SlideShare a Scribd company logo
1
COMMON GOOD
DIGITAL FRAMEWORK
Campaign Proposal
Data Ductus, Inc. |
B.S. Computer Engineering,
Northeastern University
Software Engineer |
Computer Ethics and Data
Policy Advocate
Rebecca Leeper
BGF Cyber Security Day Symposium – Common Good Digital Framework
2
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
FOCUS
The CGDF will primarily focus on AI bias, privacy (data security), and cyber
security. It will specifically monitor and determine when digital activity and AI
misuse violates common values and shared ethical principles and put forth a
remediation action plan. In particular, the CGDF will identify areas where there
are no regulations and common standards and will propose new courses of
action. Secondarily, the CGDF will address and identify good cyber practices
BGF Cyber Security Day Symposium – Common Good Digital Framework
3
that can serve as guiding models. Both findings will contribute to the generation
of an Ethics and Practice Index designed for policy makers, Chief Technology
Officers, and other digital actors. The Framework will examine both public
institutions (governments) and private corporations. Some critical governments
to observe include China, Estonia, some member states of the European Union,
Israel, Japan, Russia, Saudi Arabia, and The United States. In the private
sector, companies such as Alibaba, Amazon, Apple, Baidu, Facebook, Google,
Microsoft, and Tencent will be prioritized.
MONITORING METHOD
The campaign will rely primarily on open source resources to stay up to date on
digital activity – newspapers, magazines like Wired and Medium, journals and
reports of authoritative institutions and news media. Secondarily, participation in
key policy meetings, global summits, and international panels will both promote
the Framework and provide insight into the digital activities of relevant actors.
When possible, interviews will also be pursued, with the goal to create a network
of trusted scholarly and practitioner advisors. In due time, the CGDF will form a
board of expert advisors and relevant experts that will often be consulted and
meet annually. Additionally, it will create a database of knowledge and learned
people who can provide counsel and consultation.
RESPONSE METHOD
In response to identified violations, lack of regulatory frameworks, and the
detrimental absence of commonly agreed norms and policies to the public well-
being, the CGDF will generate a course of action and a policy recommendation
by first reaching out to the relevant stakeholders. The policy recommendation
will be circulated to all stakeholders and the CGDF network first for feedback
and secondly to encourage corrective action by the offender. For example,
should a country be violating its citizens rights, the policy presented may be for
other states to apply sanctions or a trade embargo on that country. Following,
BGF Cyber Security Day Symposium – Common Good Digital Framework
4
the CGDF will publicly publish the recommendation without disclosing the
names of the violators. The purpose of this publication will be to draw public
attention to the type of violations already occurring. In a later stage, if no
corrective action was pursued, the CGDF will reveal the names of the
perpetrators publicly, to be amplified by the CGDF network and its partners.
MEANS OF DISTRIBUTION
The campaign will utilize social media, a website, and journal publications.
PARTNERS
Partners will be expected to contribute data and evidence when governments
and/or companies violate norms. In response to violations, partners will join
together their voices, resources, and platform, serving as change agents and
advocates.
Professor Denise Garcia of Northeastern University; Professor Woodrow
Hartzog of Northeastern University; and CGDF Leader Juan Gallego. The
CGDF will also seek to connect other young AIWS leaders and cyber advocates
in the world.
