1. Last 7 days
    1. Active Apps Notifier

      Active Apps Notifier

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Protect our planet

      no mention of e-waste despite Mount Recylemore

    2. G7 commitments since the start of the pandemic provide for a total of over two billion vaccine doses

      Mostly for themselves...data shows that the US only exported around 3 million vaccines which is around 1% of their total production. EU exported around 28% of its vaccines mostly to rich countries like the UK, Canada, Japan, Saudi Arabia, etc..

    3. As such we endorse the G7 Compact on Research Collaboration and its commitment to: support policies, legal frameworks and programmes to promote research collaboration; promote sharing of research data; explore enhancements to research assessment and rewards for collaboration and knowledge sharing; and develop a common set of principles which will help protect research and innovation ecosystem across the G7 to open and reciprocal research collaboration.

      Science diplomacy framework.

      ||kat_hone||||Pavlina||

    4. G7 Presidency’s common understanding on ‘Competition and the Digital Economy’,

      To include this document

    5. a common understanding of how existing international law applies to cyberspace and welcome the work of our Foreign Ministers to promote this approach at the UN and other international fora.

      ||VladaR||||AndrijanaG||Support for OEWG approach

    6. Digital Ministers’ Roadmap for Cooperation on Data Free Flow with Trust.

      Do we have this document?

      ||NatasaPerucica||||Katarina_An||

    7. the Framework for G7 Collaboration on Digital Technical Standards.

      ||sorina|| to follow-up on this development

    8. with regards to engagement with and appointments to Standard Developing Organisations, where appropriate.

      Direct call for appointements.

      ||sorina||

    9. the GPAI Summit in Paris in November 2021.

      Another important event for the autumn. It seems that they are replacing Peace Week with GPAI Summit.

    10. a ‘Future Tech Forum’ in September 2021

      to put it on the calendar for follow-up

      ||StephanieBP||||VladaR||

    11. for industry-led inclusive multi-stakeholder approaches to standard setting, in line with our values and principles which underpin these standards

      ||sorina||||Pavlina||

    12. support for the implementation and development of global norms and standards to ensure that the use and evolution of new technologies reflects our shared democratic values and commitment to open and competitive markets, strong safeguards including for human rights and fundamental freedoms.

      Link to values and human rights.

    13. FRONTIERS

      Use terminology from early days of Gueterres mandate - frontier technologies.

    14. We recognise that this will need a set of common standards for travel including interoperability and mutual recognition of digital applications,  testing requirements, recognition of vaccination status including exemptions and comparable criteria for when responsive measures may be required.

      Standardisation process in post-COVID issues.

      ||sorina||

    15. an ambitious global minimum tax of at least 15 per cent on a country-by-country basis, through the G20/OECD inclusive framework and look forward to reaching an agreement at the July meeting of G20 Finance Ministers and Central Bank Governors

      ||StephanieBP|| Next steps on the new taxation system.

    16. We thank the UK’s Chief Scientific Adviser and his G7 counterparts, the international organisations, industry representatives and expert advisers involved in the partnership on pandemic preparedness convened by the UK Presidency and note their practical proposals.

      Science diplomacy cooperation ||TerezaHorejsova||||Pavlina||||Katarina_An||

    17. Emphasising the need for equitable access to COVID-19 vaccines, we will support manufacturing in low income countries and, noting the importance of intellectual property in this regard, we will engage constructively with discussions at the WTO on the role of intellectual property, including by working consistently within the TRIPS agreement and the 2001 Doha Declaration on the TRIPS agreement and Public Health. We note the positive impact that voluntary licensing and technology transfer on mutually agreed terms have already made to increasing global supply. We note the positive impact that voluntary licensing and technology transfer on mutually agreed terms have already made to increasing global supply.

      It seems that on this point EU prevailed because it soften USA call to waive IPR protection in the WTO.

    18. free open societies and democracies, and by our commitment to multilateralism

      key guiding principles

    19. Here is analysis of cyber-aspects of Carbis Bay G7 Communique.

    1. Promoterespectforinternationallyacceptednormsthatdriveinclusivityandprotectdigitalcivic-space,includingthroughcapacitybuilding,andensurethatthedesignandapplicationofnewtechnologiesreflectoursharedvalues,respecthumanrightsandinternational law, promote diversity and embed principlesof public safety

      ||VladaR|| This is from statement between G7, India, S.Korea, and S. Africa.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. continuation of the inclusive and transparent negotiation process

      This, along with subsequent paragraphs, signal abandoning the GGE format, and replacing it with PoA (which may be focused on implementation of norms and capacity building, but also on shaping new measures).

