Professional Documents
Culture Documents
For the internet industry, the scale of the terrorist challenge is daunting.
Drawing from public sources, we know that there are 10s of 1000s of
terrorist internet accounts that refuse to die. As one is taken down, another
Within15 minutes of the Paris attacks of November 13, there were 7,500 . _
tweets. Within two weeks, there were 1 million views of videos on -- -.."
has noted that every day their 1.6 billion users submit 1 million
reports of objectionable postings across all content categories.
If there were an elegant solution, industry would have adopted it. But there
is no single answer, there is no silver bullet that will stop terrorist use of the
internet.
Pagel2
historical fact that what we know today as the internet was conceived in
trust. Initial sharing technologies assumed well-intentioned people working
together. It evolved from connections between research facilities.
Of course, the internet, once released to the world, quickly attracted bad
actors. Any technology can be used either for good or for evil. This was
true of fire (think arson), of gunpowder, of the printing press. It is true also
of information technology products and platforms.
The internet industry is built on the idea that by enabling communication,
we can unleash human potential. Microsoft's mission is to empower every
person on the planet.
Microsoft services and Microsoft the company are different from Google,
which is different from Facebook, which is different from Twitter, which is
different from [name any other internet company].
We compete fiercely at times. But we have come together before when we
have seen our platforms abused. Perhaps the best example of our joint
work is cooperation on a global scale to combat child sex abuse material.
In working to address the challenge of terrorist abuse of our services, the
internet technology industry is similarly united. We unanimously condemn
'
Page 1:3
That realization is what led to the formation last month of a new multistakeholder effort, under the umbrella of the Security Council CounterTerrorism Committee Executive Directorate.
"
'
in this effort, so you should look for reports in the coming year.
I would like to telegraph just a couple of things to watch for.
We need to embrace certain unfortunate truths. There is no universally
Page 14
<he United Nations, itself, has noted that those principles have never been
reduced to an internationally binding instrument setting forth definitive,
binding norms.
This is no surprise, as definitional lines in this space are hard to draw. But
we can broadly agree on especially harmful actors, and we can focus
search for the single right solution. The path to success will be dialogue _ ,
,
,and learning..
This work with CTED presents an important new forum for sharing
practices, experiences, research and ideas to improve the effectiveness of
Page IS
Allow me to underscore that last point. Rule of Law and protection and
respect for human rights are critical for Microsoft. I know through work with
colleagues across the industry that Rule of Law and protection and respect
fOrfor
coordinated
action
mustCbased
on that
foundation.
Any plan
human
rights are
criticallall
of the major
internet
companies,
Page 16