Potential Future Partners:
Professor Stuart Russell, UC Berkley
President Joseph Aoun, Northeastern University
Dr. Eva-Marie Muller-Stuler, Chief Data Scientist and Leader Data Sceince
Centre of Excellence, IBM
Sacha Alanoca, AI Policy Researcher at The Future Society
Maria Luciana Axente, PWC UK AI Commons
Aimee van Wynsberghe. Co-director Foundation for Responsible Robotics
Rebecca Distler, World Economic Forum Global Shaper
Yolanda Lannquist, Head of Research at The Future Society
Irakli Beridze, Head of the Centre for Artificial Intelligence and Robotics, UNICRI
BGF Cyber Security Day Symposium – Common Good Digital Framework
5
James Butcher, Committee Member – Global AI & Ethics Initiative – IEEE
Representatives from other local and international NGOs
ACTION PLAN
1. Identify and assign an enthusiastic person for communications on social
media for the CGDF
2. Identify and assign an enthusiastic person for outreach to connect other
young people to join and contribute to the CGDF
3. Identify and seek out local and international NGOS to join the CGDF
network
4. Identify and seek out relevant scholarly leaders to join the CGDF network
5. Identify and seek out leading cyber industry professionals to join the
CGDF network
6. Identify and seek out relevant policymakers to join the CGDF network
7. Identify and seek out relevant conferences
8. Draft a report to present at AIWS Summit April 28-29, 2020 at Harvard
University
9. Develop a rollout plan for publications and reports
10. Coordinate the campaign with the celebration of Plymouth 400th
BGF Cyber Security Day Symposium – Common Good Digital Framework
6
Importance
The extensive use of the cloud, internet, and interconnected networks to
manage and control infrastructure and the vulnerabilities associated with
connectivity prone to hacking and interference pose significant security threats
to human security (or the security and privacy of individuals), but also that of the
state, and subsequently the international system, as this cyber domain can no
longer be protected and observed by physical boundaries. The expansion
extends to all aspects of a state’s activity, including the private and public
sectors rapidly adapting to the cloud and cloud computing environment for
information storage, the internet being used to manage electric power
generation, and the water levels in dams remotely by use of what is known as
the Supervisory Control and Data Acquisition (SCADA) systems, and
distribution networks for food, water, energy, transportation, healthcare, and
financial services also depend heavily on the internet and information
technology (IT). Moreover, the military depends on IT for command, control, and
logistics, and modern-day weapons depend on GPS networks, and movements
and actions of military forces are coordinated through networks that allow for
immediate information exchange. This entire domain, which is interlinked with
what is known as the critical infrastructure of a state, is highly vulnerable to a
cyberattack.
Some Attacks on Critical Infrastructure
• BlackEnergy3 and CrashOveride : Ukraine Power Grid -2015 and 2016
• DragonFly/Energetic Bear: US Energy companies – 2011-2016
• Triton Attack : Saudi Petrochemical Plant – 2014-2017
• Agent.btz: US military networks – 2008
Some personal data leaks
• In 2016, 3 billion Yahoo accounts were hacked in one of the biggest
breaches of all time.
• In 2016, Uber reported that hackers stole the information of over 57 million
riders and drivers.
• In 2017, 412 million user accounts were stolen from Friendfinder’s sites.
• In 2017, 147.9 million consumers were affected by the Equifax Breach.
• According to 2017 statistics, there are over 130 large-scale, targeted
breaches in the U.S. per year, and that number is growing by 27 percent
per year.
BGF Cyber Security Day Symposium – Common Good Digital Framework
7
• 100,000 groups in at least 150 countries and more than 400,000 machines
were infected by the Wannacry virus in 2017, at a total cost of around $4
billion.
• Attacks involving cryptojacking increased by 8,500 percent in 2017.
• In 2017, 5.4 billion attacks by the WannaCry virus were blocked.
• There are around 24,000 malicious mobile apps blocked every day.
• In 2017, the average number of breached records by country was 24,089.
The nation with the most breaches annually was India with over 33k files;
the US had 28.5k.
• In 2018, Under Armor reported that its “My Fitness Pal” was hacked,
affecting 150 million users.
• Between January 1, 2005 and April 18, 2018 there have been 8,854
recorded breaches.