    2. categorize CERTs/CSIRTs as part of their critical infrastructure

      Interesting 'suggestion' to categorise CERTs as critical infrastructure

    3. curb their commercial distribution as a means to protect against any misuse that may pose a risk to international peace and security or human rights

      This is a very important 'upgrade'. Vulnerabilities are being part of (legal) commercial services and products used by criminals as well as governments and security services to penetrate into systems. Overall, this reduces safety and security, and often endangers human rights (as security services use these tools to snoop on activists and journalists).

      This measure clearly asks for curbing such (legal) practices. This may be used also by human right groups to put pressure on States where such businesses reside (businesses that produce offensive tools - including tools then used to attack activists).

    4. systematize the reporting of ICT vulnerabilities and requests for assistance between countries and emergency response teams

      CVD is linked with requests for assistance between countries, which were outlined above.

    5. he exploitation of vulnerabilities in ICT products

      Direct call to control on a national level the exploitation of vulnerabilities (eg. vulnerabilities equities process - VEP, and in general transparency about how vulnerabilities are exploited).

      Further work on such transparency and VEP measures, and even prohibiting exploitation of vulnerabilities is needed.

    6. security of ICT products

      Par. 56-59 are a very important elaboration of the supply chain security measures, and the accountability of the private sector for security by design: through regulators' measures (such as certification schemes), interoperable standards, as well as vendor's good practices on security-by-design approach.

      Very relevant for initiatives like the Geneva Dialogue on Responsible Behaviour in Cyberspace, Paris Call (Working group 6), and other.

    7. measures to ensure the safety and security of ICT products throughout their lifecycle

      Placing this under the part on critical infrastructure signals the growing importance of the topic (security of digital products)

    8. mass surveillance

      Explicit reference to "mass surveillance" (as part of the compromise on other elements?)

    9. An affected State should notify the State from which the activity is emanating. The notified Stateshould acknowledge receipt of the notificatio

      Clearly setting an expectation of direct communication between parties (and 'proofs' - receipt) before any other action is undertaken

    10. can include the incident’s technical attributes; its scope, scale and impact; the wider context, including the incident’s bearing on international peace and security; and the results of consultations between the States concerned

      The report sets expectations for what an attribution might/should consist of. It is particularly interesting that it suggests 'evidence' of a bilateral exchange - thus encouraging direct cooperation and exchange before attribution is done.

    11. The measures recommended by previous GGEs and the OEWG represent an initial framework for responsible State behaviour in the use of ICT

      In a way, the GGE report re-confirms that the framework for responsible behaviour is based on GGE and OEWG agreements. No other resolutions are mentioned here.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jun 2021
    1. A very interesting summary of India's position in digital realm with a few highlights:

      • stressing risk of relying on critical infrastructure owned and controlled by other actors
      • introducing 'data-centered' sovereignty along the lines of the GDPR-approach
      • high importance of digital supply chain for INdia
      • try to negotiate international framework for cyberspace by 2025.
      • hinting a possibility of joining WTO negotiations (not completely clear).

      ||VladaR|| ||StephanieBP||||TerezaHorejsova||

    2. including in the WTO,

      Is India signalling joining of the Joint Statement Initiative?

    3. the territorial jurisdiction of a country would be on the data which is owned by its citizens irrespective of the place where the data physically is located located”.

      India is moving here close to GDPR.

    4. This aspect highlights the risks associated with India’s dependence for the operations and services on the critical cyber infrastructure located elsewhere.

      It is important aspect: high digital dependency of India. What can India (and other countries) do to address this dependency of - let say - submarine cables?

    5. supported the primary role of the governments in securing cyberspace while also acknowledging an important supporting role of other stakeholders.

      Is primary role of governments related only to cybersecurity?

    6. in support of the development objectives building on the 2015 Digital India platform with the world’s largest biometric database, Aadhar, at its centre.

      It makes an interesting approach of having a specific tech platform in the center of the overall development approach.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. "We have an agreement with the private sector on the transmission grid. There are basic standards, cyber standards that they adhere to, cyber standards that are developed by the Department of Commerce, and we need that same sort of regime with pipelines. And that does not exist at the moment," Granholm said on NBC.

      Need to develop standards for cyber and pipelines.

      ||VladaR||||sorina||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. transportation like our water systems, like a lot of our power systems, you know, quite a bit of it is in private hands or local hands. And part of our vulnerability on cybersecurity is you're only as strong as your weakest link. And so we've got to make sure there are good cyber practices all the way down to the smallest player, any individual company. Because what Colonial showed us was a cyber-attack on a private company had national implications.

