You are on page 1of 6

Page I1

Thank the hosts and acknowledge the audience.

Microsoft welcomes the opportunity to contribute to this important


discussion. Others are more expert on the precise narratives and

ideologies of terrorist groups.


I do not presume to know what constitutes the most effective messaging to
change minds or to keep minds from being bent toward terrorism. But I do
understand the challenge that internet companies face in dealing with the
phenomenon of terrorism, and I hope that my comments will help us find a
principled way forward.
As a representative from the internet and communications technology
sector, the question I hope to address is: "How can we best work together,
as understanding of effective counter-messaging evolves?"

For the internet industry, the scale of the terrorist challenge is daunting.
Drawing from public sources, we know that there are 10s of 1000s of
terrorist internet accounts that refuse to die. As one is taken down, another

quickly springs up in its place. Account names and identifiers change.


Content is edited. Terrorist propaganda and communication continue.

Within15 minutes of the Paris attacks of November 13, there were 7,500 . _
tweets. Within two weeks, there were 1 million views of videos on -- -.."

praising the attacks. Another company in the ICT sector.---

has noted that every day their 1.6 billion users submit 1 million
reports of objectionable postings across all content categories.
If there were an elegant solution, industry would have adopted it. But there
is no single answer, there is no silver bullet that will stop terrorist use of the
internet.

Microsoft approaches the challenge of terroristnd violent extremism on


the internet from the perspective of a technology company with global
reach and aspirations that are just as ambitious.

Pagel2

Terrorist abuse of internet platforms is a complicated topic. I think it is


important to ground any discussion about the future of the global internet in
a clear understanding of the past and the present.
One comment on the past: It is an obvious, but easily overlooked,

historical fact that what we know today as the internet was conceived in
trust. Initial sharing technologies assumed well-intentioned people working
together. It evolved from connections between research facilities.

Of course, the internet, once released to the world, quickly attracted bad
actors. Any technology can be used either for good or for evil. This was
true of fire (think arson), of gunpowder, of the printing press. It is true also
of information technology products and platforms.
The internet industry is built on the idea that by enabling communication,
we can unleash human potential. Microsoft's mission is to empower every
person on the planet.

So nothing could be more in conflict with the aspirations of ICT companies


than misuse of our technologies to spread violence, to destroy and to kill.
As we look at the terrorist challenge today, where do we find ourselves?
When we talk about what companies can do and should do, it is important
to understand that there is no monolithic ICT industry.
If you think of the big players on the global stage, actually we are a
collection of companies who offer different technologies and different
platforms.

Microsoft services and Microsoft the company are different from Google,
which is different from Facebook, which is different from Twitter, which is
different from [name any other internet company].
We compete fiercely at times. But we have come together before when we
have seen our platforms abused. Perhaps the best example of our joint
work is cooperation on a global scale to combat child sex abuse material.
In working to address the challenge of terrorist abuse of our services, the
internet technology industry is similarly united. We unanimously condemn

'

Page 1:3

terrorism. To respond more effectively, we need to find better paths

forward, paths that all stakeholders can walk together.


In today's discussion, I especially want to underscore the potential of Public
Private Partnerships. Public Private Partnerships can, and should, be a
part of our global response to this challenge.
Once one recognizes that terrorist use of the internet is a global challenge,
it becomes clear that this problem will not be solved by internet technology
companies, or by States, or by NGOs, acting alone. We must work in a
coordinated way.

That realization is what led to the formation last month of a new multistakeholder effort, under the umbrella of the Security Council CounterTerrorism Committee Executive Directorate.

Meeting in Geneva, in partnersllwith ICT4Peace and a range of internet


companies, government actors/and civil society organizations, we have

come together to build a new level of understanding


i

"

'

Our focus will be to develop creative, cooperative efforts to address the


challenge of terrorist use of the internet.
Of course, any effective and trustworthy Public Private Partnership must be
grounded in transparency. We will therefore seek maximum transparency

in this effort, so you should look for reports in the coming year.
I would like to telegraph just a couple of things to watch for.
We need to embrace certain unfortunate truths. There is no universally

accepted definition of terrorism or extremism. Neither at the international


nor at the regional, level.

Yes, the Universal Declaration of Human Rights and the International


Covenant on Civil and Political Rights provide international standards '- ,Q',,T
to appropriate and lawful regulation of the expression and
communication of ideas.

Page 14

<he United Nations, itself, has noted that those principles have never been
reduced to an internationally binding instrument setting forth definitive,
binding norms.

This is no surprise, as definitional lines in this space are hard to draw. But
we can broadly agree on especially harmful actors, and we can focus

attention in a principled way.


So the goal of Public Private Partnerships to address terrorist use of the
internet, including creation and use of counter-narratives, should not be a

search for the single right solution. The path to success will be dialogue _ ,
,

,and learning..

<.\& ,.,4 ,..',-oj::L ",

We in the Isector perhaps uniquely appreciate that we need to be open - "


to alternative solutions that work differently across the globe _ , (l.
As we explore alternatives, including use of counter-narratives, whatever
form those might take, we need to anchor ourselves in Rule of Law,

including international law. We"need to protect timeless values, including


freedom of expression, which includes the rights to seek and receive
information, and rights to privacy. Our activities in this realm must be
principled, but they must press beyond what we are doing today.
Already there are some interesting proposals that the new working group
under CTED will explore. These include simplified, perhaps common
models and processes, to make it easier for any stakeholders, including
governments, to bring to companies' attention internet content that on its
face violates companies' terms of use.

There is opportunity also to improve efficiency and transparency measures,


so that governments can more effectively, under Rule of Law, work with
companies topursue criminal, including terrorist and violent extremist,
investigations.

This work with CTED presents an important new forum for sharing
practices, experiences, research and ideas to improve the effectiveness of

responses to terrorism on the internet, while advancing Rule of Law and


protecting and respecting human rights.

Page IS

Allow me to underscore that last point. Rule of Law and protection and
respect for human rights are critical for Microsoft. I know through work with
colleagues across the industry that Rule of Law and protection and respect
fOrfor
coordinated
action
mustCbased
on that
foundation.
Any plan
human
rights are
criticallall
of the major
internet
companies,

We at Microsoft publish a Global Human Rights Statement that sets forth


our philosophy. We believe that active engagement in the more than 100
countries where we do business is the right approach.
We are an early signatory to the Global Compact, and, across the planet,
we are a strong advocate for the UN Guiding Principles on Business and
Human Rights.
We are a founding member of the Global Network Initiative, a multistakeholder organization of companies, civil society, academics, and

investors with a focus on principled respect for freedom of expression and


privacy on the global internet. I represent Microsoft on that Board of
Directors.

As we work together across sectors, we need to act with a certain humility,


acknowledging that we do not have perfect knowledge. But we must not let
that stand in the way of principled action.
So my key message today is that as more creative counter narratives
evolve, we need more communication and more cooperation. We invite
that.
Open discussion -- and exploration of new or improved means of

addressing misuse of ICT platforms -- is what companies hope to achieve


through our new working group with CTED. It is why I am here speaking
with you today.
We need to be transparent about this so that end users and other
stakeholders understand, and so trust, how we work together.

We need to admit what we do not know. We need to focus on taking


action, and on learning from experience.

Page 16

When it comes to combatting terrorist misuse of the global internet, --

including working together to improve use of counter-narratives in the fight


against terrorists and their ideologies so long as we are anchored in Rule of Law,
so long as we protect and respect human rights,
,, so long as we cooperate transparently, in a way that enhances
the public's trust,

there is no discussion topic that should be off the table.


Thank you.

I look forward to the discussion.


I will be happy to take your questions.
We need the dialogue.

You might also like