Other Cybercrime Statistics
• Total damage related to cybercrime is projected to hit 6 trillion annually by
2021
• There is a hacker attack every 39 seconds
• 60% of Americans have been exposed to fraud schemes
• 95 percent of breached records came from three industries in 2016:
Government, retail, and technology
The Fourth Industrial Revolution (4IR) is rapidly emerging before our very eyes;
science and technology are advancing at unprecedented rates that have
culminated in what the World Economic Forum’s “Global Risks Report of 2017”
calls the “twelve key emerging technologies” (WEF, 2017). Among the twelve,
one technology in particular has the potential to transform warfare, impact
healthcare, alter humanity and the environment. AI advancements can lead to
the greatest benefits, but also poses the greatest risk. The most prominent risk
is the advancement of AI for its implementation in autonomous weapons
systems- machines that can arguably be used to take warfare to an
unprecedented scale. While these weapons can be used to improve accuracy,
efficiency, and in a capacity of self-defense, the technology, left unregulated,
poses the biggest threat to security and the future of our world. The World
Economic Forum (WEF) argues that future global governance over these AI-
based weapons systems will depend upon “the rules, norms, standards,
incentives, institutions, and other mechanisms that shape the development and
BGF Cyber Security Day Symposium – Common Good Digital Framework
8
deployment of each particular technology”. Cooperative, innovative efforts
towards the development of progressive international norms and forward-
thinking agreements are absolutely critical for the future of global governance of
AI and autonomous weapons development.
The advancement and integration of AI also poses a significant threat in
exacerbating existing biases. For example, AI used in facial recognition
technology (FRT) has proven to be disproportionally inaccurate when identifying
African Americans as compared to whites. In a study done by Joy Buolamiwini,
a leading researcher challenging bias in decision making software, error rates,
made up of mismatches and no registering of a face, for leading FR algorithms
were significantly higher for people of color, particularly black females, than
whites. In the study, the skin tones were classified as follows: people of color
were classified as darker, whites were classified as lighter, women of color were
classified as darker females, white women were classified as lighter females,
etc. Microsoft’s MSFT had an error rate of 12.9% for darker skin tones, 20.8%
for darker females, and only a .7% error rate for lighter skin tones (. Face++
completed the trial with an error rate of16.5% for darker IDs, 34.5% for darker
females, and 4.7% for lighter IDs. Lastly, IBM’s software had error rates of
22.4% for darker skin tones, a significant 34.5%error rate for darker females,
and for lighter skin tones a 3.2% error rate.
Some scholars attribute the algorithmic shortcomings and bias to the lack of
diversity in the data training sets for the FRT and lack of representation of
minorities in the stem field in general. Lastly, aggravating the situation, the
federal and state mugshot databases used for FR have a higher number of
minority -African American, Latino, and immigrant- headshots than white
headshots. As one scholar notes, the FRT will be overused and underperform
on people of color.
In sum, for these reasons, the Common Good Digital Framework will identify
both good and poor digital practices to advocate for ethical guidelines,
frameworks, and policy. This will create new norms, raising the sector ethos,
and benefitting the common good. With this, security and trust will be increased
for all of humanity.

More Related Content

PPTX
Cyberwar and Geopolitics
PDF
An Internet of Governments
PDF
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
PDF
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
PDF
20130917-CyberInitiativeJointLetter
PPTX
Mike Alcorn presentation
PDF
Components of a Model of Cybersecurity Behavior Adoption
PDF
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
Cyberwar and Geopolitics
An Internet of Governments
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
20130917-CyberInitiativeJointLetter
Mike Alcorn presentation
Components of a Model of Cybersecurity Behavior Adoption
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms

What's hot (20)

PPTX
disinformation risk management: leveraging cyber security best practices to s...