      Amnother interview on cyber matters

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Here is annotated analysis of the UN GGE Report (2021)

      ||VladaR||||AndrijanaG||||StephanieBP||||Pavlina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. May 2021
  4. Apr 2021
    1. This is your brain on Zoom

      Information we mostly know, but good to tackle stress and address issues such as gender. Useful to corroborate some of our practices (breaks, "relaxed" networking opportunities).

      ||JovanK||, ||Katarina_An|| ||ArvinKamberi||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Much of the other work involves setting standards for datasets that are not uniform between different entities and provinces. This would allow them to be more easily used on new data exchanges such as the one recently launched in Beijing that aims to allow companies to trade anonymous proprietary data -- effectively a pilot for a national data trading system

      Rules for the governance of data is a key motivation of the Chinese government crackdown on companies. While proposals to nationalise companies' datasets have met criticism, an idea that is gaining traction is the possibility to establish a trading system for data between companies. ||JovanK||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Besonders offensichtlich wird die Schwierigkeit einer guten Kategorisierung beim Verbot von Manipulation

      how do you categorise 'manipulation'?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to achieve a sustainable peace with the digital world.

      so, there is a war? also the war metaphor at the beginning of the para? ...

    2. There's no manuals, there's no best practices,” Rauchbauer says. “You have to invent everything on the go and have to think it out yourself.” In the face of rapidly expanding tech empires, governments must use every tool at their disposal to contend with them.

      useful quotes

    3. Microsoft, for example, opened offices to the United Nations and the European Union in 2020, creating space for diplomatic, not just commercial, engagements

      where does diplomacy end and lobbying begin?

    4. “This idea that you're a diplomat that is not geographically located and focused ... is a challenge for foreign ministries. And the antibodies in foreign ministries against things that don't look like they're from these categories are strong.”

      good point. Foreign ministries are too a great extend geographically structured. Plus some themes (but again, very traditional fp themes ...)

    5. "The freight train is coming ... so it’s not the IT office that needs to deal with technology; it’s mainstream foreign and security policy. Too few countries get that."

      great quote though digital foreign policy

    6. net states

      misleading frame

    7. They may recognize that Big Tech has country-like powers, but they can’t seem to figure out how to deal with their very un-country-like structures.

      the essence of digital diplomacy?

      But is it even a good frame? States make laws, a key distinction.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Priznaju se normirani troškovi

      Test 2.0

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The firing of top Google AI ethics researchers has created a significant backlash

      maybe interesting for ||sorina|| and ||MariliaM||||sorina.teleanu||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the digital equivalent of bussing in a fake crowd for a speech.

      is it?

    2. acted quickly

      acting quick in some countries not so much in others

    3. Facebook has repeatedly allowed world leaders and politicians to use its platform to deceive the public or harass opponents despite being alerted to evidence of the wrongdoing.

      very strong claim. Worth following up? for dig.watch ||Katarina_An|| ||AndrijanaG|| Also content policy / socio-ecoomic basket ||GingerP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mobileye is developing two completely independent self-driving systems—one driven by cameras and the other by a combination of lidar and radar. Once each of these systems has achieved a high level of performance separately, Mobileye will combine them into a single system. Mobileye believes this extra layer of redundancy will give the company higher confidence in the safety of its systems

      new approach to developing self-driving tech

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the Stanford Encyclopedia of Philosophy

      Excellent resource!!!

    2. there were between fifty and seventy types of argumentation that could be applied to just about every possible debate question.

      Can we find more resources about it? This could be interesting for Speech Generator and way how countries frame cybersecurity argument.

      ||VladaR||||AndrijanaG||||JovanNj||

    3. The young machine learned by scanning the electronic library of LexisNexis Academic, composed of news stories and academic journal articles—a vast account of the details of human experience.

      Shall we rely more on Lexis Nexis for input of articles via JovanNJ search

      ||NatasaPerucica|| Could you check subscription info

      ||Katarina_An||||JovanNj||

    4. Debate is a game, like trivia or chess, in that it has specific rules and structures, which can be codified and taught to a machine.

      it is interesting how far rules can be applied to dealing with complex problems such as debating?

    5. Tel Aviv

      It is in Haifa

    6. ||Jovan|| I think this article is interesting for you because it deals with AI and politics

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Yet doom-mongers struggle to point to actual evidence of accelerating automation.

      Little evidence that there is an accelerated automation of work (including in the pandemic context).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Mar 2021
    1. We must move away from a culture of individualism toward the restoration of a common good.

      Also Internet as a public common good? ||Jovan||||Pavlina||||StephanieBP||

    2. If the pandemic revealed our global web of mutuality, how can we better support leaders on the ground, connect across countries and continents, and rebuild multilaterally?

      Supporting leaders on the ground to connect. Rebuild multilateralism. ||Jovan||||Pavlina||

    3. we must not--return to our old ways of working, learning, and connecting

      FF narrative: Looking forward on new ways of working and learning and connecting. ||Katarina_An||||Jovan||||Pavlina||

    4. Now it’s clear that we are not just interconnected but also deeply interdependent.

      Basis for Ford Foundation narrative for the future. ||Pavlina||||Jovan||||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. States concludedthat there are potentially devastating security, economic, social and humanitarian consequences of malicious ICT activitieson critical infrastructure (CI) and critical information infrastructure (CII) supporting essential services to the public. While it is each State’s prerogative to determine which infrastructures it designates ascritical, such infrastructure may include medical facilities,

      While the applicability of humanitarian law is not included in the final report, there are several references to humanitarian aspects of malicious activities - CI including medical facilities, recognising humanitarian consequences.

    2. The OEWG welcomes the high level of participation of women delegates in its sessions and the prominence of gender perspectives in its discussions.

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    3. including the possibility of additional legally binding obligations.

      This was pushed in by China, though opposed by the West. Additional legally binding obligations most likely refer to a possible future Code of Conduct/global treaty (as proposed by the Shanghai Cooperation Organisation earlier)

    4. Programme of Action should be further elaborated including atthe Open-Ended Working Group

      While this gives 'mandate' to OEWG to discuss PoA, it doesn't limit the options of running the PoA through other venues ("including at") - GA, First Committee, GGE report, or other. One can expect, however, that PoA will be among first elements of the OEWG2 agenda.

    5. support the capacities of States in implementing commitments in their use of ICTs, in particular the Programme of Action

      PoA is framed in context of support with the capacities of states in implementations. PoA is, however, envisaged as a possible single process to replace other processes in terms of institutional dialogue - as a continuous process (https://dig.watch/updates/france-and-partners-propose-programme-action-advancing-responsible-state-behaviour) This framing is not helping with this.

    6. ensure the continuation of the inclusive and transparent negotiation process

      Important element is the transparency and inclusiveness. Even if it is not explicit about the involvement of non-state stakeholders, transparency is rather clear here (one of the main remarks to the GGE work, besides being for a limited number of states, was its confidentiality and lack of transparency).

    7. of other issues.7

      It was removed in the final round: "including terrorism, crime, development, human rights and Internet governance."

      This is a continuous 'battle' on what the OEWG (ie UN institutional dialogue) talk and not talk about - in particular whether cybercrime should be included, and that it should (not) address Internet governance aspects such as content policy, or ICANN-related issues.

    8. Some non-State actors have demonstrated ICT capabilities previously only available to States

      This is interesting: attribution to states was always contested. Yet here, we hear that non-states have capabilities that states have… yet we don't know what states have due to lack of transparency.

    9. The OEWG recognizes the importance and complementarity of specialized discussions on aspects of digital technologies addressed by other UN bodies and fora

      This may, in particular, refer to the UN digital cooperation track as well as the IGF, but also the 'digital elements' of the SDG process

    10. general availability or integrity of the Internet,

      Indirect reference to the call by the Global Commission on Stability of Cyberspace (GCSC) for the protection of the Public Core of the Internet: https://cyberstability.org/research/call-to-protect/ GCSC defines the public core to include packet routing and forwarding (thus routing protocols), naming and numbering system (thus ICANN and IANA work), cryptographic mechanisms of security and identity (including DNSSec and similar protocols), and physical transmission media (including submarine cables): https://cyberstability.org/wp-content/uploads/2018/07/Definition-of-the-Public-Core-of-the-Internet.pdf

      Here, only a mention of 'general availibility and integrity of the Internet' was included, but this is a step forward. It is also mentioned in par. 26 under Norms, which is even more relevant.

    11. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    12. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    13. Building on this foundationand reaffirming this framework

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    14. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    15. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    16. Malicious ICT activitiesagainst CIand CII that undermine trust and confidence in political and electoral processes, public institutions,or that impact the general availability or integrity of the Internet, are also a real and growing concern

      While the principle of the state sovereignty did not make it into the final report, the text now includes recognition of malicious activities undermining political and electoral processes, and public institutions the essential elements of state sovereignty.

      The recognition of public core of internet has not been included, but the general availability and integrity of internet moves the needle closer to the possible recognition.

      Both of these changes reflect the discussions in the 3rd substantial OEWG session and mirror the careful balance between the requests of delegations.

    17. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    18. high level of participation of women delegates

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    19. Building on this foundationand reaffirming this framework,

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    20. humanitarian consequences of malicious ICT activities

      The report references humanitarian impacts of malicious cyber activities in several instances, but does not recognise the applicability of international humanitarian law.

    21. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend.

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While International Geneva continued to host face-to-face peace talks for war-torn countries like Syria

      test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Feb 2021
    1. f the widespread use of cloud computing, we started to move our digital assets (e.g. text files, personal data, spreadsheets, e-mail, and, to some extent, software applications) from our computer h

      Test annotation to check different groups

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplo LMS

      Test 12345

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  7. Jan 2021