How data restrictions erode internet freedom


Article by Tom Okman: “Countries across the world – small, large, powerful and weak – are accelerating efforts to control and restrict private data. According to the Information Technology and Innovation Foundation, the number of laws, regulations and policies that restrict or require data to be stored in a specific country more than doubled between 2017 and 2021, rising from 67 to 144.

Some of these laws may be driven by benevolent intentions. After all, citizens will support stopping the spread of online disinformation, hate, and extremism or systemic cyber-snooping. Cyber-libertarian John Perry Barlow’s call for the government to “leave us alone” in cyberspace rings hollow in this context.

Government internet oversight is on the rise.

Government internet oversight is on the rise. Image: Information Technology and Innovation Foundation

But some digital policies may prove to be repressive for companies and citizens alike. They extend the justifiable concern over the dominance of large tech companies to other areas of the digital realm.

These “digital iron curtains” can take many forms. What they have in common is that they seek to silo the internet (or parts of it) and private data into national boxes. This risks dividing the internet, reducing its connective potential, and infringing basic digital freedoms…(More)”.

Digital Sovereignty: From Narrative To Policy?


Report by EU Cyber Direct: “The debate in Europe about digital sovereignty, technological sovereignty, data sovereignty and strategic autonomy has been building over recent years at both the EU level and the level of individual Member States. The different concepts – and their diverse interpretations – cover the sovereignty concerns of citizens, states and the EU itself, and range from the protection of fundamental rights to addressing geo-economic strengths and vulnerabilities and European military concerns. The language of digital sovereignty and strategic autonomy has become integrated into the policy statements and documents of the European Union, even if definitions of the terminology remain scarce. While there has been much analysis of these new narratives of digital sovereignty and strategic autonomy, less attention has been paid to the alignment – or misalignment – between these narratives and the EU policies that would translate the concepts into everyday life.

This lacuna was the point of departure for the EU Cyber Direct Research Seminar co-organised with The Hague Program on International Cyber Security on 18 March 2022 under the title Digital Sovereignty: From Narrative to Policy?, the results of which are published in this publication…(More)”.

The potential of Facebook advertising data for understanding flows of people from Ukraine to the European Union


Paper by Umberto Minora et al: “This work contributes to the discussion on how innovative data can support a fast crisis response. We use operational data from Facebook to gain useful insights on where people fleeing Ukraine following the Russian invasion are likely to be displaced, focusing on the European Union. In this context, it is extremely important to anticipate where these people are moving so that local and national authorities can better manage challenges related to their reception and integration. By means of the audience estimates provided by Facebook advertising platform, we analyse the flows of people fleeing Ukraine towards the European Union. At the fifth week since the beginning of the war, our results indicate an increase in the number of Ukrainian stocks derived from Ukrainian-speaking Facebook user estimates in all the European Union (EU) countries, with Poland registering the highest percentage share (33%) of the overall increase, followed by Germany (17%), and Czechia (15%). We assess the reliability of prewar Facebook estimates by comparison with official statistics on the Ukrainian diaspora, finding a strong correlation between the two data sources (Pearson’s ?=0.9r=0.9, ?<0.0001p<0.0001). We then compare our results with data on refugees in EU countries bordering Ukraine reported by the UNHCR, and we observe a similarity in their trend. In conclusion, we show how Facebook advertising data could offer timely insights on international mobility during crises, supporting initiatives aimed at providing humanitarian assistance to the displaced people, as well as local and national authorities to better manage their reception and integration…(More)”.

An infrastructure for building policy capability – lessons from practice


Paper by Sally Washington: “The Covid-19 pandemic highlighted the importance of good systems for policy and decision-making. An effective policy system depends on robust policy capability. This article articulates key dimensions of policy capability based on the practical experience of policy practitioners from a range of jurisdictions. It briefly draws on the literature on policy making and organizational capability before situating the key components of policy capability as mutually reinforcing parts of a policy capability infrastructure. These include “supply side” components of leadership, policy quality systems, people capability, and effective internal and external engagement, as well as the “demand side” component of the political administrative interface that shapes and is shaped by policy capability in the public service. This framing of policy capability as an infrastructure broadens the definition of policy capability from a narrow focus on people and skills to a systemic approach that includes the range of systems and processes that enable and support good government decision-making. The article argues that the policy capability infrastructure could serve as a useful and generic analytical framework for describing, assessing, and improving policy capability in teams, organizations, or across an entire public service. Policy leaders are invited to test the framework and share their insights and results, including with colleagues in academia. If it works in practice, it might also work in theory…(More)”.