PDF
8th Milestones meeting: Cyber violence roundtable
PPTX
Cyber Civil Defense - Risk Masters - Allan Cytryn
PPTX
cyber terrorism
PPTX
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
PDF
8th Milestones meeting: Cyber violence roundtable
PDF
Cyber savvy (2)
PDF
Delusions of-safety-cyber-savvy-ceo
PPTX
Ci2 cyber insurance presentation
PPT
Internet Content Regulation: What it means in 2010
PPTX
Mass media and communication
PDF
Global Partnership Key to Cyber Security
PPTX
Online radicalisation: work, challenges and future directions
PDF
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
PPTX
Research seminar Queen Mary University of London (CogSci)
PPT
IGF Hyderabad - Index of Global Internet Freedom
PDF
How does fakenews spread understanding pathways of disinformation spread thro...
PDF
Marriage of Cyber Security with Emergency Management
PPTX
Social Media as a Record for Public Services and Utilities in a Disaster
PDF
Guideline Thailand Cybersecure Strate Digital Economy
disinformation risk management: leveraging cyber security best practices to s...
8th Milestones meeting: Cyber violence roundtable
Cyber Civil Defense - Risk Masters - Allan Cytryn
cyber terrorism
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
8th Milestones meeting: Cyber violence roundtable
Cyber savvy (2)
Delusions of-safety-cyber-savvy-ceo
Ci2 cyber insurance presentation
Internet Content Regulation: What it means in 2010
Mass media and communication
Global Partnership Key to Cyber Security
Online radicalisation: work, challenges and future directions
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
Research seminar Queen Mary University of London (CogSci)
IGF Hyderabad - Index of Global Internet Freedom
How does fakenews spread understanding pathways of disinformation spread thro...
Marriage of Cyber Security with Emergency Management
Social Media as a Record for Public Services and Utilities in a Disaster
Guideline Thailand Cybersecure Strate Digital Economy
Ad

Similar to COMMON GOOD DIGITAL FRAMEWORK (20)

PPTX
Aiws presentation leeper rebecca
PPTX
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
PDF
Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PDF
Critical Infrastructure and Cyber Security: trends and challenges
PPT
National Cybersecurity_Presentation DepEd DSC.ppt
PDF
Comprehensive U.S. Cyber Framework Final Report
PDF
FICCI-talk
PDF
European Cyber Security Perspectives 2016
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
PPTX
vinay pdfsjyfbjyv mvjkhvags gfbbdgfvbzfddddddddddddddfbdfg
PDF
The Growing Need for Cyber Security in India
PPTX
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
PDF
Cyberdefense strategy - Boston Global Forum - 2017
PPTX
National cyber security policy final
PDF
Cyber security: challenges for society- literature review
PDF
The National Cyber Security Strategy: Success Through Cooperation
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PDF
National_Cyber_Security_Strategy.pdf
Aiws presentation leeper rebecca
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Critical Infrastructure and Cyber Security: trends and challenges
National Cybersecurity_Presentation DepEd DSC.ppt
Comprehensive U.S. Cyber Framework Final Report
FICCI-talk
European Cyber Security Perspectives 2016
Event: George Washington University -- National Security Threat Convergence: ...
vinay pdfsjyfbjyv mvjkhvags gfbbdgfvbzfddddddddddddddfbdfg
The Growing Need for Cyber Security in India
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Cyberdefense strategy - Boston Global Forum - 2017
National cyber security policy final
Cyber security: challenges for society- literature review
The National Cyber Security Strategy: Success Through Cooperation
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National_Cyber_Security_Strategy.pdf
Ad

More from Boston Global Forum (20)

PDF
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
PDF
Hunermund causal inference in ml and ai
PDF
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
PDF
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
PDF
Marc Rotenberg AIWS
PDF
MIT Trust Data Alliance building tomorrow’s smart city data systems
PPTX
Professor Hiroshi ESAKI talks about Internet of Design
PDF
Aiws united-nation charter day lecture
PDF
Aiws g7 summit initiative - official april 25, 2019
PDF
Agenda aiws g7 summit 2019
PDF
Global citizenship education network reconciliation conference in tokyo on se...
PDF
Catalog cho bgf g7 summit initaitive 2017
PPTX
The digital battle
PPTX
Agenda of bgf g7 summit initiatve 2017
PDF
Stride gender
PDF
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
PDF
Global Citizen Network
PDF
Education for people and planet: Creating sustainable futures for all
PDF
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
PDF
Agenda of bgf g7 summit initiatve 2017
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
Hunermund causal inference in ml and ai
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Marc Rotenberg AIWS
MIT Trust Data Alliance building tomorrow’s smart city data systems
Professor Hiroshi ESAKI talks about Internet of Design
Aiws united-nation charter day lecture
Aiws g7 summit initiative - official april 25, 2019
Agenda aiws g7 summit 2019
Global citizenship education network reconciliation conference in tokyo on se...
Catalog cho bgf g7 summit initaitive 2017
The digital battle
Agenda of bgf g7 summit initiatve 2017
Stride gender
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Global Citizen Network
Education for people and planet: Creating sustainable futures for all
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
Agenda of bgf g7 summit initiatve 2017

Recently uploaded (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Machine Learning_overview_presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Machine Learning_overview_presentation.pptx
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Getting Started with Data Integration: FME Form 101
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks

COMMON GOOD DIGITAL FRAMEWORK

  • 1. 1 COMMON GOOD DIGITAL FRAMEWORK Campaign Proposal Data Ductus, Inc. | B.S. Computer Engineering, Northeastern University Software Engineer | Computer Ethics and Data Policy Advocate Rebecca Leeper
  • 2. BGF Cyber Security Day Symposium – Common Good Digital Framework 2 Common Good Digital Framework Action Plan PURPOSE The Common Good Digital Framework (CGDF) will serve as a platform to bring authoritative knowledge and raise awareness about violations of ethical values and standards by governments and large organizations. The platform will monitor and alert against the misuse of Artificial Intelligence (AI), personal data, and neglect of cyber security. The objectives of the campaign are to stimulate and galvanize civil society towards the need to create new norms and regulations, and therein influence public and private AI and cyber policy. FOCUS The CGDF will primarily focus on AI bias, privacy (data security), and cyber security. It will specifically monitor and determine when digital activity and AI misuse violates common values and shared ethical principles and put forth a remediation action plan. In particular, the CGDF will identify areas where there are no regulations and common standards and will propose new courses of action. Secondarily, the CGDF will address and identify good cyber practices
  • 3. BGF Cyber Security Day Symposium – Common Good Digital Framework 3 that can serve as guiding models. Both findings will contribute to the generation of an Ethics and Practice Index designed for policy makers, Chief Technology Officers, and other digital actors. The Framework will examine both public institutions (governments) and private corporations. Some critical governments to observe include China, Estonia, some member states of the European Union, Israel, Japan, Russia, Saudi Arabia, and The United States. In the private sector, companies such as Alibaba, Amazon, Apple, Baidu, Facebook, Google, Microsoft, and Tencent will be prioritized. MONITORING METHOD The campaign will rely primarily on open source resources to stay up to date on digital activity – newspapers, magazines like Wired and Medium, journals and reports of authoritative institutions and news media. Secondarily, participation in key policy meetings, global summits, and international panels will both promote the Framework and provide insight into the digital activities of relevant actors. When possible, interviews will also be pursued, with the goal to create a network of trusted scholarly and practitioner advisors. In due time, the CGDF will form a board of expert advisors and relevant experts that will often be consulted and meet annually. Additionally, it will create a database of knowledge and learned people who can provide counsel and consultation. RESPONSE METHOD In response to identified violations, lack of regulatory frameworks, and the detrimental absence of commonly agreed norms and policies to the public well- being, the CGDF will generate a course of action and a policy recommendation by first reaching out to the relevant stakeholders. The policy recommendation will be circulated to all stakeholders and the CGDF network first for feedback and secondly to encourage corrective action by the offender. For example, should a country be violating its citizens rights, the policy presented may be for other states to apply sanctions or a trade embargo on that country. Following,
  • 4. BGF Cyber Security Day Symposium – Common Good Digital Framework 4 the CGDF will publicly publish the recommendation without disclosing the names of the violators. The purpose of this publication will be to draw public attention to the type of violations already occurring. In a later stage, if no corrective action was pursued, the CGDF will reveal the names of the perpetrators publicly, to be amplified by the CGDF network and its partners. MEANS OF DISTRIBUTION The campaign will utilize social media, a website, and journal publications. PARTNERS Partners will be expected to contribute data and evidence when governments and/or companies violate norms. In response to violations, partners will join together their voices, resources, and platform, serving as change agents and advocates. Professor Denise Garcia of Northeastern University; Professor Woodrow Hartzog of Northeastern University; and CGDF Leader Juan Gallego. The CGDF will also seek to connect other young AIWS leaders and cyber advocates in the world. Potential Future Partners: Professor Stuart Russell, UC Berkley President Joseph Aoun, Northeastern University Dr. Eva-Marie Muller-Stuler, Chief Data Scientist and Leader Data Sceince Centre of Excellence, IBM Sacha Alanoca, AI Policy Researcher at The Future Society Maria Luciana Axente, PWC UK AI Commons Aimee van Wynsberghe. Co-director Foundation for Responsible Robotics Rebecca Distler, World Economic Forum Global Shaper Yolanda Lannquist, Head of Research at The Future Society Irakli Beridze, Head of the Centre for Artificial Intelligence and Robotics, UNICRI
  • 5. BGF Cyber Security Day Symposium – Common Good Digital Framework 5 James Butcher, Committee Member – Global AI & Ethics Initiative – IEEE Representatives from other local and international NGOs ACTION PLAN 1. Identify and assign an enthusiastic person for communications on social media for the CGDF 2. Identify and assign an enthusiastic person for outreach to connect other young people to join and contribute to the CGDF 3. Identify and seek out local and international NGOS to join the CGDF network 4. Identify and seek out relevant scholarly leaders to join the CGDF network 5. Identify and seek out leading cyber industry professionals to join the CGDF network 6. Identify and seek out relevant policymakers to join the CGDF network 7. Identify and seek out relevant conferences 8. Draft a report to present at AIWS Summit April 28-29, 2020 at Harvard University 9. Develop a rollout plan for publications and reports 10. Coordinate the campaign with the celebration of Plymouth 400th
  • 6. BGF Cyber Security Day Symposium – Common Good Digital Framework 6 Importance The extensive use of the cloud, internet, and interconnected networks to manage and control infrastructure and the vulnerabilities associated with connectivity prone to hacking and interference pose significant security threats to human security (or the security and privacy of individuals), but also that of the state, and subsequently the international system, as this cyber domain can no longer be protected and observed by physical boundaries. The expansion extends to all aspects of a state’s activity, including the private and public sectors rapidly adapting to the cloud and cloud computing environment for information storage, the internet being used to manage electric power generation, and the water levels in dams remotely by use of what is known as the Supervisory Control and Data Acquisition (SCADA) systems, and distribution networks for food, water, energy, transportation, healthcare, and financial services also depend heavily on the internet and information technology (IT). Moreover, the military depends on IT for command, control, and logistics, and modern-day weapons depend on GPS networks, and movements and actions of military forces are coordinated through networks that allow for immediate information exchange. This entire domain, which is interlinked with what is known as the critical infrastructure of a state, is highly vulnerable to a cyberattack. Some Attacks on Critical Infrastructure • BlackEnergy3 and CrashOveride : Ukraine Power Grid -2015 and 2016 • DragonFly/Energetic Bear: US Energy companies – 2011-2016 • Triton Attack : Saudi Petrochemical Plant – 2014-2017 • Agent.btz: US military networks – 2008 Some personal data leaks • In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time. • In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers. • In 2017, 412 million user accounts were stolen from Friendfinder’s sites. • In 2017, 147.9 million consumers were affected by the Equifax Breach. • According to 2017 statistics, there are over 130 large-scale, targeted breaches in the U.S. per year, and that number is growing by 27 percent per year.
