1. Last 7 days
  2. Apr 2021
    1. This is your brain on Zoom

      Information we mostly know, but good to tackle stress and address issues such as gender. Useful to corroborate some of our practices (breaks, "relaxed" networking opportunities).

      ||JovanK||, ||Katarina_An|| ||ArvinKamberi||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Much of the other work involves setting standards for datasets that are not uniform between different entities and provinces. This would allow them to be more easily used on new data exchanges such as the one recently launched in Beijing that aims to allow companies to trade anonymous proprietary data -- effectively a pilot for a national data trading system

      Rules for the governance of data is a key motivation of the Chinese government crackdown on companies. While proposals to nationalise companies' datasets have met criticism, an idea that is gaining traction is the possibility to establish a trading system for data between companies. ||JovanK||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Besonders offensichtlich wird die Schwierigkeit einer guten Kategorisierung beim Verbot von Manipulation

      how do you categorise 'manipulation'?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to achieve a sustainable peace with the digital world.

      so, there is a war? also the war metaphor at the beginning of the para? ...

    2. There's no manuals, there's no best practices,” Rauchbauer says. “You have to invent everything on the go and have to think it out yourself.” In the face of rapidly expanding tech empires, governments must use every tool at their disposal to contend with them.

      useful quotes

    3. Microsoft, for example, opened offices to the United Nations and the European Union in 2020, creating space for diplomatic, not just commercial, engagements

      where does diplomacy end and lobbying begin?

    4. “This idea that you're a diplomat that is not geographically located and focused ... is a challenge for foreign ministries. And the antibodies in foreign ministries against things that don't look like they're from these categories are strong.”

      good point. Foreign ministries are too a great extend geographically structured. Plus some themes (but again, very traditional fp themes ...)

    5. "The freight train is coming ... so it’s not the IT office that needs to deal with technology; it’s mainstream foreign and security policy. Too few countries get that."

      great quote though digital foreign policy

    6. net states

      misleading frame

    7. They may recognize that Big Tech has country-like powers, but they can’t seem to figure out how to deal with their very un-country-like structures.

      the essence of digital diplomacy?

      But is it even a good frame? States make laws, a key distinction.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Priznaju se normirani troškovi

      Test 2.0

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The firing of top Google AI ethics researchers has created a significant backlash

      maybe interesting for ||sorina|| and ||MariliaM||||sorina.teleanu||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the digital equivalent of bussing in a fake crowd for a speech.

      is it?

    2. acted quickly

      acting quick in some countries not so much in others

    3. Facebook has repeatedly allowed world leaders and politicians to use its platform to deceive the public or harass opponents despite being alerted to evidence of the wrongdoing.

      very strong claim. Worth following up? for dig.watch ||Katarina_An|| ||AndrijanaG|| Also content policy / socio-ecoomic basket ||GingerP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mobileye is developing two completely independent self-driving systems—one driven by cameras and the other by a combination of lidar and radar. Once each of these systems has achieved a high level of performance separately, Mobileye will combine them into a single system. Mobileye believes this extra layer of redundancy will give the company higher confidence in the safety of its systems

      new approach to developing self-driving tech

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the Stanford Encyclopedia of Philosophy

      Excellent resource!!!

    2. there were between fifty and seventy types of argumentation that could be applied to just about every possible debate question.

      Can we find more resources about it? This could be interesting for Speech Generator and way how countries frame cybersecurity argument.

      ||VladaR||||AndrijanaG||||JovanNj||

    3. The young machine learned by scanning the electronic library of LexisNexis Academic, composed of news stories and academic journal articles—a vast account of the details of human experience.

      Shall we rely more on Lexis Nexis for input of articles via JovanNJ search

      ||NatasaPerucica|| Could you check subscription info

      ||Katarina_An||||JovanNj||

    4. Debate is a game, like trivia or chess, in that it has specific rules and structures, which can be codified and taught to a machine.

      it is interesting how far rules can be applied to dealing with complex problems such as debating?

    5. Tel Aviv

      It is in Haifa

    6. ||Jovan|| I think this article is interesting for you because it deals with AI and politics

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Yet doom-mongers struggle to point to actual evidence of accelerating automation.

      Little evidence that there is an accelerated automation of work (including in the pandemic context).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Mar 2021
    1. We must move away from a culture of individualism toward the restoration of a common good.

      Also Internet as a public common good? ||Jovan||||Pavlina||||StephanieBP||

    2. If the pandemic revealed our global web of mutuality, how can we better support leaders on the ground, connect across countries and continents, and rebuild multilaterally?