Leveraging Data to Improve Racial Equity in Fair Housing


Report by Temilola Afolabi: “Residential segregation is related to inequalities in education, job opportunities, political power, access to credit, access to health care, and more. Steering, redlining, mortgage lending discrimination, and other historic policies have all played a role in creating this state of affairs.

Over time, federal efforts including the Fair Housing Act and Home Mortgage Disclosure Act have been designed to improve housing equity in the United States. While these laws have not been entirely effective, they have made new kinds of data available—data that can shed light on some of the historic drivers of housing inequity and help inform tailored solutions to their ongoing impact.

This report explores a number of current opportunities to strengthen longstanding data-driven tools to address housing equity. The report also shows how the effects of mortgage lending discrimination and other historic practices are still being felt today. At the same time, it outlines opportunities to apply data to increase equity in many areas related to the homeownership gap, including negative impacts on health and well-being, socioeconomic disparities, and housing insecurity….(More)”.

Orbán used Hungarians’ COVID data to boost election campaign, report says


Article by Louis Westendarp: “Hungarian Prime Minister Viktor Orbán’s ruling party Fidesz used citizens’ data from COVID-19 vaccine signups to spread Fidesz campaign messages before Hungary’s election in April 2022, according to a report by Human Rights Watch.

Not only was data from vaccine jabs used to help Fidesz, but also data from tax benefits applications and association membership registrations. This violates privacy rights, said the report — and blurs the line between the ruling party and government resources in Hungary, which has repeatedly been warned by the EU to clean up its act regarding the rule of law.

“Using people’s personal data collected so they could access public services to bombard them with political campaign messages is a betrayal of trust and an abuse of power,” said Deborah Brown, senior technology researcher at Human Rights Watch…(More)”.

Varieties of Mobility Measures: Comparing Survey and Mobile Phone Data during the COVID-19 Pandemic 


Paper by Fabian Kalleitner, David W Schiestl, Georg Heiler: “Human mobility has become a major variable of interest during the COVID-19 pandemic and central to policy decisions all around the world. To measure individual mobility, research relies on a variety of indicators that commonly stem from two main data sources: survey self-reports and behavioral mobility data from mobile phones. However, little is known about how mobility from survey self-reports relates to popular mobility estimates using data from the Global System for Mobile Communications (GSM) and the Global Positioning System (GPS). Spanning March 2020 until April 2021, this study compares self-reported mobility from a panel survey in Austria to aggregated mobility estimates utilizing (1) GSM data and (2) Google’s GPS-based Community Mobility Reports. Our analyses show that correlations in mobility changes over time are high, both in general and when comparing subgroups by age, gender, and mobility category. However, while these trends are similar, the size of relative mobility changes over time differs substantially between different mobility estimates. Overall, while our findings suggest that these mobility estimates manage to capture similar latent variables, especially when focusing on changes in mobility over time, researchers should be aware of the specific form of mobility different data sources capture….(More)”.

The Ethics of Automated Warfare and Artificial Intelligence


Essay series introduced by Bessma Momani, Aaron Shull and Jean-François Bélanger: “…begins with a piece written by Alex Wilner titled “AI and the Future of Deterrence: Promises and Pitfalls.” Wilner looks at the issue of deterrence and provides an account of the various ways AI may impact our understanding and framing of deterrence theory and its practice in the coming decades. He discusses how different countries have expressed diverging views over the degree of AI autonomy that should be permitted in a conflict situation — as those more willing to cut humans out of the decision-making loop could gain a strategic advantage. Wilner’s essay emphasizes that differences in states’ technological capability are large, and this will hinder interoperability among allies, while diverging views on regulation and ethical standards make global governance efforts even more challenging.

Looking to the future of non-state use of drones as an example, the weapon technology transfer from nation-state to non-state actors can help us to understand how next-generation technologies may also slip into the hands of unsavoury characters such as terrorists, criminal gangs or militant groups. The effectiveness of Ukrainian drone strikes against the much larger Russian army should serve as a warning to Western militaries, suggests James Rogers in his essay “The Third Drone Age: Visions Out to 2040.” This is a technology that can level the field by asymmetrically advantaging conventionally weaker forces. The increased diffusion of drone technology enhances the likelihood that future wars will also be drone wars, whether these drones are autonomous systems or not. This technology, in the hands of non-state actors, implies future Western missions against, say, insurgent or guerilla forces will be more difficult.

Data is the fuel that powers AI and the broader digital transformation of war. In her essay “Civilian Data in Cyber Conflict: Legal and Geostrategic Considerations,” Eleonore Pauwels discusses how offensive cyber operations are aiming to alter the very data sets of other actors to undermine adversaries — whether through targeting centralized biometric facilities or individuals’ DNA sequence in genomic analysis databases, or injecting fallacious data into satellite imagery used in situational awareness. Drawing on the implications of international humanitarian law, Pauwels argues that adversarial data manipulation constitutes another form of “grey zone” operation that falls below a threshold of armed conflict. She evaluates the challenges associated with adversarial data manipulation, given that there is no internationally agreed upon definition of what constitutes cyberattacks or cyber hostilities within international humanitarian law (IHL).

In “AI and the Actual International Humanitarian Law Accountability Gap,” Rebecca Crootoff argues that technologies can complicate legal analysis by introducing geographic, temporal and agency distance between a human’s decision and its effects. This makes it more difficult to hold an individual or state accountable for unlawful harmful acts. But in addition to this added complexity surrounding legal accountability, novel military technologies are bringing an existing accountability gap in IHL into sharper focus: the relative lack of legal accountability for unintended civilian harm. These unintentional acts can be catastrophic, but technically within the confines of international law, which highlights the need for new accountability mechanisms to better protect civilians.

Some assert that the deployment of autonomous weapon systems can strengthen compliance with IHL by limiting the kinetic devastation of collateral damage, but AI’s fragility and apparent capacity to behave in unexpected ways poses new and unexpected risks. In “Autonomous Weapons: The False Promise of Civilian Protection,” Branka Marijan opines that AI will likely not surpass human judgment for many decades, if ever, suggesting that there need to be regulations mandating a certain level of human control over weapon systems. The export of weapon systems to states willing to deploy them on a looser chain-of-command leash should be monitored…(More)”.

Govtech against corruption: What are the integrity dividends of government digitalization?


Paper by Carlos Santiso: “Does digitalization reduce corruption? What are the integrity benefits of government digitalization? While the correlation between digitalization and corruption is well established, there is less actionable evidence on the integrity dividends of specific digitalization reforms on different types of corruption and the policy channels through which they operate. These linkages are especially relevant in high corruption risk environments. This article unbundles the integrity dividends of digital reforms undertaken by governments around the world, accelerated by the pandemic. It analyzes the rise of data-driven integrity analytics as promising tools in the anticorruption space deployed by tech-savvy integrity actors. It also assesses the broader integrity benefits of the digitalization of government services and the automation of bureaucratic processes, which contribute to reducing bribe solicitation risks by front-office bureaucrats. It analyzes in particular the impact of digitalization on social transfers. It argues that government digitalization can be an implicit yet effective anticorruption strategy, with subtler yet deeper effects, but there needs to be greater synergies between digital reforms and anticorruption strategies….(More)”.

Closing the gap between user experience and policy design 


Article by Cecilia Muñoz & Nikki Zeichner: “..Ask the average American to use a government system, whether it’s for a simple task like replacing a Social Security Card or a complicated process like filing taxes, and you’re likely to be met with groans of dismay. We all know that government processes are cumbersome and frustrating; we have grown used to the government struggling to deliver even basic services. 

Unacceptable as the situation is, fixing government processes is a difficult task. Behind every exhausting government application form or eligibility screener lurks a complex policy that ultimately leads to what Atlantic staff writer Anne Lowrey calls the time tax, “a levy of paperwork, aggravation, and mental effort imposed on citizens in exchange for benefits that putatively exist to help them.” 

Policies are complex, in part because they each represent many voices. The people who we call policymakers are key actors in governments and elected officials at every level from city councils to the U.S. Congress. As they seek to solve public problems like child poverty or improving economic mobility, they consult with experts at government agencies, researchers in academia, and advocates working directly with affected communities. They also hear from lobbyists from affected industries. They consider current events and public sentiments. All of these voices and variables, representing different and sometimes conflicting interests, contribute to the policies that become law. And as a result, laws reflect a complex mix of objectives. After a new law is in place, relevant government agencies are responsible for implementing them by creating new programs and services to carry them out. Complex policies then get translated into complex processes and experiences for members of the public. They become long application forms, unclear directions, and too often, barriers that keep people from accessing a benefit. 

Policymakers and advocates typically declare victory when a new policy is signed into law; if they think about the implementation details at all, that work mostly happens after the ink is dry. While these policy actors may have deep expertise in a given issue area, or deep understanding of affected communities, they often lack experience designing services in a way that will be easy for the public to navigate…(More)”.