  • 7. BGF Cyber Security Day Symposium – Common Good Digital Framework 7 • 100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion. • Attacks involving cryptojacking increased by 8,500 percent in 2017. • In 2017, 5.4 billion attacks by the WannaCry virus were blocked. • There are around 24,000 malicious mobile apps blocked every day. • In 2017, the average number of breached records by country was 24,089. The nation with the most breaches annually was India with over 33k files; the US had 28.5k. • In 2018, Under Armor reported that its “My Fitness Pal” was hacked, affecting 150 million users. • Between January 1, 2005 and April 18, 2018 there have been 8,854 recorded breaches. Other Cybercrime Statistics • Total damage related to cybercrime is projected to hit 6 trillion annually by 2021 • There is a hacker attack every 39 seconds • 60% of Americans have been exposed to fraud schemes • 95 percent of breached records came from three industries in 2016: Government, retail, and technology The Fourth Industrial Revolution (4IR) is rapidly emerging before our very eyes; science and technology are advancing at unprecedented rates that have culminated in what the World Economic Forum’s “Global Risks Report of 2017” calls the “twelve key emerging technologies” (WEF, 2017). Among the twelve, one technology in particular has the potential to transform warfare, impact healthcare, alter humanity and the environment. AI advancements can lead to the greatest benefits, but also poses the greatest risk. The most prominent risk is the advancement of AI for its implementation in autonomous weapons systems- machines that can arguably be used to take warfare to an unprecedented scale. While these weapons can be used to improve accuracy, efficiency, and in a capacity of self-defense, the technology, left unregulated, poses the biggest threat to security and the future of our world. The World Economic Forum (WEF) argues that future global governance over these AI- based weapons systems will depend upon “the rules, norms, standards, incentives, institutions, and other mechanisms that shape the development and
  • 8. BGF Cyber Security Day Symposium – Common Good Digital Framework 8 deployment of each particular technology”. Cooperative, innovative efforts towards the development of progressive international norms and forward- thinking agreements are absolutely critical for the future of global governance of AI and autonomous weapons development. The advancement and integration of AI also poses a significant threat in exacerbating existing biases. For example, AI used in facial recognition technology (FRT) has proven to be disproportionally inaccurate when identifying African Americans as compared to whites. In a study done by Joy Buolamiwini, a leading researcher challenging bias in decision making software, error rates, made up of mismatches and no registering of a face, for leading FR algorithms were significantly higher for people of color, particularly black females, than whites. In the study, the skin tones were classified as follows: people of color were classified as darker, whites were classified as lighter, women of color were classified as darker females, white women were classified as lighter females, etc. Microsoft’s MSFT had an error rate of 12.9% for darker skin tones, 20.8% for darker females, and only a .7% error rate for lighter skin tones (. Face++ completed the trial with an error rate of16.5% for darker IDs, 34.5% for darker females, and 4.7% for lighter IDs. Lastly, IBM’s software had error rates of 22.4% for darker skin tones, a significant 34.5%error rate for darker females, and for lighter skin tones a 3.2% error rate. Some scholars attribute the algorithmic shortcomings and bias to the lack of diversity in the data training sets for the FRT and lack of representation of minorities in the stem field in general. Lastly, aggravating the situation, the federal and state mugshot databases used for FR have a higher number of minority -African American, Latino, and immigrant- headshots than white headshots. As one scholar notes, the FRT will be overused and underperform on people of color. In sum, for these reasons, the Common Good Digital Framework will identify both good and poor digital practices to advocate for ethical guidelines, frameworks, and policy. This will create new norms, raising the sector ethos, and benefitting the common good. With this, security and trust will be increased for all of humanity.