the International Telecommunications Union (ITU) in Dubai illustrated a growing chasm in global cyberspace governance: between those who believe governance should remain distributed among private sector, civil society and governments, with Internet Corporation for Assigned Names and Numbers (ICANN) and the Internet Engineering Task Force (IETF) at the foundation of a multi-stakeholder approach, and those who want a stronger role for the state in cyberspace governance, under the auspices of the United Nations and led by the ITU.

In view of the split that did occur at WCIT, battle lines seem drawn between states that want governance based on the principle of national sovereignty on one side, and a powerful network of private sector companies, civil society and some governments that champions an Internet where states are limited in their authority to control information flows. Should the ITU play any role in Internet governance? Do we still need the ITU? Does the ICANN system need to be internationalized in some manner? Does it need reform as cyberspace expands southward? What will cyberspace governance look like 50 years from now? Can it be governed by truly global values?

10:00 – 10:30

COFFEE BREAK / NETWORKING

10:30 – 12:00

PANEL TWO:

POLICING CYBERSPACE: Debating who should do the policing and under what conditions

Criminal activity in and through cyberspace has presented extraordinary challenges for law enforcement. Many countries are addressing these challenges through new or proposed legislation, typically called “lawful access,” or through new cyber security strategies. While there are variations among countries, it is hard to deny the overall trend towards the imposition of greater responsibilities and requirements on the private sector, including telecom companies and ISPs, to retain and share user data with law enforcement or state security services.

Are lawful access provisions creating pressures for the private sector to “police the Internet?” What are possible unintended consequences of such pressures? What is the future of online anonymity? Are civil liberties and due process being preserved enough as lawful access requirements are imposed? Who is watching the watchers?

12:00 – 13:30

LUNCH

Location: The Faculty Club, 41 Willcocks Street, Toronto, Canada   |   MAP   (next door to 45 Willcocks)

13:30 – 15:00

PANEL THREE:

THE “DIGITAL ARMS TRADE”?: Probing the market for censorship, surveillance and computer network attack in a context of “attacking back”

The pressures to defend, police, and control cyberspace have benefited a burgeoning cyber security industry. However, some elements of the industry are garnering controversy. Sales of products and services that can support censorship, surveillance, and computer network attack capabilities are making their way into the hands of regimes with dubious human rights records, that lack accountability, or are under international sanctions. Certain products and services might already be on various control lists, but might a more comprehensive approach have value?

Lawmakers at national and regional levels, with the support of civil society, are beginning to propose greater regulation of what is called the “digital arms trade.” What are the motives and benefits for regulating the market, and how can it be regulated? What is the a role for corporate self governance in this area? Why is this market emerging in the first place? To control the market, do we need to control the cyber arms race? If so, how?

15:00 – 16:15

COFFEE BREAK / NETWORKING AND BREAKOUT SESSIONS

Open opportunities to probe issues, network, and strategize in smaller group settings under the Chatham House rule.

16:15 – 17:00

CLOSING REVIEW SESSION

Professor Ron Deibert: CD13 conclusions and projections/wish list for the next 12 months.
What are key takeaways? What is to be done?