      Supporting leaders on the ground to connect. Rebuild multilateralism. ||Jovan||||Pavlina||

    3. we must not--return to our old ways of working, learning, and connecting

      FF narrative: Looking forward on new ways of working and learning and connecting. ||Katarina_An||||Jovan||||Pavlina||

    4. Now it’s clear that we are not just interconnected but also deeply interdependent.

      Basis for Ford Foundation narrative for the future. ||Pavlina||||Jovan||||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. States concludedthat there are potentially devastating security, economic, social and humanitarian consequences of malicious ICT activitieson critical infrastructure (CI) and critical information infrastructure (CII) supporting essential services to the public. While it is each State’s prerogative to determine which infrastructures it designates ascritical, such infrastructure may include medical facilities,

      While the applicability of humanitarian law is not included in the final report, there are several references to humanitarian aspects of malicious activities - CI including medical facilities, recognising humanitarian consequences.

    2. The OEWG welcomes the high level of participation of women delegates in its sessions and the prominence of gender perspectives in its discussions.

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    3. including the possibility of additional legally binding obligations.

      This was pushed in by China, though opposed by the West. Additional legally binding obligations most likely refer to a possible future Code of Conduct/global treaty (as proposed by the Shanghai Cooperation Organisation earlier)

    4. Programme of Action should be further elaborated including atthe Open-Ended Working Group

      While this gives 'mandate' to OEWG to discuss PoA, it doesn't limit the options of running the PoA through other venues ("including at") - GA, First Committee, GGE report, or other. One can expect, however, that PoA will be among first elements of the OEWG2 agenda.

    5. support the capacities of States in implementing commitments in their use of ICTs, in particular the Programme of Action

      PoA is framed in context of support with the capacities of states in implementations. PoA is, however, envisaged as a possible single process to replace other processes in terms of institutional dialogue - as a continuous process (https://dig.watch/updates/france-and-partners-propose-programme-action-advancing-responsible-state-behaviour) This framing is not helping with this.

    6. ensure the continuation of the inclusive and transparent negotiation process

      Important element is the transparency and inclusiveness. Even if it is not explicit about the involvement of non-state stakeholders, transparency is rather clear here (one of the main remarks to the GGE work, besides being for a limited number of states, was its confidentiality and lack of transparency).

    7. of other issues.7

      It was removed in the final round: "including terrorism, crime, development, human rights and Internet governance."

      This is a continuous 'battle' on what the OEWG (ie UN institutional dialogue) talk and not talk about - in particular whether cybercrime should be included, and that it should (not) address Internet governance aspects such as content policy, or ICANN-related issues.

    8. Some non-State actors have demonstrated ICT capabilities previously only available to States

      This is interesting: attribution to states was always contested. Yet here, we hear that non-states have capabilities that states have… yet we don't know what states have due to lack of transparency.

    9. The OEWG recognizes the importance and complementarity of specialized discussions on aspects of digital technologies addressed by other UN bodies and fora

      This may, in particular, refer to the UN digital cooperation track as well as the IGF, but also the 'digital elements' of the SDG process

    10. general availability or integrity of the Internet,

      Indirect reference to the call by the Global Commission on Stability of Cyberspace (GCSC) for the protection of the Public Core of the Internet: https://cyberstability.org/research/call-to-protect/ GCSC defines the public core to include packet routing and forwarding (thus routing protocols), naming and numbering system (thus ICANN and IANA work), cryptographic mechanisms of security and identity (including DNSSec and similar protocols), and physical transmission media (including submarine cables): https://cyberstability.org/wp-content/uploads/2018/07/Definition-of-the-Public-Core-of-the-Internet.pdf

      Here, only a mention of 'general availibility and integrity of the Internet' was included, but this is a step forward. It is also mentioned in par. 26 under Norms, which is even more relevant.

    11. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    12. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    13. Building on this foundationand reaffirming this framework

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    14. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    15. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    16. Malicious ICT activitiesagainst CIand CII that undermine trust and confidence in political and electoral processes, public institutions,or that impact the general availability or integrity of the Internet, are also a real and growing concern

      While the principle of the state sovereignty did not make it into the final report, the text now includes recognition of malicious activities undermining political and electoral processes, and public institutions the essential elements of state sovereignty.

      The recognition of public core of internet has not been included, but the general availability and integrity of internet moves the needle closer to the possible recognition.

      Both of these changes reflect the discussions in the 3rd substantial OEWG session and mirror the careful balance between the requests of delegations.

    17. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    18. high level of participation of women delegates

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    19. Building on this foundationand reaffirming this framework,

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    20. humanitarian consequences of malicious ICT activities

      The report references humanitarian impacts of malicious cyber activities in several instances, but does not recognise the applicability of international humanitarian law.

    21. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend.

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While International Geneva continued to host face-to-face peace talks for war-torn countries like Syria

      test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Feb 2021
    1. f the widespread use of cloud computing, we started to move our digital assets (e.g. text files, personal data, spreadsheets, e-mail, and, to some extent, software applications) from our computer h

      Test annotation to check different groups

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplo LMS

      Test 12345

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Jan 2021
    1. ill use it to post re

      Test 12345

    2. Following our approach to look at the relationships between technology and policy, we will also analyse how Internet protocols contribute to the achievement of core Internet principles. Each week, you should be able to connect more of the dots between technologies and principles. Please rai

      dusan test

    3. among

      test12345

    4. module

      Dusan Test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL